| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
| |
break trying to match is_skey in the ccache. This way we
won't end up with many copies of user-to-user tickets.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7348 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7344 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
and checksum type).
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7300 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
error.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7294 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
variables which are no longer used.
recvauth.c: Removed the global extern of krb5_kdc_default_options,
which wasn't being used anyway.
mk_req.c (krb5_mk_req): Replace use of krb5_kdc_default_options with
context->kdc_default_options.
gc_frm_kdc.c: Remove the global extern of krb5_kdc_req_sumtype, which
wasn't being used anymore anyway.
send_tgs.c (krb5_send_tgs_basic): Remove use of the global variable
krb5_kdc_req_sumtype, and use the kdc_req_sumtype in the context
structure instead.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7291 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
| |
authentication patch takes into account the null entry at the end of
the list.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7289 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
dirty work of forwarding TGT's.
rd_cred.c (krb5_rd_cred_basic): Clean up memory allocation discpline
to remove memory leaks.
mk_cred.c (krb5_mk_ncred_basic, krb5_mk_ncred, krb5_mk_1cred): Clean
up memory allocation discpline to remove memory leaks.
init_ctx.c (krb5_get_tgs_ktypes): Clean up parsing of the etype list.
Don't overrun the string containing the etype list.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7280 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
we're being called from the gssapi code, which doesn't have access to
the sender or receive address information, don't check the sender
address, since it won't be available.
* rd_cred.c (decrypt_credencdata): When calling krb5_rd_credd(), if
the keyblock is null, just copy the encoded structure from the
"ciphertext" part of the structure and decode it.
* mk_cred.c (encrypt_credencpart): When calling krb5_mk_cred(), if the
keyblock is NULL, don't encrypt it; just encode it and leave it in the
ciphertext area of the structure.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7264 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7245 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
allocated.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7240 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7176 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7175 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
credentials that are matching a supported application keytype.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7169 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
|
| |
krb5_set_default_tgs_ktypes(context, ktypes)
This routine sets the default application session key types to be used.
krb5_get_tgs_ktypes(context, principal, &ktypes)
This routine gets the session key types to be used with "principal".
At the moment, this only uses the krb5_set_default_tgs_ktypes values
or those specified in libdefaults/default_tgs_enctypes (krb5.conf).
It is envisioned that this may later support per-host/per-realm lookup.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7168 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
TGT session key types and application session key types.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7166 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
key type.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7165 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
| |
should be done using the session key and its encryption system, not the
ticket's encryption system.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7161 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
| |
reduce the dependencies on libkadm and for better support of multiple
encryption type lookup in krb5.conf.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7159 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
| |
reduce the dependencies on libkadm and for better support of multiple
encryption type lookup in krb5.conf.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7158 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
stack garbage.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7149 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
| |
and process_pw_salt() explicitly rather than using the
typedef in k5-int.h becaus that typedef is to a function
pointer now.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7123 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
| |
preauth.c (process_pw_salt): When fetching the key to decrypting the
encrypted kdc reply, use the etype associated with the etype
reply, not the etype associated with the included ticket.
encode_kdc.c: Remove eblock argument from krb5_encode_kdc_rep;
set the eblock type from the client_key's enctype.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7117 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
default rcache type is "dfl".
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7110 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7106 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
preauth information which is returned by the KDC. This should be
general enough to support the AFS3_SALT preauth type, the SNK4
preauth type, and the public-key mods to Kerberos.
(process_pw_salt): New function for processing the KRB5_PW_SALT
preauthentication type.
* get_in_tkt.c (decrypt_as_reply): Removed temporary kludge for
processing the PW_SALT preauth type; that's now done in preauth.c
(krb5_get_in_tkt): Call krb5_process_padata with new arguments so that
the preauth code can set the decryption_key if necessary.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7102 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7082 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
| |
the call to krb5_obtain_padata.
* preauth.c (krb5_obtain_padata): Use the PADATA_ETYPE_INFO preauth,
if it exists, to determine which salt type to use when encrypting the
preauthentication data. Remove the etype_info argument.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7071 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* srv_rcache.c (krb5_get_server_rcache):
* rd_safe.c (krb5_rd_safe):
* rd_req_dec.c (krb5_rd_req_decoded):
* rd_priv.c (krb5_rd_priv):
* rd_cred.c (krb5_rd_cred):
* gc_via_tkt.c (krb5_get_cred_via_tkt):
* get_in_tkt.c (verify_as_reply): Replace use of krb5_clockskew with
context->clockskew.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7063 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
| |
an eblock; we can use our own and figure out the enctype
from the passed-in key.
