Coverity sees negoex_init() test whether input_token is null before
parsing messages, then dereference input_token in verify_checksum().
Of course verify_checksum() will not find a checksum message if no
messages were parsed. Add an assert to squash the false positive
forward-null defect.
/* Verify the checksum over the existing transcript and the portion of the
* input token leading up to the verify message. */
+ assert(input_token != NULL);
iov[0].flags = KRB5_CRYPTO_TYPE_DATA;
iov[0].data = make_data(ctx->negoex_transcript.data,
ctx->negoex_transcript.len);