summaryrefslogtreecommitdiffstats
path: root/src/lib/krb5/krb/ChangeLog
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/krb5/krb/ChangeLog')
-rw-r--r--src/lib/krb5/krb/ChangeLog3633
1 files changed, 0 insertions, 3633 deletions
diff --git a/src/lib/krb5/krb/ChangeLog b/src/lib/krb5/krb/ChangeLog
deleted file mode 100644
index f0794dbf5..000000000
--- a/src/lib/krb5/krb/ChangeLog
+++ /dev/null
@@ -1,3633 +0,0 @@
-2006-04-02 Ken Raeburn <raeburn@mit.edu>
-
- * t_kerb.c: Include autoconf.h.
-
- * Makefile.in (DEFS): Make empty.
-
-2006-03-26 Ken Raeburn <raeburn@mit.edu>
-
- * kerrs.c: New file.
- * Makefile.in (SRCS, OBJS, STLIBOBJS): Add it.
-
- * gc_via_tkt.c (krb5_get_cred_via_tkt): If the KDC returns
- KRB_ERR_GENERIC, store the e-text field as the error message.
-
-2006-03-13 Ken Raeburn <raeburn@mit.edu>
-
- * Makefile.in (check-unix): Use RUN_SETUP for t_deltat.
-
-2006-01-17 Ken Raeburn <raeburn@mit.edu>
-
- * Makefile.in (t_deltat): Include support library.
-
-2005-12-30 Tom Yu <tlyu@mit.edu>
-
- * gc_frm_kdc.c: Rewrite to modularize significantly. (~400-line
- functions do not deserve to live.) The outer loop no longer
- explicitly attempts the direct path to the target; that attempt
- has been folded into the inner loop. Remove some redundant
- credential lookups present in the old code. Treat unexpected
- realm referrals as soft errors, in case some intermediate KDC
- disagrees with client regarding a transit path.
-
-2005-12-28 Tom Yu <tlyu@mit.edu>
-
- * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): Cause free_tgt and
- free_otgt to track the states of tgt and otgt correctly, to avoid
- a double-free condition which previously happened when this
- function returned to krb5_get_credentials(), which proceeded to
- free a previously freed TGT in the returned TGT list.
-
-2005-10-19 Ken Raeburn <raeburn@mit.edu>
-
- * Makefile.in (t_ser): Add dl library and thread link options,
- since kdb5 library is linked in and needs them.
-
-2005-09-22 Tom Yu <tlyu@mit.edu>
-
- * mk_req_ext.c (krb5int_generate_and_save_subkey): Check for and
- free pre-existing subkeys before clobbering the pointers. This
- fixes some memory leaks.
-
-2005-08-23 Ezra Peisach <epeisach@mit.edu>
-
- * t_ser.c (ser_kcontext_test): Remove statement declaring an
- unused variable using a non-portable gcc extension.
-
-2005-08-15 Tom Yu <tlyu@mit.edu>
-
- * get_in_tkt.c (krb5_get_init_creds): Free tempstr on non-error
- returns from krb5_string_to_deltat() to avoid memory leak.
-
-2005-07-12 Tom Yu <tlyu@mit.edu>
-
- * recvauth.c (recvauth_common): Avoid double-free on invalid
- version string. Thanks to Magnus Hagander. Fix for
- MITKRB5-SA-2005-003 [CAN-2005-1689, VU#623332].
-
- * unparse.c (krb5_unparse_name_ext): Account for zero-component
- principal, to avoid single-byte overflow. Thanks to Daniel
- Wachdorf. Part of fix for MITKRB5-SA-2005-002 [CAN-2005-1175,
- VU#885830].
-
-2005-06-29 Ken Raeburn <raeburn@mit.edu>
-
- * t_ser.c (ser_data): Don't initialize db serialization code that
- doesn't exist any more.
- (ser_kcontext_test): Don't create and destroy databases.
-
-2005-05-19 Sam Hartman <hartmans@mit.edu>
-
- * kfree.c (krb5_free_keyblock_contents krb5_free_keyblock): Make
- stubs into libk5crypto so that libk5crypto can call these.
- * init_keyblock.c (krb5_init_keyblock): As above.
-
-2005-04024 Jeffrey Altman <jaltman@mit.edu>
-
- * get_creds.c:
- the purpose of the krb5_get_credentials call is to
- obtain a set of credentials for the caller. the
- krb5_cc_store_cred() call is to optimize performance
- for future calls. Ignore any errors, since the credentials
- are still valid even if we fail to store them in the cache.
-
-
-2005-04-13 Ken Raeburn <raeburn@mit.edu>
-
- * Makefile.in (BISONFLAGS): Drop -v.
- ($(srcdir)/deltat.c): Change to source directory before
- rebuilding, so path to source tree doesn't get inserted.
-
- * fwd_tgt.c (NEED_SOCKETS): Don't define.
- * recvauth.c (NEED_SOCKETS): Don't define.
- * sendauth.c (NEED_SOCKETS): Don't define.
-
-2005-03-22 Tom Yu <tlyu@mit.edu>
-
- * x-deltat.y (wsnum): Add missing semicolon following YYERROR,
- which was preventing bison-1.75 from producing compilable C
- output.
-
- * gic_keytab.c (krb5_get_init_creds_keytab): When calling
- krb5_get_init_creds() for the second time (with use_master=1),
- also accept KRB5_REALM_UNKNOWN as a soft error, and use the result
- from the first call to krb5_get_init_creds(). This can happen
- when no master KDC is configured.
-
-2005-03-14 Jeffrey Altman <jaltman@mit.edu>
-
- * Makefile.in: fix maintainer mode since it is not supported on
- Windows.
-
-2005-03-03 Ken Raeburn <raeburn@mit.edu>
-
- * x-deltat.y (tok_WS): Renamed terminal from "WS", which conflicts
- with HP-UX 10 header files. Updated all productions.
- (mylex): Updated.
- * Makefile.in ($(srcdir)/deltat.c): Enable dependencies in
- maintainer mode.
- * deltat.c: Updated.
-
-2005-02-16 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (init_common): Delete redundant library
- initialization call that was run only on UNIX. Test assertion
- that krb5_ui_8 really did get a proper 64-bit type.
-
-2005-02-09 Tom Yu <tlyu@mit.edu>
-
- * gic_pwd.c (krb5_get_init_creds_password): Fix so empty password
- string causes prompting and doesn't cause truncation of password
- to zero characters.
-
-2005-01-28 Ezra Peisach <epeisach@mit.edu>
-
- * t_walk_rtree.c (main): Free context at end to allow searching
- for memory leaks.
-
-2005-01-17 Jeffrey Altman <jaltman@mit.edu>
- * unparse.c: krb5_unparse_name, krb5_unparse_name_ext()
- prevent null pointer dereferencing if either 'name' or 'size'
- are NULL.
-
-2005-01-17 Ezra Peisach <epeisach@mit.edu>
-
- * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): More memory leaks
- fixed as introduced in ticket #2541. Do not rely on knowledge that
- upon failure from krb5_cc_retrieve_cred, returned credential data
- is untouched.
-
-2005-01-17 Ezra Peisach <epeisach@mit.edu>
-
- * preauth2.c (krb5_do_preauth): Upon error in decoding
- krb5_type_info{,2}, on failure, do not call krb5_free_type_info
- with a null pointer.
-
-2005-01-15 Jeffrey Altman <jaltman@mit.edu>
-
- * cp_key_cnt.c, copy_princ.c:
- prevent krb5_copy_principal() and krb5_copy_keyblock() from
- calling malloc(0). On platforms in which malloc(0) returns
- NULL, these functions will return an ENOMEM error the way
- they were written.
-
-2005-01-11 Ken Raeburn <raeburn@mit.edu>
-
- * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): Free credentials
- retrieved from ccache before returning. Based on patch from
- fumihiko kakuma <kakuma@valinux.co.jp>.
-
-2005-01-03 Ken Raeburn <raeburn@mit.edu>
-
- * parse.c (krb5_parse_name): Don't cache the default realm name.
-
-2004-10-26 Tom Yu <tlyu@mit.edu>
-
- * mk_req_ext.c (krb5_mk_req_extended): Free keyblock before
- copying new one in.
-
-2004-10-14 Tom Yu <tlyu@mit.edu>
-
- * t_deltat.c (main): Unadorned integer no longer fails now that we
- default to seconds.
-
-2004-10-13 Alexandra Ellwood <lxs@mit.edu>
-
- * deltat.c, x-deltat.y: Default to seconds if no unit is provided.
-
-2004-09-24 Tom Yu <tlyu@mit.edu>
-
- * Makefile.in (LOCALINCLUDES): Include SRCTOP to get patchlevel.h.
-
- * brand.c: Use patchlevel.h as master version stamp file.
-
-2004-09-21 Tom Yu <tlyu@mit.edu>
-
- * rd_cred.c (decrypt_credencdata): Clear and free ppart to avoid
- leak, reported by Derrick Schommer.
-
-2004-08-31 Tom Yu <tlyu@mit.edu>
-
- * rd_rep.c:
- * send_tgs.c: Fix double-free vulnerabilities.
-
-2004-08-27 Ken Raeburn <raeburn@mit.edu>
-
- * conv_princ.c (krb5_425_conv_principal): Terminate argument list
- to krb5_build_principal with NULL, not 0. Patch from Nalin
- Dahyabhai.
-
-2004-08-12 Alexandra Ellwood <lxs@mit.edu>
-
- * get_in_tkt.c (get_init_creds):
- Support ticket_lifetime libdefault.
- Made aware of 32 bit min and max for times.
- Allow renew_until time < expiration time.
-
-2004-08-03 Ken Raeburn <raeburn@mit.edu>
-
- * srv_rcache.c (krb5_get_server_rcache): Call
- krb5_rc_recover_or_initialize.
-
-2004-06-22 Ken Raeburn <raeburn@mit.edu>
-
- * parse.c (krb5_parse_name): Don't test macintosh.
-
-2004-06-04 Ken Raeburn <raeburn@mit.edu>
-
- * str_conv.c (krb5_string_to_timestamp): Use localtime_r if
- available.
- (krb5_timestamp_to_string, krb5_timestamp_to_sfstring): Likewise.
-
- * parse.c (krb5_parse_name): Use assert and abort, not exit.
-
- * srv_rcache.c (krb5_get_server_rcache): Don't forget to actually
- include the cache type in the cache name, after looking it up.
-
-2004-06-02 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (init_common): Don't call krb5_init_ets.
- (krb5_free_context): Don't call krb5_free_ets.
-
- * srv_rcache.c (krb5_get_server_rcache): Use krb5_rc_resolve_full
- instead of constructing an rcache object locally.
-
-2004-05-25 Ezra Peisach <epeisach@mit.edu>
-
- * conv_creds.c (krb5int_encode_v4tkt): Unsigned vs signed warning fix.
-
-2004-05-24 Ezra Peisach <epeisach@mit.edu>
-
- * t_ser.c (ser_keytab_test): Cleanup memory leak of forgetting to
- close keytab.
-
- * chpw.c: Add parenthesis around assignments in conditionals.
-
-2004-05-12 Jeffrey Altman <jaltman@mit.edu>
-
- * send_tgs.c: krb5_send_tgs() was broken in the case of a KRB_ERROR
- message. The krb5_response message_type field was never set
- resulting in stack garbage being used instead. This would
- break code which used transitive cross-realm to obtain service
- tickets.
-
-2004-04-24 Ken Raeburn <raeburn@mit.edu>
-
- * conv_creds.c (krb524_init_ets, krb524_convert_creds_kdc): Add
- forward declarations to silence gcc warnings.
-
- * init_ctx.c (init_common): In UNIX case, check the return value
- from krb5int_initialize_library.
-
-2004-04-16 Sam Hartman <hartmans@mit.edu>
-
- * gic_pwd.c (krb5int_populate_gic_opt): Take credentials and
- populate lifetime options based on them.
-
- * gic_keytab.c gic_pwd.c : update callers
-
-2004-04-15 Sam Hartman <hartmans@mit.edu>
-
- * gic_pwd.c (krb5_get_init_creds_password): Free the as reply in
- the !use_master case (Thanks to Lijian Liu)
-
-2004-03-09 Ken Hornstein <kenh@cmf.nrl.navy.mil>
-
- * gic_keytab.c (krb5_get_in_tkt_with_keytab): Fix a case I missed
- originally.
-
-2004-02-27 Ken Raeburn <raeburn@mit.edu>
-
- * gic_pwd.c (krb5_get_in_tkt_with_password): Fix a case Jeff
- missed.
-
-2004-02-26 Jeffrey Altman <jaltman@mit.edu>
-
- * get_in_tkt.c, gic_keytab.c, gic_pwd.c, send_tgs.c:
- Implement changes to support the use of
- krb5_get_init_creds_password's use_master as an in/out
- parameter. This allows us to prevent a duplicate request
- being sent to the KDC in the situation that the password
- used is incorrect. This behavior results a negative user
- experience and had to be corrected.
-
-2004-02-13 Ken Raeburn <raeburn@mit.edu>
-
- * sendauth.c: Don't specify defaults for
- GET{PEER,SOCK}NAME_ARG{2,3}_TYPE macros.
-
-2004-02-06 Sam Hartman <hartmans@avalanche-breakdown.mit.edu>
-
- * init_ctx.c (DEFAULT_ETYPE_LIST): Include aes128-cts
-
-2003-12-19 Ken Raeburn <raeburn@mit.edu>
-
- * get_in_tkt.c (get_in_tkt_enctypes): Now const.
-
-2003-12-16 Ken Raeburn <raeburn@mit.edu>
-
- * conv_creds.c (krb5int_encode_v4tkt): Zero out unused parts of
- ticket. Use a temorary in case krb5_int32 isn't "int".
- (decode_v4tkt): Use a temorary in case krb5_int32 isn't "int".
-
-2003-12-13 Ken Raeburn <raeburn@mit.edu>
-
- * mk_req_ext.c (krb5int_generate_and_save_subkey): New function,
- split out from krb5_mk_req_extended.
- (krb5_mk_req_extended): Call it.
- * mk_rep.c (krb5_mk_rep): If KRB5_AUTH_CONTEXT_USE_SUBKEY flag is
- set, call krb5int_generate_and_save_subkey to set up a new subkey
- to send to the client.
-
- * serialize.c (krb5_ser_pack_int64, krb5_ser_unpack_int64): New
- functions.
-
-2003-10-30 Tom Yu <tlyu@mit.edu>
-
- * gen_seqnum.c (krb5_generate_seq_number): Fix mask; was short by
- 4 bits.
-
-2003-10-08 Tom Yu <tlyu@mit.edu>
-
- * rd_safe.c (krb5_rd_safe_basic): Save the encoded KRB-SAFE-BODY
- to avoid trouble caused by re-encoding. Also, handle correctly
- implemented RFC 1510 KRB-SAFE, i.e., checksummed over
- KRB-SAFE-BODY only.
-
-2003-09-02 Tom Yu <tlyu@mit.edu>
-
- * conv_creds.c (krb524_convert_creds_plain): Apply patch from
- Cesar Garcia to fix lifetime computation.
-
-2003-08-19 SamHartman <hartmans@avalanche-breakdown.mit.edu>
-
- * rd_cred.c (decrypt_credencdata): Don't double free credentials.
-
-2003-08-08 Tom Yu <tlyu@mit.edu>
-
- * gic_pwd.c (krb5_get_init_creds_password): If DNS SRV support is
- turned off, the second call to get_init_creds() will fail with
- KRB5_REALM_UNKNOWN under certain circumstances. If that happens,
- return the error from the first call to get_init_creds(), which
- will be more useful to the user.
-
-2003-07-22 Sam Hartman <hartmans@avalanche-breakdown.mit.edu>
-
- * preauth2.c (krb5_do_preauth): Use the etype_info2 decoder for decoding etype_info2
- (krb5_do_preauth): If an invalid encoding of etype_info or
- etype_info2 is received, ignore it rather than failing the request
-
-2003-07-17 Ken Raeburn <raeburn@mit.edu>
-
- * Makefile.in (LIBNAME) [##WIN16##]: Don't define.
-
-2003-07-15 Ken Raeburn <raeburn@mit.edu>
-
- * Makefile.in (STLIBOBJS, OBJS, T_SER_OBJS): Drop ser_eblk.o.
-
-2003-06-03 Alexandra Ellwood <lxs@mit.edu>
-
- * init_ctx.c: Export krb5_get_permitted_enctypes for Samba.
-
-2003-06-27 Tom Yu <tlyu@mit.edu>
-
- * gic_keytab.c (krb5_get_in_tkt_with_keytab): Pass (void*)keytab,
- not &keytab, to get_init_creds. Thanks to Herb Lewis.
-
-2003-06-16 Sam Hartman <hartmans@mit.edu>
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): Set use_conf_ktypes to true while getting the TGT key
-
-2003-06-13 Tom Yu <tlyu@mit.edu>
-
- * rd_rep.c (krb5_rd_rep): Free subkeys before replacing them, if
- needed. This avoids a memory leak.
-
-2003-06-11 Tom Yu <tlyu@mit.edu>
-
- * srv_rcache.c (krb5_get_server_rcache): Octal escapes begin with
- hyphen now, since backslash is a pathname separator on DOS.
-
-2003-06-06 Sam Hartman <hartmans@mit.edu>
-
- * get_in_tkt.c (krb5_get_init_creds): Mask out renewable_ok if the
- request is for a renewable ticket with rtime greater than till
-
-2003-06-06 Ezra Peisach <epeisach@mit.edu>
-
- * mk_req_ext.c (krb5_generate_authenticator): Sequence numbers are
- unsigned now.
-
-2003-05-30 Ken Raeburn <raeburn@mit.edu>
-
- * get_in_tkt.c (krb5_get_init_creds): Change hardcoded default
- ticket lifetime from 10 hours to 24 hours.
-
- * init_ctx.c (DEFAULT_KDC_TIMESYNC): Define as 1 always.
- (DEFAULT_CCACHE_TYPE): Define as 4 always.
-
-2003-05-30 Alexandra Ellwood <lxs@mit.edu>
-
- * get_in_tkt.c: (verify_as_reply) Only check the renewable lifetime
- of tickets whose request options included KDC_OPT_RENEWABLE_OK
- if those options did not also include KDC_OPT_RENEWABLE. Otherwise
- verify_as_reply() will fail for all renewable tickets.
-
-2003-05-27 Ken Raeburn <raeburn@mit.edu>
-
- * conv_creds.c: Enable support on Windows always.
- (krb5_524_convert_creds): Renamed from krb524_convert_creds_kdc.
- (krb524_convert_creds_kdc, krb524_init_ets) [!_WIN32]: Backwards
- compatibility functions.
-
-2003-05-27 Sam Hartman <hartmans@mit.edu>
-
- * gic_keytab.c (krb5_get_in_tkt_with_keytab): as below
-
- * gic_pwd.c (krb5_get_in_tkt_with_password): Store client and
- server principals to avoid memory leak
-
-2003-05-24 Ken Raeburn <raeburn@mit.edu>
-
- * conv_creds.c: New file, moved from krb524/conv_creds.c and
- krb524/encode.c. Rename exported encode routine, make other
- encode and decode routines static. If KRB5_KRB4_COMPAT is not
- defined, return an error.
- * v4lifetime.c: New file, moved from lib/krb4/lifetime.c. Renamed
- functions, changed interface to use krb5 types.
