From 5b80b9340fb64413f68d625cf5ca57344c0adbd7 Mon Sep 17 00:00:00 2001 From: Derrell Lipman Date: Thu, 6 Mar 2008 09:00:37 -0500 Subject: Check for NULL pointers before dereferencing them. (This used to be commit 6f65390cec218a6aac4370ee381f30439617dcec) --- source3/libsmb/libsmb_server.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'source3') diff --git a/source3/libsmb/libsmb_server.c b/source3/libsmb/libsmb_server.c index 64eb1ea584..37612c6e39 100644 --- a/source3/libsmb/libsmb_server.c +++ b/source3/libsmb/libsmb_server.c @@ -144,6 +144,10 @@ SMBC_find_server(TALLOC_CTX *ctx, SMBCSRV *srv; int auth_called = 0; + if (!pp_workgroup || !pp_username || !pp_password) { + return NULL; + } + check_server_cache: srv = smbc_getFunctionGetCachedServer(context)(context, @@ -156,10 +160,6 @@ check_server_cache: SMBC_call_auth_fn(ctx, context, server, share, pp_workgroup, pp_username, pp_password); - if (!pp_workgroup || !pp_username || !pp_password) { - return NULL; - } - /* * However, smbc_auth_fn may have picked up info relating to * an existing connection, so try for an existing connection -- cgit