summaryrefslogtreecommitdiffstats
path: root/src/kdc/do_tgs_req.c
Commit message (Expand)AuthorAgeFilesLines
* Revert previous change to process_tgs_reqGreg Hudson2013-01-311-1/+1
* Fix is_referral flag in KDC TGS codeGreg Hudson2013-01-311-1/+1
* Remove KDC macros for realm config fieldsGreg Hudson2013-01-151-3/+3
* Simplify KDC host referral codeGreg Hudson2013-01-111-13/+23
* Remove inoperative null checks in KDC codeGreg Hudson2012-12-201-4/+2
* Don't return a host referral to the service realmGreg Hudson2012-12-061-1/+3
* Don't unparse principal names in process_tgs_req()Tom Yu2012-10-151-64/+15
* Refactor process_tgs_req() 2nd-ticket handlingTom Yu2012-10-151-95/+144
* Clean up domain->realm referralsTom Yu2012-10-151-84/+88
* Refactor process_tgs_req() service princ searchTom Yu2012-10-151-101/+91
* Eliminate some KDC globalsTom Yu2012-10-151-30/+44
* Set pointers to NULL after freeing themZhanna Tsitkov2012-10-151-0/+1
* Map CANTLOCK_DB to SVC_UNAVAILABLE in krb5kdcNicolas Williams2012-09-121-0/+4
* SA-2011-007 KDC null pointer deref in TGS handling [CVE-2011-1530]Tom Yu2011-12-061-1/+2
* Simplify and fix kdcpreauth request_body callbackGreg Hudson2011-11-141-1/+1
* Create e_data as pa_data in KDC interfacesGreg Hudson2011-10-041-9/+21
* Mark up strings for translationGreg Hudson2011-06-101-18/+14
* KDC memory leak in FAST error pathGreg Hudson2011-03-171-3/+8
* Adjust most C source files to match the new standards for copyrightGreg Hudson2011-03-091-5/+1
* kdb: store mkey list in context and permit NULL mkey for kdb_dbe_decrypt_key_...Sam Hartman2010-09-151-22/+1
* Create a KRB5_KDB_FLAG_ALIAS_OK to control whether plugin modulesGreg Hudson2010-07-081-0/+1
* Remove count parameters from get_principal, put_principal,Greg Hudson2010-07-061-138/+74
* Rename krb5_dbekd_encrypt_key_data and krb5_dbekd_decrypt_key_data toGreg Hudson2010-07-021-4/+3
* Don't include nul characters in the text we send with krb-errorGreg Hudson2010-05-241-1/+1
* memory leak in process_tgs_req in r23724Tom Yu2010-04-301-1/+3
* Fix CVE-2010-1230 (MITKRB5-SA-2010-004) double-free in KDC triggeredTom Yu2010-04-201-0/+2
* handle NT_SRV_INST in service principal referralsTom Yu2010-03-161-0/+1
* The TGS code was not freeing authdata. This is an old leak which wasGreg Hudson2010-02-181-2/+3
* MITKRB5-SA-2010-001 CVE-2010-0283 KDC denial of serviceTom Yu2010-02-161-0/+2
* Followon fixes to r23712:Greg Hudson2010-02-101-2/+3
* enc_padata can include empty sequenceSam Hartman2010-02-091-23/+7
* MITKRB5-SA-2009-003 CVE-2009-3295 KDC null deref in referralsTom Yu2009-12-291-1/+1
* Anonymous support for KerberosSam Hartman2009-12-281-1/+2
* fast negotiation projecSam Hartman2009-12-141-8/+26
* Clean up some open-parenthesis problems, and reindentTom Yu2009-11-161-15/+15
* Constrained delegation without PAC supportGreg Hudson2009-11-141-21/+27
* Restore the local variable typeZhanna Tsitkov2009-11-121-1/+1
* Post-great-reindent check. Part IZhanna Tsitkov2009-11-121-41/+55
* make mark-cstyleTom Yu2009-10-311-149/+148
* In process_tgs_req, fully initialize e_data since we may copy it inGreg Hudson2009-10-291-2/+1
* Heimdal DB bridge plugin for KDC back endGreg Hudson2009-10-271-14/+26
* simplify logic fix introduced in r22960 for S4U2SelfLuke Howard2009-10-211-4/+2
* ensure that forwardable flag is propagated along S4U2Self referral pathLuke Howard2009-10-211-1/+8
* Implement GSS naming extensions and authdata verificationGreg Hudson2009-10-091-4/+4
* Initialize several variables - so that on error cleanup - we do not try to freeEzra Peisach2009-09-141-1/+3
* Implement s4u extensionsGreg Hudson2009-09-131-21/+61
* Move KRB5_KDB_OK_AS_DELEGATE from kdb_ext.h to kdb.h. Add kadminGreg Hudson2009-04-271-4/+1
* Implement KDC side of TGS FASTSam Hartman2009-04-051-3/+10
* Merge fast branch at 22166 onto trunkSam Hartman2009-04-031-3/+5
* Initialize request state in the TGS pathSam Hartman2009-03-311-0/+5