(2) ** we don't properly handle the HTTP/1.1 'Connection' header (KA)
(2) ** Code cleanup: (KA)
- Make sure the lib/*.c files do not use printf/fprintf.
- - Replace bzero with memset
- Replace bcopy with xmemcpy
(4) ** FTP PUT (KA)
(1) SSL doesn't work with Proxy Authentication
RFCNB_saved_errno = errno;
return (RFCNBE_Bad);
}
- bzero((char *) &Socket, sizeof(Socket));
+ memset((char *) &Socket, 0, sizeof(Socket));
memcpy((char *) &Socket.sin_addr, (char *) &Dest_IP, sizeof(Dest_IP));
Socket.sin_port = htons(port);
E_P16((uchar *) passwd, (uchar *) p16);
/* clear out local copy of user's password (just being paranoid). */
- bzero(passwd, sizeof(passwd));
+ memset(passwd, 0, sizeof(passwd));
}
/****************************************************************************
}
/* Now plug in the bits we need */
- bzero(SMB_Hdr(pkt), SMB_negp_len);
+ memset(SMB_Hdr(pkt), 0, SMB_negp_len);
SIVAL(SMB_Hdr(pkt), SMB_hdr_idf_offset, SMB_DEF_IDF); /* Plunk in IDF */
*(SMB_Hdr(pkt) + SMB_hdr_com_offset) = SMBnegprot;
SSVAL(SMB_Hdr(pkt), SMB_hdr_pid_offset, Con_Handle->pid);
/* Now plug in the values ... */
- bzero(SMB_Hdr(pkt), SMB_tcon_len);
+ memset(SMB_Hdr(pkt), 0, SMB_tcon_len);
SIVAL(SMB_Hdr(pkt), SMB_hdr_idf_offset, SMB_DEF_IDF); /* Plunk in IDF */
*(SMB_Hdr(pkt) + SMB_hdr_com_offset) = SMBtcon;
SSVAL(SMB_Hdr(pkt), SMB_hdr_pid_offset, Con_Handle->pid);
return (SMBlibE_BAD); /* Should handle the error */
}
- bzero(SMB_Hdr(pkt), SMB_ssetpLM_len);
+ memset(SMB_Hdr(pkt), 0, SMB_ssetpLM_len);
SIVAL(SMB_Hdr(pkt), SMB_hdr_idf_offset, SMB_DEF_IDF); /* Plunk in IDF */
*(SMB_Hdr(pkt) + SMB_hdr_com_offset) = SMBsesssetupX;
SSVAL(SMB_Hdr(pkt), SMB_hdr_pid_offset, Con_Handle->pid);
return (-1); /* Should handle the error */
}
- bzero(SMB_Hdr(pkt), SMB_ssetpNTLM_len);
+ memset(SMB_Hdr(pkt), 0, SMB_ssetpNTLM_len);
SIVAL(SMB_Hdr(pkt), SMB_hdr_idf_offset, SMB_DEF_IDF); /* Plunk in IDF */
*(SMB_Hdr(pkt) + SMB_hdr_com_offset) = SMBsesssetupX;
SSVAL(SMB_Hdr(pkt), SMB_hdr_pid_offset, Con_Handle->pid);
RFCNB_saved_errno = errno;
return (RFCNBE_Bad);
}
- bzero((char *) &Socket, sizeof(Socket));
+ memset((char *) &Socket, 0, sizeof(Socket));
memcpy((char *) &Socket.sin_addr, (char *) &Dest_IP, sizeof(Dest_IP));
Socket.sin_port = htons(port);
E_P16((uchar *) passwd, (uchar *) p16);
/* clear out local copy of user's password (just being paranoid). */
- bzero(passwd, sizeof(passwd));
+ memset(passwd, 0, sizeof(passwd));
}
