1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
|
2001-10-04 Tom Yu <tlyu@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Ignore
unrecognized options properly. [krb5-libs/738]
2001-10-03 Ken Raeburn <raeburn@mit.edu>
* copy_ccache.c, get_tkt_flags.c, gssapi_krb5.h, krb5_gss_glue.c,
set_ccache.c: Don't use GSS_DLLIMP.
2001-10-01 Tom Yu <tlyu@mit.edu>
* accept_sec_context.c (rd_and_store_for_creds): Handle error
returns from krb5_rd_cred more sanely.
2001-07-27 Danilo Almeida <dalmeida@mit.edu>
* gssapi_krb5.h: Unmark gss_mech_krb5 variable as an import.
2001-07-27 Danilo Almeida <dalmeida@mit.edu>
* gssapi_krb5.h: Mark gss_mech_krb5 variable as an import.
2001-07-25 Ezra Peisach <epeisach@mit.edu>
* import_sec_context.c (krb5_gss_import_sec_context): Get rid of
variable set but never used.
* ser_sctx.c (kg_queue_internalize): Ditto
2001-07-04 Ezra Peisach <epeisach@mit.edu>
* ser_sctx.c: Declare kg_oid_size and kg_queue_size static.
2001-06-21 Ezra Peisach <epeisach@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Do not
shadow local variable ptr.
2001-06-22 Danilo Almeida <dalmeida@mit.edu>
* util_crypt.c (kg_encrypt, kg_decrypt): Use free() instead of
krb5_free_data_contents().
* util_cksum.c (kg_checksum_channel_bindings): Make sure that
returned memory is allocated with xmalloc() so that caller can use
xfree() on it.
* k5unseal.c (kg_unseal_v1): Use krb5_free_data_contents()
instead of xfree().
* k5seal.c (make_seal_token_v1): Use krb5_free_data_contents()
instead of xfree().
* init_sec_context.c (make_ap_req_v1): Use xfree() instead of
free() to be consistent with xmalloc() usage. Use
krb5_free_data_contents() instead of xfree().
* disp_name.c (krb5_gss_display_name): Use
krb5_free_unparsed_name() instead of xfree().
* add_cred.c (krb5_gss_add_cred): Use xfree() instead of free() to
be consistent with xmalloc() usage.
* accept_sec_context.c (krb5_gss_accept_sec_context): Remove
variables that were effectively unused. Use
krb5_free_data_contents() instead of xfree() where appropriate.
2001-06-20 Ezra Peisach <epeisach@mit.edu>
* acquire_cred.c (acquire_init_cred): Include "k5-int.h" for
krb5int-cc_default() prototype.
2001-06-18 Ezra Peisach <epeisach@mit.edu>
* accept_sec_context.c acquire_cred.c import_sec_context.c
init_sec_context.c inq_cred.c: Cast const gss_OID to gss_OID for
gssapi functions which are not speced with const in the RFC.
2001-06-07 Ezra Peisach <epeisach@mit.edu>
* ser_sctx.c (kg_oid_internalize): Do away with local variable
that was set but never used.
2001-06-04 Ezra Peisach <epeisach@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Cleanup
assignments in conditionals.
* k5seal.c (make_seal_token_v1): Likewise.
2001-05-14 Ezra Peisach <epeisach@mit.edu>
* wrap_size_limit.c (krb5_gss_wrap_size_limit): Get rid of unused
variable.
* util_ctxsetup.c (kg2_parse_token): Fix erroneous assignment in
conditional. (code not used in current tree).
* util_seed.c, util_seqnum.c, util_crypt.c, util_cksum.c: Cleanup
up assignments in conditionals.
* ser_sctx.c (kg_queue_internalize): Get rid of unused variable.
* gssapiP_krb5.h: Renable prototype for krb5_gss_release_oid() as
code is back (since 1996).
* k5unseal.c (kg_unseal_v1): Declare internal function static.
* init_sec_context.c (make_ap_req_v2): Comment out non-referenced
function.
* gssapi_krb5.c: Include k5-int.h for krb5_ser_* prototypes.
2001-04-24 Ezra Peisach <epeisach@mit.edu>
* util_crypt.c (kg_make_confounder): Change variable random to
lrandom to prevent shadowing of global function.
2000-12-07 Ken Raeburn <raeburn@mit.edu>
* k5seal.c (make_seal_token_v1): Use ANSI-style definition,
instead of K&R plus prototype. Don't use too-big numbers even as
placeholders.
* accept_sec_context.c (rd_and_store_for_creds): After creating an
auth context, set flags to require sequence numbers.
(krb5_gss_accept_sec_context): Likewise.
* init_sec_context.c (krb5_gss_init_sec_context): Likewise.
2000-10-04 Ezra Peisach <epeisach@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): If an error
occurs after the auth_context is established, but before the
krb5_gss_ctx_id_rec is established, release our pointer to the
replay cache and invoke krb5_auth_con_free(). (krb5-libs/855)
2000-10-03 Ezra Peisach <epeisach@mit.edu>
* add_cred.c (krb5_gss_add_cred): krb5_cc_get_type() and
krb5_cc_get_name() return const char *. Cleanup assigments in
conditionals warnings.
Fri Sep 22 12:05:31 2000 Ezra Peisach <epeisach@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): When
GCC_S_NO_CHANNEL_BINDINGS is set by the server, skip over the
bindings sent from the client. RFC-1964 indicates that the
client's channel bindings are always sent in checksum field and
need to be accounted for, evn if the server does not care.
2000-09-01 Jeffrey Altman <jaltman@columbia.edu>
* accept_sec_context.c: krb5_gss_accept_sec_context()
It has been determined by Martin Rex that Windows 2000 is incapable
of supporting channel bindings. This caused us to examine the
various RFCs affecting FTP GSSAPI to determine whether or not
channel bindings were a MUST for implementation of the FTP GSSAPI
protocol. It was determined that the channel binding facility as
described in RFC2743 is optional. Therefore, we cannot assume
that all clients or servers will support it. The code was updated
to allow GSS_C_NO_CHANNEL_BINDINGS when specified by either the
client or server to indicate that channel bindings will not be
used.
2000-06-27 Tom Yu <tlyu@mit.edu>
* init_sec_context.c (get_credentials): Add initial iteration of
krb5_get_credentials in order to differentiate between an actual
missing credential and merely a bad match based on enctype. This
was causing problems with kadmin.
2000-06-09 Tom Yu <tlyu@mit.edu>
Ken Raeburn <raeburn@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Remove
explicit check of mech OID against credential.
* util_crypt.c (kg_encrypt): Copy ivec, since c_encrypt() now
updates ivecs.
(kg_decrypt): Copy ivec, since c_decrypt() now updates ivecs.
* init_sec_context.c (get_credentials): Don't check each enctype
against a list from the krb5 library; instead, just try to use it,
and go on to the next if the error code indicates we can't use it.
* gssapiP_krb5.h (enum qop): New type, derived from spec but
currently not used.
* util_crypt.c (kg_encrypt, kg_decrypt): Added key derivation
usage value as an argument. Prototypes and callers updated; all
callers use KG_USAGE_SEAL, except KG_USAGE_SEQ when encrypting
sequence numbers.
* 3des.txt: New file.
* gssapiP_krb5.h (struct _krb5_gss_ctx_id_rec): Delete field
gsskrb5_version.
(struct _krb5_gss_cred_id_rec): Delete field rfcv2_mech.
* accept_sec_context.c, acquire_cred.c, add_cred.c, inq_cred.c,
k5seal.c, k5unseal.c, ser_ctx.c:
Delete krb5-mech2 support.
