- itojun@cvs.openbsd.org 2001/06/23 15:12:20
[auth1.c auth2.c auth2-chall.c authfd.c authfile.c auth-rhosts.c
canohost.c channels.c cipher.c clientloop.c deattack.c dh.c
hostfile.c kex.c kexdh.c kexgex.c key.c nchan.c packet.c radix.c
readpass.c scp.c servconf.c serverloop.c session.c sftp.c
sftp-client.c sftp-glob.c sftp-int.c sftp-server.c ssh-add.c
ssh-agent.c ssh.c sshconnect1.c sshconnect2.c sshconnect.c sshd.c
ssh-keygen.c ssh-keyscan.c]
more strict prototypes. raise warning level in Makefile.inc.
markus ok'ed
TODO; cleanup headers
diff --git a/packet.c b/packet.c
index 64aabb3..5365aba 100644
--- a/packet.c
+++ b/packet.c
@@ -37,7 +37,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: packet.c,v 1.67 2001/06/20 13:56:39 markus Exp $");
+RCSID("$OpenBSD: packet.c,v 1.68 2001/06/23 15:12:19 itojun Exp $");
#include "xmalloc.h"
#include "buffer.h"
@@ -260,8 +260,8 @@
* Level is compression level 1 (fastest) - 9 (slow, best) as in gzip.
*/
-void
-packet_init_compression()
+static void
+packet_init_compression(void)
{
if (compression_buffer_ready == 1)
return;
@@ -356,7 +356,7 @@
* encrypts the packet before sending.
*/
-void
+static void
packet_send1(void)
{
char buf[8], *cp;
@@ -427,7 +427,7 @@
*/
}
-void
+static void
set_newkeys(int mode)
{
Enc *enc;
@@ -480,7 +480,7 @@
/*
* Finalize packet in SSH2 format (compress, mac, encrypt, enqueue)
*/
-void
+static void
packet_send2(void)
{
static u_int32_t seqnr = 0;
@@ -683,7 +683,7 @@
* Check bytes
*/
-int
+static int
packet_read_poll1(int *payload_len_ptr)
{
u_int len, padded_len;
@@ -761,7 +761,7 @@
return type;
}
-int
+static int
packet_read_poll2(int *payload_len_ptr)
{
static u_int32_t seqnr = 0;