File ncpfs-hg-commit-429.patch of Package ncpfs

changeset:   429:776dc4052e39
user:        Petr Vandrovec <petr@vandrovec.name>
date:        Sun Jun 05 14:36:28 2005 +0000
files:       ipxdump/ipxparse.c
description:
Remove warnings about shadowing variables in ipxparse.  Also add
__attribute__((packed)) into ipxparse as needed.


diff -r cccdaf2ce097 -r 776dc4052e39 ipxdump/ipxparse.c
--- a/ipxdump/ipxparse.c	Sun Jun 05 14:35:46 2005 +0000
+++ b/ipxdump/ipxparse.c	Sun Jun 05 14:36:28 2005 +0000
@@ -636,43 +636,43 @@ handle_ncp(struct sockaddr_ipx *source,
 			{
 				struct INPUT
 				{
-					u_int16_t proposed_max_size;
-					u_int8_t security_flag;
-				}
-				*i = (struct INPUT *) data;
+					u_int16_t proposed_max_size __attribute__((packed));
+					u_int8_t security_flag __attribute__((packed));
+				} __attribute__((packed))
+				*d = (struct INPUT *) data;
 
 				printf("fn: %-3d\n", rq->function);
 				printf("Get Big Packet NCP Max Packet Size\n");
 				printf("proposed_max_size: %x\n",
-				       ntohs(i->proposed_max_size));
+				       ntohs(d->proposed_max_size));
 				printf("security_flag: %x\n",
-				       i->security_flag);
+				       d->security_flag);
 				break;
 			}
 		case 101:
 			{
 				struct INPUT
 				{
-					u_int32_t local_conn_id;
-					u_int32_t local_max_packet_size;
-					u_int16_t local_target_socket;
-					u_int32_t local_max_send_size;
-					u_int32_t local_max_recv_size;
-				}
-				*i = (struct INPUT *) data;
+					u_int32_t local_conn_id __attribute__((packed));
+					u_int32_t local_max_packet_size __attribute__((packed));
+					u_int16_t local_target_socket __attribute__((packed));
+					u_int32_t local_max_send_size __attribute__((packed));
+					u_int32_t local_max_recv_size __attribute__((packed));
+				} __attribute__((packed))
+				*d = (struct INPUT *) data;
 
 				printf("fn: %-3d\n", rq->function);
 				printf("Packet Burst Connection Request\n");
 				printf("local_conn_id: %x\n",
-				       (u_int32_t)ntohl(i->local_conn_id));
+				       (u_int32_t)ntohl(d->local_conn_id));
 				printf("local_max_packet_size: %x\n",
-				       (u_int32_t)ntohl(i->local_max_packet_size));
+				       (u_int32_t)ntohl(d->local_max_packet_size));
 				printf("local_target_socket: %x\n",
-				       (u_int32_t)ntohl(i->local_target_socket));
+				       (u_int32_t)ntohl(d->local_target_socket));
 				printf("local_max_send_size: %x\n",
-				       (u_int32_t)ntohl(i->local_max_send_size));
+				       (u_int32_t)ntohl(d->local_max_send_size));
 				printf("local_max_recv_size: %x\n",
-				       (u_int32_t)ntohl(i->local_max_recv_size));
+				       (u_int32_t)ntohl(d->local_max_recv_size));
 			}
 			break;
 		case 104:
@@ -700,26 +700,26 @@ handle_ncp(struct sockaddr_ipx *source,
 					{
 						struct INPUT
 						{
-							u_int8_t subfunction_code;
-							u_int32_t fragger_handle;
-							u_int32_t max_fragment_size;
-							u_int32_t message_size;
-							u_int32_t fragment_flag;
-							u_int32_t verb;
-						}
-						*i = (struct INPUT *) data;
+							u_int8_t subfunction_code __attribute__((packed));
+							u_int32_t fragger_handle __attribute__((packed));
+							u_int32_t max_fragment_size __attribute__((packed));
+							u_int32_t message_size __attribute__((packed));
+							u_int32_t fragment_flag __attribute__((packed));
+							u_int32_t verb __attribute__((packed));
+						} __attribute__((packed))
+						*d = (struct INPUT *) data;
 						printf("Send NDS Fragment Request/Reply\n");
 						printf("fragger_handle: %lx\n",
-						       (unsigned long) i->fragger_handle);
+						       (unsigned long) d->fragger_handle);
 						printf("max_fragment_size: %lx\n",
-						       (unsigned long) i->max_fragment_size);
+						       (unsigned long) d->max_fragment_size);
 						printf("message_size: %lx\n",
-						       (unsigned long) i->message_size);
+						       (unsigned long) d->message_size);
 						printf("fragment_flag: %lx\n",
-						       (unsigned long) i->fragment_flag);
-						printf("verb: %d\n", i->verb);
-
-						switch (i->verb)
+						       (unsigned long) d->fragment_flag);
+						printf("verb: %d\n", d->verb);
+
+						switch (d->verb)
 						{
 						case 1:
 							printf("Resolve Name\n");
@@ -1001,9 +1001,9 @@ handle_ncp(struct sockaddr_ipx *source,
 					{
 						struct XDATA
 						{
-							u_int8_t new_directory_handle;
-							u_int8_t access_rights_mask;
-						}
+							u_int8_t new_directory_handle __attribute__((packed));
+							u_int8_t access_rights_mask __attribute__((packed));
+						} __attribute__((packed))
 						*x = (struct XDATA *) data;
 						printf("new_directory_handle: %x\n",
 						     x->new_directory_handle);
@@ -1021,10 +1021,10 @@ handle_ncp(struct sockaddr_ipx *source,
 				{
 					struct XDATA
 					{
-						u_int16_t accepted_max_size;
-						u_int16_t echo_socket;
-						u_int8_t security_flag;
-					}
+						u_int16_t accepted_max_size __attribute__((packed));
+						u_int16_t echo_socket __attribute__((packed));
+						u_int8_t security_flag __attribute__((packed));
+					} __attribute__((packed))
 					*x = (struct XDATA *) data;
 					printf("accepted_max_size: %x\n",
 					       ntohs(x->accepted_max_size));
@@ -1038,9 +1038,9 @@ handle_ncp(struct sockaddr_ipx *source,
 				{
 					struct XDATA
 					{
-						u_int8_t completion_code;
-						u_int32_t remote_target_id;
-						u_int32_t remote_max_packet_size;
+						u_int8_t completion_code __attribute__((packed));
+						u_int32_t remote_target_id __attribute__((packed));
+						u_int32_t remote_max_packet_size __attribute__((packed));
 					}
 					*x = (struct XDATA *) data;
 					printf("completion_code: %x\n",

openSUSE Build Service is sponsored by