When multiple rounds are needed to establish a security context (usually ntlm), we overwrite old token with a new one without free. Found by proposed gss tests using stub a gss implementation (by valgrind error), though I have confirmed the leak with a real gssapi implementation as well. Closes https://github.com/curl/curl/pull/1733 |
||
|---|---|---|
| .. | ||
| cleartext.c | ||
| cram.c | ||
| digest_sspi.c | ||
| digest.c | ||
| digest.h | ||
| krb5_gssapi.c | ||
| krb5_sspi.c | ||
| ntlm_sspi.c | ||
| ntlm.c | ||
| ntlm.h | ||
| oauth2.c | ||
| spnego_gssapi.c | ||
| spnego_sspi.c | ||
| vauth.c | ||
| vauth.h | ||