diff options
author | stderr64 <stderr64@null.net> | 2024-05-15 22:09:40 +0300 |
---|---|---|
committer | stderr64 <stderr64@null.net> | 2024-05-15 22:09:40 +0300 |
commit | bcb07c7207b1194cf032ed8f0f841b3c3e57367b (patch) | |
tree | 5b06fa8a28af0311e32a9f5fd98eafeaebf8e0b1 /https_response.h | |
parent | 2d22f149180ba28186cf142ec30dc91c841d0328 (diff) | |
download | CWebHook-bcb07c7207b1194cf032ed8f0f841b3c3e57367b.tar.gz CWebHook-bcb07c7207b1194cf032ed8f0f841b3c3e57367b.tar.zst |
Because long long int is bad idea, using int64_t and ssize_t it can at least be expected that the max and minimum values are for each
Diffstat (limited to 'https_response.h')
-rw-r--r-- | https_response.h | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/https_response.h b/https_response.h index 58be84b..ce17197 100644 --- a/https_response.h +++ b/https_response.h @@ -19,28 +19,28 @@ int send_response( server_socket_t *sdata, server_config_t *scf, webhooks_data_t clear_request_copy( hdata ); clear_request_data( hdata ); log_write( scf, lfd, "Error: failed to read headers" ); - if ( (long long int)SSL_write(sdata->tls_session, HTTP_ERROR_HEADERS, (size_t)strlen(HTTP_ERROR_HEADERS)) <= 0 ) + if ( (int64_t)SSL_write(sdata->tls_session, HTTP_ERROR_HEADERS, (size_t)strlen(HTTP_ERROR_HEADERS)) <= 0 ) return RES_FAILED; return RES_SUCCESS; } if ( strcmp((const char*)hdata->request_method, "GET") != 0 && strcmp((const char*)hdata->request_method, "POST") != 0 ){ clear_request_copy( hdata ); clear_request_data( hdata ); - if ( (long long int)SSL_write(sdata->tls_session, HTTP_DISALLOWED_METHOD, (size_t)strlen(HTTP_DISALLOWED_METHOD)) <= 0 ) + if ( (int64_t)SSL_write(sdata->tls_session, HTTP_DISALLOWED_METHOD, (size_t)strlen(HTTP_DISALLOWED_METHOD)) <= 0 ) return RES_FAILED; return RES_SUCCESS; } if ( hdata->request_body == NULL || (uint64_t)strlen(hdata->request_body) <= 0 ){ clear_request_copy( hdata ); clear_request_data( hdata ); - if ( (long long int)SSL_write(sdata->tls_session, HTTP_UNAUTHORIZED, (size_t)strlen(HTTP_UNAUTHORIZED)) <= 0 ) + if ( (int64_t)SSL_write(sdata->tls_session, HTTP_UNAUTHORIZED, (size_t)strlen(HTTP_UNAUTHORIZED)) <= 0 ) return RES_FAILED; return RES_UNAUTHORIZED; } if ( check_password(hdata->request_body, scf->server_password->valuestring) != AUTH_SUCCESS ){ clear_request_copy( hdata ); clear_request_data( hdata ); - if ( (long long int)SSL_write(sdata->tls_session, HTTP_UNAUTHORIZED, (size_t)strlen(HTTP_UNAUTHORIZED)) <= 0 ) + if ( (int64_t)SSL_write(sdata->tls_session, HTTP_UNAUTHORIZED, (size_t)strlen(HTTP_UNAUTHORIZED)) <= 0 ) return RES_FAILED; return RES_UNAUTHORIZED; } @@ -51,7 +51,7 @@ int send_response( server_socket_t *sdata, server_config_t *scf, webhooks_data_t r_size = 0; free_wh_output( wdt ); wh_exec_res = NULL; - if ( (long long int)SSL_write(sdata->tls_session, HTTP_MEM_ALLOC_ERROR, (size_t)strlen(HTTP_MEM_ALLOC_ERROR)) <= 0 ) + if ( (int64_t)SSL_write(sdata->tls_session, HTTP_MEM_ALLOC_ERROR, (size_t)strlen(HTTP_MEM_ALLOC_ERROR)) <= 0 ) return RES_FAILED; return RES_SUCCESS; } @@ -60,11 +60,11 @@ int send_response( server_socket_t *sdata, server_config_t *scf, webhooks_data_t r_size = 0; free_wh_output( wdt ); wh_exec_res = NULL; - if ( (long long int)SSL_write(sdata->tls_session, HTTP_MEM_WRITE_ERROR, (size_t)strlen(HTTP_MEM_WRITE_ERROR)) <= 0 ) + if ( (int64_t)SSL_write(sdata->tls_session, HTTP_MEM_WRITE_ERROR, (size_t)strlen(HTTP_MEM_WRITE_ERROR)) <= 0 ) return RES_FAILED; return RES_SUCCESS; } - if ( (long long int)SSL_write(sdata->tls_session, sdata->send_buffer, r_size) <= 0 ){ + if ( (int64_t)SSL_write(sdata->tls_session, sdata->send_buffer, r_size) <= 0 ){ free( sdata->send_buffer ); free_wh_output( wdt ); wh_exec_res = NULL; |