1 2003-03-06 Tom Yu <tlyu@mit.edu>
3 * preauth2.c (pa_sam_2): Add intermediate size_t variable to hold
4 output of krb5_c_encrypt_length().
6 2003-03-06 Alexandra Ellwood <lxs@mit.edu>
8 * appdefault.c: Fix constness to avoid warning.
10 * init_ctx.c: Do the same stuff on the Mac as on Unix.
12 * preauth2.c: Added cast to fix warning.
14 2003-03-04 Tom Yu <tlyu@mit.edu>
16 * srv_rcache.c (krb5_get_server_rcache): Fix missed
17 isinvalidrcname -> isvalidrcname.
19 2003-03-02 Sam Hartman <hartmans@mit.edu>
21 * srv_rcache.c (krb5_get_server_rcache): If punctuation or graphic characters in replay ccache name then use escaping
23 * rd_req.c (krb5_rd_req): Allow initializing the replay cache from the ticket
25 2003-02-25 Tom Yu <tlyu@mit.edu>
27 * gic_pwd.c (krb5_get_init_creds_password): Don't pass a NULL
30 2003-02-14 Sam Hartman <hartmans@mit.edu>
32 * preauth2.c (krb5_do_preauth): Sort incoming etype info based on
33 preference order in request
35 2003-02-13 Sam Hartman <hartmans@mit.edu>
37 * gic_keytab.c (krb5_get_as_key_keytab): Nathan Neulinger points
38 out that the AS key is double freed; fix.
40 2003-02-11 Sam Hartman <hartmans@mit.edu>
42 * rd_cred.c (krb5_rd_cred): Free creds using krb5_free_tgt_creds
43 and make sure they are set to null in case of error.
45 2003-02-07 Sam Hartman <hartmans@mit.edu>
47 * rd_cred.c (krb5_rd_cred): Allow the tickets to be encrypted the
48 session key as well as the subsession key; for GSSAPI this tends
51 2003-02-04 Sam Hartman <hartmans@mit.edu>
53 * get_in_tkt.c (krb5_get_init_creds): Default to addressless tickets
55 2003-01-12 Ezra Peisach <epeisach@bu.edu>
57 * send_tgs.c (krb5_send_tgs): Free memory leak of TGS_REQ.
59 2003-01-10 Ken Raeburn <raeburn@mit.edu>
61 * Makefile.in: Add AC_SUBST_FILE marker for libobj_frag.
63 2003-01-09 Sam Hartman <hartmans@mit.edu>
65 * get_creds.c (krb5_get_credentials_core): Patch from Ben Cox
66 <cox-work@djehuti.com> to not use expired service credentials if
67 the endtime is null but instead to search for unexpired
68 credentials. If none are found, get new credentials.
71 2003-01-08 Sam Hartman <hartmans@mit.edu>
73 * fwd_tgt.c (krb5_fwd_tgt_creds): Don't require hostname to be supplied unless you are using addresses in the ticket.
75 2003-01-07 Ken Raeburn <raeburn@mit.edu>
77 * appdefault.c (conf_yes, conf_no): Now const.
79 2003-01-07 Sam Hartman <hartmans@mit.edu>
81 * mk_req_ext.c (krb5_mk_req_extended): Fix logic error in checksum function handling
82 (krb5_mk_req_extended): For consistency with Microsoft, never use a subkey before calling the checksum callback
84 2003-01-06 Sam Hartman <hartmans@mit.edu>
86 * mk_req_ext.c (krb5_mk_req_extended): Inf no in_data is provided
87 but krb5_auth_con_set_checksum_func has been called, then use that
88 callback to generate the in_data.
90 * auth_con.c (krb5_auth_con_init): Initialize checksum_func fields
91 (krb5_auth_con_set_checksum_func): new function-- set the mk_req
93 (krb5_auth_con_get_checksum_func): return the same
95 * auth_con.h: Add checksum_func and checksum_func_data
97 2002-12-23 Ezra Peisach <epeisach@bu.edu>
99 * t_kerb.c: Include string.h for strcmp prototype.
101 2002-12-19 Ken Raeburn <raeburn@mit.edu>
103 * conv_princ.c (krb5_524_conv_principal): Clean up use of "const"
106 2002-11-14 Ezra Peisach <epeisach@bu.edu>
108 * get_in_tkt.c (krb5_get_in_tkt): Do not pass NULL when an
109 integer 0 is intended to send_as_request().
111 2002-11-07 Ezra Peisach <epeisach@bu.edu>
113 * conv_princ.c (strnchr): Make length argument unsigned int.
115 * preauth2.c: Add parentheses around assignment used as truth
116 value. Cleanup unused variable.
119 2002-10-30 Tom Yu <tlyu@mit.edu>
121 * chk_trans.c (krb5_check_transited_list): Style nit: check
122 character against '\0' not NULL.
124 2002-10-30 Sam Hartman <hartmans@mit.edu>
126 * chk_trans.c: Ignore trailing null in transited encoding; older
127 versions of MIT code included this.
129 2002-10-28 Ken Raeburn <raeburn@mit.edu>
131 * get_in_tkt.c (conf_yes, conf_no): Now const. References
133 * preauth.c (preauth_systems): Now const. References updated.
134 * preauth2.c (pa_types): Now const.
135 (krb5_do_preauth): Local array paorder now const.
137 2002-10-28 Sam Hartman <hartmans@mit.edu>
139 * gic_keytab.c (krb5_get_init_creds_keytab): Don't allow failure
140 to resolve master KDC to mask error from a slave we did talk to.
142 2002-10-24 Ken Hornstein <kenh@cmf.nrl.navy.mil>
144 * gic_pwd.c (krb5_get_init_creds_password): Exit out of the loop
147 * kfree.c: Add various free functions for new preauth
150 * preauth2.c (pa_sam): Fix up support for "old" hardware preauth.
151 Also implement new hardware preauth in pa_sam2().
153 2002-10-23 Ken Hornstein <kenh@cmf.nrl.navy.mil>
155 * gic_pwd.c (krb5_get_init_creds_password): Fix bug in previous
156 password expiration warning; also, check for password expiration
157 warnings via LRQ type from krb-clarifications.
159 2002-09-11 Sam Hartman <hartmans@mit.edu>
161 * fwd_tgt.c (krb5_fwd_tgt_creds): If our initial tickets don't
162 have addresses, neither should forwarded tickets. Also, noticed
163 that cc was being used before initialized in some cases; fixed.
165 2002-09-02 Ken Raeburn <raeburn@mit.edu>
167 * addr_comp.c, addr_order.c, addr_srch.c, appdefault.c,
168 auth_con.c, bld_princ.c, chpw.c, cleanup.h, conv_princ.c,
169 copy_addrs.c, copy_athctr.c, copy_auth.c, copy_cksum.c,
170 copy_creds.c, copy_data.c, copy_key.c, copy_princ.c, copy_tick.c,
171 cp_key_cnt.c, decode_kdc.c, decrypt_tk.c, enc_helper.c,
172 encode_kdc.c, encrypt_tk.c, free_rtree.c, fwd_tgt.c, gc_frm_kdc.c,
173 gc_via_tkt.c, gen_seqnum.c, gen_subkey.c, get_creds.c,
174 get_in_tkt.c, gic_keytab.c, gic_opt.c, gic_pwd.c, in_tkt_ktb.c,
175 in_tkt_pwd.c, in_tkt_sky.c, init_ctx.c, kdc_rep_dc.c, kfree.c,
176 mk_cred.c, mk_error.c, mk_priv.c, mk_rep.c, mk_req.c,
177 mk_req_ext.c, mk_safe.c, parse.c, pr_to_salt.c, preauth.c,
178 preauth2.c, princ_comp.c, rd_cred.c, rd_error.c, rd_priv.c,
179 rd_rep.c, rd_req.c, rd_req_dec.c, rd_safe.c, recvauth.c,
180 send_tgs.c, sendauth.c, ser_actx.c, ser_adata.c, ser_addr.c,
181 ser_auth.c, ser_cksum.c, ser_ctx.c, ser_key.c, ser_princ.c,
182 serialize.c, set_realm.c, srv_rcache.c, str_conv.c, t_deltat.c,
183 t_kerb.c, t_ser.c, t_walk_rtree.c, tgtname.c, unparse.c,
184 valid_times.c, vfy_increds.c, vic_opt.c, walk_rtree.c,
185 x-deltat.y: Use prototype style function definitions.
186 * deltat.c: Regenerated.
187 * bld_princ.c: Include stdarg.h before k5-int.h.
188 * cleanup.h (struct cleanup): Include prototype for function
189 pointer field 'func'.
191 2002-08-29 Ken Raeburn <raeburn@mit.edu>
193 * Makefile.in: Revert $(S)=>/ change, for Windows support.
195 2002-08-23 Ken Raeburn <raeburn@mit.edu>
197 * Makefile.in: Change $(S)=>/ and $(U)=>.. globally.
199 2002-08-22 Ken Raeburn <raeburn@mit.edu>
201 * init_ctx.c (init_common): Initialize udp_pref_limit field.
203 2002-08-15 Tom Yu <tlyu@mit.edu>
205 * t_ser.c (ser_ccache_test): Remove references to STDIO ccaches.
207 2002-08-01 Tom Yu <tlyu@mit.edu>
209 * unparse.c (krb5_unparse_name_ext): Error out if passed a NULL
210 pointer. Patch from Mark Levinson; fixes [krb5-admin/1140].
