summaryrefslogtreecommitdiff
path: root/auth2-gss.c
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2004-06-22 12:56:01 +1000
committerDarren Tucker <dtucker@zip.com.au>2004-06-22 12:56:01 +1000
commit3f9fdc71219d498a996c4e4ca8330df7f598fb5d (patch)
tree902072deed2ca26a5b0b3fa5f3749783e0bd62e6 /auth2-gss.c
parentb357afc0a03a4238a01acf5d9641ebda9f71d500 (diff)
- avsm@cvs.openbsd.org 2004/06/21 17:36:31
[auth-rsa.c auth2-gss.c auth2-pubkey.c authfile.c canohost.c channels.c cipher.c dns.c kex.c monitor.c monitor_fdpass.c monitor_wrap.c monitor_wrap.h nchan.c packet.c progressmeter.c scp.c sftp-server.c sftp.c ssh-gss.h ssh-keygen.c ssh.c sshconnect.c sshconnect1.c sshlogin.c sshpty.c] make ssh -Wshadow clean, no functional changes markus@ ok There are also some portable-specific -Wshadow warnings to be fixed in monitor.c and montior_wrap.c.
Diffstat (limited to 'auth2-gss.c')
-rw-r--r--auth2-gss.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/auth2-gss.c b/auth2-gss.c
index 9249988d3..3289ba18e 100644
--- a/auth2-gss.c
+++ b/auth2-gss.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth2-gss.c,v 1.7 2003/11/21 11:57:03 djm Exp $ */ 1/* $OpenBSD: auth2-gss.c,v 1.8 2004/06/21 17:36:31 avsm Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 2001-2003 Simon Wilkinson. All rights reserved. 4 * Copyright (c) 2001-2003 Simon Wilkinson. All rights reserved.
@@ -54,7 +54,7 @@ static void input_gssapi_errtok(int, u_int32_t, void *);
54static int 54static int
55userauth_gssapi(Authctxt *authctxt) 55userauth_gssapi(Authctxt *authctxt)
56{ 56{
57 gss_OID_desc oid = {0, NULL}; 57 gss_OID_desc goid = {0, NULL};
58 Gssctxt *ctxt = NULL; 58 Gssctxt *ctxt = NULL;
59 int mechs; 59 int mechs;
60 gss_OID_set supported; 60 gss_OID_set supported;
@@ -85,9 +85,9 @@ userauth_gssapi(Authctxt *authctxt)
85 if (len > 2 && 85 if (len > 2 &&
86 doid[0] == SSH_GSS_OIDTYPE && 86 doid[0] == SSH_GSS_OIDTYPE &&
87 doid[1] == len - 2) { 87 doid[1] == len - 2) {
88 oid.elements = doid + 2; 88 goid.elements = doid + 2;
89 oid.length = len - 2; 89 goid.length = len - 2;
90 gss_test_oid_set_member(&ms, &oid, supported, 90 gss_test_oid_set_member(&ms, &goid, supported,
91 &present); 91 &present);
92 } else { 92 } else {
93 logit("Badly formed OID received"); 93 logit("Badly formed OID received");
@@ -101,7 +101,7 @@ userauth_gssapi(Authctxt *authctxt)
101 return (0); 101 return (0);
102 } 102 }
103 103
104 if (GSS_ERROR(PRIVSEP(ssh_gssapi_server_ctx(&ctxt, &oid)))) { 104 if (GSS_ERROR(PRIVSEP(ssh_gssapi_server_ctx(&ctxt, &goid)))) {
105 xfree(doid); 105 xfree(doid);
106 return (0); 106 return (0);
107 } 107 }