exit(1);
}
- memset ((char*)&creds, 0, sizeof(creds));
+ memset (&creds, 0, sizeof(creds));
if ((status = krb5_read_message(bsd_context, (krb5_pointer)&rem,
&pname_data)))
fprintf(stderr, "Error in socket: %s\n", strerror(errno));
exit(2);
}
- memset((char *) &sock_in, 0,sizeof(sock_in));
+ memset(&sock_in, 0,sizeof(sock_in));
sock_in.sin_family = AF_INET;
sock_in.sin_port = htons(debug_port);
sock_in.sin_addr.s_addr = INADDR_ANY;
return (0);
#ifdef TIOCSWINSZ
oobdata[0] &= ~TIOCPKT_WINDOW; /* we know he heard */
- memcpy((char *)&w,cp+4, sizeof(w));
+ memcpy(&w, cp+4, sizeof(w));
w.ws_row = ntohs(w.ws_row);
w.ws_col = ntohs(w.ws_col);
w.ws_xpixel = ntohs(w.ws_xpixel);
exit(2);
}
- memset((char *) &sock_in6, 0,sizeof(sock_in6));
+ memset(&sock_in6, 0,sizeof(sock_in6));
sock_in6.sin6_family = AF_INET6;
sock_in6.sin6_port = htons(debug_port);
sock_in6.sin6_addr = in6addr_any;
exit(2);
}
- memset((char *) &sock_in, 0,sizeof(sock_in));
+ memset(&sock_in, 0,sizeof(sock_in));
sock_in.sin_family = AF_INET;
sock_in.sin_port = htons(debug_port);
sock_in.sin_addr.s_addr = INADDR_ANY;
}
saddr.sin_family = hp->h_addrtype;
- memcpy((char *) &saddr.sin_addr, hp->h_addr, sizeof(saddr.sin_addr));
+ memcpy(&saddr.sin_addr, hp->h_addr, sizeof(saddr.sin_addr));
saddr.sin_port = htons(port);
if ((s = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
#endif
static char hostnamebuf[80];
- memset((char *)&hisctladdr, 0, sizeof (hisctladdr));
+ memset(&hisctladdr, 0, sizeof (hisctladdr));
hisctladdr.sin_addr.s_addr = inet_addr(host);
if (hisctladdr.sin_addr.s_addr != -1) {
hisctladdr.sin_family = AF_INET;
char ccname[MAXPATHLEN];
#ifdef GSSAPI
- memset((char *)&my_creds, 0, sizeof(my_creds));
+ memset(&my_creds, 0, sizeof(my_creds));
if (krb5_parse_name(kcontext, name, &me))
return 0;
my_creds.client = me;
return(NULL);
if ((pids = (int *)malloc((u_int)(fds * sizeof(int)))) == NULL)
return(NULL);
- memset((char *)pids, 0, fds * sizeof(int));
+ memset(pids, 0, fds * sizeof(int));
}
if (pipe(pdes) < 0)
return(NULL);
*cp = tolower((int) *cp);
/* Set server's address */
- (void) memset((char *)&s_sock, 0, sizeof(s_sock));
+ (void) memset(&s_sock, 0, sizeof(s_sock));
- memcpy((char *)&s_sock.sin_addr, host->h_addr, sizeof(s_sock.sin_addr));
+ memcpy(&s_sock.sin_addr, host->h_addr, sizeof(s_sock.sin_addr));
#ifdef DEBUG
printf("s_sock.sin_addr is %s\n", inet_ntoa(s_sock.sin_addr));
#endif
exit(1);
}
- memset((char *)&c_sock, 0, sizeof(c_sock));
+ memset(&c_sock, 0, sizeof(c_sock));
c_sock.sin_family = AF_INET;
#ifdef BROKEN_STREAMS_SOCKETS
if (gethostname(my_hostname, sizeof(my_hostname)) < 0) {
fprintf(stderr, "%s: unknown host\n", hostname);
exit(1);
}
- memcpy((char *)&c_sock.sin_addr, host->h_addr, sizeof(c_sock.sin_addr));
+ memcpy(&c_sock.sin_addr, host->h_addr, sizeof(c_sock.sin_addr));
#endif
/* PREPARE KRB_SAFE MESSAGE */
/* Get my address */
- memset((char *) &c_sock, 0, sizeof(c_sock));
+ memset(&c_sock, 0, sizeof(c_sock));
len = sizeof(c_sock);
if (getsockname(sock, (struct sockaddr *)&c_sock, &len) < 0) {
com_err(progname, errno, "while getting socket name");
}
/* Set up server address */
- memset((char *)&s_sock, 0, sizeof(s_sock));
+ memset(&s_sock, 0, sizeof(s_sock));
s_sock.sin_family = AF_INET;
if (port == 0) {
fprintf(stderr, "%s: host unknown\n", full_hname);
exit(1);
}
- memcpy((char *)&s_sock.sin_addr, host->h_addr, sizeof(s_sock.sin_addr));
+ memcpy(&s_sock.sin_addr, host->h_addr, sizeof(s_sock.sin_addr));
/* Open socket */
if ((sock = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
auth_send_cnt = cnt;
if (auth_send_cnt > sizeof(_auth_send_data))
auth_send_cnt = sizeof(_auth_send_data);
- memcpy((void *)_auth_send_data, (void *)data,
- (unsigned) auth_send_cnt);
+ memcpy(_auth_send_data, data, (unsigned) auth_send_cnt);
auth_send_data = _auth_send_data;
auth_send_retry();
Name, cnt, (int) sizeof(savename)-1);
return;
}
- memcpy((void *)savename, (void *)data, (unsigned) cnt);
+ memcpy(savename, data, (unsigned) cnt);
savename[cnt] = '\0'; /* Null terminate */
if (auth_debug_mode)
printf(">>>%s: Got NAME [%s]\r\n", Name, savename);
fb64_init(fbp)
register struct fb *fbp;
{
- memset((void *)fbp, 0, sizeof(*fbp));
+ memset(fbp, 0, sizeof(*fbp));
fbp->state[0] = fbp->state[1] = FAILED;
fbp->fb_feed[0] = IAC;
fbp->fb_feed[1] = SB;
Block seed;
register struct stinfo *stp;
{
- memcpy((void *)stp->str_iv, (void *)seed, sizeof(Block));
- memcpy((void *)stp->str_output, (void *)seed, sizeof(Block));
+ memcpy(stp->str_iv, seed, sizeof(Block));
+ memcpy(stp->str_output, seed, sizeof(Block));
stp->str_index = sizeof(Block);
}
Block key;
register struct stinfo *stp;
{
- memcpy((void *)stp->str_keybytes, (void *)key, sizeof(Block));
+ memcpy(stp->str_keybytes, key, sizeof(Block));
stp->str_key.length = 8;
stp->str_key.contents = stp->str_keybytes;
/* the original version of this code uses des ecb mode, but
is identical */
stp->str_key.enctype = ENCTYPE_DES_CBC_RAW;
- memcpy((void *)stp->str_output, (void *)stp->str_iv, sizeof(Block));
+ memcpy(stp->str_output, stp->str_iv, sizeof(Block));
stp->str_index = sizeof(Block);
}
if (idx == sizeof(Block)) {
Block b;
ecb_encrypt(stp, stp->str_output, b);
- memcpy((void *)stp->str_feed,(void *)b,sizeof(Block));
+ memcpy(stp->str_feed,b,sizeof(Block));
idx = 0;
}
if (idx == sizeof(Block)) {
Block b;
ecb_encrypt(stp, stp->str_output, b);
- memcpy((void *)stp->str_feed, (void *)b, sizeof(Block));
+ memcpy(stp->str_feed, b, sizeof(Block));
stp->str_index = 1; /* Next time will be 1 */
idx = 0; /* But now use 0 */
}
if (idx == sizeof(Block)) {
Block b;
ecb_encrypt(stp, stp->str_feed, b);
- memcpy((void *)stp->str_feed,(void *)b,sizeof(Block));
+ memcpy(stp->str_feed,b,sizeof(Block));
idx = 0;
}
*s++ ^= stp->str_feed[idx];
if (idx == sizeof(Block)) {
Block b;
ecb_encrypt(stp, stp->str_feed, b);
- memcpy((void *)stp->str_feed, (void *)b, sizeof(Block));
