$Log$
+ Revision 590.136 2002/03/11 04:16:20 nbryant
+ warning fixes on sparc-sun-solaris2.8 with gcc 3.0.4, mostly for *printf
+ format strings
+
Revision 590.135 2002/03/11 03:55:24 nbryant
- fixes for building without OpenSSL
- setenv doesn't exist on all systems, use putenv instead
Fri Jul 10 1998 Art Cancro <ajc@uncensored.citadel.org>
* Initial CVS import
+
}
#endif /* HAVE_OPENSSL */
+#if defined(THREADED_CLIENT) && defined(HAVE_OPENSSL)
+static unsigned long id_callback(void) {
+ return pthread_self();
+}
+#endif
/*
* starttls() starts SSL/TLS if possible
#ifdef THREADED_CLIENT
/* OpenSSL requires callbacks for threaded clients */
CRYPTO_set_locking_callback(ssl_lock);
- CRYPTO_set_id_callback(pthread_self);
+ CRYPTO_set_id_callback(id_callback);
/* OpenSSL requires us to do semaphores for threaded clients */
Critters = malloc(CRYPTO_num_locks() * sizeof (pthread_mutex_t *));
/* $Id$ */
+#include <string.h>
#include <unistd.h>
#include <sys/types.h>
#include "sysdep.h"
SSL_CTX *ssl_ctx; /* SSL context */
pthread_mutex_t **SSLCritters; /* Things needing locking */
+static unsigned long id_callback(void) {
+ return pthread_self();
+}
void init_ssl(void)
{
#endif
#endif
CRYPTO_set_locking_callback(ssl_lock);
- CRYPTO_set_id_callback(pthread_self);
+ CRYPTO_set_id_callback(id_callback);
/* Load DH parameters into the context */
dh = DH_new();
*/
void endtls(void)
{
- lprintf(7, "Ending SSL/TLS%s\n");
+ lprintf(7, "Ending SSL/TLS\n");
if (!CC->ssl) {
CC->redirect_ssl = 0;
if (msg->cm_fields['I'] != NULL) {
phree(msg->cm_fields['I']);
}
- sprintf(buf, "%ld.%04x.%04x@%s",
- (long)time(NULL), getpid(), ++serialnum, config.c_fqdn);
+ sprintf(buf, "%ld.%04lx.%04x@%s",
+ (long)time(NULL), (long)getpid(), ++serialnum, config.c_fqdn);
msg->cm_fields['I'] = strdoop(buf);
/*
void artv_export_users_backend(struct usersupp *usbuf, void *data) {
cprintf("user\n");
cprintf("%d\n", usbuf->version);
- cprintf("%d\n", usbuf->uid);
+ cprintf("%ld\n", (long)usbuf->uid);
cprintf("%s\n", usbuf->password);
cprintf("%u\n", usbuf->flags);
cprintf("%ld\n", usbuf->timescalled);
cprintf("%s\n", config.c_fqdn);
cprintf("%s\n", config.c_humannode);
cprintf("%s\n", config.c_phonenum);
- cprintf("%d\n", config.c_bbsuid);
+ cprintf("%ld\n", (long)config.c_bbsuid);
cprintf("%d\n", config.c_creataide);
cprintf("%d\n", config.c_sleeping);
cprintf("%d\n", config.c_initax);
*/
if (drop_root_perms) {
if ((pw = getpwuid(BBSUID)) == NULL)
- lprintf(1, "WARNING: getpwuid(%d): %s\n"
- "Group IDs will be incorrect.\n", BBSUID,
+ lprintf(1, "WARNING: getpwuid(%ld): %s\n"
+ "Group IDs will be incorrect.\n", (long)BBSUID,
strerror(errno));
else {
initgroups(pw->pw_name, pw->pw_gid);
if (setgid(pw->pw_gid))
- lprintf(3, "setgid(%d): %s\n", pw->pw_gid,
+ lprintf(3, "setgid(%ld): %s\n", (long)pw->pw_gid,
strerror(errno));
}
- lprintf(7, "Changing uid to %d\n", BBSUID);
+ lprintf(7, "Changing uid to %ld\n", (long)BBSUID);
if (setuid(BBSUID) != 0) {
lprintf(3, "setuid() failed: %s\n", strerror(errno));
}
if (pipe(pipev)) {
lprintf(1, "pipe failed (%s): denying autologin access for "
- "uid %u\n", strerror(errno), uid);
+ "uid %ld\n", strerror(errno), (long)uid);
return 0;
}
switch (pid = fork()) {
case -1:
lprintf(1, "fork failed (%s): denying autologin access for "
- "uid %u\n", strerror(errno), uid);
+ "uid %ld\n", strerror(errno), (long)uid);
close(pipev[0]);
close(pipev[1]);
return 0;
while (waitpid(pid, &status, 0) == -1)
if (errno != EINTR) {
lprintf(1, "waitpid failed (%s): denying autologin "
- "access for uid %u\n",
- strerror(errno), uid);
+ "access for uid %ld\n",
+ strerror(errno), (long)uid);
return 0;
}
if (WIFEXITED(status) && !WEXITSTATUS(status))