sizeof(C_Block));
return KRB524_BADKEY;
} else
- bcopy((char *) v5creds->keyblock.contents, v4creds->session,
- sizeof(C_Block));
+ memcpy(v4creds->session, (char *) v5creds->keyblock.contents,
+ sizeof(C_Block));
/* V4 has no concept of authtime or renew_till, so ignore them */
/* V4 lifetime is 1 byte, in 5 minute increments */
fprintf(stderr, "Invalid v5creds address information.\n");
return KRB524_BADADDR;
} else
- bcopy(v5creds->addresses[0]->contents, (char *) &addr,
- sizeof(addr));
+ memcpy((char *) &addr, v5creds->addresses[0]->contents,
+ sizeof(addr));
return 0;
}
{
if (len > *outlen)
return KRB524_ENCFULL;
- bcopy(in, *out, len);
+ memcpy(*out, in, len);
*out += len;
*outlen -= len;
return 0;
{
if (len > *outlen)
return KRB524_DECEMPTY;
- bcopy(*out, in, len);
+ memcpy(in, *out, len);
*out += len;
*outlen -= len;
return 0;
if (use_keytab) {
if (ret = krb5_kt_get_entry(kt, p, 0, &entry))
return ret;
- bcopy((char *) &entry.key, key, sizeof(krb5_keyblock));
+ memcpy(key, (char *) &entry.key, sizeof(krb5_keyblock));
return 0;
} else if (use_master) {
if (ret = krb5_dbm_db_init())
}
memset((char *) &saddr, 0, sizeof(struct sockaddr_in));
saddr.sin_family = AF_INET;
- bcopy(hp->h_addr, (char *) &saddr.sin_addr.s_addr,
- sizeof(struct in_addr));
+ memcpy((char *) &saddr.sin_addr.s_addr, hp->h_addr,
+ sizeof(struct in_addr));
if (ret = krb524_convert_creds_addr(v5creds, &v4creds, &saddr)) {
com_err("test", ret, "converting credentials on %s",