* @param buf the buffer to be encrypted and sent
* @param len the length of \a buf
*
- * Check if encrytion is available. If yes, encrypt the given buffer. Send out
+ * Check if encrytpion is available. If yes, encrypt the given buffer. Send out
* the buffer, encrypted or not, and try to resend the remaing part in case of
* short writes.
*
* @param buf the buffer to write the decrypted data to
* @param size the size of @param buf
*
- * Receive at most \a size bytes from filedescriptor fd. If encrytion is
+ * Receive at most \a size bytes from filedescriptor fd. If encryption is
* available, decrypt the received buffer.
*
* @return the number of bytes received on success. On receive errors, -E_RECV
/**
* paraslash's wrapper around the accept system call
*
- * @param fd the listening socket
- * @param addr structure which is filled in with the address of the peer socket
- * @param size should contain the size of the structure pointed to by \a addr
+ * \param fd the listening socket
+ * \param addr structure which is filled in with the address of the peer socket
+ * \param size should contain the size of the structure pointed to by \a addr
*
* \sa accept(2).
*/
{
int new_fd;
- new_fd = accept(fd, (struct sockaddr *) addr, &size);
- return new_fd == -1? -E_ACCEPT : new_fd;
+ do
+ new_fd = accept(fd, (struct sockaddr *) addr, &size);
+ while (new_fd < 0 && errno == EINTR);
+ return new_fd < 0? -E_ACCEPT : new_fd;
}
static int setserversockopts(int socket_fd)
}
#ifndef HAVE_UCRED
- struct ucred {
- uid_t uid, pid, gid;
-};
ssize_t send_cred_buffer(int sock, char *buf)
{
return send_buffer(sock, buf);