+ memcpy(stp->str_feed, b, sizeof(Block));
stp->str_index = 1; /* Next time will be 1 */
idx = 0; /* But now use 0 */
}
return(0);
}
- memset((char *)&creds, 0, sizeof(creds));
+ memset(&creds, 0, sizeof(creds));
if (auth_debug_mode)
printf("telnet: calling krb5_sname_to_principal\n");
if ((r = krb5_sname_to_principal(telnet_context, RemoteHostName,
sin_addr.s_addr = tmp;
} else if ((host = gethostbyname(cp))) {
#if defined(h_addr)
- memcpy((caddr_t)&sin_addr,
- host->h_addr_list[0], sizeof(sin_addr));
+ memcpy(&sin_addr,
+ host->h_addr_list[0], sizeof(sin_addr));
#else
- memcpy((caddr_t)&sin_addr, host->h_addr,
- sizeof(sin_addr));
+ memcpy(&sin_addr, host->h_addr, sizeof(sin_addr));
#endif
} else {
*cpp = cp;
return(0);
}
- memcpy(lsrp, (char *)&sin_addr, 4);
+ memcpy(lsrp, &sin_addr, 4);
lsrp += 4;
if (cp2)
cp = cp2;
#define numberof(x) (sizeof x/sizeof x[0])
#define highestof(x) (numberof(x)-1)
-#define ClearElement(x) memset((char *)&x, 0, sizeof x)
-#define ClearArray(x) memset((char *)x, 0, sizeof x)
+#define ClearElement(x) memset(&x, 0, sizeof x)
+#define ClearArray(x) memset(x, 0, sizeof x)
unsigned char *buffer;
int count;
{
- memset((char *)ring, 0, sizeof *ring);
+ memset(ring, 0, sizeof *ring);
ring->size = count;
{
if (len > sizeof(termbuf))
len = sizeof(termbuf);
- memcpy((char *)&termbuf, cp, len);
+ memcpy(&termbuf, cp, len);
termbuf2 = termbuf;
}
#endif /* defined(LINEMODE) && defined(TIOCPKT_IOCTL) */
init_termbuf();
# ifdef TIOCGWINSZ
if (def_row || def_col) {
- memset((char *)&ws, 0, sizeof(ws));
+ memset(&ws, 0, sizeof(ws));
ws.ws_col = def_col;
ws.ws_row = def_row;
(void)ioctl(t, TIOCSWINSZ, (char *)&ws);
INIT_FIFO);
fatalperror(net, tbuf);
}
- memset((char *)&request, 0, sizeof(request));
+ memset(&request, 0, sizeof(request));
request.magic = INIT_MAGIC;
SCPYN(request.gen_id, gen_id);
SCPYN(request.tty_id, &line[8]);
if (secflag) {
int sz = sizeof(ss);
- memset((char *)&dv, 0, sizeof(dv));
+ memset(&dv, 0, sizeof(dv));
if (getsysv(&sysv, sizeof(struct sysv)) != 0) {
perror("getsysv");
int szi = sizeof(int);
#endif /* SO_SEC_MULTI */
- memset((char *)&dv, 0, sizeof(dv));
+ memset(&dv, 0, sizeof(dv));
if (getsysv(&sysv, sizeof(struct sysv)) != 0) {
perror("getsysv");
if (def_col || def_row) {
struct winsize ws;
- memset((char *)&ws, 0, sizeof(ws));
+ memset(&ws, 0, sizeof(ws));
ws.ws_col = def_col;
ws.ws_row = def_row;
(void) ioctl(pty, TIOCSWINSZ, (char *)&ws);
return 5;
}
- memcpy ((char *)&serv_net_addr.sin_addr, host->h_addr_list[i++],
+ memcpy (&serv_net_addr.sin_addr, host->h_addr_list[i++],
sizeof(serv_net_addr.sin_addr));
if (connect(s, (struct sockaddr *)&serv_net_addr,
return 6;
}
- memset ((char*)&creds, 0, sizeof(creds));
+ memset (&creds, 0, sizeof(creds));
retval = krb5_cc_get_principal(context, cc, &creds.client);
if (retval) {
return 4;
}
- memset ((char*)&creds, 0, sizeof(creds));
+ memset (&creds, 0, sizeof(creds));
retval = krb5_cc_get_principal(context, cc, &creds.client);
if (retval) {
com_err("uu-client", retval, "getting principal name");
}
- memset((char *) &temp_tktq, 0, sizeof(temp_tktq));
- memset((char *) &temp_tkt, 0, sizeof(temp_tkt));
- memset((char *) &creds, 0, sizeof(creds));
+ memset(&temp_tktq, 0, sizeof(temp_tktq));
+ memset(&temp_tkt, 0, sizeof(temp_tkt));
+ memset(&creds, 0, sizeof(creds));
/* initialize the cursor */
if ((retval = krb5_cc_start_seq_get(context, cc, &cur))) {
*found = FALSE;
- memset((char *) &tgtq, 0, sizeof(tgtq));
- memset((char *) &tgt, 0, sizeof(tgt));
+ memset(&tgtq, 0, sizeof(tgtq));
+ memset(&tgt, 0, sizeof(tgt));
retval= krb5_copy_principal(context, client, &tgtq.client);
if (retval)
krb5_boolean zero_password;
*path_passwd = 0;
- memset((char *) &tgtq, 0, sizeof(tgtq));
- memset((char *) &tgt, 0, sizeof(tgt));
- memset((char *) &in_creds, 0, sizeof(krb5_creds));
+ memset(&tgtq, 0, sizeof(tgtq));
+ memset(&tgt, 0, sizeof(tgt));
+ memset(&in_creds, 0, sizeof(krb5_creds));
if ((retval= krb5_copy_principal(context, client_pname, &client))){
krb5_verify_init_creds_opt vfy_opts;
krb5_error_code retval;
- memset((char *) &tgtq, 0, sizeof(tgtq));
- memset((char *) &tgt, 0, sizeof(tgt));
+ memset(&tgtq, 0, sizeof(tgtq));
+ memset(&tgt, 0, sizeof(tgt));
if ((retval= krb5_copy_principal(context, client, &tgtq.client))){
com_err(prog_name, retval,"while copying client principal");
return (FALSE);
}
- memset((char *)&my_creds, 0, sizeof(my_creds));
+ memset(&my_creds, 0, sizeof(my_creds));
if ((code = krb5_copy_principal(context, client, &my_creds.client))){
com_err (prog_name, code, "while copying principal");
char *db_name = NULL;
char *svcname;
- memset((char *) ¶ms, 0, sizeof(params));
+ memset(¶ms, 0, sizeof(params));
#if defined(USE_KIM)
/* Turn off all password prompting from the KLL */
krb5_keyblock *keys;
int code, nkeys, i;
- (void) memset((char *)&princ_rec, 0, sizeof(princ_rec));
+ (void) memset(&princ_rec, 0, sizeof(princ_rec));
princ = NULL;
keys = NULL;
}
for (i = 0; i < nkeys; i++) {
- memset((char *) &new_entry, 0, sizeof(new_entry));
+ memset(&new_entry, 0, sizeof(new_entry));
new_entry.principal = princ;
new_entry.key = keys[i];
new_entry.vno = princ_rec.kvno;
try2read = (char *) NULL;
(*linenop)++;
retval = 1;
- memset((char *)&dbent, 0, sizeof(dbent));
+ memset(&dbent, 0, sizeof(dbent));
/* Make sure we've got key_data entries */
if (krb5_dbe_create_key_data(kcontext, &dbent) ||
const char *try2read;
try2read = (char *) NULL;
- memset((char *) &dbentry, 0, sizeof(dbentry));
+ memset(&dbentry, 0, sizeof(dbentry));
(*linenop)++;
retval = 1;
name = (char *) NULL;
}
/* clean up */
(void) krb5_db_fini(util_context);
- memset((char *)master_keyblock.contents, 0, master_keyblock.length);
+ memset(master_keyblock.contents, 0, master_keyblock.length);
free(master_keyblock.contents);
if (pw_str) {
memset(pw_str, 0, pw_size);
int nentries = 1;
krb5_actkvno_node actkvno;