- * Makefile.in (STLIBOBJS, OBJS, SRCS): Add them.
-
-2003-05-23 Sam Hartman <hartmans@mit.edu>
-
- * get_in_tkt.c (krb5_get_init_creds): Initialize options based on
- context.kdc_default_options
-2003-05-22 Tom Yu <tlyu@mit.edu>
-
- * gen_seqnum.c (krb5_generate_seq_number): Fix think-o on sequence
- number mask.
-
- * auth_con.c (krb5int_auth_con_chkseqnum): New function; implement
- heuristic for broken Heimdal sequence number encoding.
- (chk_heimdal_seqnum): Auxiliary function for above.
-
- * auth_con.h: Add flags for sequence number heuristic.
-
- * rd_priv.c: Use krb5int_auth_con_chkseqnum.
-
- * rd_safe.c: Use krb5int_auth_con_chkseqnum.
-
-2003-05-22 Sam Hartman <hartmans@mit.edu>
-
- * gic_pwd.c (krb5int_populate_gic_opt): returns void
-
-2003-05-21 Tom Yu <tlyu@mit.edu>
-
- * gic_pwd.c (krb5_get_in_tkt_with_password): Set pw0.length
- correctly if a password is passed in.
-
-2003-05-20 Sam Hartman <hartmans@mit.edu>
-
- * get_in_tkt.c: get_in_tkt only supports old (non-etype-info2)
- enctypes.
-
- * Makefile.in (SRCS): Remove in_ktb.c
-
- * gic_keytab.c (krb5_get_in_tkt_with_keytab): Move from
- in_tkt_keytab.c and rewrite to use krb5_get_init_creds
-
- * gic_pwd.c (krb5_get_in_tkt_with_password): Moved here from
- in_tkt_pwd.c so it can share code with
- krb5_get_init_creds_password. Rewritten to call
- krb5_get_in_tkt_password
-
- * Makefile.in (SRCS): Delete in_tkt_pwd.c
-
-2003-05-18 Tom Yu <tlyu@mit.edu>
-
- * auth_con.h: Sequence numbers are now unsigned.
-
- * gen_seqnum.c (krb5_generate_seq_number): Constrain initial
- sequence number space to facilitate backwards compatibility.
-
-2003-05-16 Ken Raeburn <raeburn@mit.edu>
-
- * ser_ctx.c (krb5_context_internalize): Copy read-in OS context
- data into krb5_context and free up the newly allocated OS
- context.
-
- * chpw.c (krb5int_rd_chpw_rep): Allow new kpasswd error codes up
- through _INITIAL_FLAG_NEEDED.
-
-2003-05-13 Sam Hartman <hartmans@mit.edu>
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): Try with no specified enctype if
- forwarding a specific enctype fails. l
-
- * get_in_tkt.c (krb5_get_init_creds): Free s2kparams
-
- * preauth2.c (krb5_do_preauth): Fix memory management
- (pa_salt): Use copy_data_contents
-
- * copy_data.c (krb5int_copy_data_contents): New function
-
-2003-05-09 Sam Hartman <hartmans@mit.edu>
-
- * preauth2.c: Patch from Sun to reorganize code for handling
- etype_info requests. More efficient and easier to implement etype_info2
- (krb5_do_preauth): Support enctype_info2
-
-2003-05-08 Sam Hartman <hartmans@mit.edu>
-
- * preauth2.c: Add s2kparams to the declaration of a preauth
- function, to every instance of a preauth function and to every
- call to gak_fct
-
- * get_in_tkt.c (krb5_get_init_creds): Add s2kparams support
-
- * gic_keytab.c (krb5_get_as_key_keytab): Add s2kparams
-
- * gic_pwd.c (krb5_get_as_key_password): Add s2kparams support
-
-2003-05-09 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (init_common): Copy tgs_ktypes array to
- conf_tgs_ktypes. Clear use_conf_ktypes.
- (krb5_free_context): Free conf_tgs_ktypes.
- (krb5_get_tgs_ktypes): Use use_conf_ktypes to choose between
- tgs_ktypes and conf_tgs_ktypes.
-
- * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): Set use_conf_ktypes
- in context to 1 for all operations except the acquisition of the
- desired service ticket.
-
-2003-05-09 Tom Yu <tlyu@mit.edu>
-
- * auth_con.c (krb5_auth_con_setsendsubkey)
- (krb5_auth_con_setrecvsubkey, krb5_auth_con_getsendsubkey)
- (krb5_auth_con_getrecvsubkey): New functions. Set or retrieve
- subkeys from an auth_context.
- (krb5_auth_con_getlocalsubkey, krb5_auth_con_getremotesubkey):
- Reimplement in terms of the above.
-
- * auth_con.h, ser_actx.c: Rename {local,remote}_subkey ->
- {send,recv}_subkey.
-
- * chpw.c (krb5int_rd_chpw_rep): Save send_subkey prior to rd_rep;
- use saved send_subkey to smash recv_subkey obtained from rd_rep.
-
- * mk_req_ext.c (krb5_mk_req_extended): Rename
- {local,remote}_subkey -> {send,recv}_subkey. Set both subkeys if
- subkey generation is requested.
-
- * mk_cred.c, mk_priv.c, mk_safe.c: Rename {local,remote}_subkey ->
- {send,recv}_subkey. Use either send_subkey or keyblock, in that
- order.
-
- * rd_cred.c, rd_priv.c, rd_safe.c: Rename {local,remote}_subkey ->
- {send,recv}_subkey. Use either recv_subkey or keyblock, in that
- order.
-
- * rd_rep.c (krb5_rd_rep): Rename {local,remote}_subkey ->
- {send,recv}_subkey. Set both subkeys if a subkey is present in
- the AP-REP message.
-
- * rd_req_dec.c (krb5_rd_req_decoded_opt): Rename
- {local,remote}_subkey -> {send,recv}_subkey. Set both subkeys if
- a subkey is present in the AP-REQ message.
-
-2003-05-06 Sam Hartman <hartmans@mit.edu>
-
- * kfree.c (krb5_free_etype_info): Free s2kparams
-
-2003-04-27 Sam Hartman <hartmans@mit.edu>
-
- * chpw.c (krb5int_setpw_result_code_string): Make internal
-
-2003-04-25 Sam Hartman <hartmans@mit.edu>
-
- * chpw.c (krb5int_rd_setpw_rep): Fix error handling; allow
- krberrors to be read correctly; fix memory alloctaion so that
- allocated structures are freed.
-
-2003-04-16 Sam Hartman <hartmans@mit.edu>
-
- * chpw.c (krb5int_mk_setpw_req): Use encode_krb5_setpw_req. Fix
- memory handling to free data that is allocated
-
-2003-04-15 Sam Hartman <hartmans@mit.edu>
-
- * chpw.c (krb5int_mk_setpw_req krb5int_rd_setpw_rep): New function
-
-2003-04-24 Ezra Peisach <epeisach@mit.edu>
-
- * kfree.c (krb5_free_pwd_sequences): Correction to previous
- fix. Free contents of krb5_data - not just the pointer.
-
-2003-04-23 Ezra Peisach <epeisach@mit.edu>
-
- * kfree.c (krb5_free_pwd_sequences): Actually free the entire
- sequence of passwd_phase_elements and not just the first one.
-
-2003-04-13 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (DEFAULT_ETYPE_LIST): Add AES with 256 bits at the
- front of the list. No 128-bit support by default.
-
-2003-04-01 Nalin Dahyabhai <nalin@redhat.com>
-
- * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): Check principal name
- length before examining components.
-
- * parse.c (krb5_parse_name): Double-check principal name length
- before filling in components.
-
- * srv_rcache.c (krb5_get_server_rcache): Check for null pointer
- supplied in place of name.
-
- * unparse.c (krb5_unparse_name_ext): Don't move buffer pointer
- backwards if nothing has been put into the buffer yet.
-
-2003-04-01 Sam Hartman <hartmans@mit.edu>
-
- * rd_req.c (krb5_rd_req): If AUTH_CONTEXT_DO_TIME is cleared,
- don't set up a replay cache.
-
-2003-03-08 Ezra Peisach <epeisach@mit.edu>
-
- * t_kerb.c: Only include krb.h if krb4 support compiled in,
- otherwise define ANAME_SZ, INST_SZ and REALM_SZ.
-
-2003-03-06 Tom Yu <tlyu@mit.edu>
-
- * preauth2.c (pa_sam_2): Add intermediate size_t variable to hold
- output of krb5_c_encrypt_length().
-
-2003-03-06 Alexandra Ellwood <lxs@mit.edu>
-
- * appdefault.c: Fix constness to avoid warning.
-
- * init_ctx.c: Do the same stuff on the Mac as on Unix.
-
- * preauth2.c: Added cast to fix warning.
-
-2003-03-04 Tom Yu <tlyu@mit.edu>
-
- * srv_rcache.c (krb5_get_server_rcache): Fix missed
- isinvalidrcname -> isvalidrcname.
-
-2003-03-02 Sam Hartman <hartmans@mit.edu>
-
- * srv_rcache.c (krb5_get_server_rcache): If punctuation or graphic characters in replay ccache name then use escaping
-
- * rd_req.c (krb5_rd_req): Allow initializing the replay cache from the ticket
-
-2003-02-25 Tom Yu <tlyu@mit.edu>
-
- * gic_pwd.c (krb5_get_init_creds_password): Don't pass a NULL
- pointer to sprintf().
-
-2003-02-14 Sam Hartman <hartmans@mit.edu>
-
- * preauth2.c (krb5_do_preauth): Sort incoming etype info based on
- preference order in request
-
-2003-02-13 Sam Hartman <hartmans@mit.edu>
-
- * gic_keytab.c (krb5_get_as_key_keytab): Nathan Neulinger points
- out that the AS key is double freed; fix.
-
-2003-02-11 Sam Hartman <hartmans@mit.edu>
-
- * rd_cred.c (krb5_rd_cred): Free creds using krb5_free_tgt_creds
- and make sure they are set to null in case of error.
-
-2003-02-07 Sam Hartman <hartmans@mit.edu>
-
- * rd_cred.c (krb5_rd_cred): Allow the tickets to be encrypted the
- session key as well as the subsession key; for GSSAPI this tends
- to be what happens.
-
-2003-02-04 Sam Hartman <hartmans@mit.edu>
-
- * get_in_tkt.c (krb5_get_init_creds): Default to addressless tickets
-
-2003-01-12 Ezra Peisach <epeisach@bu.edu>
-
- * send_tgs.c (krb5_send_tgs): Free memory leak of TGS_REQ.
-
-2003-01-10 Ken Raeburn <raeburn@mit.edu>
-
- * Makefile.in: Add AC_SUBST_FILE marker for libobj_frag.
-
-2003-01-09 Sam Hartman <hartmans@mit.edu>
-
- * get_creds.c (krb5_get_credentials_core): Patch from Ben Cox
- <cox-work@djehuti.com> to not use expired service credentials if
- the endtime is null but instead to search for unexpired
- credentials. If none are found, get new credentials.
-
-
-2003-01-08 Sam Hartman <hartmans@mit.edu>
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): Don't require hostname to be supplied unless you are using addresses in the ticket.
-
-2003-01-07 Ken Raeburn <raeburn@mit.edu>
-
- * appdefault.c (conf_yes, conf_no): Now const.
-
-2003-01-07 Sam Hartman <hartmans@mit.edu>
-
- * mk_req_ext.c (krb5_mk_req_extended): Fix logic error in checksum function handling
- (krb5_mk_req_extended): For consistency with Microsoft, never use a subkey before calling the checksum callback
-
-2003-01-06 Sam Hartman <hartmans@mit.edu>
-
- * mk_req_ext.c (krb5_mk_req_extended): Inf no in_data is provided
- but krb5_auth_con_set_checksum_func has been called, then use that
- callback to generate the in_data.
-
- * auth_con.c (krb5_auth_con_init): Initialize checksum_func fields
- (krb5_auth_con_set_checksum_func): new function-- set the mk_req
- checksum function
- (krb5_auth_con_get_checksum_func): return the same
-
- * auth_con.h: Add checksum_func and checksum_func_data
-
-2002-12-23 Ezra Peisach <epeisach@bu.edu>
-
- * t_kerb.c: Include string.h for strcmp prototype.
-
-2002-12-19 Ken Raeburn <raeburn@mit.edu>
-
- * conv_princ.c (krb5_524_conv_principal): Clean up use of "const"
- in API.
-
-2002-11-14 Ezra Peisach <epeisach@bu.edu>
-
- * get_in_tkt.c (krb5_get_in_tkt): Do not pass NULL when an
- integer 0 is intended to send_as_request().
-
-2002-11-07 Ezra Peisach <epeisach@bu.edu>
-
- * conv_princ.c (strnchr): Make length argument unsigned int.
-
- * preauth2.c: Add parentheses around assignment used as truth
- value. Cleanup unused variable.
-
-
-2002-10-30 Tom Yu <tlyu@mit.edu>
-
- * chk_trans.c (krb5_check_transited_list): Style nit: check
- character against '\0' not NULL.
-
-2002-10-30 Sam Hartman <hartmans@mit.edu>
-
- * chk_trans.c: Ignore trailing null in transited encoding; older
- versions of MIT code included this.
-
-2002-10-28 Ken Raeburn <raeburn@mit.edu>
-
- * get_in_tkt.c (conf_yes, conf_no): Now const. References
- updated.
- * preauth.c (preauth_systems): Now const. References updated.
- * preauth2.c (pa_types): Now const.
- (krb5_do_preauth): Local array paorder now const.
-
-2002-10-28 Sam Hartman <hartmans@mit.edu>
-
- * gic_keytab.c (krb5_get_init_creds_keytab): Don't allow failure
- to resolve master KDC to mask error from a slave we did talk to.
-
-2002-10-24 Ken Hornstein <kenh@cmf.nrl.navy.mil>
-
- * gic_pwd.c (krb5_get_init_creds_password): Exit out of the loop
- when preauth fails.
-
- * kfree.c: Add various free functions for new preauth
- data structures.
-
- * preauth2.c (pa_sam): Fix up support for "old" hardware preauth.
- Also implement new hardware preauth in pa_sam2().
-
-2002-10-23 Ken Hornstein <kenh@cmf.nrl.navy.mil>
-
- * gic_pwd.c (krb5_get_init_creds_password): Fix bug in previous
- password expiration warning; also, check for password expiration
- warnings via LRQ type from krb-clarifications.
-
-2002-09-11 Sam Hartman <hartmans@mit.edu>
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): If our initial tickets don't
- have addresses, neither should forwarded tickets. Also, noticed
- that cc was being used before initialized in some cases; fixed.
-
-2002-09-02 Ken Raeburn <raeburn@mit.edu>
-
- * addr_comp.c, addr_order.c, addr_srch.c, appdefault.c,
- auth_con.c, bld_princ.c, chpw.c, cleanup.h, conv_princ.c,
- copy_addrs.c, copy_athctr.c, copy_auth.c, copy_cksum.c,
- copy_creds.c, copy_data.c, copy_key.c, copy_princ.c, copy_tick.c,
- cp_key_cnt.c, decode_kdc.c, decrypt_tk.c, enc_helper.c,
- encode_kdc.c, encrypt_tk.c, free_rtree.c, fwd_tgt.c, gc_frm_kdc.c,
- gc_via_tkt.c, gen_seqnum.c, gen_subkey.c, get_creds.c,
- get_in_tkt.c, gic_keytab.c, gic_opt.c, gic_pwd.c, in_tkt_ktb.c,
- in_tkt_pwd.c, in_tkt_sky.c, init_ctx.c, kdc_rep_dc.c, kfree.c,
- mk_cred.c, mk_error.c, mk_priv.c, mk_rep.c, mk_req.c,
- mk_req_ext.c, mk_safe.c, parse.c, pr_to_salt.c, preauth.c,
- preauth2.c, princ_comp.c, rd_cred.c, rd_error.c, rd_priv.c,
- rd_rep.c, rd_req.c, rd_req_dec.c, rd_safe.c, recvauth.c,
- send_tgs.c, sendauth.c, ser_actx.c, ser_adata.c, ser_addr.c,
- ser_auth.c, ser_cksum.c, ser_ctx.c, ser_key.c, ser_princ.c,
- serialize.c, set_realm.c, srv_rcache.c, str_conv.c, t_deltat.c,
- t_kerb.c, t_ser.c, t_walk_rtree.c, tgtname.c, unparse.c,
- valid_times.c, vfy_increds.c, vic_opt.c, walk_rtree.c,
- x-deltat.y: Use prototype style function definitions.
- * deltat.c: Regenerated.
- * bld_princ.c: Include stdarg.h before k5-int.h.
- * cleanup.h (struct cleanup): Include prototype for function
- pointer field 'func'.
-
-2002-08-29 Ken Raeburn <raeburn@mit.edu>
-
- * Makefile.in: Revert $(S)=>/ change, for Windows support.
-
-2002-08-23 Ken Raeburn <raeburn@mit.edu>
-
- * Makefile.in: Change $(S)=>/ and $(U)=>.. globally.
-
-2002-08-22 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (init_common): Initialize udp_pref_limit field.
-
-2002-08-15 Tom Yu <tlyu@mit.edu>
-
- * t_ser.c (ser_ccache_test): Remove references to STDIO ccaches.
-
-2002-08-01 Tom Yu <tlyu@mit.edu>
-
- * unparse.c (krb5_unparse_name_ext): Error out if passed a NULL
- pointer. Patch from Mark Levinson; fixes [krb5-admin/1140].
-
-2002-06-26 Ezra Peisach <epeisach@bu.edu>
-
- * appdefault.c (conf_boolean): Change variable from char ** to
- const char ** to prevent warning of const to non-const.
-
- * get_in_tkt.c (_krb5_conf_boolean): Same
-
-2002-06-25 Alexandra Ellwood <lxs@mit.edu>
-
- * appdefault.c, get_in_tkt.c: made conf_yes and conf_no const to
- improve load time on Mach-O
-
- * init_ctx: fixed Mac OS macros
-
- [pullups from 1-2-2-branch]
-
-2001-06-25 Miro Jurisic <meeroh@mit.edu>
-
- * rd_safe.c, rd_priv.c, rd_cred.c, preauth.c, mk_safe.c,
- mk_cred.c, appdefault.c: use "" includes for krb5.h, k5-int.h and
- syslog.h
- [pullup from 1-2-2-branch]
-
-2002-06-18 Ken Raeburn <raeburn@mit.edu>
-
- * sendauth.c (ECONNABORTED): Don't define here now that it's
- defined in port-sockets.h.
-
-2002-06-18 Danilo Almeida <dalmeida@mit.edu>
-
- * princ_comp.c (krb5_realm_compare), auth_con.c
- (krb5_auth_con_setports, krb5_auth_con_getaddrs,
- krb5_auth_con_initivector), addr_order.c (krb5_address_order),
- addr_comp.c (krb5_address_compare): Make KRB5_CALLCONV.
- [pullup from 1-2-2-branch]
-
-2002-06-18 Danilo Almeida <dalmeida@mit.edu>
-
- * bld_princ.c (krb5_build_principal_va): Make
- krb5_build_principal_va() KRB5_CALLCONV.
- [pullup from 1-2-2-branch]
-
-2002-06-12 Ken Raeburn <raeburn@mit.edu>
-
- * preauth.c: Don't include syslog.h.
