mirror of
https://github.com/OpenVPN/openvpn.git
synced 2025-05-08 21:25:53 +08:00
configure: Add -Wstrict-prototypes and -Wold-style-definition
These are not covered by -Wall (nor -Wextra) but we want to enforce them. Change-Id: I6e08920e4cf4762b9f14a7461a29fa77df15255c Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com> Acked-by: Gert Doering <gert@greenie.muc.de> Message-Id: <20240620144230.19586-1-gert@greenie.muc.de> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg28823.html Signed-off-by: Gert Doering <gert@greenie.muc.de>
This commit is contained in:
parent
c9f29e35cd
commit
56355924b4
@ -1408,6 +1408,8 @@ AC_DEFUN([ACL_CHECK_ADD_COMPILE_FLAGS], [
|
||||
)
|
||||
|
||||
ACL_CHECK_ADD_COMPILE_FLAGS([-Wno-stringop-truncation])
|
||||
ACL_CHECK_ADD_COMPILE_FLAGS([-Wstrict-prototypes])
|
||||
ACL_CHECK_ADD_COMPILE_FLAGS([-Wold-style-definition])
|
||||
ACL_CHECK_ADD_COMPILE_FLAGS([-Wall])
|
||||
|
||||
if test "${enable_pedantic}" = "yes"; then
|
||||
|
@ -247,7 +247,7 @@ int dco_get_peer_stats(struct context *c);
|
||||
*
|
||||
* @return list of colon-separated ciphers
|
||||
*/
|
||||
const char *dco_get_supported_ciphers();
|
||||
const char *dco_get_supported_ciphers(void);
|
||||
|
||||
#else /* if defined(ENABLE_DCO) */
|
||||
|
||||
@ -375,7 +375,7 @@ dco_get_peer_stats(struct context *c)
|
||||
}
|
||||
|
||||
static inline const char *
|
||||
dco_get_supported_ciphers()
|
||||
dco_get_supported_ciphers(void)
|
||||
{
|
||||
return "";
|
||||
}
|
||||
|
@ -773,7 +773,7 @@ dco_get_peer_stats(struct context *c)
|
||||
}
|
||||
|
||||
const char *
|
||||
dco_get_supported_ciphers()
|
||||
dco_get_supported_ciphers(void)
|
||||
{
|
||||
return "none:AES-256-GCM:AES-192-GCM:AES-128-GCM:CHACHA20-POLY1305";
|
||||
}
|
||||
|
@ -1053,7 +1053,7 @@ dco_event_set(dco_context_t *dco, struct event_set *es, void *arg)
|
||||
}
|
||||
|
||||
const char *
|
||||
dco_get_supported_ciphers()
|
||||
dco_get_supported_ciphers(void)
|
||||
{
|
||||
return "AES-128-GCM:AES-256-GCM:AES-192-GCM:CHACHA20-POLY1305";
|
||||
}
|
||||
|
@ -35,7 +35,7 @@ pkcs11_initialize(
|
||||
);
|
||||
|
||||
void
|
||||
pkcs11_terminate();
|
||||
pkcs11_terminate(void);
|
||||
|
||||
bool
|
||||
pkcs11_addProvider(
|
||||
@ -46,10 +46,10 @@ pkcs11_addProvider(
|
||||
);
|
||||
|
||||
int
|
||||
pkcs11_logout();
|
||||
pkcs11_logout(void);
|
||||
|
||||
int
|
||||
pkcs11_management_id_count();
|
||||
pkcs11_management_id_count(void);
|
||||
|
||||
bool
|
||||
pkcs11_management_id_get(
|
||||
|
@ -448,7 +448,7 @@ post_init_signal_catch(void)
|
||||
}
|
||||
|
||||
void
|
||||
halt_low_priority_signals()
|
||||
halt_low_priority_signals(void)
|
||||
{
|
||||
#ifndef _WIN32
|
||||
struct sigaction sa;
|
||||
|
@ -277,7 +277,7 @@ static char *auth_challenge; /* GLOBAL */
|
||||
#endif
|
||||
|
||||
void
|
||||
enable_auth_user_pass()
|
||||
enable_auth_user_pass(void)
|
||||
{
|
||||
auth_user_pass_enabled = true;
|
||||
}
|
||||
|
@ -381,7 +381,7 @@ void tls_post_encrypt(struct tls_multi *multi, struct buffer *buf);
|
||||
void pem_password_setup(const char *auth_file);
|
||||
|
||||
/* Enables the use of user/password authentication */
|
||||
void enable_auth_user_pass();
|
||||
void enable_auth_user_pass(void);
|
||||
|
||||
/*
|
||||
* Setup authentication username and password. If auth_file is given, use the
|
||||
|
@ -49,7 +49,7 @@ static const char *const props = XKEY_PROV_PROPS;
|
||||
XKEY_EXTERNAL_SIGN_fn xkey_management_sign;
|
||||
|
||||