212 2002-06-26 Ezra Peisach <epeisach@bu.edu>
214 * appdefault.c (conf_boolean): Change variable from char ** to
215 const char ** to prevent warning of const to non-const.
217 * get_in_tkt.c (_krb5_conf_boolean): Same
219 2002-06-25 Alexandra Ellwood <lxs@mit.edu>
221 * appdefault.c, get_in_tkt.c: made conf_yes and conf_no const to
222 improve load time on Mach-O
224 * init_ctx: fixed Mac OS macros
226 [pullups from 1-2-2-branch]
228 2001-06-25 Miro Jurisic <meeroh@mit.edu>
230 * rd_safe.c, rd_priv.c, rd_cred.c, preauth.c, mk_safe.c,
231 mk_cred.c, appdefault.c: use "" includes for krb5.h, k5-int.h and
233 [pullup from 1-2-2-branch]
235 2002-06-18 Ken Raeburn <raeburn@mit.edu>
237 * sendauth.c (ECONNABORTED): Don't define here now that it's
238 defined in port-sockets.h.
240 2002-06-18 Danilo Almeida <dalmeida@mit.edu>
242 * princ_comp.c (krb5_realm_compare), auth_con.c
243 (krb5_auth_con_setports, krb5_auth_con_getaddrs,
244 krb5_auth_con_initivector), addr_order.c (krb5_address_order),
245 addr_comp.c (krb5_address_compare): Make KRB5_CALLCONV.
246 [pullup from 1-2-2-branch]
248 2002-06-18 Danilo Almeida <dalmeida@mit.edu>
250 * bld_princ.c (krb5_build_principal_va): Make
251 krb5_build_principal_va() KRB5_CALLCONV.
252 [pullup from 1-2-2-branch]
254 2002-06-12 Ken Raeburn <raeburn@mit.edu>
256 * preauth.c: Don't include syslog.h.
258 2002-06-10 Ken Raeburn <raeburn@mit.edu>
260 * get_in_tkt.c (send_as_request): Update arg list for
261 sendto_kdc. If a RESPONSE_TOO_BIG error is returned from the KDC,
262 use a TCP connection.
263 * send_tgs.c (krb5_send_tgs): Update arg list for sendto_kdc. If
264 a RESPONSE_TOO_BIG error is returned from the KDC, use a TCP
267 2002-04-12 Ezra Peisach <epeisach@bu.edu>
269 * Makefile.in (clean): Remove t_expand and t_expand.o
271 2002-04-12 Ken Raeburn <raeburn@mit.edu>
273 * conv_princ.c (struct krb_convert): Add new field 'len'.
274 (RC, R, NR): New macros.
275 (sconv_list): Use them.
276 (krb5_524_conv_principal): Compare lengths and then use memcmp.
278 * recvauth.c (sendauth_version): Now a const array.
279 * sendauth.c (sendauth_version): Now a const array.
280 (krb5_sendauth): Cast address when assigning to outbuf data
283 2002-04-05 Ken Raeburn <raeburn@mit.edu>
285 * decrypt_tk.c (krb5_decrypt_tkt_part): Call krb5_c_valid_enctype
286 instead of valid_enctype.
287 * encode_kdc.c (krb5_encode_kdc_rep): Likewise.
288 * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): Likewise.
289 * gic_keytab.c (krb5_get_as_key_keytab): Likewise.
290 * in_tkt_ktb.c (keytab_keyproc): Likewise.
291 * in_tkt_sky.c (skey_keyproc): Likewise.
292 * init_ctx.c (krb5_set_default_in_tkt_ktypes,
293 krb5_set_default_tgs_enctypes): Likewise.
294 * send_tgs.c (krb5_send_tgs): Likewise.
296 * mk_safe.c (krb5_mk_safe_basic): Call krb5_c_valid_cksumtype,
297 krb5_c_is_coll_proof_cksum, krb5_c_is_keyed_cksum instead of
299 * rd_safe.c (krb5_rd_safe_basic): Likewise.
301 2002-03-28 Sam Hartman <hartmans@mit.edu>
303 * Makefile.in : New file init_keyblock.c
305 * init_keyblock.c (krb5_init_keyblock): New function
307 2002-03-16 Sam Hartman <hartmans@mit.edu>
309 * fwd_tgt.c (krb5_fwd_tgt_creds): Fix merge of patch from 1.2.2
312 2002-03-14 Sam Hartman <hartmans@mit.edu>
314 * walk_rtree.c (krb5_walk_realm_tree): Fix handling of null client or server realm
316 2002-03-06 Ken Raeburn <raeburn@mit.edu>
318 * ser_actx.c (krb5_auth_context_externalize): Do bounds checking
319 on converted size value.
321 * fwd_tgt.c (krb5_fwd_tgt_creds): If no session key has been set,
322 try getting credentials and use the session key type as a hint
323 for the enctype to use for the forwarded credentials.
325 2002-02-27 Sam Hartman <hartmans@mit.edu>
327 * rd_cred.c (krb5_rd_cred_basic): Don't check IP addresses; if
328 someone knows the key and wants to give us credentials, that's OK.
329 No reflection attack is possible in most protocols since krb_cred
330 is almost always client->server. Address checking created
331 significant problems for NATs. We also ran into problems
332 getting our code to work with Heimdal and removing checking was
333 easier than a staged upgrade to fix the problems.
334 (krb5_rd_cred): Don't pass in addresses
336 2002-02-22 Ken Raeburn <raeburn@mit.edu>
338 * addr_comp.c, addr_order.c, addr_srch.c, bld_pr_ext.c,
339 bld_princ.c, enc_helper.c, encrypt_tk.c, gen_seqnum.c,
340 gen_subkey.c, preauth.c: Use const instead of krb5_const.
341 * bld_pr_ext.c, bld_princ.c: Always use stdarg macros and not
344 2002-01-08 Sam Hartman <hartmans@mit.edu>
346 * gen_subkey.c (krb5_generate_subkey): Label entropy sources
348 * init_ctx.c (init_common): Use /dev/urandom if present for random data
350 2001-12-05 Ezra Peisach <epeisach@mit.edu>
352 * t_ser.c (main): Free context on failure exit route.
354 2001-11-24 Sam Hartman <hartmans@mit.edu>
356 * fwd_tgt.c (krb5_fwd_tgt_creds): Get a session key for the
357 forwarded tgt that is the same as the session key for the
358 auth_context. This is an enctype we know the remote side
361 2001-11-26 Sam Hartman <hartmans@mit.edu>
363 * gen_seqnum.c (krb5_generate_seq_number): add entropy source id
365 * sendauth.c (krb5_sendauth): Add entropy source ID
367 * mk_req_ext.c (krb5_mk_req_extended): Add entropy source ID to random seed call
369 * init_ctx.c (init_common): Specify entropy source for random seed
371 2001-11-16 Sam Hartman <hartmans@mit.edu>
373 * init_ctx.c (krb5_set_default_tgs_enctypes): rename from
374 set_default_ktypes; old function provided as APIA
376 2001-11-16 Ezra Peisach <epeisach@mit.edu>
378 * init_ctx.c (DEFAULT_ETYPE_LIST): Ensure space present after
379 arcfour-hmac-md5 entry for when ANSI strings concatenated the
380 des-cbc-crc entry was dropped.
382 2001-11-07 Sam Hartman <hartmans@mit.edu>
384 * init_ctx.c (DEFAULT_ETYPE_LIST): Add arcfour-hmac-md5; it really
385 is probably at least as good as DES
387 2001-10-10 Danilo Almeida <dalmeida@mit.edu>
389 * gic_pwd.c (krb5_get_as_key_password),
390 gic_keytab.c (krb5_get_as_key_keytab): Use ANSI-style
391 declaration in definition.
393 2001-10-09 Ken Raeburn <raeburn@mit.edu>
395 * init_ctx.c (init_common): After fetching kdc_default_options
396 value from krb5.conf, actually use that value. Pointed out by
397 Emily Ratliff, <ratliff@austin.ibm.com>.
399 * get_in_tkt.c, in_tkt_ktb.c, in_tkt_pwd.c, in_tkt_sky.c,
400 int-proto.h, mk_req_ext.c, pr_to_salt.c, rd_req_dec.c, ser_actx.c,
401 ser_adata.c, ser_addr.c, ser_auth.c, ser_cksum.c, ser_ctx.c,
402 ser_eblk.c, ser_key.c, ser_princ.c, t_kerb.c: Make prototypes
405 2001-10-05 Ken Raeburn <raeburn@mit.edu>
407 * init_ctx.c, preauth.c: Drop _MSDOS support.
409 2001-10-03 Ken Raeburn <raeburn@mit.edu>
411 * appdefault.c, auth_con.c, bld_pr_ext.c, bld_princ.c, chpw.c,
412 conv_princ.c, copy_addrs.c, copy_athctr.c, copy_auth.c,
413 copy_cksum.c, copy_creds.c, copy_data.c, copy_key.c, copy_princ.c,
414 copy_tick.c, cp_key_cnt.c, decrypt_tk.c, fwd_tgt.c, get_creds.c,
415 get_in_tkt.c, gic_keytab.c, gic_opt.c, gic_pwd.c, in_tkt_ktb.c,
416 in_tkt_pwd.c, in_tkt_sky.c, init_ctx.c, kfree.c, mk_cred.c,
417 mk_error.c, mk_priv.c, mk_rep.c, mk_req.c, mk_req_ext.c,
418 mk_safe.c, parse.c, princ_comp.c, rd_cred.c, rd_error.c,
419 rd_priv.c, rd_rep.c, rd_req.c, rd_safe.c, recvauth.c, sendauth.c,
420 ser_actx.c, ser_ctx.c, serialize.c, set_realm.c, srv_rcache.c,
421 str_conv.c, unparse.c, vfy_increds.c, vic_opt.c, x-deltat.y: Don't
422 use KRB5_DLLIMP. Don't explicitly declare pointers FAR any more.
