diff options
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | channels.c | 18 |
2 files changed, 21 insertions, 2 deletions
@@ -70,6 +70,9 @@ | |||
70 | Make PermitOpen take a list of permitted ports and act more like most | 70 | Make PermitOpen take a list of permitted ports and act more like most |
71 | other keywords (ie the first match is the effective setting). This | 71 | other keywords (ie the first match is the effective setting). This |
72 | also makes it easier to override a previously set PermitOpen. ok djm@ | 72 | also makes it easier to override a previously set PermitOpen. ok djm@ |
73 | - stevesk@cvs.openbsd.org 2006/07/21 21:13:30 | ||
74 | [channels.c] | ||
75 | more ARGSUSED (lint) for dispatch table-driven functions; ok djm@ | ||
73 | 76 | ||
74 | 20060713 | 77 | 20060713 |
75 | - (dtucker) [auth-krb5.c auth-pam.c] Still more errno.h | 78 | - (dtucker) [auth-krb5.c auth-pam.c] Still more errno.h |
@@ -4988,4 +4991,4 @@ | |||
4988 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM | 4991 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM |
4989 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu | 4992 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu |
4990 | 4993 | ||
4991 | $Id: ChangeLog,v 1.4424 2006/07/24 04:08:13 djm Exp $ | 4994 | $Id: ChangeLog,v 1.4425 2006/07/24 04:08:32 djm Exp $ |
diff --git a/channels.c b/channels.c index c6c5c8899..e44a2ab4f 100644 --- a/channels.c +++ b/channels.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: channels.c,v 1.258 2006/07/21 12:43:36 dtucker Exp $ */ | 1 | /* $OpenBSD: channels.c,v 1.259 2006/07/21 21:13:30 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -736,12 +736,14 @@ typedef void chan_fn(Channel *c, fd_set *readset, fd_set *writeset); | |||
736 | chan_fn *channel_pre[SSH_CHANNEL_MAX_TYPE]; | 736 | chan_fn *channel_pre[SSH_CHANNEL_MAX_TYPE]; |
737 | chan_fn *channel_post[SSH_CHANNEL_MAX_TYPE]; | 737 | chan_fn *channel_post[SSH_CHANNEL_MAX_TYPE]; |
738 | 738 | ||
739 | /* ARGSUSED */ | ||
739 | static void | 740 | static void |
740 | channel_pre_listener(Channel *c, fd_set *readset, fd_set *writeset) | 741 | channel_pre_listener(Channel *c, fd_set *readset, fd_set *writeset) |
741 | { | 742 | { |
742 | FD_SET(c->sock, readset); | 743 | FD_SET(c->sock, readset); |
743 | } | 744 | } |
744 | 745 | ||
746 | /* ARGSUSED */ | ||
745 | static void | 747 | static void |
746 | channel_pre_connecting(Channel *c, fd_set *readset, fd_set *writeset) | 748 | channel_pre_connecting(Channel *c, fd_set *readset, fd_set *writeset) |
747 | { | 749 | { |
@@ -796,6 +798,7 @@ channel_pre_open(Channel *c, fd_set *readset, fd_set *writeset) | |||
796 | FD_SET(c->ctl_fd, readset); | 798 | FD_SET(c->ctl_fd, readset); |
797 | } | 799 | } |
798 | 800 | ||
801 | /* ARGSUSED */ | ||
799 | static void | 802 | static void |
800 | channel_pre_input_draining(Channel *c, fd_set *readset, fd_set *writeset) | 803 | channel_pre_input_draining(Channel *c, fd_set *readset, fd_set *writeset) |