-
-2002-06-10 Ken Raeburn <raeburn@mit.edu>
-
- * get_in_tkt.c (send_as_request): Update arg list for
- sendto_kdc. If a RESPONSE_TOO_BIG error is returned from the KDC,
- use a TCP connection.
- * send_tgs.c (krb5_send_tgs): Update arg list for sendto_kdc. If
- a RESPONSE_TOO_BIG error is returned from the KDC, use a TCP
- connection.
-
-2002-04-12 Ezra Peisach <epeisach@bu.edu>
-
- * Makefile.in (clean): Remove t_expand and t_expand.o
-
-2002-04-12 Ken Raeburn <raeburn@mit.edu>
-
- * conv_princ.c (struct krb_convert): Add new field 'len'.
- (RC, R, NR): New macros.
- (sconv_list): Use them.
- (krb5_524_conv_principal): Compare lengths and then use memcmp.
-
- * recvauth.c (sendauth_version): Now a const array.
- * sendauth.c (sendauth_version): Now a const array.
- (krb5_sendauth): Cast address when assigning to outbuf data
- field.
-
-2002-04-05 Ken Raeburn <raeburn@mit.edu>
-
- * decrypt_tk.c (krb5_decrypt_tkt_part): Call krb5_c_valid_enctype
- instead of valid_enctype.
- * encode_kdc.c (krb5_encode_kdc_rep): Likewise.
- * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): Likewise.
- * gic_keytab.c (krb5_get_as_key_keytab): Likewise.
- * in_tkt_ktb.c (keytab_keyproc): Likewise.
- * in_tkt_sky.c (skey_keyproc): Likewise.
- * init_ctx.c (krb5_set_default_in_tkt_ktypes,
- krb5_set_default_tgs_enctypes): Likewise.
- * send_tgs.c (krb5_send_tgs): Likewise.
-
- * mk_safe.c (krb5_mk_safe_basic): Call krb5_c_valid_cksumtype,
- krb5_c_is_coll_proof_cksum, krb5_c_is_keyed_cksum instead of
- non-prefixed forms.
- * rd_safe.c (krb5_rd_safe_basic): Likewise.
-
-2002-03-28 Sam Hartman <hartmans@mit.edu>
-
- * Makefile.in : New file init_keyblock.c
-
- * init_keyblock.c (krb5_init_keyblock): New function
-
-2002-03-16 Sam Hartman <hartmans@mit.edu>
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): Fix merge of patch from 1.2.2
- back to mainline.
-
-2002-03-14 Sam Hartman <hartmans@mit.edu>
-
- * walk_rtree.c (krb5_walk_realm_tree): Fix handling of null client or server realm
-
-2002-03-06 Ken Raeburn <raeburn@mit.edu>
-
- * ser_actx.c (krb5_auth_context_externalize): Do bounds checking
- on converted size value.
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): If no session key has been set,
- try getting credentials and use the session key type as a hint
- for the enctype to use for the forwarded credentials.
-
-2002-02-27 Sam Hartman <hartmans@mit.edu>
-
- * rd_cred.c (krb5_rd_cred_basic): Don't check IP addresses; if
- someone knows the key and wants to give us credentials, that's OK.
- No reflection attack is possible in most protocols since krb_cred
- is almost always client->server. Address checking created
- significant problems for NATs. We also ran into problems
- getting our code to work with Heimdal and removing checking was
- easier than a staged upgrade to fix the problems.
- (krb5_rd_cred): Don't pass in addresses
-
-2002-02-22 Ken Raeburn <raeburn@mit.edu>
-
- * addr_comp.c, addr_order.c, addr_srch.c, bld_pr_ext.c,
- bld_princ.c, enc_helper.c, encrypt_tk.c, gen_seqnum.c,
- gen_subkey.c, preauth.c: Use const instead of krb5_const.
- * bld_pr_ext.c, bld_princ.c: Always use stdarg macros and not
- varargs.
-
-2002-01-08 Sam Hartman <hartmans@mit.edu>
-
- * gen_subkey.c (krb5_generate_subkey): Label entropy sources
-
- * init_ctx.c (init_common): Use /dev/urandom if present for random data
-
-2001-12-05 Ezra Peisach <epeisach@mit.edu>
-
- * t_ser.c (main): Free context on failure exit route.
-
- 2001-11-24 Sam Hartman <hartmans@mit.edu>
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): Get a session key for the
- forwarded tgt that is the same as the session key for the
- auth_context. This is an enctype we know the remote side
- supports.
-
-2001-11-26 Sam Hartman <hartmans@mit.edu>
-
- * gen_seqnum.c (krb5_generate_seq_number): add entropy source id
-
- * sendauth.c (krb5_sendauth): Add entropy source ID
-
- * mk_req_ext.c (krb5_mk_req_extended): Add entropy source ID to random seed call
-
- * init_ctx.c (init_common): Specify entropy source for random seed
-
-2001-11-16 Sam Hartman <hartmans@mit.edu>
-
- * init_ctx.c (krb5_set_default_tgs_enctypes): rename from
- set_default_ktypes; old function provided as APIA
-
-2001-11-16 Ezra Peisach <epeisach@mit.edu>
-
- * init_ctx.c (DEFAULT_ETYPE_LIST): Ensure space present after
- arcfour-hmac-md5 entry for when ANSI strings concatenated the
- des-cbc-crc entry was dropped.
-
-2001-11-07 Sam Hartman <hartmans@mit.edu>
-
- * init_ctx.c (DEFAULT_ETYPE_LIST): Add arcfour-hmac-md5; it really
- is probably at least as good as DES
-
-2001-10-10 Danilo Almeida <dalmeida@mit.edu>
-
- * gic_pwd.c (krb5_get_as_key_password),
- gic_keytab.c (krb5_get_as_key_keytab): Use ANSI-style
- declaration in definition.
-
-2001-10-09 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (init_common): After fetching kdc_default_options
- value from krb5.conf, actually use that value. Pointed out by
- Emily Ratliff, <ratliff@austin.ibm.com>.
-
- * get_in_tkt.c, in_tkt_ktb.c, in_tkt_pwd.c, in_tkt_sky.c,
- int-proto.h, mk_req_ext.c, pr_to_salt.c, rd_req_dec.c, ser_actx.c,
- ser_adata.c, ser_addr.c, ser_auth.c, ser_cksum.c, ser_ctx.c,
- ser_eblk.c, ser_key.c, ser_princ.c, t_kerb.c: Make prototypes
- unconditional.
-
-2001-10-05 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c, preauth.c: Drop _MSDOS support.
-
-2001-10-03 Ken Raeburn <raeburn@mit.edu>
-
- * appdefault.c, auth_con.c, bld_pr_ext.c, bld_princ.c, chpw.c,
- conv_princ.c, copy_addrs.c, copy_athctr.c, copy_auth.c,
- copy_cksum.c, copy_creds.c, copy_data.c, copy_key.c, copy_princ.c,
- copy_tick.c, cp_key_cnt.c, decrypt_tk.c, fwd_tgt.c, get_creds.c,
- get_in_tkt.c, gic_keytab.c, gic_opt.c, gic_pwd.c, in_tkt_ktb.c,
- in_tkt_pwd.c, in_tkt_sky.c, init_ctx.c, kfree.c, mk_cred.c,
- mk_error.c, mk_priv.c, mk_rep.c, mk_req.c, mk_req_ext.c,
- mk_safe.c, parse.c, princ_comp.c, rd_cred.c, rd_error.c,
- rd_priv.c, rd_rep.c, rd_req.c, rd_safe.c, recvauth.c, sendauth.c,
- ser_actx.c, ser_ctx.c, serialize.c, set_realm.c, srv_rcache.c,
- str_conv.c, unparse.c, vfy_increds.c, vic_opt.c, x-deltat.y: Don't
- use KRB5_DLLIMP. Don't explicitly declare pointers FAR any more.
-
-2001-09-07 Ken Raeburn <raeburn@mit.edu>
-
- * t_expand.c: New file.
- * Makefile.in (SRCS): Add test-case source files; rebuilt
- dependencies.
- (t_expand.o): Build from t_expand.c now, no special build rule.
-
-2001-09-07 Ken Raeburn <raeburn@mit.edu>
-
- * rd_req_dec.c (krb5_rd_req_decoded_opt): Pass server realm to
- transited-list check, not local realm, in case they're different.
-
-2001-08-21 Ken Raeburn <raeburn@mit.edu>
-
- * walk_rtree.c (krb5_walk_realm_tree): Initialize slen to silence
- compiler warning.
-
-2001-08-08 <epeisach@mit.edu>
-
- * walk_rtree.c (krb5_walk_realm_tree): Do not try to free const char *.
-
- * mk_safe.c (krb5_mk_safe_basic): Do not declare local_addr and
- remote_addr const and then cast the attribute away.
-
- * mk_req_ext.c (krb5_generate_authenticator): Static function -
- remove const attribute from cksum pointer.
-
- * gc_via_tkt.c (krb5_get_cred_via_tkt): Cast unsigned integer
- krb5_error error_value to signed before adding
- ERROR_TABLE_BASE_krb5.
-
-2001-07-31 Ken Raeburn <raeburn@mit.edu>
-
- * chk_trans.c (krb5_check_transited_list): Pointer args now point
- to const.
-
-2001-07-31 Ezra Peisach <epeisach@mit.edu>
-
- * get_in_tkt.c: Cast to unsigned krb5_error error value to
- krb5_error_code before trying to add to ERROR_TABLE_BASE_krb5.
-
-2001-07-30 Ezra Peisach <epeisach@mit.edu>
-
- * sendauth.c (krb5_sendauth): Instead of casting second argument
- to getpeername() and getsockname() to "struct sockaddr *", cast to
- system specific type as determined by autoconf.
-
-2001-07-24 Ezra Peisach <epeisach@mit.edu>
-
- * in_tkt_sky.c (krb5_get_in_tkt_with_skey): Change cast from
- krb5_pointer to krb5_const_pointer to ensure const integrity of
- parameter.
-
- * in_tkt_ktb.c (keytab_keyproc): Add const argument to cast of
- keyseed to struct keytab_keyproc_arg to maintain const status.
-
- * conv_princ.c (krb5_524_conv_principal): Cast argument to memcpy
- to size_t.
-
-2001-07-06 Ezra Peisach <epeisach@mit.edu>
-
- * conv_princ.c (krb5_425_conv_principal): Cast argument to tolower
- to int.
-
- * get_in_tkt.c: Include os-proto.h for _krb5_conf_boolean prototype.
-
- * Makefile.in (LOCALINCLUDES): Add -I$(srcdir)/../os so os-proto.h
- can be included.
-
-2001-06-29 Tom Yu <tlyu@mit.edu>
-
- * init_ctx.c (get_profile_etype_list): Fix etype-counting loop so
- that trailing separator characters (as in the DEFAULT_ETYPE_LIST)
- don't cause another iteration, which was causing the following
- loop to fall off the end of the string due to count being one too
- great.
-
-2001-06-28 Ezra Peisach <epeisach@mit.edu>
-
- * chk_trans.c (foreach_realm): Cleanup loal variable set but never
- used.
-
-2001-06-21 Ezra Peisach <epeisach@mit.edu>
-
- * chk_trans.c: Cast length arguments of %.*s in formats to int.
-
-2001-06-20 Ezra Peisach <epeisach@mit.edu>
-
- * Makefile.in (check-unix): Add $(RUN_SETUP) before invocation of
- transit-tests for shared library environment variables.
-
-2001-06-19 Ken Raeburn <raeburn@mit.edu>
-
- * chk_trans.c: Reimplemented from scratch.
- * transit-tests: New file.
- * Makefile.in (t_expand, t_expand.o): New targets. Build test
- program from chk_trans.c.
- (T_EXPAND_OBJS): New variable.
- (TEST_PROGS): Add t_expand.
- (check-unix): Run transit-tests.
- * t_krb5.conf: Added capaths section.
-
-2001-06-16 Ken Raeburn <raeburn@mit.edu>
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): Copy enctype for new creds from
- tgt.
-
-2001-06-12 Ezra Peisach <epeisach@mit.edu>
-
- * Makefile.in (t_walk_rtree, t_kerb): Do not link against kdb libraries
- for these test executables.
-
- * srv_rcache.c (krb5_get_server_rcache): Cast argument to
- isgraph() to int.
-
- * init_ctx.c: Cast arguments to isspace() to int. If unix is defined,
- include ../krb5_libinit.h. There has to be a better was for windows.
-
- * conv_princ.c (krb5_425_conv_principal): Cast argument to isupper().
- to int.
-
-2001-06-11 Ezra Peisach <epeisach@mit.edu>
-
- * str_conv.c: If strptime() is present on system without a
- prototype, provide one.
-
-2001-06-07 Ezra Peisach <epeisach@mit.edu>
-
- * vfy_increds.c (krb5_verify_init_creds): Get rid of a variable
- that was set in a conditional and never used afterwards.
-
-2001-06-01 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (get_profile_etype_list): Zero out multiple separator
- characters between tokens, so the second can be recognized
- properly.
-
-2001-04-04 Tom Yu <tlyu@mit.edu>
-
- * mk_safe.c (krb5_mk_safe): Only use safe_cksumtype from the
- auth_context (derived from the config file or hardcoded default)
- if it's suitable for the enctype of the key we're going to
- use. [pullup from krb5-1-2-2-branch]
-
-2001-03-28 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (DEFAULT_ETYPE_LIST): New macro. Old etype list,
- plus des-md4, with des-crc before des-mdX for now.
- (get_profile_etype_list): Use DEFAULT_ETYPE_LIST.
-
-2001-03-10 Ezra Peisach <epeisach@mit.edu>
-
- * init_ctx.c: Provide a full prototype for init_common().
-
- * recvauth.c (recvauth_common): Declare recvauth_common as static.
-
- * parse.c, sendauth.c: Changes to prevent shadowing of local
- variables.
-
- * get_in_tkt.c, tgtname.c: Include int-proto.h for prototypes.
-
-2001-03-03 Ken Raeburn <raeburn@mit.edu>
-
- * preauth2.c (pa_sam): Return an error if no prompter was
- provided.
-
-2001-02-15 Ezra Peisach <epeisach@mit.edu>
-
- * t_deltat.c (main): Test of overflow and underflow of krb5_int32.
-
- * x-deltat.y: Test for over/underflow of krb5_int32 for a
- krb5_deltat. Return EINVAL. [krb5-libs/922]
-
- * deltat.c: Regenerated from x-deltat.y
-
- * str_conv.c (krb5_string_to_timestamp): Do not accept a time
- format that only partially matches the input string. [krb5-lib/922]
-
-2001-01-30 Tom Yu <tlyu@mit.edu>
-
- * preauth.c (krb5_obtain_padata): Don't dereference a NULL pointer
- if we receive an empty ETYPE_INFO preauth. [krb5-libs/903 from
- craziboy77@hotmail.com]
-
- * preauth2.c (krb5_do_preauth): Don't dereference a NULL pointer
- if we receive an empty ETYPE_INFO preauth. [krb5-libs/903 from
- craziboy77@hotmail.com]
-
-2001-01-30 Ezra Peisach <epeisach@mit.edu>
-
- * rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): Free
- krb5_keytab_entry if call to krb5_decrypt_tkt_part()
- fails. [krb5-libs/855 reported by guy@packeteer.com]
-
-2001-01-19 Ken Raeburn <raeburn@mit.edu>
-
- * preauth.c: Don't use PROTOTYPE macro, just always use the
- prototypes.
-
-2001-01-19 Tom Yu <tlyu@mit.edu>
-
- * preauth.c: Remove uses of KRB5_NPROTOTYPE() macro.
-
-2000-10-26 Ezra Peisach <epeisach@mit.edu>
-
- * t_ser.c: Cast getpid() calls to int as arguments to sprintf.
-
- * ser_actx.c: Move prototypes (listed below) to int-proto.h
-
- * int-proto.h: Add prototypes for krb5_ser_authdata_init,
- krb5_ser_address_init, krb5_ser_authenticator_init,
- krb5_ser_checksum_init, krb5_ser_keyblock_init,
- krb5_ser_principal_init.
-
- * ser_adata.c, ser_addr.c, ser_auth.c, ser_cksum.c, ser_key.c,
- ser_princ.c: Include int-proto.h for prototypes.
-
-2000-10-17 Ezra Peisach <epeisach@mit.edu>
-
- * bld_pr_ext.c, bld_princ.c (krb5_build_principal_ext,
- krb5_build_principal_va, krb5_build_principal): Take an unsigned
- int realm length.
-
- * get_in_tkt.c (krb5_get_init_creds): Use SALT_TYPE_AFS_LENGTH
- instead of -1.
-
- * gic_pwd.c (krb5_get_as_key_password): Use SALT_TYPE_AFS_LENGTH
- instead of -1.
-
- * in_tkt_pwd.c (pwd_keyproc): Argument to krb5_read_password is
- unsigned int.
-
- * pr_to_salt.c (krb5_principal2salt_internal): Declare as
- static. Unsigned int fix.
-
- * preauth.c (krb5_obtain_padata): Use SALT_TYPE_AFS_LENGTH instead
- of -1.
-
- * preauth2.c (pa_salt): Use SALT_TYPE_AFS_LENGTH instead of -1.
-
- * conv_princ.c, copy_auth.c, copy_princ.c, gc_frm_kdc.c, parse.c,
- send_tgs.c, srv_rcache.c: Unsigned/signed int cleanup.
-
- * unparse.c (krb5_unparse_name_ext): size parameter changed to
- unsigned int *.
-
-2000-10-04 Ezra Peisach <epeisach@mit.edu>
-
- * rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): Fix memory leak if
- krb5_decrypt_tkt_part() fails. [krb5-libs/855]
-
-2000-10-03 Ezra Peisach <epeisach@mit.edu>
-
- * srv_rcache.c (krb5_get_server_rcache): Signed vs unsigned int
- warning fix.
-
- * pr_to_salt.c (krb5_principal2salt_internal): Add prototype for
- internal function, and declare static.
-
- * copy_addrs.c (krb5_copy_addresses): Cleanup unsigned vs signed
- warnings as arguments to malloc().
-
-Tue Sep 26 13:00:54 2000 Ezra Peisach <epeisach@mit.edu>
-
- * conv_princ.c (krb5_425_conv_principal): Call profile_free_list
- on v4realms during the iteration loop. Do not call
- profile_release_string with a NULL pointer.
-
-2000-09-25 Ezra Peisach <epeisach@mit.edu>
-
- * t_kerb.c: Add prototypes for test functions.
-
-2000-08-29 Ken Raeburn <raeburn@mit.edu>
-
- * get_creds.c (krb5_get_credentials_core): If the supplied enctype
- is not supported, return an error; can't satisfy both
- TC_SUPPORTED_KTYPES and TC_MATCH_KTYPE that way. Delete unused
- arguments CCACHE and OUT_CREDS; fix callers.
-
-2000-07-18 Ezra Peisach <epeisach@mit.edu>
-
- * vfy_increds.c: include int-proto.h for krb5_libdefault_boolean
- prototype.
-
- * t_ser.c (ser_eblock_test): ifdef out old eblock serialization
- test which is no longer called. (see 1999-09-01 ChangeLog)
-
- * t_kerb.c: Cast argument to fprintf to long to agree with format
- string.
-
- * t_deltat.c: If MIN is defined, undef before redefined as 60.
-
- * str_conv.c: Provide strptime prototype if the system header
- files fail to provide a prototype.
