aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--include/asterisk/manager.h4
-rw-r--r--main/manager.c14
2 files changed, 9 insertions, 9 deletions
diff --git a/include/asterisk/manager.h b/include/asterisk/manager.h
index 45f2b51fc..e654b7a58 100644
--- a/include/asterisk/manager.h
+++ b/include/asterisk/manager.h
@@ -157,7 +157,7 @@ int ast_manager_unregister( char *action );
* \retval 1 if the session has the permission mask capabilities
* \retval 0 otherwise
*/
-int astman_verify_session_readpermissions(unsigned long ident, int perm);
+int astman_verify_session_readpermissions(uint32_t ident, int perm);
/*!
* \brief Verify a session's write permissions against a permission mask.
@@ -166,7 +166,7 @@ int astman_verify_session_readpermissions(unsigned long ident, int perm);
* \retval 1 if the session has the permission mask capabilities, otherwise 0
* \retval 0 otherwise
*/
-int astman_verify_session_writepermissions(unsigned long ident, int perm);
+int astman_verify_session_writepermissions(uint32_t ident, int perm);
/*! \brief External routines may send asterisk manager events this way
* \param category Event category, matches manager authorization
diff --git a/main/manager.c b/main/manager.c
index 47eb6ff10..82cf5647c 100644
--- a/main/manager.c
+++ b/main/manager.c
@@ -154,7 +154,7 @@ struct mansession {
int inuse; /*!< number of HTTP sessions using this entry */
int needdestroy; /*!< Whether an HTTP session should be destroyed */
pthread_t waiting_thread; /*!< Sleeping thread using this descriptor */
- unsigned long managerid; /*!< Unique manager identifier, 0 for AMI sessions */
+ uint32_t managerid; /*!< Unique manager identifier, 0 for AMI sessions */
time_t sessionstart; /*!< Session start time */
time_t sessiontimeout; /*!< Session timeout if HTTP */
char username[80]; /*!< Logged in username */
@@ -3209,7 +3209,7 @@ static char *contenttype[] = {
* the value of the mansession_id cookie (0 is not valid and means
* a session on the AMI socket).
*/
-static struct mansession *find_session(unsigned long ident)
+static struct mansession *find_session(uint32_t ident)
{
struct mansession *s;
@@ -3230,7 +3230,7 @@ static struct mansession *find_session(unsigned long ident)
return s;
}
-int astman_verify_session_readpermissions(unsigned long ident, int perm)
+int astman_verify_session_readpermissions(uint32_t ident, int perm)
{
int result = 0;
struct mansession *s;
@@ -3249,7 +3249,7 @@ int astman_verify_session_readpermissions(unsigned long ident, int perm)
return result;
}
-int astman_verify_session_writepermissions(unsigned long ident, int perm)
+int astman_verify_session_writepermissions(uint32_t ident, int perm)
{
int result = 0;
struct mansession *s;
@@ -3504,7 +3504,7 @@ static struct ast_str *generic_http_callback(enum output_format format,
char **title, int *contentlength)
{
struct mansession *s = NULL;
- unsigned long ident = 0; /* invalid, so find_session will fail if not set through the cookie */
+ uint32_t ident = 0;
int blastaway = 0;
struct ast_variable *v;
char template[] = "/tmp/ast-http-XXXXXX"; /* template for temporary file */
@@ -3515,7 +3515,7 @@ static struct ast_str *generic_http_callback(enum output_format format,
for (v = params; v; v = v->next) {
if (!strcasecmp(v->name, "mansession_id")) {
- sscanf(v->value, "%lx", &ident);
+ sscanf(v->value, "%x", &ident);
break;
}
}
@@ -3582,7 +3582,7 @@ static struct ast_str *generic_http_callback(enum output_format format,
ast_str_append(&out, 0,
"Content-type: text/%s\r\n"
"Cache-Control: no-cache;\r\n"
- "Set-Cookie: mansession_id=\"%08lx\"; Version=\"1\"; Max-Age=%d\r\n"
+ "Set-Cookie: mansession_id=\"%08x\"; Version=\"1\"; Max-Age=%d\r\n"
"\r\n",
contenttype[format],
s->managerid, httptimeout);