diff options
author | djm@openbsd.org <djm@openbsd.org> | 2019-01-19 21:43:56 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2019-01-20 09:45:18 +1100 |
commit | 04c091fc199f17dacf8921df0a06634b454e2722 (patch) | |
tree | 76b75b5cf39f940bfc418fa7fe6e9ae3dc5c2569 /monitor.c | |
parent | ec00f918b8ad90295044266c433340a8adc93452 (diff) |
upstream: remove last references to active_state
with & ok markus@
OpenBSD-Commit-ID: 78619a50ea7e4ca2f3b54d4658b3227277490ba2
Diffstat (limited to 'monitor.c')
-rw-r--r-- | monitor.c | 8 |
1 files changed, 4 insertions, 4 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: monitor.c,v 1.191 2019/01/19 21:43:07 djm Exp $ */ | 1 | /* $OpenBSD: monitor.c,v 1.192 2019/01/19 21:43:56 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> | 3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> |
4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> | 4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> |
@@ -360,7 +360,7 @@ monitor_child_preauth(struct ssh *ssh, struct monitor *pmonitor) | |||
360 | ssh->authctxt = NULL; | 360 | ssh->authctxt = NULL; |
361 | ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user); | 361 | ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user); |
362 | 362 | ||
363 | mm_get_keystate(pmonitor); | 363 | mm_get_keystate(ssh, pmonitor); |
364 | 364 | ||
365 | /* Drain any buffered messages from the child */ | 365 | /* Drain any buffered messages from the child */ |
366 | while (pmonitor->m_log_recvfd != -1 && monitor_read_log(pmonitor) == 0) | 366 | while (pmonitor->m_log_recvfd != -1 && monitor_read_log(pmonitor) == 0) |
@@ -1195,7 +1195,7 @@ mm_answer_keyallowed(struct ssh *ssh, int sock, struct sshbuf *m) | |||
1195 | if (!key_base_type_match(auth_method, key, | 1195 | if (!key_base_type_match(auth_method, key, |
1196 | options.hostbased_key_types)) | 1196 | options.hostbased_key_types)) |
1197 | break; | 1197 | break; |
1198 | allowed = hostbased_key_allowed(authctxt->pw, | 1198 | allowed = hostbased_key_allowed(ssh, authctxt->pw, |
1199 | cuser, chost, key); | 1199 | cuser, chost, key); |
1200 | auth2_record_info(authctxt, | 1200 | auth2_record_info(authctxt, |
1201 | "client user \"%.100s\", client host \"%.100s\"", | 1201 | "client user \"%.100s\", client host \"%.100s\"", |
@@ -1699,7 +1699,7 @@ monitor_apply_keystate(struct ssh *ssh, struct monitor *pmonitor) | |||
1699 | /* This function requries careful sanity checking */ | 1699 | /* This function requries careful sanity checking */ |
1700 | 1700 | ||
1701 | void | 1701 | void |
1702 | mm_get_keystate(struct monitor *pmonitor) | 1702 | mm_get_keystate(struct ssh *ssh, struct monitor *pmonitor) |
1703 | { | 1703 | { |
1704 | debug3("%s: Waiting for new keys", __func__); | 1704 | debug3("%s: Waiting for new keys", __func__); |
1705 | 1705 | ||