801 | { | 804 | { |
@@ -808,6 +811,7 @@ channel_pre_input_draining(Channel *c, fd_set *readset, fd_set *writeset) | |||
808 | } | 811 | } |
809 | } | 812 | } |
810 | 813 | ||
814 | /* ARGSUSED */ | ||
811 | static void | 815 | static void |
812 | channel_pre_output_draining(Channel *c, fd_set *readset, fd_set *writeset) | 816 | channel_pre_output_draining(Channel *c, fd_set *readset, fd_set *writeset) |
813 | { | 817 | { |
@@ -937,6 +941,7 @@ channel_pre_x11_open(Channel *c, fd_set *readset, fd_set *writeset) | |||
937 | } | 941 | } |
938 | 942 | ||
939 | /* try to decode a socks4 header */ | 943 | /* try to decode a socks4 header */ |
944 | /* ARGSUSED */ | ||
940 | static int | 945 | static int |
941 | channel_decode_socks4(Channel *c, fd_set *readset, fd_set *writeset) | 946 | channel_decode_socks4(Channel *c, fd_set *readset, fd_set *writeset) |
942 | { | 947 | { |
@@ -1015,6 +1020,7 @@ channel_decode_socks4(Channel *c, fd_set *readset, fd_set *writeset) | |||
1015 | #define SSH_SOCKS5_CONNECT 0x01 | 1020 | #define SSH_SOCKS5_CONNECT 0x01 |
1016 | #define SSH_SOCKS5_SUCCESS 0x00 | 1021 | #define SSH_SOCKS5_SUCCESS 0x00 |
1017 | 1022 | ||
1023 | /* ARGSUSED */ | ||
1018 | static int | 1024 | static int |
1019 | channel_decode_socks5(Channel *c, fd_set *readset, fd_set *writeset) | 1025 | channel_decode_socks5(Channel *c, fd_set *readset, fd_set *writeset) |
1020 | { | 1026 | { |
@@ -1165,6 +1171,7 @@ channel_pre_dynamic(Channel *c, fd_set *readset, fd_set *writeset) | |||
1165 | } | 1171 | } |
1166 | 1172 | ||
1167 | /* This is our fake X11 server socket. */ | 1173 | /* This is our fake X11 server socket. */ |
1174 | /* ARGSUSED */ | ||
1168 | static void | 1175 | static void |
1169 | channel_post_x11_listener(Channel *c, fd_set *readset, fd_set *writeset) | 1176 | channel_post_x11_listener(Channel *c, fd_set *readset, fd_set *writeset) |
1170 | { | 1177 | { |
@@ -1290,6 +1297,7 @@ channel_set_reuseaddr(int fd) | |||
1290 | /* | 1297 | /* |
1291 | * This socket is listening for connections to a forwarded TCP/IP port. | 1298 | * This socket is listening for connections to a forwarded TCP/IP port. |
1292 | */ | 1299 | */ |
1300 | /* ARGSUSED */ | ||
1293 | static void | 1301 | static void |
1294 | channel_post_port_listener(Channel *c, fd_set *readset, fd_set *writeset) | 1302 | channel_post_port_listener(Channel *c, fd_set *readset, fd_set *writeset) |
1295 | { | 1303 | { |
@@ -1347,6 +1355,7 @@ channel_post_port_listener(Channel *c, fd_set *readset, fd_set *writeset) | |||
1347 | * This is the authentication agent socket listening for connections from | 1355 | * This is the authentication agent socket listening for connections from |
1348 | * clients. | 1356 | * clients. |
1349 | */ | 1357 | */ |
1358 | /* ARGSUSED */ | ||
1350 | static void | 1359 | static void |
1351 | channel_post_auth_listener(Channel *c, fd_set *readset, fd_set *writeset) | 1360 | channel_post_auth_listener(Channel *c, fd_set *readset, fd_set *writeset) |
1352 | { | 1361 | { |
