summaryrefslogtreecommitdiffstats
path: root/util/ipa_pwd.h
Commit message (Collapse)AuthorAgeFilesLines
* Prevent integer overflow when setting krbPasswordExpirationTomas Babej2013-02-081-0/+3
| | | | | | | | | | | | | | | | Since in Kerberos V5 are used 32-bit unix timestamps, setting maxlife in pwpolicy to values such as 9999 days would cause integer overflow in krbPasswordExpiration attribute. This would result into unpredictable behaviour such as users not being able to log in after password expiration if password policy was changed (#3114) or new users not being able to log in at all (#3312). The timestamp value is truncated to Jan 1, 2038 in ipa-kdc driver. https://fedorahosted.org/freeipa/ticket/3312 https://fedorahosted.org/freeipa/ticket/3114
* Make encode_ntlm_keys() publicSumit Bose2012-09-061-0/+11
|
* ipa-kdb: add AS auditing supportSimo Sorce2012-02-141-0/+3
| | | | Fixes: https://fedorahosted.org/freeipa/ticket/2334
* Improve password change error messageMartin Kosek2012-02-031-0/+6
| | | | | | | | | | | User always receives the same error message if he changes his password via "ipa passwd" command and the new password fails configured password policy. He then has to investigate on his own the actual reason why was the policy violated. This patch improves our SLAPI PWD plugins to provide a better error message explaining the violation reason. https://fedorahosted.org/freeipa/ticket/2067
* util: add password policy manipulation functionsSimo Sorce2011-08-261-0/+65