+2001-06-15 Ezra Peisach <epeisach@mit.edu>
+
+ * cmds.c, domacro.c: Cast arguments to isspace() and isdigit()
+ from char to int.
+
+ * ftp.c: krb5_mk_priv(), krb5_mk_safe() expect C_Block *.
+
2001-05-01 Ken Raeburn <raeburn@mit.edu>
* cmds.c (setpeer): Port number should be unsigned short. (Patch
if (mflag && confirm(argv[0], cp)) {
tp = cp;
if (mcase) {
- while (*tp && !islower(*tp)) {
+ while (*tp && !islower((int) (*tp))) {
tp++;
}
if (!*tp) {
tp = cp;
tp2 = tmpbuf;
while ((*tp2 = *tp) != 0) {
- if (isupper(*tp2)) {
+ if (isupper((int) *tp2)) {
*tp2 = 'a' + *tp2 - 'A';
}
tp++;
if (loc && mcase) {
char *tp = argv[1], *tp2, tmpbuf[MAXPATHLEN];
- while (*tp && !islower(*tp)) {
+ while (*tp && !islower((int) *tp)) {
tp++;
}
if (!*tp) {
tp = argv[2];
tp2 = tmpbuf;
while ((*tp2 = *tp) != 0) {
- if (isupper(*tp2)) {
+ if (isupper((int) *tp2)) {
*tp2 = 'a' + *tp2 - 'A';
}
tp++;
if (mflag && confirm(argv[0], cp)) {
tp = cp;
if (mcase) {
- while (*tp && !islower(*tp)) {
+ while (*tp && !islower((int) *tp)) {
tp++;
}
if (!*tp) {
tp = cp;
tp2 = tmpbuf;
while ((*tp2 = *tp) != 0) {
- if (isupper(*tp2)) {
+ if (isupper((int) *tp2)) {
*tp2 = 'a' + *tp2 - 'A';
}
tp++;
break;
case '[':
LOOP:
- if (*++cp2 == '$' && isdigit(*(cp2+1))) {
+ if (*++cp2 == '$' && isdigit((int) *(cp2+1))) {
if (*++cp2 == '0') {
char *cp3 = name;
cp2++;
}
else if (*cp2 == '$' &&
- isdigit(*(cp2+1))) {
+ isdigit((int) *(cp2+1))) {
if (*++cp2 == '0') {
char *cp3 = name;
}
break;
case '$':
- if (isdigit(*(cp2 + 1))) {
+ if (isdigit((int) *(cp2 + 1))) {
if (*++cp2 == '0') {
char *cp3 = name;
TOP:
cp1 = macros[i].mac_start;
while (cp1 != macros[i].mac_end) {
- while (isspace(*cp1)) {
+ while (isspace((int) *cp1)) {
cp1++;
}
cp2 = line;
*cp2++ = *++cp1;
break;
case '$':
- if (isdigit(*(cp1+1))) {
+ if (isdigit((int) *(cp1+1))) {
j = 0;
- while (isdigit(*++cp1)) {
+ while (isdigit((int) (*++cp1))) {
j = 10*j + *cp1 - '0';
}
cp1--;
if ((length = clevel == PROT_P ?
krb_mk_priv((unsigned char *)cmd, (unsigned char *)out,
strlen(cmd), schedule,
- cred.session, &myctladdr, &hisctladdr)
+ &cred.session, &myctladdr, &hisctladdr)
: krb_mk_safe((unsigned char *)cmd, (unsigned char *)out,
- strlen(cmd), cred.session,
+ strlen(cmd), &cred.session,
&myctladdr, &hisctladdr)) == -1) {
fprintf(stderr, "krb_mk_%s failed for KERBEROS_V4\n",
clevel == PROT_P ? "priv" : "safe");
if ((kerror = safe ?
krb_rd_safe((unsigned char *)ibuf,
(unsigned int) len,
- cred.session,
+ &cred.session,
&hisctladdr,
&myctladdr, &msg_data)
: krb_rd_priv((unsigned char *)ibuf,
(unsigned int) len,
- schedule, cred.session,
+ schedule, &cred.session,
&hisctladdr, &myctladdr,
&msg_data))
!= KSUCCESS) {
GSS_C_NO_CREDENTIAL,
&gcontext,
target_name,
- *gss_trials[trial].mech_type,
+ (gss_OID_desc *)*gss_trials[trial].mech_type,
GSS_C_MUTUAL_FLAG | GSS_C_REPLAY_FLAG |
(forward ? GSS_C_DELEG_FLAG :
(unsigned) 0),
fprintf(stderr, "Base 64 decoding failed: %s\n",
radix_error(kerror));
else if ((kerror = krb_rd_safe(out_buf, (unsigned )i,
- cred.session,
+ &cred.session,
&hisctladdr, &myctladdr,
&msg_data)))
fprintf(stderr, "Kerberos V4 krb_rd_safe failed: %s\n",