]> ToastFreeware Gitweb - gregoa/bti.git/blobdiff - bti.c
fix up some compiler warnings in read_password
[gregoa/bti.git] / bti.c
diff --git a/bti.c b/bti.c
index fcf2da1bad5f9bfe9c0922b0008790a5b5aa9ddd..1f1279e11f0a975849db8123b336d0a9f4cb5a77 100644 (file)
--- a/bti.c
+++ b/bti.c
@@ -372,21 +372,23 @@ static int send_request(struct session *session)
 
                break;
        case ACTION_USER:
-               sprintf(endpoint, "%s%s%s.xml?page=%d", session->hosturl, user_uri,
-                               session->user, session->page);
+               sprintf(endpoint, "%s%s%s.xml?page=%d", session->hosturl,
+                       user_uri, session->user, session->page);
                curl_easy_setopt(curl, CURLOPT_URL, endpoint);
 
                break;
        case ACTION_REPLIES:
                snprintf(user_password, sizeof(user_password), "%s:%s",
                         session->account, session->password);
-               sprintf(endpoint, "%s%s?page=%d", session->hosturl, replies_uri, session->page);
+               sprintf(endpoint, "%s%s?page=%d", session->hosturl, replies_uri,
+                       session->page);
                curl_easy_setopt(curl, CURLOPT_URL, endpoint);
                curl_easy_setopt(curl, CURLOPT_USERPWD, user_password);
 
                break;
        case ACTION_PUBLIC:
-               sprintf(endpoint, "%s%s?page=%d", session->hosturl, public_uri, session->page);
+               sprintf(endpoint, "%s%s?page=%d", session->hosturl, public_uri,
+                       session->page);
                curl_easy_setopt(curl, CURLOPT_URL, endpoint);
 
                break;
@@ -654,9 +656,10 @@ static char *get_string_from_stdin(void)
        return string;
 }
 
-void read_password(char *buf, size_t len)
+static void read_password(char *buf, size_t len)
 {
        char pwd[80];
+       int retval;
        struct termios old;
        struct termios tp;
 
@@ -668,7 +671,9 @@ void read_password(char *buf, size_t len)
 
        fprintf(stdout, "Enter twitter password: ");
        fflush(stdout);
-       scanf("%79s", pwd);
+       tcflow(0, TCOOFF);
+       retval = scanf("%79s", pwd);
+       tcflow(0, TCOON);
        fprintf(stdout, "\n");
 
        tcsetattr(0, TCSANOW, &old);
@@ -1112,10 +1117,8 @@ int main(int argc, char *argv[], char *envp[])
         * Show the version to make it easier to determine what
         * is going on here
         */
-       if (debug) {
+       if (debug)
                display_version();
-               fprintf(stderr, "%s", session->group);
-       }
 
        if (session->action == ACTION_UNKNOWN) {
                fprintf(stderr, "Unknown action, valid actions are:\n");
@@ -1142,7 +1145,6 @@ int main(int argc, char *argv[], char *envp[])
        if (!session->password) {
                read_password(password, sizeof(password));
                session->password = strdup(password);
-               free(password);
        }
 
        if (session->action == ACTION_UPDATE) {
@@ -1160,7 +1162,8 @@ int main(int argc, char *argv[], char *envp[])
 
                session->tweet = zalloc(strlen(tweet) + 10);
                if (session->bash)
-                       sprintf(session->tweet, "%c %s", getuid() ? '$' : '#', tweet);
+                       sprintf(session->tweet, "%c %s",
+                               getuid() ? '$' : '#', tweet);
                else
                        sprintf(session->tweet, "%s", tweet);