Also more insertion of parenthesis to handle struct members called
'free'.
You can now get useful dmalloc output, as long as it is compatible
with your C library. On RH7.1 it looks like you have to rebuild
dmalloc to allow free(0) by default, because something in libcrypt
does that. (sigh)
(This used to be commit
391cbb690196537c8b6292b42c2e27408cc7e249)
nt_status = plaintext_auth_context->check_ntlm_password(plaintext_auth_context,
user_info, &server_info);
- plaintext_auth_context->free(&plaintext_auth_context);
+ (plaintext_auth_context->free)(&plaintext_auth_context);
}
free_user_info(&user_info);
free_server_info(&server_info);
# Print very concise instructions on building/use
if test "x$enable_dmalloc" = xyes
then
- echo "$ac_t""Note: The dmalloc debug library will be included." 1>&6
- echo "$ac_t"" Use the \"dmalloc\" command to turn it on." 1>&6
+ echo "$ac_t""Note: The dmalloc debug library will be included. To turn it on use" 1>&6
+ echo "$ac_t"" \$ eval \`dmalloc samba\`." 1>&6
fi
# Print very concise instructions on building/use
if test "x$enable_dmalloc" = xyes
then
- AC_MSG_RESULT([Note: The dmalloc debug library will be included.])
- AC_MSG_RESULT([ Use the \"dmalloc\" command to turn it on.])
+ AC_MSG_RESULT([Note: The dmalloc debug library will be included. To turn it on use])
+ AC_MSG_RESULT([ \$ eval \`dmalloc samba\`.])
fi
\ No newline at end of file
} else {
status = auth_context->check_ntlm_password(auth_context, user_info, &server_info);
}
- auth_context->free(&auth_context);
+ (auth_context->free)(&auth_context);
break;
}
status = auth_context->check_ntlm_password(auth_context, user_info, &server_info);
}
- auth_context->free(&auth_context);
+ (auth_context->free)(&auth_context);
break;
}
nt_status = auth_context->check_ntlm_password(auth_context, user_info, &server_info);
- auth_context->free(&auth_context);
+ (auth_context->free)(&auth_context);
free_user_info(&user_info);
p->ntlmssp_auth_validated = NT_STATUS_IS_OK(nt_status);
/* We might be called more than once, muliple negprots are premitted */
if (negprot_global_auth_context) {
DEBUG(3, ("get challange: is this a secondary negprot? negprot_global_auth_context is non-NULL!\n"));
- negprot_global_auth_context->free(&negprot_global_auth_context);
+ (negprot_global_auth_context->free)(&negprot_global_auth_context);
}
DEBUG(10, ("get challange: creating negprot_global_auth_context\n"));
DEBUG(2,("Closing connections\n"));
if (negprot_global_auth_context) {
- negprot_global_auth_context->free(&negprot_global_auth_context);
+ (negprot_global_auth_context->free)(&negprot_global_auth_context);
}
conn_close_all();
}
if (!make_user_info_guest(&user_info)) {
- auth_context->free(&auth_context);
+ (auth_context->free)(&auth_context);
return NT_STATUS_NO_MEMORY;
}
nt_status = auth_context->check_ntlm_password(auth_context, user_info, server_info);
- auth_context->free(&auth_context);
+ (auth_context->free)(&auth_context);
free_user_info(&user_info);
return nt_status;
}
DEBUG(3,("Got neg_flags=%08x\n", neg_flags));
if (ntlmssp_auth_context) {
- ntlmssp_auth_context->free(&ntlmssp_auth_context);
+ (ntlmssp_auth_context->free)(&ntlmssp_auth_context);
}
if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&ntlmssp_auth_context))) {
SAFE_FREE(workgroup);
SAFE_FREE(machine);
- ntlmssp_auth_context->free(&ntlmssp_auth_context);
+ (ntlmssp_auth_context->free)(&ntlmssp_auth_context);
free_user_info(&user_info);
user_info,
&server_info);
- plaintext_auth_context->free(&plaintext_auth_context);
+ (plaintext_auth_context->free)(&plaintext_auth_context);
}
}
}