From c5720a93963d3c47fdac1d41b0e2629e927ca63b Mon Sep 17 00:00:00 2001 From: Roland McGrath Date: Sun, 20 Dec 1998 10:24:39 +0000 Subject: 1998-12-20 Roland McGrath * sunrpc/svc_unix.c, sunrpc/clnt_unix.c: Avoid using `struct cmsghdr' and `struct ucred' #ifndef SCM_CREDENTIALS. * sunrpc/publickey.c (getsecretkey): Use `&errno' instead of `__errno_location ()'; means the same, works for Hurd. * sysdeps/mach/hurd/Makefile (subdirs): Don't elide sunrpc. --- sunrpc/clnt_unix.c | 6 ++++++ sunrpc/svc_unix.c | 6 ++++++ 2 files changed, 12 insertions(+) (limited to 'sunrpc') diff --git a/sunrpc/clnt_unix.c b/sunrpc/clnt_unix.c index 923dd8a070..240cdbbce4 100644 --- a/sunrpc/clnt_unix.c +++ b/sunrpc/clnt_unix.c @@ -434,17 +434,21 @@ clntunix_destroy (CLIENT *h) mem_free ((caddr_t) h, sizeof (CLIENT)); } +#ifdef SCM_CREDENTIALS struct cmessage { struct cmsghdr cmsg; struct ucred cmcred; }; +#endif static int __msgread (int sock, void *buf, size_t cnt) { struct iovec iov[1]; struct msghdr msg; +#ifdef SCM_CREDENTIALS struct cmessage cm; +#endif iov[0].iov_base = buf; iov[0].iov_len = cnt; @@ -453,8 +457,10 @@ __msgread (int sock, void *buf, size_t cnt) msg.msg_iovlen = 1; msg.msg_name = NULL; msg.msg_namelen = 0; +#ifdef SCM_CREDENTIALS msg.msg_control = (caddr_t)&cm; msg.msg_controllen = sizeof(struct cmessage); +#endif msg.msg_flags = 0; #ifdef SO_PASSCRED diff --git a/sunrpc/svc_unix.c b/sunrpc/svc_unix.c index 7ada8cc86d..0ff26aaaba 100644 --- a/sunrpc/svc_unix.c +++ b/sunrpc/svc_unix.c @@ -280,6 +280,7 @@ svcunix_destroy (SVCXPRT *xprt) mem_free ((caddr_t) xprt, sizeof (SVCXPRT)); } +#ifdef SCM_CREDENTIALS struct cmessage { struct cmsghdr cmsg; struct ucred cmcred; @@ -289,6 +290,7 @@ struct cmessage { and the rpcgen generated *_svc functions for the daemon are also not thread safe and uses static global variables, it doesn't matter. */ static struct cmessage cm; +#endif static int __msgread (int sock, void *buf, size_t cnt) @@ -303,8 +305,10 @@ __msgread (int sock, void *buf, size_t cnt) msg.msg_iovlen = 1; msg.msg_name = NULL; msg.msg_namelen = 0; +#ifdef SCM_CREDENTIALS msg.msg_control = (caddr_t) &cm; msg.msg_controllen = sizeof (struct cmessage); +#endif msg.msg_flags = 0; #ifdef SO_PASSCRED @@ -443,8 +447,10 @@ svcunix_recv (SVCXPRT *xprt, struct rpc_msg *msg) cd->x_id = msg->rm_xid; /* set up verifiers */ msg->rm_call.cb_verf.oa_flavor = AUTH_UNIX; +#ifdef SCM_CREDENTIALS msg->rm_call.cb_verf.oa_base = (caddr_t) &cm; msg->rm_call.cb_verf.oa_length = sizeof (cm); +#endif return TRUE; } cd->strm_stat = XPRT_DIED; /* XXXX */ -- cgit 1.4.1