* init_sec_context.c (get_credentials): Enctype argument is now a
pointer to a list of enctypes. Explicitly try each in order until
success or an error other than cryptosystem not being supported.
(krb5_gss_init_sec_context): Pass list of cryptosystems, starting
with 3DES.
* gssapiP_krb5.h (enum sgn_alg, enum seal_alg): New types,
giving symbolic names for values from RFC 1964, a Microsoft win2k
I-D, and our proposed 3des-sha1 values.
(KG_USAGE_SEAL, KG_USAGE_SIGN, KG_USAGE_SEQ): New macros.
* accept_sec_context.c (rd_req_keyproc): Already-disabled routine
deleted.
(krb5_gss_accept_sec_context): Use sgn_alg and seal_alg symbolic
names. Add a case for des3-hmac-sha1.
* k5seal.c (make_seal_token_v1): Likewise. Do key derivation for
checksums.
* k5unseal.c (kg_unseal_v1): Likewise.
* util_crypt.c (kg_encrypt, kg_decrypt): Do key derivation for
encryption.
* util_crypt.c (zeros): Unused variable deleted.
* wrap_size_limit.c: Remove mech2 support. Add MIT copyright.
2000-06-09 Nalin Dahyabhai <nalin@redhat.com>
* add_cred.c (krb5_gss_add_cred): Don't overflow buffers "ktboth"
or "ccboth".
2000-05-31 Wilfredo Sanchez <tritan@mit.edu>
* accept_sec_context.c, gssapiP_krb5.h, init_sec_context.c,
k5unseal.c, util_cksum.c, util_crypt.c, util_seed.c: Check for
existance of <memory.h>.
[from Nathan Neulinger <nneul@umr.edu>]
2000-5-19 Alexandra Ellwood <lxs@mit.edu>
* acquire_cred.c: Changed to use krb5int_cc_default. This function
supports the Kerberos Login Library and pops up a dialog if the cache does
not contain valid tickets. This is used to automatically get a tgt before
obtaining service tickets. Note that this should be an internal function
because callers don't expect krb5_cc_default to pop up a dialog!
(We found this out the hard way :-)
2000-04-08 Tom Yu <tlyu@mit.edu>
* wrap_size_limit.c (krb5_gss_wrap_size_limit): Fix up
wrap_size_limit() to deal with integrity wrap tokens properly.
The rfc1964 mech always pads and confounds regardless of whether
confidentiality is requested.
2000-01-27 Ken Raeburn <raeburn@mit.edu>
* init_sec_context.c (krb5_gss_init_sec_context): Default to
des-cbc-crc.
1999-10-26 Ken Raeburn <raeburn@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Get rid of
unused variables 'err' and 'enctype'.
* k5seal.c (make_integ_token_v2): Set 'code' when malloc fails.
1999-10-26 Wilfredo Sanchez <tritan@mit.edu>
* Makefile.in: Clean up usage of CFLAGS, CPPFLAGS, DEFS, DEFINES,
LOCAL_INCLUDES such that one can override CFLAGS from the command
line without losing CPP search patchs and defines. Some associated
Makefile cleanup.
Wed May 19 13:21:55 1999 Danilo Almeida <dalmeida@mit.edu>
* Makefile.in: Improve rule to create gssapi include dir under
windows.
Wed May 19 11:40:52 1999 Danilo Almeida <dalmeida@mit.edu>
* Makefile.in: Add windows build rules for putting header files in
include dir.
Mon May 10 15:22:27 1999 Danilo Almeida <dalmeida@mit.edu>
* Makefile.in: Do win32 build in subdir.
Fri Apr 30 12:27:14 1999 Theodore Y. Ts'o <tytso@mit.edu>
* set_ccache.c (gss_krb5_ccache_name): Add call to free the
default credential changing the ccache name.
Thu Apr 29 18:02:00 1999 Miro Jurisic <meeroh@mit.edu>
* gssapi_krb5.h: Remove gssapi_generic.h includes because
this header file is public interface and gssapi_generic.h
isn't and shouldn't be included by clients.
Fri Apr 23 00:31:17 1999 Theodore Y. Ts'o <tytso@mit.edu>
* wrap_size_limit.c (krb5_gss_wrap_size_limit): Fix wrap_size
limit so that it correctly calculates its results, and
underestimates the correct size instead of overestimating
it, and not returning zero all the time. (Which it used
to do after the March 25 fix.)
Sat Apr 17 01:23:57 1999 Theodore Y. Ts'o <tytso@mit.edu>
* gssapi_krb5.h, copy_ccache.c, get_tkt_flags.c, set_ccache.c:
Make the krb5 extension functions exportable in a Windows
DLL.
Fri Mar 26 22:17:20 1999 Theodore Y. Ts'o <tytso@mit.edu>
* acquire_cred.c (krb5_gss_acquire_cred): Don't use strcmp to
compare against principal components (they aren't null
terminated!)
Thu Mar 25 22:43:54 1999 Theodore Y. Ts'o <tytso@mit.edu>
* gssapi_krb5.c: Rearrange OID's so that the V1V2 mechanism set
returns all three mechanism ID's recognized by this
implementation, with the RFC1964 OID first (and thus
preferred).
* import_sec_context.c (krb5_gss_convert_static_mech_oid): Make
the old convert_static_oid() function globally accessible
with a namespace compliant name, since init_sec_context()
needs to be able to use this function.
* indicate_mechs.c (krb5_gss_indicate_mechs): Return the v1v2
mechanism set OID, since we should return all the
mechanisms that we support.
* init_sec_context.c (krb5_gss_init_sec_context): Make
ctx->mech_used use a static OID, since it is returned by
gss_inquire_context which must return a static OID.
* wrap_size_limit.c (krb5_gss_wrap_size_limit): Fix bug where we
would overestimate the size of the allowable input message
by one byte, because we weren't passing the right estimate
of the wrapped data to g_token_size().
1999-03-14 Miro Jurisic <meeroh@mit.edu>
* gssapi_krb5.h: added extern "C" for C++ friendliness
1999-03-14 Miro Jurisic <meeroh@mit.edu>
* set_ccache.c (gss_krb5_ccache_name): Now compiles
1999-03-11 Theodore Ts'o <tytso@rsts-11.mit.edu>
* set_ccache.c (gss_krb5_ccache_name): Added new Krb5 specific
interface to set the default credentials cache name.
1999-02-19 Theodore Ts'o <tytso@rsts-11.mit.edu>
* Makefile.in (DLL_FILE_DEF): Tell the Makefile template that we
are building object files for the GSSAPI DLL.
* krb5_gss_glue.c: Change use of KRB5_DLLIMP to be GSS_DLLIMP.
Mon Dec 21 19:50:04 1998 Theodore Y. Ts'o <tytso@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Eliminate
double free of ap_req.data, and initialize ctypes to be
NULL to avoid freeing a pointer to stack garbage when
doing a V1 mechanism accept_sec_contxt.
* init_sec_context.c: Re-arrange program logic to simplify and
factor out code; fix gss_init_sec_context() so that if the
default OID is passed to the init_sec_context, it will use
the V1 mechanism if a single DES enctype is used. Error
handling was revamped to make it simpler and cleaner, and
to assure that we don't have memory leaks on error returns.
1998-11-13 Theodore Ts'o <tytso@rsts-11.mit.edu>
* Makefile.in: Set the myfulldir and mydir variables (which are
relative to buildtop and thisconfigdir, respectively.)
Fri Nov 6 09:19:23 1998 Ezra Peisach <epeisach@mit.edu>
* k5unseal.c (kg2_unwrap_integ): Handle case of malloc(0)
returning NULL.