-
- * int-proto.h: Add prototype for krb5_libdefault_boolean()
-
-2000-06-30 Tom Yu <tlyu@mit.edu>
-
- * conv_princ.c (krb5_425_conv_principal): NULL, not nil.
-
-2000-06-30 Miro Jurisic <meeroh@mit.edu>
-
- * conv_princ.c (krb5_425_conv_principal): Fixed a memory leak
-
-2000-06-29 Ezra Peisach <epeisach@engrailed.mit.edu>
-
- * t_walk_rtree.c (main): Declare as returning int.
-
- * get_in_tkt.c (_krb5_conf_boolean): Declare as taking a const char *
-
- * str_conv.c (krb5_timestamp_to_string): Work around gcc's warning
- that %c format in strftime might return only two digits for the
- year.
-
- * mk_safe.c, rd_rep.c, send_tgs.c: Remove unused goto label.
-
- * kdc_rep_dc.c (krb5_kdc_rep_decrypt_proc): Remove code with no
- effect.
-
- * init_ctx.c: Make krb5_brand[] look used.
-
- * chpw.c, decode_kdc.c, decrypt_tk.c, enc_helper.c, get_creds.c,
- get_in_tkt.c, gic_keytab.c, gic_pwd.c, preauth2.c, vfy_increds.c:
- Add parentheses around assignment used as truth value
-
-2000-06-28 Ezra Peisach <epeisach@mit.edu>
-
- * conv_princ.c, get_creds.c, get_in_tkt.c, mk_rep.c, parse.c,
- send_tgs.c: Remove unused variable.
-
-2000-06-23 Miro Jurisic <meeroh@mit.edu>
-
- * conv_princ.c (krb5_425_conv_principal): Fixed v4->v5 realm
- name conversion
-
- * conv_princ.c (krb5_425_conv_principal): Honor v4/v5 realm name
- differences when convertion from v4 principals to v5.
-
-2000-06-23 Tom Yu <tlyu@mit.edu>
-
- * get_creds.c (krb5_get_credentials): Translate KRB5_CC_NOTFOUND
- returned from krb5_get_cred_from_kdc() if a prior call to
- krb5_cc_retrieve_cred() returned KRB5_CC_NOT_KTYPE.
-
- * rd_priv.c (krb5_rd_priv_basic): Delete code that was incorrectly
- doing explicit ivec chaining; c_decrypt() does it now.
-
- * mk_priv.c (krb5_mk_priv_basic): Delete code that was incorrectly
- doing explicit ivec chaining; c_encrypt() does it now.
-
- * conv_princ.c (krb5_524_conv_principal): Make a copy of the krb5
- realm that is nul-terminated to avoid falling off the end of the
- krb5 realm, which is not necessarily nul-terminated.
-
-2000-06-23 Danilo Almeida <dalmeida@mit.edu>
-
- * init_ctx.c (krb5_get_tgs_ktypes, krb5_free_ktypes): Fix linkage to
- be KRB5_CALLCONV.
-
-2000-06-23 Ken Raeburn <raeburn@mit.edu>
-
- * get_in_tkt.c (krb5_get_in_tkt): If enctypes are specified, send
- the server the intersection of that list and the supported types,
- in the order requested.
-
- * recvauth.c (krb5_recvauth_version): New routine, takes a
- krb5_data in which to store the client's application version
- string.
- (recvauth_common): Renamed from krb5_recvauth, added above
- functionality depending on extra argument values.
- (krb5_recvauth): New stub, calls above routine with extra dummy
- values.
-
- * kfree.c: Remove unneeded "return" statements at the end of many
- functions.
- (krb5_free_*_content, krb5_free_*_contents,
- krb5_free_cred_enc_part, krb5_free_pwd_sequences): Set freed
- pointer members to null when containing structure isn't being
- freed.
-
- * t_kerb.c (test_524_conv_principal): New test code, to exercise
- bbense's code addition.
- (main, usage): Updated.
- * t_krb5.conf: Added stanford.edu->IR.STANFORD.EDU mapping, and a
- test case for improperly long v4 realm names.
- * Makefile.in (check-unix): Run 524 conversion test for some test
- Athena and Stanford names.
- * t_ref_kerb.out: Updated.
-
- * init_ctx.c (init_common): Feed current-microsecond time and
- process-id into PRNG, instead of just current-second time.
- * mk_req_ext.c (krb5_mk_req_extended): Feed current time into
- PRNG if a subkey will be generated.
- * sendauth.c (krb5_sendauth): Feed local and remote addresses of
- socket, if they can be determined, into the PRNG if a subkey will
- be used.
-
- * init_ctx.c (krb5_free_ktypes): New routine, to free values
- returned by krb5_get_tgs_ktypes, krb5_get_permitted_enctypes, and
- krb5_get_default_in_tkt_ktypes.
- (krb5_set_default_tgs_ktypes, krb5_is_permitted_enctype): Use it.
- (get_profile_etype_list): Use passed-in enctype list if the
- passed-in count is non-zero, instead of checking the
- in_tkt_ktype_count value in the context.
-
-2000-06-23 Ken Raeburn <raeburn@mit.edu>
- Nalin Dahyabhai <nalin@redhat.com>
-
- * conv_princ.c (krb5_524_conv_principal): Return an error if name
- is too long. Use memcpy for character data since we already know
- the length.
-
-2000-06-23 Nalin Dahyabhai <nalin@redhat.com>
-
- * kfree.c (krb5_free_keyblock_contents): Set contents pointer to
- null after freeing.
-
- * chk_trans.c (krb5_check_transited_list): Don't overflow buffers
- "prev" and "next".
- * conv_princ.c (krb5_425_conv_principal): Don't overflow buffer
- "buf".
-
-2000-06-23 Ken Raeburn <raeburn@mit.edu>
- Booker C. Bense <bbense@networking.stanford.edu>
-
- * conv_princ.c (krb5_524_conv_principal): Look up v4_realm in
- config file, in case site's krb4 realm name isn't the same as the
- krb5 realm name.
-
-2000-05-31 Wilfredo Sanchez <tritan@mit.edu>
-
- * fwd_tgt.c: Check for existance of <memory.h>.
- [from Nathan Neulinger <nneul@umr.edu>]
-
-2000-5-19 Alexandra Ellwood <lxs@mit.edu>
-
- * sendauth.c, fwd_tgt.c: Changed to use krb5int_cc_default. This function
- supports the Kerberos Login Library and pops up a dialog if the cache does
- not contain valid tickets. This is used to automatically get a tgt before
- obtaining service tickets. Note that this should be an internal function
- because callers don't expect krb5_cc_default to pop up a dialog!
- (We found this out the hard way :-)
-
-2000-05-15 Jeffrey Altman <jaltman@columbia.edu>
-
- * Added new source file appdefault.c
- Implements new public functions
-
- krb5_appdefault_string
- krb5_appdefault_boolean
-
-2000-04-28 Alexandra Ellwood <lxs@mit.edu>
-
- * gic_pwd.c (krb5_init_creds_password) added code to return to
- login library if the password is expired (login library handles
- this error appropriately).
-
-2000-04-08 Tom Yu <tlyu@mit.edu>
-
- * vfy_increds.c (krb5_verify_init_creds): appdefault_boolean ->
- libdefault_boolean; it somehow got missed earlier.
-
-2000-04-07 Jeffrey Altman <jaltman@columbia.edu>
-
- * gic_pwd.c (krb5_get_init_creds_keytab), gic_pwd.c
- (krb5_get_init_creds_password) when determining whether or not to
- retry with a "master kdc" do not retry if the return value from
- the first attempt was KRB5_REALM_CANT_RESOLV. Also, do not
- overwrite the return code if the return value from the access to
- the "master kdc" was KRB5_REALM_CANT_RESOLV.
-
-2000-03-15 Danilo Almeida <dalmeida@mit.edu>
-
- * init_ctx.c (init_common), gic_pwd.c (krb5_get_as_key_password,
- krb5_get_init_creds_password), preauth2.c (pa_sam): Add support
- for krb5_get_prompt_types().
-
-2000-03-13 Ken Raeburn <raeburn@mit.edu>
-
- * preauth2.c (pa_function): Called function now takes new
- krb5_enctype pointer argument.
- (pa_salt, pa_sam): Accept new arg, ignore it.
- (pa_enc_timestamp): Accept new arg. If value pointed to is
- nonzero, pass it to get-AS-key fn instead of first requested
- enctype. Added some debugging fprintf calls, conditionally
- compiled.
- (krb5_do_preauth): Accept new arg, and pass it through to the
- specific preauth functions. Added some debugging fprintf calls,
- conditionally compiled.
-
- * get_in_tkt.c (krb5_get_init_creds): Pass etype pointer to
- krb5_do_preauth.
-
-2000-03-12 Ezra Peisach <epeisach@mit.edu>
-
- * addr_comp.c, addr_order.c, addr_srch.c, bld_pr_ext.c,
- bld_princ.c, encrypt_tk.c, gen_seqnum.c, gen_subkey.c: Change
- prototypes to use krb5_const instead of const to match the entries
- in krb5.hin
-
-2000-03-10 Miro Jurisic <meeroh@mit.edu>
-
- * get_in_tkt.c (krb5_get_init_creds): Always initialize local_as_reply
- to avoid returning garbage on error returns.
-
-2000-02-25 Ken Raeburn <raeburn@mit.edu>
-
- * preauth2.c (krb5_do_preauth): Check paorder[h] not h for
- PA_REAL. Fix from Matt Crawford.
-
-2000-02-16 Ken Raeburn <raeburn@mit.edu>
-
- * preauth2.c (pa_sam): In send-encrypted-sad mode, check for magic
- salt length and generate a salt from the principal name if found;
- use the password and salt to generate a key. Provide timestamp if
- nonce is zero, regardless of preauth mode. (Patch from Chas
- Williams.)
-
-2000-02-07 Ken Raeburn <raeburn@mit.edu>
-
- * gic_pwd.c (krb5_get_as_key_password): If the as_key enctype is
- already set to the correct type, do continue and ask for the
- password anyways. (Patch from Chas Williams, PR krb5-libs/730.)
-
- * preauth2.c (pa_sam): If no sam_flags were set, return
- KRB5_PREAUTH_BAD_TYPE, because we don't currently handle that
- case.
-
-2000-02-06 Ken Raeburn <raeburn@mit.edu>
-
- * preauth2.c (pa_sam): Remove unused variable use_sam_key.
- (SAMDATA): Cast first result to int, which is what sprintf needs.
- (pa_salt): Delete unused variable ret.
-
- Patches from Frank Cusack:
- * kfree.c (krb5_free_predicted_sam_response_contents): Fix typo.
- Free new data fields if needed.
- (krb5_free_enc_sam_response_enc_contents): Update for field name
- change.
- * preauth.c (obtain_sam_padata): Update for field name change.
- * preauth2.c (pa_sam): Likewise.
-
-2000-01-27 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (get_profile_etype_list): Discard DESONLY changes
- from 1999-09-01, and revert call sites.
-
-1999-12-02 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (get_profile_etype_list): Report an error if no
- recognized enctypes are found in the config file.
-
-1999-11-23 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (init_common): Renamed from krb5_init_context, now
- static. New argument SECURE provides initialization of
- profile_secure field.
- (krb5_init_context): Call it.
- (krb5_init_secure_context): New function.
-
- * in_tkt_ktb.c (keytab_keyproc): Now static.
- * in_tkt_pwd.c (pwd_keyproc): Now static.
- * in_tkt_sky.c (skey_keyproc): Now static.
-
- * preauth2.c (krb5_do_preauth): Fix syntax in switch statement.
- Cast padata contents pointer to avoid warning.
- (pa_types): Now static.
-
- * str_conv.c (krb5_deltat_to_string): Always write to a local
- temporary buffer that's guaranteed to be large enough, then see if
- the supplied output buffer is big enough.
- (krb5_string_to_deltat): Deleted.
- * x-deltat.y, deltat.c: New files.
- * Makefile.in (deltat.c): Add rule for building from x-deltat.y,
- but comment out dependencies for easier maintenance.
- (BISON, BISONFLAGS): New variables.
-
- * str_conv.c: Removed most static char arrays, substituting the
- values in place.
- (krb5_string_to_timestamp): Move atime_format_table inside here.
- (krb5_timestamp_to_sfstring): Move sftime_format_table inside
- here.
-
- * str_conv.c: If strftime or strptime are not available, include
- the renamed NetBSD versions, and define the function names as
- macros to map them to the replacement names.
- (__P, _CurrentTimeLocale, dummy_locale_info, TM_YEAR_BASE,
- DAYSPERLYEAR, DAYSPERNYEAR, DAYSPERWEEK, isleap, tzname, tzset):
- Define some dummies for strftime/strptime to use.
- (strptime): Deleted old stub version.
- (krb5_timestamp_to_string, krb5_timestamp_to_sfstring): Always
- assume strftime is available.
- (krb5_string_to_timestamp): Assume strptime is always available.
- * strftime.c, strptime.c: New files, based on NetBSD versions.
- Modified to rename the functions and not export any symbols.
-
- * Makefile.in (T_DELTAT_OBJS): New variable.
- (TEST_PROGS): Add t_deltat.
- (t_deltat): Add rule.
- (clean): Added t_deltat stuff. Run rm only once.
- * t_deltat.c: New file.
-
-1999-11-02 Ken Raeburn <raeburn@mit.edu>
-
- * t_ref_kerb.out: Fix expected zephyr/zephyr output.
-
-1999-10-26 Wilfredo Sanchez <tritan@mit.edu>
-
- * Makefile.in: Clean up usage of CFLAGS, CPPFLAGS, DEFS, DEFINES,
- LOCAL_INCLUDES such that one can override CFLAGS from the command
- line without losing CPP search patchs and defines. Some associated
- Makefile cleanup.
-
-1999-10-12 Ken Raeburn <raeburn@mit.edu>
-
- * conv_princ.c (sconv_list): Don't do conversion for "zephyr"
- principal. (Noticed by Derrick Brashear.) Delete about a dozen
- duplicate entries.
-
-1999-09-01 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (get_profile_etype_list): Update name of the des3
- entry in the default etype list.
-
- * init_ctx.c (get_profile_etype_list): New argument DESONLY; if
- set, ignore any ktype values other than NULL, DES_CBC_CRC, and
- DES_CBC_MD5.
- (krb5_get_default_in_tkt_ktypes, krb5_get_tgs_ktypes): Set it.
- (krb5_get_permitted_enctypes): Don't set it.
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): Use KRB5_TC_SUPPORTED_KTYPES
- when calling krb5_cc_retrieve_cred.
- * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): Ditto.
- * get_creds.c (krb5_get_credentials_core): Set that flag.
- (krb5_get_credentials): Check for KRB5_CC_NOT_KTYPE error return.
-
- * t_ser.c (main): Disable eblock serialization test, since the
- code it tests was disabled nearly a year ago.
-
- * str_conv.c (krb5_timestamp_to_sfstring): Don't pass extra
- argument to sprintf.
-
-1999-08-10 Alexandra Ellwood <lxs@mit.edu>
-
- * chpw.c (krb5_mk_chpw_req):
- Added call to free cipherpw.data. cipherpw.data is allocated
- by krb5_mk_priv and passed back. Since cipherpw is never
- passed back, krb5_mk_chpw_req should free it.
-
-1999-08-05 Danilo Almeida <dalmeida@mit.edu>
-
- * init_ctx.c (krb5_init_context): Document why krb5_win_ccdll_load
- is called way early in code. (It is because we need to have the
- ccapi stuff loaded before trying to get the OS-specific context
- initialization where we figure out default cache names and such.)
-
-1999-08-05 Danilo Almeida <dalmeida@mit.edu>
-
- * init_ctx.c (get_profile_etype_list): Use profile_release_string
- to free string allocated by profile_get_string.
- (krb5_init_context): Use a real context for krb5_win_ccdll_load.
-
- * get_in_tkt.c (krb5_appdefault_string):
- * conv_princ.c (krb5_425_conv_principal): Use profile_free_list
- to free values allocated by profile_get_values.
-
-1999-08-04 Danilo Almeida <dalmeida@mit.edu>
-
- * get_in_tkt.c (_krb5_conf_boolean, krb5_appdefault_boolean):
- Rename krb5_conf_boolean to _krb5_conf_boolean to denote that
- it is not public so that folks outside the libraries won't
- be tempted to use it.
-
-1999-08-03 Danilo Almeida <dalmeida@mit.edu>
-
- * get_creds.c (krb5_validate_or_renew_creds): Intialize out_creds
- pointer to 0 and then check whether it is 0 before trying to
- dereference it, in case lower-level routine failed to assign
- a value to it.
-
-1999-07-22 Jeffrey Altman <jaltman@columbia.edu>
-
- get_in_tkt.c: rename conf_boolean to krb5_conf_boolean so that
- it may be used in additional modules.
-
-1999-06-28 Tom Yu <tlyu@mit.edu>
-
- * enc_helper.c (krb5_encrypt_helper): NULL out the pointer to the
- ciphertext if there is an error; this prevents stuff farther up
- from freeing freed memory.
-
-1999-06-18 Ken Raeburn <raeburn@mit.edu>
-
- * init_ctx.c (krb5_free_context): Set field pointers to NULL after
- freeing targets, in case higher-level code retains pointers into
- the context structure. (From Jeffrey Altman.)
-
-Thu May 13 17:31:34 1999 Theodore Y. Ts'o <tytso@mit.edu>
-
- * init_ctx.c (krb5_init_context): Pass the context to
- kkrb5_win_ccdll_load so that it can register the FILE
- ccache type if using ccapi (so that the FILE ccache type
- will always work).
-
-Mon May 10 15:26:00 1999 Danilo Almeida <dalmeida@mit.edu>
-
- * Makefile.in: Do win32 build in subdir.
-
-1999-04-09 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * kfree.c (krb5_free_sam_challenge, krb5_free_sam_challenge_contents,
- krb5_free_sam_response, krb5_free_sam_response_contents,
- krb5_free_predicted_sam_response,
- krb5_free_predicted_sam_response_contents,
- krb5_free_enc_sam_response_enc,
- krb5_free_enc_sam_response_enc_contents,
- krb5_free_pa_enc_ts): Added new functions. Part of
- patches from [krb5-kdc/662]
-
- * gic_pwd.c (krb5_get_init_creds_password): Add new argument to
- calls to the prompter function. Part of patches from
- [krb5-kdc/662].
-
- * preauth2.c (pa_enc_timestamp, pa_sam): Update calls to new
- prompter function. [krb5-kdc/662].
-
-1999-03-31 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * init_ctx.c (krb5_init_context): Call krb5_win_ccdll_load() to
- load the krbcc32.dll under windows.
-
-Mon Mar 8 22:39:01 1999 Tom Yu <tlyu@mit.edu>
-
- * sendauth.c (krb5_sendauth): Set credspout to NULL if it's
- destined to be returned to avoid freeing it. Also,
- unconditionally free credspout if it's non-NULL so that if someone
- doesn't pass in a ticket and doesn't give us a non-NULL out_creds,
- we don't leak it. [krb5-libs/699]
-
-1998-11-13 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * Makefile.in: Set the myfulldir and mydir variables (which are
- relative to buildtop and thisconfigdir, respectively.)
-
-Mon Nov 2 19:00:23 1998 Tom Yu <tlyu@mit.edu>
-
- * str_conv.c: Remove krb5_cksumtype_to_string after merge.
