summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormarkus <markus@openbsd.org>1999-11-02 19:10:14 +0000
committermarkus <markus@openbsd.org>1999-11-02 19:10:14 +0000
commitbcc380c6692a18bd85906a2acd25517f4b24510f (patch)
tree993a274f0630d919af116856f77d682abe3bf575
parentsupport usermode disasm (diff)
downloadwireguard-openbsd-bcc380c6692a18bd85906a2acd25517f4b24510f.tar.xz
wireguard-openbsd-bcc380c6692a18bd85906a2acd25517f4b24510f.zip
remove unused argument. ok dugsong
-rw-r--r--usr.bin/ssh/auth-krb4.c7
-rw-r--r--usr.bin/ssh/ssh.h4
-rw-r--r--usr.bin/ssh/sshd.c4
3 files changed, 8 insertions, 7 deletions
diff --git a/usr.bin/ssh/auth-krb4.c b/usr.bin/ssh/auth-krb4.c
index 52952927ffc..569f0b4c3b3 100644
--- a/usr.bin/ssh/auth-krb4.c
+++ b/usr.bin/ssh/auth-krb4.c
@@ -6,7 +6,7 @@
Kerberos v4 authentication and ticket-passing routines.
- $Id: auth-krb4.c,v 1.4 1999/10/01 18:18:40 deraadt Exp $
+ $Id: auth-krb4.c,v 1.5 1999/11/02 19:10:14 markus Exp $
*/
#include "includes.h"
@@ -171,11 +171,12 @@ auth_kerberos_tgt_failure:
return 0;
}
-int auth_afs_token(char *server_user, uid_t uid, const char *string)
+int auth_afs_token(struct passwd *pw, const char *token_string)
{
CREDENTIALS creds;
+ uid_t uid = pw->pw_uid;
- if (!radix_to_creds(string, &creds)) {
+ if (!radix_to_creds(token_string, &creds)) {
log("Protocol error decoding AFS token");
packet_send_debug("Protocol error decoding AFS token");
packet_start(SSH_SMSG_FAILURE);
diff --git a/usr.bin/ssh/ssh.h b/usr.bin/ssh/ssh.h
index e30f74d2fc6..62b1ca3188e 100644
--- a/usr.bin/ssh/ssh.h
+++ b/usr.bin/ssh/ssh.h
@@ -13,7 +13,7 @@ Generic header file for ssh.
*/
-/* RCSID("$Id: ssh.h,v 1.15 1999/10/28 08:43:10 markus Exp $"); */
+/* RCSID("$Id: ssh.h,v 1.16 1999/11/02 19:10:15 markus Exp $"); */
#ifndef SSH_H
#define SSH_H
@@ -574,7 +574,7 @@ int ssh_tf_init(uid_t uid);
/* Accept passed Kerberos v4 ticket-granting ticket and AFS tokens. */
int auth_kerberos_tgt(struct passwd *pw, const char *string);
-int auth_afs_token(char *server_user, uid_t uid, const char *string);
+int auth_afs_token(struct passwd *pw, const char *token_string);
int creds_to_radix(CREDENTIALS *creds, unsigned char *buf);
int radix_to_creds(const char *buf, CREDENTIALS *creds);
diff --git a/usr.bin/ssh/sshd.c b/usr.bin/ssh/sshd.c
index 5f85f99d35e..78fb2a25c73 100644
--- a/usr.bin/ssh/sshd.c
+++ b/usr.bin/ssh/sshd.c
@@ -18,7 +18,7 @@ agent connections.
*/
#include "includes.h"
-RCSID("$Id: sshd.c,v 1.42 1999/11/02 00:08:42 markus Exp $");
+RCSID("$Id: sshd.c,v 1.43 1999/11/02 19:10:15 markus Exp $");
#include "xmalloc.h"
#include "rsa.h"
@@ -1128,7 +1128,7 @@ do_authentication(char *user, int privileged_port)
int dlen;
char *token_string = packet_get_string(&dlen);
packet_integrity_check(plen, 4 + dlen, type);
- if (!auth_afs_token(user, pw->pw_uid, token_string))
+ if (!auth_afs_token(pw, token_string))
debug("AFS token REFUSED for %s", user);
xfree(token_string);
continue;