if (ret) {
krb5_free_principal (context, key_entry.principal);
- krb5_free_keyblock (context, &key_entry.keyblock);
+ krb5_free_keyblock_contents (context, &key_entry.keyblock);
krb5_warn(context, ret, "krb5_kt_add_entry");
break;
}
}
auth_finished(ap, AUTH_USER);
- krb5_free_keyblock(context, key_block);
+ krb5_free_keyblock_contents(context, key_block);
break;
#ifdef FORWARD
skey.length = 8;
skey.data = keyblock->keyvalue.data;
encrypt_session_key(&skey, 0);
- krb5_free_keyblock (context, keyblock);
+ krb5_free_keyblock_contents (context, keyblock);
auth_finished(ap, AUTH_USER);
#ifdef FORWARD
if (forward_flags & OPTS_FORWARD_CREDS)
krb5_warn(context, ret, "%s", argv[i]);
else{
for(i = 0; i < num_keys; i++)
- krb5_free_keyblock(context, &keys[i]);
+ krb5_free_keyblock_contents(context, &keys[i]);
free(keys);
}
}
krb5_store_int32(sp, n_keys);
for(i = 0; i < n_keys; i++){
krb5_store_keyblock(sp, new_keys[i]);
- krb5_free_keyblock(context->context, &new_keys[i]);
+ krb5_free_keyblock_contents(context->context, &new_keys[i]);
}
}
break;
ret = db->store (context, db, 1, &ent);
}
krb5_data_free (&salt);
- krb5_free_keyblock (context, &new_keyblock);
+ krb5_free_keyblock_contents (context, &new_keyblock);
if (ret) {
krb5_log (context, log_facility, KPASSWDD_LOG_ERR,
free_Salt(key->salt);
key->salt = NULL;
}
- krb5_free_keyblock(context->context, &key->key);
+ krb5_free_keyblock_contents(context->context, &key->key);
ret = krb5_generate_random_keyblock(context->context,
key->key.keytype,
&key->key);
if(ret){
int i;
for(i = 0; i < *n_keys; i++)
- krb5_free_keyblock(context->context, &(*new_keys)[i]);
+ krb5_free_keyblock_contents(context->context, &(*new_keys)[i]);
free(*new_keys);
*n_keys = 0;
}
krb5_store_int32(sp, n_keys);
for(i = 0; i < n_keys; i++){
krb5_store_keyblock(sp, new_keys[i]);
- krb5_free_keyblock(context->context, &new_keys[i]);
+ krb5_free_keyblock_contents(context->context, &new_keys[i]);
}
}
break;
free_Salt(key->salt);
key->salt = NULL;
}
- krb5_free_keyblock(context->context, &key->key);
+ krb5_free_keyblock_contents(context->context, &key->key);
ret = krb5_string_to_key(password,
key->salt ? &key->salt->salt : &salt,
key->key.keytype,
c->client = NULL;
krb5_free_principal (context, c->server);
c->server = NULL;
- krb5_free_keyblock (context, &c->session);
+ krb5_free_keyblock_contents (context, &c->session);
krb5_data_free (&c->ticket);
krb5_data_free (&c->second_ticket);
krb5_data_free (&c->authdata);
q = (q << 8) | *p;
q &= 0xffffffff;
*seqno = q;
- krb5_free_keyblock (context, subkey);
+ krb5_free_keyblock_contents (context, subkey);
return 0;
}
krb5_data_free(&resp);
out:
if(subkey){
- krb5_free_keyblock(context, subkey);
+ krb5_free_keyblock_contents(context, subkey);
free(subkey);
}
return ret;
if (ret)
goto fail;
ret = make_pa_enc_timestamp(context, &a->padata->val[0], etype, key);
- krb5_free_keyblock (context, key);
+ krb5_free_keyblock_contents (context, key);
free (key);
if (ret)
goto fail;
if (ret)
goto fail;
ret = make_pa_enc_timestamp(context, &a->padata->val[1], etype, key);
- krb5_free_keyblock (context, key);
+ krb5_free_keyblock_contents (context, key);
free (key);
if (ret)
goto fail;
ret = _krb5_extract_ticket(context, &rep, creds, key, keyseed,
NULL, nonce, FALSE, decrypt_proc, decryptarg);
memset (key->keyvalue.data, 0, key->keyvalue.length);
- krb5_free_keyblock (context, key);
+ krb5_free_keyblock_contents (context, key);
free (key);
if (ret == 0 && ret_as_reply)
krb5_keytab_entry *entry)
{
krb5_free_principal (context, entry->principal);
- krb5_free_keyblock (context, &entry->keyblock);
+ krb5_free_keyblock_contents (context, &entry->keyblock);
return 0;
}