summaryrefslogtreecommitdiffstats
path: root/src/lib
Commit message (Collapse)AuthorAgeFilesLines
...
* make dependKen Raeburn2003-08-211-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15788 dc483132-0cff-0310-8789-dd5450dbe970
* * dnssrv.c: New file; split out DNS SRV RR query support...Ken Raeburn2003-08-214-225/+281
| | | | | | | * locate_kdc.c: ...from here. Always compile in the calls. * Makefile.in (STLIBOBJS, OBJS, SRCS): Add it. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15787 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Don't substitute LIBOBJS, newer autoconfs don't like itKen Raeburn2003-08-212-4/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15786 dc483132-0cff-0310-8789-dd5450dbe970
* * Makefile.in (STLIBOBJS, OBJS): EmptyKen Raeburn2003-08-212-2/+6
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15785 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Don't replace any missing system functions. Just set LIBOBJSKen Raeburn2003-08-212-1/+10
| | | | | | empty for now and substitute it. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15781 dc483132-0cff-0310-8789-dd5450dbe970
* Don't double free the encrypted credential partSam Hartman2003-08-192-5/+5
| | | | | | | Ticket: 1731 Tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15773 dc483132-0cff-0310-8789-dd5450dbe970
* krb_check_auth clears the return value for the schedule parameter with a ↵Alexandra Ellwood2003-08-152-1/+6
| | | | | | | | memset. This prevents callers from using the key schedule, which breaks code ticket: 1730 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15770 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Don't check for or replace vfprintf, vsprintf, strerror,Ken Raeburn2003-08-132-1/+6
| | | | | | memmove, or sscanf, all part of C 89. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15768 dc483132-0cff-0310-8789-dd5450dbe970
* use my mit changelog idKen Raeburn2003-08-131-1/+1
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15767 dc483132-0cff-0310-8789-dd5450dbe970
* * Makefile.in (OBJS, STLIBOBJS): Drop setenv.o.Ken Raeburn2003-08-134-197/+8
| | | | | | | * setenv.c: Deleted. * pos-obsolete.h: Deleted. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15766 dc483132-0cff-0310-8789-dd5450dbe970
* get_init_creds_password: DNS SRV off causes bogus REALM_UNKNOWNTom Yu2003-08-082-1/+10
| | | | | | | | | | | | | | | * gic_pwd.c (krb5_get_init_creds_password): If DNS SRV support is turned off, the second call to get_init_creds() will fail with KRB5_REALM_UNKNOWN under certain circumstances. If that happens, return the error from the first call to get_init_creds(), which will be more useful to the user. ticket: new target_version: 1.3.2 tags: pullup component: krb5-libs git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15761 dc483132-0cff-0310-8789-dd5450dbe970
* configure.in: Don't assume all darwin boxes are powerpc. (eg: OpenDarwin/x86)Alexandra Ellwood2003-08-062-1/+6
| | | | | | ticket: 1718 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15757 dc483132-0cff-0310-8789-dd5450dbe970
* use new config file tag for master KDCKen Raeburn2003-07-252-1/+8
| | | | | | | | | | | | | | | | | | | | | | | | | We want to avoid making extra attempts to contact the "master" KDC, in the case where the password appears to be incorrect according to one KDC but we think maybe the master KDC could have a newer password, if there isn't actually a master KDC. Currently the admin_server tag is overloaded for kadmin and password changing. So, don't use it as a filter on the KDC list; instead, look for master_kdc as an independent list. (See also ticket 1511 re contacting the master twice if it's first in the regular KDC list.) Doc updates still needed. * locate_kdc.c (krb5_locate_kdc): Always pass 0 to locate_server as the get_masters argument. Instead, if get_masters is set, look up "master_kdc" in the config file instead of "kdc". ticket: new target_version: 1.3.2 tags: pullup status: open git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15736 dc483132-0cff-0310-8789-dd5450dbe970
* Send generalstring not octetstring in etype_info2. Accept eitherSam Hartman2003-07-227-15/+81
