Fix to reflect fact that krb5_rc_dfl_close() now frees the rcache structure
authorTheodore Tso <tytso@mit.edu>
Wed, 28 Sep 1994 03:32:08 +0000 (03:32 +0000)
committerTheodore Tso <tytso@mit.edu>
Wed, 28 Sep 1994 03:32:08 +0000 (03:32 +0000)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@4358 dc483132-0cff-0310-8789-dd5450dbe970

src/lib/gssapi/krb5/ChangeLog
src/lib/gssapi/krb5/accept_sec_context.c

index 10711ebdeec583e22233dff8af3f3ed3fc45ccba..6eb6ccc98715b15f2ebcebc4c0248da9df12ed0f 100644 (file)
@@ -1,3 +1,9 @@
+Tue Sep 27 23:30:14 1994  Theodore Y. Ts'o  (tytso@dcl)
+
+       * accept_security_context.c (krb5_gss_accept_sec_context):
+                 krb5_rc_dfl_close now frees the rcache structure, so
+                 this routine shouldn't.
+
 Wed Aug 17 15:47:26 1994  Theodore Y. Ts'o  (tytso at tsx-11)
 
        * gssapi_krb5.c: Fixed OID for the krb5 mechanism.  (Transcription
index a1f65444e6ff72d6f332eee33fa4ff540f918c76..5e0f3db3467b5050c6dcaaabdf8e3a16033d4979 100644 (file)
@@ -222,7 +222,6 @@ OM_uint32 krb5_gss_accept_sec_context(minor_status, context_handle,
    if (code = krb5_rd_req(&ap_req, cred->princ, paddr, NULL, &rd_req_keyproc,
                          (krb5_pointer) cred->keytab, rcache, &authdat)) {
       (void) krb5_rc_close(rcache);
-      xfree(rcache);
       *minor_status = code;
       return(GSS_S_FAILURE);
    }
@@ -230,7 +229,6 @@ OM_uint32 krb5_gss_accept_sec_context(minor_status, context_handle,
    /* close and free the rcache */
 
    krb5_rc_close(rcache);
-   xfree(rcache);
 
    /* make sure the necessary parts of the authdat are present */