# endif /* KRB5_MIT_OLD11 */
# ifdef KRB5CHECKAUTH
- if (!cklens && !(cklens = (size_t *)calloc(sizeof(int), n + 1)))
+ if (cklens == NULL
+ && (cklens = (size_t *)calloc(sizeof(int), n + 1)) == NULL)
return NULL;
for (i = 0; i < n; i++) {
conlen = (etype) ? 8 : 0;
- if (!cksumlens && !(cksumlens = populate_cksumlens()))
+ if (cksumlens NULL
+ && (cksumlens = populate_cksumlens()) == NULL)
return NULL;
for (i = 0; (cklen = cksumlens[i]) != 0; i++) {
test_auth = a + conlen + cklen;
krb5_data krb5_app_req;
kssl_err_set(kssl_err, 0, "");
- memset((char *)&krb5creds, 0, sizeof(krb5creds));
+ memset(&krb5creds, 0, sizeof(krb5creds));
if (!kssl_ctx) {
kssl_err_set(kssl_err, SSL_R_KRB5_S_INIT, "No kssl_ctx defined.\n");
krb5_creds krb5creds, *krb5credsp = NULL;
int rc = 0;
- memset((char *)&krb5creds, 0, sizeof(krb5creds));
+ memset(&krb5creds, 0, sizeof(krb5creds));
if (!kssl_ctx)
return (0);
}
# endif
enc = kssl_map_enc(enctype);
- memset(iv, 0, sizeof iv); /* per RFC 1510 */
+ memset(iv, 0, sizeof(iv)); /* per RFC 1510 */
if (enc == NULL) {
/*
goto err;
}
- memset(&tm_time, 0, sizeof(struct tm));
+ memset(&tm_time, 0, sizeof(tm_tmime));
if (k_gmtime(auth->ctime, &tm_time) &&
((tr = mktime(&tm_time)) != (time_t)(-1))) {
now = time(&now);