Module Name: src
Committed By: maxv
Date: Sat May 19 20:14:56 UTC 2018
Modified Files:
src/crypto/dist/ipsec-tools/src/racoon: admin.c cfparse.y evt.c
grabmyaddr.c handler.c ipsec_doi.c isakmp.c isakmp_var.h
isakmp_xauth.c localconf.c oakley.c pfkey.c remoteconf.c sainfo.c
session.c
Log Message:
Use strict prototypes, when they don't introduce more warnings than they fix.
Also localify a few functions.
To generate a diff of this commit:
cvs rdiff -u -r1.40 -r1.41 src/crypto/dist/ipsec-tools/src/racoon/admin.c
cvs rdiff -u -r1.50 -r1.51 src/crypto/dist/ipsec-tools/src/racoon/cfparse.y \
src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c
cvs rdiff -u -r1.10 -r1.11 src/crypto/dist/ipsec-tools/src/racoon/evt.c
cvs rdiff -u -r1.36 -r1.37 \
src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c
cvs rdiff -u -r1.41 -r1.42 src/crypto/dist/ipsec-tools/src/racoon/handler.c
cvs rdiff -u -r1.77 -r1.78 src/crypto/dist/ipsec-tools/src/racoon/isakmp.c
cvs rdiff -u -r1.17 -r1.18 \
src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h
cvs rdiff -u -r1.29 -r1.30 \
src/crypto/dist/ipsec-tools/src/racoon/isakmp_xauth.c \
src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c
cvs rdiff -u -r1.9 -r1.10 src/crypto/dist/ipsec-tools/src/racoon/localconf.c
cvs rdiff -u -r1.25 -r1.26 src/crypto/dist/ipsec-tools/src/racoon/oakley.c
cvs rdiff -u -r1.60 -r1.61 src/crypto/dist/ipsec-tools/src/racoon/pfkey.c
cvs rdiff -u -r1.15 -r1.16 src/crypto/dist/ipsec-tools/src/racoon/sainfo.c
cvs rdiff -u -r1.34 -r1.35 src/crypto/dist/ipsec-tools/src/racoon/session.c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/crypto/dist/ipsec-tools/src/racoon/admin.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/admin.c:1.40 src/crypto/dist/ipsec-tools/src/racoon/admin.c:1.41
--- src/crypto/dist/ipsec-tools/src/racoon/admin.c:1.40 Sat May 19 19:23:15 2018
+++ src/crypto/dist/ipsec-tools/src/racoon/admin.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: admin.c,v 1.40 2018/05/19 19:23:15 maxv Exp $ */
+/* $NetBSD: admin.c,v 1.41 2018/05/19 20:14:56 maxv Exp $ */
/* Id: admin.c,v 1.25 2006/04/06 14:31:04 manubsd Exp */
@@ -97,9 +97,7 @@ static int admin_process __P((int, char
static int admin_reply __P((int, struct admin_com *, int, vchar_t *));
static int
-admin_handler(ctx, fd)
- void *ctx;
- int fd;
+admin_handler(void *ctx, int fd)
{
int so2;
struct sockaddr_storage from;
Index: src/crypto/dist/ipsec-tools/src/racoon/cfparse.y
diff -u src/crypto/dist/ipsec-tools/src/racoon/cfparse.y:1.50 src/crypto/dist/ipsec-tools/src/racoon/cfparse.y:1.51
--- src/crypto/dist/ipsec-tools/src/racoon/cfparse.y:1.50 Sat May 19 19:32:16 2018
+++ src/crypto/dist/ipsec-tools/src/racoon/cfparse.y Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: cfparse.y,v 1.50 2018/05/19 19:32:16 maxv Exp $ */
+/* $NetBSD: cfparse.y,v 1.51 2018/05/19 20:14:56 maxv Exp $ */
/* Id: cfparse.y,v 1.66 2006/08/22 18:17:17 manubsd Exp */
@@ -172,7 +172,7 @@ static int load_x509(const char *file, c
return 0;
}
-static int process_rmconf()
+static int process_rmconf(void)
{
/* check a exchange mode */
@@ -2611,8 +2611,7 @@ insspspec(rmconf, spspec)
}
static struct secprotospec *
-dupspspec(spspec)
- struct secprotospec *spspec;
