[2485] in Kerberos_V5_Development
Possible memory leaks?
daemon@ATHENA.MIT.EDU (Ken Hornstein)
Thu Aug 7 16:06:15 1997
To: krbdev@MIT.EDU
Date: Thu, 07 Aug 1997 16:04:52 -0400
From: Ken Hornstein <kenh@cmf.nrl.navy.mil>
There's code in the KDC (kdc_preauth.c) of the form:
retval = krb5_decrypt_data(context, master_encblock.key, 0,
&tmpdata, &scratch);
if (retval) com_err("krb5kdc", retval, "decrypt track_id failed");
}
if (retval) goto cleanup;
retval = decode_krb5_predicted_sam_response(&scratch, &psr);
Even though decrypt_data malloc's it's data, scratch.data is never
free()'d. Is this a memory leak, or am I missing something?
--Ken