for (size_t n = 0; n < v.size(); n++)
argv[n]=v[n].c_str();
// we get away with not copying since nobody resizes v
- launch(&argv.at(0), timeout, infd, outfd);
+ launch(argv.data(), timeout, infd, outfd);
}
void CoProcess::launch(const char **argv, int timeout, int infd, int outfd)
// stdin & stdout are now connected, fire up our coprocess!
- if(execv(argv[0], const_cast<char * const *>(&argv[0]))<0) // now what
+ if(execv(argv[0], const_cast<char * const *>(argv.data()))<0) // now what
exit(123);
/* not a lot we can do here. We shouldn't return because that will leave a forked process around.
#endif
responseSize += addRoom;
answerBuffer.resize(responseSize);
- char* response = &answerBuffer.at(0);
+ char* response = answerBuffer.data();
readn2WithTimeout(dsock, response, rlen, ds->tcpRecvTimeout);
uint16_t responseLen = rlen;
if (outstanding) {
}
std::vector<struct pollfd> pfds(realFDs.size());
- memset(&pfds.at(0), 0, realFDs.size()*sizeof(struct pollfd));
+ memset(pfds.data(), 0, realFDs.size()*sizeof(struct pollfd));
int ctr = 0;
for (const auto& fd : realFDs) {
pfds[ctr].fd = fd;
int ret;
if(seconds >= 0)
- ret = poll(&pfds.at(0), realFDs.size(), seconds * 1000 + useconds/1000);
+ ret = poll(pfds.data(), realFDs.size(), seconds * 1000 + useconds/1000);
else
- ret = poll(&pfds.at(0), realFDs.size(), -1);
+ ret = poll(pfds.data(), realFDs.size(), -1);
if(ret <= 0)
return ret;
throw runtime_error(getName()+" failed to init hash context for generating the public key hash");
}
- int len = BN_bn2bin(e, &tmp.at(0));
- res = SHA1_Update(&ctx, &tmp.at(0), len);
+ int len = BN_bn2bin(e, tmp.data());
+ res = SHA1_Update(&ctx, tmp.data(), len);
if (res != 1) {
throw runtime_error(getName()+" failed to update hash context for generating the public key hash");
}
- len = BN_bn2bin(n, &tmp.at(0));
- res = SHA1_Update(&ctx, &tmp.at(0), len);
+ len = BN_bn2bin(n, tmp.data());
+ res = SHA1_Update(&ctx, tmp.data(), len);
if (res != 1) {
throw runtime_error(getName()+" failed to update hash context for generating the public key hash");
}
// get the actual slot ids
std::vector<CK_SLOT_ID> slotIds(slots);
- err = functions->C_GetSlotList(CK_FALSE, &slotIds.at(0), &slots);
+ err = functions->C_GetSlotList(CK_FALSE, slotIds.data(), &slots);
if (err) {
L<<Logger::Warning<<"C_GetSlotList(CK_FALSE, slotIds, &slots) = " << err << std::endl;
return err;
decrypted.resize(msg.length() - crypto_secretbox_MACBYTES);
- if (crypto_secretbox_open_easy(reinterpret_cast<unsigned char*>(&decrypted.at(0)),
+ if (crypto_secretbox_open_easy(reinterpret_cast<unsigned char*>(const_cast<char *>(decrypted.data())),
reinterpret_cast<const unsigned char*>(msg.c_str()),
msg.length(),
nonce.value,