diff options
author | Damien Miller <djm@mindrot.org> | 2008-11-03 19:26:18 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2008-11-03 19:26:18 +1100 |
commit | f7475d7e97900323195b918942d0cf8d0489279f (patch) | |
tree | f41d3597f25d30794dcc0d4470efe4b073874de6 | |
parent | 2b20a92b7b404abe44d141461196a1d862214e06 (diff) |
- djm@cvs.openbsd.org 2008/11/01 04:50:08
[sshconnect2.c]
sprinkle ARGSUSED on dispatch handlers
nuke stale unusued prototype
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | sshconnect2.c | 15 |
2 files changed, 18 insertions, 3 deletions
@@ -82,6 +82,10 @@ | |||
82 | - stevesk@cvs.openbsd.org 2008/10/31 15:05:34 | 82 | - stevesk@cvs.openbsd.org 2008/10/31 15:05:34 |
83 | [dispatch.c] | 83 | [dispatch.c] |
84 | remove unused #define DISPATCH_MIN; ok markus@ | 84 | remove unused #define DISPATCH_MIN; ok markus@ |
85 | - djm@cvs.openbsd.org 2008/11/01 04:50:08 | ||
86 | [sshconnect2.c] | ||
87 | sprinkle ARGSUSED on dispatch handlers | ||
88 | nuke stale unusued prototype | ||
85 | 89 | ||
86 | 20080906 | 90 | 20080906 |
87 | - (dtucker) [config.guess config.sub] Update to latest versions from | 91 | - (dtucker) [config.guess config.sub] Update to latest versions from |
@@ -4816,4 +4820,4 @@ | |||
4816 | OpenServer 6 and add osr5bigcrypt support so when someone migrates | 4820 | OpenServer 6 and add osr5bigcrypt support so when someone migrates |
4817 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ | 4821 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ |
4818 | 4822 | ||
4819 | $Id: ChangeLog,v 1.5118 2008/11/03 08:26:00 djm Exp $ | 4823 | $Id: ChangeLog,v 1.5119 2008/11/03 08:26:18 djm Exp $ |
diff --git a/sshconnect2.c b/sshconnect2.c index fe9285f17..7d0c5e825 100644 --- a/sshconnect2.c +++ b/sshconnect2.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sshconnect2.c,v 1.168 2008/10/03 23:56:28 deraadt Exp $ */ | 1 | /* $OpenBSD: sshconnect2.c,v 1.169 2008/11/01 04:50:08 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -218,7 +218,6 @@ int userauth_pubkey(Authctxt *); | |||
218 | int userauth_passwd(Authctxt *); | 218 | int userauth_passwd(Authctxt *); |
219 | int userauth_kbdint(Authctxt *); | 219 | int userauth_kbdint(Authctxt *); |
220 | int userauth_hostbased(Authctxt *); | 220 | int userauth_hostbased(Authctxt *); |
221 | int userauth_kerberos(Authctxt *); | ||
222 | 221 | ||
223 | #ifdef GSSAPI | 222 | #ifdef GSSAPI |
224 | int userauth_gssapi(Authctxt *authctxt); | 223 | int userauth_gssapi(Authctxt *authctxt); |
@@ -367,6 +366,7 @@ userauth(Authctxt *authctxt, char *authlist) | |||
367 | } | 366 | } |
368 | } | 367 | } |
369 | 368 | ||
369 | /* ARGSUSED */ | ||
370 | void | 370 | void |
371 | input_userauth_error(int type, u_int32_t seq, void *ctxt) | 371 | input_userauth_error(int type, u_int32_t seq, void *ctxt) |
372 | { | 372 | { |
@@ -374,6 +374,7 @@ input_userauth_error(int type, u_int32_t seq, void *ctxt) | |||
374 | "type %d", type); | 374 | "type %d", type); |
375 | } | 375 | } |
376 | 376 | ||
377 | /* ARGSUSED */ | ||
377 | void | 378 | void |
378 | input_userauth_banner(int type, u_int32_t seq, void *ctxt) | 379 | input_userauth_banner(int type, u_int32_t seq, void *ctxt) |
379 | { | 380 | { |
