summaryrefslogtreecommitdiffstats
path: root/src/lib/gssapi/krb5
Commit message (Collapse)AuthorAgeFilesLines
...
* update dependenciesKen Raeburn2002-06-151-110/+78
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@14522 dc483132-0cff-0310-8789-dd5450dbe970
* reformat commentKen Raeburn2002-05-251-19/+21
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@14452 dc483132-0cff-0310-8789-dd5450dbe970
* update dependenciesKen Raeburn2002-03-261-1/+3
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@14292 dc483132-0cff-0310-8789-dd5450dbe970
* Commit patch to accept both encrypted and unencrypted credentials for ↵Sam Hartman2002-03-032-14/+48
| | | | | | Heimdal interop git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@14215 dc483132-0cff-0310-8789-dd5450dbe970
* When initiating GSSAPI context override tgs-enctypesSam Hartman2001-11-182-24/+10
| | | | | | rather than trying all acceptable enctypes in a loop. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13989 dc483132-0cff-0310-8789-dd5450dbe970
* * k5unseal.c: Fix whitespace in copyright messageEzra Peisach2001-10-303-9/+16
| | | | | | | | | * k5seal.c (make_seal_token_v1): Cleanup code for mic tokens. Essentially revert code to Sam's 10/25 code, with one correction - allocation of data_ptr - use msglen and not tmsglen. Additionally, do not rely on malloc(0) being non-NULL. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13907 dc483132-0cff-0310-8789-dd5450dbe970
* * Use right key usage for seal without encryption.Sam Hartman2001-10-272-1/+5
| | | | | | | | Now tested and working against win2k ldap server; wrap and unwrap of encrypted and unencrypted data tested. So far no test of getmic or verify_mic. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13870 dc483132-0cff-0310-8789-dd5450dbe970
* * k5seal.c (make_seal_token_v1): Correct errors in codeEzra Peisach2001-10-262-5/+15
| | | | | | | pertaining to case when signing message only. Fixes buffer overflows as found by gssapi dejagnu testsuite. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13868 dc483132-0cff-0310-8789-dd5450dbe970
* * Expose some rc4 crypto routines through the accessor mechanism; cleaner ↵Sam Hartman2001-10-268-196/+388
| | | | | | | | | | | | than raw enctype * Deal with GSSAPI key usage in microsoft translation * Add rc4 gssapi mechanism; works with itself, not tested against * Windows yet * Refactor large chunks of k5seal.c to make code more readable for debugging git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13859 dc483132-0cff-0310-8789-dd5450dbe970
* In directories building libraries, generate dependencies for .so/.po files tooKen Raeburn2001-10-201-43/+43
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13828 dc483132-0cff-0310-8789-dd5450dbe970
* Update automatic dependencies to work on Windows by using $(OUTPRE) andKen Raeburn2001-10-111-164/+166
| | | | | | | $(OBJEXT). Change a couple of UNIX rules to not trigger incorrectly on Windows. Rebuild dependencies. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13801 dc483132-0cff-0310-8789-dd5450dbe970
* Don't conditionalize prototypes; delete macros supporting it. (Maybe overdone;Ken Raeburn2001-10-104-126/+131
| | | | | | don't worry about restoring them when importing new versions of code.) git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13792 dc483132-0cff-0310-8789-dd5450dbe970
* Danilo also says we can get rid of _MSDOS (Win16) tests, and explicit ↵Ken Raeburn2001-10-066-102/+109
| | | | | | FAR/NEAR specs git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13786 dc483132-0cff-0310-8789-dd5450dbe970
* * accept_sec_context.c (krb5_gss_accept_sec_context): IgnoreTom Yu2001-10-042-10/+23
| | | | | | unrecognized options properly. [krb5-libs/738] git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13778 dc483132-0cff-0310-8789-dd5450dbe970
* Danilo says we can get rid of the DLLIMP stuff nowKen Raeburn2001-10-046-46/+51
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13775 dc483132-0cff-0310-8789-dd5450dbe970
* * accept_sec_context.c (rd_and_store_for_creds): Handle errorTom Yu2001-10-022-3/+9
| | | | | | returns from krb5_rd_cred more sanely. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13768 dc483132-0cff-0310-8789-dd5450dbe970
* updated dependencies for latest make-depend target codeKen Raeburn2001-09-061-53/+53
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13734 dc483132-0cff-0310-8789-dd5450dbe970
* dependenciesKen Raeburn2001-09-011-0/+226
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13725 dc483132-0cff-0310-8789-dd5450dbe970
* Unmark gss_mech_krb5 variable as an importDanilo Almeida2001-07-282-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13651 dc483132-0cff-0310-8789-dd5450dbe970
* Mark gss_mech_krb5 variable as an importDanilo Almeida2001-07-272-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13647 dc483132-0cff-0310-8789-dd5450dbe970