-
-1998-10-27 Marc Horowitz <marc@mit.edu>
-
- * vfy_increds.c: rearrange the code a bit to make it more clear
- that the logic is correct.
-
- * str_conv.c: remove enctype and cksumtype string converstions.
- They're in the crypto library now, since the information drops
- right into the enctype table.
-
- * ser_eblk.c: ifdef the whole file out, since it's not used
- anywhere. it should probably be deleted, but I'm not sure about
- backward-compatibility issues yet.
-
- * rd_req_dec.c: check the auth_context permit-all flag and
- permitted_enctypes list, and reject the request if the policy
- check fails.
-
- * init_ctx.c: add code to initialize the prng. It's not great,
- but can be improved, and the prng is reseeded when new keys are
- processed. Read permitted_enctypes from the krb5.conf file, and
- provide accessor functions for it. Make the various etype list
- parsers share code as a side effect.
-
- * get_creds.c: add krb5_get_{validat,renew}ed_creds functions,
- which are part of the new init_creds api. The prototypes were
- already in, krb5.hin but there was no implementing code.
-
- * auth_con.c, auth_con.h: add a list of permitted enctypes to the
- auth_context for rd_req to check, and create accessor functions
- for this list.
-
- * Makefile.in, enc_helper.c: add enc_helper.c. This provides a
- wrapper around the conventional way the library encrypts and wraps
- encoded asn.1 structures, so the code isn't repeated in a dozen
- places.
-
-Wed Aug 19 17:27:51 1998 Tom Yu <tlyu@mit.edu>
-
- * conv_princ.c: Add some additional entries to sconv_list that
- were forgotten.
-
-Wed Jul 15 11:46:05 1998 Ezra Peisach <epeisach@mit.edu>
-
- * gic_pwd.c (krb5_get_init_creds_password): Remove unused argument
- to sprintf().
-
- * t_ref_kerb.out: Fix test case for zephyr principal to reflect
- addition to conv_princ.c
-
-Tue Jul 7 17:06:13 1998 Theodore Y. Ts'o <tytso@mit.edu>
-
- * conv_princ.c: Add additional commonly seen Kerberos V4 services
- to the hard-coded list.
-
-Tue Jul 7 16:59:03 1998 Tom Yu <tlyu@mit.edu>
-
- * chk_trans.c: Fix up previous fix; short-circuit out when
- trans->length == 0.
-
-Wed Jul 1 17:59:26 1998 Theodore Y. Ts'o <tytso@mit.edu>
-
- * chk_trans.c (krb5_check_transited_list): Fix use of an
- uninitialized variable; apparently the code was depending
- on the stack garbage being non-zero(!)
-
-1998-05-26 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * srv_rcache.c (krb5_get_server_rcache):
- * auth_con.c (krb5_auth_con_setrcache): Export this function in
- Windows DLL.
-
-1998-05-12 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * str_conv.c (krb5_timestamp_to_sfstring): Make sure the date
- string printed uses 4 digit years.
-
-1998-05-08 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * str_conv.c (krb5_string_to_timestamp, strptime): Fix routines to
- be able to properly parse Y2K dates.
-
- * t_kerb.c: Add ability to test krb5_string_to_timestamp
-
-1998-05-06 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * t_ser.c (main): POSIX states that getopt returns -1
- when it is done parsing options, not EOF.
-
-1998-05-05 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * get_in_tkt.c (krb5_get_init_creds): If
- libdefaults/{REALM}/noaddresses is true, then don't put
- any addresses in the ticket request.
-
-Mon May 4 15:54:07 1998 Tom Yu <tlyu@mit.edu>
-
- * get_in_tkt.c: Add prototype for make_preauth_list.
-
-Sat May 2 21:46:02 1998 Tom Yu <tlyu@mit.edu>
-
- * get_in_tkt.c (krb5_get_in_tkt): Add missing argument to call to
- make_preauth_list to avoid stack smashing. Pointed out by lxs.
-
-Mon Mar 16 19:50:55 1998 Tom Yu <tlyu@mit.edu>
-
- * chk_trans.c (krb5_check_transited_list): Check lengths when
- appending to next and prev.
-
-Fri Feb 27 18:03:33 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * Makefile.in: Changed thisconfigdir to point at the lib/krb5
- directory, since we've moved the configure.in tests in
- this directory to the toplevel lib/krb5 configure.in
-
-Thu Feb 19 19:03:20 1998 Tom Yu <tlyu@mit.edu>
-
- * recvauth.c (krb5_recvauth): Add some bookkeeping flags so we
- know how much stuff to free upon cleanup. Fix the up cleanup
- code.
-
-Wed Feb 18 16:24:02 1998 Tom Yu <tlyu@mit.edu>
-
- * Makefile.in: Remove trailing slash from thisconfigdir. Fix up
- BUILDTOP for new conventions.
-
-Fri Feb 13 15:27:35 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * Makefile.in: Added new file kfree.c, which contained all of the
- functions previously in the lib/krb5/free directory.
-
-Mon Feb 2 17:02:29 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * Makefile.in: Define BUILDTOP and thisconfigdir in the Makefile
-
-Thu Feb 5 23:48:34 1998 Theodore Y. Ts'o <tytso@mit.edu>
-
- * rd_cred.c (krb5_rd_cred):
- * rd_safe.c (krb5_rd_safe):
- * rd_priv.c (krb5_rd_priv): Use the remote_subkey first, since the
- mk_* routines try to use their local_subkey first.
- Otherwise, the wrong keys will get used if subkeys are
- used in both directions.
-
-Fri Jan 2 21:21:29 1998 Tom Yu <tlyu@mit.edu>
-
- * preauth.c (handle_sam_labels):
- (obtain_sam_padata): Check return of malloc. [krb5-libs/518]
-
- * chpw.c (krb5_mk_chpw_req): Check return of malloc.
- (krb5_rd_chpw_rep): Check return of malloc. [krb5-libs/518]
-
-Tue Dec 16 00:08:33 1997 Tom Yu <tlyu@mit.edu>
-
- * mk_req_ext.c (krb5_mk_req_extended): Check enctype of session
- key, not that of the ticket, which we really shouldn't care about.
-
-Sun Dec 7 07:24:23 1997 Ezra Peisach <epeisach@dumpster.rose.brandeis.edu>
-
- * gic_pwd.c (krb5_get_init_creds_password): Change fourth argument
- in call to prompter (which is an int) from NULL to 0.
-
-Sat Dec 6 02:28:17 1997 Tom Yu <tlyu@mit.edu>
-
- * Makefile.in: Add files chpw.c, gic_*, preauth2.c, vfy_increds.c,
- vic_opt.c.
-
- * chpw.c: New file; implement Cygnus chpw.
-
- * get_in_tkt.c: Implement support for Cygnus initial credentials
- API.
-
- * gic_keytab.c: New file; Cygnus initial creds.
-
- * gic_opt.c: New file; Cygnus initial creds.
-
- * gic_pwd.c: New file; Cygnus initial creds.
-
- * preauth.c: Add more SAM support (from Cygnus).
-
- * preauth2.c: New file; additional SAM support from Cygnus.
-
- * send_tgs.c: Account for additional parameter to sendto_kdc.
-
- * vfy_increds.c: New file; Cygnus initial creds.
-
- * vic_opt.c: New file; Cygnus initial creds.
-
-Wed Oct 22 00:29:33 1997 Theodore Y. Ts'o <tytso@mit.edu>
-
- * send_tgs.c (krb5_send_tgs): Don't send a zero endtime; if the
- requested endtime is zero, set it equal to the TGT endtime.
-
-Mon Oct 6 12:07:19 1997 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * set_realm.c (krb5_set_principal_realm): Allocate extra byte for
- \0 after realm.
-
-Mon Sep 1 21:38:16 1997 Tom Yu <tlyu@mit.edu>
-
- * rd_cred.c (krb5_rd_cred_basic): Fix swapped args to memset.
-
-Fri Aug 29 16:41:25 1997 Tom Yu <tlyu@mit.edu>
-
- * get_in_tkt.c (krb5_get_in_tkt): Move nulling out of
- request.padata before the os_localaddr call in order to avoid
- freeing a null pointer in the cleanup code.
-
-Tue Aug 12 09:13:22 1997 Ezra Peisach <epeisach@mit.edu>
-
- * init_ctx.c (krb5_init_context): Initialize local variable ctx
- before calling krb5_init_ets.
-
-Fri Aug 8 17:04:54 1997 Tom Yu <tlyu@mit.edu>
-
- * rd_cred.c (krb5_rd_cred_basic): Check remote_addr and
- encpart.s_address before calling krb5_address_compare. Fixes
- krb5-libs/456.
-
-Fri Jul 25 15:25:32 1997 Tom Yu <tlyu@mit.edu>
-
- * t_ser.c: Add support for changed kdb API.
-
-Tue Jul 15 22:15:09 1997 Theodore Y. Ts'o <tytso@mit.edu>
-
- * serialize.c (krb5_register_serializer): Only copy over the old
- table when there's an old table to copy over. Otherwise,
- BoundsChecker complains about memcpy(foo, NULL, 0).
-
-Tue Mar 25 00:32:55 1997 Theodore Y. Ts'o <tytso@mit.edu>
-
- * preauth.c (obtain_sam_padata): Fix handling of the sam-timestamp
- and sam-usec fields, which should always be set if the
- nonce is not available, not just SAM_USE_SAD_AS_KEY is
- being used. [krb5-libs/325]
-
-Mon Mar 24 12:21:38 1997 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * t_ser.c: Clean up error reporting for krb5_init_context(). Also
- report errors for each subtest, so we know which subtest
- failed.
-
-Sat Feb 22 22:39:49 1997 Richard Basch <basch@lehman.com>
-
- * Makefile.in: Use some of the new library list build rules in
- win-post.in
-
-Fri Feb 21 18:38:06 1997 Sam Hartman <hartmans@tertius.mit.edu>
-
- * crypto_glue.c: Move into libcrypto as krb5_glue.c; I need to
- avoid libcrypto depending on libkrb5
-
-Wed Feb 19 14:21:12 1997 Theodore Y. Ts'o <tytso@mit.edu>
-
- * t_kerb.c (test_set_realm): New function used to test
- krb5_set_principal_realm(). Called by using the new "set_realm"
- command to t_kerb.
-
- * set_realm.c (krb5_set_principal_realm): New function which sets
- the realm of a principal.
-
-Thu Feb 13 14:17:00 1997 Richard Basch <basch@lehman.com>
-
- * get_in_tkt.c (krb5_get_in_tkt): Initialize as_reply; if
- krb5_os_localaddr() returns an error, the cleanup
- routine may try to free a garbage pointer (as_reply).
-
-Wed Feb 12 20:47:30 1997 Tom Yu <tlyu@mit.edu>
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): Use the client's realm rather
- than the server's realm for constructing the tgs principal.
- Remove TC_MATCH_SRV_NAMEONLY from call to retrieve_cred()
- because we want to get an exact match.
-
-Mon Feb 10 10:41:36 1997 Ezra Peisach <epeisach@mit.edu>
-
- * crypto_glue.c (krb5_calculate_checksum): Add krb5_const to
- krb5_pointer of in data to match prototype.
-
-Sat Feb 8 15:02:39 1997 Richard Basch <basch@lehman.com>
-
- * get_creds.c:
- Export krb5_get_credentials_{renew,validate} (win32)
- Removed unused variable.
-
-Fri Feb 7 09:41:33 1997 Richard Basch <basch@lehman.com>
-
- * mk_cred.c (krb5_mk_ncred): Declare ncred as krb5_int32 so that
- the right value is pushed onto the stack when calling
- krb5_mk_ncred_basic()
-
- * copy_addrs.c fwd_tgt.c mk_cred.c:
- Use FAR keyword in pointer declarations.
-
- * sendauth.c (krb5_sendauth): Do not free the credentials if they
- are being returned to the caller [krb5-libs/357]
-
-Sun Feb 2 20:57:15 1997 Richard Basch <basch@lehman.com>
-
- * serialize.c: Added FAR declarations to pointer arguments for
- all functions declared as KRB5_DLLIMP.
-
-Thu Jan 30 21:44:37 1997 Richard Basch <basch@lehman.com>
-
- * crypto_glue.c:
- Export more crypto-layer functions:
- krb5_encrypt, krb5_decrypt, krb5_eblock_enctype,
- krb5_process_key, krb5_finish_key, krb5_string_to_key,
- krb5_init_random_key, krb5_finish_random_key, krb5_random_key
-
-Sat Feb 8 18:41:42 1997 Tom Yu <tlyu@mit.edu>
-
- * Makefile.in:
- * configure.in: Update to new program build procedure.
-
-Thu Jan 2 17:16:18 1997 Tom Yu <tlyu@mit.edu>
-
- * Makefile.in:
- * configure.in: Update to new library build procedure.
-
-Mon Dec 23 17:20:03 1996 Theodore Y. Ts'o <tytso@mit.edu>
-
- * Makefile.in (SRCS): Add brand.c to the SRCS line so that the
- kerbsrc.mac.tar includes brand.c
-
-Sat Dec 21 01:26:11 1996 Theodore Y. Ts'o <tytso@mit.edu>
-
- * brand.c: New file, which allows a release engineer to "brand"
- the krb5 library or a binary application program
- statically linked against the krb5 library. This file is
- statically included by init_ctx.c, to force it be in a
- binary library or application program.
-
- * init_ctx.c (krb5_init_context): Use new call krb5_vercheck() for
- Windows timebomb checking; this call returns an error
- code, which is returned to the user if the timebomb should
- be activated.
-
-Thu Nov 21 14:55:16 EST 1996 Richard Basch <basch@lehman.com>
-
- * Makefile.in: win32 build
-
- * auth_con.c bld_pr_ext.c conv_princ.c copy_addrs.c copy_athctr.c
- copy_auth.c copy_cksum.c copy_creds.c copy_data.c copy_key.c
- copy_princ.c copy_tick.c cp_key_cnt.c decrypt_tk.c fwd_tgt.c
- gc_via_tkt.c get_creds.c get_in_tkt.c in_tkt_ktb.c in_tkt_pwd.c
- in_tkt_sky.c init_ctx.c mk_cred.c mk_error.c mk_priv.c mk_rep.c
- mk_req.c mk_req_ext.c mk_safe.c parse.c princ_comp.c rd_cred.c
- rd_error.c rd_priv.c rd_rep.c rd_req.c rd_safe.c recvauth.c
- sendauth.c str_conv.c unparse.c valid_times.c
- DLL export various functions (see lib/krb5.def for full list)
-
-Thu Nov 21 13:54:01 1996 Ezra Peisach <epeisach@mit.edu>
-
- * recvauth.c (krb5_recvauth): If there is an error, and the server
- argument to krb5_recvauth is NULL, create a dummy server
- entry for the krb5_error structure so that krb5_mk_error
- will not die with missing required fields. [krb5-libs/209]
-
-Wed Nov 13 14:30:47 1996 Tom Yu <tlyu@mit.edu>
-
- * init_ctx.c: Revert previous kt_default_name changes.
-
-Tue Nov 12 22:07:33 1996 Tom Yu <tlyu@mit.edu>
-
- * init_ctx.c (krb5_init_context): Oops. Initialize kt_default_name
- to NULL.
-
- * init_ctx.c (krb5_free_context): Free kt_default_name if it's
- non-NULL.
-
-Sat Nov 9 14:19:28 1996 Ezra Peisach <epeisach@mit.edu>
-
- * Makefile.in (check-unix): Invoking t_ser requires that
- KRB5_CONFIG points to a valid krb5.conf
-
- * t_ser.c (main): If verbose flag is set and there is an error,
- display error message.
-
-Wed Nov 6 14:02:21 1996 Theodore Y. Ts'o <tytso@mit.edu>
-
- * init_ctx.c (krb5_init_context): Initialize the error tables, so
- applications don't need to call krb5_init_ets().
-
-Tue Nov 5 08:09:23 1996 Ezra Peisach <epeisach@mit.edu>
-
- * serialize.c (krb5_register_serializer): Do not free a NULL pointer.
-
-Thu Oct 31 13:48:14 1996 Theodore Y. Ts'o <tytso@mit.edu>
-
- * init_ctx.c (krb5_init_context): Make it more obvious that
- default ticket lifetimes is not yet supported.
-
-Tue Sep 24 20:59:14 1996 Theodore Y. Ts'o <tytso@mit.edu>
-
- * get_in_tkt.c (make_preauth_list): Correctly null-terminate the
- preauth list generated by make_preauth_list.
-
-Thu Sep 19 12:29:59 1996 Theodore Y. Ts'o <tytso@mit.edu>
-
- * unparse.c (krb5_unparse_name_ext): Make unparse correctly handle
- a all cases where a principal contains a nulls, backspace,
- newlines, or tabs.
-
- * t_kerb.c (test_parse_principal): Add test for checking
- krb5_parse_principal()
-
- * parse.c (krb5_parse_name): Set all of the magic field values.
-
-Wed Jul 24 17:09:39 1996 Theodore Y. Ts'o <tytso@mit.edu>
-
- * preauth.c (find_pa_system): Change type of first argument to be
- krb5_preauthtype, to eliminate compiler warnings under
- Windows.
-
-Wed Jul 10 20:22:41 1996 Theodore Y. Ts'o <tytso@mit.edu>
-
- * init_ctx.c (krb5_init_context): Add a call to krb5_win_do_init()
- on Win16 and Win32 machines. This is where we do timebomb
- and version server checking.
-
-Sun Jul 7 15:14:43 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * get_creds.c: (krb5_get_credentials_val_renew_core) Combine
- common internals needed from krb5_get_credentials_validate()
- and used by new function krb5_get_credentials_renew()
-
- * gc_frm_kdc.c (krb5_get_cred_from_kdc_renew): A wrapper that
- passes KDC_OPT_RENEW to the static
- krb5_get_cred_from_kdc_opt so that kinit can use it.
-
-
-Mon Jun 24 09:45:04 1996 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * bld_princ.c (krb5_build_principal_va): Change const to
- krb5_const, so that it works on compilers that don't
- support const.
-
-Mon Jun 17 20:23:48 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * str_conv.c (krb5_string_to_timestamp): Ensure that all fields of
- the timestamp are filled in if strptime does not fill in
- unspecified fields.
-
-Wed Jun 12 01:10:09 1996 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * sendauth.c (krb5_sendauth): If ECCONABORTED is not defined, try
- using the Winsock equivalent (WSAECONNABORTED).
-
-Mon Jun 10 21:47:21 1996 Theodore Ts'o <tytso@rsts-11.mit.edu>
-
- * parse.c (krb5_parse_name): Change use of _WINDOWS to _MSDOS, and
- add check for _WIN32.
-
-Thu Jun 6 00:06:18 1996 Theodore Y. Ts'o <tytso@mit.edu>
-
- * get_creds.c (krb5_get_credentials_core): A static function must
- not use the INTERFACE keyword.
-
-Tue May 14 18:39:22 1996 Richard Basch <basch@lehman.com>
-
- * mk_req_ext.c mk_safe.c send_tgs.c:
- set the length field of the krb5_checksum structure before
- calling krb5_calculate_checksum.
-
- * str_conv.c: replaced sha-des3 cksum with hmac-sha.
-
-Tue May 14 02:53:42 1996 Theodore Y. Ts'o <tytso@mit.edu>
-
- * ser_ctx.c (krb5_context_size, krb5_context_externalize,
- krb5_context_internalize): Add missing fields from the
- serialized context: clockskew, default_kdc_req_sumtype,
- default_ap_req_sumtype, default_safe_sumtype,
- kdc_default_options, library_options, profile_secure,
- fcc_default_format, scc_default_format.
