always use GNUNET_memcpy

This commit is contained in:
Christian Grothoff 2023-05-10 01:01:37 +02:00
parent 3ebd0a70b2
commit c014acf3c4
No known key found for this signature in database
GPG Key ID: 939E6BE1E29FC3CC
28 changed files with 231 additions and 231 deletions

View File

@ -172,9 +172,9 @@ coin_history_index (const struct TALER_CoinSpendPublicKeyP *coin_pub)
{ {
uint32_t i; uint32_t i;
memcpy (&i, GNUNET_memcpy (&i,
coin_pub, coin_pub,
sizeof (i)); sizeof (i));
return i % MAX_COIN_HISTORIES; return i % MAX_COIN_HISTORIES;
} }

View File

@ -674,12 +674,12 @@ hash_rc (const char *receiver_account,
size_t slen = strlen (receiver_account); size_t slen = strlen (receiver_account);
char buf[sizeof (struct TALER_WireTransferIdentifierRawP) + slen]; char buf[sizeof (struct TALER_WireTransferIdentifierRawP) + slen];
memcpy (buf, GNUNET_memcpy (buf,
wtid, wtid,
sizeof (*wtid)); sizeof (*wtid));
memcpy (&buf[sizeof (*wtid)], GNUNET_memcpy (&buf[sizeof (*wtid)],
receiver_account, receiver_account,
slen); slen);
GNUNET_CRYPTO_hash (buf, GNUNET_CRYPTO_hash (buf,
sizeof (buf), sizeof (buf),
key); key);
@ -1504,9 +1504,9 @@ history_debit_cb (void *cls,
roi->details.execution_date = dd->execution_date; roi->details.execution_date = dd->execution_date;
roi->details.wtid = dd->wtid; roi->details.wtid = dd->wtid;
roi->details.credit_account_uri = (const char *) &roi[1]; roi->details.credit_account_uri = (const char *) &roi[1];
memcpy (&roi[1], GNUNET_memcpy (&roi[1],
dd->credit_account_uri, dd->credit_account_uri,
slen); slen);
if (GNUNET_OK != if (GNUNET_OK !=
GNUNET_CONTAINER_multihashmap_put (out_map, GNUNET_CONTAINER_multihashmap_put (out_map,
&roi->subject_hash, &roi->subject_hash,
@ -1678,9 +1678,9 @@ reserve_in_cb (void *cls,
rii->details.execution_date = execution_date; rii->details.execution_date = execution_date;
rii->details.reserve_pub = *reserve_pub; rii->details.reserve_pub = *reserve_pub;
rii->details.debit_account_uri = (const char *) &rii[1]; rii->details.debit_account_uri = (const char *) &rii[1];
memcpy (&rii[1], GNUNET_memcpy (&rii[1],
sender_account_details, sender_account_details,
slen); slen);
GNUNET_CRYPTO_hash (&wire_reference, GNUNET_CRYPTO_hash (&wire_reference,
sizeof (uint64_t), sizeof (uint64_t),
&rii->row_off_hash); &rii->row_off_hash);

View File

@ -99,12 +99,12 @@ TALER_BANK_prepare_transfer (
wp->account_len = htonl ((uint32_t) d_len); wp->account_len = htonl ((uint32_t) d_len);
wp->exchange_url_len = htonl ((uint32_t) u_len); wp->exchange_url_len = htonl ((uint32_t) u_len);
end = (char *) &wp[1]; end = (char *) &wp[1];
memcpy (end, GNUNET_memcpy (end,
destination_account_payto_uri, destination_account_payto_uri,
d_len); d_len);
memcpy (end + d_len, GNUNET_memcpy (end + d_len,
exchange_base_url, exchange_base_url,
u_len); u_len);
*buf = (char *) wp; *buf = (char *) wp;
} }

View File

@ -1389,9 +1389,9 @@ make_transfer (
if (NULL != timestamp) if (NULL != timestamp)
*timestamp = t->date; *timestamp = t->date;
t->type = T_DEBIT; t->type = T_DEBIT;
memcpy (t->subject.debit.exchange_base_url, GNUNET_memcpy (t->subject.debit.exchange_base_url,
exchange_base_url, exchange_base_url,
url_len); url_len);
t->subject.debit.wtid = *subject; t->subject.debit.wtid = *subject;
if (NULL == request_uid) if (NULL == request_uid)
GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_NONCE, GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_NONCE,

View File

@ -312,10 +312,10 @@ expired_reserve_cb (void *cls,
memset (&wtid, memset (&wtid,
0, 0,
sizeof (wtid)); sizeof (wtid));
memcpy (&wtid, GNUNET_memcpy (&wtid,
reserve_pub, reserve_pub,
GNUNET_MIN (sizeof (wtid), GNUNET_MIN (sizeof (wtid),
sizeof (*reserve_pub))); sizeof (*reserve_pub)));
qs = db_plugin->insert_reserve_closed (db_plugin->cls, qs = db_plugin->insert_reserve_closed (db_plugin->cls,
reserve_pub, reserve_pub,
now, now,