@@ -1380,6 +1389,7 @@ channel_post_auth_listener(Channel *c, fd_set *readset, fd_set *writeset) | |||
1380 | } | 1389 | } |
1381 | } | 1390 | } |
1382 | 1391 | ||
1392 | /* ARGSUSED */ | ||
1383 | static void | 1393 | static void |
1384 | channel_post_connecting(Channel *c, fd_set *readset, fd_set *writeset) | 1394 | channel_post_connecting(Channel *c, fd_set *readset, fd_set *writeset) |
1385 | { | 1395 | { |
@@ -1426,6 +1436,7 @@ channel_post_connecting(Channel *c, fd_set *readset, fd_set *writeset) | |||
1426 | } | 1436 | } |
1427 | } | 1437 | } |
1428 | 1438 | ||
1439 | /* ARGSUSED */ | ||
1429 | static int | 1440 | static int |
1430 | channel_handle_rfd(Channel *c, fd_set *readset, fd_set *writeset) | 1441 | channel_handle_rfd(Channel *c, fd_set *readset, fd_set *writeset) |
1431 | { | 1442 | { |
@@ -1473,6 +1484,7 @@ channel_handle_rfd(Channel *c, fd_set *readset, fd_set *writeset) | |||
1473 | return 1; | 1484 | return 1; |
1474 | } | 1485 | } |
1475 | 1486 | ||
1487 | /* ARGSUSED */ | ||
1476 | static int | 1488 | static int |
1477 | channel_handle_wfd(Channel *c, fd_set *readset, fd_set *writeset) | 1489 | channel_handle_wfd(Channel *c, fd_set *readset, fd_set *writeset) |
1478 | { | 1490 | { |
@@ -1605,6 +1617,7 @@ channel_handle_efd(Channel *c, fd_set *readset, fd_set *writeset) | |||
1605 | return 1; | 1617 | return 1; |
1606 | } | 1618 | } |
1607 | 1619 | ||
1620 | /* ARGSUSED */ | ||
1608 | static int | 1621 | static int |
1609 | channel_handle_ctl(Channel *c, fd_set *readset, fd_set *writeset) | 1622 | channel_handle_ctl(Channel *c, fd_set *readset, fd_set *writeset) |
1610 | { | 1623 | { |
@@ -1667,6 +1680,7 @@ channel_post_open(Channel *c, fd_set *readset, fd_set *writeset) | |||
1667 | channel_check_window(c); | 1680 | channel_check_window(c); |
1668 | } | 1681 | } |
1669 | 1682 | ||
1683 | /* ARGSUSED */ | ||
1670 | static void | 1684 | static void |
1671 | channel_post_output_drain_13(Channel *c, fd_set *readset, fd_set *writeset) | 1685 | channel_post_output_drain_13(Channel *c, fd_set *readset, fd_set *writeset) |
1672 | { | 1686 | { |
@@ -3054,6 +3068,7 @@ x11_connect_display(void) | |||
3054 | * with either SSH_MSG_OPEN_CONFIRMATION or SSH_MSG_OPEN_FAILURE. | 3068 | * with either SSH_MSG_OPEN_CONFIRMATION or SSH_MSG_OPEN_FAILURE. |
3055 | */ | 3069 | */ |
3056 | 3070 | ||
3071 | /* ARGSUSED */ | ||
3057 | void | 3072 | void |
3058 | x11_input_open(int type, u_int32_t seq, void *ctxt) | 3073 | x11_input_open(int type, u_int32_t seq, void *ctxt) |
3059 | { | 3074 | { |
@@ -3097,6 +3112,7 @@ x11_input_open(int type, u_int32_t seq, void *ctxt) | |||
3097 | } | 3112 | } |
3098 | 3113 | ||
3099 | /* dummy protocol handler that denies SSH-1 requests (agent/x11) */ | 3114 | /* dummy protocol handler that denies SSH-1 requests (agent/x11) */ |
3115 | /* ARGSUSED */ | ||
3100 | void | 3116 | void |
3101 | deny_input_open(int type, u_int32_t seq, void *ctxt) | 3117 | deny_input_open(int type, u_int32_t seq, void *ctxt) |
3102 | { | 3118 | { |