null to indicate to upper levels that it is really empty.
Another bug discovered by purify...
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6743
dc483132-0cff-0310-8789-
dd5450dbe970
+Fri Sep 8 19:52:34 1995 Ezra Peisach (epeisach@dcl)
+
+ * decrypt_key.c: Upon error, after freeing contents field, set to
+ null to indicate to upper levels that it is really empty.
+
Wed Sep 06 14:20:57 1995 Chris Provenzano (proven@mit.edu)
* decrypt_key.c, encrypt_key.c, fetch_mkey.c, kdb_compat.c,
key_data->key_data_length[0] - 2,
eblock, 0))) {
krb5_xfree(keyblock->contents);
+ keyblock->contents = 0;
+ keyblock->length = 0;
return retval;
}
if (keysalt->data.length = key_data->key_data_length[1]) {
if (!(keysalt->data.data=(char *)malloc(keysalt->data.length))){
krb5_xfree(keyblock->contents);
+ keyblock->contents = 0;
+ keyblock->length = 0;
return ENOMEM;
}
memcpy(keysalt->data.data, key_data->key_data_contents[1],