|
10 | 10 | * exceed INITIAL_EXPBUFFER_SIZE (currently 256 bytes).
|
11 | 11 | *
|
12 | 12 | * IDENTIFICATION
|
13 |
| - * $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-auth.c,v 1.77 2003/05/15 16:35:30 momjian Exp $ |
| 13 | + * $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-auth.c,v 1.78 2003/05/16 04:58:03 tgl Exp $ |
14 | 14 | *
|
15 | 15 | *-------------------------------------------------------------------------
|
16 | 16 | */
|
@@ -386,10 +386,10 @@ pg_krb5_sendauth(char *PQerrormsg, int sock,
|
386 | 386 | /*
|
387 | 387 | * libpq uses a non-blocking socket. But kerberos needs a blocking
|
388 | 388 | * socket, and we have to block somehow to do mutual authentication
|
389 |
| - * anyway. So we temporarily make it blocking. Win32 doesn't support this. |
| 389 | + * anyway. So we temporarily make it blocking. |
390 | 390 | */
|
391 | 391 | flags=fcntl(sock,F_GETFL);
|
392 |
| -if (flags<0||fcntl(sock,F_SETFL,flags& ~O_NONBLOCK))) |
| 392 | +if (flags<0||fcntl(sock,F_SETFL,(long) (flags& ~O_NONBLOCK))) |
393 | 393 | {
|
394 | 394 | snprintf(PQerrormsg,PQERRORMSG_LENGTH,
|
395 | 395 | libpq_gettext("could not set socket to blocking mode: %s\n"),strerror(errno));
|
|