summaryrefslogtreecommitdiff
path: root/src/mate-screensaver-dialog.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/mate-screensaver-dialog.c')
-rw-r--r--src/mate-screensaver-dialog.c10
1 files changed, 6 insertions, 4 deletions
diff --git a/src/mate-screensaver-dialog.c b/src/mate-screensaver-dialog.c
index 06ea62a..03ca5bf 100644
--- a/src/mate-screensaver-dialog.c
+++ b/src/mate-screensaver-dialog.c
@@ -429,7 +429,8 @@ static gboolean popup_dialog_idle(gpointer data)
If the executable is setuid root, then these initializations
are run as root, before discarding privileges.
*/
-static gboolean privileged_initialization(int* argc, char** argv, gboolean verbose)
+static gboolean
+privileged_initialization (int* argc, char** argv)
{
gboolean ret;
char* nolock_reason;
@@ -471,7 +472,8 @@ static gboolean privileged_initialization(int* argc, char** argv, gboolean verbo
*
* Figure out what locking mechanisms are supported.
*/
-static gboolean lock_initialization (int* argc, char** argv, char** nolock_reason, gboolean verbose)
+static gboolean
+lock_initialization (int* argc, char** argv, char** nolock_reason)
{
if (nolock_reason != NULL)
{
@@ -560,7 +562,7 @@ int main(int argc, char** argv)
gs_profile_start(NULL);
- if (!privileged_initialization(&argc, argv, verbose))
+ if (!privileged_initialization (&argc, argv))
{
response_lock_init_failed();
exit(1);
@@ -585,7 +587,7 @@ int main(int argc, char** argv)
exit(1);
}
- if (!lock_initialization(&argc, argv, &nolock_reason, verbose))
+ if (!lock_initialization(&argc, argv, &nolock_reason))
{
if (nolock_reason != NULL)
{