auth/kerberos: Use talloc_stackframe to avoid memory and FD leak of event context
commitbdde51b26f4f5bcd6b0dcb5557fee40d7bc40207
authorAndrew Bartlett <abartlet@samba.org>
Thu, 5 Feb 2015 19:53:21 +0000 (6 08:53 +1300)
committerAndrew Bartlett <abartlet@samba.org>
Sun, 8 Feb 2015 07:07:08 +0000 (8 08:07 +0100)
tree1666b282f6f2992c88367e3a4200e2e21bc9e7c1
parent3c89b25e4fbc86981ec2cfaebbd5e119a5fc965d
auth/kerberos: Use talloc_stackframe to avoid memory and FD leak of event context

The smb_krb5_send_and_recv_func_forced and smb_krb5_send_and_recv_func
functions could leak an event context including an epoll FD and some
memory.  This may explain a flapping test in krb5.kdc

Andrew Bartlett

Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-By: Jelmer Vernooij <jelmer@samba.org>
Reviewed-by: Kamen Mazdrashki <kamenim@samba.org>
source4/auth/kerberos/krb5_init_context.c