aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorMike Gabriel <mike.gabriel@das-netzwerkteam.de>2021-06-08 15:46:14 +0200
committerMike Gabriel <mike.gabriel@das-netzwerkteam.de>2021-06-08 15:46:14 +0200
commitc162a63997a3592f4d8a031cd31ee31bd1f17353 (patch)
tree41743b4bbc532fc03b5db7c64c9db50ee0591c88 /src
parent3dcfac9148de47b625e421092ab4d6f407bd623d (diff)
parenta5f1e6f66a82a3630919353a396e77845586121b (diff)
downloadlibpam-x2go-master.tar.gz
libpam-x2go-master.tar.bz2
libpam-x2go-master.zip
Merge branch 'sunweaver-pr/travis-ci'HEADmaster
Attributes GH PR #3: https://github.com/ArcticaProject/libpam-x2go/pull/3
Diffstat (limited to 'src')
-rw-r--r--src/pam-x2go.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/pam-x2go.c b/src/pam-x2go.c
index f9ae42b..ab627ac 100644
--- a/src/pam-x2go.c
+++ b/src/pam-x2go.c
@@ -225,7 +225,7 @@ get_item (pam_handle_t * pamh, int type)
/* Authenticate. We need to make sure we have a user account, that
there are remote accounts and then verify them with X2Go */
PAM_EXTERN int
-pam_sm_authenticate (pam_handle_t *pamh, int flags, int argc, const char **argv)
+pam_sm_authenticate (pam_handle_t *pamh, int __attribute__((unused)) flags, int __attribute__((unused)) argc, const char __attribute__((unused)) **argv)
{
char * username = NULL;
char * password = NULL;
@@ -290,7 +290,7 @@ pid_t session_pid = 0;
give the credentials to the session itself so that it can startup the
PyHoca (X2Go) client for the login */
PAM_EXTERN int
-pam_sm_open_session (pam_handle_t *pamh, int flags, int argc, const char ** argv)
+pam_sm_open_session (pam_handle_t *pamh, int __attribute__((unused)) flags, int __attribute__((unused)) argc, const char __attribute__((unused)) **argv)
{
char * username = NULL;
char * password = NULL;
@@ -357,7 +357,7 @@ done:
/* Close Session. Make sure our little guy has died so he doesn't become
a zombie and eat things. */
PAM_EXTERN int
-pam_sm_close_session (pam_handle_t *pamh, int flags, int argc, const char **argv)
+pam_sm_close_session (pam_handle_t *pamh, int __attribute__((unused)) flags, int __attribute__((unused)) argc, const char __attribute__((unused)) **argv)
{
if (session_pid == 0) {
return PAM_IGNORE;
@@ -437,7 +437,7 @@ unpriveleged_kill (struct passwd * pwdent)
/* LightDM likes to have this function around, but we don't need it as we
don't have a token hanging around. */
PAM_EXTERN int
-pam_sm_setcred (pam_handle_t *pamh, int flags, int argc, const char ** argv)
+pam_sm_setcred (pam_handle_t __attribute__((unused)) *pamh, int __attribute__((unused)) flags, int __attribute__((unused)) argc, const char __attribute__((unused)) **argv)
{
return PAM_SUCCESS;
}