1998-10-27 Marc Horowitz <marc@mit.edu>
* Makefile.in, accept_sec_context.c, acquire_cred.c, canon_name.c,
delete_sec_context.c, disp_status.c, gssapiP_krb5.h,
gssapi_err_krb5.et, gssapi_krb5.c, gssapi_krb5.h,
init_sec_context.c, inq_cred.c, inq_names.c, k5seal.c, k5unseal.c,
rel_oid.c, ser_sctx.c, util_cksum.c, util_crypt.c, util_seed.c,
util_seqnum.c, wrap_size_limit.c: convert to new crypto api.
Implement new krb5 v2 gssapi mechanism.
* add_cred.c, util_ctxsetup.c: New files needed to implement the
krb5 v2 mech.
Mon Sep 21 00:32:28 1998 Tom Yu <tlyu@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Free authdat
even on success to avoid a memory leak.
* util_cksum.c (kg_checksum_channel_bindings): Fix memory leak by
not allocating cksum->contents unless we have to return a
zero-filled one.
* k5unseal.c (kg_unseal_v1): Fix memorly leak by not allocating
md5cksum.contents.
* k5seal.c (make_seal_token_v1): Fix memory leak by not allocating
md5cksum.contents.
* accept_sec_context.c (krb5_gss_accept_sec_context): Only free
ap_req.data if it was allocated by kg2_parse_token(), otherwise we
lose very badly trying to free the middle of a potentially
malloc()'ed block, possibly coredumping.
Thu Sep 3 19:35:44 1998 Tom Yu <tlyu@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Fix typo;
bash the enctype in ctx->subkey->enctype rather than just
"enctype", which nothing checks.
Fri Jul 24 21:13:53 1998 Tom Yu <tlyu@mit.edu>
* wrap_size_limit.c (krb5_gss_wrap_size_limit): Fix to round down
by 8 even if the req_output_size-ohlen is a multiple of 8, since
the wrap token is always padded regardless of whether it's a
mutiple of 8 bytes.
1998-06-08 Theodore Ts'o <tytso@rsts-11.mit.edu>
* k5unseal.c (kg_unseal): Clean up lint warnings.
* accept_sec_context.c (krb5_gss_accept_sec_context): Don't return
an error token if we can't provide the server name to the
KRB5 error structure (because cred isn't initialized).
* gssapi_krb5.c, gssapi_krb5.h: Export the oid of static
arrays as krb5_gss_oid_array since it's needed by
gss_import_sec_context.
* import_sec_context.c: Fix up the OID of the mechanism in the
imported security context so that we use the static
OID if at all possible. This is needed since
gss_inquire_context() must return a static OID.
Sun May 24 21:57:03 1998 Theodore Y. Ts'o <tytso@mit.edu>
* import_name.c (krb5_gss_import_name): Fix typo which caused
import_name to incorrectly import names produced by
gss_export_name().
1998-05-24 Theodore Ts'o <tytso@rsts-11.mit.edu>
* copy_ccache.c (gss_krb5_copy_ccache): Fix bugs in copy_ccache.c,
which never compiled cleanly (since it wasn't added to the
Makefile correctly originally).
* k5seal.c (make_seal_token): Clean up -Wall flames
1998-05-18 Theodore Ts'o <tytso@rsts-11.mit.edu>
* inq_cred.c (krb5_gss_inquire_cred):
* inq_context.c (krb5_gss_inquire_context):
* import_name.c (krb5_gss_import_name):
* export_name.c (krb5_gss_export_name):
* disp_name.c (krb5_gss_display_name):
* context_time.c (krb5_gss_context_time):
* acquire_cred.c (krb5_gss_acquire_cred): Clean up -Wall flames.
* indicate_mechs.c (krb5_gss_indicate_mechs): Return a dynamic OID
set.
Fri Feb 27 18:41:08 1998 Theodore Y. Ts'o <tytso@mit.edu>
* export_name.c (krb5_gss_export_name): Fix bug in
gss_export_name. The 2nd length field in the ASN.1 was 2
bytes bigger than it should have been.
Wed Feb 18 16:12:14 1998 Tom Yu <tlyu@mit.edu>
* Makefile.in: Remove trailing slash from thisconfigdir. Fix up
BUILDTOP for new conventions.
Fri Feb 13 13:23:18 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Don't
restrict mechanisms when accepting contexts. (Allow
either pre-RFC or RFC-based mechanisms)
Thu Feb 12 16:38:14 1998 Tom Yu <tlyu@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Add lots of
explicit assignments to major_status to ensure that we actually
return an error when we mean to. This was previously preventing
gssrpc authentication with the old ovsec_kadm interface from
working because the gssrpc server side functions were failing to
loop over a set of supplied credentials.
* init_sec_context.c: KLUDGE!! Add global variable
krb5_gss_dbg_client_expcreds to allow the client library to send
expired credentials for testing and debugging purposes.
Mon Feb 2 17:02:29 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
* Makefile.in: Define BUILDTOP and thisconfigdir in the Makefile
Wed Jan 28 16:57:05 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
* configure.in, Makefile.in: Remove use of CopySrcHeader from
configure.in and move functionality to Makefile.in
Thu Feb 5 22:39:44 1998 Theodore Y. Ts'o <tytso@mit.edu>
* wrap_size_limit.c (krb5_gss_wrap_size_limit): Fix bug where if
the output header size is greater than the maximum
requested output size, return 0 rather than a very large
unsigned number. :-)
Fri Jan 30 23:07:40 1998 Tom Yu <tlyu@mit.edu>
* init_sec_context.c (krb5_gss_init_sec_context): Actually
initialize now before calling make_ap_req.
Thu Jan 29 20:08:02 1998 Dan Winship <danw@mit.edu>
* accept_sec_context.c (rd_and_store_for_creds): Don't mess with
krb5_cc_default--use a new mem-based ccache.
* Makefile.in:
* gssapi_krb5.h:
* copy_ccache.c (gss_krb5_copy_ccache): Routine to copy a
gss_cred_id_t (such as a forwarded creds) into an existing
krb5_ccache.
Fri Jun 27 08:37:11 1997 Theodore Ts'o <tytso@rsts-11.mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Will now
obtain default credentials if no credentials are given.
Wed Dec 3 02:16:18 1997 Theodore Y. Ts'o <tytso@mit.edu>
* init_sec_context.c (make_ap_req): Enforce a stricter requirement
on the ticket expiration time of the credentials, since
accept_sec_context doesn't use the timeskew fudge for
checking ticket expirations.
(krb5_gss_init_sec_context): Return GSS_S_NO_CRED when
appropriate.
Wed Jan 21 19:14:09 1998 Tom Yu <tlyu@mit.edu>
* gssapiP_krb5.h: Add rcache member to the creds
structure. [krb5-libs/370]
* accept_sec_context.c (krb5_gss_accept_sec_context): Actually set
an rcache in auth context from the one saved in the creds
structure. [krb5-libs/370]
* acquire_cred.c (acquire_accept_cred): Set up an rcache for use
later. [krb5-libs/370]
* delete_sec_context.c (krb5_gss_delete_sec_context): Don't delete
the rcache when freeing the auth_context. [krb5-libs/370]
* rel_cred.c (krb5_gss_release_cred): Properly close the
rcache. [krb5-libs/370]
Mon Dec 29 10:30:43 1997 Ezra Peisach <epeisach@kangaroo.mit.edu>
* Makefile.in (OBJS): Changed val_cred.$(OBJECT) to
val_cred.$(OBJEXT) for windows building.
