When we create a temporary memory ccache for use within a
authorGreg Hudson <ghudson@mit.edu>
Mon, 25 Oct 2010 21:55:54 +0000 (21:55 +0000)
committerGreg Hudson <ghudson@mit.edu>
Mon, 25 Oct 2010 21:55:54 +0000 (21:55 +0000)
krb5_gss_cred_id_rec, set a flag to indicate that the ccache should be
destroyed rather than closed.  Patch from aberry@likewise.com.

ticket: 6787
target_version: 1.9
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@24482 dc483132-0cff-0310-8789-dd5450dbe970

src/lib/gssapi/krb5/accept_sec_context.c
src/lib/gssapi/krb5/acquire_cred.c
src/lib/gssapi/krb5/gssapiP_krb5.h
src/lib/gssapi/krb5/rel_cred.c
src/lib/gssapi/krb5/s4u_gss_glue.c

index 47eff359d45fba689c9c3a6267f4f16f802ca835..0c0b3a547d692d74cc121fb72700b3cbbc2aa15c 100644 (file)
@@ -253,6 +253,7 @@ rd_and_store_for_creds(context, auth_context, inbuf, out_cred)
         cred->keytab = NULL; /* no keytab associated with this... */
         cred->tgt_expire = creds[0]->times.endtime; /* store the end time */
         cred->ccache = ccache; /* the ccache containing the credential */
+        cred->destroy_ccache = 1;
         ccache = NULL; /* cred takes ownership so don't destroy */
     }
 
index 8e222ff016dfcb36eb80020058c46f8c0ce789c3..a328a3db87a8bc51f0d6970737dbef66a7c02693 100644 (file)
@@ -546,6 +546,7 @@ acquire_cred(OM_uint32 *minor_status,
 #ifndef LEAN_CLIENT
     cred->keytab = NULL;
 #endif /* LEAN_CLIENT */
+    cred->destroy_ccache = 0;
     cred->ccache = NULL;
 
     code = k5_mutex_init(&cred->lock);
index fc74ff1a1f0ee38b32ff440bf280e5b3232a4ca3..ce0265234fbd12e59da7af7b19c0ccb0fe8b5159 100644 (file)
@@ -173,6 +173,7 @@ typedef struct _krb5_gss_cred_id_rec {
     unsigned int proxy_cred : 1;
     unsigned int default_identity : 1;
     unsigned int iakerb_mech : 1;
+    unsigned int destroy_ccache : 1;
 
     /* keytab (accept) data */
     krb5_keytab keytab;
index d1c571a2fa04c06117433f16274da407d8f4bb87..7f9a16fc4be24eeb481dab57c3660f9cf061f379 100644 (file)
@@ -55,9 +55,12 @@ krb5_gss_release_cred(minor_status, cred_handle)
     k5_mutex_destroy(&cred->lock);
     /* ignore error destroying mutex */
 
-    if (cred->ccache)
-        code1 = krb5_cc_close(context, cred->ccache);
-    else
+    if (cred->ccache) {
+        if (cred->destroy_ccache)
+            code1 = krb5_cc_destroy(context, cred->ccache);
+        else
+            code1 = krb5_cc_close(context, cred->ccache);
+    } else
         code1 = 0;
 
 #ifndef LEAN_CLIENT
index 5e75aede905fe8704621c0cbd92dd8867a1d446c..ac07dad5d7a43f88b29635bcd7a96dd16fab0c06 100644 (file)
@@ -228,6 +228,7 @@ kg_compose_deleg_cred(OM_uint32 *minor_status,
     code = krb5_cc_new_unique(context, "MEMORY", NULL, &cred->ccache);
     if (code != 0)
         goto cleanup;
+    cred->destroy_ccache = 1;
 
     code = krb5_cc_initialize(context, cred->ccache,
                               cred->proxy_cred ? impersonator_cred->name->princ :