Ensure valid key in krb5int_yarrow_cipher_encrypt_block
authorEzra Peisach <epeisach@mit.edu>
Sat, 4 Sep 2010 21:46:53 +0000 (21:46 +0000)
committerEzra Peisach <epeisach@mit.edu>
Sat, 4 Sep 2010 21:46:53 +0000 (21:46 +0000)
commit97b6d19bc89c8eb6754225875890e0f2dbdd929d
tree91c7f7a0df6a4a16f565f596a91fa5a1016ef38b
parent98893969fb788e8d6d3c48d8e9b57145a214a2f8
Ensure valid key in krb5int_yarrow_cipher_encrypt_block

Under low memory conditions (or when testing memory allocation failures),
the key pointer will be 0 - and not initialized. Test and return failure
before deref a NULL.

ticket: 6772

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@24292 dc483132-0cff-0310-8789-dd5450dbe970
src/lib/crypto/krb/yarrow/ycipher.c