-
- * ser_actx.c (krb5_auth_context_size, krb5_auth_context_externalize,
- krb5_auth_context_internalize): Serialize the two fields
- req_cksumtype and safe_cksumtype, instead of the one
- cksumtype field.
-
- * mk_safe.c (krb_mk_safe): Use safe_cksumtype instead of cksumtype
- in the auth context.
-
- * mk_req_ext.c (krb5_mk_req_extended): Use req_cksumtype instead
- of cksumtype in the auth context.
-
- * init_ctx.c (krb5_init_context): Add support for new profile
- relations libdefaults/tkt_lifetime,
- libdefaults/kdc_req_checksum_type,
- libdefaults/ap_req_cksumtype,
- libdefaults/safe_checksumtype, and
- libdefaults/kdc_default_options.
-
- * auth_con.h: Remove old cksumtype element, and replace it with
- req_cksumtype and safe_cksumtype.
-
- * auth_con.c (krb5_auth_con_init): Initialize the req_cksumtype
- and safe_cksumtype from the context's default
- req_cksumtype and safe_cksumtype.
- (krb5_auth_con_set_req_cksumtype,
- krb5_auth_con_set_safe_cksumtype): New functions, to
- replace old krb5_auth_con_setcksumtype
-
-Fri May 10 18:48:38 EDT 1996 Richard Basch <basch@lehman.com>
-
- * init_ctx.c: Removed des3-cbc-md5 default support
-
-Fri May 10 02:51:17 1996 Richard Basch <basch@lehman.com>
-
- * str_conv.c: changes des3-md5 to des3-sha & added sha cksum types
-
-Sun May 5 09:46:18 1996 Ezra Peisach (epeisach@kangaroo.mit.edu)
-
- * preauth.c: Add casts and const keywords as needed.
-
-Fri May 3 00:15:18 1996 Mark Eichin <eichin@cygnus.com>
-
- * get_creds.c (krb5_get_credentials_core): new function. Common
- part of krb5_get_credentials and krb5_get_credentials_validate.
- Some formerly local variables are now arguments.
- (krb5_get_credentials): same as before, but calls _core to do some
- of the work.
- (krb5_get_credentials_validate): uses
- krb5_get_cred_from_kdc_validate and only stores the returned
- credential in the cache, instead of storing all of them.
-
-Thu May 2 22:48:56 1996 Mark Eichin <eichin@cygnus.com>
-
- * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): new function. Same
- body as krb5_get_cred_from_kdc, but takes one new argument,
- kdcopts, and combines it with the other kdc options when calling
- krb5_get_cred_via_tkt. This is static and only called by
- (krb5_get_cred_from_kdc): a wrapper that provides the same
- function it did before, and
- (krb5_get_cred_from_kdc_validate): a wrapper that passes
- KDC_OPT_VALIDATE, so that kinit can use it.
- We'll probably need another one for renewing tickets as well.
-
- * rd_req_dec.c (krb5_rd_req_decoded_opt): new function. Same body
- as krb5_rd_req_decoded, but takes one new argument,
- check_valid_flag, to determine whether or not to check if the
- "invalid flag" is set in the ticket. Also made static, so that it
- is only called via:
- (krb5_rd_req_decoded): wrapper for krb5_rd_req_decoded_opt that
- specifies the "invalid flag" gets checked, and
- (krb5_rd_req_decoded_anyflag): wrapper for krb5_rd_req_decoded_opt
- that specifies that the "invalid flag" doesn't get checked. (This
- version is only called from kdc_util.c:kdc_process_tgs_req.)
-
-Wed May 1 14:30:29 1996 Richard Basch <basch@lehman.com>
-
- * srv_rcache.c (krb5_get_server_rcache): include the uid in the
- default server replay cachename, for systems with geteuid.
-
- * configure.in: test if the system has geteuid()
-
-Wed May 1 02:26:53 1996 Mark Eichin <eichin@cygnus.com>
-
- * str_conv.c (krb5_string_to_timestamp): double check that
- strptime at least parsed *some* of the string, avoid degenerate
- cases from GNU libc strptime.
-
-Tue Apr 30 18:19:01 1996 Ken Raeburn <raeburn@cygnus.com>
-
- * t_ser.c (stuff): New variable.
- (ser_acontext_test, ser_eblock_test, ser_cksum_test): Use it,
- instead of assuming it's valid to treat &FUNCTION as a data
- pointer.
-
- * conv_princ.c (sconv_list): Now const.
- (krb5_*_conv_principal): Use pointer to const for it.
-
- Tue Apr 23 19:39:59 1996 Mark Eichin <eichin@cygnus.com>
-
- * get_creds.c (krb5_get_credentials): this isn't the kernel, so
- don't return negative errno values.
-
-Sat Apr 27 19:14:21 1996 Richard Basch <basch@lehman.com>
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): fixed a possible null dereference.
-
-Wed Apr 17 14:22:10 1996 Theodore Y. Ts'o <tytso@mit.edu>
-
- * conv_princ.c: Added ftp and ecat to the list of services which
- should be converted. This really ought to be something
- that's configurable in the profile...
-
-Thu Apr 11 21:30:23 1996 Theodore Y. Ts'o <tytso@dcl>
-
- * init_ctx.c (krb5_init_context): On a Macintosh, turn on
- kdc_timesync and use the v4 credentials cache by default.
-
- * get_in_tkt.c (stash_as_reply, verify_as_reply): Move time offset
- code from stash_as_reply to verify_as_reply, and fix it so
- that it actually works.
-
-Wed Apr 3 16:04:36 1996 Theodore Y. Ts'o <tytso@dcl>
-
- * rd_req_dec.c (krb5_rd_req_decoded): Move code which
- validated the ticket times to krb5_validate_times.
-
- * valid_times.c (krb5_validate_times): New function which
- determines whether or not the ticket times are valid.
-
- * mk_req_ext.c (krb5_mk_req_extended): Call krb5_validate_time()
- to determine whether or not the ticket in passed-in
- credentials is valid. If it isn't, return an error right
- away.
-
-Wed Mar 27 17:05:47 1996 Richard Basch <basch@lehman.com>
-
- * in_tkt_ktb.c (keytab_keyproc): Do not check to see that the
- enctype of the key is identical; there are several equivalent
- DES enctypes.
-
- * in_tkt_ktb.c (krb5_get_in_tkt_with_keytab): Removed the fancy
- logic to only request the keytypes that correspond to those in
- the keytab. There were too many fencepost conditions that could
- get you into trouble. Either it should be there and *fully*
- functional, or not in there at all. Besides, there are too many
- other components in Kerberos that expect the end-service to know
- all its keys that this sanity check is overkill.
-
-Tue Mar 26 14:45:03 1996 Richard Basch <basch@lehman.com>
-
- * conv_princ.c: added "imap" service to the conversion list as
- requiring domain conversion for the instance. (imap/<host> is used
- by some of the new imap mail implementations)
-
-Sun Mar 24 01:34:14 1996 Sam Hartman <hartmans@tertius.mit.edu>
-
- * send_tgs.c (krb5_send_tgs_basic): You want to setup the eblock
- used for the authenticator using the in_cred->keyblock, *not*
- request.ticket.enc_part.enctype. Under a multi-enctype system,
- the session key may be different from the ticket key.
-
-Wed Mar 20 23:00:59 1996 Theodore Y. Ts'o <tytso@dcl>
-
- * walk_rtree.c (krb5_walk_realm_tree): Fix 16bit vs. 32bit error.
- (cap_code should been a krb5_error_code, not an int!)
-
- * mk_cred.c (krb5_mk_ncred_basic): Fix windows lint flame.
-
- * get_in_tkt.c (krb5_get_in_tkt): Fix 16bit vs. 32bit error.
- (do_more should not have been an int!)
-
-Tue Mar 19 13:03:26 1996 Richard Basch <basch@lehman.com>
-
- * in_tkt_ktb.c (krb5_get_in_tkt_with_keytab):
- Only request keytypes that correspond to those in the keytab.
-
-Mon Mar 18 21:49:39 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * configure.in: Add KRB5_RUN_FLAGS
-
- * Makefile.in: Use runtime flags.
-
-Sun Mar 17 20:32:08 1996 Ezra Peisach <epeisach@dumpster.rose.brandeis.edu>
-
- * configure.in: Add USE_ANAME, USE_KRB5_LIBRARY, KRB5_LIBRARIES so
- that Makefile does not have to know build tree layout.
-
- * Makefile.in: Rework to be consistant with configure defines so
- that configure can specify other needed libraries.
-
-Sun Mar 17 02:10:19 1996 Mark W. Eichin <eichin@cygnus.com>
-
- * copy_addrs.c (krb5_copy_addr): make non-static so we can use it
- in mk_cred.
- * mk_cred.c (krb5_mk_ncred_basic): copy local_addr and remote_addr
- instead of just aliasing them, so we can safely free them ourselves.
-
-Fri Mar 15 14:29:00 1996 Richard Basch <basch@lehman.com>
-
- * in_tkt_ktb.c: Close the keytab if we opened it, not if the
- caller opened it.
-
-Wed Mar 13 17:31:30 1996 Ken Raeburn <raeburn@cygnus.com>
-
- * configure.in: Use AC_HEADER_STDARG.
-
-Mon Mar 11 11:15:26 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * str_conv.c (krb5_timestamp_to_string): Handle statement not
- reached warning.
-
- * ser_addr.c (krb5_address_internalize): Add magic numbers
-
-Thu Feb 29 11:49:38 1996 Theodore Y. Ts'o <tytso@dcl>
-
- * fwd_tgt.c (NEED_SOCKETS): Use NEED_SOCKETS instead of #including
- <netdb.h>
-
-Sat Feb 24 16:27:54 1996 Theodore Y. Ts'o <tytso@dcl>
-
- * gc_via_tkt.c (krb5_get_cred_via_tkt): Fix memory leak; free
- enctypes after use.
-
-Thu Jan 25 01:35:52 1996 Sam Hartman <hartmans@tertius.mit.edu>
-
- * rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): Remove outdated
- comment about mapping etype to ktype.
-
- * gc_via_tkt.c (krb5_get_cred_via_tkt): If the keyblock.enctype is
- non-null in in_cred, then request that particular key.
-
-Wed Jan 24 21:48:53 1996 Sam Hartman <hartmans@tertius.mit.edu>
-
- * get_creds.c (krb5_get_credentials): Only match against enctype
- if it is non-null in increds.
-
-Sun Jan 21 23:32:53 1996 Tom Yu <tlyu@dragons-lair.MIT.EDU>
-
- * gc_via_tkt.c (krb5_kdcrep2creds): Set is_skey so get_creds won't
- break trying to match is_skey in the ccache. This way we
- won't end up with many copies of user-to-user tickets.
-
-Fri Jan 19 23:16:17 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * mk_req.c (krb5_mk_req): krb5_get_credentials does not take
- default_kdc_options.
-
- * sendauth.c (krb5_sendauth): krb5_get_credentials does not take
- default_kdc_options.
-
-Wed Jan 10 21:01:36 1996 Theodore Y. Ts'o <tytso@dcl>
-
- * init_ctx.c (krb5_init_context): Added checking of profile for
- DCE compatability options (ccache type, and checksum type).
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): Initialize addrs to 0 so that we
- don't try to free stack garbage on an error.
-
- * krbconfig.c, Makefile.in: Removed krbconfig.c; it contained
- global variables which are no longer used.
-
- * recvauth.c: Removed the global extern of
- krb5_kdc_default_options, which wasn't being used anyway.
-
- * mk_req.c (krb5_mk_req): Replace use of krb5_kdc_default_options
- with context->kdc_default_options.
-
- * gc_frm_kdc.c: Remove the global extern of krb5_kdc_req_sumtype,
- which wasn't being used anymore anyway.
-
- * send_tgs.c (krb5_send_tgs_basic): Remove use of the global
- variable krb5_kdc_req_sumtype, and use the kdc_req_sumtype
- in the context structure instead.
-
- * walk_rtree.c (krb5_walk_realm_tree): Applied patch submitted by
- Doug Engbert, so that the configurable authentication
- patch takes into account the null entry at the end of the
- list.
-
-Tue Jan 9 22:04:09 1996 Theodore Y. Ts'o <tytso@dcl>
-
- * fwd_tgt.c (krb5_fwd_tgt_creds): New function which handles all
- of the dirty work of forwarding TGT's.
-
- * rd_cred.c (krb5_rd_cred_basic): Clean up memory allocation
- discpline to remove memory leaks.
-
- * mk_cred.c (krb5_mk_ncred_basic, krb5_mk_ncred, krb5_mk_1cred):
- Clean up memory allocation discpline to remove memory
- leaks.
-
- * init_ctx.c (krb5_get_tgs_ktypes): Clean up parsing of the etype
- list. Don't overrun the string containing the etype list.
-
-Wed Jan 3 21:32:59 1996 Theodore Y. Ts'o <tytso@dcl>
-
- * rd_cred.c (krb5_rd_cred_basic): When the keyblock is NULL,
- assume we're being called from the gssapi code, which
- doesn't have access to the sender or receive address
- information, don't check the sender address, since it
- won't be available.
-
- * rd_cred.c (decrypt_credencdata): When calling krb5_rd_credd(),
- if the keyblock is null, just copy the encoded structure
- from the "ciphertext" part of the structure and decode it.
-
- * mk_cred.c (encrypt_credencpart): When calling krb5_mk_cred(), if
- the keyblock is NULL, don't encrypt it; just encode it and
- leave it in the ciphertext area of the structure.
-
-Thu Dec 21 18:47:54 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * rd_rep.c (krb5_rd_rep): Change use of
- KRB5_SENDAUTH_MUTUAL_FAILED to KRB5_MUTUAL_FAILED.
-
-Tue Dec 19 17:15:40 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * rd_cred.c (krb5_rd_cred_basic): Missing parenthesis meant that
- wrong number of bytes was being allocated.
-
-Sun Dec 3 11:49:09 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * Makefile.in (SRCS/OBJS): Move compat_recv.c to krb5util library.
-
-Fri Dec 1 17:04:43 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * recvauth.c (krb5_recvauth): Initialize rcache to zero, so that
- on cleanup we don't try to free stack garbage.
-
-Sun Nov 26 19:31:18 1995 Tom Yu <tlyu@dragons-lair.MIT.EDU>
-
- * preauth.c: Ultrix is broken. Prototype obtain_enc_ts_padata()
- and process_pw_salt() explicitly rather than using the
- typedef in k5-int.h becaus that typedef is to a function
- pointer now.
-
-Fri Nov 17 22:35:52 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * get_in_tkt.c (decrypt_as_reply):
- * preauth.c (process_pw_salt): When fetching the key to decrypting
- the encrypted kdc reply, use the etype associated with the
- etype reply, not the etype associated with the included
- ticket.
-
- * encode_kdc.c: Remove eblock argument from krb5_encode_kdc_rep;
- set the eblock type from the client_key's enctype.
-
-Thu Nov 16 20:29:17 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * srv_rcache.c (krb5_get_server_rcache): Use krb5_rc_default_type
- instead of assuming default rcache type is "dfl".
-
-Mon Nov 13 14:40:05 1995 <tytso@rsts-11.mit.edu>
-
- * walk_rtree.c (krb5_walk_realm_tree): Added ANL changes to
- support configuration authentication paths.
-
-Mon Nov 13 12:57:12 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * preauth.c (krb5_process_padata): Added generalized processing
- for preauth information which is returned by the KDC.
- This should be general enough to support the AFS3_SALT
- preauth type, the SNK4 preauth type, and the public-key
- mods to Kerberos.
- (process_pw_salt): New function for processing the KRB5_PW_SALT
- preauthentication type.
-
- * get_in_tkt.c (decrypt_as_reply): Removed temporary kludge for
- processing the PW_SALT preauth type; that's now done in
- preauth.c
- (krb5_get_in_tkt): Call krb5_process_padata with new arguments so
- that the preauth code can set the decryption_key if
- necessary.
-
-Thu Nov 09 17:05:57 1995 Chris Provenzano (proven@mit.edu)
-
- * in_tkt_pwd.c : Remove krb5_enctype from krb5_string_to_key() args.
-
-Thu Nov 9 00:02:43 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * get_in_tkt.c (krb5_get_in_tkt): Remove the etype_info argument
- from the call to krb5_obtain_padata.
-
- * preauth.c (krb5_obtain_padata): Use the PADATA_ETYPE_INFO
- preauth, if it exists, to determine which salt type to use
- when encrypting the preauthentication data. Remove the
- etype_info argument.
-
-Wed Nov 8 02:50:59 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * krbconfig.c: Removed the krb5_clockskew variable.
-
- * srv_rcache.c (krb5_get_server_rcache):
- * rd_safe.c (krb5_rd_safe):
- * rd_req_dec.c (krb5_rd_req_decoded):
- * rd_priv.c (krb5_rd_priv):
- * rd_cred.c (krb5_rd_cred):
- * gc_via_tkt.c (krb5_get_cred_via_tkt):
- * get_in_tkt.c (verify_as_reply): Replace use of krb5_clockskew
- with context->clockskew.
-
- * encrypt_tk.c (cleanup_scratch): Changed interface to no longer
- require an eblock; we can use our own and figure out the
- enctype from the passed-in key.
-
- * get_in_tkt.c (krb5_get_in_tkt): Added calls to
- krb5_obtain_padata().
-
- * preauth.c: Completely restructured file to support
- preauthentication.
-
-
-Fri Oct 27 22:15:33 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * get_in_tkt.c (krb5_get_in_tkt): Extensive reworking of the
- structure of this file to make it possible to support
- preauthentication.
-
-Mon Oct 23 17:08:59 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * in_tkt_pwd.c (krb5_get_in_tkt_with_password): Fix to properly
- malloc password buffer.
-
-Mon Oct 23 11:09:56 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * rd_req_dec.c (krb5_rd_req_decoded): For heirarchal cross-realm,
- set the length after initializing string.
-
- * rd_req.c (krb5_rd_req): If a new auth_context is created
- and then there is an error, make sure return pointer is not
- looking at freed memory.
-
-Fri Oct 6 22:04:42 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * Makefile.in: Remove ##DOS!include of config/windows.in.
- config/windows.in is now included by wconfig.
-
-Fri Sep 29 00:08:53 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * gc_via_tkt.c (krb5_get_cred_via_tkt): Only check the returned
- starttime to make sure it matches the requested starttime
- if we requested a postdated ticket.
-
-Thu Sep 28 22:58:53 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * conv_princ.c (krb5_425_conv_principal): Only convert instances
- which don't have a '.' in them. If they have a '.',
- assume that they are fully qualified already.
-
-Thu Sep 28 12:00:00 1995 John Rivlin <jrivlin@fusion.com)
-
- * gc_via_tkt.c: Cleaned up corrupt ticket error testing to
- make it more debugable and I think work around a compiler
- bug.
-
-Mon Sep 25 16:57:59 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * Makefile.in: Removed "foo:: foo-$(WHAT)" lines from the
- Makefile.
-
-Wed Sep 13 10:58:20 1995 Keith Vetter (keithv@fusion.com)
-
- * get_in_t.c: removed unused variable.
- * rd_cred.c: removed INTERFACE keyword.
- * ser_auth.c: passing int32 where a size_t is wanted.
