summaryrefslogtreecommitdiffstats
path: root/src
Commit message (Expand)AuthorAgeFilesLines
...
* Revert due to potential file modes race conditionTom Yu2008-07-181-18/+14
* Make krb5_rc_io_creat() use mkstempTom Yu2008-07-181-14/+18
* In krb5_rc_io_creat(), unlink any existing rcache file before tryingTom Yu2008-07-171-1/+2
* CCAPI side of the patchAlexandra Ellwood2008-07-171-23/+30
* Removed _t suffix from KIM typesAlexandra Ellwood2008-07-179-762/+762
* Removed _t suffix from all type namesAlexandra Ellwood2008-07-1728-1067/+1067
* Apply patch from Mark Phalan to correctly use progname instead ofTom Yu2008-07-1710-165/+152
* Apply patch from Mark Phalan to initialize progname before useTom Yu2008-07-162-6/+11
* Fix indirection on assignment to minor statusTom Yu2008-07-161-4/+4
* Check return value from k5_mutex_lock() to partially mitigate someTom Yu2008-07-163-11/+25
* r1926@ken-wireless: raeburn | 2008-07-15 16:49:17 -0400Ken Raeburn2008-07-152-0/+72
* krb5_get_cred_via_tkt() should null out_cred on errorsTom Yu2008-07-151-0/+1
* Use RFC 3542's IPV6_RECVPKTINFO if available. (And IP_RECVPKTINFO too.)Ken Raeburn2008-07-141-2/+12
* In FREE_SET_DATA, reset the current count as wellKen Raeburn2008-07-121-1/+1
* Use all local addresses except loopback addresses, even if a non-loopbackKen Raeburn2008-07-121-17/+26
* Add comment and <TargetConditionals.h> to previousTom Yu2008-07-101-0/+11
* Use #pragma pop on the Mac to ensure that the krb5_gic_opt_extTom Yu2008-07-101-0/+8
* CCacheServer crashes iterating over creds which have been destroyedAlexandra Ellwood2008-07-101-7/+4
* Apply patch from Apple to handle missing krb5.conf for zeroconfTom Yu2008-07-101-2/+5
* Don't print spurious errors to debug logsAlexandra Ellwood2008-07-092-6/+8
* Add macro so we don't print deprecated warnings while building KfMAlexandra Ellwood2008-07-092-3/+3
* Use autogenerated darwin.exports files for server frameworksAlexandra Ellwood2008-07-094-2/+6
* Don't use "ccache" in error string printed to userAlexandra Ellwood2008-07-091-1/+1
* Use -dead_strip when linking dynamic libraries on DarwinKen Raeburn2008-07-091-1/+1
* add copyright to lib/crypto/enc_provider/aes.cTom Yu2008-07-091-0/+26
* Changes to krb5_kt_default_name changed the krb5 ABI. RevertedAlexandra Ellwood2008-07-082-2/+3
* Add kerberos iconAlexandra Ellwood2008-07-081-0/+0
* Add EnableTransactions launchd option to CCacheServerAlexandra Ellwood2008-07-071-0/+2
* krb5int_gic_opte_copy should copy elements individuallyAlexandra Ellwood2008-07-071-2/+13
* kdc does not compile with glibc 2.8 Ezra Peisach2008-07-061-2/+2
* stop exporting a few symbols internal to aes implementationKen Raeburn2008-07-031-5/+0
* Added type checking for 64-bit platformsAlexandra Ellwood2008-07-011-7/+10
* krb5_get_error_message returns const char *Alexandra Ellwood2008-07-011-2/+2
* memcpy(NULL, ptr, 0) is invalid, so don't do itKen Raeburn2008-06-301-1/+2
* make dependKen Raeburn2008-06-301-1/+2
* Big endian stash file supportAlexandra Ellwood2008-06-271-2/+18
* Check for strdup failure. Fix a memory leak in one failure caseKen Raeburn2008-06-271-0/+32
* misc uninitialized-storage accessesKen Raeburn2008-06-273-3/+5
* fix ktutil listing with timestampKen Raeburn2008-06-271-1/+2
* use-after-free bugsKen Raeburn2008-06-274-6/+4
* When returning an error, don't also pass back an invalid pointerKen Raeburn2008-06-271-1/+3
* call kg_delete_lucidctx_id before freeing, not afterKen Raeburn2008-06-271-1/+1
* Memory leak, and possible freed-memory dereference, in an error (smallKen Raeburn2008-06-271-1/+1
* misc memory leaksKen Raeburn2008-06-2710-16/+39
* fix free of automatic storageKen Raeburn2008-06-271-4/+4
* Don't do FD_SETSIZE check on Windows.Ken Raeburn2008-06-271-1/+3
* Fix off-by-one error in range check on file descriptor numberKen Raeburn2008-06-271-1/+1
* Fix possible null pointer deref, possible uninit ptr use, possibleKen Raeburn2008-06-271-6/+13
* Apple PKINIT LKDC supportAlexandra Ellwood2008-06-263-21/+96
* Rolled back patch because tickets 4495 and 5124 fix this bugAlexandra Ellwood2008-06-251-4/+1