Sun Dec 7 10:42:32 1997 Ezra Peisach <epeisach@mit.edu>
* val_cred.c (krb5_gss_validate_cred): Free principal extracted
from credential cache when finished.
Sat Nov 15 20:14:05 1997 Theodore Y. Ts'o <tytso@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context),
init_sec_context.c (krb5_gss_init_sec_context),
inq_cred.c (krb5_gss_inquire_cred): Call krb5_gss_validate_cred
to make sure the credential handle is still valid.
* val_cred.c (krb5_gss_validate_cred): New file which validates
the credential to make sure it is valid, including
checking to make sure the credentials cache still points
at the same krb5 principal as it did before.
* accept_sec_context.c (krb5_gss_accept_sec_context): Return
GSS_S_FAILURE if a non-NULL context handle is passed to
it.
Thu Sep 18 17:55:09 1997 Tom Yu <tlyu@mit.edu>
* acquire_cred.c: Replace USE_STRING_H with something more sane.
* import_name.c: Replace USE_STRING_H with something more sane.
Tue Jul 29 22:56:04 1997 Theodore Y. Ts'o <tytso@mit.edu>
* inq_names.c (krb5_gss_inquire_names_for_mech): Add the
the new OID value for the host-based service name and
the exported name OID to the list of OID's supported by
this mechanism.
* import_name.c (krb5_gss_import_name): Add support for the new
OID value for the host-based service name.
Mon Jul 21 20:32:14 1997 Ezra Peisach <epeisach@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Initialize
ctx before referenced in failure cases.
Tue Jul 15 22:05:21 1997 Theodore Y. Ts'o <tytso@mit.edu>
* init_sec_context.c (krb5_gss_init_sec_context): Always copy the
mechtype so that delete_sec_context() can safely release
the OID without smashing memory passed in by the application.
Mon Jun 30 14:05:51 1997 Kevin L Mitchell <klmitch@mit.edu>
* accept_sec_context.c: added code to return a valid delegated
credential handle if credentials were delegated. The
GSS_C_DELEG_FLAG from the client is ignored, and the
option is only set if the client actually delegated
credentials.
Fri Jun 6 15:26:27 1997 Theodore Y. Ts'o <tytso@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): Reorganized
error handling code to be more compact (and correct!). If
an error occurs while we are doing mutual authentication,
send an KRB_ERROR message back to the client, so that it
knows what is going on. (This is specified by RFC 1964;
we just weren't implementing this previously.)
* delete_sec_context.c (krb5_gss_delete_sec_context): Check to
make sure pointers in the context are non-zero before
freeing them.
* init_sec_context.c (krb5_gss_init_sec_context): If the server
sends a KRB_ERROR message, decode it and return an
appropriate minor status error code.
Mon Mar 31 21:22:19 1997 Theodore Y. Ts'o <tytso@mit.edu>
* krb5_gss_glue.c: Add GSSAPI V2 calls to the glue layer.
Fri Mar 28 03:52:14 1997 Theodore Y. Ts'o <tytso@mit.edu>
* import_name.c (krb5_gss_import_name): Add support for importing
the exported name call
* export_name.c (krb5_gss_export_name): Fix export_name emit the token
exactly as specified by RFC 2078.
Thu Mar 27 15:52:04 1997 Theodore Ts'o <tytso@rsts-11.mit.edu>
* Makefile.in: Add canon_name.c, duplicate_name.c, export_name.c
to the GSSAPI library.
* canon_name.c (krb5_gss_canonicalize_name): New GSSAPI V2 function
* duplicate_name.c (krb5_gss_duplicate_name): New GSSAPI V2 function
* export_name.c (krb5_gss_export_name): New GSSAPI V2 function
* gssapiP_krb5.h (KG_IMPLFLAGS): Add support for
GSS_C_PROT_STATE_READY and GSS_C_TRANS_FLAG
Tue Mar 25 01:00:55 1997 Theodore Y. Ts'o <tytso@mit.edu>
* init_sec_context.c (krb5_gss_init_sec_context): A zero-length
token should be treated like a GSS_C_NO_BUFFER during the
initial context establishment. [krb5-libs/352]
Sat Feb 22 18:59:42 1997 Richard Basch <basch@lehman.com>
* Makefile.in: Use some of the new library list build rules in
win-post.in
Wed Feb 5 20:27:50 1997 Richard Basch <basch@lehman.com>
* util_crypt.c: Include k5-int.h as we need to dereference
the _cryptosystem_entry element of the krb5_encrypt_block.
* acquire_cred.c (acquire_accept_cred): Removed unused local variable
Tue Feb 4 15:56:01 1997 Richard Basch <basch@lehman.com>
* Makefile.in: Only override the object build of the error table
under Unix
Tue Jan 14 20:20:10 1997 Tom Yu <tlyu@mit.edu>
* Makefile.in:
* configure.in: Update to new library build procedure.
Wed Dec 4 13:06:13 1996 Barry Jaspan <bjaspan@mit.edu>
* acquire_cred.c (acquire_accept_cred): use krb5_kt_get_entry
instead of scanning through keytab to find matching principal
[krb5-libs/210]
Thu Nov 21 11:55:16 EST 1996 Richard Basch <basch@lehman.com>
* Makefile.in: win32 build
* gssapiP_krb5.h krb5_gss_glue.c:
DLL export all public GSSAPI interfaces; adjusted some other
declarations accordingly (KRB5_CALLCONV, FAR keywords added)
Wed Nov 20 19:55:29 1996 Marc Horowitz <marc@cygnus.com>
* init_sec_context.c (make_ap_rep, krb5_gss_init_sec_context),
accept_sec_context.c (krb5_gss_accept_sec_context): fix up use of
gss flags. under some circumstances, the context would not have
checked for replay or sequencing, even if those features were
requested.
* init_sec_context.c (make_ap_req), (krb5_gss_init_sec_context):
If delegation is requested, but forwarding the credentials fails,
instead of aborting the context setup, just don't forward
credentials.
* gssapiP_krb5.h (krb5_gss_ctx_id_t), ser_sctx.c
(kg_ctx_externalize, kg_ctx_internalize), init_sec_context.c
(krb5_gss_init_sec_context), get_tkt_flags.c
(gss_krb5_get_tkt_flags), accept_sec_context.c
(krb5_gss_accept_sec_context): rename ctx->flags to
ctx->krb_flags, to disambiguate it from ctx->gss_flags
* accept_sec_context.c (krb5_gss_accept_sec_context): If the subkey
isn't present in the authenticator, then use the session key
instead.
Sat Oct 19 00:38:22 1996 Theodore Y. Ts'o <tytso@mit.edu>
* ser_sctx.c (kg_oid_externalize, kg_oid_internalize,
kg_oid_size): Add a GSSAPI OID magic number to the
externalized OID, so that if the OID is skipped, (it is
optional), the serialization code can resyncronize if
necessary.
(kg_queue_internalize, kg_queue_externalize,
kg_queue_size): New functions to externalize the gssapi
queue.
(kg_ctx_size, kg_ctx_exteranlize, kg_ctx_import): Changed
to include the mech_used field and to include the auth
context.
* gssapi_krb5.c (kg_get_context): Add calls to correctly
initialize the serializers needed by import and export sec
context.
* delete_sec_context.c (krb5_gss_delete_sec_context): Remember to
release the mech_used OID if necessary!
Wed Oct 16 17:53:17 1996 Marc Horowitz <marc@mit.edu>
* accept_sec_context.c (krb5_gss_accept_sec_context): return an
error if the ticket endtime is in the past. also, cleaned up
some error cleanup code.