- * ser_ctx.c: 16/32 bit int size mismatch.
-
-Sun Sep 17 23:41:19 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * rd_safe.c: Fix typo error.
-
-Sat Sep 16 01:23:14 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * sendauth.c (krb5_sendauth): Make sure the scratch credentials
- structure may have possible been used be freed..
-
- * rd_safe.c (krb5_rd_safe_basic): Fall through to the cleanup code
- at the end, to make sure the decoded message in message is
- freed.
-
- * rd_req_dec.c (krb5_rd_req_decoded): Use krb5_copy_keyblock to
- copy authent->subkey to auth_context->remote_subkey.
- Keeping them separate avoids aliasing problems.
-
- * mk_req_ext.c (krb5_generate_authenticator): Fix memory leak.
- Don't bash authent->subkey with key after carefully
- copying it using krb5_copy_keyblock!
-
- * recvauth.c (krb5_recvauth): krb5_get_server_rcache() already
- opens the rcache; doing it again merely causes a memory leak.
-
-Fri Sep 15 17:20:08 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * gen_subkey.c (krb5_generate_subkey): Eliminate memory leak.
- krb5_init_random_key() does its own allocation of the
- keyblock.
-
- * gc_via_tkt.c (krb5_kdcrep2creds): Fix memory leak.
-
- * srv_rcache.c (krb5_get_server_rcache): Fix memory leak.
-
- * rd_safe.c (krb5_rd_safe_basic): Fix memory leak.
-
-Tue Sep 12 12:40:30 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * t_ser.c (ser_cksum_test): Work around an optimizer bug unser
- OSF/1 and gcc.
-
-Sun Sep 10 12:00:00 1995 James Mattly (mattly@fusion.com)
-
- * gen_seqnum.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
- * get_in_tkt.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
- * mk_priv.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
- * mk_req_ext.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
- * send_tgs.c: change usage of krb5_timeofday over to krb5_crypto_us_timeofday
-
-Wed Sep 06 14:20:57 1995 Chris Provenzano (proven@mit.edu)
-
- * auth_con.c, decrypt_tk.c, encode_kdc.c, encrypt_tk.c,
- * gc_frm_kdc.c, gen_seqnum.c, get_creds.c, get_in_tkt.c,
- * in_tkt_ktb.c, in_tkt_pwd.c, in_tkt_sky.c, init_ctx.c,
- * kdc_rep_dc.c, mk_cred.c, mk_priv.c, mk_rep.c, mk_req._ext.c,
- * preauth.c, rd_cred.c, rd_priv.c, rd_rep.c, rd_req_dec.c,
- * send_tgs.c, sendauth.c, ser_actx.c, ser_ctx.c, ser_eblk.c,
- * ser_key.c, t_ser.c : s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
-
-Wed Sept 6 12:00:00 EDT 1995 James Mattly (mattly@fusion.com)
-
- * get_in_tkt.c: change usage of krb5_timeofday to krb5_crypto_us_timeofday
- * mk_req_ext.c: change usage of timeofday
- * parse.c: disabled a usage of exit for macintosh
- * send_tgs.c: change usage of krb5_timeofday over to
- krb5_crypto_us_timeofday
- * unparse.c: include <stdio.h>
-
-
-Tue Sep 05 22:10:34 1995 Chris Provenzano (proven@mit.edu)
-
- * decode_kdc.c, decrypt_tk.c, encode_kdc.c, encrypt_tk.c, gc_frm_kdc.c
- * gc_via_tkt.c, get_in_tkt.c, in_tkt_ktb.c, in_tkt_pwd.c, in_tkt_sky.c
- * init_ctx.c, kdc_rep_dc.c, mk_cred.c, mk_priv.c, mk_rep.c
- * mk_req_ext.c, rd_cred.c, rd_priv.c, rd_rep.c, rd_req_dec.c,
- * send_tgs.c, ser_ctx.c, ser_eblk.c, ser_key.c, t_ser.c:
- Remove krb5_enctype references, and replace with
- krb5_keytype where appropriate
-
-Fri Sep 1 20:03:41 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * get_in_tkt.c (krb5_get_in_tkt): If kdc_settime is enabled, then
- set the time_offset fields from the returned ticket's
- authtime value.
-
- * init_ctx.c (krb5_init_context): Initialize new fields in
- krb5_context (clockskew, kdc_req_sumtype, and
- kdc_default_options).
-
- * gc_via_tkt.c (krb5_get_cred_via_tkt): Perform the necessary
- sanity checking on the KDC response to make sure we detect
- tampering.
-
- * send_tgs.c (krb5_send_tgs): Set the expected nonce in the
- response structure.
-
- * krbconfig.c: Set the default checksum to use MD5
-
-Fri Sep 1 11:16:43 EDT 1995 Paul Park (pjpark@mit.edu)
- * ser_ctx.c - Add handling of new time offset fields in the os_context.
-
-
-Tue Aug 29 14:14:26 EDT 1995 Paul Park (pjpark@mit.edu)
- * Makefile.in, .Sanitize, ser_{actx,adata,addr,auth,cksum,ctx,eblk,key,
- princ}.c, serialize.c, t_ser.c - Add serialization operations
- for data structures required to serialize krb5_context, krb5_
- auth_context, krb5_encrypt_block and krb5_principal.
- * auth_con.h - Add magic number.
- * auth_con.c - Add static routine to copy an address and use this
- instead of the other code. Set the magic number when initing
- an auth_context. Use krb5_free_address to release an address.
- * init_ctx.c - Free the allocated serializers when releasing context.
- * rd_rep.c - Copy the keyblock from the message instead of setting
- a pointer into it.
-
-Thu Aug 24 18:55:50 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * .Sanitize: Update file list.
-
-Mon Aug 7 18:54:35 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * in_tkt_ktb.c (keytab_keyproc): If there is an error looking up
- the key, make sure the keytab is closed as part of the
- cleanup.
-
-Fri Aug 4 22:04:08 1995 Tom Yu <tlyu@dragons-lair.MIT.EDU>
-
- * conv_princ.c: Add braces to initializer to shut up gcc -Wall
-
-Fri Jul 7 16:31:06 EDT 1995 Paul Park (pjpark@mit.edu)
- * Makefile.in - Find com_err in TOPLIBD.
- * rd_safe.c - Use checksum verifier instead of doing it manually.
-
-Thu Jul 6 17:31:40 1995 Tom Yu <tlyu@lothlorien.MIT.EDU>
-
- * rd_safe.c (krb5_rd_safe_basic): Pass context to os_localaddr.
-
- * rd_priv.c (krb5_rd_priv_basic): Pass context to os_localaddr.
-
- * rd_cred.c (krb5_rd_cred_basic): Pass context to os_localaddr.
-
- * get_in_tkt.c (krb5_get_in_tkt): Pass context to os_localaddr.
-
-Wed July 5 15:52:31 1995 James Mattly <mattly@fusion.com>
- * added condition for _MACINTOSH
-
-Sun Jul 2 18:59:53 1995 Sam Hartman <hartmans@tertius.mit.edu>
-
- * recvauth.c (krb5_recvauth): recvauth should send an error reply
- if problem is not zero. Removed if that caused it to only send a
- reply on success.
-
-Fri Jun 16 22:11:21 1995 Theodore Y. Ts'o (tytso@dcl)
-
- * get_in_tkt.c (krb5_get_in_tkt): Allow the credentials cache
- argument to be optional; allow it to be NULL, meaning that
- the credentials shouldn't be stored in a credentials cache.
-
-Mon Jun 12 16:49:42 1995 Chris Provenzano (proven@mit.edu)
-
- A couple bug reports/patches from Ed Phillips (flaregun@udel.edu)
- * in_tkt_ktb.c (keytab_keyproc()): Fix memory leak.
- * recvauth.c (krb5_recvauth()): Don't open a new rcache if
- the auth_context already has one.
- * auth_con.c (krb5_auth_con_free()): Close rcache is the
- auth_context has one set.
- * auth_con.c (krb5_auth_con_getrcache()): Return pointer
- to the rcache set in the auth_context.
-
-Sun Jun 11 12:31:39 1995 Ezra Peisach (epeisach@kangaroo.mit.edu)
-
- * auth_con.c (krb5_auth_con_init): Zero newly allocated
- krb5_auth_context. (Fixed error in redefinitions).
-
-Sat Jun 10 23:05:51 1995 Tom Yu (tlyu@dragons-lair)
-
- * auth_con.c, compat_recv.c, mk_cred.c, mk_priv.c, mk_rep.c,
- mk_req.c, mk_req_ext.c, mk_safe.c, rd_cred.c, rd_priv.c,
- rd_rep.c, rd_req.c rd_req_dec.c, rd_safe.c, recvauth.c,
- sendauth.c: krb5_auth_context redefinitions
-
-Fri Jun 9 18:48:43 1995 <tytso@rsx-11.mit.edu>
-
- * rd_req_dec.c (krb5_rd_req_decoded): Fix -Wall nits
-
- * configure.in: Remove standardized set of autoconf macros, which
- are now handled by CONFIG_RULES.
-
- * Makefile.in, faddr_ordr.c: Remove faddr_ordr.c; its function,
- krb5_fulladdr_order, isn't used anywhere.
-
-Fri Jun 9 02:42:54 1995 Tom Yu (tlyu@dragons-lair)
-
- * rd_cred.c (krb5_rd_cred_basic): fix typo (extra "context"
- argument passed to krb5_xfree)
-
-Thu Jun 8 22:48:27 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * rd_cred.c (krb5_rd_cred_basic): Fix problem where the ticket
- field was assigned with a krb5_data, which was then
- immediately freed.
-
-Thu Jun 8 16:06:44 1995 <tytso@rsx-11.mit.edu>
-
- * compat_recv.c, auth_con.c, chk_trans.c, encrypt_tk.c,
- gc_frm_kdc.c, gc_via_tkt.c, gen_seqnum.c, gen_subkey.c,
- get_creds.c, get_in_tkt.c, in_tkt_ktb.c, in_tkt_pwd.c,
- in_tkt_skey.c, init_ctx.c, kdc_rep_dc.c, mk_cred.c,
- mk_error.c, mk_priv.c, mk_rep.c, mk_req.c, mk_req_ext.c,
- mk_cred.c, mk_safe.c, parse.c, preauth.c, rd_cred.c,
- rd_rep.c, rd_req.c, rd_req_dec.c, rd_safe.c, recvauth.c,
- sendauth.c, send_tgs.c, srv_rcache.c, walk_rtree.c: Clean
- up GCC -Wall flames.
-
-Wed Jun 7 15:23:21 1995 <tytso@rsx-11.mit.edu>
-
- * conv_princ.c (krb5_425_conv_principal): Remove old CONFIG_FILES
- code.
-
-Fri May 26 10:18:28 1995 Keith Vetter (keithv@fusion.com)
-
- * makefile.in: removed for the PC creating shared directory.
- (still bug with the '@SHARED_RULE@' line but I'm waiting
- on tytso for that since I don't want to break Unix).
-
-Thu May 25 09:58:42 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * gc_via_tkt.c (krb5_kdcrep2creds): Fix syntax error in the
- freeing of the keyblock.
-
-Wed May 24 18:19:17 1995 Theodore Y. Ts'o (tytso@dcl)
-
- * Makefile.in, configure.in: Add rules for building shared library.
-
- * gc_via_tkt.c (krb5_kdcrep2creds): On an error, free the keyblock.
-
-Tue May 23 16:28:42 1995 Theodore Y. Ts'o (tytso@dcl)
-
- * gc_frm_kdc.c, preauth.c, t_kerb.c, t_walk_rtree.c, unparse.c:
- Rearrange #include files so that krb5.h gets included
- first, so that the debugging information can be more
- efficiently collapsed since the type numbers will be the
- same.
-
-Sat May 20 14:01:16 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * rd_safe.c (krb5_rd_safe): Increment remote_seq_number if
- KRB5_AUTH_CONTEXT_DO_SEQUENCE is set.
-
-Thu May 11 22:42:30 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * rd_cred.c (krb5_rd_cred_basic): If address don't match, return
- KRB5KRB_AP_ERR_BADADDR (add missing retval).
-
-Thu May 11 18:30:21 1995 Chris Provenzano (proven@mit.edu)
-
- * mk_cred.c (krb5_mk_cred()), mk_priv.c (krb5_mk_priv()),
- * mk_safe.c (krb5_mk_safe()), rd_cred.c (krb5_rd_cred()),
- * rd_priv.c (krb5_rd_prev()), rd_safe.c (krb5_rd_safe()):
- Pass the contents pointer returned from krb5_make_fulladdr()
- to free() not the address of the pointer.
-
-Tue May 9 08:34:21 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * Makefile.in (clean): Remove t_kerb and t_kerb.o
-
-Fri May 5 00:06:24 1995 Theodore Y. Ts'o (tytso@dcl)
-
- * conv_princ.c (krb5_425_conv_principal): Use new calling
- convention of krb5_get_realm_domain, which is that it
- returns the realm *without* the leading dot.
-
- Also use the profile code to look up individual instance
- conversions using [realms]/<realm>/v4_instance_convert/<inst>
- This allows special case handling of mit.edu and
- lithium.lcs.mit.edu.
-
- * t_kerb.c: New file for testing krb library functions. Currently
- only tests krb5_425_conv_principal.
-
-Wed May 03 03:30:51 1995 Chris Provenzano (proven@mit.edu)
-
- * recvauth.c, compat_recv.c (krb5_recvauth()):
- * compat_recv.c (krb5_compat_recvauth()):
- No longer needs the rc_type arg.
-
-Tue May 02 19:29:18 1995 Chris Provenzano (proven@mit.edu)
-
- * mk_cred.c (mk_cred()), mk_priv.c (mk_priv()), mk_safe.c (mk_safe()),
- * rd_cred.c (rd_cred()), rd_priv.c (rd_priv()), rd_safe.c (rd_safe()):
- Don't call krb5_make_fulladdrs() if a port isn't specified.
-
-Mon May 01 15:56:32 1995 Chris Provenzano (proven@mit.edu)
-
- * auth_con.c (krb5_auth_con_free()) :
- Free all the data associated with the auth_context.
-
- * auth_con.c (krb5_auth_con_setkey()) : Removed.
- * mk_rep.c (mk_rep()),
- The krb5_mk_rep() routine must always encode the data in
- the keyblock of the ticket, not the subkey.
-
- * cleanup.h, auth_con.c (krb5_auth_con_setports()) : Added.
- * auth_con.h, mk_cred.c (mk_cred()), mk_priv.c (mk_priv()),
- * mk_safe.c (mk_safe()), rd_cred.c (rd_cred()),
- * rd_priv.c (rd_priv()), rd_safe.c (rd_safe()) :
- Changes to auth_context to better support full addresses.
-
-Sat Apr 29 00:09:40 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * srv_rcache.c (krb5_get_server_rcache): Fix fencepost error which
- caused an access beyond the allocated memory of piece->data.
-
- * rd_priv.c (krb5_rd_priv_basic): Call krb5_free_priv_enc_part to free
- the entire privenc_msg structure.
-
-Fri Apr 28 09:54:51 EDT 1995 Paul Park (pjpark@mit.edu)
-
- Move adm_rw.c from libkrb5 to libkadm.
-
-Fri Apr 28 08:36:03 1995 Theodore Y. Ts'o <tytso@lurch.mit.edu>
-
- * init_ctx.c (krb5_free_context): Extra semicolon meant the etypes
- field in the context was never being freed.
-
-Fri Apr 28 01:44:51 1995 Chris Provenzano (proven@mit.edu)
-
- * send_tgs.c (krb5_send_tgs()), gc_via_tkt.c (krb5_get_cred_via_tkt()):
- Removed krb5_cksumtype argument.
-
-Thu Apr 27 21:36:01 1995 Chris Provenzano (proven@mit.edu)
-
- * auth_con.c (krb5_auth_con_getaddrs() and krb5_auth_con_getflags()):
- Added for completeness.
- * mk_req_ext.c (krb5_mk_req_extended()) : Don't send the
- AP_OPTS_USE_SUBKEY option over the wire.
-
-Thu Apr 27 17:40:20 1995 Keith Vetter (keithv@fusion.com)
-
- * adm_rw.c, mk_cred.c, rd_cred.c:
- malloc on the PC must be size SIZE_T not int32.
- * adm_rw.c: krb5_free_adm_data second argument now a krb5_int32.
-
-Thu Apr 27 16:33:17 EDT 1995 Paul Park (pjpark@mit.edu)
-
- * mk_priv.c - Back out previous change which always put in
- timestamp, regardless of DO_TIME setting and
- instead, clear out the replaydata before calling
- mk_priv_basic from mk_priv.
- * mk_safe.c - Same replaydata fix.
-
-Thu Apr 26 15:59:51 EDT 1995 Paul Park (pjpark@mit.edu)
-
- * Add adm_rw.c - routines to read and write commands from/to the
- administrative (kpasswd/kadmin) server.
-
-Wed Apr 27 11:30:00 1995 Keith Vetter (keithv@fusion.com)
-
- * init_ctx.c: krb5_init_context wasn't checking return values.
- * mk_req.c: deleted unused local variable.
-
-Wed Apr 26 22:49:18 1995 Chris Provenzano (proven@mit.edu)
-
- * gc_via_tgt.c, and gc_2tgt.c : Removed.
- * Makefile.in, gc_via_tkt.c, gc_frm_kdc.c, and, int-proto.h :
- Replaced get_cred_via_tgt() and get_cred_via_2tgt()
- with more general function get_cred_via_tkt().
-
-Tue Apr 25 21:58:23 1995 Chris Provenzano (proven@mit.edu)
-
- * Makefile.in : Added gc_via_tkt.c and removed get_fcreds.c
- * auth_con.c (krb5_auth_con_setaddrs()) : Fixed so it allocates
- space and copies addresses, not just pointer.
- * mk_cred.c: Completely rewritten from sources donated by asriniva.
- * rd_cred.c: Completely rewritten from sources donated by asriniva.
- * mk_priv.c (krb5_mk_priv()), mk_safe.c (krb5_mk_safe()),
- rd_priv.c (krb5_rd_priv()), and rd_safe (krb5_rd_safe()) :
- Try using a subkey before using the session key for encryption.
- * recvauth.c (krb5_recvauth()): Don't close the rcache on success.
-
-Mon Apr 24 23:12:21 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * Makefile.in, configure.in (t_walk_rtree): Add WITH_NETLIBS and
- $(LIBS), so that t_walk_rtree can compile under solaris.
-
-Mon Apr 24 17:09:36 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * parse.c (krb5_parse_name): Add magic number to new structure
-
- * get_creds.c: Fix comments describing operation
-
- * gc_frm_kdc.c: Fix comments describing operation
-
- * copy_cksum.c (krb5_copy_checksum): Fix comment in file
-
- * copy_addrs.c (krb5_append_addresses): ifdef out unused
- krb5_append_addresses function. (no API or prototype
- existed).
-
- * copy_data.c (krb5_copy_data): Initialize magic number
-
- * init_ctx.c (krb5_init_context): If an error is returned from
- krb5_set_default_in_tkt_etypes or krb5_os_init_context,
- pass to caller instead of stack garbage.
