summaryrefslogtreecommitdiffstats
path: root/src/lib
Commit message (Expand)AuthorAgeFilesLines
* Conditionalize some ipv6 bitsKen Raeburn2007-02-161-1/+9
* rename krb5_server_decrypt_ticket_keyblock() toTom Yu2007-02-131-4/+5
* hack to permit GetEnvironmentVariable usage without requiring getenv() conver...Jeffrey Altman2007-02-121-0/+9
* In the resolve function - ensure on memory allocation error - Ezra Peisach2007-02-121-3/+6
* krb5_kt_default_name should take an unsized lengthEzra Peisach2007-02-051-5/+5
* krb5_kt_get_type should return const char *. Ezra Peisach2007-02-053-4/+4
* Add a new program to perform various tests on the WRFILE: and MEMORY: keytabsEzra Peisach2007-02-042-8/+461
* MEMORY keytab krb5_kt_get_entry sets enctype to 0 if unspecifiedEzra Peisach2007-02-041-10/+10
* MEMORY keytab does not copy keytab_entry keyblock contentsEzra Peisach2007-02-041-3/+21
* Memory leak in new memory keytabEzra Peisach2007-02-031-0/+2
* buffer overflow in krb5_kt_get_nameEzra Peisach2007-02-013-3/+3
* Don't need to initialize error tablesKen Raeburn2007-02-011-2/+0
* Don't need to register WRFILE: keytab type, it's already in the compiled-inKen Raeburn2007-02-011-7/+1
* Fix merge botches:Tom Yu2007-01-312-12/+30
* remove krb5_get_init_creds_opt_set_pkinit() for nowTom Yu2007-01-312-64/+0
* sort, remove duplicatesKen Raeburn2007-01-301-7/+1
* get_init_creds_opt extensibilityTom Yu2007-01-307-63/+590
* This commit adds a thread safe MEMORY keytab implementation Jeffrey Altman2007-01-305-11/+720
* sortKen Raeburn2007-01-271-9/+9
* sortKen Raeburn2007-01-271-1/+1
* Add const to variable to cleanup warningsEzra Peisach2007-01-231-1/+1
* Include k5-int.h for krb5_cc_register() prototype. Remove defintion ofEzra Peisach2007-01-231-2/+1
* Change second argument to krb5_cc_register to take a const krb5_cc_ops *. MakesEzra Peisach2007-01-231-1/+2
* gss_krb5int_unseal_token_v3() - change bodysize argument to unsigned -Ezra Peisach2007-01-232-2/+3
* kt_file.c memory leak on error in krb5_kt_resolve / krb5_kt_wresolveJeffrey Altman2007-01-231-0/+2
* Include fake-addrinfo.h before krb5.h to get proper structure declarationsEzra Peisach2007-01-221-3/+4
* Only declare cc_fcc_entry if USE_KEYRING_CCACHE is not definedEzra Peisach2007-01-211-0/+3
* Don't copy headers to .../includeKen Raeburn2007-01-201-8/+1
* make dependKen Raeburn2007-01-202-11/+8
* Don't explicitly include error table headers that are also in krb5.hKen Raeburn2007-01-202-5/+0
* Remove varargs.h paths, always use stdarg.hKen Raeburn2007-01-201-4/+0
* Don't define KRB5_PRIVATE, since it's not tested any moreKen Raeburn2007-01-201-5/+0
* Delete t_cccursor on cleanup. Add t_cc and t_cccursor to dependenciesKen Raeburn2007-01-201-1/+11
* Add t_cccursor to UNIX testsKen Raeburn2007-01-201-2/+4
* Added KDC timesyncing support to the CCAPI ccache backend for CCAPI v5 andAlexandra Ellwood2007-01-181-10/+72
* In addition to setting the kpasswd port afterJeffrey Altman2007-01-181-1/+3
* sendto_kdc.c: use of a variable index into a dynamically Jeffrey Altman2007-01-181-2/+2
* * t_cccursor.c (do_chk): Reverse sense of test of do_chk_one return valueKen Raeburn2007-01-171-1/+1
* This commit adds two new functions, krb5_server_decrypt_ticket_keyblock Jeffrey Altman2007-01-164-0/+107
* MITKRB5-SA-2006-003: mechglue argument handling too laxTom Yu2007-01-0924-277/+827
* MITKRB5-SA-2006-002: svctcp_destroy() can call uninitialized function pointerTom Yu2007-01-091-0/+5
* If gss_krb5int_unseal_token_v3() unwraps a message of length 0 - freeEzra Peisach2006-12-301-0/+4
* memory leak if defective header present in gss_krb5int_unseal_token_v3Ezra Peisach2006-12-301-1/+3
* * copy_data.c (krb5_copy_data): Use krb5int_copy_data_contentsKen Raeburn2006-12-281-10/+7
* * cc_memory.c (krb5_mcc_next_cred): Use krb5int_copy_creds_contentsKen Raeburn2006-12-281-45/+3
* * lib/krb5/krb/copy_creds.c (krb5int_copy_creds_contents): New function, splitKen Raeburn2006-12-281-2/+21
* comment the various data structuresKen Raeburn2006-12-281-0/+4
* * src/lib/krb5/krb/get_in_tkt.c (krb5_get_init_creds): FixTom Yu2006-12-221-3/+4
* use KRB5KRB_ERR_GENERIC, not KRB_ERR_GENERIC in preauth2.cTom Yu2006-12-191-3/+3
* don't pass null pointer to krb5_do_preauth_tryagain()Tom Yu2006-12-191-17/+24