| | | | | | | | | | | | form. Also, if a etype_info fails to decode, skip it rather than failing to process the AS reply. Ticket: 1681 Tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15723 dc483132-0cff-0310-8789-dd5450dbe970
* Always register the file ccache in the set of registered ops. TheSam Hartman2003-07-222-2/+14
| | | | | | | | | | | resolve code may also find it as the default ops on some platforms, but this will not cause problems. ticket: 1684 owner: lxs status: open git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15716 dc483132-0cff-0310-8789-dd5450dbe970
* Change crypto "provider" structures to hold numeric values instead of functionKen Raeburn2003-07-2241-228/+190
| | | | | | | pointers for key sizes, block sizes, etc., when the values are always constant for each encryption or hash mechanism. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15714 dc483132-0cff-0310-8789-dd5450dbe970
* Don't combine encrypt and decrypt code paths.Ken Raeburn2003-07-222-19/+45
| | | | | | | | | | | | | Zap key schedule when done. * des3.c (validate_and_schedule): Split out from old k5_des3_docrypt. (k5_des3_encrypt, k5_des3_decrypt): Call it, and krb5int_des3_cbc_encrypt or _decrypt, instead of k5_des3_docrypt. Zap key schedules before returning. ticket: 1404 status: open git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15710 dc483132-0cff-0310-8789-dd5450dbe970
* crypto library has bogus dependence on com_errKen Raeburn2003-07-222-2/+4
| | | | | | | | | | | | Forgotten debugging code that was never removed... * pbkdf2.c (foo): Never call com_err. ticket: new target_version: 1.3.1 tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15707 dc483132-0cff-0310-8789-dd5450dbe970
* * f_cbc.c (krb5int_des_cbc_decrypt): Move declarations that were afterKen Raeburn2003-07-223-4/+10
| | | | | | | statements after flattening blocks is previous change. * d3_cbc.c (krb5int_des3_cbc_decrypt): Likewise. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15706 dc483132-0cff-0310-8789-dd5450dbe970
* Export krb5_principal2saltAlexandra Ellwood2003-07-212-0/+5
| | | | | | ticket: 1679 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15701 dc483132-0cff-0310-8789-dd5450dbe970
* * init_ets.c (krb5_init_ets): Only initialize error tables once -Ezra Peisach2003-07-192-5/+16
| | | | | | | | | | | | | | | so that init_conext/free_context loops do not result in memory leaks. I did not implement the remove error table functions - as a system installed com_err library might not support remove_error_table that exists in our trees com_err library. ticket: 1665 target_version: 1.3.1 tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15700 dc483132-0cff-0310-8789-dd5450dbe970
* krb5_gss_register_acceptor_identity does not allocate enough memory for ↵Ezra Peisach2003-07-192-1/+6
| | | | | | | | | | | | | | | | cached keytab * acquire_cred.c (krb5_gss_register_acceptor_identity): Allocate enough memory to include the null at the end of the keytab char *. Essentially off by one error. ticket: new target_version: 1.3.1 tags: pullup component: krb5-libs git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15699 dc483132-0cff-0310-8789-dd5450dbe970
* gssapi32.def: export the GSS_C_NT_xxxx constants as DATA. These are requiredJeffrey Altman2003-07-182-4/+15
| | | | | | | | | | | | by applications that wish to use the gss_nt_xxxx constants. ticket: 1666 target_version: 1.3.1 tags: pullup owner: jaltman@mit.edu status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15695 dc483132-0cff-0310-8789-dd5450dbe970
* Remove kg_release_defcred and caching of default credential. RewriteTom Yu2003-07-179-479/+625
| | | | | | | | | | | | krb5_gss_init_sec_context() while we're at it to make defcred-related changes easier, and as a side effect, fix some error condition memory leaks. ticket: 1365 target_version: 1.3.1 tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15694 dc483132-0cff-0310-8789-dd5450dbe970
* Use the old DES encrypt function, not the split versions via macrosKen Raeburn2003-07-174-0/+9
| | | | | | | | * des.c (mit_des_cbc_encrypt): Undef before use. * enc_dec.c (mit_des_cbc_encrypt): Likewise. * mac_des_glue.c (mit_des3_cbc_encrypt): Likewise. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15693 dc483132-0cff-0310-8789-dd5450dbe970