Thu Oct 10 13:50:49 1996 Theodore Y. Ts'o <tytso@mit.edu>
* acquire_cred.c (krb5_gss_acquire_cred): Don't let the "timeleft"
returned by krb5_gss_acquire_cred be negative!
Wed Oct 9 18:02:43 1996 Theodore Y. Ts'o <tytso@mit.edu>
* gssapi_krb5.c: Definition of gss_nt_krb5_name was incorrect;
someone was being a bonehead.
Wed Aug 28 17:45:55 1996 Theodore Ts'o <tytso@rsts-11.mit.edu>
* util_cksum.c (kg_checksum_channel_bindings): Fix stupid bug;
don't free buf before it's allocated!
Thu Aug 15 20:52:37 1996 Sam Hartman <hartmans@tertius.mit.edu>
* init_sec_context.c (make_ap_req): Require des-cbc-crc for now;
DES3 support is broken.
Fri Aug 2 13:40:16 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
* acquire_cred.c (krb5_gss_acquire_cred): Add const to local
variable which is pointing to const data.
Fri Jul 26 16:58:31 1996 Tom Yu <tlyu@voltage-multiplier.mit.edu>
* Makefile.in (OBJS): Remove trailing backslash on a comment; it
was keeping HDRS from getting set.
Fri Jul 26 00:40:43 1996 Theodore Y. Ts'o <tytso@mit.edu>
* configure.in: Add AC_PROG_INSTALL, since it's needed for a "make
install"
Thu Jul 25 20:21:33 1996 Tom Yu <tlyu@voltage-multiplier.mit.edu>
* Makefile.in: remove trailing backslash from comment under SRCS
because it was causing line that set OBJS variable to
become part of a comment
Thu Jul 25 02:08:17 1996 Theodore Y. Ts'o <tytso@mit.edu>
* init_sec_context.c (krb5_gss_init_sec_context): Fixed error
checking so that if you pass a bad mechanism type, it
*will* get flagged as an error.
Wed Jul 24 22:54:37 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
* acquire_cred.c (krb5_gss_acquire_cred): Initialize variable
before use if GSS_C_NULL_OID_SET.
Wed Jul 24 19:40:55 1996 Theodore Y. Ts'o <tytso@mit.edu>
* rel_oid.c (krb5_gss_release_oid):
* krb5_gss_glue.c(gss_release_oid): Re-enable function
* ser_sctx.c (kg_oid_externalize): Add proper return code
* accept_sec_context.c (krb5_gss_accept_sec_context):
* init_sec_context.c (krb5_gss_init_sec_context): Test (gss_flags &
XXXX) against 0 so that we pass a int value to
g_order_init. Needed since int is 16 bits for Win16 build.
Tue Jul 23 22:35:53 1996 Theodore Y. Ts'o <tytso@mit.edu>
* Makefile.in (all-windows): Fix broken Windows commands to copy
gssapi_krb5.h to include/gssapi.
* gssapiP_krb5.h: Must include k5-int.h on Windows and Macintosh
builds.
Thu Jul 18 19:48:48 1996 Marc Horowitz <marc@mit.edu>
* init_sec_context.c (krb5_gss_init_sec_context),
accept_sec_context.c (krb5_gss_accept_sec_context): ifdef'd out
reference to 3des.
Fri Jul 5 15:27:29 1996 Marc Horowitz <marc@mit.edu>
* gssapi_krb5.h: Add declarations for _old mech set, and _both
mech set
Thu Jun 20 23:15:57 1996 Marc Horowitz <marc@mit.edu>
* ser_sctx.c (kg_oid_size, kg_ctx_size): pull the oid-related code
out of kg_ctx_size into kg_oid_size.
* k5unseal.c (kg_unseal), k5seal.c (make_seal_token): == cannot be
used to compare oid's. The g_OID_equal macro must be used.
* init_sec_context.c (make_ap_req, krb5_gss_init_sec_context): -
gss_init_sec_context should use the mech set in the credential.
If the default mech is requested, but the old mech oid was
explicitly passed to gss_acquire_cred, then the context should be
the old mech, otherwise, the new mech. If a mech was requested
explicitly, then the code should insure that the credential is
compatible.
* acquire_cred.c (krb5_gss_acquire_cred), gssapiP_krb5.h (struct
_krb5_gss_cred_it_rec), gssapi_krb5.c (gss_mech_set_krb5*),
inq_cred.c (krb5_gss_inquire_cred): gss_acquire_cred needs to be
able to deal with both mech oid's. It should return in
actual_mechs the intersection of the set passed in and the
{old,new} mechs, or if the default was requested, it should return
both mech oid's. This state should be stored in the credential
handle, and regurgitated by gss_inquire_cred.
* accept_sec_context.c (krb5_gss_accept_sec_context): make sure
that the oid in the token is compatible with the mechanisms
specified by the credential.
Thu Jun 13 22:11:30 1996 Tom Yu <tlyu@voltage-multiplier.mit.edu>
* configure.in: remove ref to ET_RULES
Wed Jun 12 00:48:32 1996 Theodore Ts'o <tytso@rsts-11.mit.edu>
* Makefile.in: Update special rule for gssapi_err_krb5.obj so that
it uses the right Win-32 library command.
* pname_to_uid.c: Add #ifdef _WIN32 in places where we had #ifdef
_MSDOS
Fri Jun 7 14:52:56 1996 Kevin L Mitchell <klmitch@mit.edu>
* accept_sec_context.c, init_sec_context.c, inq_context.c,
gssapiP_krb5.h: changed `mutual' element of struct
_krb5_gss_ctx_id_rec into more general `gss_flags' and
updated functions that process it
Tue May 14 19:09:49 1996 Richard Basch <basch@lehman.com>
* k5seal.c k5unseal.c util_cksum.c:
setup krb5_checksum "contents" and "length" field prior to
calling krb5_calculate_checksum().
Tue May 14 04:42:11 1996 Theodore Y. Ts'o <tytso@mit.edu>
* init_sec_context.c (make_ap_req): Change call to
krb5_auth_con_setcksumtype to use
krb5_auth_con_set_req_cksumtype by default instead.
Sun May 12 00:54:35 1996 Marc Horowitz <marc@mit.edu>
* util_crypt.c (kg_encrypt): It used to be that krb5_encrypt could
be used to encrypt in place. That's broken now. This would need
to be fixed in several places in the crypto layer, and it's not
clear what the right thing is, so it's worked around here in the
interests of portability and reliablility, at the expense of a
malloc/memcpy/free.
* Makefile.in, configure.in: gssapi_krb5.h should be installed
inside the tree. This is really only half the work, as it should
be installed outside of the tree, too.
Sat Apr 20 00:02:51 1996 Marc Horowitz <marc@mit.edu>
* accept_sec_context.c, export_sec_context.c, gssapiP_krb5.h,
import_sec_context.c, init_sec_context.c, k5seal.c, k5unseal.c,
ser_sctx.c, wrap_size_limit.c: Implemented triple-des changes
based on Richard's patches.
Wed Apr 17 21:08:59 1996 Marc Horowitz <marc@mit.edu>
* accept_sec_context.c (krb5_gss_set_backward_mode): removed
* krb5_gss_glue.c, wrap_size_limit.c: added
* import_sec_context.c: intern the newly created context id so
that the validation functions will accept it.
* Makefile.in (CFLAGS): Don't need md5 header files anymore.
(OBJS, SRCS): Change the list of files to build.
* export_sec_context.c, import_sec_context.c, gssapiP_krb5.h,
ser_sctx.c: don't use the serialization abstraction, since it
doesn't add anything, and is internal to kerberos. Instead, make
the {de,}serialization functions internal gssapi functions, and
call those directly.
