diff options
author | Ken Raeburn <raeburn@mit.edu> | 2007-06-26 22:58:46 +0000 |
---|---|---|
committer | Ken Raeburn <raeburn@mit.edu> | 2007-06-26 22:58:46 +0000 |
commit | 8325d6530500cf44fd75d7ddac0a02edd1a26cb2 (patch) | |
tree | 423583c918c5932bedfeef9d84e432cddfb3b0b1 /src/lib/gssapi/generic/util_buffer.c | |
parent | f4cb46135ebba2207ed299980da0bf4c45223e11 (diff) | |
download | krb5-8325d6530500cf44fd75d7ddac0a02edd1a26cb2.tar.gz krb5-8325d6530500cf44fd75d7ddac0a02edd1a26cb2.tar.xz krb5-8325d6530500cf44fd75d7ddac0a02edd1a26cb2.zip |
* v4rcp.c (kstream_write): Allocate buffer space if it hasn't been
allocated, in the encrypting case, even if outlen is zero. While I
don't believe this can ever happen, it requires careful examination of
lots of code paths to figure it out. This change doesn't fix a
serious bug, but makes the analysis simple. Also, don't bother with
separate code paths for malloc vs realloc depending on the previous
values; we can just use realloc always.
Thanks to Domagoj Babic for pointing out the (false but
understandable) null-pointer problem.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@19641 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/gssapi/generic/util_buffer.c')
0 files changed, 0 insertions, 0 deletions