@@ -359,7 +359,6 @@ parse_auth_server(FILE * file, const char *filename, int *linenum)
359
359
new = safe_malloc (sizeof (t_auth_serv ));
360
360
361
361
/* Fill in struct */
362
- memset (new , 0 , sizeof (t_auth_serv )); /*< Fill all with NULL */
363
362
new -> authserv_hostname = host ;
364
363
new -> authserv_use_ssl = ssl_available ;
365
364
new -> authserv_path = path ;
@@ -556,7 +555,6 @@ _parse_firewall_rule(const char *ruleset, char *leftover)
556
555
}
557
556
/* Generate rule record */
558
557
tmp = safe_malloc (sizeof (t_firewall_rule ));
559
- memset ((void * )tmp , 0 , sizeof (t_firewall_rule ));
560
558
tmp -> target = target ;
561
559
tmp -> mask_is_ipset = mask_is_ipset ;
562
560
if (protocol != NULL )
@@ -573,7 +571,6 @@ _parse_firewall_rule(const char *ruleset, char *leftover)
573
571
/* Append the rule record */
574
572
if (config .rulesets == NULL ) {
575
573
config .rulesets = safe_malloc (sizeof (t_firewall_ruleset ));
576
- memset (config .rulesets , 0 , sizeof (t_firewall_ruleset ));
577
574
config .rulesets -> name = safe_strdup (ruleset );
578
575
tmpr = config .rulesets ;
579
576
} else {
@@ -585,7 +582,6 @@ _parse_firewall_rule(const char *ruleset, char *leftover)
585
582
if (tmpr == NULL ) {
586
583
/* Rule did not exist */
587
584
tmpr = safe_malloc (sizeof (t_firewall_ruleset ));
588
- memset (tmpr , 0 , sizeof (t_firewall_ruleset ));
589
585
tmpr -> name = safe_strdup (ruleset );
590
586
tmpr2 -> next = tmpr ;
591
587
}
0 commit comments