From cabc9a2753bf6a3e46c885f2ccbce5728709d8aa Mon Sep 17 00:00:00 2001 From: Tom Yu Date: Mon, 4 Nov 2002 02:20:51 +0000 Subject: [PATCH] * do_as_req.c (process_as_req): Fix previous patch; it caused an uninitialized pointer to be dereferenced under certain error conditions. ticket: 1206 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@14964 dc483132-0cff-0310-8789-dd5450dbe970 --- src/kdc/ChangeLog | 6 ++++++ src/kdc/do_as_req.c | 2 +- 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/src/kdc/ChangeLog b/src/kdc/ChangeLog index 1bdd8bcc6..cb4376369 100644 --- a/src/kdc/ChangeLog +++ b/src/kdc/ChangeLog @@ -1,3 +1,9 @@ +2002-11-03 Tom Yu + + * do_as_req.c (process_as_req): Fix previous patch; it caused an + uninitialized pointer to be dereferenced under certain error + conditions. + 2002-10-27 Sam Hartman * kdc_util.c (add_to_transited): Don't include trailing null in transited encoding length; doing so breaks using codee diff --git a/src/kdc/do_as_req.c b/src/kdc/do_as_req.c index e308d1140..7f3efd849 100644 --- a/src/kdc/do_as_req.c +++ b/src/kdc/do_as_req.c @@ -83,6 +83,7 @@ process_as_req(krb5_kdc_req *request, const krb5_fulladdr *from, ticket_reply.enc_part.ciphertext.data = 0; e_data.data = 0; encrypting_key.contents = 0; + reply.padata = 0; session_key.contents = 0; ktypes2str(ktypestr, sizeof(ktypestr), @@ -361,7 +362,6 @@ process_as_req(krb5_kdc_req *request, const krb5_fulladdr *from, /* Start assembling the response */ reply.msg_type = KRB5_AS_REP; - reply.padata = 0; reply.client = request->client; reply.ticket = &ticket_reply; reply_encpart.session = &session_key; -- 2.26.2