* Separate the DES encrypt and decrypt operations into separate functions,Ken Raeburn2003-07-174-254/+361
| | | | | | | | | | | | | | | | since they have almost no code in common. * f_cbc.c (krb5int_des_cbc_encrypt, krb5int_des_cbc_decrypt): New functions broken out from mit_des_cbc_encrypt. (mit_des_cbc_encrypt): Call them. * d3_cbc.c (krb5int_des3_cbc_encrypt, krb5int_des3_cbc_decrypt): New functions broken out from mit_des3_cbc_encrypt. (mit_des3_cbc_encrypt): Call them. * des_int.h (krb5int_des_cbc_encrypt, krb5int_des_cbc_decrypt, krb5int_des3_cbc_encrypt, krb5int_des3_cbc_decrypt): Declare. (mit_des_cbc_encrypt, mit_des3_cbc_encrypt): New macros. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15692 dc483132-0cff-0310-8789-dd5450dbe970
* delete ##WIN16## lines from makefilesKen Raeburn2003-07-1750-27/+101
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15691 dc483132-0cff-0310-8789-dd5450dbe970
* * krb5_libinit.c: Include autoconf.hKen Raeburn2003-07-152-0/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15690 dc483132-0cff-0310-8789-dd5450dbe970
* * Makefile.in (STLIBOBJS, OBJS, T_SER_OBJS): Drop ser_eblk.oKen Raeburn2003-07-152-5/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15689 dc483132-0cff-0310-8789-dd5450dbe970
* * accept_sec_context.c (krb5_gss_accept_sec_context): CallTom Yu2003-07-152-4/+9
| | | | | | | | | | TREAD_STR with correct arguments. Patch from Emily Ratliff. ticket: 1015 tags: pullup target_version: 1.3.1 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15687 dc483132-0cff-0310-8789-dd5450dbe970
* Check for NULL realm argument and n not equal to 1. Fill in realm with an ↵Alexandra Ellwood2003-07-112-0/+14
| | | | | | | | empty string on error in case the caller doesn't check the return value ticket: 1657 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15684 dc483132-0cff-0310-8789-dd5450dbe970
* RealmsConfig-glue.c: Don't fail when krb5.conf is valid and krb.conf isn't. ↵Alexandra Ellwood2003-07-112-2/+8
| | | | | | | | Also, don't assert v4 realm is in profile unless that realm is a valid v4 realm ticket: 1657 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15683 dc483132-0cff-0310-8789-dd5450dbe970
* Rewrote krb_get_lrealm to correctly handle the v4 realms section in the ↵Alexandra Ellwood2003-07-112-66/+101
| | | | | | | | profile and to return KFAILURE in the absence of any config (instead of returning ATHENA.MIT.EDU) ticket: 1657 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15682 dc483132-0cff-0310-8789-dd5450dbe970
* * acquire_cred.c (acquire_init_cred): Close the ccache ifTom Yu2003-07-102-0/+8
| | | | | | | | | | | krb5_cc_set_flags() fails, as krb5int_cc_default succeeds even if the file is not there, but krb5_cc_set_flags will fail in turning off OPENCLOSE mode if the file can't be opened. Thanks to Kent Wu. ticket: 1656 tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15680 dc483132-0cff-0310-8789-dd5450dbe970
* Export krb5_get_permitted_enctypes and krb5_set_real_time for SambaAlexandra Ellwood2003-07-096-2/+17
| | | | | | ticket: 1655 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15678 dc483132-0cff-0310-8789-dd5450dbe970
* This time, use the correct # of arguments for strcpyAlexandra Ellwood2003-07-081-1/+1
| | | | | | ticket: 1651 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15672 dc483132-0cff-0310-8789-dd5450dbe970
* krb_prof_get_nth() no longer assumes that its retlen argument is correct ↵Alexandra Ellwood2003-07-072-1/+9
| | | | | | | | (call strcpy instead of strncpy) because this argument is a guess for some callers (eg: krb_get_admhst()) ticket: 1651 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15671 dc483132-0cff-0310-8789-dd5450dbe970
* * gic_keytab.c (krb5_get_in_tkt_with_keytab): Pass (void*)keytab,Tom Yu2003-06-272-1/+6
| | | | | | | | | not &keytab, to get_init_creds. Thanks to Herb Lewis. ticket: 1630 tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15653 dc483132-0cff-0310-8789-dd5450dbe970
* With this patch, things seem to work with a Heimdal client and MIT KDCKen Raeburn2003-06-262-0/+6
| | | | | | | | | * checksum_length.c (krb5_c_checksum_length): Handle trunc_size. ticket: 1621 tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15652 dc483132-0cff-0310-8789-dd5450dbe970