View File

@ -932,9 +932,9 @@ proceed_with_handler (struct TEH_RequestContext *rc,
/* Parse command-line arguments */ /* Parse command-line arguments */
/* make a copy of 'url' because 'strtok_r()' will modify */ /* make a copy of 'url' because 'strtok_r()' will modify */
memcpy (d, GNUNET_memcpy (d,
url, url,
ulen); ulen);
i = 0; i = 0;
args[i++] = strtok_r (d, "/", &sp); args[i++] = strtok_r (d, "/", &sp);
while ( (NULL != args[i - 1]) && while ( (NULL != args[i - 1]) &&

View File

@ -563,9 +563,9 @@ wire_prepare_cb (void *cls,
} }
wpd = GNUNET_malloc (sizeof (struct WirePrepareData) wpd = GNUNET_malloc (sizeof (struct WirePrepareData)
+ buf_size); + buf_size);
memcpy (&wpd[1], GNUNET_memcpy (&wpd[1],
buf, buf,
buf_size); buf_size);
wpd->buf_size = buf_size; wpd->buf_size = buf_size;
wpd->row_id = rowid; wpd->row_id = rowid;
GNUNET_CONTAINER_DLL_insert (wpd_head, GNUNET_CONTAINER_DLL_insert (wpd_head,

View File

@ -169,9 +169,9 @@ bem_insert (struct GNUNET_PQ_Context *conn,
GNUNET_CRYPTO_hash (&b, GNUNET_CRYPTO_hash (&b,
sizeof (b), sizeof (b),
&hc); &hc);
memcpy (&ihc, GNUNET_memcpy (&ihc,
&hc, &hc,
sizeof (ihc)); sizeof (ihc));
{ {
struct GNUNET_PQ_QueryParam params[] = { struct GNUNET_PQ_QueryParam params[] = {
GNUNET_PQ_query_param_auto_from_type (&hc), GNUNET_PQ_query_param_auto_from_type (&hc),
@ -265,9 +265,9 @@ bem_select (struct GNUNET_PQ_Context *conn,
GNUNET_CRYPTO_hash (&b, GNUNET_CRYPTO_hash (&b,
sizeof (b), sizeof (b),
&hc); &hc);
memcpy (&ihc, GNUNET_memcpy (&ihc,
&hc, &hc,
sizeof (ihc)); sizeof (ihc));
{ {
struct GNUNET_PQ_QueryParam params[] = { struct GNUNET_PQ_QueryParam params[] = {
GNUNET_PQ_query_param_uint32 (&ihc), GNUNET_PQ_query_param_uint32 (&ihc),

View File

@ -1118,9 +1118,9 @@ lrbt_cb_table_refresh_transfer_keys (void *cls,
ctx->error = true; ctx->error = true;
return; return;
} }
memcpy (&td.details.refresh_transfer_keys.tprivs[0], GNUNET_memcpy (&td.details.refresh_transfer_keys.tprivs[0],
tpriv, tpriv,
tpriv_size); tpriv_size);
ctx->cb (ctx->cb_cls, ctx->cb (ctx->cb_cls,
&td); &td);
GNUNET_PQ_cleanup_result (rs); GNUNET_PQ_cleanup_result (rs);

View File

@ -990,9 +990,9 @@ proceed_with_handler (struct TEKT_RequestContext *rc,
/* Parse command-line arguments */ /* Parse command-line arguments */
/* make a copy of 'url' because 'strtok_r()' will modify */ /* make a copy of 'url' because 'strtok_r()' will modify */
memcpy (d, GNUNET_memcpy (d,
url, url,
ulen); ulen);
i = 0; i = 0;
args[i++] = strtok_r (d, "/", &sp); args[i++] = strtok_r (d, "/", &sp);
while ( (NULL != args[i - 1]) && while ( (NULL != args[i - 1]) &&