- memset((char *) &entry, 0, sizeof(entry));
+ memset(&entry, 0, sizeof(entry));
entry.len = KRB5_KDB_V1_BASE_LENGTH;
entry.attributes = pblock->flags;
if ((entry.key_data=(krb5_key_data*)malloc(sizeof(krb5_key_data)))
== NULL)
goto error_out;
- memset((char *) entry.key_data, 0, sizeof(krb5_key_data));
+ memset(entry.key_data, 0, sizeof(krb5_key_data));
entry.n_key_data = 1;
if (global_params.mask & KADM5_CONFIG_KVNO)
if (master_entry->key_data == NULL)
return (ENOMEM);
- memset((char *) master_entry->key_data, 0,
+ memset(master_entry->key_data, 0,
sizeof(krb5_key_data) * (old_key_data_count + 1));
master_entry->n_key_data = old_key_data_count + 1;
exit_status++;
return;
}
- memset((char *) master_entry.key_data, 0, sizeof(krb5_key_data) * num_kvnos_inuse);
+ memset(master_entry.key_data, 0, sizeof(krb5_key_data) * num_kvnos_inuse);
master_entry.n_key_data = num_kvnos_inuse; /* there's only 1 mkey per kvno */
/*
if ((retval = krb5_c_random_seed(util_context, &seed))) {
com_err(progname, retval, "while seeding random number generator");
exit_status++;
- memset((char *)master_keyblock.contents, 0, master_keyblock.length);
+ memset(master_keyblock.contents, 0, master_keyblock.length);
krb5_free_keyblock_contents(util_context, &master_keyblock);
krb5_db_free_mkey_list(util_context, master_keylist);
return(1);
return 0;
krb5_db_free_mkey_list(util_context, master_keylist);
retval = krb5_db_fini(util_context);
- memset((char *)master_keyblock.contents, 0, master_keyblock.length);
+ memset(master_keyblock.contents, 0, master_keyblock.length);
finished = TRUE;
if (retval && retval != KRB5_KDB_DBNOTINITED) {
com_err(progname, retval, "while closing database");
if (!entry) {
return ENOMEM;
}
- memset((char *) entry, 0, sizeof(*entry));
+ memset(entry, 0, sizeof(*entry));
if (!lp) { /* if list is empty, start one */
lp = (krb5_kt_list) malloc(sizeof(*lp));
retval = ENOMEM;
break;
}
- memset((char *)entry, 0, sizeof (*entry));
+ memset(entry, 0, sizeof (*entry));
retval = krb5_kt_next_entry(context, kt, entry, &cursor);
if (retval)
break;
svcerr_noproc(transp);
return;
}
- (void) memset((char *)&argument, 0, sizeof (argument));
+ (void) memset(&argument, 0, sizeof (argument));
if (!svc_getargs(transp, _xdr_argument, (caddr_t)&argument)) {
krb5_klog_syslog(LOG_ERR,
_("RPC svc_getargs failed (%s)"),
svcerr_noproc(transp);
return;
}
- memset((char *)&argument, 0, sizeof(argument));
+ memset(&argument, 0, sizeof(argument));
if (!svc_getargs(transp, xdr_argument, &argument)) {
svcerr_decode(transp);
return;
nofork = 0;
- memset((char *) ¶ms, 0, sizeof(params));
+ memset(¶ms, 0, sizeof(params));
argc--; argv++;
while (argc) {
krb5_free_authdata(kdc_context, retdata);
return ENOMEM;
}
- memcpy((char *) retdata[i]->contents,
- (char *)(*ptr)->contents,
- retdata[i]->length);
+ memcpy(retdata[i]->contents, (*ptr)->contents, retdata[i]->length);
ptr++;
i++;
krb5_free_principal(rdp->realm_context, rdp->realm_tgsprinc);
krb5_free_context(rdp->realm_context);
}
- memset((char *) rdp, 0, sizeof(*rdp));
+ memset(rdp, 0, sizeof(*rdp));
free(rdp);
}
int kdb_open_flags;
krb5_kvno mkvno = IGNORE_VNO;
- memset((char *) rdp, 0, sizeof(kdc_realm_t));
+ memset(rdp, 0, sizeof(kdc_realm_t));
if (!realm) {
kret = EINVAL;
goto whoops;
fprintf(stderr, "%s: cannot get memory for realm list\n", argv[0]);
exit(1);
}
- memset((char *) kdc_realmlist, 0,
+ memset(kdc_realmlist, 0,
(size_t) (sizeof(kdc_realm_t *) * KRB5_KDC_MAX_REALMS));
/*
(void) mit_des_cbc_cksum (password, key, i, key_sked, ikey);
/* erase key_sked */
- memset((char *)key_sked, 0,sizeof(key_sked));
+ memset(key_sked, 0,sizeof(key_sked));
/* now fix up key parity again */
mit_des_fixup_key_parity(key);
(ptr) += 2;
#define TWRITE_STR(ptr, str, len) \
- memcpy((ptr), (char *) (str), (len)); \
+ memcpy((ptr), (str), (len)); \
(ptr) += (len);
#define TREAD_STR(ptr, str, len) \
krb5_creds in_creds;
k5_mutex_assert_locked(&cred->lock);
- memset((char *) &in_creds, 0, sizeof(krb5_creds));
+ memset(&in_creds, 0, sizeof(krb5_creds));
in_creds.client = in_creds.server = NULL;
if ((code = krb5_copy_principal(context, cred->princ, &in_creds.client)))
&seq_enc_key, 0,
&input, &output));
cleanup_arcfour:
- memset ((void *) seq_enc_key.contents, 0, seq_enc_key.length);
- memset ((void *) usage_key.contents, 0, usage_key.length);
- free ((void *) usage_key.contents);
- free ((void *) seq_enc_key.contents);
+ memset (seq_enc_key.contents, 0, seq_enc_key.length);
+ memset (usage_key.contents, 0, usage_key.length);
+ free (usage_key.contents);
+ free (seq_enc_key.contents);
return (code);
}
&seq_enc_key, 0,
kiov, kiov_count));
cleanup_arcfour:
- memset ((void *) seq_enc_key.contents, 0, seq_enc_key.length);
- memset ((void *) usage_key.contents, 0, usage_key.length);
- free ((void *) usage_key.contents);
- free ((void *) seq_enc_key.contents);
+ memset (seq_enc_key.contents, 0, seq_enc_key.length);
+ memset (usage_key.contents, 0, usage_key.length);
+ free (usage_key.contents);
+ free (seq_enc_key.contents);
if (kiov != NULL)
free(kiov);
return (code);
return (-1);
*(*buf_out)++ = MECH_OID;
*(*buf_out)++ = (unsigned char) mech->length;
- memcpy((void *)(*buf_out), mech->elements, mech->length);
+ memcpy(*buf_out, mech->elements, mech->length);
*buf_out += mech->length;
return (0);
}
krb5_error_code kret = 0;
- memset((char *) ¶ms, 0, sizeof(params));
- memset((char *) &empty_params, 0, sizeof(empty_params));
+ memset(¶ms, 0, sizeof(params));
+ memset(&empty_params, 0, sizeof(empty_params));
if (params_in == NULL) params_in = &empty_params;
}
/* Initialize realm parameters */
- memset((char *) rparams, 0, sizeof(krb5_realm_params));
+ memset(rparams, 0, sizeof(krb5_realm_params));
/* Get the value for the database */
hierarchy[0] = "realms";
* of params_in. So use that realm, make params_in contain an
* empty mask, and behave like version 2.