static void
|
||||
print_openssl_errors()
|
||||
print_openssl_errors(void)
|
||||
{
|
||||
unsigned long e;
|
||||
while ((e = ERR_get_error()))
|
||||
|
@ -155,7 +155,7 @@ static int
|
||||
keymgmt_import_helper(XKEY_KEYDATA *key, const OSSL_PARAM params[]);
|
||||
|
||||
static XKEY_KEYDATA *
|
||||
keydata_new()
|
||||
keydata_new(void)
|
||||
{
|
||||
xkey_dmsg(D_XKEY, "entry");
|
||||
|
||||
|
@ -33,7 +33,7 @@
|
||||
* methods
|
||||
*/
|
||||
static inline void
|
||||
openvpn_unit_test_setup()
|
||||
openvpn_unit_test_setup(void)
|
||||
{
|
||||
assert_int_equal(setvbuf(stdout, NULL, _IONBF, BUFSIZ), 0);
|
||||
assert_int_equal(setvbuf(stderr, NULL, _IONBF, BUFSIZ), 0);
|
||||
|
@ -134,7 +134,7 @@ struct env_set *es;
|
||||
|
||||
/* Fill-in certs[] array */
|
||||
void
|
||||
init_cert_data()
|
||||
init_cert_data(void)
|
||||
{
|
||||
struct test_cert certs_local[] = {
|
||||
{cert1, key1, cname1, "OVPN TEST CA1", "OVPN Test Cert 1", {0}, NULL},
|
||||
|
@ -119,7 +119,7 @@ load_pubkey(const char *pem)
|
||||
}
|
||||
|
||||
static void
|
||||
init_test()
|
||||
init_test(void)
|
||||
{
|
||||
openvpn_unit_test_setup();
|
||||
prov[0] = OSSL_PROVIDER_load(NULL, "default");
|
||||
@ -135,7 +135,7 @@ init_test()
|
||||
}
|
||||
|
||||
static void
|
||||
uninit_test()
|
||||
uninit_test(void)
|
||||
{
|
||||
for (size_t i = 0; i < _countof(prov); i++)
|
||||
{
|
||||
|
@ -81,7 +81,7 @@ const char *unittest_cert = "-----BEGIN CERTIFICATE-----\n"
|
||||
"-----END CERTIFICATE-----\n";
|
||||
|
||||
static const char *
|
||||
get_tmp_dir()
|
||||
get_tmp_dir(void)
|
||||
{
|
||||
const char *ret;
|
||||
#ifdef _WIN32
|
||||
|
@ -9,7 +9,7 @@
|
||||
#include "utils.h"
|
||||
|
||||
static void
|
||||
pass_any_null_param__returns_null()
|
||||
pass_any_null_param__returns_null(void **state)
|
||||
{
|
||||
|
||||
char DUMMY[] = "DUMMY";
|
||||
@ -20,7 +20,7 @@ pass_any_null_param__returns_null()
|
||||
}
|
||||
|
||||
static void
|
||||
pass_any_empty_string__returns_null()
|
||||
pass_any_empty_string__returns_null(void **state)
|
||||
{
|
||||
|
||||
char DUMMY[] = "DUMMY";
|
||||
@ -32,7 +32,7 @@ pass_any_empty_string__returns_null()
|
||||
}
|
||||
|
||||
static void
|
||||
replace_single_char__one_time__match_is_replaced()
|
||||
replace_single_char__one_time__match_is_replaced(void **state)
|
||||
{
|
||||
char *replaced = searchandreplace("X", "X", "Y");
|
||||
|
||||
@ -43,7 +43,7 @@ replace_single_char__one_time__match_is_replaced()
|
||||
}
|
||||
|
||||
static void
|
||||
replace_single_char__multiple_times__match_all_matches_are_replaced()
|
||||
replace_single_char__multiple_times__match_all_matches_are_replaced(void **state)
|
||||
{
|
||||
char *replaced = searchandreplace("XaX", "X", "Y");
|
||||
|
||||
@ -54,7 +54,7 @@ replace_single_char__multiple_times__match_all_matches_are_replaced()
|
||||
}
|
||||
|
||||
static void
|
||||
replace_longer_text__multiple_times__match_all_matches_are_replaced()
|
||||
replace_longer_text__multiple_times__match_all_matches_are_replaced(void **state)
|
||||
{
|
||||
char *replaced = searchandreplace("XXaXX", "XX", "YY");
|
||||
|
||||
@ -65,7 +65,7 @@ replace_longer_text__multiple_times__match_all_matches_are_replaced()
|
||||
}
|
||||
|
||||
static void
|
||||
pattern_not_found__returns_original()
|
||||
pattern_not_found__returns_original(void **state)
|
||||
{
|
||||
char *replaced = searchandreplace("abc", "X", "Y");
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user