When a krb5 acceptor cred is acquired with a specified name, a late
enough failure can leak the acceptor_mprinc field. Fix this leak by
freeing the field in the acquire_cred_context() error_out cleanup
code.
[ghudson@mit.edu: rewrote commit message]
ticket: 9189 (new)
tags: pullup
target_version: 1.22-next
if (cred->name)
kg_release_name(context, &cred->name);
krb5_free_principal(context, cred->impersonator);
+ krb5_free_principal(context, cred->acceptor_mprinc);
zapfreestr(cred->password);
k5_mutex_destroy(&cred->lock);
xfree(cred);