summaryrefslogtreecommitdiff
path: root/monitor.c
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2019-01-19 21:43:56 +0000
committerDamien Miller <djm@mindrot.org>2019-01-20 09:45:18 +1100
commit04c091fc199f17dacf8921df0a06634b454e2722 (patch)
tree76b75b5cf39f940bfc418fa7fe6e9ae3dc5c2569 /monitor.c
parentec00f918b8ad90295044266c433340a8adc93452 (diff)
upstream: remove last references to active_state
with & ok markus@ OpenBSD-Commit-ID: 78619a50ea7e4ca2f3b54d4658b3227277490ba2
Diffstat (limited to 'monitor.c')
-rw-r--r--monitor.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/monitor.c b/monitor.c
index 387b50026..1dcf930d4 100644
--- a/monitor.c
+++ b/monitor.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: monitor.c,v 1.191 2019/01/19 21:43:07 djm Exp $ */ 1/* $OpenBSD: monitor.c,v 1.192 2019/01/19 21:43:56 djm Exp $ */
2/* 2/*
3 * Copyright 2002 Niels Provos <provos@citi.umich.edu> 3 * Copyright 2002 Niels Provos <provos@citi.umich.edu>
4 * Copyright 2002 Markus Friedl <markus@openbsd.org> 4 * Copyright 2002 Markus Friedl <markus@openbsd.org>
@@ -360,7 +360,7 @@ monitor_child_preauth(struct ssh *ssh, struct monitor *pmonitor)
360 ssh->authctxt = NULL; 360 ssh->authctxt = NULL;
361 ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user); 361 ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user);
362 362
363 mm_get_keystate(pmonitor); 363 mm_get_keystate(ssh, pmonitor);
364 364
365 /* Drain any buffered messages from the child */ 365 /* Drain any buffered messages from the child */
366 while (pmonitor->m_log_recvfd != -1 && monitor_read_log(pmonitor) == 0) 366 while (pmonitor->m_log_recvfd != -1 && monitor_read_log(pmonitor) == 0)
@@ -1195,7 +1195,7 @@ mm_answer_keyallowed(struct ssh *ssh, int sock, struct sshbuf *m)
1195 if (!key_base_type_match(auth_method, key, 1195 if (!key_base_type_match(auth_method, key,
1196 options.hostbased_key_types)) 1196 options.hostbased_key_types))
1197 break; 1197 break;
1198 allowed = hostbased_key_allowed(authctxt->pw, 1198 allowed = hostbased_key_allowed(ssh, authctxt->pw,
1199 cuser, chost, key); 1199 cuser, chost, key);
1200 auth2_record_info(authctxt, 1200 auth2_record_info(authctxt,
1201 "client user \"%.100s\", client host \"%.100s\"", 1201 "client user \"%.100s\", client host \"%.100s\"",
@@ -1699,7 +1699,7 @@ monitor_apply_keystate(struct ssh *ssh, struct monitor *pmonitor)
1699/* This function requries careful sanity checking */ 1699/* This function requries careful sanity checking */
1700 1700
1701void 1701void
1702mm_get_keystate(struct monitor *pmonitor) 1702mm_get_keystate(struct ssh *ssh, struct monitor *pmonitor)
1703{ 1703{
1704 debug3("%s: Waiting for new keys", __func__); 1704 debug3("%s: Waiting for new keys", __func__);
1705 1705