summaryrefslogtreecommitdiffstats
path: root/src/lib/krb5/krb/gc_via_tkt.c
diff options
context:
space:
mode:
authorTheodore Tso <tytso@mit.edu>1995-09-16 07:00:32 +0000
committerTheodore Tso <tytso@mit.edu>1995-09-16 07:00:32 +0000
commitc2380cebcdd54289bc48f5b8c56ff3309d007496 (patch)
treead94af9b4da2412933d026917bfa5141e56bfe1b /src/lib/krb5/krb/gc_via_tkt.c
parent3f7b5fca80c0aaeffcd9348c70613af5b63a61f1 (diff)
downloadkrb5-c2380cebcdd54289bc48f5b8c56ff3309d007496.tar.gz
krb5-c2380cebcdd54289bc48f5b8c56ff3309d007496.tar.xz
krb5-c2380cebcdd54289bc48f5b8c56ff3309d007496.zip
sendauth.c (krb5_sendauth): Make sure the scratch credentials
structure may have possible been used be freed.. rd_safe.c (krb5_rd_safe_basic): Fall through to the cleanup code at the end, to make sure the decoded message in message is freed. rd_req_dec.c (krb5_rd_req_decoded): Use krb5_copy_keyblock to copy authent->subkey to auth_context->remote_subkey. Keeping them separate avoids aliasing problems. mk_req_ext.c (krb5_generate_authenticator): Fix memory leak. Don't bash authent->subkey with key after carefully copying it using krb5_copy_keyblock! recvauth.c (krb5_recvauth): krb5_get_server_rcache() already opens the rcache; doing it again merely causes a memory leak. gen_subkey.c (krb5_generate_subkey): Eliminate memory leak. krb5_init_random_key() does its own allocation of the keyblock. gc_via_tkt.c (krb5_kdcrep2creds): Fix memory leak. srv_rcache.c (krb5_get_server_rcache): Fix memory leak. rd_safe.c (krb5_rd_safe_basic): Fix memory leak. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6797 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/krb5/krb/gc_via_tkt.c')
-rw-r--r--src/lib/krb5/krb/gc_via_tkt.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/lib/krb5/krb/gc_via_tkt.c b/src/lib/krb5/krb/gc_via_tkt.c
index 643bca5661..b310a10f94 100644
--- a/src/lib/krb5/krb/gc_via_tkt.c
+++ b/src/lib/krb5/krb/gc_via_tkt.c
@@ -88,6 +88,7 @@ krb5_kdcrep2creds(context, pkdcrep, address, psectkt, ppcreds)
goto cleanup_keyblock;
(*ppcreds)->ticket = *pdata;
+ free(pdata);
return 0;
cleanup_keyblock: