less leaks
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@3833 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -64,7 +64,7 @@ add_new_key(int argc, char **argv)
|
|||||||
int optind = 0;
|
int optind = 0;
|
||||||
int mask = 0;
|
int mask = 0;
|
||||||
krb5_error_code ret;
|
krb5_error_code ret;
|
||||||
krb5_principal princ_ent;
|
krb5_principal princ_ent = NULL;
|
||||||
|
|
||||||
args[0].value = &rkey;
|
args[0].value = &rkey;
|
||||||
args[1].value = &password;
|
args[1].value = &password;
|
||||||
@@ -105,6 +105,8 @@ add_new_key(int argc, char **argv)
|
|||||||
kadm5_free_principal_ent(kadm_handle, &princ);
|
kadm5_free_principal_ent(kadm_handle, &princ);
|
||||||
}
|
}
|
||||||
out:
|
out:
|
||||||
|
if(princ_ent)
|
||||||
|
krb5_free_principal(context, princ_ent);
|
||||||
if(password)
|
if(password)
|
||||||
memset(password, 0, strlen(password));
|
memset(password, 0, strlen(password));
|
||||||
return 0;
|
return 0;
|
||||||
|
@@ -166,5 +166,8 @@ main(int argc, char **argv)
|
|||||||
if (argc != 0)
|
if (argc != 0)
|
||||||
exit(sl_command(commands, argc, argv));
|
exit(sl_command(commands, argc, argv));
|
||||||
|
|
||||||
return sl_loop(commands, "kadmin> ") != 0;
|
ret = sl_loop(commands, "kadmin> ") != 0;
|
||||||
|
kadm5_destroy(kadm_handle);
|
||||||
|
krb5_free_context(context);
|
||||||
|
return ret;
|
||||||
}
|
}
|
||||||
|
@@ -80,9 +80,11 @@ kadmind_dispatch(void *kadm_handle, krb5_storage *sp)
|
|||||||
ret = kadm5_get_principal(kadm_handle, princ, &ent, mask);
|
ret = kadm5_get_principal(kadm_handle, princ, &ent, mask);
|
||||||
sp->seek(sp, 0, SEEK_SET);
|
sp->seek(sp, 0, SEEK_SET);
|
||||||
krb5_store_int32(sp, ret);
|
krb5_store_int32(sp, ret);
|
||||||
if(ret == 0)
|
if(ret == 0){
|
||||||
kadm5_store_principal_ent(sp, &ent);
|
kadm5_store_principal_ent(sp, &ent);
|
||||||
kadm5_free_principal_ent(kadm_handle, &ent);
|
kadm5_free_principal_ent(kadm_handle, &ent);
|
||||||
|
}
|
||||||
|
krb5_free_principal(context->context, princ);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case kadm_delete:{
|
case kadm_delete:{
|
||||||
|
@@ -41,6 +41,7 @@
|
|||||||
RCSID("$Id$");
|
RCSID("$Id$");
|
||||||
|
|
||||||
static struct units acl_units[] = {
|
static struct units acl_units[] = {
|
||||||
|
{ "all", KADM5_ACL_ALL },
|
||||||
{ "list", KADM5_ACL_LIST },
|
{ "list", KADM5_ACL_LIST },
|
||||||
{ "delete", KADM5_ACL_DELETE },
|
{ "delete", KADM5_ACL_DELETE },
|
||||||
{ "chpass", KADM5_ACL_CHPASS },
|
{ "chpass", KADM5_ACL_CHPASS },
|
||||||
@@ -60,8 +61,9 @@ _kadm5_acl_init(kadm5_server_context *context)
|
|||||||
krb5_error_code ret;
|
krb5_error_code ret;
|
||||||
|
|
||||||
krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ);
|
krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ);
|
||||||
if(krb5_principal_compare(context->context, context->caller, princ)){
|
ret = krb5_principal_compare(context->context, context->caller, princ);
|
||||||
krb5_free_principal(context->context, princ);
|
krb5_free_principal(context->context, princ);
|
||||||
|
if(ret != 0){
|
||||||
context->acl_flags = ~0;
|
context->acl_flags = ~0;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
@@ -62,5 +62,6 @@ kadm5_c_get_principal(void *server_handle,
|
|||||||
ret = tmp;
|
ret = tmp;
|
||||||
if(ret == 0)
|
if(ret == 0)
|
||||||
kadm5_ret_principal_ent(sp, out);
|
kadm5_ret_principal_ent(sp, out);
|
||||||
|
krb5_storage_free(sp);
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
@@ -114,6 +114,8 @@ kadm5_c_init_with_password_ctx(krb5_context context,
|
|||||||
ret = krb5_sendauth(context, &ctx->ac, &s, KADMIN_APPL_VERSION, NULL,
|