424 2001-09-07 Ken Raeburn <raeburn@mit.edu>
426 * t_expand.c: New file.
427 * Makefile.in (SRCS): Add test-case source files; rebuilt
429 (t_expand.o): Build from t_expand.c now, no special build rule.
431 2001-09-07 Ken Raeburn <raeburn@mit.edu>
433 * rd_req_dec.c (krb5_rd_req_decoded_opt): Pass server realm to
434 transited-list check, not local realm, in case they're different.
436 2001-08-21 Ken Raeburn <raeburn@mit.edu>
438 * walk_rtree.c (krb5_walk_realm_tree): Initialize slen to silence
441 2001-08-08 <epeisach@mit.edu>
443 * walk_rtree.c (krb5_walk_realm_tree): Do not try to free const char *.
445 * mk_safe.c (krb5_mk_safe_basic): Do not declare local_addr and
446 remote_addr const and then cast the attribute away.
448 * mk_req_ext.c (krb5_generate_authenticator): Static function -
449 remove const attribute from cksum pointer.
451 * gc_via_tkt.c (krb5_get_cred_via_tkt): Cast unsigned integer
452 krb5_error error_value to signed before adding
453 ERROR_TABLE_BASE_krb5.
455 2001-07-31 Ken Raeburn <raeburn@mit.edu>
457 * chk_trans.c (krb5_check_transited_list): Pointer args now point
460 2001-07-31 Ezra Peisach <epeisach@mit.edu>
462 * get_in_tkt.c: Cast to unsigned krb5_error error value to
463 krb5_error_code before trying to add to ERROR_TABLE_BASE_krb5.
465 2001-07-30 Ezra Peisach <epeisach@mit.edu>
467 * sendauth.c (krb5_sendauth): Instead of casting second argument
468 to getpeername() and getsockname() to "struct sockaddr *", cast to
469 system specific type as determined by autoconf.
471 2001-07-24 Ezra Peisach <epeisach@mit.edu>
473 * in_tkt_sky.c (krb5_get_in_tkt_with_skey): Change cast from
474 krb5_pointer to krb5_const_pointer to ensure const integrity of
477 * in_tkt_ktb.c (keytab_keyproc): Add const argument to cast of
478 keyseed to struct keytab_keyproc_arg to maintain const status.
480 * conv_princ.c (krb5_524_conv_principal): Cast argument to memcpy
483 2001-07-06 Ezra Peisach <epeisach@mit.edu>
485 * conv_princ.c (krb5_425_conv_principal): Cast argument to tolower
488 * get_in_tkt.c: Include os-proto.h for _krb5_conf_boolean prototype.
490 * Makefile.in (LOCALINCLUDES): Add -I$(srcdir)/../os so os-proto.h
493 2001-06-29 Tom Yu <tlyu@mit.edu>
495 * init_ctx.c (get_profile_etype_list): Fix etype-counting loop so
496 that trailing separator characters (as in the DEFAULT_ETYPE_LIST)
497 don't cause another iteration, which was causing the following
498 loop to fall off the end of the string due to count being one too
501 2001-06-28 Ezra Peisach <epeisach@mit.edu>
503 * chk_trans.c (foreach_realm): Cleanup loal variable set but never
506 2001-06-21 Ezra Peisach <epeisach@mit.edu>
508 * chk_trans.c: Cast length arguments of %.*s in formats to int.
510 2001-06-20 Ezra Peisach <epeisach@mit.edu>
512 * Makefile.in (check-unix): Add $(RUN_SETUP) before invocation of
513 transit-tests for shared library environment variables.
515 2001-06-19 Ken Raeburn <raeburn@mit.edu>
517 * chk_trans.c: Reimplemented from scratch.
518 * transit-tests: New file.
519 * Makefile.in (t_expand, t_expand.o): New targets. Build test
520 program from chk_trans.c.
521 (T_EXPAND_OBJS): New variable.
522 (TEST_PROGS): Add t_expand.
523 (check-unix): Run transit-tests.
524 * t_krb5.conf: Added capaths section.
526 2001-06-16 Ken Raeburn <raeburn@mit.edu>
528 * fwd_tgt.c (krb5_fwd_tgt_creds): Copy enctype for new creds from
531 2001-06-12 Ezra Peisach <epeisach@mit.edu>
533 * Makefile.in (t_walk_rtree, t_kerb): Do not link against kdb libraries
534 for these test executables.
536 * srv_rcache.c (krb5_get_server_rcache): Cast argument to
539 * init_ctx.c: Cast arguments to isspace() to int. If unix is defined,
540 include ../krb5_libinit.h. There has to be a better was for windows.
542 * conv_princ.c (krb5_425_conv_principal): Cast argument to isupper().
545 2001-06-11 Ezra Peisach <epeisach@mit.edu>
547 * str_conv.c: If strptime() is present on system without a
548 prototype, provide one.
550 2001-06-07 Ezra Peisach <epeisach@mit.edu>
552 * vfy_increds.c (krb5_verify_init_creds): Get rid of a variable
553 that was set in a conditional and never used afterwards.
555 2001-06-01 Ken Raeburn <raeburn@mit.edu>
557 * init_ctx.c (get_profile_etype_list): Zero out multiple separator
558 characters between tokens, so the second can be recognized
561 2001-04-04 Tom Yu <tlyu@mit.edu>
563 * mk_safe.c (krb5_mk_safe): Only use safe_cksumtype from the
564 auth_context (derived from the config file or hardcoded default)
565 if it's suitable for the enctype of the key we're going to
566 use. [pullup from krb5-1-2-2-branch]
568 2001-03-28 Ken Raeburn <raeburn@mit.edu>
570 * init_ctx.c (DEFAULT_ETYPE_LIST): New macro. Old etype list,
571 plus des-md4, with des-crc before des-mdX for now.
572 (get_profile_etype_list): Use DEFAULT_ETYPE_LIST.
574 2001-03-10 Ezra Peisach <epeisach@mit.edu>
576 * init_ctx.c: Provide a full prototype for init_common().
578 * recvauth.c (recvauth_common): Declare recvauth_common as static.
580 * parse.c, sendauth.c: Changes to prevent shadowing of local
583 * get_in_tkt.c, tgtname.c: Include int-proto.h for prototypes.
585 2001-03-03 Ken Raeburn <raeburn@mit.edu>
587 * preauth2.c (pa_sam): Return an error if no prompter was
590 2001-02-15 Ezra Peisach <epeisach@mit.edu>
592 * t_deltat.c (main): Test of overflow and underflow of krb5_int32.
594 * x-deltat.y: Test for over/underflow of krb5_int32 for a
595 krb5_deltat. Return EINVAL. [krb5-libs/922]
597 * deltat.c: Regenerated from x-deltat.y
599 * str_conv.c (krb5_string_to_timestamp): Do not accept a time
600 format that only partially matches the input string. [krb5-lib/922]
602 2001-01-30 Tom Yu <tlyu@mit.edu>
604 * preauth.c (krb5_obtain_padata): Don't dereference a NULL pointer
605 if we receive an empty ETYPE_INFO preauth. [krb5-libs/903 from
606 craziboy77@hotmail.com]
608 * preauth2.c (krb5_do_preauth): Don't dereference a NULL pointer
609 if we receive an empty ETYPE_INFO preauth. [krb5-libs/903 from
610 craziboy77@hotmail.com]
612 2001-01-30 Ezra Peisach <epeisach@mit.edu>
614 * rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): Free
615 krb5_keytab_entry if call to krb5_decrypt_tkt_part()
616 fails. [krb5-libs/855 reported by guy@packeteer.com]
618 2001-01-19 Ken Raeburn <raeburn@mit.edu>
620 * preauth.c: Don't use PROTOTYPE macro, just always use the
623 2001-01-19 Tom Yu <tlyu@mit.edu>
625 * preauth.c: Remove uses of KRB5_NPROTOTYPE() macro.
627 2000-10-26 Ezra Peisach <epeisach@mit.edu>
629 * t_ser.c: Cast getpid() calls to int as arguments to sprintf.
631 * ser_actx.c: Move prototypes (listed below) to int-proto.h
633 * int-proto.h: Add prototypes for krb5_ser_authdata_init,
634 krb5_ser_address_init, krb5_ser_authenticator_init,
635 krb5_ser_checksum_init, krb5_ser_keyblock_init,
636 krb5_ser_principal_init.
638 * ser_adata.c, ser_addr.c, ser_auth.c, ser_cksum.c, ser_key.c,
639 ser_princ.c: Include int-proto.h for prototypes.
641 2000-10-17 Ezra Peisach <epeisach@mit.edu>
643 * bld_pr_ext.c, bld_princ.c (krb5_build_principal_ext,
644 krb5_build_principal_va, krb5_build_principal): Take an unsigned
647 * get_in_tkt.c (krb5_get_init_creds): Use SALT_TYPE_AFS_LENGTH
650 * gic_pwd.c (krb5_get_as_key_password): Use SALT_TYPE_AFS_LENGTH
653 * in_tkt_pwd.c (pwd_keyproc): Argument to krb5_read_password is
656 * pr_to_salt.c (krb5_principal2salt_internal): Declare as
657 static. Unsigned int fix.