View File

@ -202,21 +202,21 @@ qconv_denom_pub (void *cls,
} }
len = tlen + sizeof (be); len = tlen + sizeof (be);
buf = GNUNET_malloc (len); buf = GNUNET_malloc (len);
memcpy (buf, GNUNET_memcpy (buf,
be, be,
sizeof (be)); sizeof (be));
switch (denom_pub->cipher) switch (denom_pub->cipher)
{ {
case TALER_DENOMINATION_RSA: case TALER_DENOMINATION_RSA:
memcpy (&buf[sizeof (be)], GNUNET_memcpy (&buf[sizeof (be)],
tbuf, tbuf,
tlen); tlen);
GNUNET_free (tbuf); GNUNET_free (tbuf);
break; break;
case TALER_DENOMINATION_CS: case TALER_DENOMINATION_CS:
memcpy (&buf[sizeof (be)], GNUNET_memcpy (&buf[sizeof (be)],
&denom_pub->details.cs_public_key, &denom_pub->details.cs_public_key,
tlen); tlen);
break; break;
default: default:
GNUNET_assert (0); GNUNET_assert (0);
@ -298,21 +298,21 @@ qconv_denom_sig (void *cls,
} }
len = tlen + sizeof (be); len = tlen + sizeof (be);
buf = GNUNET_malloc (len); buf = GNUNET_malloc (len);
memcpy (buf, GNUNET_memcpy (buf,
&be, &be,
sizeof (be)); sizeof (be));
switch (denom_sig->cipher) switch (denom_sig->cipher)
{ {
case TALER_DENOMINATION_RSA: case TALER_DENOMINATION_RSA:
memcpy (&buf[sizeof (be)], GNUNET_memcpy (&buf[sizeof (be)],
tbuf, tbuf,
tlen); tlen);
GNUNET_free (tbuf); GNUNET_free (tbuf);
break; break;
case TALER_DENOMINATION_CS: case TALER_DENOMINATION_CS:
memcpy (&buf[sizeof (be)], GNUNET_memcpy (&buf[sizeof (be)],
&denom_sig->details.cs_signature, &denom_sig->details.cs_signature,
tlen); tlen);
break; break;
default: default:
GNUNET_assert (0); GNUNET_assert (0);
@ -394,21 +394,21 @@ qconv_blinded_denom_sig (void *cls,
} }
len = tlen + sizeof (be); len = tlen + sizeof (be);
buf = GNUNET_malloc (len); buf = GNUNET_malloc (len);
memcpy (buf, GNUNET_memcpy (buf,
&be, &be,
sizeof (be)); sizeof (be));
switch (denom_sig->cipher) switch (denom_sig->cipher)
{ {
case TALER_DENOMINATION_RSA: case TALER_DENOMINATION_RSA:
memcpy (&buf[sizeof (be)], GNUNET_memcpy (&buf[sizeof (be)],
tbuf, tbuf,
tlen); tlen);
GNUNET_free (tbuf); GNUNET_free (tbuf);
break; break;
case TALER_DENOMINATION_CS: case TALER_DENOMINATION_CS:
memcpy (&buf[sizeof (be)], GNUNET_memcpy (&buf[sizeof (be)],
&denom_sig->details.blinded_cs_answer, &denom_sig->details.blinded_cs_answer,
tlen); tlen);
break; break;
default: default:
GNUNET_assert (0); GNUNET_assert (0);
@ -487,20 +487,20 @@ qconv_blinded_planchet (void *cls,
} }
len = tlen + sizeof (be); len = tlen + sizeof (be);
buf = GNUNET_malloc (len); buf = GNUNET_malloc (len);
memcpy (buf, GNUNET_memcpy (buf,
&be, &be,
sizeof (be)); sizeof (be));
switch (bp->cipher) switch (bp->cipher)
{ {
case TALER_DENOMINATION_RSA: case TALER_DENOMINATION_RSA:
memcpy (&buf[sizeof (be)], GNUNET_memcpy (&buf[sizeof (be)],
bp->details.rsa_blinded_planchet.blinded_msg, bp->details.rsa_blinded_planchet.blinded_msg,
tlen); tlen);
break; break;
case TALER_DENOMINATION_CS: case TALER_DENOMINATION_CS:
memcpy (&buf[sizeof (be)], GNUNET_memcpy (&buf[sizeof (be)],
&bp->details.cs_blinded_planchet, &bp->details.cs_blinded_planchet,
tlen); tlen);
break; break;
default: default:
GNUNET_assert (0); GNUNET_assert (0);
@ -578,17 +578,17 @@ qconv_exchange_withdraw_values (void *cls,
} }
len = tlen + sizeof (be); len = tlen + sizeof (be);
buf = GNUNET_malloc (len); buf = GNUNET_malloc (len);
memcpy (buf, GNUNET_memcpy (buf,
&be, &be,
sizeof (be)); sizeof (be));
switch (alg_values->cipher) switch (alg_values->cipher)
{ {
case TALER_DENOMINATION_RSA: case TALER_DENOMINATION_RSA:
break; break;
case TALER_DENOMINATION_CS: case TALER_DENOMINATION_CS:
memcpy (&buf[sizeof (be)], GNUNET_memcpy (&buf[sizeof (be)],
&alg_values->details.cs_values, &alg_values->details.cs_values,
tlen); tlen);
break; break;
default: default:
GNUNET_assert (0); GNUNET_assert (0);

