struct addrinfo hints;
int error;
char portstr[NI_MAXSERV];
- int len;
+ socklen_t len;
int s;
memset (&hints, 0, sizeof(hints));
active_mode (void)
{
int tmpno = 0;
- int len;
+ socklen_t len;
int result;
noport:
{
struct sockaddr_storage from_ss;
struct sockaddr *from = (struct sockaddr *)&from_ss;
- int s, fromlen = sizeof (from_ss);
+ socklen_t fromlen = sizeof(from_ss);
+ int s;
if (passivemode)
return (fdopen (data, lmode));
int
main(int argc, char **argv)
{
- int his_addr_len, ctrl_addr_len, on = 1;
+ socklen_t his_addr_len, ctrl_addr_len;
+ int on = 1;
int port;
struct servent *sp;
struct sockaddr_storage from_ss;
struct sockaddr *from = (struct sockaddr *)&from_ss;
int s;
- int fromlen = sizeof(from_ss);
+ socklen_t fromlen = sizeof(from_ss);
s = accept(pdata, from, &fromlen);
if (s < 0) {
void
pasv(void)
{
- int len;
+ socklen_t len;
char *p, *a;
struct sockaddr_in *sin;
void
epsv(char *proto)
{
- int len;
+ socklen_t len;
pdata = socket(ctrl_addr->sa_family, SOCK_STREAM, 0);
if (pdata < 0) {
suspicious_address (int sock, struct sockaddr_in addr)
{
char data[40];
- int len = sizeof(data);
+ socklen_t len = sizeof(data);
return addr.sin_addr.s_addr != htonl(INADDR_LOOPBACK)
#if defined(IP_OPTIONS) && defined(HAVE_GETSOCKOPT)
struct addrinfo hints;
int error;
char portstr[NI_MAXSERV];
- int addrlen;
+ socklen_t addrlen;
int s;
struct sockaddr_storage thisaddr_ss;
struct sockaddr *thisaddr = (struct sockaddr *)&thisaddr_ss;
fd_set fdset;
pid_t child;
int fd, thisfd = -1;
- int zero = 0;
+ socklen_t zero = 0;
FD_ZERO(&fdset);
for (i = 0; i < nsockets; ++i)
{
u_char msg[1024], *p;
char user[256];
- int addrlen;
+ socklen_t addrlen;
struct passwd *passwd;
struct sockaddr_in thisaddr, thataddr;
char remotehost[MaxHostNameLen];
int sock, sock2;
struct sockaddr_in addr;
struct sockaddr_in thisaddr;
- int addrlen;
+ socklen_t addrlen;
u_char msg[1024], *p;
sock = socket (AF_INET, SOCK_STREAM, 0);
if (FD_ISSET(sockets[i].fd, &fds)) {
if (sockets[i].flags == TCP) {
struct sockaddr_in peer;
- int len = sizeof(peer);
+ socklen_t len = sizeof(peer);
fd = accept (sockets[i].fd,
(struct sockaddr *)&peer,
errno = EINTR;
}
} else if(sockets[i].flags == UNIX_SOCKET) {
- int zero = 0;
+ socklen_t zero = 0;
fd = accept (sockets[i].fd, NULL, &zero);
{
struct sockaddr_storage cs_ss;
struct sockaddr *cs = (struct sockaddr *)&cs_ss;
- int len;
+ socklen_t len;
char * trace_file_name = "/tmp/popper-trace";
int portnum = 0;
int optind = 0;
struct sockaddr *thataddr = (struct sockaddr *)&thataddr_ss;
struct sockaddr_storage erraddr_ss;
struct sockaddr *erraddr = (struct sockaddr *)&erraddr_ss;
- int addrlen;
+ socklen_t addrlen;
int port;
int errsock = -1;
char client_user[COMMAND_SZ], server_user[USERNAME_SZ];
char realm[REALM_SZ];
char instance[INST_SZ];
int r;
- int addr_len;
+ socklen_t addr_len;
if (cnt-- < 1)
return;
{
struct sockaddr_storage __ss;
struct sockaddr *sa = (struct sockaddr *)&__ss;
- int on = 1, sa_size;
+ int on = 1;
+ socklen_t sa_size;
int ch;
#if defined(IPPROTO_IP) && defined(IP_TOS)
int tos = -1;
* Get socket's security label
*/
if (secflag) {
- int szss = sizeof(ss);
+ socklen_t szss = sizeof(ss);
int sock_multi;
- int szi = sizeof(int);
+ socklen_t szi = sizeof(int);
memset(&dv, 0, sizeof(dv));
proto (int sock, const char *hostname, const char *service)
{
struct sockaddr_in remote, local;
- int addrlen;
+ socklen_t addrlen;
int context_established = 0;
gss_ctx_id_t context_hdl = GSS_C_NO_CONTEXT;
input_chan_bindings.acceptor_address.value = acct_buf;
#if 0