* * cksumtypes.c (krb5_cksumtypes_list): Add aes128/256 hmacs, with newKen Raeburn2003-06-243-0/+24
| | | | | | | | | | | | trunc_size field. * make_checksum.c (krb5_c_make_checksum): If trunc_size is specified, shrink the computed checksum down to the indicated size. ticket: 1621 status: open git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15650 dc483132-0cff-0310-8789-dd5450dbe970
* Split out etype_info2 decoder from etype_info decoder. In theSam Hartman2003-06-204-4/+41
| | | | | | | | | etype_info decoder ignore Heimdal's tag 2. Ticket: 1619 Tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15638 dc483132-0cff-0310-8789-dd5450dbe970
* Set use_conf_ktypes to 1 while looking up the tgt to use forSam Hartman2003-06-162-0/+7
| | | | | | | | | forwarding. Ticket: 1610 Tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15627 dc483132-0cff-0310-8789-dd5450dbe970
* * server_kdb.c (kdb_init_hist): Force history principal's key toTom Yu2003-06-132-6/+16
| | | | | | | | | | be of the same enctype as the master key, as searches for it later on explicitly specify the enctype. ticket: 964 tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15621 dc483132-0cff-0310-8789-dd5450dbe970
* krb5_rd_rep leaks subkeysTom Yu2003-06-132-0/+13
| | | | | | | | | | | | * rd_rep.c (krb5_rd_rep): Free subkeys before replacing them, if needed. This avoids a memory leak. ticket: new target_version: 1.3 component: krb5-libs tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15620 dc483132-0cff-0310-8789-dd5450dbe970
* libgss leaks, UMRsTom Yu2003-06-133-0/+9
| | | | | | | | | | | | | | | | | | * init_sec_context.c (krb5_gss_init_sec_context): Free default_enctypes to avoid leaking returned value from krb5_get_tgs_ktypes. * k5unseal.c (kg_unseal_v1): Explicitly set token.value to NULL if token.length == 0, to avoid spurious uninitialized memory references when calling memcpy() with a zero length. ticket: new target_version: 1.3 tags: pullup component: krb5-libs cc: Kent_Wu@trendmicro.com git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15619 dc483132-0cff-0310-8789-dd5450dbe970
* make_ap_req_v1 leaks memoryTom Yu2003-06-132-0/+7
| | | | | | | | | | | | * init_sec_context.c (make_ap_req_v1): Free checksum_data if needed, to avoid leaking memory. Found by Kent Wu. ticket: new target_version: 1.3 tags: pullup component: krb5-libs git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15618 dc483132-0cff-0310-8789-dd5450dbe970
* Darwin libkrb4/err_txt.o needs dependency on krb_err.cTom Yu2003-06-113-1/+16
| | | | | | | | | | | | | | | * Makefile.in (KRB_ERR_C): New variable; Darwin needs err_txt.o to have a dependency on krb_err.c so that krb_err.c will be generated first. * configure.in: Set KRB_ERR_C to krb_err.c on Darwin. ticket: new target_version: 1.3 tags: pullup component: krb5-build git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15610 dc483132-0cff-0310-8789-dd5450dbe970
* Don't escape rcache filename characters with backslashTom Yu2003-06-112-5/+10
| | | | | | | | | | | | * srv_rcache.c (krb5_get_server_rcache): Octal escapes begin with hyphen now, since backslash is a pathname separator on DOS. ticket: new target_version: 1.3 component: krb5-libs tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15609 dc483132-0cff-0310-8789-dd5450dbe970
* fix bug: would return krb.conf entries plus dns infoKen Raeburn2003-06-092-0/+9
| | | | | | | | | | * RealmsConfig-glue.c (krb_get_krbhst): Don't fall back to DNS if entries were found in krb.conf, and just not enough to fill the request. ticket: 1550 status: open git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15599 dc483132-0cff-0310-8789-dd5450dbe970
* Checkpoint some working code.Ken Raeburn2003-06-072-4/+77
| | | | | | | | | | | | | | | | | A better solution is in the works, but may or may not make the deadline for the next beta... * RealmsConfig-glue.c: Include k5-int.h. (dnscache): New variable. (DNS_CACHE_TIMEOUT): New macro. (krb_get_krbhst) [KRB5_DNS_LOOKUP]: If no krb.conf info is found, try DNS SRV records for "kerberos-iv". Cache results in case they're immediately requested again. ticket: 1550 status: open git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15598 dc483132-0cff-0310-8789-dd5450dbe970