comparison libpurple/sslconn.h @ 24065:85bed17fe5c1

The variable we use to keep track of the watcher of the ssl connection should be unsigned. This isn't really a problem in Pidgin, where we use glib's mainloop and GIOChannels because glib starts assigning the handle IDs sequentially starting from 1. But if an eventloop implementation ever returns a handle ID greater than the largest possible signed integer (2,147,483,647) then we won't be able to remove the watcher because purple_ssl_close() in sslconn.c only removes it if inpa > 0, and since it interprets inpa as a signed value then handles over 2,147,483,647 appear as negative numbers. I stumbled upon this when playing around with libevent, which can use epoll. My implementation generated a random handle ID which was sometimes greater than 2,147,483,647. I don't believe this breaks binary compatibility. And I don't think it breaks source compatibility, but I guess it might depend on what compiler you're using.
author Mark Doliner <mark@kingant.net>
date Thu, 04 Sep 2008 18:04:29 +0000
parents fa3c4c5dea66
children 8282911d5e17
comparison
equal deleted inserted replaced
24064:a0381a68ceef 24065:85bed17fe5c1
65 65
66 /** File descriptor used to refer to the socket */ 66 /** File descriptor used to refer to the socket */
67 int fd; 67 int fd;
68 /** Glib event source ID; used to refer to the received data callback 68 /** Glib event source ID; used to refer to the received data callback
69 * in the glib eventloop */ 69 * in the glib eventloop */
70 int inpa; 70 guint inpa;
71 /** Data related to the underlying TCP connection */ 71 /** Data related to the underlying TCP connection */
72 PurpleProxyConnectData *connect_data; 72 PurpleProxyConnectData *connect_data;
73 73
74 /** Internal connection data managed by the SSL backend (GnuTLS/LibNSS/whatever) */ 74 /** Internal connection data managed by the SSL backend (GnuTLS/LibNSS/whatever) */
75 void *private_data; 75 void *private_data;