+dupspspec(struct secprotospec *spspec)
{
struct secprotospec *new;
Index: src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c:1.50 src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c:1.51
--- src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c:1.50 Sat May 19 19:23:15 2018
+++ src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: ipsec_doi.c,v 1.50 2018/05/19 19:23:15 maxv Exp $ */
+/* $NetBSD: ipsec_doi.c,v 1.51 2018/05/19 20:14:56 maxv Exp $ */
/* Id: ipsec_doi.c,v 1.55 2006/08/17 09:20:41 vanhu Exp */
@@ -197,9 +197,7 @@ ipsecdoi_checkph1proposal(sa, iph1)
}
static void
-print_ph1proposal(pair, s)
- struct prop_pair *pair;
- struct isakmpsa *s;
+print_ph1proposal(struct prop_pair *pair, struct isakmpsa *s)
{
struct isakmp_pl_p *prop = pair->prop;
struct isakmp_pl_t *trns = pair->trns;
@@ -3302,9 +3300,7 @@ doi2ipproto(proto)
*/
int
-ipsecdoi_subnetisaddr_v4( subnet, address )
- const vchar_t *subnet;
- const vchar_t *address;
+ipsecdoi_subnetisaddr_v4(const vchar_t *subnet, const vchar_t *address)
{
struct in_addr *mask;
@@ -3325,9 +3321,7 @@ ipsecdoi_subnetisaddr_v4( subnet, addres
#ifdef INET6
int
-ipsecdoi_subnetisaddr_v6( subnet, address )
- const vchar_t *subnet;
- const vchar_t *address;
+ipsecdoi_subnetisaddr_v6(const vchar_t *subnet, const vchar_t *address)
{
struct in6_addr *mask;
int i;
Index: src/crypto/dist/ipsec-tools/src/racoon/evt.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/evt.c:1.10 src/crypto/dist/ipsec-tools/src/racoon/evt.c:1.11
--- src/crypto/dist/ipsec-tools/src/racoon/evt.c:1.10 Thu Oct 21 06:15:28 2010
+++ src/crypto/dist/ipsec-tools/src/racoon/evt.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: evt.c,v 1.10 2010/10/21 06:15:28 tteras Exp $ */
+/* $NetBSD: evt.c,v 1.11 2018/05/19 20:14:56 maxv Exp $ */
/* Id: evt.c,v 1.5 2006/06/22 20:11:35 manubsd Exp */
@@ -216,9 +216,7 @@ evt_dump(void) {
}
static struct evt_message *
-evtmsg_create(type, optdata)
- int type;
- vchar_t *optdata;
+evtmsg_create(int type, vchar_t *optdata)
{
struct evt_message *e;
size_t len;
@@ -247,8 +245,7 @@ evtmsg_create(type, optdata)
}
static void
-evt_unsubscribe(l)
- struct evt_listener *l;
+evt_unsubscribe(struct evt_listener *l)
{
plog(LLV_DEBUG, LOCATION, NULL,
"[%d] admin connection released\n", l->fd);
@@ -260,18 +257,14 @@ evt_unsubscribe(l)
}
static int
-evt_unsubscribe_cb(ctx, fd)
- void *ctx;
- int fd;
+evt_unsubscribe_cb(void *ctx, int fd)
{
evt_unsubscribe((struct evt_listener *) ctx);
return 0;
}
static void
-evtmsg_broadcast(ll, e)
- const struct evt_listener_list *ll;
- struct evt_message *e;
+evtmsg_broadcast(const struct evt_listener_list *ll, struct evt_message *e)
{
struct evt_listener *l, *nl;
Index: src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c:1.36 src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c:1.37
--- src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c:1.36 Sat May 19 19:23:15 2018
+++ src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: grabmyaddr.c,v 1.36 2018/05/19 19:23:15 maxv Exp $ */
+/* $NetBSD: grabmyaddr.c,v 1.37 2018/05/19 20:14:56 maxv Exp $ */
/*
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
* Copyright (C) 2008 Timo Teras <[email protected]>.