*/
- memset((char *) ¶ms_local, 0, sizeof(params_local));
+ memset(¶ms_local, 0, sizeof(params_local));
if (api_version == KADM5_API_VERSION_1) {
realm = params_local.realm = (char *) params_in;
if (params_in)
memset(&addr, 0, sizeof(addr));
addr.sin_family = hp->h_addrtype;
- (void) memcpy((char *) &addr.sin_addr, (char *) hp->h_addr,
- sizeof(addr.sin_addr));
+ (void) memcpy(&addr.sin_addr, hp->h_addr, sizeof(addr.sin_addr));
if (iprop_enable)
addr.sin_port = htons((u_short) handle->params.iprop_port);
else
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, CREATE_PRINCIPAL,
(xdrproc_t) xdr_cprinc_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, CREATE_PRINCIPAL3,
(xdrproc_t) xdr_cprinc3_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, DELETE_PRINCIPAL,
(xdrproc_t) xdr_dprinc_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, MODIFY_PRINCIPAL,
(xdrproc_t) xdr_mprinc_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, RENAME_PRINCIPAL,
(xdrproc_t) xdr_rprinc_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static gprinc_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, GET_PRINCIPAL,
(xdrproc_t) xdr_gprinc_arg, (caddr_t) argp,
(xdrproc_t) xdr_gprinc_ret, (caddr_t) &clnt_res,
{
static gprincs_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, GET_PRINCS,
(xdrproc_t) xdr_gprincs_arg, (caddr_t) argp,
(xdrproc_t) xdr_gprincs_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, CHPASS_PRINCIPAL,
(xdrproc_t) xdr_chpass_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, CHPASS_PRINCIPAL3,
(xdrproc_t) xdr_chpass3_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, SETV4KEY_PRINCIPAL,
(xdrproc_t) xdr_setv4key_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, SETKEY_PRINCIPAL,
(xdrproc_t) xdr_setkey_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, SETKEY_PRINCIPAL3,
(xdrproc_t) xdr_setkey3_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static chrand_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, CHRAND_PRINCIPAL,
(xdrproc_t) xdr_chrand_arg, (caddr_t) argp,
(xdrproc_t) xdr_chrand_ret, (caddr_t) &clnt_res,
{
static chrand_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, CHRAND_PRINCIPAL3,
(xdrproc_t) xdr_chrand3_arg, (caddr_t) argp,
(xdrproc_t) xdr_chrand_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, CREATE_POLICY,
(xdrproc_t) xdr_cpol_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, DELETE_POLICY,
(xdrproc_t) xdr_dpol_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, MODIFY_POLICY,
(xdrproc_t) xdr_mpol_arg, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
{
static gpol_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, GET_POLICY,
(xdrproc_t) xdr_gpol_arg, (caddr_t) argp,
(xdrproc_t) xdr_gpol_ret, (caddr_t) &clnt_res,
{
static gpols_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, GET_POLS,
(xdrproc_t) xdr_gpols_arg, (caddr_t) argp,
(xdrproc_t) xdr_gpols_ret, (caddr_t) &clnt_res,
{
static getprivs_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, GET_PRIVS,
(xdrproc_t) xdr_u_int32, (caddr_t) argp,
(xdrproc_t) xdr_getprivs_ret, (caddr_t) &clnt_res,
{
static generic_ret clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call(clnt, INIT,
(xdrproc_t) xdr_u_int32, (caddr_t) argp,
(xdrproc_t) xdr_generic_ret, (caddr_t) &clnt_res,
unsigned int tmp;
if (xdrs->x_op == XDR_DECODE)
- memset((char *) objp, 0, sizeof(krb5_key_data));
+ memset(objp, 0, sizeof(krb5_key_data));
if (!xdr_krb5_int16(xdrs, &objp->key_data_ver)) {
return (FALSE);
tl2 = (krb5_tl_data *) malloc(sizeof(krb5_tl_data));
if (tl2 == NULL)
return FALSE;
- memset((char *) tl2, 0, sizeof(krb5_tl_data));
+ memset(tl2, 0, sizeof(krb5_tl_data));
if (!xdr_krb5_int16(xdrs, &tl2->tl_data_type))
return FALSE;
if (!xdr_bytes(xdrs, (char **)&tl2->tl_data_contents, &len, ~0))
wildstate_t state;
DPRINT(DEBUG_CALLS, acl_debug_level, ("* kadm5int_acl_find_entry()\n"));
- memset((char *)&state, 0, sizeof state);
+ memset(&state, 0, sizeof state);
for (entry=acl_list_head; entry; entry = entry->ae_next) {
if (entry->ae_name_bad)
continue;
* of params_in. So use that realm, make params_in contain an
* empty mask, and behave like version 2.
*/
- memset((char *) ¶ms_local, 0, sizeof(params_local));
+ memset(¶ms_local, 0, sizeof(params_local));
if (api_version == KADM5_API_VERSION_1) {
params_local.realm = (char *) params_in;
if (params_in)
mask = in_mask;
}
- memset((char *) entry, 0, sizeof(*entry));
+ memset(entry, 0, sizeof(*entry));
if (principal == NULL)
return EINVAL;
}
free(histp->key_data);
}
- free((void *)adb->old_keys);
+ free(adb->old_keys);
adb->old_keys = tmp;
nkeys = adb->old_key_len = nhist - 1;
knext = adb->old_key_next = 0;
keys = (krb5_keyblock *) malloc(n_key_data*sizeof(krb5_keyblock));
if (keys == NULL)
return ENOMEM;
- memset((char *) keys, 0, n_key_data*sizeof(krb5_keyblock));
+ memset(keys, 0, n_key_data*sizeof(krb5_keyblock));
for (i = 0; i < n_key_data; i++) {
ret = krb5_dbekd_decrypt_key_data(context, mkey,
}
}
- memset((char *) keys, 0, n_key_data*sizeof(krb5_keyblock));
+ memset(keys, 0, n_key_data*sizeof(krb5_keyblock));
free(keys);
return ret;
}
* to kadm5 server.
