summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Hudson <ghudson@mit.edu>2009-10-20 13:47:40 +0000
committerGreg Hudson <ghudson@mit.edu>2009-10-20 13:47:40 +0000
commitdd3c61e969734b1f68c925268bd9980d5bce19c1 (patch)
tree3502084154276e841dda2ba44ee6935005557366
parent0f1af7fceb54a1c42b017731c0d71f3434a8c3a3 (diff)
downloadkrb5-dd3c61e969734b1f68c925268bd9980d5bce19c1.tar.gz
krb5-dd3c61e969734b1f68c925268bd9980d5bce19c1.tar.xz
krb5-dd3c61e969734b1f68c925268bd9980d5bce19c1.zip
In krb5_k_make_checksum, check for a null key passed with a keyed
checksum instead of just crashing. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@22952 dc483132-0cff-0310-8789-dd5450dbe970
-rw-r--r--src/lib/crypto/krb/make_checksum.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/lib/crypto/krb/make_checksum.c b/src/lib/crypto/krb/make_checksum.c
index dd34df377..01e374b14 100644
--- a/src/lib/crypto/krb/make_checksum.c
+++ b/src/lib/crypto/krb/make_checksum.c
@@ -68,7 +68,7 @@ krb5_k_make_checksum(krb5_context context, krb5_cksumtype cksumtype,
/* check if key is compatible */
if (ctp->keyed_etype) {
ktp1 = find_enctype(ctp->keyed_etype);
- ktp2 = find_enctype(key->keyblock.enctype);
+ ktp2 = key ? find_enctype(key->keyblock.enctype) : NULL;
if (ktp1 == NULL || ktp2 == NULL || ktp1->enc != ktp2->enc) {
ret = KRB5_BAD_ENCTYPE;
goto cleanup;