@@ -81,8 +81,7 @@ struct myaddr {
static LIST_HEAD(_myaddr_list_, myaddr) configured, opened;
static void
-myaddr_delete(my)
- struct myaddr *my;
+myaddr_delete(struct myaddr *my)
{
if (my->fd != -1)
isakmp_close(my->fd);
@@ -91,8 +90,7 @@ myaddr_delete(my)
}
static int
-myaddr_configured(addr)
- struct sockaddr *addr;
+myaddr_configured(struct sockaddr *addr)
{
struct myaddr *cfg;
@@ -108,9 +106,7 @@ myaddr_configured(addr)
}
static int
-myaddr_open(addr, udp_encap)
- struct sockaddr *addr;
- int udp_encap;
+myaddr_open(struct sockaddr *addr, int udp_encap)
{
struct myaddr *my;
@@ -136,8 +132,7 @@ myaddr_open(addr, udp_encap)
}
static int
-myaddr_open_all_configured(addr)
- struct sockaddr *addr;
+myaddr_open_all_configured(struct sockaddr *addr)
{
/* create all configured, not already opened addresses */
struct myaddr *cfg;
@@ -178,8 +173,7 @@ myaddr_open_all_configured(addr)
}
static void
-myaddr_close_all_open(addr)
- struct sockaddr *addr;
+myaddr_close_all_open(struct sockaddr *addr)
{
/* delete all matching open sockets */
struct myaddr *my, *next;
@@ -195,8 +189,7 @@ myaddr_close_all_open(addr)
}
static void
-myaddr_flush_list(list)
- struct _myaddr_list_ *list;
+myaddr_flush_list(struct _myaddr_list_ *list)
{
struct myaddr *my, *next;
@@ -696,10 +689,7 @@ kernel_sync()
#define SAROUNDUP(X) ROUNDUP(((struct sockaddr *)(X))->sa_len)
static size_t
-parse_address(start, end, dest)
- caddr_t start;
- caddr_t end;
- struct sockaddr_storage *dest;
+parse_address(caddr_t start, caddr_t end, struct sockaddr_storage *dest)
{
int len;
@@ -743,8 +733,7 @@ parse_addresses(start, end, flags, addr)
}
static void
-kernel_handle_message(msg)
- caddr_t msg;
+kernel_handle_message(caddr_t msg)
{
struct rt_msghdr *rtm = (struct rt_msghdr *) msg;
struct ifa_msghdr *ifa = (struct ifa_msghdr *) msg;
Index: src/crypto/dist/ipsec-tools/src/racoon/handler.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/handler.c:1.41 src/crypto/dist/ipsec-tools/src/racoon/handler.c:1.42
--- src/crypto/dist/ipsec-tools/src/racoon/handler.c:1.41 Sun Jan 1 15:57:31 2012
+++ src/crypto/dist/ipsec-tools/src/racoon/handler.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: handler.c,v 1.41 2012/01/01 15:57:31 tteras Exp $ */
+/* $NetBSD: handler.c,v 1.42 2018/05/19 20:14:56 maxv Exp $ */
/* Id: handler.c,v 1.28 2006/05/26 12:17:29 manubsd Exp */
@@ -1173,8 +1173,7 @@ rem_recvdpkt(r)
}
static void
-sweep_recvdpkt(dummy)
- struct sched *dummy;
+sweep_recvdpkt(struct sched *dummy)
{
struct recvdpkt *r, *next;
struct timeval now, diff, sweep;
Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.77 src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.78
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.77 Sat May 19 19:23:15 2018
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: isakmp.c,v 1.77 2018/05/19 19:23:15 maxv Exp $ */
+/* $NetBSD: isakmp.c,v 1.78 2018/05/19 20:14:56 maxv Exp $ */
/* Id: isakmp.c,v 1.74 2006/05/07 21:32:59 manubsd Exp */
