* do_as_req.c (process_as_req): Fix previous patch; it caused an
authorTom Yu <tlyu@mit.edu>
Mon, 4 Nov 2002 02:20:51 +0000 (02:20 +0000)
committerTom Yu <tlyu@mit.edu>
Mon, 4 Nov 2002 02:20:51 +0000 (02:20 +0000)
uninitialized pointer to be dereferenced under certain error
conditions.

ticket: 1206

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@14964 dc483132-0cff-0310-8789-dd5450dbe970

src/kdc/ChangeLog
src/kdc/do_as_req.c

index 1bdd8bcc6fa08ddf6e6731c42a57df1deeab400d..cb437636959fd9e6806c6f5c0d2a925f440be163 100644 (file)
@@ -1,3 +1,9 @@
+2002-11-03  Tom Yu  <tlyu@mit.edu>
+
+       * do_as_req.c (process_as_req): Fix previous patch; it caused an
+       uninitialized pointer to be dereferenced under certain error
+       conditions.
+
 2002-10-27  Sam Hartman  <hartmans@mit.edu>
 
        * kdc_util.c (add_to_transited): Don't include trailing null in transited encoding length; doing so breaks using codee
index e308d1140d301fc46d95e5c38873fcc740afb85b..7f3efd8491a78bbca087d52cd4356938d4904ac6 100644 (file)
@@ -83,6 +83,7 @@ process_as_req(krb5_kdc_req *request, const krb5_fulladdr *from,
     ticket_reply.enc_part.ciphertext.data = 0;
     e_data.data = 0;
     encrypting_key.contents = 0;
+    reply.padata = 0;
     session_key.contents = 0;
 
     ktypes2str(ktypestr, sizeof(ktypestr),
@@ -361,7 +362,6 @@ process_as_req(krb5_kdc_req *request, const krb5_fulladdr *from,
 
     /* Start assembling the response */
     reply.msg_type = KRB5_AS_REP;
-    reply.padata = 0;
     reply.client = request->client;
     reply.ticket = &ticket_reply;
     reply_encpart.session = &session_key;