vb = tmpl_value(vpt);
fr_value_box_init(vb, FR_TYPE_ETHERNET, NULL, false);
+ /* coverity[uninit_use_in_call] */
memcpy(vb->vb_ether, buff, sizeof(vb->vb_ether));
*out = vpt;
len = xlat_eval(charbuf, sizeof(charbuf), request, "%(mschap:LM-Hash %{User-Password})", NULL, NULL);
if (len < 0) RETURN_MODULE_FAIL;
+ /* coverity[uninit_use_in_call] */
if ((fr_base16_decode(NULL, &FR_DBUFF_TMP(digest, sizeof(digest)), &FR_SBUFF_IN(charbuf, len), false) !=
(ssize_t)known_good->vp_length) ||
(fr_digest_cmp(digest, known_good->vp_octets, known_good->vp_length) != 0)) {
fr_md5_calc(buff, (uint8_t *) buff2, p - buff2);
}
+ /* coverity[uninit_use_in_call] */
if (fr_digest_cmp(digest, buff, 16) != 0) {
REDEBUG("NS-MTA-MD5 digest does not match \"known good\" digest");
RETURN_MODULE_REJECT;