diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-06-25 05:01:22 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-06-25 05:01:22 +0000 |
commit | bba81213b972ce15fbbaca60b9ffabb42371ce8f (patch) | |
tree | e6bd40752969f2b93d179cfb9aaae9074ca45956 /packet.c | |
parent | 34f91883a6f3123656b0a8017d68b658f7cf2403 (diff) |
- itojun@cvs.openbsd.org 2001/06/23 15:12:20
[auth1.c auth2.c auth2-chall.c authfd.c authfile.c auth-rhosts.c
canohost.c channels.c cipher.c clientloop.c deattack.c dh.c
hostfile.c kex.c kexdh.c kexgex.c key.c nchan.c packet.c radix.c
readpass.c scp.c servconf.c serverloop.c session.c sftp.c
sftp-client.c sftp-glob.c sftp-int.c sftp-server.c ssh-add.c
ssh-agent.c ssh.c sshconnect1.c sshconnect2.c sshconnect.c sshd.c
ssh-keygen.c ssh-keyscan.c]
more strict prototypes. raise warning level in Makefile.inc.
markus ok'ed
TODO; cleanup headers
Diffstat (limited to 'packet.c')
-rw-r--r-- | packet.c | 16 |
1 files changed, 8 insertions, 8 deletions
@@ -37,7 +37,7 @@ | |||
37 | */ | 37 | */ |
38 | 38 | ||
39 | #include "includes.h" | 39 | #include "includes.h" |
40 | RCSID("$OpenBSD: packet.c,v 1.67 2001/06/20 13:56:39 markus Exp $"); | 40 | RCSID("$OpenBSD: packet.c,v 1.68 2001/06/23 15:12:19 itojun Exp $"); |
41 | 41 | ||
42 | #include "xmalloc.h" | 42 | #include "xmalloc.h" |
43 | #include "buffer.h" | 43 | #include "buffer.h" |
@@ -260,8 +260,8 @@ packet_get_protocol_flags() | |||
260 | * Level is compression level 1 (fastest) - 9 (slow, best) as in gzip. | 260 | * Level is compression level 1 (fastest) - 9 (slow, best) as in gzip. |
261 | */ | 261 | */ |
262 | 262 | ||
263 | void | 263 | static void |
264 | packet_init_compression() | 264 | packet_init_compression(void) |
265 | { | 265 | { |
266 | if (compression_buffer_ready == 1) | 266 | if (compression_buffer_ready == 1) |
267 | return; | 267 | return; |
@@ -356,7 +356,7 @@ packet_put_bignum2(BIGNUM * value) | |||
356 | * encrypts the packet before sending. | 356 | * encrypts the packet before sending. |
357 | */ | 357 | */ |
358 | 358 | ||
359 | void | 359 | static void |
360 | packet_send1(void) | 360 | packet_send1(void) |
361 | { | 361 | { |
362 | char buf[8], *cp; | 362 | char buf[8], *cp; |
@@ -427,7 +427,7 @@ packet_send1(void) | |||
427 | */ | 427 | */ |
428 | } | 428 | } |
429 | 429 | ||
430 | void | 430 | static void |
431 | set_newkeys(int mode) | 431 | set_newkeys(int mode) |
432 | { | 432 | { |
433 | Enc *enc; | 433 | Enc *enc; |
@@ -480,7 +480,7 @@ set_newkeys(int mode) | |||
480 | /* | 480 | /* |
481 | * Finalize packet in SSH2 format (compress, mac, encrypt, enqueue) | 481 | * Finalize packet in SSH2 format (compress, mac, encrypt, enqueue) |
482 | */ | 482 | */ |
483 | void | 483 | static void |
484 | packet_send2(void) | 484 | packet_send2(void) |
485 | { | 485 | { |
486 | static u_int32_t seqnr = 0; | 486 | static u_int32_t seqnr = 0; |
@@ -683,7 +683,7 @@ packet_read_expect(int *payload_len_ptr, int expected_type) | |||
683 | * Check bytes | 683 | * Check bytes |
684 | */ | 684 | */ |
685 | 685 | ||
686 | int | 686 | static int |
687 | packet_read_poll1(int *payload_len_ptr) | 687 | packet_read_poll1(int *payload_len_ptr) |
688 | { | 688 | { |
689 | u_int len, padded_len; | 689 | u_int len, padded_len; |
@@ -761,7 +761,7 @@ packet_read_poll1(int *payload_len_ptr) | |||
761 | return type; | 761 | return type; |
762 | } | 762 | } |
763 | 763 | ||
764 | int | 764 | static int |
765 | packet_read_poll2(int *payload_len_ptr) | 765 | packet_read_poll2(int *payload_len_ptr) |
766 | { | 766 | { |
767 | static u_int32_t seqnr = 0; | 767 | static u_int32_t seqnr = 0; |