659 * preauth.c (krb5_obtain_padata): Use SALT_TYPE_AFS_LENGTH instead
662 * preauth2.c (pa_salt): Use SALT_TYPE_AFS_LENGTH instead of -1.
664 * conv_princ.c, copy_auth.c, copy_princ.c, gc_frm_kdc.c, parse.c,
665 send_tgs.c, srv_rcache.c: Unsigned/signed int cleanup.
667 * unparse.c (krb5_unparse_name_ext): size parameter changed to
670 2000-10-04 Ezra Peisach <epeisach@mit.edu>
672 * rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): Fix memory leak if
673 krb5_decrypt_tkt_part() fails. [krb5-libs/855]
675 2000-10-03 Ezra Peisach <epeisach@mit.edu>
677 * srv_rcache.c (krb5_get_server_rcache): Signed vs unsigned int
680 * pr_to_salt.c (krb5_principal2salt_internal): Add prototype for
681 internal function, and declare static.
683 * copy_addrs.c (krb5_copy_addresses): Cleanup unsigned vs signed
684 warnings as arguments to malloc().
686 Tue Sep 26 13:00:54 2000 Ezra Peisach <epeisach@mit.edu>
688 * conv_princ.c (krb5_425_conv_principal): Call profile_free_list
689 on v4realms during the iteration loop. Do not call
690 profile_release_string with a NULL pointer.
692 2000-09-25 Ezra Peisach <epeisach@mit.edu>
694 * t_kerb.c: Add prototypes for test functions.
696 2000-08-29 Ken Raeburn <raeburn@mit.edu>
698 * get_creds.c (krb5_get_credentials_core): If the supplied enctype
699 is not supported, return an error; can't satisfy both
700 TC_SUPPORTED_KTYPES and TC_MATCH_KTYPE that way. Delete unused
701 arguments CCACHE and OUT_CREDS; fix callers.
703 2000-07-18 Ezra Peisach <epeisach@mit.edu>
705 * vfy_increds.c: include int-proto.h for krb5_libdefault_boolean
708 * t_ser.c (ser_eblock_test): ifdef out old eblock serialization
709 test which is no longer called. (see 1999-09-01 ChangeLog)
711 * t_kerb.c: Cast argument to fprintf to long to agree with format
714 * t_deltat.c: If MIN is defined, undef before redefined as 60.
716 * str_conv.c: Provide strptime prototype if the system header
717 files fail to provide a prototype.
719 * int-proto.h: Add prototype for krb5_libdefault_boolean()
721 2000-06-30 Tom Yu <tlyu@mit.edu>
723 * conv_princ.c (krb5_425_conv_principal): NULL, not nil.
725 2000-06-30 Miro Jurisic <meeroh@mit.edu>
727 * conv_princ.c (krb5_425_conv_principal): Fixed a memory leak
729 2000-06-29 Ezra Peisach <epeisach@engrailed.mit.edu>
731 * t_walk_rtree.c (main): Declare as returning int.
733 * get_in_tkt.c (_krb5_conf_boolean): Declare as taking a const char *
735 * str_conv.c (krb5_timestamp_to_string): Work around gcc's warning
736 that %c format in strftime might return only two digits for the
739 * mk_safe.c, rd_rep.c, send_tgs.c: Remove unused goto label.
741 * kdc_rep_dc.c (krb5_kdc_rep_decrypt_proc): Remove code with no
744 * init_ctx.c: Make krb5_brand[] look used.
746 * chpw.c, decode_kdc.c, decrypt_tk.c, enc_helper.c, get_creds.c,
747 get_in_tkt.c, gic_keytab.c, gic_pwd.c, preauth2.c, vfy_increds.c:
748 Add parentheses around assignment used as truth value
750 2000-06-28 Ezra Peisach <epeisach@mit.edu>
752 * conv_princ.c, get_creds.c, get_in_tkt.c, mk_rep.c, parse.c,
753 send_tgs.c: Remove unused variable.
755 2000-06-23 Miro Jurisic <meeroh@mit.edu>
757 * conv_princ.c (krb5_425_conv_principal): Fixed v4->v5 realm
760 * conv_princ.c (krb5_425_conv_principal): Honor v4/v5 realm name
761 differences when convertion from v4 principals to v5.
763 2000-06-23 Tom Yu <tlyu@mit.edu>
765 * get_creds.c (krb5_get_credentials): Translate KRB5_CC_NOTFOUND
766 returned from krb5_get_cred_from_kdc() if a prior call to
767 krb5_cc_retrieve_cred() returned KRB5_CC_NOT_KTYPE.
769 * rd_priv.c (krb5_rd_priv_basic): Delete code that was incorrectly
770 doing explicit ivec chaining; c_decrypt() does it now.
772 * mk_priv.c (krb5_mk_priv_basic): Delete code that was incorrectly
773 doing explicit ivec chaining; c_encrypt() does it now.
775 * conv_princ.c (krb5_524_conv_principal): Make a copy of the krb5
776 realm that is nul-terminated to avoid falling off the end of the
777 krb5 realm, which is not necessarily nul-terminated.
779 2000-06-23 Danilo Almeida <dalmeida@mit.edu>
781 * init_ctx.c (krb5_get_tgs_ktypes, krb5_free_ktypes): Fix linkage to
784 2000-06-23 Ken Raeburn <raeburn@mit.edu>
786 * get_in_tkt.c (krb5_get_in_tkt): If enctypes are specified, send
787 the server the intersection of that list and the supported types,
788 in the order requested.
790 * recvauth.c (krb5_recvauth_version): New routine, takes a
791 krb5_data in which to store the client's application version
793 (recvauth_common): Renamed from krb5_recvauth, added above
794 functionality depending on extra argument values.
795 (krb5_recvauth): New stub, calls above routine with extra dummy
798 * kfree.c: Remove unneeded "return" statements at the end of many
800 (krb5_free_*_content, krb5_free_*_contents,
801 krb5_free_cred_enc_part, krb5_free_pwd_sequences): Set freed
802 pointer members to null when containing structure isn't being
805 * t_kerb.c (test_524_conv_principal): New test code, to exercise
806 bbense's code addition.
807 (main, usage): Updated.
808 * t_krb5.conf: Added stanford.edu->IR.STANFORD.EDU mapping, and a
809 test case for improperly long v4 realm names.
810 * Makefile.in (check-unix): Run 524 conversion test for some test
811 Athena and Stanford names.
812 * t_ref_kerb.out: Updated.
814 * init_ctx.c (init_common): Feed current-microsecond time and
815 process-id into PRNG, instead of just current-second time.
816 * mk_req_ext.c (krb5_mk_req_extended): Feed current time into
817 PRNG if a subkey will be generated.
818 * sendauth.c (krb5_sendauth): Feed local and remote addresses of
819 socket, if they can be determined, into the PRNG if a subkey will
822 * init_ctx.c (krb5_free_ktypes): New routine, to free values
823 returned by krb5_get_tgs_ktypes, krb5_get_permitted_enctypes, and
824 krb5_get_default_in_tkt_ktypes.
825 (krb5_set_default_tgs_ktypes, krb5_is_permitted_enctype): Use it.
826 (get_profile_etype_list): Use passed-in enctype list if the
827 passed-in count is non-zero, instead of checking the
828 in_tkt_ktype_count value in the context.
830 2000-06-23 Ken Raeburn <raeburn@mit.edu>
831 Nalin Dahyabhai <nalin@redhat.com>
833 * conv_princ.c (krb5_524_conv_principal): Return an error if name
834 is too long. Use memcpy for character data since we already know
837 2000-06-23 Nalin Dahyabhai <nalin@redhat.com>
839 * kfree.c (krb5_free_keyblock_contents): Set contents pointer to
842 * chk_trans.c (krb5_check_transited_list): Don't overflow buffers
844 * conv_princ.c (krb5_425_conv_principal): Don't overflow buffer
847 2000-06-23 Ken Raeburn <raeburn@mit.edu>
848 Booker C. Bense <bbense@networking.stanford.edu>
850 * conv_princ.c (krb5_524_conv_principal): Look up v4_realm in
851 config file, in case site's krb4 realm name isn't the same as the
854 2000-05-31 Wilfredo Sanchez <tritan@mit.edu>
856 * fwd_tgt.c: Check for existance of <memory.h>.
857 [from Nathan Neulinger <nneul@umr.edu>]
859 2000-5-19 Alexandra Ellwood <lxs@mit.edu>
861 * sendauth.c, fwd_tgt.c: Changed to use krb5int_cc_default. This function
862 supports the Kerberos Login Library and pops up a dialog if the cache does
863 not contain valid tickets. This is used to automatically get a tgt before
864 obtaining service tickets. Note that this should be an internal function
865 because callers don't expect krb5_cc_default to pop up a dialog!
866 (We found this out the hard way :-)
868 2000-05-15 Jeffrey Altman <jaltman@columbia.edu>
870 * Added new source file appdefault.c
871 Implements new public functions
873 krb5_appdefault_string
874 krb5_appdefault_boolean
876 2000-04-28 Alexandra Ellwood <lxs@mit.edu>
878 * gic_pwd.c (krb5_init_creds_password) added code to return to
879 login library if the password is expired (login library handles
880 this error appropriately).
882 2000-04-08 Tom Yu <tlyu@mit.edu>
884 * vfy_increds.c (krb5_verify_init_creds): appdefault_boolean ->
885 libdefault_boolean; it somehow got missed earlier.
