diff options
author | Darren Tucker <dtucker@zip.com.au> | 2004-06-22 12:56:01 +1000 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2004-06-22 12:56:01 +1000 |
commit | 3f9fdc71219d498a996c4e4ca8330df7f598fb5d (patch) | |
tree | 902072deed2ca26a5b0b3fa5f3749783e0bd62e6 /channels.c | |
parent | b357afc0a03a4238a01acf5d9641ebda9f71d500 (diff) |
- avsm@cvs.openbsd.org 2004/06/21 17:36:31
[auth-rsa.c auth2-gss.c auth2-pubkey.c authfile.c canohost.c channels.c
cipher.c dns.c kex.c monitor.c monitor_fdpass.c monitor_wrap.c
monitor_wrap.h nchan.c packet.c progressmeter.c scp.c sftp-server.c sftp.c
ssh-gss.h ssh-keygen.c ssh.c sshconnect.c sshconnect1.c sshlogin.c
sshpty.c]
make ssh -Wshadow clean, no functional changes
markus@ ok
There are also some portable-specific -Wshadow warnings to be fixed in
monitor.c and montior_wrap.c.
Diffstat (limited to 'channels.c')
-rw-r--r-- | channels.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/channels.c b/channels.c index 68d854388..a72d9b93d 100644 --- a/channels.c +++ b/channels.c | |||
@@ -39,7 +39,7 @@ | |||
39 | */ | 39 | */ |
40 | 40 | ||
41 | #include "includes.h" | 41 | #include "includes.h" |
42 | RCSID("$OpenBSD: channels.c,v 1.206 2004/06/18 11:11:54 djm Exp $"); | 42 | RCSID("$OpenBSD: channels.c,v 1.207 2004/06/21 17:36:31 avsm Exp $"); |
43 | 43 | ||
44 | #include "ssh.h" | 44 | #include "ssh.h" |
45 | #include "ssh1.h" | 45 | #include "ssh1.h" |
@@ -2903,7 +2903,7 @@ x11_request_forwarding_with_spoofing(int client_session_id, | |||
2903 | char *new_data; | 2903 | char *new_data; |
2904 | int screen_number; | 2904 | int screen_number; |
2905 | const char *cp; | 2905 | const char *cp; |
2906 | u_int32_t rand = 0; | 2906 | u_int32_t rnd = 0; |
2907 | 2907 | ||
2908 | cp = getenv("DISPLAY"); | 2908 | cp = getenv("DISPLAY"); |
2909 | if (cp) | 2909 | if (cp) |
@@ -2928,10 +2928,10 @@ x11_request_forwarding_with_spoofing(int client_session_id, | |||
2928 | if (sscanf(data + 2 * i, "%2x", &value) != 1) | 2928 | if (sscanf(data + 2 * i, "%2x", &value) != 1) |
2929 | fatal("x11_request_forwarding: bad authentication data: %.100s", data); | 2929 | fatal("x11_request_forwarding: bad authentication data: %.100s", data); |
2930 | if (i % 4 == 0) | 2930 | if (i % 4 == 0) |
2931 | rand = arc4random(); | 2931 | rnd = arc4random(); |
2932 | x11_saved_data[i] = value; | 2932 | x11_saved_data[i] = value; |
2933 | x11_fake_data[i] = rand & 0xff; | 2933 | x11_fake_data[i] = rnd & 0xff; |
2934 | rand >>= 8; | 2934 | rnd >>= 8; |
2935 | } | 2935 | } |
2936 | x11_saved_data_len = data_len; | 2936 | x11_saved_data_len = data_len; |
2937 | x11_fake_data_len = data_len; | 2937 | x11_fake_data_len = data_len; |