diff options
author | rbuj <[email protected]> | 2020-12-21 09:03:14 +0100 |
---|---|---|
committer | raveit65 <[email protected]> | 2021-01-07 18:16:31 +0100 |
commit | 01bdaecbc1fcaabdcd30d00ea0001464e631f690 (patch) | |
tree | 97582c73d91184a1ebe61d30af1dfc1b38cc0120 /src/mate-screensaver-dialog.c | |
parent | 47b82dac66ee49d7b97827a28b3966503c8898bc (diff) | |
download | mate-screensaver-01bdaecbc1fcaabdcd30d00ea0001464e631f690.tar.bz2 mate-screensaver-01bdaecbc1fcaabdcd30d00ea0001464e631f690.tar.xz |
Remove warning -Wshadow
Diffstat (limited to 'src/mate-screensaver-dialog.c')
-rw-r--r-- | src/mate-screensaver-dialog.c | 10 |
1 files changed, 6 insertions, 4 deletions
diff --git a/src/mate-screensaver-dialog.c b/src/mate-screensaver-dialog.c index 06ea62a..03ca5bf 100644 --- a/src/mate-screensaver-dialog.c +++ b/src/mate-screensaver-dialog.c @@ -429,7 +429,8 @@ static gboolean popup_dialog_idle(gpointer data) If the executable is setuid root, then these initializations are run as root, before discarding privileges. */ -static gboolean privileged_initialization(int* argc, char** argv, gboolean verbose) +static gboolean +privileged_initialization (int* argc, char** argv) { gboolean ret; char* nolock_reason; @@ -471,7 +472,8 @@ static gboolean privileged_initialization(int* argc, char** argv, gboolean verbo * * Figure out what locking mechanisms are supported. */ -static gboolean lock_initialization (int* argc, char** argv, char** nolock_reason, gboolean verbose) +static gboolean +lock_initialization (int* argc, char** argv, char** nolock_reason) { if (nolock_reason != NULL) { @@ -560,7 +562,7 @@ int main(int argc, char** argv) gs_profile_start(NULL); - if (!privileged_initialization(&argc, argv, verbose)) + if (!privileged_initialization (&argc, argv)) { response_lock_init_failed(); exit(1); @@ -585,7 +587,7 @@ int main(int argc, char** argv) exit(1); } - if (!lock_initialization(&argc, argv, &nolock_reason, verbose)) + if (!lock_initialization(&argc, argv, &nolock_reason)) { if (nolock_reason != NULL) { |