887 2000-04-07 Jeffrey Altman <jaltman@columbia.edu>
889 * gic_pwd.c (krb5_get_init_creds_keytab), gic_pwd.c
890 (krb5_get_init_creds_password) when determining whether or not to
891 retry with a "master kdc" do not retry if the return value from
892 the first attempt was KRB5_REALM_CANT_RESOLV. Also, do not
893 overwrite the return code if the return value from the access to
894 the "master kdc" was KRB5_REALM_CANT_RESOLV.
896 2000-03-15 Danilo Almeida <dalmeida@mit.edu>
898 * init_ctx.c (init_common), gic_pwd.c (krb5_get_as_key_password,
899 krb5_get_init_creds_password), preauth2.c (pa_sam): Add support
900 for krb5_get_prompt_types().
902 2000-03-13 Ken Raeburn <raeburn@mit.edu>
904 * preauth2.c (pa_function): Called function now takes new
905 krb5_enctype pointer argument.
906 (pa_salt, pa_sam): Accept new arg, ignore it.
907 (pa_enc_timestamp): Accept new arg. If value pointed to is
908 nonzero, pass it to get-AS-key fn instead of first requested
909 enctype. Added some debugging fprintf calls, conditionally
911 (krb5_do_preauth): Accept new arg, and pass it through to the
912 specific preauth functions. Added some debugging fprintf calls,
913 conditionally compiled.
915 * get_in_tkt.c (krb5_get_init_creds): Pass etype pointer to
918 2000-03-12 Ezra Peisach <epeisach@mit.edu>
920 * addr_comp.c, addr_order.c, addr_srch.c, bld_pr_ext.c,
921 bld_princ.c, encrypt_tk.c, gen_seqnum.c, gen_subkey.c: Change
922 prototypes to use krb5_const instead of const to match the entries
925 2000-03-10 Miro Jurisic <meeroh@mit.edu>
927 * get_in_tkt.c (krb5_get_init_creds): Always initialize local_as_reply
928 to avoid returning garbage on error returns.
930 2000-02-25 Ken Raeburn <raeburn@mit.edu>
932 * preauth2.c (krb5_do_preauth): Check paorder[h] not h for
933 PA_REAL. Fix from Matt Crawford.
935 2000-02-16 Ken Raeburn <raeburn@mit.edu>
937 * preauth2.c (pa_sam): In send-encrypted-sad mode, check for magic
938 salt length and generate a salt from the principal name if found;
939 use the password and salt to generate a key. Provide timestamp if
940 nonce is zero, regardless of preauth mode. (Patch from Chas
943 2000-02-07 Ken Raeburn <raeburn@mit.edu>
945 * gic_pwd.c (krb5_get_as_key_password): If the as_key enctype is
946 already set to the correct type, do continue and ask for the
947 password anyways. (Patch from Chas Williams, PR krb5-libs/730.)
949 * preauth2.c (pa_sam): If no sam_flags were set, return
950 KRB5_PREAUTH_BAD_TYPE, because we don't currently handle that
953 2000-02-06 Ken Raeburn <raeburn@mit.edu>
955 * preauth2.c (pa_sam): Remove unused variable use_sam_key.
956 (SAMDATA): Cast first result to int, which is what sprintf needs.
957 (pa_salt): Delete unused variable ret.
959 Patches from Frank Cusack:
960 * kfree.c (krb5_free_predicted_sam_response_contents): Fix typo.
961 Free new data fields if needed.
962 (krb5_free_enc_sam_response_enc_contents): Update for field name
964 * preauth.c (obtain_sam_padata): Update for field name change.
965 * preauth2.c (pa_sam): Likewise.
967 2000-01-27 Ken Raeburn <raeburn@mit.edu>
969 * init_ctx.c (get_profile_etype_list): Discard DESONLY changes
970 from 1999-09-01, and revert call sites.
972 1999-12-02 Ken Raeburn <raeburn@mit.edu>
974 * init_ctx.c (get_profile_etype_list): Report an error if no
975 recognized enctypes are found in the config file.
977 1999-11-23 Ken Raeburn <raeburn@mit.edu>
979 * init_ctx.c (init_common): Renamed from krb5_init_context, now
980 static. New argument SECURE provides initialization of
981 profile_secure field.
982 (krb5_init_context): Call it.
983 (krb5_init_secure_context): New function.
985 * in_tkt_ktb.c (keytab_keyproc): Now static.
986 * in_tkt_pwd.c (pwd_keyproc): Now static.
987 * in_tkt_sky.c (skey_keyproc): Now static.
989 * preauth2.c (krb5_do_preauth): Fix syntax in switch statement.
990 Cast padata contents pointer to avoid warning.
991 (pa_types): Now static.
993 * str_conv.c (krb5_deltat_to_string): Always write to a local
994 temporary buffer that's guaranteed to be large enough, then see if
995 the supplied output buffer is big enough.
996 (krb5_string_to_deltat): Deleted.
997 * x-deltat.y, deltat.c: New files.
998 * Makefile.in (deltat.c): Add rule for building from x-deltat.y,
999 but comment out dependencies for easier maintenance.
1000 (BISON, BISONFLAGS): New variables.
1002 * str_conv.c: Removed most static char arrays, substituting the
1004 (krb5_string_to_timestamp): Move atime_format_table inside here.
1005 (krb5_timestamp_to_sfstring): Move sftime_format_table inside
1008 * str_conv.c: If strftime or strptime are not available, include
1009 the renamed NetBSD versions, and define the function names as
1010 macros to map them to the replacement names.
1011 (__P, _CurrentTimeLocale, dummy_locale_info, TM_YEAR_BASE,
1012 DAYSPERLYEAR, DAYSPERNYEAR, DAYSPERWEEK, isleap, tzname, tzset):
1013 Define some dummies for strftime/strptime to use.
1014 (strptime): Deleted old stub version.
1015 (krb5_timestamp_to_string, krb5_timestamp_to_sfstring): Always
1016 assume strftime is available.
1017 (krb5_string_to_timestamp): Assume strptime is always available.
1018 * strftime.c, strptime.c: New files, based on NetBSD versions.
1019 Modified to rename the functions and not export any symbols.
1021 * Makefile.in (T_DELTAT_OBJS): New variable.
1022 (TEST_PROGS): Add t_deltat.
1023 (t_deltat): Add rule.
1024 (clean): Added t_deltat stuff. Run rm only once.
1025 * t_deltat.c: New file.
1027 1999-11-02 Ken Raeburn <raeburn@mit.edu>
1029 * t_ref_kerb.out: Fix expected zephyr/zephyr output.
1031 1999-10-26 Wilfredo Sanchez <tritan@mit.edu>
1033 * Makefile.in: Clean up usage of CFLAGS, CPPFLAGS, DEFS, DEFINES,
1034 LOCAL_INCLUDES such that one can override CFLAGS from the command
1035 line without losing CPP search patchs and defines. Some associated
1038 1999-10-12 Ken Raeburn <raeburn@mit.edu>
1040 * conv_princ.c (sconv_list): Don't do conversion for "zephyr"
1041 principal. (Noticed by Derrick Brashear.) Delete about a dozen
1044 1999-09-01 Ken Raeburn <raeburn@mit.edu>
1046 * init_ctx.c (get_profile_etype_list): Update name of the des3
1047 entry in the default etype list.
1049 * init_ctx.c (get_profile_etype_list): New argument DESONLY; if
1050 set, ignore any ktype values other than NULL, DES_CBC_CRC, and
1052 (krb5_get_default_in_tkt_ktypes, krb5_get_tgs_ktypes): Set it.
1053 (krb5_get_permitted_enctypes): Don't set it.
1055 * fwd_tgt.c (krb5_fwd_tgt_creds): Use KRB5_TC_SUPPORTED_KTYPES
1056 when calling krb5_cc_retrieve_cred.
1057 * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): Ditto.
1058 * get_creds.c (krb5_get_credentials_core): Set that flag.
1059 (krb5_get_credentials): Check for KRB5_CC_NOT_KTYPE error return.
1061 * t_ser.c (main): Disable eblock serialization test, since the
1062 code it tests was disabled nearly a year ago.
1064 * str_conv.c (krb5_timestamp_to_sfstring): Don't pass extra
1065 argument to sprintf.
1067 1999-08-10 Alexandra Ellwood <lxs@mit.edu>
1069 * chpw.c (krb5_mk_chpw_req):
1070 Added call to free cipherpw.data. cipherpw.data is allocated
1071 by krb5_mk_priv and passed back. Since cipherpw is never
1072 passed back, krb5_mk_chpw_req should free it.
1074 1999-08-05 Danilo Almeida <dalmeida@mit.edu>
1076 * init_ctx.c (krb5_init_context): Document why krb5_win_ccdll_load
1077 is called way early in code. (It is because we need to have the
1078 ccapi stuff loaded before trying to get the OS-specific context
1079 initialization where we figure out default cache names and such.)
1081 1999-08-05 Danilo Almeida <dalmeida@mit.edu>
1083 * init_ctx.c (get_profile_etype_list): Use profile_release_string
1084 to free string allocated by profile_get_string.
1085 (krb5_init_context): Use a real context for krb5_win_ccdll_load.
1087 * get_in_tkt.c (krb5_appdefault_string):
1088 * conv_princ.c (krb5_425_conv_principal): Use profile_free_list
1089 to free values allocated by profile_get_values.
1091 1999-08-04 Danilo Almeida <dalmeida@mit.edu>
1093 * get_in_tkt.c (_krb5_conf_boolean, krb5_appdefault_boolean):
1094 Rename krb5_conf_boolean to _krb5_conf_boolean to denote that
1095 it is not public so that folks outside the libraries won't
1096 be tempted to use it.