* * import_sec_context.c (krb5_gss_import_sec_context): Get rid ofEzra Peisach2001-07-253-5/+8
| | | | | | | variable set but never used. * ser_sctx.c (kg_queue_internalize): Ditto git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13640 dc483132-0cff-0310-8789-dd5450dbe970
* * ser_sctx.c: Declare kg_oid_size and kg_queue_size staticEzra Peisach2001-07-052-2/+6
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13556 dc483132-0cff-0310-8789-dd5450dbe970
* * accept_sec_context.c (krb5_gss_accept_sec_context): Do notEzra Peisach2001-06-222-4/+9
| | | | | | shadow local variable ptr. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13484 dc483132-0cff-0310-8789-dd5450dbe970
* Cleanup usage of memory free routines:Danilo Almeida2001-06-229-41/+72
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * util_crypt.c (kg_encrypt, kg_decrypt): Use free() instead of krb5_free_data_contents(). * util_cksum.c (kg_checksum_channel_bindings): Make sure that returned memory is allocated with xmalloc() so that caller can use xfree() on it. * k5unseal.c (kg_unseal_v1): Use krb5_free_data_contents() instead of xfree(). * k5seal.c (make_seal_token_v1): Use krb5_free_data_contents() instead of xfree(). * init_sec_context.c (make_ap_req_v1): Use xfree() instead of free() to be consistent with xmalloc() usage. Use krb5_free_data_contents() instead of xfree(). * disp_name.c (krb5_gss_display_name): Use krb5_free_unparsed_name() instead of xfree(). * add_cred.c (krb5_gss_add_cred): Use xfree() instead of free() to be consistent with xmalloc() usage. * accept_sec_context.c (krb5_gss_accept_sec_context): Remove variables that were effectively unused. Use krb5_free_data_contents() instead of xfree() where appropriate. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13482 dc483132-0cff-0310-8789-dd5450dbe970
* * acquire_cred.c (acquire_init_cred): Include "k5-int.h" forEzra Peisach2001-06-202-0/+6
| | | | | | krb5int-cc_default() prototype. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13420 dc483132-0cff-0310-8789-dd5450dbe970
* * accept_sec_context.c acquire_cred.c import_sec_context.cEzra Peisach2001-06-186-9/+15
| | | | | | | init_sec_context.c inq_cred.c: Cast const gss_OID to gss_OID for gssapi functions which are not speced with const in the RFC. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13360 dc483132-0cff-0310-8789-dd5450dbe970
* * ser_sctx.c (kg_oid_internalize): Do away with local variableEzra Peisach2001-06-072-3/+7
| | | | | | that was set but never used. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13288 dc483132-0cff-0310-8789-dd5450dbe970
* * accept_sec_context.c (krb5_gss_accept_sec_context): CleanupEzra Peisach2001-06-043-6/+14
| | | | | | | assignments in conditionals. * k5seal.c (make_seal_token_v1): Likewise. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13260 dc483132-0cff-0310-8789-dd5450dbe970
* * wrap_size_limit.c (krb5_gss_wrap_size_limit): Get rid of unusedEzra Peisach2001-05-1413-28/+57
| | | | | | | | | | | | | | | | | | | | | | | | variable. * util_ctxsetup.c (kg2_parse_token): Fix erroneous assignment in conditional. (code not used in current tree). * util_seed.c, util_seqnum.c, util_crypt.c, util_cksum.c: Cleanup up assignments in conditionals. * ser_sctx.c (kg_queue_internalize): Get rid of unused variable. * gssapiP_krb5.h: Renable prototype for krb5_gss_release_oid() as code is back (since 1996). * k5unseal.c (kg_unseal_v1): Declare internal function static. * init_sec_context.c (make_ap_req_v2): Comment out non-referenced function. * gssapi_krb5.c: Include k5-int.h for krb5_ser_* prototypes. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13241 dc483132-0cff-0310-8789-dd5450dbe970
* * util_crypt.c (kg_make_confounder): Change variable random toEzra Peisach2001-04-242-4/+9
| | | | | | lrandom to prevent shadowing of global function. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13186 dc483132-0cff-0310-8789-dd5450dbe970
* log msg for previous checkinsKen Raeburn2000-12-091-0/+11
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12889 dc483132-0cff-0310-8789-dd5450dbe970
* check in -01 draftKen Raeburn2000-12-081-184/+305
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12888 dc483132-0cff-0310-8789-dd5450dbe970
* * k5seal.c (make_seal_token_v1): Use ANSI-style definition, instead of K&R plusKen Raeburn2000-12-083-35/+21
| | | | | | | | | | | | prototype. Don't use too-big numbers even as placeholders. * accept_sec_context.c (rd_and_store_for_creds): After creating an auth context, set flags to require sequence numbers. (krb5_gss_accept_sec_context): Likewise. * init_sec_context.c (krb5_gss_init_sec_context): Likewise. (thanks to assar for noticing this) git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12887 dc483132-0cff-0310-8789-dd5450dbe970
