[11736] in Kerberos-V5-bugs

home help back first fref pref prev next nref lref last post

[krbdev.mit.edu #6787] S4U memory leak

daemon@ATHENA.MIT.EDU (Luke Howard via RT)
Sat Oct 9 09:47:07 2010

Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "Luke Howard via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6787@krbdev.mit.edu>
Message-ID: <rt-6787-33246.13.9117830172662@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6787'":;"'AdminCc of krbdev.mit.edu Ticket #6787'":;@MIT.EDU
Date: Sat,  9 Oct 2010 09:47:05 -0400 (EDT)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu

[ghudson - Fri Oct  8 17:43:18 2010]:

> > This looks OK, but instead of adding a bitfield to indicate a memory
> > ccache, use krb5_cc_get_type().
> 
> Wouldn't that do the wrong thing if the cred ccache is a pre-existing
> memory ccache which the caller still has interest in?

Hmm. Fair enough.
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs

home help back first fref pref prev next nref lref last post