From 201bcc8ed291b51be6f4508c6aa1cb17ce6dcbe3 Mon Sep 17 00:00:00 2001 From: Jeremy Allison Date: Tue, 27 May 2008 12:27:57 -0700 Subject: [PATCH] Memory leak fixes from Chere Zhou . Jeremy. --- source/libads/kerberos.c | 4 ++++ source/libsmb/smbencrypt.c | 1 + 2 files changed, 5 insertions(+) diff --git a/source/libads/kerberos.c b/source/libads/kerberos.c index 2adf6a4700e..c4135f24a1c 100644 --- a/source/libads/kerberos.c +++ b/source/libads/kerberos.c @@ -649,6 +649,10 @@ bool kerberos_secrets_store_salting_principal(const char *service, SAFE_FREE(princ_s); SAFE_FREE(unparsed_name); + if (princ) { + krb5_free_principal(context, princ); + } + if (context) { krb5_free_context(context); } diff --git a/source/libsmb/smbencrypt.c b/source/libsmb/smbencrypt.c index f339b6b9f69..a8a88a8a7e4 100644 --- a/source/libsmb/smbencrypt.c +++ b/source/libsmb/smbencrypt.c @@ -181,6 +181,7 @@ bool ntv2_owf_gen(const uchar owf[16], if (!push_ucs2_allocate(&domain, domain_in, &domain_byte_len)) { DEBUG(0, ("push_uss2_allocate() for domain failed: %s\n", strerror(errno))); + SAFE_FREE(user); return False; }