diff options
author | Mike Gabriel <mike.gabriel@das-netzwerkteam.de> | 2021-06-08 15:46:14 +0200 |
---|---|---|
committer | Mike Gabriel <mike.gabriel@das-netzwerkteam.de> | 2021-06-08 15:46:14 +0200 |
commit | c162a63997a3592f4d8a031cd31ee31bd1f17353 (patch) | |
tree | 41743b4bbc532fc03b5db7c64c9db50ee0591c88 /src | |
parent | 3dcfac9148de47b625e421092ab4d6f407bd623d (diff) | |
parent | a5f1e6f66a82a3630919353a396e77845586121b (diff) | |
download | libpam-x2go-master.tar.gz libpam-x2go-master.tar.bz2 libpam-x2go-master.zip |
Attributes GH PR #3: https://github.com/ArcticaProject/libpam-x2go/pull/3
Diffstat (limited to 'src')
-rw-r--r-- | src/pam-x2go.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/pam-x2go.c b/src/pam-x2go.c index f9ae42b..ab627ac 100644 --- a/src/pam-x2go.c +++ b/src/pam-x2go.c @@ -225,7 +225,7 @@ get_item (pam_handle_t * pamh, int type) /* Authenticate. We need to make sure we have a user account, that there are remote accounts and then verify them with X2Go */ PAM_EXTERN int -pam_sm_authenticate (pam_handle_t *pamh, int flags, int argc, const char **argv) +pam_sm_authenticate (pam_handle_t *pamh, int __attribute__((unused)) flags, int __attribute__((unused)) argc, const char __attribute__((unused)) **argv) { char * username = NULL; char * password = NULL; @@ -290,7 +290,7 @@ pid_t session_pid = 0; give the credentials to the session itself so that it can startup the PyHoca (X2Go) client for the login */ PAM_EXTERN int -pam_sm_open_session (pam_handle_t *pamh, int flags, int argc, const char ** argv) +pam_sm_open_session (pam_handle_t *pamh, int __attribute__((unused)) flags, int __attribute__((unused)) argc, const char __attribute__((unused)) **argv) { char * username = NULL; char * password = NULL; @@ -357,7 +357,7 @@ done: /* Close Session. Make sure our little guy has died so he doesn't become a zombie and eat things. */ PAM_EXTERN int -pam_sm_close_session (pam_handle_t *pamh, int flags, int argc, const char **argv) +pam_sm_close_session (pam_handle_t *pamh, int __attribute__((unused)) flags, int __attribute__((unused)) argc, const char __attribute__((unused)) **argv) { if (session_pid == 0) { return PAM_IGNORE; @@ -437,7 +437,7 @@ unpriveleged_kill (struct passwd * pwdent) /* LightDM likes to have this function around, but we don't need it as we don't have a token hanging around. */ PAM_EXTERN int -pam_sm_setcred (pam_handle_t *pamh, int flags, int argc, const char ** argv) +pam_sm_setcred (pam_handle_t __attribute__((unused)) *pamh, int __attribute__((unused)) flags, int __attribute__((unused)) argc, const char __attribute__((unused)) **argv) { return PAM_SUCCESS; } |