summaryrefslogtreecommitdiffstats
path: root/src
Commit message (Expand)AuthorAgeFilesLines
...
* Enable sam_challenge_2 encodersSam Hartman2010-10-013-6/+3
* Remove support for the old pa-sam-challenge and pa-sam-responseSam Hartman2010-10-012-1020/+46
* Implement k5login_directory and k5login_authoritative optionsGreg Hudson2010-10-013-85/+134
* Add a simple test harness for kuserok. Build it during make check butGreg Hudson2010-10-012-2/+66
* A cleaner impleentation of r24399 which adds two new auth context APIsGreg Hudson2010-10-014-4/+35
* GSSAPI forwarded credentials must be encrypted in session keyGreg Hudson2010-10-011-3/+11
* WhitespaceGreg Hudson2010-09-303-15/+12
* WhitespaceGreg Hudson2010-09-303-60/+47
* Use a different construction for defaulting ks_tuple and n_ks_tuple inGreg Hudson2010-09-301-33/+31
* Whitespace and minor style changesGreg Hudson2010-09-303-23/+28
* Follow-on to r24258: initialize the new k5e1 error table where weGreg Hudson2010-09-293-0/+4
* make dependSam Hartman2010-09-295-4/+61
* Automated tests for kadm5_hook pluginSam Hartman2010-09-297-0/+169
* kadm5_hook: new plugin interfaceSam Hartman2010-09-298-11/+451
* Make krb5_dbe_def_search_enctype skip key data entries with invalidGreg Hudson2010-09-281-6/+4
* Use IAKERB OID header for all IAKERB messages including AP-REQLuke Howard2010-09-274-4/+16
* Doxygen for k5-buf.hSam Hartman2010-09-271-9/+9
* kpasswd: if a credential cache is present, use FASTSam Hartman2010-09-275-27/+76
* Simplify acquire_accept_cred very slightly, avoiding some long linesGreg Hudson2010-09-271-7/+6
* Add gss_krb5_import_credGreg Hudson2010-09-2715-296/+659
* Initialize kdb5_ldap_util's context with kadm5_init_krb5_context, likeGreg Hudson2010-09-221-1/+1
* relicense Sun RPC to 3-clause BSD-styleTom Yu2010-09-2253-1222/+1334
* Adjust the k5login man page to have a slightly more neutral toneGreg Hudson2010-09-201-12/+11
* Slight revisions to create_workers() in the KDC:Greg Hudson2010-09-191-6/+9
* KDC worker processes featureGreg Hudson2010-09-177-13/+168
* Add an extra arguments parameter to k5test's realm.start_kdc()Greg Hudson2010-09-171-4/+5
* In kinit_kdb_init(), ensure that we don't return an error with theGreg Hudson2010-09-171-1/+3
* Follow-on to r24315: remove get/set_mkey_list from export list ofGreg Hudson2010-09-161-2/+0
* In the PKINIT OpenSSL crypto code, use a signed int to hold the resultGreg Hudson2010-09-151-3/+3
* WhitespaceGreg Hudson2010-09-153-25/+29
* Add a license statement to the new extern.h in kinit, use an includeGreg Hudson2010-09-151-6/+35
* WhitespaceGreg Hudson2010-09-151-26/+29
* Formatting fixGreg Hudson2010-09-151-2/+2
* kinit: add KDB keytab supportSam Hartman2010-09-156-6/+103
* Remove dead code from DAL and kdb pluginsSam Hartman2010-09-159-143/+0
* kdb: store mkey list in context and permit NULL mkey for kdb_dbe_decrypt_key_...Sam Hartman2010-09-1513-250/+114
* In the PKINIT OpenSSL code, ensure that appropriate cerficiate fieldsGreg Hudson2010-09-151-0/+2
* Use correct CRL stack macros in pkinit OpenSSL code. Patch from OlafGreg Hudson2010-09-151-3/+3
* WhitespaceGreg Hudson2010-09-151-1/+1
* Fix warnings in encrypt_key and decrypt_key. Avoid a segfault if NULLSam Hartman2010-09-152-6/+10
* In krb5_sname_to_principal, correctly handle failures fromGreg Hudson2010-09-151-2/+2
* Allow a zero checksum type to be passed into krb5_k_verify_checksum_iov;Luke Howard2010-09-091-0/+6
* krb5_k_make_checksum will use the mandatory checksum type if 0 isLuke Howard2010-09-091-0/+6
* Add dummy camellia subdir to openssl back end makefileGreg Hudson2010-09-081-1/+1
* Make dependGreg Hudson2010-09-0855-1306/+1756
* Don't build the built-in Camellia block cipher code if Camellia-CCMGreg Hudson2010-09-082-0/+10
* X509_verify_cert can return without setting cert_ctx.current_cert. IfGreg Hudson2010-09-081-2/+5
* Merge the camellia-ccm branch to trunk. Since there are no IANAGreg Hudson2010-09-0763-333/+6298
* Ensure valid key in krb5int_yarrow_cipher_encrypt_blockEzra Peisach2010-09-041-0/+6
* Fix memory leaks in kdb5_verifyEzra Peisach2010-09-041-0/+2