diff options
author | Theodore Tso <tytso@mit.edu> | 1995-09-16 07:00:32 +0000 |
---|---|---|
committer | Theodore Tso <tytso@mit.edu> | 1995-09-16 07:00:32 +0000 |
commit | c2380cebcdd54289bc48f5b8c56ff3309d007496 (patch) | |
tree | ad94af9b4da2412933d026917bfa5141e56bfe1b /src/lib/krb5/krb/gc_via_tkt.c | |
parent | 3f7b5fca80c0aaeffcd9348c70613af5b63a61f1 (diff) | |
download | krb5-c2380cebcdd54289bc48f5b8c56ff3309d007496.tar.gz krb5-c2380cebcdd54289bc48f5b8c56ff3309d007496.tar.xz krb5-c2380cebcdd54289bc48f5b8c56ff3309d007496.zip |
sendauth.c (krb5_sendauth): Make sure the scratch credentials
structure may have possible been used be freed..
rd_safe.c (krb5_rd_safe_basic): Fall through to the cleanup code at
the end, to make sure the decoded message in message is freed.
rd_req_dec.c (krb5_rd_req_decoded): Use krb5_copy_keyblock to copy
authent->subkey to auth_context->remote_subkey. Keeping them
separate avoids aliasing problems.
mk_req_ext.c (krb5_generate_authenticator): Fix memory leak. Don't
bash authent->subkey with key after carefully copying it using
krb5_copy_keyblock!
recvauth.c (krb5_recvauth): krb5_get_server_rcache() already opens the
rcache; doing it again merely causes a memory leak.
gen_subkey.c (krb5_generate_subkey): Eliminate memory leak.
krb5_init_random_key() does its own allocation of the
keyblock.
gc_via_tkt.c (krb5_kdcrep2creds): Fix memory leak.
srv_rcache.c (krb5_get_server_rcache): Fix memory leak.
rd_safe.c (krb5_rd_safe_basic): Fix memory leak.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6797 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/krb5/krb/gc_via_tkt.c')
-rw-r--r-- | src/lib/krb5/krb/gc_via_tkt.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/src/lib/krb5/krb/gc_via_tkt.c b/src/lib/krb5/krb/gc_via_tkt.c index 643bca5661..b310a10f94 100644 --- a/src/lib/krb5/krb/gc_via_tkt.c +++ b/src/lib/krb5/krb/gc_via_tkt.c @@ -88,6 +88,7 @@ krb5_kdcrep2creds(context, pkdcrep, address, psectkt, ppcreds) goto cleanup_keyblock; (*ppcreds)->ticket = *pdata; + free(pdata); return 0; cleanup_keyblock: |