diff options
author | Alexis La Goutte <alexis.lagoutte@gmail.com> | 2022-01-17 13:18:02 +0000 |
---|---|---|
committer | A Wireshark GitLab Utility <gerald+gitlab-utility@wireshark.org> | 2022-01-30 09:35:11 +0000 |
commit | 226193a18f3409c923dabf021cc5fc7abffda4d0 (patch) | |
tree | 0f0a0acb0e2ff19b9ad2a3865ad43eab44994223 | |
parent | 8cc8a0544b629044570393d67851e2bcf57859d8 (diff) |
ssh: fix unused-parameter
Remove tvb and offset from ssh_keylog_hash_write_secret
not longer need after 54cd727edf
packet-ssh.c:1879:40: error: unused parameter ‘tvb’ [-Werror=unused-parameter]
packet-ssh.c:1879:49: error: unused parameter ‘offset’ [-Werror=unused-parameter]
-rw-r--r-- | epan/dissectors/packet-ssh.c | 10 |
1 files changed, 4 insertions, 6 deletions
diff --git a/epan/dissectors/packet-ssh.c b/epan/dissectors/packet-ssh.c index 37ed43beb0..17f6c5ceb2 100644 --- a/epan/dissectors/packet-ssh.c +++ b/epan/dissectors/packet-ssh.c @@ -508,8 +508,7 @@ static gboolean ssh_read_e(tvbuff_t *tvb, int offset, struct ssh_flow_data *global_data); static gboolean ssh_read_f(tvbuff_t *tvb, int offset, struct ssh_flow_data *global_data); -static void ssh_keylog_hash_write_secret(tvbuff_t *tvb, int offset, - struct ssh_flow_data *global_data); +static void ssh_keylog_hash_write_secret(struct ssh_flow_data *global_data); static ssh_bignum *ssh_kex_shared_secret(gint kex_type, ssh_bignum *pub, ssh_bignum *priv); static void ssh_hash_buffer_put_string(wmem_array_t *buffer, const gchar *string, guint len); @@ -1188,7 +1187,7 @@ static int ssh_dissect_kex_dh(guint8 msg_code, tvbuff_t *tvb, proto_tree_add_expert_format(tree, pinfo, &ei_ssh_invalid_keylen, tvb, offset, 2, "Invalid key length: %u", tvb_get_ntohl(tvb, offset)); } - ssh_keylog_hash_write_secret(tvb, offset, global_data); + ssh_keylog_hash_write_secret(global_data); #endif offset += ssh_tree_add_mpint(tvb, offset, tree, hf_ssh_dh_f); @@ -1286,7 +1285,7 @@ ssh_dissect_kex_ecdh(guint8 msg_code, tvbuff_t *tvb, "Invalid key length: %u", tvb_get_ntohl(tvb, offset)); } - ssh_keylog_hash_write_secret(tvb, offset, global_data); + ssh_keylog_hash_write_secret(global_data); if(global_data->peer_data[SERVER_PEER_DATA].seq_num_ecdh_rep == 0){ global_data->peer_data[SERVER_PEER_DATA].seq_num_ecdh_rep = global_data->peer_data[SERVER_PEER_DATA].sequence_number; global_data->peer_data[SERVER_PEER_DATA].sequence_number++; @@ -1930,8 +1929,7 @@ ssh_read_f(tvbuff_t *tvb, int offset, struct ssh_flow_data *global_data) } static void -ssh_keylog_hash_write_secret(tvbuff_t *tvb, int offset, - struct ssh_flow_data *global_data) +ssh_keylog_hash_write_secret(struct ssh_flow_data *global_data) { /* * This computation is defined differently for each key exchange method: |