1098 1999-08-03 Danilo Almeida <dalmeida@mit.edu>
1100 * get_creds.c (krb5_validate_or_renew_creds): Intialize out_creds
1101 pointer to 0 and then check whether it is 0 before trying to
1102 dereference it, in case lower-level routine failed to assign
1105 1999-07-22 Jeffrey Altman <jaltman@columbia.edu>
1107 get_in_tkt.c: rename conf_boolean to krb5_conf_boolean so that
1108 it may be used in additional modules.
1110 1999-06-28 Tom Yu <tlyu@mit.edu>
1112 * enc_helper.c (krb5_encrypt_helper): NULL out the pointer to the
1113 ciphertext if there is an error; this prevents stuff farther up
1114 from freeing freed memory.
1116 1999-06-18 Ken Raeburn <raeburn@mit.edu>
1118 * init_ctx.c (krb5_free_context): Set field pointers to NULL after
1119 freeing targets, in case higher-level code retains pointers into
1120 the context structure. (From Jeffrey Altman.)
1122 Thu May 13 17:31:34 1999 Theodore Y. Ts'o <tytso@mit.edu>
1124 * init_ctx.c (krb5_init_context): Pass the context to
1125 kkrb5_win_ccdll_load so that it can register the FILE
1126 ccache type if using ccapi (so that the FILE ccache type
1129 Mon May 10 15:26:00 1999 Danilo Almeida <dalmeida@mit.edu>
1131 * Makefile.in: Do win32 build in subdir.
1133 1999-04-09 Theodore Ts'o <tytso@rsts-11.mit.edu>
1135 * kfree.c (krb5_free_sam_challenge, krb5_free_sam_challenge_contents,
1136 krb5_free_sam_response, krb5_free_sam_response_contents,
1137 krb5_free_predicted_sam_response,
1138 krb5_free_predicted_sam_response_contents,
1139 krb5_free_enc_sam_response_enc,
1140 krb5_free_enc_sam_response_enc_contents,
1141 krb5_free_pa_enc_ts): Added new functions. Part of
1142 patches from [krb5-kdc/662]
1144 * gic_pwd.c (krb5_get_init_creds_password): Add new argument to
1145 calls to the prompter function. Part of patches from
1148 * preauth2.c (pa_enc_timestamp, pa_sam): Update calls to new
1149 prompter function. [krb5-kdc/662].
1151 1999-03-31 Theodore Ts'o <tytso@rsts-11.mit.edu>
1153 * init_ctx.c (krb5_init_context): Call krb5_win_ccdll_load() to
1154 load the krbcc32.dll under windows.
1156 Mon Mar 8 22:39:01 1999 Tom Yu <tlyu@mit.edu>
1158 * sendauth.c (krb5_sendauth): Set credspout to NULL if it's
1159 destined to be returned to avoid freeing it. Also,
1160 unconditionally free credspout if it's non-NULL so that if someone
1161 doesn't pass in a ticket and doesn't give us a non-NULL out_creds,
1162 we don't leak it. [krb5-libs/699]
1164 1998-11-13 Theodore Ts'o <tytso@rsts-11.mit.edu>
1166 * Makefile.in: Set the myfulldir and mydir variables (which are
1167 relative to buildtop and thisconfigdir, respectively.)
1169 Mon Nov 2 19:00:23 1998 Tom Yu <tlyu@mit.edu>
1171 * str_conv.c: Remove krb5_cksumtype_to_string after merge.
1173 1998-10-27 Marc Horowitz <marc@mit.edu>
1175 * vfy_increds.c: rearrange the code a bit to make it more clear
1176 that the logic is correct.
1178 * str_conv.c: remove enctype and cksumtype string converstions.
1179 They're in the crypto library now, since the information drops
1180 right into the enctype table.
1182 * ser_eblk.c: ifdef the whole file out, since it's not used
1183 anywhere. it should probably be deleted, but I'm not sure about
1184 backward-compatibility issues yet.
1186 * rd_req_dec.c: check the auth_context permit-all flag and
1187 permitted_enctypes list, and reject the request if the policy
1190 * init_ctx.c: add code to initialize the prng. It's not great,
1191 but can be improved, and the prng is reseeded when new keys are
1192 processed. Read permitted_enctypes from the krb5.conf file, and
1193 provide accessor functions for it. Make the various etype list
1194 parsers share code as a side effect.
1196 * get_creds.c: add krb5_get_{validat,renew}ed_creds functions,
1197 which are part of the new init_creds api. The prototypes were
1198 already in, krb5.hin but there was no implementing code.
1200 * auth_con.c, auth_con.h: add a list of permitted enctypes to the
1201 auth_context for rd_req to check, and create accessor functions
1204 * Makefile.in, enc_helper.c: add enc_helper.c. This provides a
1205 wrapper around the conventional way the library encrypts and wraps
1206 encoded asn.1 structures, so the code isn't repeated in a dozen
1209 Wed Aug 19 17:27:51 1998 Tom Yu <tlyu@mit.edu>
1211 * conv_princ.c: Add some additional entries to sconv_list that
1214 Wed Jul 15 11:46:05 1998 Ezra Peisach <epeisach@mit.edu>
1216 * gic_pwd.c (krb5_get_init_creds_password): Remove unused argument
1219 * t_ref_kerb.out: Fix test case for zephyr principal to reflect
1220 addition to conv_princ.c
1222 Tue Jul 7 17:06:13 1998 Theodore Y. Ts'o <tytso@mit.edu>
1224 * conv_princ.c: Add additional commonly seen Kerberos V4 services
1225 to the hard-coded list.
1227 Tue Jul 7 16:59:03 1998 Tom Yu <tlyu@mit.edu>
1229 * chk_trans.c: Fix up previous fix; short-circuit out when
1232 Wed Jul 1 17:59:26 1998 Theodore Y. Ts'o <tytso@mit.edu>
1234 * chk_trans.c (krb5_check_transited_list): Fix use of an
1235 uninitialized variable; apparently the code was depending
1236 on the stack garbage being non-zero(!)
1238 1998-05-26 Theodore Ts'o <tytso@rsts-11.mit.edu>
1240 * srv_rcache.c (krb5_get_server_rcache):
1241 * auth_con.c (krb5_auth_con_setrcache): Export this function in
1244 1998-05-12 Theodore Ts'o <tytso@rsts-11.mit.edu>
1246 * str_conv.c (krb5_timestamp_to_sfstring): Make sure the date
1247 string printed uses 4 digit years.
1249 1998-05-08 Theodore Ts'o <tytso@rsts-11.mit.edu>
1251 * str_conv.c (krb5_string_to_timestamp, strptime): Fix routines to
1252 be able to properly parse Y2K dates.
1254 * t_kerb.c: Add ability to test krb5_string_to_timestamp
1256 1998-05-06 Theodore Ts'o <tytso@rsts-11.mit.edu>
1258 * t_ser.c (main): POSIX states that getopt returns -1
1259 when it is done parsing options, not EOF.
1261 1998-05-05 Theodore Ts'o <tytso@rsts-11.mit.edu>
1263 * get_in_tkt.c (krb5_get_init_creds): If
1264 libdefaults/{REALM}/noaddresses is true, then don't put
1265 any addresses in the ticket request.
1267 Mon May 4 15:54:07 1998 Tom Yu <tlyu@mit.edu>
1269 * get_in_tkt.c: Add prototype for make_preauth_list.
1271 Sat May 2 21:46:02 1998 Tom Yu <tlyu@mit.edu>
1273 * get_in_tkt.c (krb5_get_in_tkt): Add missing argument to call to
1274 make_preauth_list to avoid stack smashing. Pointed out by lxs.
1276 Mon Mar 16 19:50:55 1998 Tom Yu <tlyu@mit.edu>
1278 * chk_trans.c (krb5_check_transited_list): Check lengths when
1279 appending to next and prev.
1281 Fri Feb 27 18:03:33 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
1283 * Makefile.in: Changed thisconfigdir to point at the lib/krb5
1284 directory, since we've moved the configure.in tests in
1285 this directory to the toplevel lib/krb5 configure.in
1287 Thu Feb 19 19:03:20 1998 Tom Yu <tlyu@mit.edu>
1289 * recvauth.c (krb5_recvauth): Add some bookkeeping flags so we
1290 know how much stuff to free upon cleanup. Fix the up cleanup
1293 Wed Feb 18 16:24:02 1998 Tom Yu <tlyu@mit.edu>
1295 * Makefile.in: Remove trailing slash from thisconfigdir. Fix up
1296 BUILDTOP for new conventions.
1298 Fri Feb 13 15:27:35 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
1300 * Makefile.in: Added new file kfree.c, which contained all of the
1301 functions previously in the lib/krb5/free directory.
1303 Mon Feb 2 17:02:29 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
1305 * Makefile.in: Define BUILDTOP and thisconfigdir in the Makefile
1307 Thu Feb 5 23:48:34 1998 Theodore Y. Ts'o <tytso@mit.edu>
1309 * rd_cred.c (krb5_rd_cred):
1310 * rd_safe.c (krb5_rd_safe):
1311 * rd_priv.c (krb5_rd_priv): Use the remote_subkey first, since the
1312 mk_* routines try to use their local_subkey first.
1313 Otherwise, the wrong keys will get used if subkeys are
1314 used in both directions.
1316 Fri Jan 2 21:21:29 1998 Tom Yu <tlyu@mit.edu>
1318 * preauth.c (handle_sam_labels):
1319 (obtain_sam_padata): Check return of malloc. [krb5-libs/518]
1321 * chpw.c (krb5_mk_chpw_req): Check return of malloc.
