summaryrefslogtreecommitdiffstats
path: root/source/libsmb/clikrb5.c
Commit message (Collapse)AuthorAgeFilesLines
* Use new IDL based PAC structures in clikrb5.cGünther Deschner2008-02-171-7/+7
| | | | Guenther
* Make heimdal and MIT happy when iterating through auth data.Günther Deschner2007-12-121-3/+3
| | | | Guenther
* Vista SP1-rc1 appears to break against Samba-3.0.27aGuenther Deschner2007-12-121-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi Jason, Jason Haar wrote: > Patched 3.0.28, compiled, installed and here's the log file. > > Hope it helps. BTW I don't think it matters, but this is on 32bit > CentOS4.5 systems. yes, it helps. Thanks for that. Very interesting, there are two auth data structures where the first one is a PAC and the second something unknown (yet). Can you please try the attached fix ? It should make it work again. Guenther - -- Günther Deschner GPG-ID: 8EE11688 Red Hat gdeschner@redhat.com Samba Team gd@samba.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iD8DBQFHX9ZESOk3aI7hFogRAivSAJ9bMcD+PcsIzjYYLtAUoLNfVVEl1QCfV/Qd MPsZW4G31VOVu64SPjgnJiI= =Co+H -----END PGP SIGNATURE-----
* Remove next_token - all uses must now be next_token_talloc.Jeremy Allison2007-12-071-9/+8
| | | | | No more temptations to use static length strings. Jeremy.
* Fix the setup_kaddr() call to cope with IPv6.Jeremy Allison2007-10-291-8/+34
| | | | | | | This is the last obvious change I can see. At this point we can start claiming IPv6 support (Hurrah !:-). Jeremy.
* This is a large patch (sorry). Migrate from struct in_addrJeremy Allison2007-10-241-2/+2
| | | | | | | | | | | | | to struct sockaddr_storage in most places that matter (ie. not the nmbd and NetBIOS lookups). This passes make test on an IPv4 box, but I'll have to do more work/testing on IPv6 enabled boxes. This should now give us a framework for testing and finishing the IPv6 migration. It's at the state where someone with a working IPv6 setup should (theorecically) be able to type : smbclient //ipv6-address/share and have it work. Jeremy.
* RIP BOOL. Convert BOOL -> bool. I found a few interestingJeremy Allison2007-10-181-14/+14
| | | | | | | bugs in various places whilst doing this (places that assumed BOOL == int). I also need to fix the Samba4 pidl generation (next checkin). Jeremy.
* r23784: use the GPLv3 boilerplate as recommended by the FSF and the license textAndrew Tridgell2007-10-101-2/+1
|
* r23779: Change from v2 or later to v3 or later.Jeremy Allison2007-10-101-1/+1
| | | | Jeremy.
* r23651: Always, always, always compile before commit...Günther Deschner2007-10-101-1/+1
| | | | Guenther
* r23650: Fix remaining callers of krb5_kt_default().Günther Deschner2007-10-101-3/+3
| | | | Guenther
* r23649: Fix the build (by moving smb_krb5_open_keytab() to clikrb5.c).Günther Deschner2007-10-101-1/+137
| | | | Guenther
* r23609: Removing more redundant codepaths out of smb_krb5_renew_ticket().Günther Deschner2007-10-101-38/+26
| | | | | | Thanks Volker for the pointer hint :) Guenther
* r23588: Some more cleanups and error checks in the krb5 renew function.Günther Deschner2007-10-101-6/+12
| | | | Guenther
* r23587: Cleanup redundant code in the krb5 renew function.Günther Deschner2007-10-101-23/+16
| | | | Guenther
* r23586: Fix heimdal path in the krb5 renew routine when we need to compose ↵Günther Deschner2007-10-101-1/+5
| | | | | | | | the tgt string ourselves. Guenther
* r23582: Fix event based krb5 ticket refreshing in winbindd.Günther Deschner2007-10-101-5/+5
| | | | | | | We were incorrectly using the renew_till timestamp instead of the renewed ticket's endtime to calculate the next refreshing date. Guenther
* r22747: Fix some C++ warningsVolker Lendecke2007-10-101-1/+1
|
* r22664: When we have krb5_get_init_creds_opt_get_error() then try to get the ↵Günther Deschner2007-10-101-0/+39
| | | | | | | | NTSTATUS codes directly out of the krb5_error edata. Guenther
* r22479: Add "net ads keytab list".Günther Deschner2007-10-101-6/+41
| | | | Guenther
* r22003: Fix from Jiri.Sasek@Sun.COM to wrap our krb5_locate_kdcJeremy Allison2007-10-101-5/+13
| | | | | | call as smb_krb5_locate_kdc to prevent incorrect linking and crashes on Solaris. Jeremy.
* r21846: Try and fix the Darwin build which seems to have a strange krb5.Jeremy Allison2007-10-101-0/+6
| | | | Jeremy.
* r21845: Refactor the sessionsetupX code a little to allow usJeremy Allison2007-10-101-0/+33
| | | | | | | | | | | to return a NT_STATUS_TIME_DIFFERENCE_AT_DC error to a client when there's clock skew. Will help people debug this. Prepare us for being able to return the correct sessionsetupX "NT_STATUS_MORE_PROCESSING_REQUIRED" error with associated krb5 clock skew error to allow clients to re-sync time with us when we're eventually able to be a KDC. Jeremy.
* r21778: Wrap calls to krb5_get_init_creds_opt_free to handle the differentJames Peach2007-10-101-6/+23
| | | | | calling convention in the latest MIT changes. Apparantly Heimdal is also changing to this calling convention.