View File

@ -113,9 +113,9 @@ extract_amount_nbo_helper (PGresult *result,
} }
len = GNUNET_MIN (TALER_CURRENCY_LEN - 1, len = GNUNET_MIN (TALER_CURRENCY_LEN - 1,
strlen (currency)); strlen (currency));
memcpy (r_amount_nbo->currency, GNUNET_memcpy (r_amount_nbo->currency,
currency, currency,
len); len);
return GNUNET_OK; return GNUNET_OK;
} }
@ -420,9 +420,9 @@ extract_denom_pub (void *cls,
GNUNET_break (0); GNUNET_break (0);
return GNUNET_SYSERR; return GNUNET_SYSERR;
} }
memcpy (be, GNUNET_memcpy (be,
res, res,
sizeof (be)); sizeof (be));
res += sizeof (be); res += sizeof (be);
len -= sizeof (be); len -= sizeof (be);
pk->cipher = ntohl (be[0]); pk->cipher = ntohl (be[0]);
@ -445,9 +445,9 @@ extract_denom_pub (void *cls,
GNUNET_break (0); GNUNET_break (0);
return GNUNET_SYSERR; return GNUNET_SYSERR;
} }
memcpy (&pk->details.cs_public_key, GNUNET_memcpy (&pk->details.cs_public_key,
res, res,
len); len);
return GNUNET_OK; return GNUNET_OK;
default: default:
GNUNET_break (0); GNUNET_break (0);
@ -543,9 +543,9 @@ extract_denom_sig (void *cls,
GNUNET_break (0); GNUNET_break (0);
return GNUNET_SYSERR; return GNUNET_SYSERR;
} }
memcpy (&be, GNUNET_memcpy (&be,
res, res,
sizeof (be)); sizeof (be));
if (0x00 != ntohl (be[1])) if (0x00 != ntohl (be[1]))
{ {
GNUNET_break (0); GNUNET_break (0);
@ -572,9 +572,9 @@ extract_denom_sig (void *cls,
GNUNET_break (0); GNUNET_break (0);
return GNUNET_SYSERR; return GNUNET_SYSERR;
} }
memcpy (&sig->details.cs_signature, GNUNET_memcpy (&sig->details.cs_signature,
res, res,
len); len);
return GNUNET_OK; return GNUNET_OK;
default: default:
GNUNET_break (0); GNUNET_break (0);
@ -670,9 +670,9 @@ extract_blinded_denom_sig (void *cls,
GNUNET_break (0); GNUNET_break (0);
return GNUNET_SYSERR; return GNUNET_SYSERR;
} }
memcpy (&be, GNUNET_memcpy (&be,
res, res,
sizeof (be)); sizeof (be));
if (0x01 != ntohl (be[1])) /* magic marker: blinded */ if (0x01 != ntohl (be[1])) /* magic marker: blinded */
{ {
GNUNET_break (0); GNUNET_break (0);
@ -699,9 +699,9 @@ extract_blinded_denom_sig (void *cls,
GNUNET_break (0); GNUNET_break (0);
return GNUNET_SYSERR; return GNUNET_SYSERR;
} }
memcpy (&sig->details.blinded_cs_answer, GNUNET_memcpy (&sig->details.blinded_cs_answer,
res, res,
len); len);
return GNUNET_OK; return GNUNET_OK;
default: default:
GNUNET_break (0); GNUNET_break (0);
@ -798,9 +798,9 @@ extract_blinded_planchet (void *cls,
GNUNET_break (0); GNUNET_break (0);
return GNUNET_SYSERR; return GNUNET_SYSERR;
} }
memcpy (&be, GNUNET_memcpy (&be,
res, res,
sizeof (be)); sizeof (be));
if (0x0100 != ntohl (be[1])) /* magic marker: blinded */ if (0x0100 != ntohl (be[1])) /* magic marker: blinded */
{ {
GNUNET_break (0); GNUNET_break (0);
@ -824,9 +824,9 @@ extract_blinded_planchet (void *cls,
GNUNET_break (0); GNUNET_break (0);
return GNUNET_SYSERR; return GNUNET_SYSERR;
} }
memcpy (&bp->details.cs_blinded_planchet, GNUNET_memcpy (&bp->details.cs_blinded_planchet,
res, res,
len); len);
return GNUNET_OK; return GNUNET_OK;
default: default:
GNUNET_break (0); GNUNET_break (0);
@ -923,9 +923,9 @@ extract_exchange_withdraw_values (void *cls,
GNUNET_break (0); GNUNET_break (0);
return GNUNET_SYSERR; return GNUNET_SYSERR;
} }
memcpy (&be, GNUNET_memcpy (&be,
res, res,
sizeof (be)); sizeof (be));
if (0x010000 != ntohl (be[1])) /* magic marker: EWV */ if (0x010000 != ntohl (be[1])) /* magic marker: EWV */
{ {
GNUNET_break (0); GNUNET_break (0);
@ -949,9 +949,9 @@ extract_exchange_withdraw_values (void *cls,
GNUNET_break (0); GNUNET_break (0);
return GNUNET_SYSERR; return GNUNET_SYSERR;
} }
memcpy (&alg_values->details.cs_values, GNUNET_memcpy (&alg_values->details.cs_values,
res, res,
len); len);
return GNUNET_OK; return GNUNET_OK;
default: default:
GNUNET_break (0); GNUNET_break (0);

View File

@ -297,7 +297,7 @@ static int process(const char *template, struct iwrap *iwrap, FILE *file, const
#endif #endif
if (len > MUSTACH_MAX_LENGTH) if (len > MUSTACH_MAX_LENGTH)
return MUSTACH_ERROR_TAG_TOO_LONG; return MUSTACH_ERROR_TAG_TOO_LONG;
memcpy(name, beg, len); GNUNET_memcpy(name, beg, len);
name[len] = 0; name[len] = 0;
break; break;
} }
@ -317,7 +317,7 @@ static int process(const char *template, struct iwrap *iwrap, FILE *file, const
return MUSTACH_ERROR_BAD_SEPARATORS; return MUSTACH_ERROR_BAD_SEPARATORS;
oplen = l; oplen = l;
tmp = alloca(oplen + 1); tmp = alloca(oplen + 1);
memcpy(tmp, beg, oplen); GNUNET_memcpy(tmp, beg, oplen);
tmp[oplen] = 0; tmp[oplen] = 0;
opstr = tmp; opstr = tmp;
while (l < len && isspace(beg[l])) l++; while (l < len && isspace(beg[l])) l++;
@ -325,7 +325,7 @@ static int process(const char *template, struct iwrap *iwrap, FILE *file, const
return MUSTACH_ERROR_BAD_SEPARATORS; return MUSTACH_ERROR_BAD_SEPARATORS;
cllen = len - l; cllen = len - l;
tmp = alloca(cllen + 1); tmp = alloca(cllen + 1);
memcpy(tmp, beg + l, cllen); GNUNET_memcpy(tmp, beg + l, cllen);
tmp[cllen] = 0; tmp[cllen] = 0;
clstr = tmp; clstr = tmp;
break; break;

