From e0688509c3052979f4e48b12134c7e81bc8499a4 Mon Sep 17 00:00:00 2001 From: Gabriele Gristina Date: Sun, 27 Nov 2016 23:59:34 +0100 Subject: [PATCH] Fix kernel build warnings (no previous prototypes and/or incompatible function parameters ... --- OpenCL/m11600.cl | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/OpenCL/m11600.cl b/OpenCL/m11600.cl index 5eb7226a3..8057a6ae7 100644 --- a/OpenCL/m11600.cl +++ b/OpenCL/m11600.cl @@ -701,7 +701,7 @@ __constant u32 rcon[] = 0x1b000000, 0x36000000, }; -void AES256_ExpandKey (u32 *userkey, u32 *rek, __local u32 *s_te0, __local u32 *s_te1, __local u32 *s_te2, __local u32 *s_te3, __local u32 *s_te4) +static void AES256_ExpandKey (u32 *userkey, u32 *rek, __local u32 *s_te0, __local u32 *s_te1, __local u32 *s_te2, __local u32 *s_te3, __local u32 *s_te4) { rek[0] = userkey[0]; rek[1] = userkey[1]; @@ -757,7 +757,7 @@ void AES256_ExpandKey (u32 *userkey, u32 *rek, __local u32 *s_te0, __local u32 * } } -void AES256_InvertKey (u32 *rdk, __local u32 *s_td0, __local u32 *s_td1, __local u32 *s_td2, __local u32 *s_td3, __local u32 *s_td4, __local u32 *s_te0, __local u32 *s_te1, __local u32 *s_te2, __local u32 *s_te3, __local u32 *s_te4) +static void AES256_InvertKey (u32 *rdk, __local u32 *s_td0, __local u32 *s_td1, __local u32 *s_td2, __local u32 *s_td3, __local u32 *s_td4, __local u32 *s_te0, __local u32 *s_te1, __local u32 *s_te2, __local u32 *s_te3, __local u32 *s_te4) { for (u32 i = 0, j = 56; i < j; i += 4, j -= 4) { @@ -797,7 +797,7 @@ void AES256_InvertKey (u32 *rdk, __local u32 *s_td0, __local u32 *s_td1, __local } } -void AES256_decrypt (const u32 *in, u32 *out, const u32 *rdk, __local u32 *s_td0, __local u32 *s_td1, __local u32 *s_td2, __local u32 *s_td3, __local u32 *s_td4) +static void AES256_decrypt (const u32 *in, u32 *out, const u32 *rdk, __local u32 *s_td0, __local u32 *s_td1, __local u32 *s_td2, __local u32 *s_td3, __local u32 *s_td4) { u32 s0 = in[0] ^ rdk[0]; u32 s1 = in[1] ^ rdk[1]; @@ -907,7 +907,7 @@ __constant u32 k_sha256[64] = SHA256C3c, SHA256C3d, SHA256C3e, SHA256C3f, }; -void sha256_transform (const u32 w[16], u32 digest[8]) +static void sha256_transform (const u32 w[16], u32 digest[8]) { u32 a = digest[0]; u32 b = digest[1]; @@ -1063,7 +1063,7 @@ __constant u32 crc32tab[0x100] = 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d }; -u32 round_crc32 (u32 a, const u32 v) +static u32 round_crc32 (u32 a, const u32 v) { const u32 k = (a ^ v) & 0xff; @@ -1076,7 +1076,7 @@ u32 round_crc32 (u32 a, const u32 v) return a; } -u32 crc32 (const u32 w[16], const u32 pw_len, const u32 iv) +static u32 crc32 (const u32 w[16], const u32 pw_len, const u32 iv) { u32 a = iv ^ ~0; @@ -1096,7 +1096,7 @@ u32 crc32 (const u32 w[16], const u32 pw_len, const u32 iv) return ~a; } -u32 memcat8c_be (u32 block[16], const u32 block_len, const u32 append, const u32 append_len, u32 digest[8]) +static u32 memcat8c_be (u32 block[16], const u32 block_len, const u32 append, const u32 append_len, u32 digest[8]) { const u32 mod = block_len & 3; const u32 div = block_len / 4; @@ -1199,7 +1199,7 @@ u32 memcat8c_be (u32 block[16], const u32 block_len, const u32 append, const u32 return new_len; } -u32 memcat64c_be (u32 block[16], const u32 block_len, const u32 append[16], const u32 append_len, u32 digest[8]) +static u32 memcat64c_be (u32 block[16], const u32 block_len, const u32 append[16], const u32 append_len, u32 digest[8]) { const u32 mod = block_len & 3; const u32 div = block_len / 4;