diff options
author | shennetsind <shennetsind@54d463be-8e91-2dee-dedb-b68131a5f0ec> | 2012-02-18 22:30:19 +0000 |
---|---|---|
committer | shennetsind <shennetsind@54d463be-8e91-2dee-dedb-b68131a5f0ec> | 2012-02-18 22:30:19 +0000 |
commit | 9fce00f250ee69541ec4cd3a1c653c3c57111056 (patch) | |
tree | dc122ba0cfc164d0f8c5f59bc6ed86e84368100d | |
parent | e4f1bb413aa609b173707b9e5d960ae0476dab61 (diff) | |
download | hercules-9fce00f250ee69541ec4cd3a1c653c3c57111056.tar.gz hercules-9fce00f250ee69541ec4cd3a1c653c3c57111056.tar.bz2 hercules-9fce00f250ee69541ec4cd3a1c653c3c57111056.tar.xz hercules-9fce00f250ee69541ec4cd3a1c653c3c57111056.zip |
Follow up r15609, fixed gcc warnings
git-svn-id: https://rathena.svn.sourceforge.net/svnroot/rathena/trunk@15610 54d463be-8e91-2dee-dedb-b68131a5f0ec
-rw-r--r-- | src/common/socket.c | 2 | ||||
-rw-r--r-- | src/common/socket.h | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/src/common/socket.c b/src/common/socket.c index fd9534c3b..a98a8cbb1 100644 --- a/src/common/socket.c +++ b/src/common/socket.c @@ -220,7 +220,7 @@ int naddr_ = 0; // # of ip addresses // Maximum packet size in bytes, which the client is able to handle. // Larger packets cause a buffer overflow and stack corruption. // TODO: This value is based on pure observation with newer clients. Replace with the actual buffer size if we ever get our hands on it. -static size_t socket_max_client_packet = 8192; +size_t socket_max_client_packet = 8192; // initial recv buffer size (this will also be the max. size) // biggest known packet: S 0153 <len>.w <emblem data>.?B -> 24x24 256 color .bmp (0153 + len.w + 1618/1654/1756 bytes) diff --git a/src/common/socket.h b/src/common/socket.h index b02e83d36..1328d4b23 100644 --- a/src/common/socket.h +++ b/src/common/socket.h @@ -94,7 +94,7 @@ struct socket_data void* session_data; // stores application-specific data related to the session }; -static size_t socket_max_client_packet; +extern size_t socket_max_client_packet; // Data prototype declaration |