Files
heimdal/lib/gssapi
Nicolas Williams 472509fd46 gsskrb5: Do not leak authenticator on retry
We have a Heimdal special where when the acceptor sends back an error
token for clock skew or ticket-not-yet-valid errors then the acceptor
application will get GSS_S_CONTINUE_NEEDED from gss_accept_sec_context()
so that the initiator may retry with the same context.

But we were retaining the auth_context, which means that when the
initiator does send a new token, the acceptor leaks memory because
krb5_verify_ap_req2() doesn't clean up the auth_context on reuse.  The
end result is that we leak a lot in those cases.
2022-01-07 21:04:19 -06:00
..
2021-11-29 12:50:26 +11:00
2021-11-11 22:41:13 -06:00
2008-09-13 08:53:55 +00:00
2018-12-18 23:28:38 -06:00
2018-12-14 17:30:14 -05:00
2011-11-22 12:18:48 -08:00
2011-05-21 11:57:31 -07:00
2008-09-13 09:21:03 +00:00
2011-11-22 12:18:48 -08:00
2020-04-25 21:22:32 -05:00
2008-09-13 09:21:03 +00:00
2019-10-03 13:09:18 -05:00