ret = krb5_sendauth(context, &ctx->ac, &s, KADMIN_APPL_VERSION, NULL,
|
||||||
server, AP_OPTS_MUTUAL_REQUIRED,
|
server, AP_OPTS_MUTUAL_REQUIRED,
|
||||||
NULL, NULL, cc, NULL, NULL, NULL);
|
NULL, NULL, cc, NULL, NULL, NULL);
|
||||||
|
krb5_free_principal(context, server);
|
||||||
|
krb5_cc_close(context, cc);
|
||||||
if(ret){
|
if(ret){
|
||||||
close(s);
|
close(s);
|
||||||
return KADM5_FAILURE;
|
return KADM5_FAILURE;
|
||||||
|
@@ -80,9 +80,11 @@ kadmind_dispatch(void *kadm_handle, krb5_storage *sp)
|
|||||||
ret = kadm5_get_principal(kadm_handle, princ, &ent, mask);
|
ret = kadm5_get_principal(kadm_handle, princ, &ent, mask);
|
||||||
sp->seek(sp, 0, SEEK_SET);
|
sp->seek(sp, 0, SEEK_SET);
|
||||||
krb5_store_int32(sp, ret);
|
krb5_store_int32(sp, ret);
|
||||||
if(ret == 0)
|
if(ret == 0){
|
||||||
kadm5_store_principal_ent(sp, &ent);
|
kadm5_store_principal_ent(sp, &ent);
|
||||||
kadm5_free_principal_ent(kadm_handle, &ent);
|
kadm5_free_principal_ent(kadm_handle, &ent);
|
||||||
|
}
|
||||||
|
krb5_free_principal(context->context, princ);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case kadm_delete:{
|
case kadm_delete:{
|
||||||
|
@@ -165,6 +165,7 @@ krb5_kt_get_entry(krb5_context context,
|
|||||||
krb5_kt_end_seq_get (context, id, &cursor);
|
krb5_kt_end_seq_get (context, id, &cursor);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
krb5_kt_free_entry(context, entry);
|
||||||
}
|
}
|
||||||
krb5_kt_end_seq_get (context, id, &cursor);
|
krb5_kt_end_seq_get (context, id, &cursor);
|
||||||
return KRB5_KT_NOTFOUND;
|
return KRB5_KT_NOTFOUND;
|
||||||
|
@@ -89,6 +89,7 @@ krb5_sendauth(krb5_context context,
|
|||||||
u_char repl;
|
u_char repl;
|
||||||
krb5_data ap_req, error_data;
|
krb5_data ap_req, error_data;
|
||||||
krb5_creds this_cred;
|
krb5_creds this_cred;
|
||||||
|
krb5_principal this_client = NULL;
|
||||||
krb5_creds *creds;
|
krb5_creds *creds;
|
||||||
|
|
||||||
len = strlen(version) + 1;
|
len = strlen(version) + 1;
|
||||||
@@ -111,9 +112,10 @@ krb5_sendauth(krb5_context context,
|
|||||||
|
|
||||||
if (in_creds == NULL) {
|
if (in_creds == NULL) {
|
||||||
if (client == NULL) {
|
if (client == NULL) {
|
||||||
ret = krb5_cc_get_principal (context, ccache, &client);
|
ret = krb5_cc_get_principal (context, ccache, &this_client);
|
||||||
if (ret)
|
if (ret)
|
||||||
return ret;
|
return ret;
|
||||||
|
client = this_client;
|
||||||
}
|
}
|
||||||
memset(&this_cred, 0, sizeof(this_cred));
|
memset(&this_cred, 0, sizeof(this_cred));
|
||||||
this_cred.client = client;
|
this_cred.client = client;
|
||||||
@@ -129,15 +131,20 @@ krb5_sendauth(krb5_context context,
|
|||||||
} else {
|
} else {
|
||||||
creds = in_creds;
|
creds = in_creds;
|
||||||
}
|
}
|
||||||
if (out_creds)
|
|
||||||
*out_creds = creds;
|
|
||||||
|
|
||||||
ret = krb5_mk_req_extended (context,
|
ret = krb5_mk_req_extended (context,
|
||||||
auth_context,
|
auth_context,
|
||||||
ap_req_options,
|
ap_req_options,
|
||||||
in_data,
|
in_data,
|
||||||
creds,
|
creds,
|
||||||
&ap_req);
|
&ap_req);
|
||||||
|
|
||||||
|
if (out_creds)
|
||||||
|
*out_creds = creds;
|
||||||
|
else
|
||||||
|
krb5_free_creds(context, creds);
|
||||||
|
if(this_client)
|
||||||
|
krb5_free_principal(context, this_client);
|
||||||
|
|
||||||
if (ret)
|
if (ret)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
|
@@ -73,6 +73,7 @@ krb5_set_default_realm(krb5_context context,
|
|||||||
|
|
||||||
if (tmp == NULL)
|
if (tmp == NULL)
|
||||||
return ENOMEM;
|
return ENOMEM;
|
||||||
|
free(context->default_realm);
|
||||||
context->default_realm = tmp;
|
context->default_realm = tmp;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user