d86ed3a
From 24a6888e38fb9d11bf173eb06e400678388bce49 Mon Sep 17 00:00:00 2001
d86ed3a
From: =?UTF-8?q?Pavel=20B=C5=99ezina?= <pbrezina@redhat.com>
d86ed3a
Date: Tue, 3 Nov 2020 13:35:33 +0100
d86ed3a
Subject: [PATCH 16/19] secrets: fix may_payload_size exceeded debug message
d86ed3a
d86ed3a
The unit is bytes (B) not bits (b) and the conversion of the input
d86ed3a
payload size to KiB was wrong (multiplying bytes * 1024).
d86ed3a
---
d86ed3a
 src/util/secrets/secrets.c | 10 +++++-----
d86ed3a
 1 file changed, 5 insertions(+), 5 deletions(-)
d86ed3a
d86ed3a
diff --git a/src/util/secrets/secrets.c b/src/util/secrets/secrets.c
d86ed3a
index 6fd9e0af5bd9986052efdb8e244ddeb9e4fa50ff..1000757228bea75bb2d5c48aceb717c9bfe35ffb 100644
d86ed3a
--- a/src/util/secrets/secrets.c
d86ed3a
+++ b/src/util/secrets/secrets.c
d86ed3a
@@ -399,14 +399,14 @@ static int local_check_max_payload_size(struct sss_sec_req *req,
d86ed3a
         return EOK;
d86ed3a
     }
d86ed3a
 
d86ed3a
-    max_payload_size = req->quota->max_payload_size * 1024; /* kb */
d86ed3a
+    max_payload_size = req->quota->max_payload_size * 1024; /* KiB */
d86ed3a
     if (payload_size > max_payload_size) {
d86ed3a
         DEBUG(SSSDBG_OP_FAILURE,
d86ed3a
-              "Secrets' payload size [%d kb (%d)] exceeds the maximum allowed "
d86ed3a
-              "payload size [%d kb (%d)]\n",
d86ed3a
-              payload_size * 1024, /* kb */
d86ed3a
+              "Secrets' payload size [%d KiB (%d B)] exceeds the maximum "
d86ed3a
+              "allowed payload size [%d KiB (%d B)]\n",
d86ed3a
+              payload_size / 1024, /* KiB */
d86ed3a
               payload_size,
d86ed3a
-              req->quota->max_payload_size, /* kb */
d86ed3a
+              req->quota->max_payload_size, /* KiB */
d86ed3a
               max_payload_size);
d86ed3a
 
d86ed3a
         return ERR_SEC_PAYLOAD_SIZE_IS_TOO_LARGE;
d86ed3a
-- 
d86ed3a
2.25.4
d86ed3a