@@ -395,6 +396,7 @@ input_userauth_banner(int type, u_int32_t seq, void *ctxt) | |||
395 | xfree(lang); | 396 | xfree(lang); |
396 | } | 397 | } |
397 | 398 | ||
399 | /* ARGSUSED */ | ||
398 | void | 400 | void |
399 | input_userauth_success(int type, u_int32_t seq, void *ctxt) | 401 | input_userauth_success(int type, u_int32_t seq, void *ctxt) |
400 | { | 402 | { |
@@ -412,6 +414,7 @@ input_userauth_success(int type, u_int32_t seq, void *ctxt) | |||
412 | authctxt->success = 1; /* break out */ | 414 | authctxt->success = 1; /* break out */ |
413 | } | 415 | } |
414 | 416 | ||
417 | /* ARGSUSED */ | ||
415 | void | 418 | void |
416 | input_userauth_failure(int type, u_int32_t seq, void *ctxt) | 419 | input_userauth_failure(int type, u_int32_t seq, void *ctxt) |
417 | { | 420 | { |
@@ -432,6 +435,8 @@ input_userauth_failure(int type, u_int32_t seq, void *ctxt) | |||
432 | 435 | ||
433 | userauth(authctxt, authlist); | 436 | userauth(authctxt, authlist); |
434 | } | 437 | } |
438 | |||
439 | /* ARGSUSED */ | ||
435 | void | 440 | void |
436 | input_userauth_pk_ok(int type, u_int32_t seq, void *ctxt) | 441 | input_userauth_pk_ok(int type, u_int32_t seq, void *ctxt) |
437 | { | 442 | { |
@@ -614,6 +619,7 @@ process_gssapi_token(void *ctxt, gss_buffer_t recv_tok) | |||
614 | return status; | 619 | return status; |
615 | } | 620 | } |
616 | 621 | ||
622 | /* ARGSUSED */ | ||
617 | void | 623 | void |
618 | input_gssapi_response(int type, u_int32_t plen, void *ctxt) | 624 | input_gssapi_response(int type, u_int32_t plen, void *ctxt) |
619 | { | 625 | { |
@@ -653,6 +659,7 @@ input_gssapi_response(int type, u_int32_t plen, void *ctxt) | |||
653 | } | 659 | } |
654 | } | 660 | } |
655 | 661 | ||
662 | /* ARGSUSED */ | ||
656 | void | 663 | void |
657 | input_gssapi_token(int type, u_int32_t plen, void *ctxt) | 664 | input_gssapi_token(int type, u_int32_t plen, void *ctxt) |
658 | { | 665 | { |
@@ -680,6 +687,7 @@ input_gssapi_token(int type, u_int32_t plen, void *ctxt) | |||
680 | } | 687 | } |
681 | } | 688 | } |
682 | 689 | ||
690 | /* ARGSUSED */ | ||
683 | void | 691 | void |
684 | input_gssapi_errtok(int type, u_int32_t plen, void *ctxt) | 692 | input_gssapi_errtok(int type, u_int32_t plen, void *ctxt) |
685 | { | 693 | { |
@@ -709,6 +717,7 @@ input_gssapi_errtok(int type, u_int32_t plen, void *ctxt) | |||
709 | /* Server will be returning a failed packet after this one */ | 717 | /* Server will be returning a failed packet after this one */ |
710 | } | 718 | } |
711 | 719 | ||
720 | /* ARGSUSED */ | ||
712 | void | 721 | void |
713 | input_gssapi_error(int type, u_int32_t plen, void *ctxt) | 722 | input_gssapi_error(int type, u_int32_t plen, void *ctxt) |
714 | { | 723 | { |
@@ -773,9 +782,11 @@ userauth_passwd(Authctxt *authctxt) | |||
773 | 782 | ||
774 | return 1; | 783 | return 1; |
775 | } | 784 | } |
785 | |||
776 | /* | 786 | /* |
777 | * parse PASSWD_CHANGEREQ, prompt user and send SSH2_MSG_USERAUTH_REQUEST | 787 | * parse PASSWD_CHANGEREQ, prompt user and send SSH2_MSG_USERAUTH_REQUEST |
778 | */ | 788 | */ |
789 | /* ARGSUSED */ | ||
779 | void | 790 | void |
780 | input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt) | 791 | input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt) |
781 | { | 792 | { |