X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=miscutil.c;h=fe19582a959b08a5b25b76fe5a322ba8f16d0a43;hb=ea1f72e8806a0f9a8f63e82a5d8019a92009f928;hp=1f6f0c4e7b1b0480b8effcd69abd4765173945a8;hpb=04104131e7e779b2373db118a09e9343a906ffab;p=privoxy.git diff --git a/miscutil.c b/miscutil.c index 1f6f0c4e..fe19582a 100644 --- a/miscutil.c +++ b/miscutil.c @@ -1,4 +1,4 @@ -const char miscutil_rcs[] = "$Id: miscutil.c,v 1.39 2006/07/18 14:48:46 david__schmidt Exp $"; +const char miscutil_rcs[] = "$Id: miscutil.c,v 1.44 2006/11/07 12:46:43 fabiankeil Exp $"; /********************************************************************* * * File : $Source: /cvsroot/ijbswa/current/miscutil.c,v $ @@ -36,6 +36,36 @@ const char miscutil_rcs[] = "$Id: miscutil.c,v 1.39 2006/07/18 14:48:46 david__s * * Revisions : * $Log: miscutil.c,v $ + * Revision 1.44 2006/11/07 12:46:43 fabiankeil + * Silence compiler warning on NetBSD 3.1. + * + * Revision 1.43 2006/09/23 13:26:38 roro + * Replace TABs by spaces in source code. + * + * Revision 1.42 2006/09/09 14:01:45 fabiankeil + * Integrated Oliver Yeoh's domain pattern fix + * to make sure *x matches xx. Closes Patch 1217393 + * and Bug 1170767. + * + * Revision 1.41 2006/08/18 16:03:17 david__schmidt + * Tweak for OS/2 build happiness. + * + * Revision 1.40 2006/08/17 17:15:10 fabiankeil + * - Back to timegm() using GnuPG's replacement if necessary. + * Using mktime() and localtime() could add a on hour offset if + * the randomize factor was big enough to lead to a summer/wintertime + * switch. + * + * - Removed now-useless Privoxy 3.0.3 compatibility glue. + * + * - Moved randomization code into pick_from_range(). + * + * - Changed parse_header_time definition. + * time_t isn't guaranteed to be signed and + * if it isn't, -1 isn't available as error code. + * Changed some variable types in client_if_modified_since() + * because of the same reason. + * * Revision 1.39 2006/07/18 14:48:46 david__schmidt * Reorganizing the repository: swapping out what was HEAD (the old 3.1 branch) * with what was really the latest development (the v_3_0_branch branch) @@ -743,7 +773,7 @@ char *string_toupper(const char *string) while (*q != '\0') { - *p++ = toupper(*q++); + *p++ = toupper((int) *q++); } return result; @@ -861,10 +891,21 @@ int simplematch(char *pattern, char *text) } else if (pat != fallback) { + /* + * Increment text pointer if in char range matching + */ + if (*pat == ']') + { + txt++; + } /* * Wildcard mode && nonmatch beyond fallback: Rewind pattern */ pat = fallback; + /* + * Restart matching from current text pointer + */ + continue; } txt++; } @@ -1043,25 +1084,37 @@ char * make_path(const char * dir, const char * file) long int pick_from_range(long int range) { long int number; -#ifndef HAVE_RANDOM - unsigned int weak_seed; - - weak_seed = (unsigned int)(time(NULL) | range); - srand(weak_seed); +#ifdef HAVE_RANDOM + number = random() % range + 1; +#elif defined(FEATURE_PTHREAD) + pthread_mutex_lock(&rand_mutex); + number = rand() % (long int)(range + 1); + pthread_mutex_unlock(&rand_mutex); +#else +#ifdef _WIN32 /* - * Some rand implementations aren't that random and return mostly - * lower numbers. Low entropy doesn't matter for the header times, - * but higher "random" factors are prefered. + * On Windows and mingw32 srand() has to be called in every + * rand()-using thread, but can cause crashes if it's not + * mutex protected. + * + * Currently we don't have mutexes for mingw32, and for + * our purpose this cludge is probably preferable to crashes. */ - number = (rand() * 12345) % (long int)(range + 1); - /* Overflows don't matter either, positive numbers do. */ - if(number<0) - { - number*= -1; - } + log_error(LOG_LEVEL_INFO, "No thread-safe PRNG available? Using weak \'randomization\' factor."); + number = (range + GetCurrentThreadId() % range) / 2; #else - number = random() % range + 1; -#endif /* (ifndef HAVE_RANDOM) */ + /* + * XXX: Which platforms reach this and are there + * better options than just using rand() and hoping + * that it's safe? + */ + log_error(LOG_LEVEL_INFO, "No thread-safe PRNG available? Header time randomization might cause " + "crashes, predictable results or even combine these fine options."); + number = rand() % (long int)(range + 1); +#endif /* def _WIN32 */ + +#endif /* (def HAVE_RANDOM) */ + return (number); } @@ -1100,7 +1153,7 @@ time_t timegm(struct tm *tm) { strcpy(old_zone,"TZ="); strcat(old_zone,zone); - putenv(old_zone); + putenv(old_zone); } } else