const size_t hashSize =
nla->server ? sizeof(ServerClientHashMagic) : sizeof(ClientServerHashMagic);
+ sspi_SecBufferFree(&nla->pubKeyAuth);
if (!sspi_SecBufferAlloc(&nla->pubKeyAuth, auth_data_length))
{
status = SEC_E_INSUFFICIENT_MEMORY;
return -1;
}
+ sspi_SecBufferFree(&nla->negoToken);
if (!sspi_SecBufferAlloc(&nla->negoToken, length))
return -1;
Stream_GetRemainingLength(s) < length)
return -1;
+ sspi_SecBufferFree(&nla->pubKeyAuth);
if (!sspi_SecBufferAlloc(&nla->pubKeyAuth, length))
return -1;
Stream_GetRemainingLength(s) < length)
return -1;
+ sspi_SecBufferFree(&nla->ClientNonce);
if (!sspi_SecBufferAlloc(&nla->ClientNonce, length))
return -1;
nla->sendSeqNum = 0;
nla->recvSeqNum = 0;
nla->version = 6;
- ZeroMemory(&nla->ClientNonce, sizeof(SecBuffer));
- ZeroMemory(&nla->negoToken, sizeof(SecBuffer));
- ZeroMemory(&nla->pubKeyAuth, sizeof(SecBuffer));
- ZeroMemory(&nla->authInfo, sizeof(SecBuffer));
SecInvalidateHandle(&nla->context);
if (settings->NtlmSamFile)