|
|
|
@ -287,7 +287,7 @@ int TDEKerberosClientSocket::processPendingData() {
|
|
|
|
|
int reclen;
|
|
|
|
|
int wrlen;
|
|
|
|
|
char* buf = (char*)malloc(m_negotiatedMaxBufferSize);
|
|
|
|
|
reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize);
|
|
|
|
|
reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false);
|
|
|
|
|
if (reclen < 0) {
|
|
|
|
|
free(buf);
|
|
|
|
|
return -1;
|
|
|
|
@ -348,7 +348,7 @@ TQ_LONG TDEKerberosClientSocket::readBlock(char *data, TQ_ULONG maxlen) {
|
|
|
|
|
int wrlen;
|
|
|
|
|
if (m_bufferLength <= 0) {
|
|
|
|
|
char* buf = (char*)malloc(m_negotiatedMaxBufferSize);
|
|
|
|
|
reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize);
|
|
|
|
|
reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false);
|
|
|
|
|
if (reclen < 0) {
|
|
|
|
|
free(buf);
|
|
|
|
|
return -1;
|
|
|
|
@ -412,7 +412,7 @@ TQ_LONG TDEKerberosClientSocket::readLine(char *data, TQ_ULONG maxlen) {
|
|
|
|
|
int wrlen;
|
|
|
|
|
if (m_bufferLength <= 0) {
|
|
|
|
|
char* buf = (char*)malloc(m_negotiatedMaxBufferSize);
|
|
|
|
|
reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize);
|
|
|
|
|
reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false);
|
|
|
|
|
if (reclen < 0) {
|
|
|
|
|
free(buf);
|
|
|
|
|
return -1;
|
|
|
|
@ -467,7 +467,7 @@ TQString TDEKerberosClientSocket::readLine() {
|
|
|
|
|
maxlen = m_negotiatedMaxBufferSize;
|
|
|
|
|
if (m_bufferLength <= 0) {
|
|
|
|
|
buf = (char*)malloc(m_negotiatedMaxBufferSize);
|
|
|
|
|
reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize);
|
|
|
|
|
reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false);
|
|
|
|
|
if (reclen < 0) {
|
|
|
|
|
free(buf);
|
|
|
|
|
return TQString::null;
|
|
|
|
|