*/
- memset((char *) &context, 0, sizeof(context));
+ memset(&context, 0, sizeof(context));
kadm5_init_krb5_context(&context);
ret = krb5_parse_name(context, principal, &princ);
for (encnum = 0; testp[encnum].magic != -1; encnum++) {
printf("+ enctype %d\n", testp[encnum].enctype);
- memset((char *) &ktent, 0, sizeof(ktent));
+ memset(&ktent, 0, sizeof(ktent));
ktent.principal = princ;
ktent.key = testp[encnum];
ktent.vno = princ_ent.kvno;
exit(1);
}
- memset((char *)&my_creds, 0, sizeof(my_creds));
+ memset(&my_creds, 0, sizeof(my_creds));
my_creds.client = princ;
my_creds.server = server;
if(!(key_salt.data.data = (char *) malloc(slen+1)))
return ENOMEM;
key_salt.data.data[slen] = 0;
- memcpy((char *)key_salt.data.data,
- (char *)(*krb5_princ_realm(context,db_entry->princ)).data,
+ memcpy(key_salt.data.data,
+ (*krb5_princ_realm(context,db_entry->princ)).data,
slen);
key_salt.data.length = SALT_TYPE_AFS_LENGTH; /*length actually used below...*/
#endif
goto out;
while (keylist && !retval) {
- memset((char *) &new_entry, 0, sizeof(new_entry));
+ memset(&new_entry, 0, sizeof(new_entry));
new_entry.principal = mname;
new_entry.key = keylist->keyblock;
new_entry.vno = keylist->kvno;
#define KRB5_APOptions2krb5_apoptions(val, err) KRB5_TicketFlags2krb5_flags((struct type_KRB5_APOptions *) (val), err)
/* to keep lint happy */
-#define xbcopy(src,dst,size) memcpy((char *)(dst), (char *)(src), size)
#define xmalloc(n) malloc((unsigned) (n))
#define xcalloc(n,s) calloc((unsigned)(n), (unsigned)(s))
if (kret)
return kret;
- memset((char *)creds, 0, sizeof(*creds));
+ memset(creds, 0, sizeof(*creds));
MAYBE_OPEN(context, id, FCC_OPEN_RDONLY);
fcursor = (krb5_fcc_cursor *) *cursor;
free(tmpad);
return ENOMEM;
}
- memcpy((char *)tmpad->contents, (char *)inad->contents, inad->length);
+ memcpy(tmpad->contents, inad->contents, inad->length);
*outad = tmpad;
return 0;
}
free(tmpad);
return ENOMEM;
}
- memcpy((char *)tmpad->contents, (char *)inad->contents, inad->length);
+ memcpy(tmpad->contents, inad->contents, inad->length);
*outad = tmpad;
return 0;
}
free(tmpad);
return ENOMEM;
}
- memcpy((char *)tmpad->contents, (char *)inad->contents, inad->length);
+ memcpy(tmpad->contents, inad->contents, inad->length);
*outad = tmpad;
return 0;
}
return ENOMEM;
*tempto = *ckfrom;
- if (!(tempto->contents =
- (krb5_octet *)malloc(tempto->length))) {
+ if (!(tempto->contents = (krb5_octet *)malloc(tempto->length))) {
free(tempto);
return ENOMEM;
}
- memcpy((char *) tempto->contents, (char *) ckfrom->contents,
- ckfrom->length);
+ memcpy(tempto->contents, ckfrom->contents, ckfrom->length);
*ckto = tempto;
return 0;
if (!(outdata->data = malloc(outdata->length))) {
return ENOMEM;
}
- memcpy((char *)outdata->data, (char *)indata->data, outdata->length);
+ memcpy(outdata->data, indata->data, outdata->length);
} else
outdata->data = 0;
outdata->magic = KV5M_DATA;
free(new_key);
return(ENOMEM);
}
- memcpy((char *)new_key->contents, (char *)from->contents,
- new_key->length);
+ memcpy(new_key->contents, from->contents, new_key->length);
*to = new_key;
return 0;
}
free(tempto);
return ENOMEM;
}
- memcpy((char *)tempto->transited.tr_contents.data,
+ memcpy(tempto->transited.tr_contents.data,
(char *)partfrom->transited.tr_contents.data,
partfrom->transited.tr_contents.length);
}
to->contents = (krb5_octet *)malloc(to->length);
if (!to->contents)
return ENOMEM;
- memcpy((char *)to->contents, (char *)from->contents, to->length);
+ memcpy(to->contents, from->contents, to->length);
} else
to->contents = 0;
return 0;
krb5_keyblock *session_key;
krb5_boolean old_use_conf_ktypes = context->use_conf_ktypes;
- memset((char *)&creds, 0, sizeof(creds));
- memset((char *)&tgt, 0, sizeof(creds));
+ memset(&creds, 0, sizeof(creds));
+ memset(&tgt, 0, sizeof(creds));
if (cc == 0) {
if ((retval = krb5int_cc_default(context, &cc)))
if (!in_creds || !in_creds->server || !in_creds->client)
return EINVAL;
- memset((char *)mcreds, 0, sizeof(krb5_creds));
+ memset(mcreds, 0, sizeof(krb5_creds));
mcreds->magic = KV5M_CREDS;
if (in_creds->times.endtime != 0) {
mcreds->times.endtime = in_creds->times.endtime;
if ((ncreds = (krb5_creds *)malloc(sizeof(krb5_creds))) == NULL)
return ENOMEM;
- memset((char *)ncreds, 0, sizeof(krb5_creds));
+ memset(ncreds, 0, sizeof(krb5_creds));
ncreds->magic = KV5M_CREDS;
/* The caller is now responsible for cleaning up in_creds */
krb5_creds *out_creds = 0; /* for check before dereferencing below */
krb5_creds **tgts;
- memset((char *)&in_creds, 0, sizeof(krb5_creds));
+ memset(&in_creds, 0, sizeof(krb5_creds));
in_creds.server = NULL;
tgts = NULL;
if (server)
krb5_free_principal(context, server);
if (creds->keyblock.contents) {
- memset((char *)creds->keyblock.contents, 0,
+ memset(creds->keyblock.contents, 0,
creds->keyblock.length);
free(creds->keyblock.contents);
creds->keyblock.contents = 0;
val->server = 0;
}
if (val->keyblock.contents) {
- memset((char *)val->keyblock.contents, 0, val->keyblock.length);
+ memset(val->keyblock.contents, 0, val->keyblock.length);
free(val->keyblock.contents);
val->keyblock.contents = 0;
}
krb5_replay_data replaydata;
/* Clear replaydata block */
- memset((char *) &replaydata, 0, sizeof(krb5_replay_data));
+ memset(&replaydata, 0, sizeof(krb5_replay_data));
/* Get keyblock */
if ((keyblock = auth_context->send_subkey) == NULL)
return retval;
/* obtain ticket & session key */
- memset((char *)&creds, 0, sizeof(creds));
+ memset(&creds, 0, sizeof(creds));
if ((retval = krb5_copy_principal(context, server, &creds.server)))
goto cleanup_princ;
cleanup_checksum:
free(safe_checksum.contents);
- memset((char *)scratch1->data, 0, scratch1->length);
+ memset(scratch1->data, 0, scratch1->length);
krb5_free_data(context, scratch1);
return retval;
}
krb5_replay_data replaydata;
/* Clear replaydata block */
- memset((char *) &replaydata, 0, sizeof(krb5_replay_data));
+ memset(&replaydata, 0, sizeof(krb5_replay_data));
/* Get keyblock */
if ((keyblock = auth_context->send_subkey) == NULL)
KRB5_KEYUSAGE_KRB_SAFE_CKSUM,
scratch, his_cksum, &valid);
- (void) memset((char *)scratch->data, 0, scratch->length);
+ (void) memset(scratch->data, 0, scratch->length);
krb5_free_data(context, scratch);
if (!valid) {
krb5_error error;
const char *message;
- memset((char *)&error, 0, sizeof(error));
+ memset(&error, 0, sizeof(error));
krb5_us_timeofday(context, &error.stime, &error.susec);
if(server)
error.server = server;
if (!in_cred->ticket.length)
return(KRB5_NO_TKT_SUPPLIED);
- memset((char *)&tgsreq, 0, sizeof(tgsreq));
+ memset(&tgsreq, 0, sizeof(tgsreq));
tgsreq.kdc_options = kdcoptions;
tgsreq.server = (krb5_principal) sname;
* If no credentials were provided, try getting it from the
* credentials cache.
