summaryrefslogtreecommitdiff
path: root/packet.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-06-25 05:01:22 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-06-25 05:01:22 +0000
commitbba81213b972ce15fbbaca60b9ffabb42371ce8f (patch)
treee6bd40752969f2b93d179cfb9aaae9074ca45956 /packet.c
parent34f91883a6f3123656b0a8017d68b658f7cf2403 (diff)
- itojun@cvs.openbsd.org 2001/06/23 15:12:20
[auth1.c auth2.c auth2-chall.c authfd.c authfile.c auth-rhosts.c canohost.c channels.c cipher.c clientloop.c deattack.c dh.c hostfile.c kex.c kexdh.c kexgex.c key.c nchan.c packet.c radix.c readpass.c scp.c servconf.c serverloop.c session.c sftp.c sftp-client.c sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c sshconnect1.c sshconnect2.c sshconnect.c sshd.c ssh-keygen.c ssh-keyscan.c] more strict prototypes. raise warning level in Makefile.inc. markus ok'ed TODO; cleanup headers
Diffstat (limited to 'packet.c')
-rw-r--r--packet.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/packet.c b/packet.c
index 64aabb3b0..5365abaec 100644
--- a/packet.c
+++ b/packet.c
@@ -37,7 +37,7 @@
37 */ 37 */
38 38
39#include "includes.h" 39#include "includes.h"
40RCSID("$OpenBSD: packet.c,v 1.67 2001/06/20 13:56:39 markus Exp $"); 40RCSID("$OpenBSD: packet.c,v 1.68 2001/06/23 15:12:19 itojun Exp $");
41 41
42#include "xmalloc.h" 42#include "xmalloc.h"
43#include "buffer.h" 43#include "buffer.h"
@@ -260,8 +260,8 @@ packet_get_protocol_flags()
260 * Level is compression level 1 (fastest) - 9 (slow, best) as in gzip. 260 * Level is compression level 1 (fastest) - 9 (slow, best) as in gzip.
261 */ 261 */
262 262
263void 263static void
264packet_init_compression() 264packet_init_compression(void)
265{ 265{
266 if (compression_buffer_ready == 1) 266 if (compression_buffer_ready == 1)
267 return; 267 return;
@@ -356,7 +356,7 @@ packet_put_bignum2(BIGNUM * value)
356 * encrypts the packet before sending. 356 * encrypts the packet before sending.
357 */ 357 */
358 358
359void 359static void
360packet_send1(void) 360packet_send1(void)
361{ 361{
362 char buf[8], *cp; 362 char buf[8], *cp;
@@ -427,7 +427,7 @@ packet_send1(void)
427 */ 427 */
428} 428}
429 429
430void 430static void
431set_newkeys(int mode) 431set_newkeys(int mode)
432{ 432{
433 Enc *enc; 433 Enc *enc;
@@ -480,7 +480,7 @@ set_newkeys(int mode)
480/* 480/*
481 * Finalize packet in SSH2 format (compress, mac, encrypt, enqueue) 481 * Finalize packet in SSH2 format (compress, mac, encrypt, enqueue)
482 */ 482 */
483void 483static void
484packet_send2(void) 484packet_send2(void)
485{ 485{
486 static u_int32_t seqnr = 0; 486 static u_int32_t seqnr = 0;
@@ -683,7 +683,7 @@ packet_read_expect(int *payload_len_ptr, int expected_type)
683 * Check bytes 683 * Check bytes
684 */ 684 */
685 685
686int 686static int
687packet_read_poll1(int *payload_len_ptr) 687packet_read_poll1(int *payload_len_ptr)
688{ 688{
689 u_int len, padded_len; 689 u_int len, padded_len;
@@ -761,7 +761,7 @@ packet_read_poll1(int *payload_len_ptr)
761 return type; 761 return type;
762} 762}
763 763
764int 764static int
765packet_read_poll2(int *payload_len_ptr) 765packet_read_poll2(int *payload_len_ptr)
766{ 766{
767 static u_int32_t seqnr = 0; 767 static u_int32_t seqnr = 0;