summaryrefslogtreecommitdiffstats
path: root/src/lib/krb5/krb/ChangeLog
Commit message (Expand)AuthorAgeFilesLines
...
* * conv_creds.c (krb524_init_ets, krb524_convert_creds_kdc): Add forward decla...Ken Raeburn2004-04-241-0/+3
* Added support for library initialization and finalization, and verificationKen Raeburn2004-04-241-2/+7
* krb5_get_in_tkt ignores lifetimeSam Hartman2004-04-161-0/+7
* Fix memory leak when not sending to master KDC inSam Hartman2004-04-151-0/+5
* Fix missing case for get_init_creds API changeKen Hornstein2004-03-091-0/+5
* * gic_pwd.c (krb5_get_in_tkt_with_password): Fix a case Jeff missedKen Raeburn2004-02-281-0/+5
* As discussed on the krbdev mailing list, krb5_get_init_creds_password()Jeffrey Altman2004-02-271-0/+10
* Don't specify defaults for GET{PEER,SOCK}NAME_ARG{2,3}_TYPE macrosKen Raeburn2004-02-141-0/+5
* Enable aes128-cts for clientSam Hartman2004-02-061-0/+4
* * get_in_tkt.c (get_in_tkt_enctypes): Now constKen Raeburn2003-12-201-0/+4
* * conv_creds.c (krb5int_encode_v4tkt): Zero out unused parts of ticket. Use aKen Raeburn2003-12-161-0/+6
* Add platform-dependent 64-bit and inline-function support via new headerKen Raeburn2003-12-131-0/+12
* initial sequence number mask short by 4 bitsTom Yu2003-10-301-0/+5
* Save encoded KRB-SAFE-BODY to avoid problems caused by re-encoding it.Tom Yu2003-10-081-0/+7
* Apply patch from Cesar Garcia to fix lifetime computation in 524Tom Yu2003-09-021-0/+5
* Don't double free the encrypted credential partSam Hartman2003-08-191-0/+4
* get_init_creds_password: DNS SRV off causes bogus REALM_UNKNOWNTom Yu2003-08-081-0/+8
* Send generalstring not octetstring in etype_info2. Accept eitherSam Hartman2003-07-221-0/+6
* delete ##WIN16## lines from makefilesKen Raeburn2003-07-171-0/+4
* * Makefile.in (STLIBOBJS, OBJS, T_SER_OBJS): Drop ser_eblk.oKen Raeburn2003-07-151-0/+4
* Export krb5_get_permitted_enctypes and krb5_set_real_time for SambaAlexandra Ellwood2003-07-091-0/+4
* * gic_keytab.c (krb5_get_in_tkt_with_keytab): Pass (void*)keytab,Tom Yu2003-06-271-0/+5
* Set use_conf_ktypes to 1 while looking up the tgt to use forSam Hartman2003-06-161-0/+4
* krb5_rd_rep leaks subkeysTom Yu2003-06-131-0/+5
* Don't escape rcache filename characters with backslashTom Yu2003-06-111-0/+5
* Don't allow renewable_ok to be set if the renew liftime is greaterSam Hartman2003-06-061-0/+5
* Static function krb5_generate_authenticator should take unsigned sequence num...Ezra Peisach2003-06-061-0/+5
* * get_in_tkt.c (krb5_get_init_creds): Change hardcoded default ticket lifetimeKen Raeburn2003-05-301-0/+3
* * init_ctx.c (DEFAULT_KDC_TIMESYNC): Define as 1 always.Ken Raeburn2003-05-301-0/+5
* * get_in_tkt.c: (verify_as_reply) Only check the renewable lifetime of ticket...Alexandra Ellwood2003-05-301-0/+7
* Rename interface to krb5_524_convert_creds, export it from krb5 library.Ken Raeburn2003-05-281-0/+7
* Avoid memory leak of server and client principal inSam Hartman2003-05-271-0/+7
* Big step towards integrating libkrb524 into libkrb5:Ken Raeburn2003-05-241-0/+10
* use kdc_default_optionsSam Hartman2003-05-231-0/+4
* * gen_seqnum.c (krb5_generate_seq_number): Fix think-o on sequenceTom Yu2003-05-231-0/+3
* Implement heuristic for matching broken Heimdal sequence number encodingsTom Yu2003-05-231-0/+12
* krb5int_populate_gic_opt should return voidSam Hartman2003-05-221-0/+4
* Set length correctly in krb5_get_in_tkt_with_password if password isTom Yu2003-05-211-0/+5
* krb5_get_in_tkt now only supports old (non-etype-info2) enctypesSam Hartman2003-05-201-0/+3
* Implement krb5_get_in_tkt_with_password andSam Hartman2003-05-201-0/+14
* Sequence numbers are now unsigned. Implement lenient parser forTom Yu2003-05-181-0/+7
* * chpw.c (krb5int_rd_chpw_rep): Allow new kpasswd error codes up throughKen Raeburn2003-05-171-0/+3
* * ser_ctx.c (krb5_context_internalize): Copy read-in OS context data intoKen Raeburn2003-05-171-0/+6
* Try forwarding with no enctype restriction if forwarding with anSam Hartman2003-05-131-0/+3
* Fix memory leaks and double frees in preauth2.cSam Hartman2003-05-131-0/+9
* * IMplement etype_info in KDC. If the request contains any newSam Hartman2003-05-121-0/+18
* Add a new krb5_context field for the config-file tgs_enctypes, whichKen Raeburn2003-05-101-0/+12
* punt leftover conflict markersTom Yu2003-05-101-2/+0
* Rename the local_subkey and remote_subkey fields in the auth_contextTom Yu2003-05-101-0/+35
* Implement encoders for etype_info2 and add support to s2kparams forSam Hartman2003-05-061-0/+4