*/
- memset((char *)&creds, 0, sizeof(creds));
+ memset(&creds, 0, sizeof(creds));
/*
* See if we need to access the credentials cache
checksum.checksum_type = 123;
checksum.length = sizeof(ckdata);
checksum.contents = ckdata;
- memcpy(ckdata, (char *) &stuff, sizeof(ckdata));
+ memcpy(ckdata, &stuff, sizeof(ckdata));
if (!(kret = ser_data(verbose, "> checksum with data",
(krb5_pointer) &checksum, KV5M_CHECKSUM))) {
if (verbose)
marshal = retaddr->contents;
temptype = htons(ADDRTYPE_INET);
- (void) memcpy((char *)marshal, (char *)&temptype, sizeof(temptype));
+ (void) memcpy(marshal, &temptype, sizeof(temptype));
marshal += sizeof(temptype);
templength = htonl(sizeof(smushaddr));
- (void) memcpy((char *)marshal, (char *)&templength, sizeof(templength));
+ (void) memcpy(marshal, &templength, sizeof(templength));
marshal += sizeof(templength);
- (void) memcpy((char *)marshal, (char *)&smushaddr, sizeof(smushaddr));
+ (void) memcpy(marshal, &smushaddr, sizeof(smushaddr));
marshal += sizeof(smushaddr);
temptype = htons(ADDRTYPE_IPPORT);
- (void) memcpy((char *)marshal, (char *)&temptype, sizeof(temptype));
+ (void) memcpy(marshal, &temptype, sizeof(temptype));
marshal += sizeof(temptype);
templength = htonl(sizeof(smushport));
- (void) memcpy((char *)marshal, (char *)&templength, sizeof(templength));
+ (void) memcpy(marshal, &templength, sizeof(templength));
marshal += sizeof(templength);
- (void) memcpy((char *)marshal, (char *)&smushport, sizeof(smushport));
+ (void) memcpy(marshal, &smushport, sizeof(smushport));
marshal += sizeof(smushport);
*outaddr = retaddr;
return KRB5_PROG_ATYPE_NOSUPP;
port = *(const krb5_int16 *)ptr;
- memcpy((char *)&adr, (char *)addr->contents, sizeof(adr));
+ memcpy(&adr, addr->contents, sizeof(adr));
return krb5_make_full_ipaddr(context, adr, port, outaddr);
#else
return KRB5_PROG_ATYPE_NOSUPP;
store_32_le(tmp32, marshal);
marshal += 4;
- (void) memcpy((char *)marshal, (char *)(kaddr->contents), kaddr->length);
+ (void) memcpy(marshal, kaddr->contents, kaddr->length);
marshal += kaddr->length;
tmp16 = kport->addrtype;
store_32_le(tmp32, marshal);
marshal += 4;
- (void) memcpy((char *)marshal, (char *)(kport->contents), kport->length);
+ (void) memcpy(marshal, kport->contents, kport->length);
marshal += kport->length;
return 0;
}
marshal = inaddr->contents;
- (void) memcpy((char *)&temptype, (char *)marshal, sizeof(temptype));
+ (void) memcpy(&temptype, marshal, sizeof(temptype));
marshal += sizeof(temptype);
if (temptype != htons(ADDRTYPE_INET))
return KRB5_PROG_ATYPE_NOSUPP;
- (void) memcpy((char *)&templength, (char *)marshal, sizeof(templength));
+ (void) memcpy(&templength, marshal, sizeof(templength));
marshal += sizeof(templength);
if (templength != htonl(sizeof(smushaddr)))
return KRB5_PROG_ATYPE_NOSUPP;
- (void) memcpy((char *)&smushaddr, (char *)marshal, sizeof(smushaddr));
+ (void) memcpy(&smushaddr, marshal, sizeof(smushaddr));
/* leave in net order */
marshal += sizeof(smushaddr);
- (void) memcpy((char *)&temptype, (char *)marshal, sizeof(temptype));
+ (void) memcpy(&temptype, marshal, sizeof(temptype));
marshal += sizeof(temptype);
if (temptype != htons(ADDRTYPE_IPPORT))
return KRB5_PROG_ATYPE_NOSUPP;
- (void) memcpy((char *)&templength, (char *)marshal, sizeof(templength));
+ (void) memcpy(&templength, marshal, sizeof(templength));
marshal += sizeof(templength);
if (templength != htonl(sizeof(smushport)))
return KRB5_PROG_ATYPE_NOSUPP;
- (void) memcpy((char *)&smushport, (char *)marshal, sizeof(smushport));
+ (void) memcpy(&smushport, marshal, sizeof(smushport));
/* leave in net order */
*adr = (krb5_int32) smushaddr;
rpc_createerr.cf_error.re_errno = ENOMEM;
goto cleanup;
}
- memset((char *) auth, 0, sizeof(*auth));
- memset((char *) pdata, 0, sizeof(*pdata));
+ memset(auth, 0, sizeof(*auth));
+ memset(pdata, 0, sizeof(*pdata));
auth->ah_ops = &auth_gssapi_ops;
auth->ah_private = (caddr_t) pdata;
bindp = NULL;
}
- memset((char *) &call_res, 0, sizeof(call_res));
+ memset(&call_res, 0, sizeof(call_res));
next_token:
*gssstat = gss_init_sec_context(minor_stat,
PRINTF(("gssapi_create: calling GSSAPI_INIT (%d)\n", init_func));
- memset((char *) &call_res, 0, sizeof(call_res));
+ memset(&call_res, 0, sizeof(call_res));
callstat = clnt_call(clnt, init_func,
xdr_authgssapi_init_arg, &call_arg,
xdr_authgssapi_init_res, &call_res,
int
get_myaddress(struct sockaddr_in *addr)
{
- memset((void *) addr, 0, sizeof(*addr));
+ memset(addr, 0, sizeof(*addr));
addr->sin_family = AF_INET;
addr->sin_port = htons(PMAPPORT);
addr->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
/* use AUTH_NONE until there is a client_handle */
rqst->rq_xprt->xp_auth = &svc_auth_none;
