[2485] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Possible memory leaks?

daemon@ATHENA.MIT.EDU (Ken Hornstein)
Thu Aug 7 16:06:15 1997

To: krbdev@MIT.EDU
Date: Thu, 07 Aug 1997 16:04:52 -0400
From: Ken Hornstein <kenh@cmf.nrl.navy.mil>

There's code in the KDC (kdc_preauth.c) of the form:

      retval = krb5_decrypt_data(context, master_encblock.key, 0, 
				       &tmpdata, &scratch);
      if (retval) com_err("krb5kdc", retval, "decrypt track_id failed");
    }
    if (retval) goto cleanup;
    retval = decode_krb5_predicted_sam_response(&scratch, &psr);

Even though decrypt_data malloc's it's data, scratch.data is never
free()'d.  Is this a memory leak, or am I missing something?

--Ken

home help back first fref pref prev next nref lref last post