spurious Coverity defects. (Far from a comprehensive pass.)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@21782
dc483132-0cff-0310-8789-
dd5450dbe970
krb5_error_code retval;
krb5_data *scratch;
+ *out = NULL;
memset(&errpkt, 0, sizeof(errpkt));
retval = krb5_us_timeofday(kdc_context, &errpkt.stime, &errpkt.susec);
char *regexp;
int i, ret;
kadm5_server_handle_t handle = server_handle;
-
+
+ *princs = NULL;
*count = 0;
if (exp == NULL)
exp = "*";
krb5_tl_data tl_data;
krb5_error_code code;
+ *mod_princ = NULL;
+ *mod_time = 0;
+
tl_data.tl_data_type = KRB5_TL_MOD_PRINC;
if ((code = krb5_dbe_lookup_tl_data(context, entry, &tl_data)))
int len2, ilen;
char *buf = NULL;
int fd = *( (int *) fdp);
-
+
+ inbuf->data = NULL;
+ inbuf->length = 0;
+
if ((len2 = krb5_net_read(context, fd, (char *)&len, 4)) != 4)
return((len2 < 0) ? errno : ECONNABORTED);
len = ntohl(len);
unsigned char *p = NULL;
ASN1_INTEGER *pub_key = NULL;
+ *dh_pubkey = *server_key = NULL;
+ *dh_pubkey_len = *server_key_len = 0;
+
/* get client's received DH parameters that we saved in server_check_dh */
dh = cryptoctx->dh;