@@ -198,9 +198,7 @@ static int frag_handler(struct ph1handle
* isakmp packet handler
*/
static int
-isakmp_handler(ctx, so_isakmp)
- void *ctx;
- int so_isakmp;
+isakmp_handler(void *ctx, int so_isakmp)
{
struct isakmp isakmp;
union {
@@ -1829,8 +1827,7 @@ isakmp_send(iph1, sbuf)
/* called from scheduler */
static void
-isakmp_ph1resend_stub(p)
- struct sched *p;
+isakmp_ph1resend_stub(struct sched *p)
{
struct ph1handle *iph1 = container_of(p, struct ph1handle, scr);
@@ -1887,8 +1884,7 @@ isakmp_ph1send(iph1)
/* called from scheduler */
static void
-isakmp_ph2resend_stub(p)
- struct sched *p;
+isakmp_ph2resend_stub(struct sched *p)
{
struct ph2handle *iph2 = container_of(p, struct ph2handle, scr);
@@ -2654,13 +2650,8 @@ isakmp_newmsgid2(iph1)
* set values into allocated buffer of isakmp header for phase 1
*/
static caddr_t
-set_isakmp_header(vbuf, iph1, nptype, etype, flags, msgid)
- vchar_t *vbuf;
- struct ph1handle *iph1;
- int nptype;
- u_int8_t etype;
- u_int8_t flags;
- u_int32_t msgid;
+set_isakmp_header(vchar_t *vbuf, struct ph1handle *iph1, int nptype,
+ u_int8_t etype, u_int8_t flags, u_int32_t msgid)
{
struct isakmp *isakmp;
Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h:1.17 src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h:1.18
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h:1.17 Fri Nov 12 10:36:37 2010
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp_var.h Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: isakmp_var.h,v 1.17 2010/11/12 10:36:37 tteras Exp $ */
+/* $NetBSD: isakmp_var.h,v 1.18 2018/05/19 20:14:56 maxv Exp $ */
/* Id: isakmp_var.h,v 1.12 2005/05/07 14:45:31 manubsd Exp */
@@ -110,10 +110,8 @@ extern struct payload_list *isakmp_plist
struct payload_list *plist, vchar_t *payload,
u_int8_t payload_type, u_int8_t free));
-static inline struct payload_list *isakmp_plist_append(plist, payload, payload_type)
- struct payload_list *plist;
- vchar_t *payload;
- u_int8_t payload_type;
+static inline struct payload_list *
+isakmp_plist_append(struct payload_list *plist, vchar_t *payload, u_int8_t payload_type)
{
return isakmp_plist_append_full(plist, payload, payload_type, 0);
}
Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp_xauth.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp_xauth.c:1.29 src/crypto/dist/ipsec-tools/src/racoon/isakmp_xauth.c:1.30
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp_xauth.c:1.29 Sat May 19 19:32:16 2018
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp_xauth.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: isakmp_xauth.c,v 1.29 2018/05/19 19:32:16 maxv Exp $ */
+/* $NetBSD: isakmp_xauth.c,v 1.30 2018/05/19 20:14:56 maxv Exp $ */
/* Id: isakmp_xauth.c,v 1.38 2006/08/22 18:17:17 manubsd Exp */
@@ -1316,10 +1316,8 @@ xauth_login_system(usr, pwd)
return -1;
}
-int
-xauth_group_system(usr, grp)
- char * usr;
- char * grp;
+static int
+xauth_group_system(char *usr, char *grp)
{
struct group * gr;
char * member;