* accept_sec_context.c, acquire_cred.c, context_time.c,
delete_sec_context.c, disp_name.c, disp_status.c,
export_sec_context.c, gssapi_krb5.c (kg_get_context),
import_name.c, import_sec_context.c, indicate_mechs.c,
init_sec_context.c, inq_context.c, inq_cred.c, inq_names.c,
process_context_token.c, rel_cred.c, rel_name.c, seal.c, sign.c,
unseal.c, verify.c:
Don't pass in the context from the caller. Instead, call
kg_get_context() to find out the kerberos library context. Also,
random minor compile-time fixes.
* accept_sec_context.c, gssapi_krb5.c (kg_get_defcred),
gssapiP_krb5.h, init_sec_context.c, k5seal.c, k5unseal.c,
util_cksum.c (kg_checksum_channel_bindings), util_seqnum.c
(kg_make_seq_num, kg_get_seq_num), util_seed.c (kg_make_seed),
util_crypt.c (kg_encrypt, kg_decrypt):
pass the context to the kg_* functions which need it instead of
determining it directly.
Fri Apr 12 21:47:46 1996 Richard Basch <basch@lehman.com>
* k5seal.c k5unseal.c:
Renamed MD5 routines to be preceded with krb5_
Thu Apr 11 18:53:09 1996 Theodore Y. Ts'o <tytso@dcl>
* acquire_cred.c (acquire_init_cred): Return GSS_S_CRED_UNAVAIL on
if krb5_cc_set_flags() returns an error, since that's the
call that will return an error if the credentials files
doesn't exist.
Wed Apr 3 16:10:24 1996 Theodore Y. Ts'o <tytso@dcl>
* init_sec_context.c (krb5_gss_init_sec_context): If make_ap_req()
returns KRB5APP_TKT_EXPIRED, then return
GSS_S_CREDENTIALS_EXPIRED as the major return code.
Tue Apr 2 15:20:24 1996 Theodore Y. Ts'o <tytso@dcl>
* Makefile.in (SRCS): Inlined list of source files for SRCS and
OBJS (for Macintosh build).
* k5mech.c: Added Macintosh #ifdef so that the #include path is
right for the Macintosh.
Wed Mar 20 20:25:53 1996 Theodore Y. Ts'o <tytso@dcl>
* rel_oid.c (krb5_gss_release_oid): Don't compile this procedure,
since it's not used. The mechanism glue layer uses the
krb5_gss_internal_relase_oid() function.
* pname_to_uid.c: Comment out #ident line. This causes the
Macintosh C compiler indigestion. Remove #include of
gssapi/gssapi.h, since that gets included by
gssapiP_generic.h.
Fri Mar 8 21:36:29 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
* util_cksum.c (kg_checksum_channel_bindings): Change sizeof(long)
to sizeof(krb5_int32).
Sat Mar 2 02:22:30 1996 Theodore Y. Ts'o <tytso@dcl>
* k5mech.c (krb5_gss_get_context): Initialize the serializers
here, instead of in export and import security context.
This will speed things up a little.
* export_sec_context.c (krb5_gss_export_sec_context):
* import_sec_context.c (krb5_gss_import_sec_context): Don't create
a serialization context just for importing/exporting
credentials. Use the passed-in gssapi context. This
speeds things up significantly. Assume the serializers
are initialized in krb5_gss_get_context.
Tue Feb 27 17:53:22 1996 Theodore Y. Ts'o <tytso@dcl>
* accept_sec_context.c (krb5_gss_accept_sec_context): Remove dead
code which used geteuid().
* Makefile.in (gssapi_err_krb5.$(OBJEXT)): Add Windows production
to add file to library.
* pname_to_uid.c: Don't try to compile pname_to_uid.c for MS-DOS
or Macintosh.
Mon Feb 26 18:08:57 1996 Sam Hartman <hartmans@tertius.mit.edu>
* k5mech.c : do not declare kg_context static as it is declared in
another file, and declared extern in a header.
Sat Feb 24 00:06:37 1996 Theodore Y. Ts'o <tytso@dcl>
* k5mech.c (krb5_gss_initialize): No longer need to call
name-type/mechanism registration function. This is now
done for us by the generic intialization function.
Add support for new V2 call gss_wrap_size_limit.
Sat Feb 24 11:45:05 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
* import_sec_context.c (krb5_gss_import_sec_context): Do not
shadow parameter ctx.
* inq_context.c (krb5_gss_inquire_context): Do not shadow
parameter ctx.
* rel_oid.c (krb5_gss_internal_release_oid): Change to match prototype.
* process_context_token.c (krb5_gss_process_context_token): Change
to match prototype.
Sat Feb 24 00:06:37 1996 Theodore Y. Ts'o <tytso@dcl>
* gssapiP_krb5.h: Changed most krb5 gssapi functions to take a
void * as their first argument, instead of a krb5_context.
Makes for a cleaner interface to the mechanism glue layer.
* k5mech.c (krb5_gss_initialize): Call name-type/mechanism
registration function so that mechanism glue layer knows
whether or not a name needs to be lazy evaluated or not.
Tue Feb 6 23:55:45 1996 Theodore Y. Ts'o <tytso@dcl>
* pname_to_uid.c (krb5_pname_to_uid): Instead of using specialized
code to derive the username from a kerberos principal, use
krb5_aname_to_lname(). Added extra argument for the
context structure.
Fri Jan 26 03:09:32 1996 Sam Hartman <hartmans@tertius.mit.edu>
* init_sec_context.c (make_ap_req): Make sure we get a DES session key.
Wed Jan 24 20:46:37 1996 Tom Yu <tlyu@dragons-lair.MIT.EDU>
* pname_to_uid.c (krb5_pname_to_uid): Changed def'n of
krb5principalname to static so K&R compilers won't lose on
automatic aggregate initialization.
Wed Jan 24 13:21:37 1996 Theodore Y. Ts'o <tytso@dcl>
* import_name.c (krb5_gss_import_name): Don't assume that the
input_name_buffer is null terminated, when it contains a
string. Fix gcc warnings.
Tue Jan 23 13:01:42 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
* configure.in: Check for stdlib.h
* pname_to_uid.c: Include string.h and stdlib.h.
* init_sec_context.c (make_ap_req): Handle gcc warning.
Tue Jan 23 04:05:23 1996 <tytso@rsts-11.mit.edu>
* Makefile.in: Add support for building GSSAPI as a shared
library.
Tue Jan 23 03:25:02 1996 Theodore Y. Ts'o <tytso@dcl>
* rel_oid.c (krb5_gss_internal_release_oid): Add the new interface
for the mechglue layer.
* inq_cred.c (krb5_gss_inquire_cred): Call gss_release_oid_set()
instead of generic_gss_release_oid_set().
* gssapiP_krb5.h: Added prototype for krb5_gss_internal_release_oid
* Makefile.in (CCSRCS): Removed the file krb5_gss_glue.c and added
the file k5mech.c and pname_to_uid.c
Tue Jan 9 22:11:25 1996 Theodore Y. Ts'o <tytso@dcl>
* gssapiP_krb5.h (KRB5_GSS_FOR_CREDS_OPTION): New constant added
for delegation (forwarding) of credentials.
* init_sec_context.c (make_ap_req): Add support for sending
delegated credentials. Misc lint cleanups.
* accept_sec_context.c (krb5_gss_accept_sec_context): Add support
for accepting delegated credentials. Misc lint cleanups.
Fri Dec 1 17:27:33 1995 <tytso@rsts-11.mit.edu>
* configure.in: Add rule for building shared object files.
