summaryrefslogtreecommitdiffstats
path: root/src/lib
Commit message (Collapse)AuthorAgeFilesLines
...
* * init_os_ctx.c (os_get_default_config_files): Remove unused variableKen Raeburn2000-03-142-1/+3
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12112 dc483132-0cff-0310-8789-dd5450dbe970
* * def_realm.c: Include netinet/in.h if availableKen Raeburn2000-03-142-0/+7
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12111 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Check for gethostbyname2Ken Raeburn2000-03-142-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12110 dc483132-0cff-0310-8789-dd5450dbe970
* Fix one of the bugs discovered at Connectathon: etype specified in preauthKen Raeburn2000-03-133-5/+68
| | | | | | data is ignored under get_in_tkt interface. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12104 dc483132-0cff-0310-8789-dd5450dbe970
* Change function prototypes to match the entries in krb5.hin - specificallyEzra Peisach2000-03-1211-14/+26
| | | | | | use krb5_const instead of const. Under ultrix they are not the same. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12101 dc483132-0cff-0310-8789-dd5450dbe970
* * kdb_xdr.c (krb5_dbe_lookup_mod_princ_data): In casting argumentEzra Peisach2000-03-122-1/+6
| | | | | | | | to krb5_parse_name, use krb5_const not const. Under ultrix, krb5_const is not the same as const git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12100 dc483132-0cff-0310-8789-dd5450dbe970
* get_in_tkt.c (krb5_get_init_creds): Always initialize local_as_reply to ↵Miro Jurisic2000-03-102-0/+7
| | | | | | avoid returning garbage on error returns git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12097 dc483132-0cff-0310-8789-dd5450dbe970
* Remove keepold argument from create_principal_3, since it is ratherTom Yu2000-02-2710-12/+32
| | | | | | | useless. Update library version numbers, xdr functions, etc. accordingly. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12082 dc483132-0cff-0310-8789-dd5450dbe970
* * server_acl.c (acl_get_line): Patch from Matt Crawford to permit line ↵Ken Raeburn2000-02-262-13/+40
| | | | | | continuation by ending a line with a backslash git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12081 dc483132-0cff-0310-8789-dd5450dbe970
* * preauth2.c (krb5_do_preauth): Check paorder[h] not h for PA_REAL. Fix ↵Ken Raeburn2000-02-262-1/+6
| | | | | | from Matt Crawford git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12077 dc483132-0cff-0310-8789-dd5450dbe970
* fix email addrKen Raeburn2000-02-261-1/+1
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12076 dc483132-0cff-0310-8789-dd5450dbe970
* forgot room for null pointer at end of local addr arrayKen Raeburn2000-02-262-2/+3
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12075 dc483132-0cff-0310-8789-dd5450dbe970
* Separate interface address processing from Kerberos-related functions.Ken Raeburn2000-02-252-159/+238
| | | | | | | | | | * localaddr.c (foreach_localaddr): Broken out from old krb5_os_localaddr. Iterates over all active interface addresses, invoking callback functions; knows nothing about Kerberos. (count_addrs, allocate, add_addr): New callback functions. (krb5_os_localaddr): Use the above. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12069 dc483132-0cff-0310-8789-dd5450dbe970
* * t_verify.c: Add "const" to casts in calls to mit_des_cbc_encrypt()Ezra Peisach2000-02-253-5/+12
| | | | | | | * destest.c: Declare zeroblock as krb5_octet * instead of char * as argument to mit_des_cbc_encrypt. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12068 dc483132-0cff-0310-8789-dd5450dbe970
* fix for vpath and du4.0 makeKen Raeburn2000-02-224-0/+16
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12063 dc483132-0cff-0310-8789-dd5450dbe970
* Makefile.in (clean-unix): Add clean-libobjsEzra Peisach2000-02-224-2/+10
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12062 dc483132-0cff-0310-8789-dd5450dbe970
* from Bear Giles:Ken Raeburn2000-02-212-2/+5
| | | | | | | * fetch_mkey.c (krb5_db_fetch_mkey): Don't attempt to override type of key read from stash file. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12061 dc483132-0cff-0310-8789-dd5450dbe970
* from Bear Giles:Ken Raeburn2000-02-212-13/+22
| | | | | | | | * alt_prof.c (krb5_read_realm_params): Permit realm supported enctypes to be unspecified, letting the KDC produce defaults. Don't look up enctypes at all if an error is to be returned. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12060 dc483132-0cff-0310-8789-dd5450dbe970
* * kadm_rpc_xdr.c (xdr_chpass3_arg):Tom Yu2000-02-192-2/+7
| | | | | | (xdr_chrand3_arg): Fix up calls to xdr_array. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12055 dc483132-0cff-0310-8789-dd5450dbe970
* * kdb_cpw.c (krb5_dbe_crk):Tom Yu2000-02-192-0/+13
| | | | | | (krb5_dbe_cpw): Fix to actually save old keys. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12054 dc483132-0cff-0310-8789-dd5450dbe970
* * svc_auth_gssapi.c (_svcauth_gssapi): Don't explicitly freeTom Yu2000-02-189-9/+84
