|
10 | 10 | * exceed INITIAL_EXPBUFFER_SIZE (currently 256 bytes). |
11 | 11 | * |
12 | 12 | * IDENTIFICATION |
13 | | - * $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-auth.c,v 1.77 2003/05/15 16:35:30 momjian Exp $ |
| 13 | + * $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-auth.c,v 1.78 2003/05/16 04:58:03 tgl Exp $ |
14 | 14 | * |
15 | 15 | *------------------------------------------------------------------------- |
16 | 16 | */ |
@@ -386,10 +386,10 @@ pg_krb5_sendauth(char *PQerrormsg, int sock, |
386 | 386 | /* |
387 | 387 | * libpq uses a non-blocking socket. But kerberos needs a blocking |
388 | 388 | * socket, and we have to block somehow to do mutual authentication |
389 | | - * anyway. So we temporarily make it blocking. Win32 doesn't support this. |
| 389 | + * anyway. So we temporarily make it blocking. |
390 | 390 | */ |
391 | 391 | flags=fcntl(sock,F_GETFL); |
392 | | -if (flags<0||fcntl(sock,F_SETFL,flags& ~O_NONBLOCK))) |
| 392 | +if (flags<0||fcntl(sock,F_SETFL,(long) (flags& ~O_NONBLOCK))) |
393 | 393 | { |
394 | 394 | snprintf(PQerrormsg,PQERRORMSG_LENGTH, |
395 | 395 | libpq_gettext("could not set socket to blocking mode: %s\n"),strerror(errno)); |
|