View File

@ -85,9 +85,9 @@ run (void *cls,
memset (&wtid, memset (&wtid,
0x5a, 0x5a,
sizeof (wtid)); sizeof (wtid));
memcpy (&exchange_auth_twisted, GNUNET_memcpy (&exchange_auth_twisted,
&bc.exchange_auth, &bc.exchange_auth,
sizeof (struct TALER_BANK_AuthenticationData)); sizeof (struct TALER_BANK_AuthenticationData));
if (with_fakebank) if (with_fakebank)
exchange_auth_twisted.wire_gateway_url = exchange_auth_twisted.wire_gateway_url =
"http://localhost:8888/2/"; "http://localhost:8888/2/";

View File

@ -150,9 +150,9 @@ TALER_TESTING_cmd_batch (const char *label,
bs->batch = GNUNET_new_array (i + 1, bs->batch = GNUNET_new_array (i + 1,
struct TALER_TESTING_Command); struct TALER_TESTING_Command);
memcpy (bs->batch, GNUNET_memcpy (bs->batch,
batch, batch,
sizeof (struct TALER_TESTING_Command) * i); sizeof (struct TALER_TESTING_Command) * i);
{ {
struct TALER_TESTING_Command cmd = { struct TALER_TESTING_Command cmd = {
.cls = bs, .cls = bs,

View File

@ -452,9 +452,9 @@ TALER_TESTING_run2 (struct TALER_TESTING_Interpreter *is,
is->commands = GNUNET_malloc_large ( (i + 1) is->commands = GNUNET_malloc_large ( (i + 1)
* sizeof (struct TALER_TESTING_Command)); * sizeof (struct TALER_TESTING_Command));
GNUNET_assert (NULL != is->commands); GNUNET_assert (NULL != is->commands);
memcpy (is->commands, GNUNET_memcpy (is->commands,
commands, commands,
sizeof (struct TALER_TESTING_Command) * i); sizeof (struct TALER_TESTING_Command) * i);
is->timeout_task = GNUNET_SCHEDULER_add_delayed ( is->timeout_task = GNUNET_SCHEDULER_add_delayed (
timeout, timeout,
&do_timeout, &do_timeout,

View File

@ -72,9 +72,9 @@ TALER_string_to_amount (const char *str,
} }
GNUNET_assert (TALER_CURRENCY_LEN > (colon - str)); GNUNET_assert (TALER_CURRENCY_LEN > (colon - str));
memcpy (amount->currency, GNUNET_memcpy (amount->currency,
str, str,
colon - str); colon - str);
/* 0-terminate *and* normalize buffer by setting everything to '\0' */ /* 0-terminate *and* normalize buffer by setting everything to '\0' */
memset (&amount->currency [colon - str], memset (&amount->currency [colon - str],
0, 0,
@ -193,9 +193,9 @@ TALER_amount_hton (struct TALER_AmountNBO *res,
TALER_amount_is_valid (d)); TALER_amount_is_valid (d));
res->value = GNUNET_htonll (d->value); res->value = GNUNET_htonll (d->value);
res->fraction = htonl (d->fraction); res->fraction = htonl (d->fraction);
memcpy (res->currency, GNUNET_memcpy (res->currency,
d->currency, d->currency,
TALER_CURRENCY_LEN); TALER_CURRENCY_LEN);
} }
@ -205,9 +205,9 @@ TALER_amount_ntoh (struct TALER_Amount *res,
{ {
res->value = GNUNET_ntohll (dn->value); res->value = GNUNET_ntohll (dn->value);
res->fraction = ntohl (dn->fraction); res->fraction = ntohl (dn->fraction);
memcpy (res->currency, GNUNET_memcpy (res->currency,
dn->currency, dn->currency,
TALER_CURRENCY_LEN); TALER_CURRENCY_LEN);
GNUNET_assert (GNUNET_YES == GNUNET_assert (GNUNET_YES ==
TALER_amount_is_valid (res)); TALER_amount_is_valid (res));
} }
@ -225,9 +225,9 @@ TALER_amount_set_zero (const char *cur,
memset (amount, memset (amount,
0, 0,
sizeof (struct TALER_Amount)); sizeof (struct TALER_Amount));
memcpy (amount->currency, GNUNET_memcpy (amount->currency,
cur, cur,
slen); slen);
return GNUNET_OK; return GNUNET_OK;
} }
@ -680,9 +680,9 @@ TALER_amount_multiply (struct TALER_Amount *result,
if (GNUNET_SYSERR == if (GNUNET_SYSERR ==
TALER_amount_normalize (&in)) TALER_amount_normalize (&in))
return TALER_AAR_INVALID_NORMALIZATION_FAILED; return TALER_AAR_INVALID_NORMALIZATION_FAILED;
memcpy (result->currency, GNUNET_memcpy (result->currency,
amount->currency, amount->currency,
TALER_CURRENCY_LEN); TALER_CURRENCY_LEN);
if ( (0 == factor) || if ( (0 == factor) ||
( (0 == in.value) && ( (0 == in.value) &&
(0 == in.fraction) ) ) (0 == in.fraction) ) )

