** copy the initial modes we saved into sb; this is
** for restoring to the initial state
*/
- (void)memcpy(&sb, &defmodes, sizeof(defmodes));
-
+ sb = defmodes;
#else
sb.sg_flags &= ~(CBREAK|RAW|TBDELAY);
sb.sg_flags |= defflags|tabflag;
goto cleanup;
memset(password.data, 0, password.length);
password.length = 0;
- memcpy(&lp->entry->key, &key, sizeof(krb5_keyblock));
+ lp->entry->key = key;
} else {
printf("Key for %s (hex): ", princ_str);
fgets(buf, BUFSIZ, stdin);
d1.data=malloc(d1.length);
if (d1.data == NULL)
return (ENOMEM);
- memcpy(&k1, key, sizeof (krb5_keyblock));
+ k1 = *key;
k1.length=d1.length;
k1.contents= (void *) d1.data;
free(d1.data);
return (ENOMEM);
}
- memcpy(&k2, key, sizeof (krb5_keyblock));
+ k2 = *key;
k2.length=d2.length;
k2.contents=(void *) d2.data;
free(d2.data);
return (ENOMEM);
}
- memcpy(&k3, key, sizeof (krb5_keyblock));
+ k3 = *key;
k3.length=d3.length;
k3.contents= (void *) d3.data;
d1.data=malloc(d1.length);
if (d1.data == NULL)
return (ENOMEM);
- memcpy(&k1, key, sizeof (krb5_keyblock));
+ k1 = *key;
k1.length=d1.length;
k1.contents= (void *) d1.data;
free(d1.data);
return (ENOMEM);
}
- memcpy(&k2, key, sizeof(krb5_keyblock));
+ k2 = *key;
k2.length=d2.length;
k2.contents= (void *) d2.data;
free(d2.data);
return (ENOMEM);
}
- memcpy(&k3, key, sizeof(krb5_keyblock));
+ k3 = *key;
k3.length=d3.length;
k3.contents= (void *) d3.data;
releaseMechInfo(&new_cf);
return ENOMEM;
}
- memcpy(new_cf->mech, template->mech, sizeof(struct gss_config));
+ *new_cf->mech = *template->mech;
if (template->mech_type != NULL)
new_cf->mech->mech_type = *(template->mech_type);
new_cf->mech_type = &new_cf->mech->mech_type;
return ENOMEM;
VALGRIND_CHECK_DEFINED(*inprinc);
- memcpy(tempprinc, inprinc, sizeof(krb5_principal_data));
+ *tempprinc = *inprinc;
nelems = (int) krb5_princ_size(context, inprinc);
tempprinc->data = krb5_db_alloc(context, NULL, nelems * sizeof(krb5_data));
kret = ENOMEM;
}
else
- memcpy(stable, entry, sizeof(krb5_ser_entry));
+ *stable = *entry;
return(kret);
}
\f