sendauth.c (krb5_sendauth): Make sure the scratch credentials
authorTheodore Tso <tytso@mit.edu>
Sat, 16 Sep 1995 07:00:32 +0000 (07:00 +0000)
committerTheodore Tso <tytso@mit.edu>
Sat, 16 Sep 1995 07:00:32 +0000 (07:00 +0000)
commitc2380cebcdd54289bc48f5b8c56ff3309d007496
treead94af9b4da2412933d026917bfa5141e56bfe1b
parent3f7b5fca80c0aaeffcd9348c70613af5b63a61f1
sendauth.c (krb5_sendauth): Make sure the scratch credentials
structure may have possible been used be freed..

rd_safe.c (krb5_rd_safe_basic): Fall through to the cleanup code at
the end, to make sure the decoded message in message is freed.

rd_req_dec.c (krb5_rd_req_decoded): Use krb5_copy_keyblock to copy
authent->subkey to auth_context->remote_subkey.  Keeping them
separate avoids aliasing problems.

mk_req_ext.c (krb5_generate_authenticator): Fix memory leak.  Don't
bash authent->subkey with key after carefully copying it using
krb5_copy_keyblock!

recvauth.c (krb5_recvauth): krb5_get_server_rcache() already opens the
rcache; doing it again merely causes a memory leak.

gen_subkey.c (krb5_generate_subkey): Eliminate memory leak.
krb5_init_random_key() does its own allocation of the
keyblock.

gc_via_tkt.c (krb5_kdcrep2creds): Fix memory leak.

srv_rcache.c (krb5_get_server_rcache): Fix memory leak.

rd_safe.c (krb5_rd_safe_basic): Fix memory leak.

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6797 dc483132-0cff-0310-8789-dd5450dbe970
src/lib/krb5/krb/ChangeLog
src/lib/krb5/krb/gc_via_tkt.c
src/lib/krb5/krb/gen_subkey.c
src/lib/krb5/krb/mk_req_ext.c
src/lib/krb5/krb/rd_req_dec.c
src/lib/krb5/krb/rd_safe.c
src/lib/krb5/krb/recvauth.c
src/lib/krb5/krb/sendauth.c
src/lib/krb5/krb/srv_rcache.c