- memset((char *) &call_res, 0, sizeof(call_res));
+ memset(&call_res, 0, sizeof(call_res));
creds.client_handle.length = 0;
creds.client_handle.value = NULL;
PRINTF(("svcauth_gssapi: decoding credentials\n"));
xdrmem_create(&xdrs, cred->oa_base, cred->oa_length, XDR_DECODE);
- memset((char *) &creds, 0, sizeof(creds));
+ memset(&creds, 0, sizeof(creds));
if (! xdr_authgssapi_creds(&xdrs, &creds)) {
PRINTF(("svcauth_gssapi: failed decoding creds\n"));
LOG_MISCERR("protocol error in client credentials");
client_data = (svc_auth_gssapi_data *) malloc(sizeof(*client_data));
if (client_data == NULL)
return NULL;
- memset((char *) client_data, 0, sizeof(*client_data));
+ memset(client_data, 0, sizeof(*client_data));
L_PRINTF(2, ("create_client: new client_data = %p\n",
(void *) client_data));
set_cloexec_fd(sock);
madesock = TRUE;
}
- memset((char *)&addr, 0, sizeof (addr));
+ memset(&addr, 0, sizeof (addr));
#if HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
addr.sin_len = sizeof(addr);
#endif
set_cloexec_fd(sock);
madesock = TRUE;
}
- memset((char *)&addr, 0, sizeof (addr));
+ memset(&addr, 0, sizeof (addr));
#if HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
addr.sin_len = sizeof(addr);
#endif
uint32_t replylen;
again:
- memset((char *) &dummy, 0, sizeof(dummy));
+ memset(&dummy, 0, sizeof(dummy));
dummy_iov[0].iov_base = rpc_buffer(xprt);
dummy_iov[0].iov_len = (int) su->su_iosz;
dummy.msg_iov = dummy_iov;
(type *) mem_alloc((unsigned) (sizeof(type) * (size)))
#define BZERO(addr, type, size) \
- memset((char *) addr, 0, sizeof(type) * (int) (size))
+ memset(addr, 0, sizeof(type) * (int) (size))
/*
* An entry in the cache
{
static char *clnt_res;
- memset((char *)&clnt_res, 0, sizeof (clnt_res));
+ memset(&clnt_res, 0, sizeof (clnt_res));
if (clnt_call(clnt, RPC_TEST_ECHO,
(xdrproc_t) xdr_wrapstring, (caddr_t) argp,
(xdrproc_t) xdr_wrapstring, (caddr_t) &clnt_res,
_rpcsvcstate = _SERVED;
return;
}
- (void) memset((char *)&argument, 0, sizeof (argument));
+ (void) memset(&argument, 0, sizeof (argument));
if (!svc_getargs(transp, xdr_argument, &argument)) {
svcerr_decode(transp);
_rpcsvccount--;
/*
* Clear the structure and reset the defaults.
*/
- memset((char *) dbctx, 0, sizeof(krb5_db2_context));
+ memset(dbctx, 0, sizeof(krb5_db2_context));
dbctx->db_name = default_db_name;
dbctx->db_nb_locks = FALSE;
dbctx->tempdb = FALSE;
if (db_ctx == NULL)
return ENOMEM;
else {
- memset((char *) db_ctx, 0, sizeof(krb5_db2_context));
+ memset(db_ctx, 0, sizeof(krb5_db2_context));
k5db2_clear_context((krb5_db2_context *) db_ctx);
dal_handle->db_context = (void *) db_ctx;
}
case 0:
;
}
- memset((char *) &entry, 0, sizeof(entry));
+ memset(&entry, 0, sizeof(entry));
contdata.data = contents.data;
contdata.length = contents.size;
retval = krb5_decode_princ_contents(context, &contdata, &entry);
/* Clear encrypted key contents */
for (i = 0; i < entry.n_key_data; i++) {
if (entry.key_data[i].key_data_length[0]) {
- memset((char *) entry.key_data[i].key_data_contents[0], 0,
+ memset(entry.key_data[i].key_data_contents[0], 0,
(unsigned) entry.key_data[i].key_data_length[0]);
}
}
|| ((mask & LDAP_REALM_KRBTICKETFLAGS) == 0)) {
kadm5_config_params params_in, params_out;
- memset((char *) ¶ms_in, 0, sizeof(params_in));
- memset((char *) ¶ms_out, 0, sizeof(params_out));
+ memset(¶ms_in, 0, sizeof(params_in));
+ memset(¶ms_out, 0, sizeof(params_out));
retval = kadm5_get_config_params(context, 1, ¶ms_in, ¶ms_out);
if (retval) {
cparams =(krb5_ldap_krbcontainer_params *) malloc(sizeof(krb5_ldap_krbcontainer_params));
CHECK_NULL(cparams);
- memset((char *) cparams, 0, sizeof(krb5_ldap_krbcontainer_params));
+ memset(cparams, 0, sizeof(krb5_ldap_krbcontainer_params));
/* read kerberos containter location from [dbmodules] section of krb5.conf file */
if (ldap_context->conf_section) {
/* Initialize realm container structure */
rlparams =(krb5_ldap_realm_params *) malloc(sizeof(krb5_ldap_realm_params));
CHECK_NULL(rlparams);
- memset((char *) rlparams, 0, sizeof(krb5_ldap_realm_params));
+ memset(rlparams, 0, sizeof(krb5_ldap_realm_params));
/* allocate tl_data structure to store MASK information */
rlparams->tl_data = malloc (sizeof(krb5_tl_data));
st = ENOMEM;
goto cleanup;
}
- memset((char *) rlparams->tl_data, 0, sizeof(krb5_tl_data));
+ memset(rlparams->tl_data, 0, sizeof(krb5_tl_data));
rlparams->tl_data->tl_data_type = KDB_TL_USER_INFO;
/* set the mask parameter to 0 */
st = ENOMEM;
goto rp_exit;
}
- memcpy((char *)(*password), start, len);
+ memcpy(*password, start, len);
(*password)[len] = '\0';
(*password)[len + 1] = '\0';
goto got_password;
*
* Construct the principal name for the slave host.
