- (djm) Avoid warning in PAM code by making read_passphrase arguments const
This commit is contained in:
parent
a64b57a157
commit
92e78f8c64
|
@ -6,6 +6,7 @@
|
||||||
- (djm) Avoid a warning in bsd-bindresvport.c
|
- (djm) Avoid a warning in bsd-bindresvport.c
|
||||||
- (djm) Try to avoid adding -I/usr/include to CPPFLAGS during SSL tests. This
|
- (djm) Try to avoid adding -I/usr/include to CPPFLAGS during SSL tests. This
|
||||||
can cause weird segfaults errors on Solaris
|
can cause weird segfaults errors on Solaris
|
||||||
|
- (djm) Avoid warning in PAM code by making read_passphrase arguments const
|
||||||
|
|
||||||
20010115
|
20010115
|
||||||
- (bal) sftp-server.c change to use chmod() if fchmod() does not exist.
|
- (bal) sftp-server.c change to use chmod() if fchmod() does not exist.
|
||||||
|
|
4
cli.c
4
cli.c
|
@ -129,7 +129,7 @@ cli_read(char* buf, int size, int echo)
|
||||||
}
|
}
|
||||||
|
|
||||||
static int
|
static int
|
||||||
cli_write(char* buf, int size)
|
cli_write(const char* buf, int size)
|
||||||
{
|
{
|
||||||
int i, len, pos, ret = 0;
|
int i, len, pos, ret = 0;
|
||||||
char *output, *p;
|
char *output, *p;
|
||||||
|
@ -161,7 +161,7 @@ cli_write(char* buf, int size)
|
||||||
* buffer is storing the response.
|
* buffer is storing the response.
|
||||||
*/
|
*/
|
||||||
char*
|
char*
|
||||||
cli_read_passphrase(char* prompt, int from_stdin, int echo_enable)
|
cli_read_passphrase(const char* prompt, int from_stdin, int echo_enable)
|
||||||
{
|
{
|
||||||
char buf[BUFSIZ];
|
char buf[BUFSIZ];
|
||||||
char* p;
|
char* p;
|
||||||
|
|
3
cli.h
3
cli.h
|
@ -9,7 +9,8 @@
|
||||||
* of response depending on arg. Tries to ensure that no other userland
|
* of response depending on arg. Tries to ensure that no other userland
|
||||||
* buffer is storing the response.
|
* buffer is storing the response.
|
||||||
*/
|
*/
|
||||||
char* cli_read_passphrase(char* prompt, int from_stdin, int echo_enable);
|
char* cli_read_passphrase(const char* prompt, int from_stdin,
|
||||||
|
int echo_enable);
|
||||||
char* cli_prompt(char* prompt, int echo_enable);
|
char* cli_prompt(char* prompt, int echo_enable);
|
||||||
void cli_mesg(char* mesg);
|
void cli_mesg(char* mesg);
|
||||||
|
|
||||||
|
|
|
@ -49,7 +49,7 @@ RCSID("$OpenBSD: readpass.c,v 1.12 2000/10/11 20:14:39 markus Exp $");
|
||||||
* compatibility with existing code.
|
* compatibility with existing code.
|
||||||
*/
|
*/
|
||||||
char *
|
char *
|
||||||
read_passphrase(char *prompt, int from_stdin)
|
read_passphrase(const char *prompt, int from_stdin)
|
||||||
{
|
{
|
||||||
return cli_read_passphrase(prompt, from_stdin, 0);
|
return cli_read_passphrase(prompt, from_stdin, 0);
|
||||||
}
|
}
|
||||||
|
|
2
ssh.h
2
ssh.h
|
@ -418,7 +418,7 @@ int auth_rsa_challenge_dialog(RSA *pk);
|
||||||
* passphrase (allocated with xmalloc). Exits if EOF is encountered. If
|
* passphrase (allocated with xmalloc). Exits if EOF is encountered. If
|
||||||
* from_stdin is true, the passphrase will be read from stdin instead.
|
* from_stdin is true, the passphrase will be read from stdin instead.
|
||||||
*/
|
*/
|
||||||
char *read_passphrase(char *prompt, int from_stdin);
|
char *read_passphrase(const char *prompt, int from_stdin);
|
||||||
|
|
||||||
|
|
||||||
/*------------ Definitions for logging. -----------------------*/
|
/*------------ Definitions for logging. -----------------------*/
|
||||||
|
|
Loading…
Reference in New Issue