- input_chan_bindings.application_data.value = malloc(4);
+ input_chan_bindings.application_data.value = emalloc(4);
* (unsigned short*)input_chan_bindings.application_data.value = local.sin_port;
* ((unsigned short *)input_chan_bindings.application_data.value + 1) = remote.sin_port;
input_chan_bindings.application_data.length = 4;
proto (int sock, const char *service)
{
struct sockaddr_in remote, local;
- int addrlen;
+ socklen_t addrlen;
gss_ctx_id_t context_hdl = GSS_C_NO_CONTEXT;
gss_buffer_desc real_input_token, real_output_token;
gss_buffer_t input_token = &real_input_token,
acct_buf[2] = (local.sin_addr.s_addr >> 8) & 0xFF;
acct_buf[3] = (local.sin_addr.s_addr >> 0) & 0xFF;
input_chan_bindings.acceptor_address.value = acct_buf;
- input_chan_bindings.application_data.value = malloc(4);
+ input_chan_bindings.application_data.value = emalloc(4);
#if 0
* (unsigned short *)input_chan_bindings.application_data.value =
remote.sin_port;
input_chan_bindings.application_data.value = NULL;
#endif
- delegated_cred_handle = malloc(sizeof(*delegated_cred_handle));
+ delegated_cred_handle = emalloc(sizeof(*delegated_cred_handle));
memset((char*)delegated_cred_handle, 0, sizeof(*delegated_cred_handle));
do {
proto (int sock, const char *hostname, const char *service)
{
struct sockaddr_in remote, local;
- int addrlen;
+ socklen_t addrlen;
int context_established = 0;
gss_ctx_id_t context_hdl = GSS_C_NO_CONTEXT;
proto (int sock, const char *service)
{
struct sockaddr_in remote, local;
- int addrlen;
+ socklen_t addrlen;
gss_ctx_id_t context_hdl = GSS_C_NO_CONTEXT;
gss_buffer_t input_token, output_token;
gss_buffer_desc real_input_token, real_output_token;
proto (int sock, const char *hostname, const char *service)
{
struct sockaddr_in remote, local;
- int addrlen;
+ socklen_t addrlen;
krb5_address remote_addr, local_addr;
krb5_context context;
krb5_ccache ccache;
proto (int sock, const char *service)
{
struct sockaddr_in remote, local;
- int addrlen;
+ socklen_t addrlen;
krb5_address remote_addr, local_addr;
krb5_ccache ccache;
krb5_auth_context auth_context;
{
int first = 1;
struct sockaddr_in admin_addr, client_addr;
- int addr_len;
+ socklen_t addr_len;
krb5_data message, reply;
ssize_t n;
for (i = 0; i < n; ++i)
if (FD_ISSET(sockets[i], &fdset)) {
u_char buf[BUFSIZ];
- int addrlen = sizeof(__ss);
+ socklen_t addrlen = sizeof(__ss);
ret = recvfrom (sockets[i], buf, sizeof(buf), 0,
sa, &addrlen);
if (db->db != NULL) {
/* connection has been opened. ping server. */
struct sockaddr_un addr;
- int sd, len;
+ socklen_t len;
+ int sd;
if (ldap_get_option((LDAP *) db->db, LDAP_OPT_DESC, &sd) == 0 &&
getpeername(sd, (struct sockaddr *) &addr, &len) < 0) {
krb5_principal server;
krb5_error_code ret;
slave *s;
- int addr_len;
+ socklen_t addr_len;
krb5_ticket *ticket = NULL;
char hostname[128];
if (ret && FD_ISSET(signal_fd, &readset)) {
struct sockaddr_un peer_addr;
- int peer_len = sizeof(peer_addr);
+ socklen_t peer_len = sizeof(peer_addr);
if(recvfrom(signal_fd, &vers, sizeof(vers), 0,
(struct sockaddr *)&peer_addr, &peer_len) < 0) {
struct sockaddr_storage ss_local, ss_remote;
struct sockaddr *local = (struct sockaddr *)&ss_local;
struct sockaddr *remote = (struct sockaddr *)&ss_remote;
- int len;
+ socklen_t len;
if (auth_context->local_address == NULL) {
len = sizeof(ss_local);
krb5_address address;
struct sockaddr_storage __ss;
struct sockaddr *sa = (struct sockaddr *)&__ss;
- int len = sizeof(__ss);
+ socklen_t len = sizeof(__ss);
struct hostent *hostent;
int family;
char hname[256];