*/
- memset((char *)&creds, 0, sizeof(creds));
+ memset(&creds, 0, sizeof(creds));
retval = krb5_sname_to_principal(context,
slave_host, KPROP_SERVICE_NAME,
KRB5_NT_SRV_HST, &creds.server);
return(0);
}
my_sin.sin_family = hp->h_addrtype;
- memcpy((char *)&my_sin.sin_addr, hp->h_addr, sizeof(my_sin.sin_addr));
+ memcpy(&my_sin.sin_addr, hp->h_addr, sizeof(my_sin.sin_addr));
if(!port) {
sp = getservbyname(KPROP_SERVICE, "tcp");
if (sp == 0) {
receiver_addr.addrtype = ADDRTYPE_INET;
receiver_addr.length = sizeof(my_sin.sin_addr);
receiver_addr.contents = (krb5_octet *) malloc(sizeof(my_sin.sin_addr));
- memcpy((char *) receiver_addr.contents, (char *) &my_sin.sin_addr,
+ memcpy(receiver_addr.contents, &my_sin.sin_addr,
sizeof(my_sin.sin_addr));
socket_length = sizeof(my_sin);
sender_addr.addrtype = ADDRTYPE_INET;
sender_addr.length = sizeof(my_sin.sin_addr);
sender_addr.contents = (krb5_octet *) malloc(sizeof(my_sin.sin_addr));
- memcpy((char *) sender_addr.contents, (char *) &my_sin.sin_addr,
+ memcpy(sender_addr.contents, &my_sin.sin_addr,
sizeof(my_sin.sin_addr));
return(0);
exit(1);
}
- memcpy((char *)&send_size, outbuf.data, sizeof(send_size));
+ memcpy(&send_size, outbuf.data, sizeof(send_size));
send_size = ntohl(send_size);
if (send_size != database_size) {
com_err(progname, 0,
const char *text;
krb5_data outbuf;
- memset((char *)&error, 0, sizeof(error));
+ memset(&error, 0, sizeof(error));
krb5_us_timeofday(context, &error.ctime, &error.cusec);
error.server = my_creds->server;
error.client = my_principal;
com_err(progname, errno, "while obtaining socket");
exit(1);
}
- memset((char *) &my_sin,0, sizeof(my_sin));
+ memset(&my_sin,0, sizeof(my_sin));
if(!port) {
sp = getservbyname(KPROP_SERVICE, "tcp");
if (sp == NULL) {
int child_pid;
int status;
- memset((char *)&frominet, 0, sizeof(frominet));
+ memset(&frominet, 0, sizeof(frominet));
fromlen = sizeof(frominet);
if (debug)
fprintf(stderr, "waiting for a kprop connection\n");
static const char tmp[] = ".temp";
kdb_log_context *log_ctx;
- (void) memset((char *)¶ms, 0, sizeof (params));
+ (void) memset(¶ms, 0, sizeof (params));
retval = krb5_init_context(&kpropd_context);
if (retval) {
sender_addr.addrtype = ADDRTYPE_INET;
sender_addr.length = sizeof(my_sin.sin_addr);
sender_addr.contents = (krb5_octet *) malloc(sizeof(my_sin.sin_addr));
- memcpy((char *) sender_addr.contents, (char *) &my_sin.sin_addr,
+ memcpy(sender_addr.contents, &my_sin.sin_addr,
sizeof(my_sin.sin_addr));
sin_length = sizeof(r_sin);
receiver_addr.addrtype = ADDRTYPE_INET;
receiver_addr.length = sizeof(r_sin.sin_addr);
receiver_addr.contents = (krb5_octet *) malloc(sizeof(r_sin.sin_addr));
- memcpy((char *) receiver_addr.contents, (char *) &r_sin.sin_addr,
+ memcpy(receiver_addr.contents, &r_sin.sin_addr,
sizeof(r_sin.sin_addr));
if (debug) {
"while decoding database size from client");
exit(1);
}
- memcpy((char *) &database_size, outbuf.data, sizeof(database_size));
+ memcpy(&database_size, outbuf.data, sizeof(database_size));
krb5_free_data_contents(context, &inbuf);
krb5_free_data_contents(context, &outbuf);
database_size = ntohl(database_size);
krb5_data outbuf;
char buf[1024];
- memset((char *)&error, 0, sizeof(error));
+ memset(&error, 0, sizeof(error));
krb5_us_timeofday(context, &error.stime, &error.susec);
error.server = server;
error.client = client;
{
static char clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call (clnt, IPROP_NULL,
(xdrproc_t) xdr_void, (caddr_t) argp,
(xdrproc_t) xdr_void, (caddr_t) &clnt_res,
{
static kdb_incr_result_t clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call (clnt, IPROP_GET_UPDATES,
(xdrproc_t) xdr_kdb_last_t, (caddr_t) argp,
(xdrproc_t) xdr_kdb_incr_result_t, (caddr_t) &clnt_res,
{
static kdb_fullresync_result_t clnt_res;
- memset((char *)&clnt_res, 0, sizeof(clnt_res));
+ memset(&clnt_res, 0, sizeof(clnt_res));
if (clnt_call (clnt, IPROP_FULL_RESYNC,
(xdrproc_t) xdr_void, (caddr_t) argp,
(xdrproc_t) xdr_kdb_fullresync_result_t, (caddr_t) &clnt_res,
exit(1);
}
- (void) memset((char *)&upd, 0, sizeof (kdb_incr_update_t));
+ (void) memset(&upd, 0, sizeof (kdb_incr_update_t));
xdrmem_create(&xdrs, (char *)indx_log->entry_data,
indx_log->kdb_entry_size, XDR_DECODE);
if (!xdr_kdb_incr_update_t(&xdrs, &upd)) {
exit(1);
}
- (void) memset((char *)¶ms, 0, sizeof (params));
+ (void) memset(¶ms, 0, sizeof (params));
if (kadm5_get_config_params(context, 1, ¶ms, ¶ms)) {
(void) fprintf(stderr,
}
retval = krb5_db_fini(test_context);
- memset((char *)master_keyblock.contents, 0,
+ memset(master_keyblock.contents, 0,
(size_t) master_keyblock.length);
if (retval && retval != KRB5_KDB_DBNOTINITED) {
com_err(progname, retval, "while closing database");
krb5_db_entry newentry;
char princ_name[4096];
- memset((char *)&newentry, 0, sizeof(newentry));
+ memset(&newentry, 0, sizeof(newentry));
snprintf(princ_name, sizeof(princ_name), "%s@%s", str_newprinc, cur_realm);
if ((retval = krb5_parse_name(context, princ_name, &newprinc))) {
com_err(progname, retval, "while parsing '%s'", princ_name);
}
saddr.sin_family = hp->h_addrtype;
- memcpy((char *)&saddr.sin_addr, hp->h_addr, sizeof(saddr.sin_addr));
+ memcpy(&saddr.sin_addr, hp->h_addr, sizeof(saddr.sin_addr));
saddr.sin_port = htons(port);
return 0;
}
service);
/* Initialize variables */
- memset((char *)&creds, 0, sizeof(creds));
+ memset(&creds, 0, sizeof(creds));
/* Do client side */
if (asprintf(&sname, "%s@%s", service, hostname) >= 0) {
return(-1);
}
- memset((char *)&my_creds, 0, sizeof(my_creds));
+ memset(&my_creds, 0, sizeof(my_creds));
if ((code = krb5_parse_name (context, p_client_str, p_client))) {
com_err (prog, code, "when parsing name %s", p_client_str);
}
/* Set server's address */
- (void) memset((char *)&s_sock, 0, sizeof(s_sock));
+ (void) memset(&s_sock, 0, sizeof(s_sock));
- memcpy((char *)&s_sock.sin_addr, host->h_addr, sizeof(s_sock.sin_addr));
+ memcpy(&s_sock.sin_addr, host->h_addr, sizeof(s_sock.sin_addr));
#ifdef DEBUG
printf("s_sock.sin_addr is %s\n", inet_ntoa(s_sock.sin_addr));
#endif
exit(1);
}
- memset((char *)&c_sock, 0, sizeof(c_sock));
+ memset(&c_sock, 0, sizeof(c_sock));
c_sock.sin_family = AF_INET;
/* Bind it to set the address; kernel will fill in port # */
}
/* Get my address */
- memset((char *) &c_sock, 0, sizeof(c_sock));
+ memset(&c_sock, 0, sizeof(c_sock));
i = sizeof(c_sock);
if (getsockname(sock, (struct sockaddr *)&c_sock, &i) < 0) {
perror("getsockname");
krb5_finish_key(context, &master_encblock);
retval = krb5_db_fini(context);
- memset((char *)master_keyblock.contents, 0, (size_t) master_keyblock.length);
+ memset(master_keyblock.contents, 0, (size_t) master_keyblock.length);
if (retval && retval != KRB5_KDB_DBNOTINITED) {
com_err(progname, retval, "while closing database");
exit(1);