Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 22 Mar 2010 10:58:16 +0000 (UTC)
From:      Dag-Erling Smorgrav <des@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-vendor@freebsd.org
Subject:   svn commit: r205440 - vendor/openpam/dist/include/security
Message-ID:  <201003221058.o2MAwGba000436@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: des
Date: Mon Mar 22 10:58:16 2010
New Revision: 205440
URL: http://svn.freebsd.org/changeset/base/205440

Log:
  Merge upstream r432:
  
  pam_end() already contains a NULL check, and it is not unreasonable to
  call it with a NULL pamh in a cleanup / error-handling situation.  Remove
  OPENPAM_NONNULL, which may cause gcc to optimize away the NULL check.

Modified:
  vendor/openpam/dist/include/security/pam_appl.h

Modified: vendor/openpam/dist/include/security/pam_appl.h
==============================================================================
--- vendor/openpam/dist/include/security/pam_appl.h	Mon Mar 22 10:11:59 2010	(r205439)
+++ vendor/openpam/dist/include/security/pam_appl.h	Mon Mar 22 10:58:16 2010	(r205440)
@@ -72,8 +72,7 @@ pam_close_session(pam_handle_t *_pamh,
 
 int
 pam_end(pam_handle_t *_pamh,
-	int _status)
-	OPENPAM_NONNULL((1));
+	int _status);
 
 int
 pam_get_data(const pam_handle_t *_pamh,



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201003221058.o2MAwGba000436>