* Fix typo in last checkinEzra Peisach2000-10-041-1/+1
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12722 dc483132-0cff-0310-8789-dd5450dbe970
* * accept_sec_context.c (krb5_gss_accept_sec_context): If an errorEzra Peisach2000-10-042-0/+12
| | | | | | | | occurs after the auth_context is established, but before the krb5_gss_ctx_id_rec is established, release our pointer to the replay cache and invoke krb5_auth_con_free(). (krb5-libs/855) git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12721 dc483132-0cff-0310-8789-dd5450dbe970
* Checkin log for change to add_cred.c - assignment in conditional cleanupEzra Peisach2000-10-031-1/+2
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12715 dc483132-0cff-0310-8789-dd5450dbe970
* Clean up assignments in conditionals warnings by separating theEzra Peisach2000-10-031-7/+10
| | | | | | assignment from the test. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12714 dc483132-0cff-0310-8789-dd5450dbe970
* * add_cred.c (krb5_gss_add_cred): krb5_cc_get_type() andEzra Peisach2000-10-032-1/+7
| | | | | | krb5_cc_get_name() return const char *. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12710 dc483132-0cff-0310-8789-dd5450dbe970
* * accept_sec_context.c (krb5_gss_accept_sec_context): WhenEzra Peisach2000-09-222-11/+21
| | | | | | | | | GCC_S_NO_CHANNEL_BINDINGS is set by the server, skip over the bindings sent from the client. RFC-1964 indicates that the client's channel bindings are always sent in checksum field and need to be accounted for, evn if the server does not care. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12664 dc483132-0cff-0310-8789-dd5450dbe970
* 2000-09-01 Jeffrey Altman <jaltman@columbia.edu>Jeffrey Altman2000-09-022-13/+58
| | | | | | | | | | | | | | | | * accept_sec_context.c: krb5_gss_accept_sec_context() It has been determined by Martin Rex that Windows 2000 is incapable of supporting channel bindings. This caused us to examine the various RFCs affecting FTP GSSAPI to determine whether or not channel bindings were a MUST for implementation of the FTP GSSAPI protocol. It was determined that the channel binding facility as described in RFC2743 is optional. Therefore, we cannot assume that all clients or servers will support it. The code was updated to allow GSS_C_NO_CHANNEL_BINDINGS when specified by either the client or server to indicate that channel bindings will not be used. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12645 dc483132-0cff-0310-8789-dd5450dbe970
* pullup from 1.2.1 releaseKen Raeburn2000-07-012-1/+26
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12502 dc483132-0cff-0310-8789-dd5450dbe970
* merge from 1.2 branchKen Raeburn2000-06-301-0/+274
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12471 dc483132-0cff-0310-8789-dd5450dbe970
* pullup from 1.2 branchKen Raeburn2000-06-2715-2110/+1138
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12442 dc483132-0cff-0310-8789-dd5450dbe970
* Check for existance of <memory.h>.Wilfredo Sanchez2000-06-018-0/+21
| | | | | | (from Nathan Neulinger <nneul@umr.edu>) git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12332 dc483132-0cff-0310-8789-dd5450dbe970
* Change wsanchez@apple -> tritan@mitWilfredo Sanchez2000-06-011-2/+2
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12331 dc483132-0cff-0310-8789-dd5450dbe970
* 2000-5-19 Alexandra Ellwood <lxs@mit.edu>Alexandra Ellwood2000-05-192-1/+10
| | | | | | | | | | | * acquire_cred.c: Changed to use krb5int_cc_default. This function supports the Kerberos Login Library and pops up a dialog if the cache does not contain valid tickets. This is used to automatically get a tgt before obtaining service tickets. Note that this should be an internal function because callers don't expect krb5_cc_default to pop up a dialog! (We found this out the hard way :-) git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12293 dc483132-0cff-0310-8789-dd5450dbe970
* * wrap_size_limit.c (krb5_gss_wrap_size_limit): Fix upTom Yu2000-04-082-5/+11
| | | | | | | | wrap_size_limit() to deal with integrity wrap tokens properly. The rfc1964 mech always pads and confounds regardless of whether confidentiality is requested. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12155 dc483132-0cff-0310-8789-dd5450dbe970
* * init_sec_context.c (krb5_gss_init_sec_context): Default to des-cbc-crcKen Raeburn2000-01-272-1/+6
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11969 dc483132-0cff-0310-8789-dd5450dbe970
* * accept_sec_context.c (krb5_gss_accept_sec_context): get rid of unused varsKen Raeburn1999-10-272-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11884 dc483132-0cff-0310-8789-dd5450dbe970
* * k5seal.c (make_integ_token_v2): Set 'code' when malloc failsKen Raeburn1999-10-262-1/+7
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11882 dc483132-0cff-0310-8789-dd5450dbe970