summaryrefslogtreecommitdiffstats
path: root/src/lib
Commit message (Expand)AuthorAgeFilesLines
* Update comments to reflect reality and the fact that this is not a file basedEzra Peisach2009-06-211-20/+28
* minor memory leak in 'none' replay cache typeKen Raeburn2009-06-181-2/+8
* In the previous patch - I neglected a potential NULL deref in the callEzra Peisach2009-06-171-1/+3
* krb5int_yarrow_final could deref NULL if out of memoryEzra Peisach2009-06-111-1/+2
* krb5int_rd_chpw_rep could call krb5_free_error with random valueEzra Peisach2009-06-101-1/+1
* Clean up and simplify kdb5.c; no functional changesGreg Hudson2009-06-081-707/+311
* In kdb5.c, remove calls to the locking macros which were stubbed outGreg Hudson2009-06-081-258/+1
* Restore limited support for static linkingGreg Hudson2009-06-081-74/+43
* Don't build the kadm5/unit-test test programs during "make all"; buildGreg Hudson2009-06-081-4/+0
* kadmind is parsing acls good deref NULL pointer on errorEzra Peisach2009-06-061-13/+17
* kadm5int_acl_parse_restrictions could ref uninitialized variableEzra Peisach2009-06-061-1/+1
* Make results of krb5_db_def_fetch_mkey more predictableGreg Hudson2009-06-011-25/+16
* Revert last changeKen Raeburn2009-05-271-7/+5
* Don't re-run test programs to recreate output every time 'check' is builtKen Raeburn2009-05-271-5/+7
* fix t_prf test code properlyKen Raeburn2009-05-271-6/+8
* Fix test rules for non-gmake make versionsGreg Hudson2009-05-241-2/+2
* In krb5_ktfileint_write_entry, add a no-op fseek in between readingGreg Hudson2009-05-231-0/+3
* whitespaceKen Raeburn2009-05-221-3/+3
* Use correct type for krb5_c_prf_length length argKen Raeburn2009-05-221-8/+9
* Use printf format attribute only with gccKen Raeburn2009-05-222-0/+4
* make prompt string vars point to constKen Raeburn2009-05-221-2/+2
* fix minor syntax errorKen Raeburn2009-05-221-1/+1
* Include regression test for krb-fx-cf2 for RC4 enctypeSam Hartman2009-05-203-0/+7
* Restore compatibility with KDCs using key usage 8 to encrypt TGSGreg Hudson2009-05-202-39/+74
* When using keyed checksum types with TGS subkeys, Microsoft AD 2003Greg Hudson2009-05-191-0/+2
* In practice, key usage 9 requires no translationSam Hartman2009-05-181-1/+1
* Copy the sequence key rather than the subkey for lucid contexts in RFCSam Hartman2009-05-181-1/+1
* Document use of key fields in GSS contextSam Hartman2009-05-181-6/+11
* Add IOV_SHIM_EXERCISE_WRAP and IOV_SHIM_EXERCISE_UNWRAP conditionalsTom Yu2009-05-141-2/+5
* gss_krb5int_export_lucid_sec_context was erroneously copying the firstGreg Hudson2009-05-141-1/+1
* UCS2 support doesn't handle upper half of BMPGreg Hudson2009-05-141-4/+2
* remove some old code for debugging the debugging codeKen Raeburn2009-05-141-7/+0
* reduce character-class table entry size (40%) based on limited data ranges; m...Ken Raeburn2009-05-111-4/+4
* In recvauth_common, convert a use of strcpy to strdupGreg Hudson2009-05-111-2/+2
* Refactor rule_an_to_ln, creating a new helper function to handle theGreg Hudson2009-05-112-125/+104
* Try decrypting using session key if subkey fails in tgs rep handlingSam Hartman2009-05-073-8/+13
* Allow more than 10 past keys to be stored by a policyGreg Hudson2009-05-073-75/+2
* After consultation with kenh, remove a comment and if statement whichGreg Hudson2009-05-071-7/+0
* Fix yet another memory leak in pa_samGreg Hudson2009-05-061-0/+1
* Fix multiple memory leaks in obtain_sam_padataGreg Hudson2009-05-061-23/+29
* In pa_sam, use the correct function to free sam_challenge in theGreg Hudson2009-05-061-1/+1
* Fix a memory leak in pa_sam_2 where an outer data structure wasn'tGreg Hudson2009-05-061-0/+1
* Fix a memory leak in pa_samGreg Hudson2009-05-051-2/+5
* Fix a memory leak in krb5_obtain_padataGreg Hudson2009-05-051-1/+1
* In pa_sam_2, free sc2 in an error-handling case where it was leakedGreg Hudson2009-05-051-1/+3
* In pa_sam_2, free scratch in a couple of error-handling blocks whereGreg Hudson2009-05-051-0/+2
* In krb5int_rd_setpw_rep, if we get an error result, set ap_rep.lengthGreg Hudson2009-05-051-0/+1
* Remove some unnecessary null checks in krb5_get_in_tkt_with_passwordGreg Hudson2009-05-051-4/+2
* Remove some unnecessary null checks in krb5_get_in_tkt_with_keytabGreg Hudson2009-05-051-4/+2
* In krb5_get_in_tkt, free the whole encoded request (since theGreg Hudson2009-05-051-1/+1