Fri Dec 1 17:11:43 1995 Theodore Y. Ts'o <tytso@dcl>
* gssapiP_krb5.h (KG_TOK_WRAP_MSG): Changed token ID for
KG_TOK_WRAP_MSG to match KG_TOK_SEAL_MSG both should be
0x0201.
* krb5_gss_glue.c (gss_inquire_names_for_mech): Added new context
argument to the call of krb5_gss_inquire_names_for_mech().
* inq_names.c (krb5_gss_inquire_names_for_mech): Added new context
argument to the arg list.
Thu Nov 16 17:04:00 1995 <tytso@rsts-11.mit.edu>
* gssapiP_krb5.h (KG_TOK_MIC_MSG, KG_TOK_WRAP_MSG, KG_DEL_CTX):
Fixed token type numbers so they conform with the protocol
spec. Paul Park didn't realize that he wasn't allowed to
change these willy-nilly...
Wed Oct 25 15:38:00 1995 Theodore Y. Ts'o <tytso@dcl>
* init_sec_context.c (make_ap_req): Change the input type of
do_mutual to be OM_int32 instead of an int, to prevent
lossage under windows, since the passed in type size is a
OM_int32.
Fri Oct 6 22:02:24 1995 Theodore Y. Ts'o <tytso@dcl>
* Makefile.in: Remove ##DOS!include of config/windows.in.
config/windows.in is now included by wconfig.
Mon Sep 25 16:52:49 1995 Theodore Y. Ts'o <tytso@dcl>
* Makefile.in: Removed "foo:: foo-$(WHAT)" lines from the
Makefile.
Sun Sep 24 10:39:13 1995 John Rivlin (jrivlin@fusion.com)
* gssapiP_krb5.h: Fixed kb_seal_size prototype
Wed Sep 13 10:39:13 1995 Keith Vetter (keithv@fusion.com)
* acquire_.c: changed int to size_t.
* gssapip_.h: added prototype for kg_seal_size.
* k5seal.c: 16/32 bit mismatch and removed unused variables.
* seal.c: 16/32 bit mismatch.
* sign.c: 16/32 bit mismatch.
* ser_sctx.c: added prototypes for all functions since they get
assigned into a structure that has been prototyped.
Sat Sep 16 03:18:02 1995 Theodore Y. Ts'o <tytso@dcl>
* gssapiP_krb5.h: Remove context and cred from the gssapi security
context, as they aren't needed. kg_seal and kg_unseal now
take a krb5_context argument.
* ser_sctx.c (kg_ctx_size, kg_ctx_externalize,
kg_ctx_internalize): No longer serialize the context and
cred fields of the gssapi security context.
* krb5_gss_glue.c: Don't rely on the context field of the gssapi
security context. Use kg_context instead.
* verify.c (krb5_gss_verify, krb5_gss_verify_mic):
* unseal.c (krb5_gss_unwrap, krb5_gss_unseal):
* sign.c (krb5_gss_sign, krb5_gss_get_mic):
* seal.c (krb5_gss_seal, krb5_gss_wrap):
* process_context_token.c (krb5_gss_process_context_token):
* k5unseal.c (kg_unseal):
* k5seal.c (kg_seal_size): Add a krb5_context argument to this
function, so we don't have to depend on the context field
in the gssapi security context.
* init_sec_context.c (krb5_gss_init_sec_context): Don't initialize
the context and cred fields in the gssapi security
context. Copy ctx->subkey to ctx->seq.key, so they are
separately allocated.
* gssapi_krb5.c (kg_get_context): When initialize kg_context, call
krb5_init_ets() so that the error tables are initialized.
* export_sec_context.c (krb5_gss_export_sec_context): Don't depend
on the context field from the gssapi security context.
Free ctx->seq.key.
* delete_sec_context.c (krb5_gss_delete_sec_context): kg_seal()
now takes a krb5_context argument. Free ctx->seq.key.
* acquire_cred.c (krb5_gss_acquire_cred): Clear the gssapi
credential before setting it, to prevent purify from
complaining.
* accept_sec_context.c (krb5_gss_accept_sec_context): Remove
context and cred from the gssapi security context. Make
sure the ticket is freed after we're done with it.
Fri Sep 15 22:12:49 1995 Theodore Y. Ts'o <tytso@dcl>
* import_sec_context.c (krb5_gss_import_sec_context): Don't bash
the input interprocess_token. Otherwise, it can't be
freed. Don't depend on the context field in the gss
security context.
Tue Sep 12 19:07:52 1995 Theodore Y. Ts'o <tytso@dcl>
* export_sec_context.c (krb5_gss_export_sec_context): Free the
auth context when freeing the GSSAPI context structure.
* delete_sec_context.c (krb5_gss_delete_sec_context): Free the
auth context when freeing the GSSAPI context structure.
Tue Sep 12 13:05:51 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
* k5seal.c, k5unseal.c, accept_sec_context.c: Undo MACINTOSH
change for paths. The old ones were correct.
Wed Sep 6 12:00:00 1995 James Mattly <mattly@fusion.com>
* gssapi_krb5.h: changed a path bearing include for MACINTOSH
* accept_sec_context.c: changed a path bearing include for MACINTOSH
* k5seal.c: changed a path bearing include for MACINTOSH
* k5unseal.c: changed a path bearing include for MACINTOSH
Sat Sep 9 00:16:34 1995 Theodore Y. Ts'o <tytso@dcl>
* krb5_gss_glue.c (gss_delete_sec_context): Add extra indirection
so that we actually fetch the context correctly.
(gss_accept_sec_context): Remove unused code.
Wed Sep 6 16:12:28 1995 Theodore Y. Ts'o <tytso@dcl>
* init_sec_context.c (make_ap_req): Initialize mk_req_flags to
zero so that when we OR in flags, the result is
well-defined.
Wed Sep 06 14:20:57 1995 Chris Provenzano (proven@mit.edu)
* accept_sec_context.c, init_sec_context.c, util.c :
s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
Tue Sep 05 22:10:34 1995 Chris Provenzano (proven@mit.edu)
* accept_sec_context.c, init_sec_context.c, util_seed.c :
Remove krb5_enctype references, and replace with
krb5_keytype where appropriate.
Thu Aug 31 11:50:34 EDT 1995 Paul Park (pjpark@mit.edu)
* gssapiP_krb5.h - Add new V2 dispatch prototypes. Update arguments
to be compatible with V2 API. Add tokens for V2 integrity
and confidentiality services.
* k5seal.c - Add support for V2 tokens and add kg_seal_size() to
support gss_wrap_size_limit().
* k5unseal.c - Add support for V2 tokens.
* accept_sec_context,disp_status,gssapi_krb5,init_sec_context,
inq_context,rel_name.c - Update arguments to V2.
* acquire_cred,import_name,inq_cred,krb5_gss_glue,seal,sign,unseal,
verify.c - Update arguments to V2 and add new V2 functions.
* rel_oid.c, inq_names.c - New V2 modules.
* Makefile.in, .Sanitize - Add rel_oid.c and inq_names.c
Tue Aug 29 22:38:54 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
* init_sec_context.c (krb5_gss_init_sec_context): Remove
duplicated cleanup code.
Tue Aug 29 17:48:40 EDT 1995 Paul Park (pjpark@mit.edu)
* {accept,init}_sec_context.c - Zero out the newly allocated context
because garbage in the uninitialized context messes up the
serializers.
Tue Aug 29 13:31:46 EDT 1995 Paul Park (pjpark@mit.edu)
* Makefile.in, .Sanitize, {im,ex}port_sec_context.c, ser_sctx.c - Add
new modules to support {im,ex}port of GSSAPI context.
