tdc->f.states &= ~(DRO|DBackup|DRW);
afs_DCMoveBucket(tdc, 0, 0);
} else {
- if (&tdc->f != 0) {
- if (tdc->f.states & DRO) {
- afs_DCMoveBucket(tdc, 0, 2);
- } else if (tdc->f.states & DBackup) {
- afs_DCMoveBucket(tdc, 0, 1);
- } else {
- afs_DCMoveBucket(tdc, 0, 1);
- }
+ if (tdc->f.states & DRO) {
+ afs_DCMoveBucket(tdc, 0, 2);
+ } else if (tdc->f.states & DBackup) {
+ afs_DCMoveBucket(tdc, 0, 1);
+ } else {
+ afs_DCMoveBucket(tdc, 0, 1);
}
}
tdc->refCount = 1;
afs_com_err(whoami, code, "(configuring connection security)");
ERROR(BC_NOCELLCONFIG);
}
- if (&udbHandle.uh_scIndex == RX_SECIDX_NULL && !noAuthFlag)
+ if (udbHandle.uh_scIndex == RX_SECIDX_NULL && !noAuthFlag)
afs_com_err(whoami, 0, "Can't get tokens - running unauthenticated");
/* We have to have space for the trailing NULL that terminates the server
struct rx_connection *
afscp_ServerConnection(const struct afscp_server *srv, int i)
{
- if (srv == NULL || srv->conns == NULL)
+ if (srv == NULL)
return NULL;
if (i >= srv->naddrs || i < 0)
return NULL;
common_prolog(as, &state);
common_volop_prolog(as, &state);
- if (state.vop->partName==0 || *(state.vop->partName)==0) {
+ if (*(state.vop->partName)==0) {
fprintf(stderr, "required argument -partition not given\n");
return -1;
}