* r21240: Fix longstanding Bug #4009.Günther Deschner2007-10-101-5/+15
| | | | | | | | | | | | | | | | | For the winbind cached ADS LDAP connection handling (ads_cached_connection()) we were (incorrectly) assuming that the service ticket lifetime equaled the tgt lifetime. For setups where the service ticket just lives 10 minutes, we were leaving hundreds of LDAP connections in CLOSE_WAIT state, until we fail to service entirely with "Too many open files". Also sequence_number() in winbindd_ads.c needs to delete the cached LDAP connection after the ads_do_search_retry() has failed to submit the search request (although the bind succeeded (returning an expired service ticket that we cannot delete from the memory cred cache - this will get fixed later)). Guenther
* r21110: Fix kinit with Heimdal (Bug #4226).Günther Deschner2007-10-101-0/+26
| | | | Guenther
* r21046: Backing out svn r20403 (Andrew's krb5 ticket cleanupGerald Carter2007-10-101-0/+42
| | | | | | | | as this is causing the WRONG_PASSWORD error in the SetUserInfo() call during net ads join). We are now back to always list RC4-HMAC first if supported by the krb5 libraries.
* r20403: Cleaning out my Samba 3.0 tree:Andrew Bartlett2007-10-101-42/+0
| | | | | | | | | As discussed with jerry at the CIFS conf: overriding the administrator's wishes from the krb5.conf has only every given me segfaults. We suggest leaving this up to the defaults from the libraries anyway. Andrew Bartlett
* r19939: ,fix compile warning about unused functions when not using heimdalGerald Carter2007-10-101-0/+2
|
* r19416: Fix some c++ warnings.Günther Deschner2007-10-101-2/+2
| | | | Guenther
* r19374: fix the build with heimdalStefan Metzmacher2007-10-101-1/+1
| | | | metze
* r19291: this should fix the build on heimdal systemsStefan Metzmacher2007-10-101-1/+0
| | | | metze
* r19270: Stop depending on internal MIT symbols. These are private on MacOSJames Peach2007-10-101-47/+56
| | | | | | | x, so we can't get at them even if we wanted to. Kerberos experts, please take a look to make sure I've done the right thing!
* r19237: fix typoStefan Metzmacher2007-10-101-1/+1
| | | | metze
* r17162: Fix typo small typos noticed by Paul Green.Gerald Carter2007-10-101-1/+1
|
* r16960: Some warnings from host "opi"Volker Lendecke2007-10-101-1/+1
|
* r16945: Sync trunk -> 3.0 for 3.0.24 code. Still needJeremy Allison2007-10-101-1/+1
| | | | | | | to do the upper layer directories but this is what everyone is waiting for.... Jeremy.
* r16269: Fix the build.Günther Deschner2007-10-101-3/+3
| | | | Guenther
* r16268: Add TCP fallback for our implementation of the CHANGEPW kpasswd calls.Günther Deschner2007-10-101-1/+58
| | | | | | | | | | This patch is mainly based on the work of Todd Stecher <tstecher@isilon.com> and has been reviewed by Jeremy. I sucessfully tested and valgrinded it with MIT 1.4.3, 1.3.5, Heimdal 0.7.2 and 0.6.1rc3. Guenther
* r15243: Sorry for the breakage:Günther Deschner2007-10-101-0/+9
| | | | | | | * Fix the build without kerberos headers * Fix memleak in the krb5_address handling Guenther
* r15240: Correctly disallow unauthorized access when logging on with theGünther Deschner2007-10-101-0/+98
| | | | | | | | | | | | kerberized pam_winbind and workstation restrictions are in effect. The krb5 AS-REQ needs to add the host netbios-name in the address-list. We don't get the clear NT_STATUS_INVALID_WORKSTATION code back yet from the edata of the KRB_ERROR but the login at least fails when the local machine is not in the workstation list on the DC. Guenther
* r15216: Fix the build for machines without krb5. Oops, sorry.Jeremy Allison2007-10-101-2/+2
| | | | Jeremy.
* r15210: Add wrapper functions smb_krb5_parse_name, smb_krb5_unparse_name,Jeremy Allison2007-10-101-10/+83
| | | | | | | smb_krb5_parse_name_norealm_conv that pull/push from unix charset to utf8 (which krb5 uses on the wire). This should fix issues when the unix charset is not compatible with or set to utf8. Jeremy.
* r14506: Remove remaining references to a KCM credential cache type.Günther Deschner2007-10-101-1/+1
| | | | Guenther
* r14218: Fix Coverity Bug # 2Volker Lendecke2007-10-101-5/+0
|
* r13316: Let the carnage begin....Gerald Carter2007-10-101-12/+159
| | | | Sync with trunk as off r13315
* r13020: Prevent cli_krb5_get_ticket of getting into an infite loop. This wholeGünther Deschner2007-10-101-1/+4
| | | | | | area of code needs to be reworked later on. Guenther
* r13012: Fix #3421 - it turns out krb5_kt_get_entry() on MITJeremy Allison2007-10-101-12/+12
| | | | | | | | | does an implicit open/read/close and blows away an open keytab handle - so make sure we use a new handle. Wonderful analysis from Luke <ldeller@xplantechnology.com> helped fix this. Jeremy.
* r11551: Add a few more initialize_krb5_error_tableVolker Lendecke2007-10-101-0/+1
|
* r10907: Handle the case when we can't verify the PAC signature because theGünther Deschner2007-10-101-0/+6
| | | | | | | | | | | ticket was encrypted using a DES key (and the Windows KDC still puts CKSUMTYPE_HMAC_MD5_ARCFOUR in the PAC). In that case, return to old behaviour and ignore the PAC. Thanks to Chengjie Liu <chengjie.liu@datadomain.com>. Guenther