tmp[2] = '\0';
while (*src && size > 1) {
if (*src == '%' && src[1] != '\0' && src[2] != '\0') {
- src++;
+ ++src;
tmp[0] = *src++;
tmp[1] = *src++;
*dst++ = strtol(tmp, NULL, 16);
} else {
*dst++ = *src++;
}
- size--;
+ --size;
}
- *dst++ = '\0';
+ *dst = '\0';
}
static int
md5_calc(cbc, md5buf, secretlen + AUTH_VECTOR_LEN);
/* Xor the password into the MD5 digest */
- for (i = 0; i < AUTH_VECTOR_LEN; i++) {
+ for (i = 0; i < AUTH_VECTOR_LEN; ++i) {
*ptr++ = (cbc[i] ^= passbuf[j + i]);
}
}
*/
auth->length = htons(total_length);
- while (retry--) {
+ while (retry) {
+ --retry;
int time_spent;
struct timeval sent;
/*
/* Parse out the username and password */
ptr = buf;
while (isspace(*ptr))
- ptr++;
+ ++ptr;
if ((end = strchr(ptr, ' ')) == NULL) {
SEND_ERR("No password");
continue;
urldecode(username, ptr, MAXPWNAM);
ptr = end + 1;
while (isspace(*ptr))
- ptr++;
+ ++ptr;
urldecode(passwd, ptr, MAXPASS);
if (authenticate(sockfd, username, passwd))
bufc[0] = '\134';
swi = 0;
j = 1;
- for (i = 0; i < s; i++) {
+ for (i = 0; i < s; ++i) {
if (swi == 2) {
bufc[j] = '\134';
++j;
l->num_val = x;
if (x > 0) {
/* Display all values */
- for (i = 0; i < x; i++) {
+ for (i = 0; i < x; ++i) {
j = l->val[i]->bv_len;
memcpy(bufa, l->val[i]->bv_val, j);
z = BinarySplit(bufa, j, '#', bufb, sizeof(bufb));
/* BINARY DEBUGGING *
local_printfx("value[%" PRIuSIZE "]: BinarySplit(", (size_t) i);
- for (k = 0; k < z; k++) {
+ for (k = 0; k < z; ++k) {
c = (int) bufb[k];
if (c < 0)
c = c + 256;
local_printfx("%02X", c);
}
local_printfx(", ");
- for (k = 0; k < (j - z - 1); k++) {
+ for (k = 0; k < (j - z - 1); ++k) {
c = (int) bufa[k];
if (c < 0)
c = c + 256;
/* bufa is the address, just compare it */
if (!(l->status & LDAP_IPV4_S) || (l->status & LDAP_IPV6_S))
break; /* Not looking for IPv4 */
- for (k = 0; k < z; k++) {
+ for (k = 0; k < z; ++k) {
c = (int) bufa[k];
if (c < 0)
c = c + 256;
if (memcmp(l->search_ip, bufb, y) == 0) {
/* We got a match! - Scan 'ber' for 'cn' values */
z = ldap_count_values_len(ber);
- for (j = 0; j < z; j++) {
+ for (j = 0; j < z; ++j) {
// broken? xstrncpy(l->userid, ber[j]->bv_val, min(sizeof(l->userid),static_cast<size_t>(ber[j]->bv_len)));
xstrncpy(l->userid, ber[j]->bv_val, sizeof(l->userid));
/* Using bv_len of min() breaks the result by 2 chars */
/* bufa + 2 is the address (skip 2 digit port) */
if (!(l->status & LDAP_IPV4_S) || (l->status & LDAP_IPV6_S))
break; /* Not looking for IPv4 */
- for (k = 2; k < z; k++) {
+ for (k = 2; k < z; ++k) {
c = (int) bufa[k];
if (c < 0)
c = c + 256;
if (memcmp(l->search_ip, bufb, y) == 0) {
/* We got a match! - Scan 'ber' for 'cn' values */
z = ldap_count_values_len(ber);
- for (j = 0; j < z; j++) {
+ for (j = 0; j < z; ++j) {
// broken? xstrncpy(l->userid, ber[j]->bv_val, min(sizeof(l->userid),static_cast<size_t>(ber[j]->bv_len)));
xstrncpy(l->userid, ber[j]->bv_val, sizeof(l->userid));
/* Using bv_len of min() breaks the result by 2 chars */
/* bufa + 2 is the address (skip 2 digit port) */
if (!(l->status & LDAP_IPV6_S))
break; /* Not looking for IPv6 */
- for (k = 2; k < z; k++) {
+ for (k = 2; k < z; ++k) {
c = (int) bufa[k];
if (c < 0)
c = c + 256;
if (memcmp(l->search_ip, bufb, y) == 0) {
/* We got a match! - Scan 'ber' for 'cn' values */
z = ldap_count_values_len(ber);
- for (j = 0; j < z; j++) {
+ for (j = 0; j < z; ++j) {
// broken? xstrncpy(l->userid, ber[j]->bv_val, min(sizeof(l->userid),static_cast<size_t>(ber[j]->bv_len)));
xstrncpy(l->userid, ber[j]->bv_val, sizeof(l->userid));
/* Using bv_len of min() breaks the result by 2 chars */
/* Scan args */
if (k > 1) {
- for (i = 1; i < k; i++) {
+ for (i = 1; i < k; ++i) {
/* Classic / novelty usage schemes */
if (!strcmp(argv[i], "--help")) {
DisplayUsage();
return 1;
} else if (argv[i][0] == '-') {
s = strlen(argv[i]);
- for (j = 1; j < s; j++) {
+ for (j = 1; j < s; ++j) {
switch (argv[i][j]) {
case 'h':
DisplayUsage();
k = strlen(bufa);
/* BINARY DEBUGGING *
local_printfx("while() -> bufa[%" PRIuSIZE "]: %s", k, bufa);
- for (i = 0; i < k; i++)
+ for (i = 0; i < k; ++i)
local_printfx("%02X", bufa[i]);
local_printfx("\n");
* BINARY DEBUGGING */