<AdditionalIncludeDirectories>%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
<FunctionLevelLinking>true</FunctionLevelLinking>
<TreatWarningAsError>false</TreatWarningAsError>
- <DisableSpecificWarnings>4711;4574;4100;4127;4668;4255;4706;4710;4820;4090</DisableSpecificWarnings>
+ <DisableSpecificWarnings>4711;4574;4100;4127;4668;4255;4706;4710;4820;4090;4702</DisableSpecificWarnings>
</ClCompile>
<Link>
<TargetMachine>MachineX86</TargetMachine>
<WarningLevel>EnableAllWarnings</WarningLevel>
<FunctionLevelLinking>true</FunctionLevelLinking>
<TreatWarningAsError>false</TreatWarningAsError>
- <DisableSpecificWarnings>4711;4574;4100;4127;4668;4255;4706;4710;4820;4090</DisableSpecificWarnings>
+ <DisableSpecificWarnings>4711;4574;4100;4127;4668;4255;4706;4710;4820;4090;4702</DisableSpecificWarnings>
</ClCompile>
<Link>
<SubSystem>Windows</SubSystem>
<ClCompile Include="crypt\aestab.c" />
<ClCompile Include="crypt\aes_modes.c" />
<ClCompile Include="crypt\sha2.c" />
- <ClCompile Include="crypt\twofish.c" />
- <ClCompile Include="crypt\twofish_cfb.c" />
<ClCompile Include="src\cJSON.c" />
<ClCompile Include="src\cJSON_Utils.c" />
<ClCompile Include="src\ks.c" />
<ClInclude Include="crypt\brg_endian.h" />
<ClInclude Include="crypt\brg_types.h" />
<ClInclude Include="crypt\sha2.h" />
- <ClInclude Include="crypt\twofish.h" />
<ClInclude Include="src\include\ks.h" />
<ClInclude Include="src\include\ks_acl.h" />
<ClInclude Include="src\include\ks_base64.h" />
used += snprintf(buf + used - 1, sizeof(buf) - used, "#%d ", (int32_t)ks_thread_self_id());
}
if (ks_log_prefix & KS_LOG_PREFIX_FILE) {
- used += snprintf(buf + used - 1, sizeof(buf) - used, fp);
+ used += snprintf(buf + used - 1, sizeof(buf) - used, "%s", fp);
if (ks_log_prefix & KS_LOG_PREFIX_LINE) {
used += snprintf(buf + used - 1, sizeof(buf) - used, ":%d", line);
}
used += snprintf(buf + used - 1, sizeof(buf) - used, "%s() ", func);
}
- used += snprintf(buf + used - 1, sizeof(buf) - used, data);
+ used += snprintf(buf + used - 1, sizeof(buf) - used, "%s", data);
//fprintf(stderr, "[%s] %s:%d %s() %s", LEVEL_NAMES[level], fp, line, func, data);
- fprintf(stderr, buf);
+ fprintf(stderr, "%s", buf);
free(data);
}
/* the old way didnt make sure that variable values were used for the name hunt
* and didnt ensure that only a full match of the variable name was used
*/
+ ks_assert(buflen > 0);
do {
if(!strncmp(p,name,strlen(name)) && *(p+strlen(name))==':') break;
}
if (v && e) {
- int cplen;
+ size_t cplen;
ks_size_t len = e - v;
if (len > buflen - 1) {
- cplen = buflen -1;
+ cplen = buflen - 1;
} else {
cplen = len;
}
}
}
- if (bytes < 0 || bytes > kws->buflen -1) {
+ if (bytes < 0 || ((ks_size_t)bytes) > kws->buflen - 1) {
goto err;
}
goto err;
}
- kws->uri = ks_pool_alloc(kws->pool, (e-p) + 1);
+ kws->uri = ks_pool_alloc(kws->pool, (unsigned long)(e-p) + 1);