* krb5_gss_glue.c - Add krb5_gss_{im,ex}port_sec_context() wrapper
routines.
* gssapiP_krb5.h - Add prototypes for krb5_gss_{im,ex}port_sec_context
and kg_ser_context_init.
* gssapi_err_krb5.et - Add magic numbers for GSSAPI data structures.
Mon Aug 7 19:08:52 1995 Theodore Y. Ts'o <tytso@dcl>
* inq_cred.c (krb5_gss_inquire_cred): Use
generic_gss_release_oid_set() instead of gss_release_oid_set()
so that the krb5-specific mechanism can be linked in
without pulling in krb5_gss_glue.c
Thu Jul 27 15:26:27 EDT 1995 Paul Park (pjpark@mit.edu)
* Makefile.in - Add -I$(srcdir)/../../crypto/md5 to get rsa-md5.h.
* accept_sec_context.c - Include "rsa-md5.h" instead of <krb5/...>.
* gssapiP_krb5.h - Replace k5-specific includes with k5-int.h
* k5[un]seal.c - Include "rsa-md5.h" instead of <krb5/...>.
Fri Jul 7 16:23:17 EDT 1995 Paul Park (pjpark@mit.edu)
* Makefile.in - Remove LDFLAGS, it's set by configure.
Sat Jun 10 23:04:52 1995 Tom Yu (tlyu@dragons-lair)
* accept_sec_context.c, gssapiP_krb5.h, init_sec_context.c:
krb5_auth_context redefinitions
Fri Jun 9 19:25:55 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
are now handled by CONFIG_RULES.
Wed Jun 7 10:05:16 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
* gssapiP_krb5.h: Include time.h (or sys/time.h) for struct tm
structure which is now in the los-proto.h file.
Mon May 22 10:10:41 EDT 1995 Paul Park (pjpark@mit.edu)
* Makefile.in - Add null install target.
* inq_cred.c - Don't mark credentials as expired if the expiration
time is indefinite.
Mon May 01 15:56:32 1995 Chris Provenzano (proven@mit.edu)
* init_sec_context.c (krb5_gss_init_sec_context()) :
The krb5_mk_rep() routine must always encode the data in
the keyblock of the ticket, not the subkey.
Thu Apr 13 15:49:16 1995 Keith Vetter (keithv@fusion.com)
* *.[ch]: removed unneeded INTERFACE from non-api functions.
* *.h added FAR to pointers visible at to the world.
* gssapi_e.c: __STDC__ conditional also checks the _WINDOWS define.
Thu Mar 30 16:00:30 1995 Keith Vetter (keithv@fusion.com)
* accept_sec_context.c: fixed wrong level of indirection on a
parameter to getauthenticator.
Mon Mar 27 07:56:26 1995 Chris Provenzano (proven@mit.edu)
* accept_sec_context.c: Use new calling convention for krb5_rd_req()
and krb5_mk_rep().
Thu Mar 16 19:54:33 1995 Keith Vetter (keithv@fusion.com)
* init_sec_context.c: fixed signed/unsigned mismatch and
added a prototype which will later be removed.
* import_name.c: fixed for the PC--made conditional the
code dependent upon passwords.
* Makefile.in: changed the name of the library the PC
builds, and added xxx-mac targets to mimic xxx-unix.
Fri Mar 10 09:44:29 1995 Chris Provenzano (proven@mit.edu)
* init_sec_context.c (krb5_gss_init_sec_context())
Use new calling convention for krb5_mk_req_ext() and
krb5_rd_rep().
* gssapiP_krb5.h Added a krb5_auth_context pointer to the
krb5_gss_ctx_id_rec structure to store the auth_context
between multiple calls to krb5_gss_init_sec_context().
Tue Mar 7 20:48:03 1995 Keith Vetter (keithv@fusion.com)
* accept_s.c, acqire_s.c, compare_.c, context_.c, delete_s.c,
disp_nam.c, disp_sta.c, get_tkt_.c, init_sec.c, inq_cont.c,
inq_cred.c, k5seal.c, k5unseal.c, process_.c, rel_cred.c,
rel_name.c, util_cks.c, util_cry.c: added casts on signed ->
unsigned assignments.
* util_seq.c: added casts on bit extraction code.
* gssapip_.h: pulls in los-proto.h for prototypes.
Tue Feb 28 00:27:44 1995 John Gilmore (gnu at toad.com)
* gssapi_krb5.h, gssapiP_krb5.h: Avoid <krb5/...> includes.
* disp_status.c: Avoid <com_err.h>, use "com_err.h".
Mon Feb 20 19:53:9 1995 Keith Vetter (keithv@fusion.com)
* accept_s.c: needed temp to avoid sign/unsigned mismatch on the PC.
* init_sec.c: needed temp to avoid sign/unsigned mismatch on the PC.
* gssapiP_krb5.h k5seal.c, k5unseal.c: removed netinet/in.h include.
* util_seq.c: changed int to 32bit int
* gssapiP_krb5.h, gssapi_krb5.h, *.c: added windows INTERFACE keyword
Mon Feb 20 12:00:00 1995 keith Vetter (keithv@fusion.com)
Rename files for DOS 8.3 uniqueness--files created by Make
* gssapi_krb5_err.et => gssapi_err_krb5.et
=> gssapi_err_krb5.h
=> gssapi_err_krb5.c
* gssapiP_krb5.h changed to match
* Makefile.in changed to match
Tue Feb 14 15:01:36 1995 Chris Provenzano (proven@mit.edu)
* init_sec_context.c (make_ap_req()) Use new API for
krb5_mk_req_extended() and cleanup internal processing.
Fri Feb 3 00:34:55 1995 John Gilmore <gnu@cygnus.com>
Rename files for DOS 8.3 uniqueness:
* display_name.c => disp_name.c
* display_status.c => disp_status.c
* inquire_context.c => inq_context.c
* inquire_cred.c => inq_cred.c
* release_cred.c => rel_cred.c
* release_name.c => rel_name.c
* Makefile.in changed to match.
Fri Jan 27 14:41:12 1995 Chris Provenzano (proven@mit.edu)
* accept_sec_context.c (rd_req_keyproc() added krb5_keytype arg.
Wed Jan 25 16:54:40 1995 Chris Provenzano (proven@mit.edu)
* Removed all narrow types and references to wide.h and narrow.h
Sun Jan 22 18:26:32 1995 John Gilmore (gnu at toad.com)
* acquire_cred.c (acquire_accept_cred): Add context arg when
calling krb5_sname_to_principal.
Fri Jan 13 15:23:47 1995 Chris Provenzano (proven@mit.edu)
* Added krb5_context to all krb5_routines
Mon Jan 9 19:27:55 1995 Theodore Y. Ts'o (tytso@dcl)
* display_name.c (krb5_gss_display_name): gss_display_name()
should return a name type OID, not a mechanism OID.
Tue Oct 4 16:40:45 1994 Theodore Y. Ts'o (tytso@dcl)
* accept_security_context.c (rd_req_keyproc): Add widen.h and
narrow.h to widen argument types of keyproc.
Tue Sep 27 23:30:14 1994 Theodore Y. Ts'o (tytso@dcl)
* accept_security_context.c (krb5_gss_accept_sec_context):
krb5_rc_dfl_close now frees the rcache structure, so
this routine shouldn't.
Wed Aug 17 15:47:26 1994 Theodore Y. Ts'o (tytso at tsx-11)
* gssapi_krb5.c: Fixed OID for the krb5 mechanism. (Transcription
error.)
|