Warnings by checkpatch.pl.
I have learned something today:
https://eklitzke.org/c-functions-without-arguments
Signed-off-by: Dimitri Papadopoulos <3350651+DimitriPapadopoulos@users.noreply.gitlab.com>
#include "openconnect-internal.h"
-static struct oc_auth_form *plain_auth_form() {
+static struct oc_auth_form *plain_auth_form(void) {
struct oc_auth_form *form;
struct oc_form_opt *opt, *opt2, *opt3;
return msgutf8;
}
-int openconnect__win32_sock_init()
+int openconnect__win32_sock_init(void)
{
WSADATA data;
if (WSAStartup (MAKEWORD(1, 1), &data) != 0) {
#define XCAST(x) ((const xmlChar *)(x))
-static struct oc_auth_form *plain_auth_form() {
+static struct oc_auth_form *plain_auth_form(void) {
struct oc_auth_form *form;
struct oc_form_opt *opt, *opt2;
static char tls_library_version[32] = "";
-const char *openconnect_get_tls_library_version()
+const char *openconnect_get_tls_library_version(void)
{
if (!*tls_library_version) {
snprintf(tls_library_version, sizeof(tls_library_version), "GnuTLS %s",
return tls_library_version;
}
-int can_enable_insecure_crypto()
+int can_enable_insecure_crypto(void)
{
/* XX: As of GnuTLS 3.6.13, no released version has (yet) removed 3DES/RC4 from default builds,
* but like OpenSSL (removed in 1.1.0) it may happen. */
static char tls_library_version[32] = "";
-const char *openconnect_get_tls_library_version()
+const char *openconnect_get_tls_library_version(void)
{
if (!*tls_library_version) {
strncpy(tls_library_version, SSLeay_version(SSLEAY_VERSION), sizeof(tls_library_version));
return tls_library_version;
}
-int can_enable_insecure_crypto()
+int can_enable_insecure_crypto(void)
{
if (EVP_des_ede3_cbc() == NULL ||
EVP_rc4() == NULL)
#endif
#endif
-static inline int connect_pending()
+static inline int connect_pending(void)
{
#ifdef _WIN32
return WSAGetLastError() == WSAEWOULDBLOCK;