/****************************************************************************
}
/* Now plug in the bits we need */
- bzero(SMB_Hdr(pkt), SMB_negp_len);
+ memset(SMB_Hdr(pkt), 0, SMB_negp_len);
SIVAL(SMB_Hdr(pkt), SMB_hdr_idf_offset, SMB_DEF_IDF); /* Plunk in IDF */
*(SMB_Hdr(pkt) + SMB_hdr_com_offset) = SMBnegprot;
SSVAL(SMB_Hdr(pkt), SMB_hdr_pid_offset, Con_Handle->pid);
/* Now plug in the values ... */
- bzero(SMB_Hdr(pkt), SMB_tcon_len);
+ memset(SMB_Hdr(pkt), 0, SMB_tcon_len);
SIVAL(SMB_Hdr(pkt), SMB_hdr_idf_offset, SMB_DEF_IDF); /* Plunk in IDF */
*(SMB_Hdr(pkt) + SMB_hdr_com_offset) = SMBtcon;
SSVAL(SMB_Hdr(pkt), SMB_hdr_pid_offset, Con_Handle->pid);
}
/* Now plug in the values ... */
- bzero(SMB_Hdr(pkt), SMB_tdis_len);
+ memset(SMB_Hdr(pkt), 0, SMB_tdis_len);
SIVAL(SMB_Hdr(pkt), SMB_hdr_idf_offset, SMB_DEF_IDF); /* Plunk in IDF */
*(SMB_Hdr(pkt) + SMB_hdr_com_offset) = SMBtdis;
SSVAL(SMB_Hdr(pkt), SMB_hdr_pid_offset, Tree_Handle->con->pid);
fprintf(stderr, "SMB_Logon_server: Couldn't allocate packet\n");
return (SMBlibE_BAD); /* Should handle the error */
}
- bzero(SMB_Hdr(pkt), SMB_ssetpLM_len);
+ memset(SMB_Hdr(pkt), 0, SMB_ssetpLM_len);
SIVAL(SMB_Hdr(pkt), SMB_hdr_idf_offset, SMB_DEF_IDF); /* Plunk in IDF */
*(SMB_Hdr(pkt) + SMB_hdr_com_offset) = SMBsesssetupX;
SSVAL(SMB_Hdr(pkt), SMB_hdr_pid_offset, Con_Handle->pid);
fprintf(stderr, "SMB_Logon_server: Couldn't allocate packet\n");
return (-1); /* Should handle the error */
}
- bzero(SMB_Hdr(pkt), SMB_ssetpNTLM_len);
+ memset(SMB_Hdr(pkt), 0, SMB_ssetpNTLM_len);
SIVAL(SMB_Hdr(pkt), SMB_hdr_idf_offset, SMB_DEF_IDF); /* Plunk in IDF */
*(SMB_Hdr(pkt) + SMB_hdr_com_offset) = SMBsesssetupX;
SSVAL(SMB_Hdr(pkt), SMB_hdr_pid_offset, Con_Handle->pid);
/*
- * $Id: AIODiskIOStrategy.cc,v 1.1 2004/12/20 16:30:38 robertc Exp $
+ * $Id: AIODiskIOStrategy.cc,v 1.2 2005/03/10 21:49:20 serassio Exp $
*
* SQUID Web Proxy Cache http://www.squid-cache.org/
* ----------------------------------------------------------
}
/* Free slot */
- bzero(aqe, sizeof(async_queue_entry_t));
+ memset(aqe, 0, sizeof(async_queue_entry_t));
aqe->aq_e_state = AQ_ENTRY_FREE;
/*
- * $Id: comm.cc,v 1.400 2005/02/13 15:49:50 serassio Exp $
+ * $Id: comm.cc,v 1.401 2005/03/10 21:49:19 serassio Exp $
*
* DEBUG: section 5 Socket Functions
* AUTHOR: Harvest Derived
}
ConnectionDetail::ConnectionDetail() {
- bzero(&me, sizeof(me));
- bzero(&peer, sizeof(peer));
+ memset(&me, 0, sizeof(me));
+ memset(&peer, 0, sizeof(peer));
}