1322 (krb5_rd_chpw_rep): Check return of malloc. [krb5-libs/518]
1324 Tue Dec 16 00:08:33 1997 Tom Yu <tlyu@mit.edu>
1326 * mk_req_ext.c (krb5_mk_req_extended): Check enctype of session
1327 key, not that of the ticket, which we really shouldn't care about.
1329 Sun Dec 7 07:24:23 1997 Ezra Peisach <epeisach@dumpster.rose.brandeis.edu>
1331 * gic_pwd.c (krb5_get_init_creds_password): Change fourth argument
1332 in call to prompter (which is an int) from NULL to 0.
1334 Sat Dec 6 02:28:17 1997 Tom Yu <tlyu@mit.edu>
1336 * Makefile.in: Add files chpw.c, gic_*, preauth2.c, vfy_increds.c,
1339 * chpw.c: New file; implement Cygnus chpw.
1341 * get_in_tkt.c: Implement support for Cygnus initial credentials
1344 * gic_keytab.c: New file; Cygnus initial creds.
1346 * gic_opt.c: New file; Cygnus initial creds.
1348 * gic_pwd.c: New file; Cygnus initial creds.
1350 * preauth.c: Add more SAM support (from Cygnus).
1352 * preauth2.c: New file; additional SAM support from Cygnus.
1354 * send_tgs.c: Account for additional parameter to sendto_kdc.
1356 * vfy_increds.c: New file; Cygnus initial creds.
1358 * vic_opt.c: New file; Cygnus initial creds.
1360 Wed Oct 22 00:29:33 1997 Theodore Y. Ts'o <tytso@mit.edu>
1362 * send_tgs.c (krb5_send_tgs): Don't send a zero endtime; if the
1363 requested endtime is zero, set it equal to the TGT endtime.
1365 Mon Oct 6 12:07:19 1997 Ezra Peisach <epeisach@kangaroo.mit.edu>
1367 * set_realm.c (krb5_set_principal_realm): Allocate extra byte for
1370 Mon Sep 1 21:38:16 1997 Tom Yu <tlyu@mit.edu>
1372 * rd_cred.c (krb5_rd_cred_basic): Fix swapped args to memset.
1374 Fri Aug 29 16:41:25 1997 Tom Yu <tlyu@mit.edu>
1376 * get_in_tkt.c (krb5_get_in_tkt): Move nulling out of
1377 request.padata before the os_localaddr call in order to avoid
1378 freeing a null pointer in the cleanup code.
1380 Tue Aug 12 09:13:22 1997 Ezra Peisach <epeisach@mit.edu>
1382 * init_ctx.c (krb5_init_context): Initialize local variable ctx
1383 before calling krb5_init_ets.
1385 Fri Aug 8 17:04:54 1997 Tom Yu <tlyu@mit.edu>
1387 * rd_cred.c (krb5_rd_cred_basic): Check remote_addr and
1388 encpart.s_address before calling krb5_address_compare. Fixes
1391 Fri Jul 25 15:25:32 1997 Tom Yu <tlyu@mit.edu>
1393 * t_ser.c: Add support for changed kdb API.
1395 Tue Jul 15 22:15:09 1997 Theodore Y. Ts'o <tytso@mit.edu>
1397 * serialize.c (krb5_register_serializer): Only copy over the old
1398 table when there's an old table to copy over. Otherwise,
1399 BoundsChecker complains about memcpy(foo, NULL, 0).
1401 Tue Mar 25 00:32:55 1997 Theodore Y. Ts'o <tytso@mit.edu>
1403 * preauth.c (obtain_sam_padata): Fix handling of the sam-timestamp
1404 and sam-usec fields, which should always be set if the
1405 nonce is not available, not just SAM_USE_SAD_AS_KEY is
1406 being used. [krb5-libs/325]
1408 Mon Mar 24 12:21:38 1997 Theodore Ts'o <tytso@rsts-11.mit.edu>
1410 * t_ser.c: Clean up error reporting for krb5_init_context(). Also
1411 report errors for each subtest, so we know which subtest
1414 Sat Feb 22 22:39:49 1997 Richard Basch <basch@lehman.com>
1416 * Makefile.in: Use some of the new library list build rules in
1419 Fri Feb 21 18:38:06 1997 Sam Hartman <hartmans@tertius.mit.edu>
1421 * crypto_glue.c: Move into libcrypto as krb5_glue.c; I need to
1422 avoid libcrypto depending on libkrb5
1424 Wed Feb 19 14:21:12 1997 Theodore Y. Ts'o <tytso@mit.edu>
1426 * t_kerb.c (test_set_realm): New function used to test
1427 krb5_set_principal_realm(). Called by using the new "set_realm"
1430 * set_realm.c (krb5_set_principal_realm): New function which sets
1431 the realm of a principal.
1433 Thu Feb 13 14:17:00 1997 Richard Basch <basch@lehman.com>
1435 * get_in_tkt.c (krb5_get_in_tkt): Initialize as_reply; if
1436 krb5_os_localaddr() returns an error, the cleanup
1437 routine may try to free a garbage pointer (as_reply).
1439 Wed Feb 12 20:47:30 1997 Tom Yu <tlyu@mit.edu>
1441 * fwd_tgt.c (krb5_fwd_tgt_creds): Use the client's realm rather
1442 than the server's realm for constructing the tgs principal.
1443 Remove TC_MATCH_SRV_NAMEONLY from call to retrieve_cred()
1444 because we want to get an exact match.
1446 Mon Feb 10 10:41:36 1997 Ezra Peisach <epeisach@mit.edu>
1448 * crypto_glue.c (krb5_calculate_checksum): Add krb5_const to
1449 krb5_pointer of in data to match prototype.
1451 Sat Feb 8 15:02:39 1997 Richard Basch <basch@lehman.com>
1454 Export krb5_get_credentials_{renew,validate} (win32)
1455 Removed unused variable.
1457 Fri Feb 7 09:41:33 1997 Richard Basch <basch@lehman.com>
1459 * mk_cred.c (krb5_mk_ncred): Declare ncred as krb5_int32 so that
1460 the right value is pushed onto the stack when calling
1461 krb5_mk_ncred_basic()
1463 * copy_addrs.c fwd_tgt.c mk_cred.c:
1464 Use FAR keyword in pointer declarations.
1466 * sendauth.c (krb5_sendauth): Do not free the credentials if they
1467 are being returned to the caller [krb5-libs/357]
1469 Sun Feb 2 20:57:15 1997 Richard Basch <basch@lehman.com>
1471 * serialize.c: Added FAR declarations to pointer arguments for
1472 all functions declared as KRB5_DLLIMP.
1474 Thu Jan 30 21:44:37 1997 Richard Basch <basch@lehman.com>
1477 Export more crypto-layer functions:
1478 krb5_encrypt, krb5_decrypt, krb5_eblock_enctype,
1479 krb5_process_key, krb5_finish_key, krb5_string_to_key,
1480 krb5_init_random_key, krb5_finish_random_key, krb5_random_key
1482 Sat Feb 8 18:41:42 1997 Tom Yu <tlyu@mit.edu>
1485 * configure.in: Update to new program build procedure.
1487 Thu Jan 2 17:16:18 1997 Tom Yu <tlyu@mit.edu>
1490 * configure.in: Update to new library build procedure.
1492 Mon Dec 23 17:20:03 1996 Theodore Y. Ts'o <tytso@mit.edu>
1494 * Makefile.in (SRCS): Add brand.c to the SRCS line so that the
1495 kerbsrc.mac.tar includes brand.c
1497 Sat Dec 21 01:26:11 1996 Theodore Y. Ts'o <tytso@mit.edu>
1499 * brand.c: New file, which allows a release engineer to "brand"
1500 the krb5 library or a binary application program
1501 statically linked against the krb5 library. This file is
1502 statically included by init_ctx.c, to force it be in a
1503 binary library or application program.
1505 * init_ctx.c (krb5_init_context): Use new call krb5_vercheck() for
1506 Windows timebomb checking; this call returns an error
1507 code, which is returned to the user if the timebomb should
1510 Thu Nov 21 14:55:16 EST 1996 Richard Basch <basch@lehman.com>
1512 * Makefile.in: win32 build
1514 * auth_con.c bld_pr_ext.c conv_princ.c copy_addrs.c copy_athctr.c
1515 copy_auth.c copy_cksum.c copy_creds.c copy_data.c copy_key.c
1516 copy_princ.c copy_tick.c cp_key_cnt.c decrypt_tk.c fwd_tgt.c
1517 gc_via_tkt.c get_creds.c get_in_tkt.c in_tkt_ktb.c in_tkt_pwd.c
1518 in_tkt_sky.c init_ctx.c mk_cred.c mk_error.c mk_priv.c mk_rep.c
1519 mk_req.c mk_req_ext.c mk_safe.c parse.c princ_comp.c rd_cred.c
1520 rd_error.c rd_priv.c rd_rep.c rd_req.c rd_safe.c recvauth.c
1521 sendauth.c str_conv.c unparse.c valid_times.c
1522 DLL export various functions (see lib/krb5.def for full list)
1524 Thu Nov 21 13:54:01 1996 Ezra Peisach <epeisach@mit.edu>
1526 * recvauth.c (krb5_recvauth): If there is an error, and the server
1527 argument to krb5_recvauth is NULL, create a dummy server
1528 entry for the krb5_error structure so that krb5_mk_error
1529 will not die with missing required fields. [krb5-libs/209]
1531 Wed Nov 13 14:30:47 1996 Tom Yu <tlyu@mit.edu>
1533 * init_ctx.c: Revert previous kt_default_name changes.
