+Sat Feb 24 16:27:54 1996 Theodore Y. Ts'o <tytso@dcl>
+
+ * gc_via_tkt.c (krb5_get_cred_via_tkt): Fix memory leak; free
+ enctypes after use.
+
Thu Jan 25 01:35:52 1996 Sam Hartman <hartmans@tertius.mit.edu>
* rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): Remove outdated
krb5_kdc_rep *dec_rep;
krb5_error *err_reply;
krb5_response tgsrep;
-krb5_enctype *enctypes = 0;
+ krb5_enctype *enctypes = 0;
/* tkt->client must be equal to in_cred->client */
if (!krb5_principal_compare(context, tkt->client, in_cred->client))
enctypes[1] = 0;
}
- if ((retval = krb5_send_tgs(context, kdcoptions, &in_cred->times, enctypes,
- in_cred->server, address, in_cred->authdata,
- 0, /* no padata */
- (kdcoptions & KDC_OPT_ENC_TKT_IN_SKEY) ?
- &in_cred->second_ticket : NULL,
- tkt, &tgsrep)))
+ retval = krb5_send_tgs(context, kdcoptions, &in_cred->times, enctypes,
+ in_cred->server, address, in_cred->authdata,
+ 0, /* no padata */
+ (kdcoptions & KDC_OPT_ENC_TKT_IN_SKEY) ?
+ &in_cred->second_ticket : NULL,
+ tkt, &tgsrep);
+ if (enctypes)
+ free(enctypes);
+ if (retval)
return retval;
switch (tgsrep.message_type) {