{
OM_uint32 tmpMinor;
gss_cred_id_t cred = *pCred;
+ krb5_context krbContext = NULL;
if (cred == GSS_C_NO_CREDENTIAL) {
return GSS_S_COMPLETE;
}
+ GSSEAP_KRB_INIT(&krbContext);
+
gssEapReleaseName(&tmpMinor, &cred->name);
if (cred->password.value != NULL) {
}
if (cred->radiusConfigFile != NULL)
- free(cred->radiusConfigFile);
+ GSSEAP_FREE(cred->radiusConfigFile);
+
+ if (cred->krbCredCache != NULL)
+ krb5_cc_destroy(krbContext, cred->krbCredCache);
GSSEAP_MUTEX_DESTROY(&cred->mutex);
memset(cred, 0, sizeof(*cred));
}
if (desiredName != GSS_C_NO_NAME) {
- major = gss_duplicate_name(minor, desiredName, &cred->name);
+ major = gssEapDuplicateName(minor, desiredName, &cred->name);
if (GSS_ERROR(major))
goto cleanup;
} else {
buf.value = getlogin(); /* XXX */
buf.length = strlen((char *)buf.value);
- major = gss_import_name(minor, &buf,
- GSS_C_NT_USER_NAME, &cred->name);
+ major = gssEapImportName(minor, &buf,
+ GSS_C_NT_USER_NAME, &cred->name);
if (GSS_ERROR(major))
goto cleanup;
}