Index: src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c:1.29 src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c:1.30
--- src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c:1.29 Sat May 19 19:23:15 2018
+++ src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: remoteconf.c,v 1.29 2018/05/19 19:23:15 maxv Exp $ */
+/* $NetBSD: remoteconf.c,v 1.30 2018/05/19 20:14:56 maxv Exp $ */
/* Id: remoteconf.c,v 1.38 2006/05/06 15:52:44 manubsd Exp */
@@ -163,10 +163,8 @@ rmconf_match_identity(rmconf, id_p)
}
static int
-rmconf_match_etype_and_approval(rmconf, etype, approval)
- struct remoteconf *rmconf;
- int etype;
- struct isakmpsa *approval;
+rmconf_match_etype_and_approval(struct remoteconf *rmconf, int etype,
+ struct isakmpsa *approval)
{
if (check_etypeok(rmconf, (void *) (intptr_t) etype) == 0)
return ISAKMP_NTYPE_NO_PROPOSAL_CHOSEN;
@@ -195,9 +193,7 @@ enum rmconf_match_t {
};
static int
-rmconf_match_type(rmsel, rmconf)
- struct rmconfselector *rmsel;
- struct remoteconf *rmconf;
+rmconf_match_type(struct rmconfselector *rmsel, struct remoteconf *rmconf)
{
int ret = MATCH_NONE, tmp;
@@ -345,9 +341,7 @@ struct rmconf_find_context {
};
static int
-rmconf_find(rmconf, ctx)
- struct remoteconf *rmconf;
- void *ctx;
+rmconf_find(struct remoteconf *rmconf, void *ctx)
{
struct rmconf_find_context *fctx = (struct rmconf_find_context *) ctx;
int match_type;
@@ -546,10 +540,8 @@ newrmconf()
return new;
}
-void *
-dupidvl(entry, arg)
- void *entry;
- void *arg;
+static void *
+dupidvl(void *entry, void *arg)
{
struct idspec *id;
struct idspec *old = (struct idspec *) entry;
@@ -567,10 +559,8 @@ dupidvl(entry, arg)
return NULL;
}
-void *
-duprsa(entry, arg)
- void *entry;
- void *arg;
+static void *
+duprsa(void *entry, void *arg)
{
struct rsa_key *new;
Index: src/crypto/dist/ipsec-tools/src/racoon/localconf.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/localconf.c:1.9 src/crypto/dist/ipsec-tools/src/racoon/localconf.c:1.10
--- src/crypto/dist/ipsec-tools/src/racoon/localconf.c:1.9 Thu Jun 20 15:41:18 2013
+++ src/crypto/dist/ipsec-tools/src/racoon/localconf.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: localconf.c,v 1.9 2013/06/20 15:41:18 christos Exp $ */
+/* $NetBSD: localconf.c,v 1.10 2018/05/19 20:14:56 maxv Exp $ */
/* $KAME: localconf.c,v 1.33 2001/08/09 07:32:19 sakane Exp $ */
@@ -376,8 +376,7 @@ doitype2doi(doitype)
static void
-saverestore_params(f)
- int f;
+saverestore_params(int f)
{
static u_int16_t s_port_isakmp;
Index: src/crypto/dist/ipsec-tools/src/racoon/oakley.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/oakley.c:1.25 src/crypto/dist/ipsec-tools/src/racoon/oakley.c:1.26
--- src/crypto/dist/ipsec-tools/src/racoon/oakley.c:1.25 Sat May 19 19:23:15 2018
+++ src/crypto/dist/ipsec-tools/src/racoon/oakley.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: oakley.c,v 1.25 2018/05/19 19:23:15 maxv Exp $ */
+/* $NetBSD: oakley.c,v 1.26 2018/05/19 20:14:56 maxv Exp $ */
