diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-12-06 17:55:26 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-12-06 17:55:26 +0000 |
commit | 3c36bb29ca67d459ef9d8c1961415d77efc20e55 (patch) | |
tree | e0cbbfcb54bdf089c1ca30c9ccc38d301ae6fd33 /channels.c | |
parent | f8f065bc752ca0a448eb90fc8d60516f486dc4ff (diff) |
- itojun@cvs.openbsd.org 2001/12/05 03:56:39
[auth1.c auth2.c canohost.c channels.c deattack.c packet.c scp.c
sshconnect2.c]
make it compile with more strict prototype checking
Diffstat (limited to 'channels.c')
-rw-r--r-- | channels.c | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/channels.c b/channels.c index 62fd73d74..da6fc0008 100644 --- a/channels.c +++ b/channels.c | |||
@@ -39,7 +39,7 @@ | |||
39 | */ | 39 | */ |
40 | 40 | ||
41 | #include "includes.h" | 41 | #include "includes.h" |
42 | RCSID("$OpenBSD: channels.c,v 1.140 2001/10/10 22:18:47 markus Exp $"); | 42 | RCSID("$OpenBSD: channels.c,v 1.142 2001/12/05 03:56:39 itojun Exp $"); |
43 | 43 | ||
44 | #include "ssh.h" | 44 | #include "ssh.h" |
45 | #include "ssh1.h" | 45 | #include "ssh1.h" |
@@ -361,7 +361,7 @@ channel_free_all(void) | |||
361 | */ | 361 | */ |
362 | 362 | ||
363 | void | 363 | void |
364 | channel_close_all() | 364 | channel_close_all(void) |
365 | { | 365 | { |
366 | int i; | 366 | int i; |
367 | 367 | ||
@@ -402,7 +402,7 @@ channel_stop_listening(void) | |||
402 | */ | 402 | */ |
403 | 403 | ||
404 | int | 404 | int |
405 | channel_not_very_much_buffered_data() | 405 | channel_not_very_much_buffered_data(void) |
406 | { | 406 | { |
407 | u_int i; | 407 | u_int i; |
408 | Channel *c; | 408 | Channel *c; |
@@ -432,7 +432,7 @@ channel_not_very_much_buffered_data() | |||
432 | /* Returns true if any channel is still open. */ | 432 | /* Returns true if any channel is still open. */ |
433 | 433 | ||
434 | int | 434 | int |
435 | channel_still_open() | 435 | channel_still_open(void) |
436 | { | 436 | { |
437 | int i; | 437 | int i; |
438 | Channel *c; | 438 | Channel *c; |
@@ -475,7 +475,7 @@ channel_still_open() | |||
475 | /* Returns the id of an open channel suitable for keepaliving */ | 475 | /* Returns the id of an open channel suitable for keepaliving */ |
476 | 476 | ||
477 | int | 477 | int |
478 | channel_find_open() | 478 | channel_find_open(void) |
479 | { | 479 | { |
480 | int i; | 480 | int i; |
481 | Channel *c; | 481 | Channel *c; |
@@ -520,7 +520,7 @@ channel_find_open() | |||
520 | */ | 520 | */ |
521 | 521 | ||
522 | char * | 522 | char * |
523 | channel_open_message() | 523 | channel_open_message(void) |
524 | { | 524 | { |
525 | Buffer buffer; | 525 | Buffer buffer; |
526 | Channel *c; | 526 | Channel *c; |
@@ -1601,7 +1601,7 @@ channel_after_select(fd_set * readset, fd_set * writeset) | |||
1601 | /* If there is data to send to the connection, enqueue some of it now. */ | 1601 | /* If there is data to send to the connection, enqueue some of it now. */ |
1602 | 1602 | ||
1603 | void | 1603 | void |
1604 | channel_output_poll() | 1604 | channel_output_poll(void) |
1605 | { | 1605 | { |
1606 | int len, i; | 1606 | int len, i; |
1607 | Channel *c; | 1607 | Channel *c; |
@@ -2271,7 +2271,7 @@ channel_input_port_forward_request(int is_root, int gateway_ports) | |||
2271 | * anyway, and the server has no way to know but to trust the client anyway. | 2271 | * anyway, and the server has no way to know but to trust the client anyway. |
2272 | */ | 2272 | */ |
2273 | void | 2273 | void |
2274 | channel_permit_all_opens() | 2274 | channel_permit_all_opens(void) |
2275 | { | 2275 | { |
2276 | if (num_permitted_opens == 0) | 2276 | if (num_permitted_opens == 0) |
2277 | all_opens_permitted = 1; | 2277 | all_opens_permitted = 1; |
@@ -2811,7 +2811,7 @@ x11_request_forwarding_with_spoofing(int client_session_id, | |||
2811 | /* Sends a message to the server to request authentication fd forwarding. */ | 2811 | /* Sends a message to the server to request authentication fd forwarding. */ |
2812 | 2812 | ||
2813 | void | 2813 | void |
2814 | auth_request_forwarding() | 2814 | auth_request_forwarding(void) |
2815 | { | 2815 | { |
2816 | packet_start(SSH_CMSG_AGENT_REQUEST_FORWARDING); | 2816 | packet_start(SSH_CMSG_AGENT_REQUEST_FORWARDING); |
2817 | packet_send(); | 2817 | packet_send(); |
@@ -2825,7 +2825,7 @@ auth_request_forwarding() | |||
2825 | */ | 2825 | */ |
2826 | 2826 | ||
2827 | char * | 2827 | char * |
2828 | auth_get_socket_name() | 2828 | auth_get_socket_name(void) |
2829 | { | 2829 | { |
2830 | return auth_sock_name; | 2830 | return auth_sock_name; |
2831 | } | 2831 | } |