summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2008-11-03 19:26:18 +1100
committerDamien Miller <djm@mindrot.org>2008-11-03 19:26:18 +1100
commitf7475d7e97900323195b918942d0cf8d0489279f (patch)
treef41d3597f25d30794dcc0d4470efe4b073874de6
parent2b20a92b7b404abe44d141461196a1d862214e06 (diff)
- djm@cvs.openbsd.org 2008/11/01 04:50:08
[sshconnect2.c] sprinkle ARGSUSED on dispatch handlers nuke stale unusued prototype
-rw-r--r--ChangeLog6
-rw-r--r--sshconnect2.c15
2 files changed, 18 insertions, 3 deletions
diff --git a/ChangeLog b/ChangeLog
index f52d1b5f5..0063b10e1 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -82,6 +82,10 @@
82 - stevesk@cvs.openbsd.org 2008/10/31 15:05:34 82 - stevesk@cvs.openbsd.org 2008/10/31 15:05:34
83 [dispatch.c] 83 [dispatch.c]
84 remove unused #define DISPATCH_MIN; ok markus@ 84 remove unused #define DISPATCH_MIN; ok markus@
85 - djm@cvs.openbsd.org 2008/11/01 04:50:08
86 [sshconnect2.c]
87 sprinkle ARGSUSED on dispatch handlers
88 nuke stale unusued prototype
85 89
8620080906 9020080906
87 - (dtucker) [config.guess config.sub] Update to latest versions from 91 - (dtucker) [config.guess config.sub] Update to latest versions from
@@ -4816,4 +4820,4 @@
4816 OpenServer 6 and add osr5bigcrypt support so when someone migrates 4820 OpenServer 6 and add osr5bigcrypt support so when someone migrates
4817 passwords between UnixWare and OpenServer they will still work. OK dtucker@ 4821 passwords between UnixWare and OpenServer they will still work. OK dtucker@
4818 4822
4819$Id: ChangeLog,v 1.5118 2008/11/03 08:26:00 djm Exp $ 4823$Id: ChangeLog,v 1.5119 2008/11/03 08:26:18 djm Exp $
diff --git a/sshconnect2.c b/sshconnect2.c
index fe9285f17..7d0c5e825 100644
--- a/sshconnect2.c
+++ b/sshconnect2.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: sshconnect2.c,v 1.168 2008/10/03 23:56:28 deraadt Exp $ */ 1/* $OpenBSD: sshconnect2.c,v 1.169 2008/11/01 04:50:08 djm Exp $ */
2/* 2/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved. 3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 * 4 *
@@ -218,7 +218,6 @@ int userauth_pubkey(Authctxt *);
218int userauth_passwd(Authctxt *); 218int userauth_passwd(Authctxt *);
219int userauth_kbdint(Authctxt *); 219int userauth_kbdint(Authctxt *);
220int userauth_hostbased(Authctxt *); 220int userauth_hostbased(Authctxt *);
221int userauth_kerberos(Authctxt *);
222 221
223#ifdef GSSAPI 222#ifdef GSSAPI
224int userauth_gssapi(Authctxt *authctxt); 223int userauth_gssapi(Authctxt *authctxt);
@@ -367,6 +366,7 @@ userauth(Authctxt *authctxt, char *authlist)
367 } 366 }
368} 367}
369 368
369/* ARGSUSED */
370void 370void
371input_userauth_error(int type, u_int32_t seq, void *ctxt) 371input_userauth_error(int type, u_int32_t seq, void *ctxt)
372{ 372{
@@ -374,6 +374,7 @@ input_userauth_error(int type, u_int32_t seq, void *ctxt)
374 "type %d", type); 374 "type %d", type);
375} 375}
376 376
377/* ARGSUSED */
377void 378void
378input_userauth_banner(int type, u_int32_t seq, void *ctxt) 379input_userauth_banner(int type, u_int32_t seq, void *ctxt)
379{ 380{
@@ -395,6 +396,7 @@ input_userauth_banner(int type, u_int32_t seq, void *ctxt)
395 xfree(lang); 396 xfree(lang);
396} 397}
397 398
399/* ARGSUSED */
398void 400void
399input_userauth_success(int type, u_int32_t seq, void *ctxt) 401input_userauth_success(int type, u_int32_t seq, void *ctxt)
400{ 402{
@@ -412,6 +414,7 @@ input_userauth_success(int type, u_int32_t seq, void *ctxt)
412 authctxt->success = 1; /* break out */ 414 authctxt->success = 1; /* break out */
413} 415}
414 416
417/* ARGSUSED */
415void 418void
416input_userauth_failure(int type, u_int32_t seq, void *ctxt) 419input_userauth_failure(int type, u_int32_t seq, void *ctxt)
417{ 420{
@@ -432,6 +435,8 @@ input_userauth_failure(int type, u_int32_t seq, void *ctxt)
432 435
433 userauth(authctxt, authlist); 436 userauth(authctxt, authlist);
434} 437}
438
439/* ARGSUSED */
435void 440void
436input_userauth_pk_ok(int type, u_int32_t seq, void *ctxt) 441input_userauth_pk_ok(int type, u_int32_t seq, void *ctxt)
437{ 442{
@@ -614,6 +619,7 @@ process_gssapi_token(void *ctxt, gss_buffer_t recv_tok)
614 return status; 619 return status;
615} 620}
616 621
622/* ARGSUSED */
617void 623void
618input_gssapi_response(int type, u_int32_t plen, void *ctxt) 624input_gssapi_response(int type, u_int32_t plen, void *ctxt)
619{ 625{
@@ -653,6 +659,7 @@ input_gssapi_response(int type, u_int32_t plen, void *ctxt)
653 } 659 }
654} 660}
655 661
662/* ARGSUSED */
656void 663void
657input_gssapi_token(int type, u_int32_t plen, void *ctxt) 664input_gssapi_token(int type, u_int32_t plen, void *ctxt)
658{ 665{
@@ -680,6 +687,7 @@ input_gssapi_token(int type, u_int32_t plen, void *ctxt)
680 } 687 }
681} 688}
682 689
690/* ARGSUSED */
683void 691void
684input_gssapi_errtok(int type, u_int32_t plen, void *ctxt) 692input_gssapi_errtok(int type, u_int32_t plen, void *ctxt)
685{ 693{
@@ -709,6 +717,7 @@ input_gssapi_errtok(int type, u_int32_t plen, void *ctxt)
709 /* Server will be returning a failed packet after this one */ 717 /* Server will be returning a failed packet after this one */
710} 718}
711 719
720/* ARGSUSED */
712void 721void
713input_gssapi_error(int type, u_int32_t plen, void *ctxt) 722input_gssapi_error(int type, u_int32_t plen, void *ctxt)
714{ 723{
@@ -773,9 +782,11 @@ userauth_passwd(Authctxt *authctxt)
773 782
774 return 1; 783 return 1;
775} 784}
785
776/* 786/*
777 * parse PASSWD_CHANGEREQ, prompt user and send SSH2_MSG_USERAUTH_REQUEST 787 * parse PASSWD_CHANGEREQ, prompt user and send SSH2_MSG_USERAUTH_REQUEST
778 */ 788 */
789/* ARGSUSED */
779void 790void
780input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt) 791input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt)
781{ 792{