/* Id: oakley.c,v 1.32 2006/05/26 12:19:46 manubsd Exp */
@@ -138,8 +138,7 @@ int oakley_get_certtype(cert)
}
static vchar_t *
-dump_isakmp_payload(gen)
- struct isakmp_gen *gen;
+dump_isakmp_payload(struct isakmp_gen *gen)
{
vchar_t p;
@@ -156,8 +155,7 @@ dump_isakmp_payload(gen)
}
static vchar_t *
-dump_x509(cert)
- X509 *cert;
+dump_x509(X509 *cert)
{
vchar_t *pl;
u_char *bp;
@@ -2249,9 +2247,7 @@ struct append_cr_ctx {
};
static int
-oakley_append_rmconf_cr(rmconf, ctx)
- struct remoteconf *rmconf;
- void *ctx;
+oakley_append_rmconf_cr(struct remoteconf *rmconf, void *ctx)
{
struct append_cr_ctx *actx = (struct append_cr_ctx *) ctx;
vchar_t *buf, *asn1dn = NULL;
Index: src/crypto/dist/ipsec-tools/src/racoon/pfkey.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/pfkey.c:1.60 src/crypto/dist/ipsec-tools/src/racoon/pfkey.c:1.61
--- src/crypto/dist/ipsec-tools/src/racoon/pfkey.c:1.60 Thu Nov 9 08:34:50 2017
+++ src/crypto/dist/ipsec-tools/src/racoon/pfkey.c Sat May 19 20:14:56 2018
@@ -1,6 +1,6 @@
-/* $NetBSD: pfkey.c,v 1.60 2017/11/09 08:34:50 knakahara Exp $ */
+/* $NetBSD: pfkey.c,v 1.61 2018/05/19 20:14:56 maxv Exp $ */
-/* $Id: pfkey.c,v 1.60 2017/11/09 08:34:50 knakahara Exp $ */
+/* $Id: pfkey.c,v 1.61 2018/05/19 20:14:56 maxv Exp $ */
/*
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
@@ -200,9 +200,7 @@ static int addnewsp __P((caddr_t *, stru
* -1: fail
*/
static int
-pfkey_handler(ctx, fd)
- void *ctx;
- int fd;
+pfkey_handler(void *ctx, int fd)
{
struct sadb_msg *msg;
int len;
Index: src/crypto/dist/ipsec-tools/src/racoon/sainfo.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/sainfo.c:1.15 src/crypto/dist/ipsec-tools/src/racoon/sainfo.c:1.16
--- src/crypto/dist/ipsec-tools/src/racoon/sainfo.c:1.15 Sun Jan 1 15:29:28 2012
+++ src/crypto/dist/ipsec-tools/src/racoon/sainfo.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: sainfo.c,v 1.15 2012/01/01 15:29:28 tteras Exp $ */
+/* $NetBSD: sainfo.c,v 1.16 2018/05/19 20:14:56 maxv Exp $ */
/* $KAME: sainfo.c,v 1.16 2003/06/27 07:32:39 sakane Exp $ */
@@ -226,8 +226,8 @@ delsainfo(si)
racoon_free(si);
}
-int prisainfo(s)
- struct sainfo *s;
+static int
+prisainfo(struct sainfo *s)
{
/*
* determine the matching priority
Index: src/crypto/dist/ipsec-tools/src/racoon/session.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/session.c:1.34 src/crypto/dist/ipsec-tools/src/racoon/session.c:1.35
--- src/crypto/dist/ipsec-tools/src/racoon/session.c:1.34 Sat May 19 19:47:47 2018
+++ src/crypto/dist/ipsec-tools/src/racoon/session.c Sat May 19 20:14:56 2018
@@ -1,4 +1,4 @@
-/* $NetBSD: session.c,v 1.34 2018/05/19 19:47:47 maxv Exp $ */
+/* $NetBSD: session.c,v 1.35 2018/05/19 20:14:56 maxv Exp $ */
/* $KAME: session.c,v 1.32 2003/09/24 02:01:17 jinmei Exp $ */
@@ -374,7 +374,8 @@ signal_handler(sig)
/* XXX possible mem leaks and no way to go back for now !!!
*/
-static void reload_conf(){
+static void reload_conf(void)
+{
int error;
#ifdef ENABLE_HYBRID