strncpy(kws->uri, p, e-p);
*(kws->uri + (e-p)) = '\0';
KS_DECLARE(ks_ssize_t) kws_raw_read(kws_t *kws, void *data, ks_size_t bytes, int block)
{
- ks_ssize_t r;
+ int r;
int err = 0;
kws->x++;
if (kws->ssl) {
do {
- r = SSL_read(kws->ssl, data, bytes);
+ r = SSL_read(kws->ssl, data, (int)bytes);
if (r == -1) {
err = SSL_get_error(kws->ssl, r);
do {
- r = recv(kws->sock, data, bytes, 0);
+ r = recv(kws->sock, data, (int)bytes, 0);
if (r == -1) {
if (!block && ks_errno_is_blocking(ks_errno())) {
KS_DECLARE(ks_ssize_t) kws_raw_write(kws_t *kws, void *data, ks_size_t bytes)
{
- ks_ssize_t r;
+ int r;
int sanity = WS_WRITE_SANITY;
int ssl_err = 0;
ks_size_t wrote = 0;
if (kws->ssl) {
do {
- r = SSL_write(kws->ssl, (void *)((unsigned char *)data + wrote), bytes - wrote);
+ r = SSL_write(kws->ssl, (void *)((unsigned char *)data + wrote), (int)(bytes - wrote));
if (r > 0) {
wrote += r;
}
do {
- r = send(kws->sock, (void *)((unsigned char *)data + wrote), bytes - wrote, 0);
+ r = send(kws->sock, (void *)((unsigned char *)data + wrote), (int)(bytes - wrote), 0);
if (r > 0) {
wrote += r;
kws->ssl = SSL_new(kws->ssl_ctx);
assert(kws->ssl);
- SSL_set_fd(kws->ssl, kws->sock);
+ SSL_set_fd(kws->ssl, (int)kws->sock);
}
do {
kws->ssl = SSL_new(kws->ssl_ctx);
assert(kws->ssl);
- SSL_set_fd(kws->ssl, kws->sock);
+ SSL_set_fd(kws->ssl, (int)kws->sock);
}
do {
kws->buflen = 1024 * 64;
kws->bbuflen = kws->buflen;
- kws->buffer = ks_pool_alloc(kws->pool, kws->buflen);
- kws->bbuffer = ks_pool_alloc(kws->pool, kws->bbuflen);
+ kws->buffer = ks_pool_alloc(kws->pool, (unsigned long)kws->buflen);
+ kws->bbuffer = ks_pool_alloc(kws->pool, (unsigned long)kws->bbuflen);
//printf("init %p %ld\n", (void *) kws->bbuffer, kws->bbuflen);
//memset(kws->buffer, 0, kws->buflen);
//memset(kws->bbuffer, 0, kws->bbuflen);
if (kws->plen == 127) {
uint64_t *u64;
- int more = 0;
+ ks_ssize_t more = 0;
need += 8;
//*oc = WSOC_CLOSE;
//return kws_close(kws, WS_PROTO_ERR);
- more = kws_raw_read(kws, kws->buffer + kws->datalen, need - kws->datalen, WS_BLOCK);
+ more = kws_raw_read(kws, kws->buffer + kws->datalen, (int)(need - kws->datalen), WS_BLOCK);
if (more < 0 || more < need - kws->datalen) {
*oc = WSOC_CLOSE;
return kws_close(kws, WS_NONE);
}
- blen = kws->body - kws->bbuffer;
+ blen = (int)(kws->body - kws->bbuffer);
if (need + blen > (ks_ssize_t)kws->bbuflen) {
void *tmp;
kws->bbuflen = need + blen + kws->rplen;
- if ((tmp = ks_pool_resize(kws->pool, kws->bbuffer, kws->bbuflen))) {
+ if ((tmp = ks_pool_resize(kws->pool, kws->bbuffer, (unsigned long)kws->bbuflen))) {
kws->bbuffer = tmp;
} else {
abort();
void *tmp;
kws->write_buffer_len = hlen + bytes + 1;
- if ((tmp = ks_pool_resize(kws->pool, kws->write_buffer, kws->write_buffer_len))) {
+ if ((tmp = ks_pool_resize(kws->pool, kws->write_buffer, (unsigned long)kws->write_buffer_len))) {
kws->write_buffer = tmp;
} else {
abort();