| | | | | | | | | | | | | | | | | | | | | | | | | | | call_arg on error, since svc_getargs should do that now. * svc_udp.c (svcudp_getargs): Free args on xdr decode error to avoid leaks. * svc_tcp.c (svctcp_getargs): Free args on xdr decode error to avoid leaks. * svc_raw.c (svcraw_getargs): Free args on xdr decode error to avoid leaks. * auth_gssapi.c (auth_gssapi_create): Don't explicitly free call_res anymore, since clnt_call should deal now. * clnt_udp.c (clntudp_call): Free stuff on error from xdr_replymsg() to prevent leaking. * clnt_tcp.c (clnttcp_call): Free stuff on error from xdr_replymsg() to avoid leaking. * clnt_raw.c (clntraw_call): Free stuff on error from xdr_replymsg() to avoid leaking. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12052 dc483132-0cff-0310-8789-dd5450dbe970
* * auth_gssapi.c (auth_gssapi_create): Free call_res becauseTom Yu2000-02-174-37/+43
| | | | | | | | | | | | | | | | | | | | | xdr_authgssapi_init_res can potentially allocate memory. Perhaps clnt_call should really deal with this, though. It is not at all clear whether clnt_call or svc_getargs should actually end up freeing allocated memory themselves. * svc_auth_gssapi.c (_svcauth_gssapi): Call gssrpc_xdr_free() if xdr_authgssapi_creds() or xdr_authgssapi_init_arg() fails. * auth_gssapi_misc.c (xdr_authgssapi_creds): (xdr_authgssapi_init_arg): (xdr_authgssapi_init_res): Revert prior change. The caller should be the one dealing. Additionally, it was probably wrong to unconditionally free the object regardless of whether the mode is XDR_DECODE. (auth_gssapi_unwrap_data): Use temp_xdrs rather than in_xdrs to force XDR_FREE operation. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12051 dc483132-0cff-0310-8789-dd5450dbe970
* * preauth2.c (pa_sam): In send-encrypted-sad mode, check for magic salt lengthKen Raeburn2000-02-162-7/+51
| | | | | | | | and generate a salt from the principal name if found; use the password and salt to generate a key. Provide timestamp if nonce is zero, regardless of preauth mode. (Patch from Chas Williams.) git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12045 dc483132-0cff-0310-8789-dd5450dbe970
* * localaddr.c (krb5_os_localaddr): Dynamically grow buffer used for SIOCGIFCONFKen Raeburn2000-02-162-10/+69
| | | | | | | until it appears to have been big enough. Dynamically grow internal address pointer array as needed. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12044 dc483132-0cff-0310-8789-dd5450dbe970
* * server.c: Add code to set a signal handler for SIGHUP and a fewTom Yu2000-02-153-0/+29
| | | | | | | | others so that purify will actually generate memory leak reports. * configure.in: Add CHECK_SIGNALS. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12042 dc483132-0cff-0310-8789-dd5450dbe970
* * svc.c (xprt_register): Zero out xports after allocatingTom Yu2000-02-153-16/+51
| | | | | | | | | | * auth_gssapi_misc.c (xdr_authgssapi_creds): (xdr_authgssapi_init_arg): (xdr_authgssapi_init_res): (auth_gssapi_unwrap_data): If xdr_gss_buf or xdr_bytes fails, call again with XDR_FREE set so that allocated memory doesn't leak. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12041 dc483132-0cff-0310-8789-dd5450dbe970
* Add client-side stubs and functions with additional capabilities toTom Yu2000-02-1410-15/+501
| | | | | | | | | take key_salt_tuples and optionally keep old keys around. Add server-side functionality for setkey with key_salt_tuple and "keepold" functionality. Update rpc stubs and xdr functions/headers appropriately. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12040 dc483132-0cff-0310-8789-dd5450dbe970
* Added "Kerberos Preferences" as valid config file on Mac OS. Others will be ↵Marshall Vale2000-02-111-11/+17
| | | | | | removed at a later date git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12037 dc483132-0cff-0310-8789-dd5450dbe970
* * init_os_ctx.c: Added "Kerberos Preferences" as valid config file on Mac OSMarshall Vale2000-02-111-0/+7
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12036 dc483132-0cff-0310-8789-dd5450dbe970
* Fixed lxs' fix: strlen (x) + 1 instead of strlen (x+1)Miro Jurisic2000-02-112-2/+6
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12035 dc483132-0cff-0310-8789-dd5450dbe970
* changelog updated for stdcc_util.c changeAlexandra Ellwood2000-02-101-0/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12033 dc483132-0cff-0310-8789-dd5450dbe970
* Added +1 to strlens so that null terminator will fit in the buffer ;-PAlexandra Ellwood2000-02-101-2/+2
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12032 dc483132-0cff-0310-8789-dd5450dbe970
* * init_os_ctx.c: Added changes for the Mac for limited support of ↵Marshall Vale2000-02-081-0/+10
| | | | | | Application Support folder as a location for the krb5 configuration file git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12027 dc483132-0cff-0310-8789-dd5450dbe970
* Limited support for Applicaiton Support folder as location for krb5.ini on ↵Marshall Vale2000-02-081-8/+24