* get_in_tkt.c (krb5_get_in_tkt): Added calls to krb5_obtain_padata().
* preauth.c: Completely restructured file to support preauthentication.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7056 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
to support preauthentication. (interim checkin)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7002 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
to an automatic variable(!).
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6999 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
| |
set the length after initializing string.
rd_req.c (krb5_rd_req): If a new auth_context is created
and then there is an error, make sure return pointer is not
looking at freed memory.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6981 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
included by wconfig.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6944 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
requested starttime if we requested a postdated ticket.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6885 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
'.', assume that they are fully qualified already.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6883 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6881 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6860 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
| |
rd_cred.c: removed INTERFACE keyword.
ser_auth.c: passing int32 where a size_t is wanted.
ser_ctx.c: 16/32 bit int size mismatch.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6826 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6806 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
structure may have possible been used be freed..
rd_safe.c (krb5_rd_safe_basic): Fall through to the cleanup code at
the end, to make sure the decoded message in message is freed.
rd_req_dec.c (krb5_rd_req_decoded): Use krb5_copy_keyblock to copy
authent->subkey to auth_context->remote_subkey. Keeping them
separate avoids aliasing problems.
mk_req_ext.c (krb5_generate_authenticator): Fix memory leak. Don't
bash authent->subkey with key after carefully copying it using
krb5_copy_keyblock!
recvauth.c (krb5_recvauth): krb5_get_server_rcache() already opens the
rcache; doing it again merely causes a memory leak.
gen_subkey.c (krb5_generate_subkey): Eliminate memory leak.
krb5_init_random_key() does its own allocation of the
keyblock.
gc_via_tkt.c (krb5_kdcrep2creds): Fix memory leak.
srv_rcache.c (krb5_get_server_rcache): Fix memory leak.
rd_safe.c (krb5_rd_safe_basic): Fix memory leak.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6797 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
| |
t_ser.c: Work around an optimizer bug in gcc under OSF/1 2.1.
The timeofday calls were left in the stage as described in the ChangeLog
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6766 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6749 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
| |
* gc_frm_kdc.c, gen_seqnum.c, get_creds.c, get_in_tkt.c,
* in_tkt_ktb.c, in_tkt_pwd.c, in_tkt_sky.c, init_ctx.c,
* kdc_rep_dc.c, mk_cred.c, mk_priv.c, mk_rep.c, mk_req._ext.c,
* preauth.c, rd_cred.c, rd_priv.c, rd_rep.c, rd_req_dec.c,
* send_tgs.c, sendauth.c, ser_actx.c, ser_ctx.c, ser_eblk.c,
* ser_key.c, t_ser.c : s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6727 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
| |
* gc_via_tkt.c, get_in_tkt.c, in_tkt_ktb.c, in_tkt_pwd.c, in_tkt_sky.c
* init_ctx.c, kdc_rep_dc.c, mk_cred.c, mk_priv.c, mk_rep.c
* mk_req_ext.c, rd_cred.c, rd_priv.c, rd_rep.c, rd_req_dec.c,
* send_tgs.c, ser_ctx.c, ser_eblk.c, ser_key.c, t_ser.c:
Remove krb5_enctype references, and replace with
krb5_keytype where appropriate
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6687 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
the time_offset fields from the returned ticket's authtime value.
init_ctx.c (krb5_init_context): Initialize new fields in krb5_context
(clockskew, kdc_req_sumtype, and kdc_default_options).
gc_via_tkt.c (krb5_get_cred_via_tkt): Perform the necessary
sanity checking on the KDC response to make sure we detect tampering.
send_tgs.c (krb5_send_tgs): Set the expected nonce in the response
structure.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6653 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6649 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6629 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6623 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
| |
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6622 dc483132-0cff-0310-8789-dd5450dbe970
|
|
|
|
|
|
| |
going to be freed
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6621 dc483132-0cff-0310-8789-dd5450dbe970
|