-
-Sat Apr 22 11:06:45 1995 Ezra Peisach (epeisach@kangaroo.mit.edu)
-
- * Makefile.in: t_walk_rtree needs libcrypto
-
- * t_walk_rtree.c: error in checking for argument count
-
-Thu Apr 20 16:23:23 1995 Theodore Y. Ts'o (tytso@dcl)
-
- * copy_addrs.c, copy_athctr.c, copy_auth.c, copy_cksum.c,
- copy_creds.c, copy_key.c, copy_princ.c, copy_tick.c,
- gc_2tgt.c, gc_frm_kdc.c, gc_via_tgt.c, get_creds.c,
- mk_req_ext.c: Unless HAVE_C_STRUCTURE_ASSIGNMENT is defined, use
- memcpy to copy structures around, instead of using
- structure assignments. (Which aren't guaranteed to work
- on some broken compilers.)
-
- * mk_req.c (krb5_mk_req): Use krb5_sname_to_principal() in order
- to create the service principal from the service and
- hostname pair. This allows for the host cannoncialization
- to work correctly.
-
- * mk_req_ext.c (krb5_mk_req_extended): Revamp checksum handling
- code so that no checksum is performed in in_data is NULL,
- and the special case handing of cksumtype == 0x8003 for
- the GSSAPI library is handled correctly.
-
-Wed Apr 19 13:39:34 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
-
- * init_ctx.c: (krb5_init_context) initialize context default
- realm. (krb5_free_context) free default realm.
-
-Fri Apr 14 15:05:51 1995 <tytso@rsx-11.mit.edu>
-
- * sendauth.c (krb5_sendauth): initialize error return parameter
-
- * copy_princ.c (krb5_copy_principal): Fix bug where
- krb5_copy_principal can fail if it is asked to copy a
- principal with a zero-length component on a system where
- malloc(0) returns null.
-
-Thu Apr 13 15:49:16 1995 Keith Vetter (keithv@fusion.com)
-
- * *.[ch]: removed unneeded INTERFACE from non-api functions.
-
-Fri Mar 31 16:45:47 1995 Keith Vetter (keithv@fusion.com)
-
- * krb5_get_in_tkt: changed error return value for when clocks
- are out of skew to be KRB5_KDCREP_SKEW.
-
-Fri Mar 31 00:44:26 1995 Theodore Y. Ts'o (tytso@dcl)
-
- * rd_req.c (krb5_rd_req): Fix typo which caused new_keytab to not
- get freed, causing a memory leak.
-
-Thu Mar 30 15:49:27 1995 Keith Vetter (keithv@fusion.com)
-
- * rd_req.c: removed unused local variable.
-
-Tue Mar 28 18:34:20 1995 John Gilmore (gnu at toad.com)
-
- * rd_req_sim.c: Really remove the file.
-
-Mon Mar 27 08:34:49 1995 Chris Provenzano (proven@mit.edu)
-
- * Makefile.in: Removed rd_req_sim.c
-
- * auth_con.c: Default cksumtype is now CKSUMTYPE_RSA_MD4_DES.
-
- * auth_con.c: Added krb5_auth_con_setuseruserkey(),
- krb5_auth_con_getkey(),
- krb5_auth_con_getremotesubkey(),
- krb5_auth_con_getauthenticator(),
- krb5_auth_con_getremoteseqnumber(),
- krb5_auth_con_initivector().
-
- * auth_con.c: Fixed krb5_auth_con_getlocalsubkey() to check for
- a valid local_subkey before calling krb5_copy_keyblock().
-
- * auth_con.h: Fixed some comments.
-
- * mk_req_ext.c (krb5_mk_req_extended()): Always pass in a seed
- (the keyblock contents) to krb5_calculate_checksum()
-
- * rd_rep.c (krb5_rd_rep()): Use appropriate key to decode reply.
-
- * rd_safe.c (krb5_rd_safe()): Don't pass checksum to
- krb5_rd_safe_basic(), it's unnecessary.
-
- * compat_recv.c (krb5_compat_recvauth()):
- * mk_rep.c (krb5_mk_rep()):
- * rd_req.c (krb5_rd_req()):
- * rd_req_dec.c (krb5_rd_req_decode()):
- * recvauth.c (krb5_recvauth()):
- Added a krb5_auth_context argument and eliminated many of
- the other arguments because they are included in the
- krb5_auth_context structure.
-
-
-Tue Mar 21 19:22:51 1995 Keith Vetter (keithv@fusion.com)
-
- * mk_safe.c: fixed signed/unsigned mismatch.
- * rd_safe.c: removed unused local variable currentime.
- * mk_req_e.c: fixed signed/unsigned mismatch.
-
-Sat Mar 18 18:58:02 1995 John Gilmore (gnu at toad.com)
-
- * bld_pr_ext.c, bld_princ.c: Replace STDARG_PROTOTYPES with
- HAVE_STDARG_H for consistency.
-
-Fri Mar 17 19:48:07 1995 John Gilmore (gnu at toad.com)
-
- * Makefile.in (check-mac): Add.
- * compat_recv.c, get_fcreds.c, recvauth.c: Eliminate Unix socket
- #includes, which are now handled by k5-int.h (via k5-config.h).
- * conv_princ.c: Rename variable "comp" to another name; "comp"
- apparently bothers the MPW compiler...
- * rd_cred.c: Avoid (void) casts of void functions, for MPW.
- * t_walk_rtree.c: Put com_err.h after k5_int for <sys/types> stuff.
- (main): Declare and initialize the krb5_context that's being
- passed to everything.
-
-Fri Mar 10 10:58:59 1995 Chris Provenzano (proven@mit.edu)
-
- * auth_con.h auth_con.c Added for krb5_auth_con definition and
- support routines.
-
- * mk_req.c (krb5_mk_req())
- * mk_req_ext.c (krb5_mk_req_extended())
- * rd_rep.c (krb5_rd_rep())
- * sendauth.c (krb5_sendauth())
- * mk_priv.c (krb5_mk_priv())
- * mk_safe.c (krb5_mk_safe())
- * rd_priv.c (krb5_rd_priv())
- * rd_safe.c (krb5_rd_safe())
- Added a krb5_auth_context argument and eliminated many of
- the other arguments because they are included in the
- krb5_auth_context structure.
-
- * send_tgs.c (krb5_send_tgs()) Eliminate call to krb5_mk_req_extended(),
- which does far more than krb5_send_tgs() needs.
-
-Tue Mar 7 19:57:34 1995 Mark Eichin <eichin@cygnus.com>
-
- * configure.in: take out ISODE_INCLUDE.
-
-Tue Mar 7 13:20:06 1995 Keith Vetter (keithv@fusion.com)
-
- * Makefile.in: changed library name on the pc.
- * parse.c: disabled for the PC error messages to stderr.
- * chk_trans.c: fixed signed/unsigned assignment.
-
-Thu Mar 2 11:45:00 1995 Keith Vetter (keithv@fusion.com)
-
- * compat_recv.c, get_fcre.c, recvauth.c, sendauth.c: changed
- NEED_WINSOCK_H to NEED_SOCKETS.
-
-Wed Mar 1 20:15:00 1995 Keith Vetter (keithv@fusion.com)
-
- * compat_r.c, copy_pri.c, get_fcre.c, get_in_t.c, init_ctx.c, in_tkt_p.c
- in_tkt_s.c, preauth.c, princ_co.c, pr_to_sa.c, rd_req_d.c, recvauth.c
- sendauth.c, send_tgs.c, unparse.c: 16 vs 32 bit casts, removed some
- unused local variables, and pulled in winsock.h for network byte
- ordering.
-
-Tue Feb 28 01:14:57 1995 John Gilmore (gnu at toad.com)
-
- * *.c: Avoid <krb5/...> includes.
- * parse.c: Exdent #ifndef to left margin for old compilers.
-
-Wed Feb 22 17:14:31 1995 Keith Vetter (keithv@fusion.com)
-
- * walk_rtr.c (krb5_walk_realm_tree): formal parameter wasn't declared.
- * send_tgs.c: const in wrong place in the prototype.
- * get_in_tkt.c, preauth.c, rd_cred.c, rd_priv.c, rd_req_dec.c,
- rd_safe.c: needed a 32 bit abs() function.
- * parse.c: removed call to fprintf on error the windows version
- * send_auth.c: defined for windows the ECONNABORTED errno (will
- be removed when the socket layer is fully implemented).
-
-Tue Feb 21 23:38:34 1995 Theodore Y. Ts'o (tytso@dcl)
-
- * mk_cred.c (krb5_mk_cred): Fix argument type to
- krb5_free_cred_enc_part().
-
-Mon Feb 13 20:25:20 1995 Theodore Y. Ts'o (tytso@dcl)
-
- * get_in_tkt.c (krb5_get_in_tkt): Fix memory leak --- the default
- encryption types was not being freed.
-
-Fri Feb 10 15:45:59 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * rd_req.c (krb5_rd_req): Remove ISODE cruft.
-
-Thu Feb 9 17:43:04 1995 Theodore Y. Ts'o <tytso@dcl>
-
- * gc_via_tgt.c (krb5_get_cred_via_tgt): Set up the keyblock's
- etype field correctly (after copying the keyblock, so it
- doesn't get overwritten!)
-
-Mon Feb 06 17:19:04 1995 Chris Provenzano (proven@mit.edu)
-
- * get_in_tkt.c (krb5_get_in_tkt())
- * in_tkt_sky.c (krb5_get_in_tkt_with_skey())
- * in_tkt_pwd.c (krb5_get_in_tkt_with_password())
- Removed krb5_keytype, changed krb5_enctype to krb5_enctype *,
- changed krb5_preauthtype to krb5_preauthtype *.
-
- Changed the args to the key_proc arg of krb5_get_in_tkt()
- to be the following (krb5_context, const krb5_keytype,
- krb5_data *, krb5_const_pointer, krb5_keyblock **)
-
- * in_tkt_ktb.c (krb5_get_in_tkt_with_keytab()) Added this routine
- to replace krb5_get_in_tkt_with_skey() in kinit.
-
- * Makefile.in Added new source file in_tkt_ktb.c.
-
-Fri Feb 3 16:41:19 1995 Mark Eichin (eichin@cygnus.com)
-
- * get_in_tkt.c (krb5_get_in_tkt): also check for the version
- number of the reply being whatever we had in the first byte of the
- request.
-
-Fri Feb 3 08:07:55 1995 Theodore Y. Ts'o (tytso@dcl)
-
- * compat_recv.c (krb_v4_recvauth): Use explicit 32 bit types so
- this will work on an Alpha.
-
-Fri Feb 3 00:43:48 1995 Tom Yu (tlyu@dragons-lair)
-
- * get_in_tkt.c (krb5_get_in_tkt): fix typo
-
-Thu Feb 2 20:51:55 1995 Mark Eichin (eichin@cygnus.com)
-
- * get_in_tkt.c (krb5_get_in_tkt): if krb5_is_as_rep fails, check
- if the packet might be a V4 error packet. Use modified V4 check so
- that it compiles under SCO.
-
-Mon Jan 30 15:46:14 1995 Chris Provenzano (proven@mit.edu)
-
- * int-proto.h Update prototypes for krb5_get_cred_via_tgt(), and
- krb5_get_cred_via_2tgt().
-
- * get_fcreds.c (krb5_get_for_creds())
- * gc_via_tgt.c (krb5_get_cred_via_tgt())
- * gc_2tgt.c (krb5_get_cred_via_2tgt())
- Removed krb5_enctype argument. Pass NULL list of encryption
- types to krb5_send_tgs to get default encryption types.
-
- * gc_frm_kdc.c Removed krb5_enctype argument passed to
- krb5_get_cred_via_tgt()
-
- * send_tgs.c (krb5_send_tgs()) Changed krb5_enctype arg to
- krb5_enctype *, a NULL terminated array of encryption
- types. If argument is NULL then krb5_send_tgs() will
- use defaul list of encryption types.
-
- * send_tgs.c (krb5_send_tgs()) To encrypt request ticket use
- usecred->keyblock.etype instead of (and now defunct)
- krb5_enctype arg.
-
- * init_ctx.c Added krb5_set_default_in_tkt_etypes() and
- krb5_get_default_in_tkt_etypes().
-
- * rd_req.c, rd_req_decode.c Removed typedef for rdreq_key_proc
- and use krb5_rd_req_decoded in its place.
-
-Mon Jan 30 11:26:05 1995 Chris Provenzano (proven@mit.edu)
-
- * get_fcreds.c Really needs #include<krb5/asn1.h> for definition
- of krb5_is_krb_error()
-
-Sat Jan 28 14:45:55 1995 Chris Provenzano (proven@mit.edu)
-
- * in_tkt_sky.c (skey_keyproc()), rd_req_dec.c (krb5_rd_req_decoded())
- use new API for krb5_kt_get_entry.
-
-Fri Jan 27 15:45:45 1995 Chris Provenzano (proven@mit.edu)
-
- * get_fcreds.c Removed #include<krb5/crc-32.h> and #include<krb5/asn1.h>
-
-Wed Jan 25 16:54:40 1995 Chris Provenzano (proven@mit.edu)
-
- * Removed all narrow types and references to wide.h and narrow.h
-
-Fri Jan 13 15:23:47 1995 Chris Provenzano (proven@mit.edu)
-
- * Added krb5_context to all krb5_routines
-
-Mon Dec 19 21:55:44 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * init_ctx.c: New file. Initializes and frees the krb5_context
- structure.
-
-Wed Dec 7 17:52:08 1994 <tytso@localhost>
-
- * rd_req_dec.c (decrypt_authenticator): If the subkey doesn't
- exist, don't try to set the subkey's etype.
-
-Wed Nov 30 17:10:39 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * bld_princ.c (krb5_build_principal_va): Set the principal's type
- and magic number.
-
- * Makefile.in: Build new test driver (t_walk_rtree) for
- krb5_walk_realm_tree.
-
- * walk_realm_tree.c (krb5_walk_realm_tree): Fix bug which occured
- when the client or the server is a subdomain of the other;
- walk_realm_tree would return the wrong answer, and suffer
- from memory access errors.
-
- * unparse.c (krb5_unparse_name_ext): Quote the '/' and '@'
- characters properly.
-
- * configure.in: Add appropriate help text for the --with-krb4
- option. Remove ISODE_DEFS call, since ISODE_INCLUDES now
- defines ISODE automatically.
-
-Mon Nov 21 15:30:07 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * mk_req_ext.c (krb5_mk_req_extended): Sanitize how memory is
- freed in both error and normal cases, to remove memory
- leaks.
-
- * mk_req_ext.c (krb5_mk_req_extended): Use the encryption type
- specified by the ticket to generate the authenticator.
-
- * encode_kdc.c (krb5_encode_kdc_rep): Now requires that the
- caller pass in the encryption block to be used for
- encrpyting the ticket. That way, this routine doesn't
- need to create its own encryption block.
-
- * encrypt_tk.c (krb5_encrypt_tkt_part): Now requires that the
- caller pass in the encryption block to be used for
- encrpyting the ticket. That way, this routine doesn't
- need to create its own encryption block.
-
-Fri Nov 18 17:30:44 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * mk_req_ext.c (krb5_mk_req_extended): Encrypt the authenticator
- using the same encryption system used to encrypt the ticket.
-
-Thu Nov 17 01:56:05 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * gc_via_tgt.c (krb5_get_cred_via_tgt):
- * gc_2tgt.c (krb5_get_cred_via_2tgt): Set the encryption type of
- the session keyblock to be the type used to encrypt the
- ticket.
-
-Fri Nov 11 01:20:22 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * get_in_tkt.c (krb5_get_in_tkt): Set the encryption type of the
- session keyblock to be the type used to encrypt the
- ticket.
-
-Thu Nov 10 23:56:43 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * rd_rep.c (krb5_rd_rep): Set the encryption type in
- the subkey keyblock to be the encryption type used to
- encrypt the rd_rep message.
-
- * decrypt_tk.c (krb5_decrypt_tkt_part): Set the encryption type in
- the session keyblock to be the encryption type used to
- encrypt the ticket.
-
- * rd_req_dec.c (decrypt_authenticator): Set the encryption type in
- the subkey keyblock to be the encryption type used to
- encrypt the authenticator.
-
-Tue Nov 8 17:09:48 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * in_tkt_pwd.c (pwd_keyproc): Use the documented interface for
- calling krb5_string_to_key().
-
-Tue Oct 25 23:34:57 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * srv_rcache.c (krb5_get_server_rcache): Added missing continue so
- that we don't copy both the unprintable character as well
- as the quoted version of it.
-
-Mon Oct 24 15:50:19 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * configure.in: If KRB4 is defined, define KRB5_KRB4_COMPAT for
- compat_recv.c.
-
-Thu Oct 13 17:26:28 1994 Theodore Y. Ts'o (tytso@maytag)
-
- * configure.in: Add ISODE_DEFS
-
-Tue Oct 4 16:29:19 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * in_tkt_sky.c (skey_keyproc):
- * in_tkt_pwd.c (pwd_keyproc): Add widen.h and narrow.h includes
- around pwd_keyproc, so that the keyproc input arguments
- are appropriately widened.
-
-Fri Sep 30 21:58:15 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * preauth.c (preauth_systems): Add placeholder for magic number
-
-Thu Sep 29 15:31:10 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * srv_rcache.c (krb5_get_server_rcache): cachename was not being
- properly null-terminated.
-
- * get_in_tkt.c (krb5_get_in_tkt): Return KRB5_IN_TKT_REALM_MISATCH
- if the client and server realms don't match. Return
- KRB5_KDCREP_SKEW if the KDC reply has an unacceptible
- clock skew (instead of KDCREP_MODIFIED.)
-
- * gc_via_tgt.c (krb5_get_cred_via_tgt): Use a distinct error code
- for KDC skew separate from the standard KDCREP_MODIFIED
-
- * princ_comp.c (krb5_realm_compare): Added new function from
- OpenVision.
-
-Wed Sep 21 17:57:35 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * rd_req_dec.c (krb5_rd_req_decoded): Added Changes from Cybersafe
- to do transited realm path checking.
-
- * chk_trans.c: Added donated module from CyberSafe. It checks to
- see if a transited path is a legal one between two realms.
-
-Thu Sep 15 11:08:39 1994 Theodore Y. Ts'o (tytso@dcl)
-
- * rd_req_sim.c (krb5_rd_req_simple): Use krb5_rd_req instead of
- krb5_rd_req_decoded, to eliminate some code duplication.
-
-Sat Aug 20 01:43:43 1994 Theodore Y. Ts'o (tytso at tsx-11)
-
- * mk_req_ext.c (krb5_generate_authenticator): Fix pointer aliasing
- problem between newkey and authent->subkey.
-
-Wed Aug 17 17:58:22 1994 Theodore Y. Ts'o (tytso at tsx-11)
-
- * encode_kdc.c (krb5_encode_kdc_rep): Pass in to
- encode_krb5_enc_kdc_rep_part the msg_type which should be used.
- Old versions of Kerberos always assume TGS_REP; this merely allows
- the right msg_type to be passed down to the encoding routines.
- For now, the encoding routines will ignore this value and do
- things the old way, for compatibility's sake.
-
-Mon Aug 8 22:38:16 1994 Theodore Y. Ts'o (tytso at tsx-11)
-
- * preauth.c: Renamed preauthentication mechanism names to match
- what bcn and I agreed upon.
-
-Tue Jun 28 19:35:07 1994 Tom Yu (tlyu at dragons-lair)
-
- * decode_kdc.c: folding in Harry's changes
- * rd_req.c: ditto
- * rd_req_sim.c: ditto
- * configure.in: adding ISODE_DEFS
-