View File

@ -90,9 +90,9 @@ compute_totp (struct GNUNET_TIME_Timestamp ts,
mc = gcry_md_read (md, mc = gcry_md_read (md,
GCRY_MD_SHA1); GCRY_MD_SHA1);
GNUNET_assert (NULL != mc); GNUNET_assert (NULL != mc);
memcpy (hmac, GNUNET_memcpy (hmac,
mc, mc,
sizeof (hmac)); sizeof (hmac));
gcry_md_close (md); gcry_md_close (md);
} }

View File

@ -131,9 +131,9 @@ blob_encrypt (const struct NonceP *nonce,
+ data_size; + data_size;
*res_size = ciphertext_size; *res_size = ciphertext_size;
*res = GNUNET_malloc (ciphertext_size); *res = GNUNET_malloc (ciphertext_size);
memcpy (*res, GNUNET_memcpy (*res,
nonce, nonce,
crypto_secretbox_NONCEBYTES); crypto_secretbox_NONCEBYTES);
GNUNET_assert (0 == GNUNET_assert (0 ==
crypto_secretbox_easy (*res + crypto_secretbox_NONCEBYTES, crypto_secretbox_easy (*res + crypto_secretbox_NONCEBYTES,
data, data,
@ -274,9 +274,9 @@ TALER_CRYPTO_contract_encrypt_for_merge (
hdr->header.ctype = htonl (TALER_EXCHANGE_CONTRACT_PAYMENT_OFFER); hdr->header.ctype = htonl (TALER_EXCHANGE_CONTRACT_PAYMENT_OFFER);
hdr->header.clen = htonl ((uint32_t) clen); hdr->header.clen = htonl ((uint32_t) clen);
hdr->merge_priv = *merge_priv; hdr->merge_priv = *merge_priv;
memcpy (&hdr[1], GNUNET_memcpy (&hdr[1],
xbuf, xbuf,
cbuf_size); cbuf_size);
GNUNET_free (xbuf); GNUNET_free (xbuf);
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_NONCE, GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_NONCE,
&nonce, &nonce,
@ -423,9 +423,9 @@ TALER_CRYPTO_contract_encrypt_for_deposit (
hdr = GNUNET_malloc (sizeof (*hdr) + cbuf_size); hdr = GNUNET_malloc (sizeof (*hdr) + cbuf_size);
hdr->ctype = htonl (TALER_EXCHANGE_CONTRACT_PAYMENT_REQUEST); hdr->ctype = htonl (TALER_EXCHANGE_CONTRACT_PAYMENT_REQUEST);
hdr->clen = htonl ((uint32_t) clen); hdr->clen = htonl ((uint32_t) clen);
memcpy (&hdr[1], GNUNET_memcpy (&hdr[1],
xbuf, xbuf,
cbuf_size); cbuf_size);
GNUNET_free (xbuf); GNUNET_free (xbuf);
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_NONCE, GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_NONCE,
&nonce, &nonce,
@ -441,12 +441,12 @@ TALER_CRYPTO_contract_encrypt_for_deposit (
GNUNET_free (hdr); GNUNET_free (hdr);
/* prepend purse_pub */ /* prepend purse_pub */
*econtract = GNUNET_malloc (xecontract_size + sizeof (*purse_pub)); *econtract = GNUNET_malloc (xecontract_size + sizeof (*purse_pub));
memcpy (*econtract, GNUNET_memcpy (*econtract,
purse_pub, purse_pub,
sizeof (*purse_pub)); sizeof (*purse_pub));
memcpy (sizeof (*purse_pub) + *econtract, GNUNET_memcpy (sizeof (*purse_pub) + *econtract,
xecontract, xecontract,
xecontract_size); xecontract_size);
*econtract_size = xecontract_size + sizeof (*purse_pub); *econtract_size = xecontract_size + sizeof (*purse_pub);
GNUNET_free (xecontract); GNUNET_free (xecontract);
} }
@ -573,9 +573,9 @@ TALER_CRYPTO_kyc_attributes_encrypt (
cbuf_size = compressBound (clen); cbuf_size = compressBound (clen);
xbuf = GNUNET_malloc (cbuf_size + sizeof (uint32_t)); xbuf = GNUNET_malloc (cbuf_size + sizeof (uint32_t));
belen = htonl ((uint32_t) clen); belen = htonl ((uint32_t) clen);
memcpy (xbuf, GNUNET_memcpy (xbuf,
&belen, &belen,
sizeof (belen)); sizeof (belen));
ret = compress (xbuf + 4, ret = compress (xbuf + 4,
&cbuf_size, &cbuf_size,
(const Bytef *) cstr, (const Bytef *) cstr,
@ -623,9 +623,9 @@ TALER_CRYPTO_kyc_attributes_decrypt (
GNUNET_break_op (0); GNUNET_break_op (0);
return NULL; return NULL;
} }
memcpy (&belen, GNUNET_memcpy (&belen,
xhdr, xhdr,
sizeof (belen)); sizeof (belen));
clen = ntohl (belen); clen = ntohl (belen);
if (clen >= GNUNET_MAX_MALLOC_CHECKED) if (clen >= GNUNET_MAX_MALLOC_CHECKED)
{ {

