summaryrefslogtreecommitdiff
path: root/source3
diff options
context:
space:
mode:
authorSimo Sorce <idra@samba.org>2004-03-08 09:52:17 +0000
committerSimo Sorce <idra@samba.org>2004-03-08 09:52:17 +0000
commit9c15b5b0ec08bd13a7f3e888482165207926e7f9 (patch)
treef1d4cf6d9869b52c6015e862adc42b28b0f5844e /source3
parentcd1be774adc1a2509d93e65e48088b5351c99a13 (diff)
downloadsamba-9c15b5b0ec08bd13a7f3e888482165207926e7f9.tar.gz
samba-9c15b5b0ec08bd13a7f3e888482165207926e7f9.tar.bz2
samba-9c15b5b0ec08bd13a7f3e888482165207926e7f9.zip
2 fixes to enhance readability of source code and debug messages
1 fix for a memleak (This used to be commit 9f3b0295fe7bd6c0c3a6061e5d00e7b88f702b21)
Diffstat (limited to 'source3')
-rw-r--r--source3/lib/privileges.c2
-rw-r--r--source3/passdb/passdb.c2
-rw-r--r--source3/smbd/sec_ctx.c6
3 files changed, 6 insertions, 4 deletions
diff --git a/source3/lib/privileges.c b/source3/lib/privileges.c
index 4bcf5e3b36..a3b85372c7 100644
--- a/source3/lib/privileges.c
+++ b/source3/lib/privileges.c
@@ -372,7 +372,7 @@ NTSTATUS dup_priv_set(PRIVILEGE_SET *new_priv_set, PRIVILEGE_SET *priv_set)
LUID_ATTR *old_set;
int i;
- if (!new_priv_set || !priv_set)
+ if (new_priv_set == NULL || priv_set == NULL)
return NT_STATUS_INVALID_PARAMETER;
/* special case if there are no privileges in the list */
diff --git a/source3/passdb/passdb.c b/source3/passdb/passdb.c
index 7c9376e045..273428dacf 100644
--- a/source3/passdb/passdb.c
+++ b/source3/passdb/passdb.c
@@ -1892,6 +1892,8 @@ BOOL init_sam_from_buffer_v1(SAM_ACCOUNT *sampass, uint8 *buf, uint32 buflen)
done:
+ SAFE_FREE(lm_pw_ptr);
+ SAFE_FREE(nt_pw_ptr);
SAFE_FREE(username);
SAFE_FREE(domain);
SAFE_FREE(nt_username);
diff --git a/source3/smbd/sec_ctx.c b/source3/smbd/sec_ctx.c
index 9244f34394..97fe2dfaee 100644
--- a/source3/smbd/sec_ctx.c
+++ b/source3/smbd/sec_ctx.c
@@ -258,7 +258,7 @@ BOOL push_sec_ctx(void)
ctx_p->token = dup_nt_token(sec_ctx_stack[sec_ctx_stack_ndx-1].token);
if (! ctx_p->token) {
- DEBUG(0, ("Out of memory in push_sec_ctx()\n"));
+ DEBUG(0, ("Out of memory on dup_nt_token() in push_sec_ctx()\n"));
return False;
}
@@ -266,7 +266,7 @@ BOOL push_sec_ctx(void)
if (ctx_p->ngroups != 0) {
if (!(ctx_p->groups = malloc(ctx_p->ngroups * sizeof(gid_t)))) {
- DEBUG(0, ("Out of memory in push_sec_ctx()\n"));
+ DEBUG(0, ("Out of memory on malloc() in push_sec_ctx()\n"));
delete_nt_token(&ctx_p->token);
return False;
}
@@ -278,7 +278,7 @@ BOOL push_sec_ctx(void)
init_privilege(&ctx_p->privs);
if (! NT_STATUS_IS_OK(dup_priv_set(ctx_p->privs, sec_ctx_stack[sec_ctx_stack_ndx-1].privs))) {
- DEBUG(0, ("Out of memory in push_sec_ctx()\n"));
+ DEBUG(0, ("Out of memory on dup_priv_set() in push_sec_ctx()\n"));
delete_nt_token(&ctx_p->token);
destroy_privilege(&ctx_p->privs);
return False;