summaryrefslogtreecommitdiffstats
path: root/src/lib
Commit message (Expand)AuthorAgeFilesLines
...
* krb5_rd_rep could leak memory through its output parameter on error.Greg Hudson2009-05-041-26/+34
* Fix a memory leak in krb5int_rd_chpw_rep in a block of code handlingGreg Hudson2009-05-021-4/+5
* Fix a memory leak by reorganizing krb5_principal_internalize to useGreg Hudson2009-05-011-34/+34
* Check return value of ftell() in krb5_ktfileint_find_slotGreg Hudson2009-05-011-0/+4
* Move an error check to an earlier location in krb5_524_conv_principalGreg Hudson2009-05-011-2/+3
* make dependSam Hartman2009-04-304-2/+15
* Implement DES and 3DES PRF. Patch fromKAMADA Ken'ichiSam Hartman2009-04-307-12/+88
* In krb5_kt_resolve, ensure that the output parameter is set to NULL onGreg Hudson2009-04-301-5/+9
* In ktfile_common_resolve, set the output pointer to NULL on error, andGreg Hudson2009-04-301-25/+29
* Fix a memory leak by reorganizing krb5_ktf_keytab_internalize to useGreg Hudson2009-04-301-80/+70
* Add DEBUG_ERROR_LOCATIONS supportGreg Hudson2009-04-292-0/+24
* Fix handling of RET_SEQUENCE flag in mk_priv/mk_ncredGreg Hudson2009-04-283-13/+6
* Fix a couple of memory leaks in krb5int_sendto, reworking the errorGreg Hudson2009-04-281-32/+23
* Fix a memory leak in aname_replacer using the recommended flow controlGreg Hudson2009-04-281-87/+92
* Fix a memory leak in module_locate_serverGreg Hudson2009-04-281-1/+3
* Fix a few memory leaks in krb5_mk_ncred. Also tighten up the errorGreg Hudson2009-04-271-16/+18
* Fix an unchecked use of fwrite in krb5_ktfileint_delete_entryGreg Hudson2009-04-271-1/+3
* Move KRB5_KDB_OK_AS_DELEGATE from kdb_ext.h to kdb.h. Add kadminGreg Hudson2009-04-271-0/+3
* make installed headers C++-safeKen Raeburn2009-04-251-0/+14
* Simplify and shorten krb5_ktfileint_find_slot, and properly handle theGreg Hudson2009-04-241-99/+40
* In krb5_ktfileint_find_slot, don't continue the loop when we find aGreg Hudson2009-04-241-0/+1
* In krb5_principal_compare_flags, improve clarity slightly by using aGreg Hudson2009-04-231-9/+8
* In krb5_rcache_externalize, remove a pointless null check of a pointerGreg Hudson2009-04-231-32/+44
* Close a memory leak in asn1_decode_etype_info2_entry_1_3Greg Hudson2009-04-231-1/+4
* In krb5_fcc_read, remove an assert which could never trigger (becauseGreg Hudson2009-04-231-1/+0
* Fix an error-handling block in sendto_kdc.c's setup_connection() whichGreg Hudson2009-04-231-2/+0
* In krb5_get_cred_via_tkt, strip the ok-as-delegate flag fromGreg Hudson2009-04-231-0/+18
* krb5_fcc_generate_new was destroying a locked mutex in the err_outGreg Hudson2009-04-131-0/+1
* In pa_sam, remove a gratuitous null check for etype which wasGreg Hudson2009-04-131-1/+1
* Make krb5_mkt_resolve error handling workGreg Hudson2009-04-131-69/+77
* In krb5int_dns_init, fix a malloc-returning-null check which could letGreg Hudson2009-04-131-1/+1
* More dead code elimination. When asprintf was used the varaible namelen wasEzra Peisach2009-04-121-5/+0
* remove dead codeEzra Peisach2009-04-122-7/+1
* Remove dead assignment of variables that are never usedEzra Peisach2009-04-122-5/+1
* In krb5_get_in_tkt, r7002 introduced an unused local variableGreg Hudson2009-04-101-4/+1
* Simplify the coupling of problem to response code in recvauth_common,Greg Hudson2009-04-101-29/+9
* Remove an unnecessary cleanup in krb5_cc_set_default_nameGreg Hudson2009-04-101-2/+0
* Check the return value of krb5_timeofday in krb5int_populate_gic_opt.Greg Hudson2009-04-101-1/+7
* Check return value of krb5int_copy_data_contents in preauth2.c'sGreg Hudson2009-04-101-1/+4
* Using a patch from Apple, add support for GSS_C_DELEG_POLICY_FLAG,Greg Hudson2009-04-082-1/+11
* mk_safe and mk_priv require the local address to be set in the authGreg Hudson2009-04-085-54/+60
* When getting initial credentials with a password, try the master ifGreg Hudson2009-04-081-2/+1
* CVE-2009-0846 asn1_decode_generaltime can free uninitialized pointerTom Yu2009-04-071-0/+1
* CVE-2009-0847 asn1buf_imbed incorrect length validationTom Yu2009-04-071-2/+4
* CVE-2009-0844 SPNEGO can read beyond buffer endTom Yu2009-04-071-27/+24
* Apply revised patch from Apple that ensures that a REJECT token isTom Yu2009-04-071-3/+5
* fix logic errorsSam Hartman2009-04-041-1/+1
* Adjust the logic in rule_an_to_ln to avoid a "can't happen" case ofGreg Hudson2009-04-031-5/+7
* Merge fast branch at 22166 onto trunkSam Hartman2009-04-0312-40/+162
* Unfortunately, pre-1.7 krshd fails to support keyed checksums becauseSam Hartman2009-04-032-1/+3