| | | | | | the Mac added git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12026 dc483132-0cff-0310-8789-dd5450dbe970
* * api.1/lock.exp: Since a "wait" directive to the command list ofTom Yu2000-02-082-0/+12
| | | | | | | | | | | the lock_test procedures does not wait for any synchronization, change lock9 to acquire and release a lock before the "wait" directive in order to avoid a race condition where lock9 spawns the ./lock-test but the program has not opened the database prior to lock9_1 acquiring a permanent lock. This was causing difficult-to-reproduce failures. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12025 dc483132-0cff-0310-8789-dd5450dbe970
* * lib/lib.t: Call kinit and kdestroy with -5 flag to accomodateTom Yu2000-02-082-2/+7
| | | | | | new behavior. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12022 dc483132-0cff-0310-8789-dd5450dbe970
* * config/unix.exp: Call send_error instead of fail to preventTom Yu2000-02-073-7/+16
| | | | | | | | | | referencing variables not yet set up by the test framework. * lib/helpers.exp: Call kinit and kdestroy with the -5 flag to deal with new program behavior. Also call perror rather than error to avoid spewing a stack trace. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12021 dc483132-0cff-0310-8789-dd5450dbe970
* changepw.c (krb5_locate_kpasswd): fixed memory trashing caused by incorrect ↵Scott McGuire2000-02-072-1/+7
| | | | | | pointer arithmetic when assigning DEFAULT_KPASSWD_PORT in DNS code git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12019 dc483132-0cff-0310-8789-dd5450dbe970
* * gic_pwd.c (krb5_get_as_key_password): If the as_key enctype is already set toKen Raeburn2000-02-073-15/+35
| | | | | | | | | | | | | | the correct type, do continue and ask for the password anyways. (Patch from Chas Williams, PR krb5-libs/730.) * preauth2.c (pa_sam): If no sam_flags were set, return KRB5_PREAUTH_BAD_TYPE, because we don't currently handle that case. * preauth2.c (pa_sam): Remove unused variable use_sam_key. (SAMDATA): Cast first result to int, which is what sprintf needs. (pa_salt): Delete unused variable ret. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12012 dc483132-0cff-0310-8789-dd5450dbe970
* updated some comments (fcusack)Ken Raeburn2000-02-072-6/+9
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12009 dc483132-0cff-0310-8789-dd5450dbe970
* added flags field to predicted_sam_response (fcusack)Ken Raeburn2000-02-073-11/+13
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12008 dc483132-0cff-0310-8789-dd5450dbe970
* more fcusack changes - rest of first setKen Raeburn2000-02-074-2/+19
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12006 dc483132-0cff-0310-8789-dd5450dbe970
* Frank Cusack changes, set 1, diffs 1-3 of 4Ken Raeburn2000-02-077-11/+30
| | | | | | | | Rename "sam_passcode" field to "sam_sad". Add data to predicted-sam-response structure, in part to (prepare to) help with replay detection. Fix some memory allocation problems. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12005 dc483132-0cff-0310-8789-dd5450dbe970
* (krb5_locate_kpasswd): fixed memory trashing caused by incorrect pointer ↵Scott McGuire2000-02-042-1/+7
| | | | | | arithmetic when assigning DEFAULT_KPASSWD_PORT in non-DNS code git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11997 dc483132-0cff-0310-8789-dd5450dbe970
* Removed calls that destroyed and recreated ccapi_data->NamedCache if it ↵Scott McGuire2000-02-042-8/+9
| | | | | | exists in krb5_stdcc_initialize(); instead close and call create on it again git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11994 dc483132-0cff-0310-8789-dd5450dbe970
* * krb5_32.def: Replace decode_krb5_ticket with krb5_decode_ticket.Danilo Almeida2000-02-022-11/+30
| | | | | | Add documentation about adding things to DEF file. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11984 dc483132-0cff-0310-8789-dd5450dbe970
* * krb5_decode.c (krb5_decode_ticket): Add function to provideDanilo Almeida2000-02-022-0/+14
| | | | | | decode_krb5_ticket functionality as part of krb5 API. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11983 dc483132-0cff-0310-8789-dd5450dbe970
* * kts_g_ent.c, ktsrvtab.h (krb5_ktsrvtab_get_entry): Change theEzra Peisach2000-01-293-2/+9
| | | | | | | | | third argument to krb5_const_principal (from krb5_principal) to agree with krb5_kts_ops entries. gcc warning about incompatible pointer types. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11980 dc483132-0cff-0310-8789-dd5450dbe970
* limit kadm5 net interface to des for now until gssapi mech is fixedKen Raeburn2000-01-272-2/+14
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11971 dc483132-0cff-0310-8789-dd5450dbe970
* * init_ctx.c (get_profile_etype_list): Discard DESONLY changes from 1999-09-01,Ken Raeburn2000-01-272-19/+10
| | | | | | and revert call sites. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11970 dc483132-0cff-0310-8789-dd5450dbe970