retval = krb5_verify_padata(*padata,client->principal,src_addr,
&tmpkey, pa_id, flags);
memset((char *)tmpkey.contents, 0, tmpkey.length);
- xfree(tmpkey.contents);
+ krb5_xfree(tmpkey.contents);
if (retval && client->alt_key.length) {
/*
* If we failed, try again with the alternative key
retval = krb5_verify_padata(*padata,client->principal,src_addr,
&tmpkey, pa_id, flags);
memset((char *)tmpkey.contents, 0, tmpkey.length);
- xfree(tmpkey.contents);
+ krb5_xfree(tmpkey.contents);
}
return retval;
}
}
retval = krb5_encrypt_tkt_part(&encrypting_key, &ticket_reply);
memset((char *)encrypting_key.contents, 0, encrypting_key.length);
- xfree(encrypting_key.contents);
+ krb5_xfree(encrypting_key.contents);
if (retval) {
cleanup();
return retval;
free(ticket_reply.enc_part.ciphertext.data); \
free(cname); free(sname); \
if (client.salt_type == KRB5_KDB_SALTTYPE_NOREALM) \
- xfree(padat_tmp[0]->contents);}
+ krb5_xfree(padat_tmp[0]->contents);}
reply.client = request->client;
/* XXX need separate etypes for ticket encryption and kdc_rep encryption */
retval = krb5_encode_kdc_rep(KRB5_AS_REP, &reply_encpart,
&encrypting_key, &reply, response);
memset((char *)encrypting_key.contents, 0, encrypting_key.length);
- xfree(encrypting_key.contents);
+ krb5_xfree(encrypting_key.contents);
cleanup();
/* these parts are left on as a courtesy from krb5_encode_kdc_rep so we
can use them in raw form if needed. But, we don't... */
*retdata[i] = **ptr;
if (!(retdata[i]->contents =
(krb5_octet *)malloc(retdata[i]->length))) {
- xfree(retdata[i]);
+ krb5_xfree(retdata[i]);
retdata[i] = 0;
krb5_free_authdata(retdata);
return ENOMEM;
* no longer need to protect the ticket in apreq, since
* authdat is about to get nuked --- it's going to get reassigned.
*/
- xfree(authdat);
+ krb5_xfree(authdat);
authdat = nauthdat;
*ret_authdat = authdat;
&our_cksum);
}
- xfree(our_cksum.contents);
+ krb5_xfree(our_cksum.contents);
cleanup:
if (apreq)
if(!trans) return(ENOMEM);
- if(new_trans->data) xfree(new_trans->data);
+ if(new_trans->data) krb5_xfree(new_trans->data);
new_trans->data = trans;
hold = eptr;
last->next = eptr->next;
eptr = last;
- xfree(hold);
+ krb5_xfree(hold);
} else {
/* this isn't it, just move along */
last = eptr;
return;
eptr->timein = timenow;
if (krb5_copy_data(inpkt, &eptr->req_packet)) {
- xfree(eptr);
+ krb5_xfree(eptr);
return;
}
if (krb5_copy_data(outpkt, &eptr->reply_packet)) {
krb5_free_data(eptr->req_packet);
- xfree(eptr);
+ krb5_xfree(eptr);
return;
}
eptr->next = root_ptr.next;