summaryrefslogtreecommitdiff
path: root/channels.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-12-06 17:55:26 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-12-06 17:55:26 +0000
commit3c36bb29ca67d459ef9d8c1961415d77efc20e55 (patch)
treee0cbbfcb54bdf089c1ca30c9ccc38d301ae6fd33 /channels.c
parentf8f065bc752ca0a448eb90fc8d60516f486dc4ff (diff)
- itojun@cvs.openbsd.org 2001/12/05 03:56:39
[auth1.c auth2.c canohost.c channels.c deattack.c packet.c scp.c sshconnect2.c] make it compile with more strict prototype checking
Diffstat (limited to 'channels.c')
-rw-r--r--channels.c20
1 files changed, 10 insertions, 10 deletions
diff --git a/channels.c b/channels.c
index 62fd73d74..da6fc0008 100644
--- a/channels.c
+++ b/channels.c
@@ -39,7 +39,7 @@
39 */ 39 */
40 40
41#include "includes.h" 41#include "includes.h"
42RCSID("$OpenBSD: channels.c,v 1.140 2001/10/10 22:18:47 markus Exp $"); 42RCSID("$OpenBSD: channels.c,v 1.142 2001/12/05 03:56:39 itojun Exp $");
43 43
44#include "ssh.h" 44#include "ssh.h"
45#include "ssh1.h" 45#include "ssh1.h"
@@ -361,7 +361,7 @@ channel_free_all(void)
361 */ 361 */
362 362
363void 363void
364channel_close_all() 364channel_close_all(void)
365{ 365{
366 int i; 366 int i;
367 367
@@ -402,7 +402,7 @@ channel_stop_listening(void)
402 */ 402 */
403 403
404int 404int
405channel_not_very_much_buffered_data() 405channel_not_very_much_buffered_data(void)
406{ 406{
407 u_int i; 407 u_int i;
408 Channel *c; 408 Channel *c;
@@ -432,7 +432,7 @@ channel_not_very_much_buffered_data()
432/* Returns true if any channel is still open. */ 432/* Returns true if any channel is still open. */
433 433
434int 434int
435channel_still_open() 435channel_still_open(void)
436{ 436{
437 int i; 437 int i;
438 Channel *c; 438 Channel *c;
@@ -475,7 +475,7 @@ channel_still_open()
475/* Returns the id of an open channel suitable for keepaliving */ 475/* Returns the id of an open channel suitable for keepaliving */
476 476
477int 477int
478channel_find_open() 478channel_find_open(void)
479{ 479{
480 int i; 480 int i;
481 Channel *c; 481 Channel *c;
@@ -520,7 +520,7 @@ channel_find_open()
520 */ 520 */
521 521
522char * 522char *
523channel_open_message() 523channel_open_message(void)
524{ 524{
525 Buffer buffer; 525 Buffer buffer;
526 Channel *c; 526 Channel *c;
@@ -1601,7 +1601,7 @@ channel_after_select(fd_set * readset, fd_set * writeset)
1601/* If there is data to send to the connection, enqueue some of it now. */ 1601/* If there is data to send to the connection, enqueue some of it now. */
1602 1602
1603void 1603void
1604channel_output_poll() 1604channel_output_poll(void)
1605{ 1605{
1606 int len, i; 1606 int len, i;
1607 Channel *c; 1607 Channel *c;
@@ -2271,7 +2271,7 @@ channel_input_port_forward_request(int is_root, int gateway_ports)
2271 * anyway, and the server has no way to know but to trust the client anyway. 2271 * anyway, and the server has no way to know but to trust the client anyway.
2272 */ 2272 */
2273void 2273void
2274channel_permit_all_opens() 2274channel_permit_all_opens(void)
2275{ 2275{
2276 if (num_permitted_opens == 0) 2276 if (num_permitted_opens == 0)
2277 all_opens_permitted = 1; 2277 all_opens_permitted = 1;
@@ -2811,7 +2811,7 @@ x11_request_forwarding_with_spoofing(int client_session_id,
2811/* Sends a message to the server to request authentication fd forwarding. */ 2811/* Sends a message to the server to request authentication fd forwarding. */
2812 2812
2813void 2813void
2814auth_request_forwarding() 2814auth_request_forwarding(void)
2815{ 2815{
2816 packet_start(SSH_CMSG_AGENT_REQUEST_FORWARDING); 2816 packet_start(SSH_CMSG_AGENT_REQUEST_FORWARDING);
2817 packet_send(); 2817 packet_send();
@@ -2825,7 +2825,7 @@ auth_request_forwarding()
2825 */ 2825 */
2826 2826
2827char * 2827char *
2828auth_get_socket_name() 2828auth_get_socket_name(void)
2829{ 2829{
2830 return auth_sock_name; 2830 return auth_sock_name;
2831} 2831}