X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=miscutil.c;h=858f1fe687735b2f1c682b1477ca601195fde252;hp=5167546d30ef0cbd081c0a13ecc1840ec09546aa;hb=0d147e08556401dedba5c2f1866f7ed1e5e2d472;hpb=1ec73e0ea959e24fecfea2e5cbd00518f5d582d1 diff --git a/miscutil.c b/miscutil.c index 5167546d..858f1fe6 100644 --- a/miscutil.c +++ b/miscutil.c @@ -1,4 +1,4 @@ -const char miscutil_rcs[] = "$Id: miscutil.c,v 1.43 2006/09/23 13:26:38 roro Exp $"; +const char miscutil_rcs[] = "$Id: miscutil.c,v 1.46 2007/01/18 15:03:20 fabiankeil Exp $"; /********************************************************************* * * File : $Source: /cvsroot/ijbswa/current/miscutil.c,v $ @@ -9,13 +9,21 @@ const char miscutil_rcs[] = "$Id: miscutil.c,v 1.43 2006/09/23 13:26:38 roro Exp * These are each too small to deserve their own file * but don't really fit in any other file. * - * Copyright : Written by and Copyright (C) 2001 the SourceForge - * Privoxy team. http://www.privoxy.org/ + * Copyright : Written by and Copyright (C) 2001-2007 + * the SourceForge Privoxy team. http://www.privoxy.org/ * * Based on the Internet Junkbuster originally written * by and Copyright (C) 1997 Anonymous Coders and * Junkbusters Corporation. http://www.junkbusters.com * + * The timegm replacement function was taken from GnuPG, + * Copyright (C) 2004 Free Software Foundation, Inc. + * + * The snprintf replacement function is written by + * Mark Martinec who also holds the copyright. It can be + * used under the terms of the GPL or the terms of the + * "Frontier Artistic License". + * * This program is free software; you can redistribute it * and/or modify it under the terms of the GNU General * Public License as published by the Free Software @@ -36,6 +44,19 @@ const char miscutil_rcs[] = "$Id: miscutil.c,v 1.43 2006/09/23 13:26:38 roro Exp * * Revisions : * $Log: miscutil.c,v $ + * Revision 1.46 2007/01/18 15:03:20 fabiankeil + * Don't include replacement timegm() if + * putenv() or tzset() isn't available. + * + * Revision 1.45 2006/12/26 17:31:41 fabiankeil + * Mutex protect rand() if POSIX threading + * is used, warn the user if that's not possible + * and stop using it on _WIN32 where it could + * cause crashes. + * + * Revision 1.44 2006/11/07 12:46:43 fabiankeil + * Silence compiler warning on NetBSD 3.1. + * * Revision 1.43 2006/09/23 13:26:38 roro * Replace TABs by spaces in source code. * @@ -260,9 +281,9 @@ const char miscutil_rcs[] = "$Id: miscutil.c,v 1.43 2006/09/23 13:26:38 roro Exp #include #include -#ifndef HAVE_TIMEGM +#if !defined(HAVE_TIMEGM) && defined(HAVE_TZSET) && defined(HAVE_PUTENV) #include -#endif /* #ifndef HAVE_TIMEGM */ +#endif /* !defined(HAVE_TIMEGM) && defined(HAVE_TZSET) && defined(HAVE_PUTENV) */ #include "project.h" #include "miscutil.h" @@ -355,7 +376,7 @@ unsigned int hash_string( const char* s ) for ( ; *s; ++s ) { - h = 5 * h + *s; + h = 5 * h + (unsigned int)*s; } return (h); @@ -423,7 +444,7 @@ char *safe_strerror(int err) if (s == NULL) { - sprintf(buf, "(errno = %d)", err); + snprintf(buf, sizeof(buf), "(errno = %d)", err); s = buf; } @@ -1081,30 +1102,42 @@ char * make_path(const char * dir, const char * file) long int pick_from_range(long int range) { long int number; -#ifndef HAVE_RANDOM - unsigned int weak_seed; - - weak_seed = (unsigned int)((unsigned int)time(NULL) | (unsigned int)range); - srand(weak_seed); +#ifdef HAVE_RANDOM + number = random() % range + 1; +#elif defined(FEATURE_PTHREAD) + pthread_mutex_lock(&rand_mutex); + number = rand() % (long int)(range + 1); + pthread_mutex_unlock(&rand_mutex); +#else +#ifdef _WIN32 /* - * Some rand implementations aren't that random and return mostly - * lower numbers. Low entropy doesn't matter for the header times, - * but higher "random" factors are prefered. + * On Windows and mingw32 srand() has to be called in every + * rand()-using thread, but can cause crashes if it's not + * mutex protected. + * + * Currently we don't have mutexes for mingw32, and for + * our purpose this cludge is probably preferable to crashes. */ - number = (rand() * 12345) % (long int)(range + 1); - /* Overflows don't matter either, positive numbers do. */ - if(number<0) - { - number*= -1; - } + log_error(LOG_LEVEL_INFO, "No thread-safe PRNG available? Using weak \'randomization\' factor."); + number = (range + GetCurrentThreadId() % range) / 2; #else - number = random() % range + 1; -#endif /* (ifndef HAVE_RANDOM) */ + /* + * XXX: Which platforms reach this and are there + * better options than just using rand() and hoping + * that it's safe? + */ + log_error(LOG_LEVEL_INFO, "No thread-safe PRNG available? Header time randomization might cause " + "crashes, predictable results or even combine these fine options."); + number = rand() % (long int)(range + 1); +#endif /* def _WIN32 */ + +#endif /* (def HAVE_RANDOM) */ + return (number); } -#ifndef HAVE_TIMEGM +#if !defined(HAVE_TIMEGM) && defined(HAVE_TZSET) && defined(HAVE_PUTENV) /********************************************************************* * * Function : timegm @@ -1152,7 +1185,7 @@ time_t timegm(struct tm *tm) tzset(); return answer; } -#endif /* (ifndef HAVE_TIMEGM) */ +#endif /* !defined(HAVE_TIMEGM) && defined(HAVE_TZSET) && defined(HAVE_PUTENV) */ /*