krb5int_yarrow_final tests if the Yarrow_CTX* is valid (not NULL) -
and if not - signals and error for return - but still invokes
mem_zero (memset) with it as an argument. This will only happen in
an out-of-memory situation.
ticket: 6512
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@22410
dc483132-0cff-0310-8789-
dd5450dbe970
CATCH:
krb5int_yarrow_cipher_final(&y->cipher);
- mem_zero( y, sizeof(Yarrow_CTX) );
+ if ( y )
+ mem_zero( y, sizeof(Yarrow_CTX) );
if ( locked ) { TRY( UNLOCK() ); }
EXCEP_RET;
}