View File

@ -357,9 +357,9 @@ TALER_CRYPTO_helper_esign_sign_ (
sr->header.size = htons (sizeof (buf)); sr->header.size = htons (sizeof (buf));
sr->header.type = htons (TALER_HELPER_EDDSA_MT_REQ_SIGN); sr->header.type = htons (TALER_HELPER_EDDSA_MT_REQ_SIGN);
sr->reserved = htonl (0); sr->reserved = htonl (0);
memcpy (&sr->purpose, GNUNET_memcpy (&sr->purpose,
purpose, purpose,
purpose_size); purpose_size);
if (GNUNET_OK != if (GNUNET_OK !=
TALER_crypto_helper_send_all (esh->sock, TALER_crypto_helper_send_all (esh->sock,
buf, buf,

View File

@ -417,9 +417,9 @@ TALER_CRYPTO_helper_rsa_sign (
sr->header.type = htons (TALER_HELPER_RSA_MT_REQ_SIGN); sr->header.type = htons (TALER_HELPER_RSA_MT_REQ_SIGN);
sr->reserved = htonl (0); sr->reserved = htonl (0);
sr->h_rsa = *rsr->h_rsa; sr->h_rsa = *rsr->h_rsa;
memcpy (&sr[1], GNUNET_memcpy (&sr[1],
rsr->msg, rsr->msg,
rsr->msg_size); rsr->msg_size);
if (GNUNET_OK != if (GNUNET_OK !=
TALER_crypto_helper_send_all (dh->sock, TALER_crypto_helper_send_all (dh->sock,
buf, buf,
@ -655,9 +655,9 @@ TALER_CRYPTO_helper_rsa_batch_sign (
sr->header.size = htons (sizeof (*sr) + rsr->msg_size); sr->header.size = htons (sizeof (*sr) + rsr->msg_size);
sr->reserved = htonl (0); sr->reserved = htonl (0);
sr->h_rsa = *rsr->h_rsa; sr->h_rsa = *rsr->h_rsa;
memcpy (&sr[1], GNUNET_memcpy (&sr[1],
rsr->msg, rsr->msg,
rsr->msg_size); rsr->msg_size);
wbuf += sizeof (*sr) + rsr->msg_size; wbuf += sizeof (*sr) + rsr->msg_size;
} }
GNUNET_assert (wbuf == &obuf[mlen]); GNUNET_assert (wbuf == &obuf[mlen]);

View File

@ -1177,10 +1177,10 @@ TALER_exchange_online_denomination_expired_sign (
}; };
/* strncpy would create a compiler warning */ /* strncpy would create a compiler warning */
memcpy (dua.operation, GNUNET_memcpy (dua.operation,
op, op,
GNUNET_MIN (sizeof (dua.operation), GNUNET_MIN (sizeof (dua.operation),
strlen (op))); strlen (op)));
return scb (&dua.purpose, return scb (&dua.purpose,
pub, pub,
sig); sig);
@ -1204,10 +1204,10 @@ TALER_exchange_online_denomination_expired_verify (
}; };
/* strncpy would create a compiler warning */ /* strncpy would create a compiler warning */
memcpy (dua.operation, GNUNET_memcpy (dua.operation,
op, op,
GNUNET_MIN (sizeof (dua.operation), GNUNET_MIN (sizeof (dua.operation),
strlen (op))); strlen (op)));
return return
GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_EXCHANGE_AFFIRM_DENOM_EXPIRED, GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_EXCHANGE_AFFIRM_DENOM_EXPIRED,
&dua, &dua,

View File

@ -233,9 +233,9 @@ TALER_iban_validate (const char *iban)
return GNUNET_strdup ("IBAN number too short to be valid"); return GNUNET_strdup ("IBAN number too short to be valid");
if (len > 34) if (len > 34)
return GNUNET_strdup ("IBAN number too long to be valid"); return GNUNET_strdup ("IBAN number too long to be valid");
memcpy (cc, iban, 2); GNUNET_memcpy (cc, iban, 2);
memcpy (ibancpy, iban + 4, len - 4); GNUNET_memcpy (ibancpy, iban + 4, len - 4);
memcpy (ibancpy + len - 4, iban, 4); GNUNET_memcpy (ibancpy + len - 4, iban, 4);
ibancpy[len] = '\0'; ibancpy[len] = '\0';
cc_entry.code = cc; cc_entry.code = cc;
cc_entry.english = NULL; cc_entry.english = NULL;

View File

@ -267,9 +267,9 @@ TALER_payto_hash (const char *payto,
&sha512); &sha512);
GNUNET_static_assert (sizeof (sha512) > sizeof (*h_payto)); GNUNET_static_assert (sizeof (sha512) > sizeof (*h_payto));
/* truncate */ /* truncate */
memcpy (h_payto, GNUNET_memcpy (h_payto,
&sha512, &sha512,
sizeof (*h_payto)); sizeof (*h_payto));
} }

