In the previous patch - I neglected a potential NULL deref in the call
authorEzra Peisach <epeisach@mit.edu>
Wed, 17 Jun 2009 17:51:31 +0000 (17:51 +0000)
committerEzra Peisach <epeisach@mit.edu>
Wed, 17 Jun 2009 17:51:31 +0000 (17:51 +0000)
to krb5int_yarrow_cipher_final.  Trivial fix.

ticket: 6512

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@22413 dc483132-0cff-0310-8789-dd5450dbe970

src/lib/crypto/yarrow/yarrow.c

index 9e3c915881c871f470dea5fa97976fd17cf9cce3..ff25fa9c5d220eb9598c551e77379dd2b39911db 100644 (file)
@@ -917,9 +917,11 @@ int krb5int_yarrow_final(Yarrow_CTX* y)
 #endif
 
  CATCH:
-    krb5int_yarrow_cipher_final(&y->cipher);
     if ( y ) 
+    {
+       krb5int_yarrow_cipher_final(&y->cipher);
        mem_zero( y, sizeof(Yarrow_CTX) );
+    }
     if ( locked ) { TRY( UNLOCK() ); }
     EXCEP_RET;
 }