View File

@ -423,9 +423,9 @@ generate_response (struct DenominationKey *dk)
&an->secm_sig); &an->secm_sig);
an->secm_pub = TES_smpub; an->secm_pub = TES_smpub;
p = (void *) &an[1]; p = (void *) &an[1];
memcpy (p, GNUNET_memcpy (p,
denom->section, denom->section,
nlen); nlen);
dk->an = an; dk->an = an;
} }
@ -1373,9 +1373,9 @@ cs_client_init (struct TES_Client *client)
NULL != dk; NULL != dk;
dk = dk->next) dk = dk->next)
{ {
memcpy (&buf[obs], GNUNET_memcpy (&buf[obs],
dk->an, dk->an,
ntohs (dk->an->header.size)); ntohs (dk->an->header.size));
obs += ntohs (dk->an->header.size); obs += ntohs (dk->an->header.size);
} }
} }
@ -1472,18 +1472,18 @@ cs_update_client_keys (struct TES_Client *client)
.h_cs = key->h_cs .h_cs = key->h_cs
}; };
memcpy (&buf[obs], GNUNET_memcpy (&buf[obs],
&pn, &pn,
sizeof (pn)); sizeof (pn));
GNUNET_assert (obs + sizeof (pn) GNUNET_assert (obs + sizeof (pn)
> obs); > obs);
obs += sizeof (pn); obs += sizeof (pn);
} }
else else
{ {
memcpy (&buf[obs], GNUNET_memcpy (&buf[obs],
key->an, key->an,
ntohs (key->an->header.size)); ntohs (key->an->header.size));
GNUNET_assert (obs + ntohs (key->an->header.size) GNUNET_assert (obs + ntohs (key->an->header.size)
> obs); > obs);
obs += ntohs (key->an->header.size); obs += ntohs (key->an->header.size);

View File

@ -826,9 +826,9 @@ parse_key (const char *filename,
filename); filename);
return GNUNET_SYSERR; return GNUNET_SYSERR;
} }
memcpy (&priv, GNUNET_memcpy (&priv,
buf, buf,
buf_size); buf_size);
{ {
struct GNUNET_CRYPTO_EddsaPublicKey pub; struct GNUNET_CRYPTO_EddsaPublicKey pub;

View File

@ -394,13 +394,13 @@ generate_response (struct DenominationKey *dk)
&an->secm_sig); &an->secm_sig);
an->secm_pub = TES_smpub; an->secm_pub = TES_smpub;
p = (void *) &an[1]; p = (void *) &an[1];
memcpy (p, GNUNET_memcpy (p,
buf, buf,
buf_len); buf_len);
GNUNET_free (buf); GNUNET_free (buf);
memcpy (p + buf_len, GNUNET_memcpy (p + buf_len,
denom->section, denom->section,
nlen); nlen);
dk->an = an; dk->an = an;
} }
@ -524,9 +524,9 @@ send_signature (struct TES_Client *client,
sr = GNUNET_malloc (tsize); sr = GNUNET_malloc (tsize);
sr->header.size = htons (tsize); sr->header.size = htons (tsize);
sr->header.type = htons (TALER_HELPER_RSA_MT_RES_SIGNATURE); sr->header.type = htons (TALER_HELPER_RSA_MT_RES_SIGNATURE);
memcpy (&sr[1], GNUNET_memcpy (&sr[1],
buf, buf,
buf_size); buf_size);
GNUNET_free (buf); GNUNET_free (buf);
ret = TES_transmit (client->csock, ret = TES_transmit (client->csock,
&sr->header); &sr->header);
@ -1111,9 +1111,9 @@ rsa_client_init (struct TES_Client *client)
NULL != dk; NULL != dk;
dk = dk->next) dk = dk->next)
{ {
memcpy (&buf[obs], GNUNET_memcpy (&buf[obs],
dk->an, dk->an,
ntohs (dk->an->header.size)); ntohs (dk->an->header.size));
GNUNET_assert (obs + ntohs (dk->an->header.size) GNUNET_assert (obs + ntohs (dk->an->header.size)
> obs); > obs);
obs += ntohs (dk->an->header.size); obs += ntohs (dk->an->header.size);
@ -1212,18 +1212,18 @@ rsa_update_client_keys (struct TES_Client *client)
.h_rsa = key->h_rsa .h_rsa = key->h_rsa
}; };
memcpy (&buf[obs], GNUNET_memcpy (&buf[obs],
&pn, &pn,
sizeof (pn)); sizeof (pn));
GNUNET_assert (obs + sizeof (pn) GNUNET_assert (obs + sizeof (pn)
> obs); > obs);
obs += sizeof (pn); obs += sizeof (pn);
} }
else else
{ {
memcpy (&buf[obs], GNUNET_memcpy (&buf[obs],
key->an, key->an,
ntohs (key->an->header.size)); ntohs (key->an->header.size));
GNUNET_assert (obs + ntohs (key->an->header.size) GNUNET_assert (obs + ntohs (key->an->header.size)
> obs); > obs);
obs += ntohs (key->an->header.size); obs += ntohs (key->an->header.size);

View File

@ -41,9 +41,9 @@ TALER_b2s (const void *buf,
&hc); &hc);
tmp = GNUNET_STRINGS_data_to_string_alloc (&hc, tmp = GNUNET_STRINGS_data_to_string_alloc (&hc,
sizeof (hc)); sizeof (hc));
memcpy (ret, GNUNET_memcpy (ret,
tmp, tmp,
8); 8);
GNUNET_free (tmp); GNUNET_free (tmp);
ret[8] = '\0'; ret[8] = '\0';
return ret; return ret;