1535 Tue Nov 12 22:07:33 1996 Tom Yu <tlyu@mit.edu>
1537 * init_ctx.c (krb5_init_context): Oops. Initialize kt_default_name
1540 * init_ctx.c (krb5_free_context): Free kt_default_name if it's
1543 Sat Nov 9 14:19:28 1996 Ezra Peisach <epeisach@mit.edu>
1545 * Makefile.in (check-unix): Invoking t_ser requires that
1546 KRB5_CONFIG points to a valid krb5.conf
1548 * t_ser.c (main): If verbose flag is set and there is an error,
1549 display error message.
1551 Wed Nov 6 14:02:21 1996 Theodore Y. Ts'o <tytso@mit.edu>
1553 * init_ctx.c (krb5_init_context): Initialize the error tables, so
1554 applications don't need to call krb5_init_ets().
1556 Tue Nov 5 08:09:23 1996 Ezra Peisach <epeisach@mit.edu>
1558 * serialize.c (krb5_register_serializer): Do not free a NULL pointer.
1560 Thu Oct 31 13:48:14 1996 Theodore Y. Ts'o <tytso@mit.edu>
1562 * init_ctx.c (krb5_init_context): Make it more obvious that
1563 default ticket lifetimes is not yet supported.
1565 Tue Sep 24 20:59:14 1996 Theodore Y. Ts'o <tytso@mit.edu>
1567 * get_in_tkt.c (make_preauth_list): Correctly null-terminate the
1568 preauth list generated by make_preauth_list.
1570 Thu Sep 19 12:29:59 1996 Theodore Y. Ts'o <tytso@mit.edu>
1572 * unparse.c (krb5_unparse_name_ext): Make unparse correctly handle
1573 a all cases where a principal contains a nulls, backspace,
1576 * t_kerb.c (test_parse_principal): Add test for checking
1577 krb5_parse_principal()
1579 * parse.c (krb5_parse_name): Set all of the magic field values.
1581 Wed Jul 24 17:09:39 1996 Theodore Y. Ts'o <tytso@mit.edu>
1583 * preauth.c (find_pa_system): Change type of first argument to be
1584 krb5_preauthtype, to eliminate compiler warnings under
1587 Wed Jul 10 20:22:41 1996 Theodore Y. Ts'o <tytso@mit.edu>
1589 * init_ctx.c (krb5_init_context): Add a call to krb5_win_do_init()
1590 on Win16 and Win32 machines. This is where we do timebomb
1591 and version server checking.
1593 Sun Jul 7 15:14:43 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
1595 * get_creds.c: (krb5_get_credentials_val_renew_core) Combine
1596 common internals needed from krb5_get_credentials_validate()
1597 and used by new function krb5_get_credentials_renew()
1599 * gc_frm_kdc.c (krb5_get_cred_from_kdc_renew): A wrapper that
1600 passes KDC_OPT_RENEW to the static
1601 krb5_get_cred_from_kdc_opt so that kinit can use it.
1604 Mon Jun 24 09:45:04 1996 Theodore Ts'o <tytso@rsts-11.mit.edu>
1606 * bld_princ.c (krb5_build_principal_va): Change const to
1607 krb5_const, so that it works on compilers that don't
1610 Mon Jun 17 20:23:48 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
1612 * str_conv.c (krb5_string_to_timestamp): Ensure that all fields of
1613 the timestamp are filled in if strptime does not fill in
1616 Wed Jun 12 01:10:09 1996 Theodore Ts'o <tytso@rsts-11.mit.edu>
1618 * sendauth.c (krb5_sendauth): If ECCONABORTED is not defined, try
1619 using the Winsock equivalent (WSAECONNABORTED).
1621 Mon Jun 10 21:47:21 1996 Theodore Ts'o <tytso@rsts-11.mit.edu>
1623 * parse.c (krb5_parse_name): Change use of _WINDOWS to _MSDOS, and
1624 add check for _WIN32.
1626 Thu Jun 6 00:06:18 1996 Theodore Y. Ts'o <tytso@mit.edu>
1628 * get_creds.c (krb5_get_credentials_core): A static function must
1629 not use the INTERFACE keyword.
1631 Tue May 14 18:39:22 1996 Richard Basch <basch@lehman.com>
1633 * mk_req_ext.c mk_safe.c send_tgs.c:
1634 set the length field of the krb5_checksum structure before
1635 calling krb5_calculate_checksum.
1637 * str_conv.c: replaced sha-des3 cksum with hmac-sha.
1639 Tue May 14 02:53:42 1996 Theodore Y. Ts'o <tytso@mit.edu>
1641 * ser_ctx.c (krb5_context_size, krb5_context_externalize,
1642 krb5_context_internalize): Add missing fields from the
1643 serialized context: clockskew, default_kdc_req_sumtype,
1644 default_ap_req_sumtype, default_safe_sumtype,
1645 kdc_default_options, library_options, profile_secure,
1646 fcc_default_format, scc_default_format.
1648 * ser_actx.c (krb5_auth_context_size, krb5_auth_context_externalize,
1649 krb5_auth_context_internalize): Serialize the two fields
1650 req_cksumtype and safe_cksumtype, instead of the one
1653 * mk_safe.c (krb_mk_safe): Use safe_cksumtype instead of cksumtype
1654 in the auth context.
1656 * mk_req_ext.c (krb5_mk_req_extended): Use req_cksumtype instead
1657 of cksumtype in the auth context.
1659 * init_ctx.c (krb5_init_context): Add support for new profile
1660 relations libdefaults/tkt_lifetime,
1661 libdefaults/kdc_req_checksum_type,
1662 libdefaults/ap_req_cksumtype,
1663 libdefaults/safe_checksumtype, and
1664 libdefaults/kdc_default_options.
1666 * auth_con.h: Remove old cksumtype element, and replace it with
1667 req_cksumtype and safe_cksumtype.
1669 * auth_con.c (krb5_auth_con_init): Initialize the req_cksumtype
1670 and safe_cksumtype from the context's default
1671 req_cksumtype and safe_cksumtype.
1672 (krb5_auth_con_set_req_cksumtype,
1673 krb5_auth_con_set_safe_cksumtype): New functions, to
1674 replace old krb5_auth_con_setcksumtype
1676 Fri May 10 18:48:38 EDT 1996 Richard Basch <basch@lehman.com>
1678 * init_ctx.c: Removed des3-cbc-md5 default support
1680 Fri May 10 02:51:17 1996 Richard Basch <basch@lehman.com>
1682 * str_conv.c: changes des3-md5 to des3-sha & added sha cksum types
1684 Sun May 5 09:46:18 1996 Ezra Peisach (epeisach@kangaroo.mit.edu)
1686 * preauth.c: Add casts and const keywords as needed.
1688 Fri May 3 00:15:18 1996 Mark Eichin <eichin@cygnus.com>
1690 * get_creds.c (krb5_get_credentials_core): new function. Common
1691 part of krb5_get_credentials and krb5_get_credentials_validate.
1692 Some formerly local variables are now arguments.
1693 (krb5_get_credentials): same as before, but calls _core to do some
1695 (krb5_get_credentials_validate): uses
1696 krb5_get_cred_from_kdc_validate and only stores the returned
1697 credential in the cache, instead of storing all of them.
1699 Thu May 2 22:48:56 1996 Mark Eichin <eichin@cygnus.com>
1701 * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): new function. Same
1702 body as krb5_get_cred_from_kdc, but takes one new argument,
1703 kdcopts, and combines it with the other kdc options when calling
1704 krb5_get_cred_via_tkt. This is static and only called by
1705 (krb5_get_cred_from_kdc): a wrapper that provides the same
1706 function it did before, and
1707 (krb5_get_cred_from_kdc_validate): a wrapper that passes
1708 KDC_OPT_VALIDATE, so that kinit can use it.
1709 We'll probably need another one for renewing tickets as well.
1711 * rd_req_dec.c (krb5_rd_req_decoded_opt): new function. Same body
1712 as krb5_rd_req_decoded, but takes one new argument,
1713 check_valid_flag, to determine whether or not to check if the
1714 "invalid flag" is set in the ticket. Also made static, so that it
1716 (krb5_rd_req_decoded): wrapper for krb5_rd_req_decoded_opt that
1717 specifies the "invalid flag" gets checked, and
1718 (krb5_rd_req_decoded_anyflag): wrapper for krb5_rd_req_decoded_opt
1719 that specifies that the "invalid flag" doesn't get checked. (This
1720 version is only called from kdc_util.c:kdc_process_tgs_req.)
1722 Wed May 1 14:30:29 1996 Richard Basch <basch@lehman.com>
1724 * srv_rcache.c (krb5_get_server_rcache): include the uid in the
1725 default server replay cachename, for systems with geteuid.
1727 * configure.in: test if the system has geteuid()
1729 Wed May 1 02:26:53 1996 Mark Eichin <eichin@cygnus.com>
1731 * str_conv.c (krb5_string_to_timestamp): double check that
1732 strptime at least parsed *some* of the string, avoid degenerate
1733 cases from GNU libc strptime.
1735 Tue Apr 30 18:19:01 1996 Ken Raeburn <raeburn@cygnus.com>
1737 * t_ser.c (stuff): New variable.
1738 (ser_acontext_test, ser_eblock_test, ser_cksum_test): Use it,
1739 instead of assuming it's valid to treat &FUNCTION as a data
1742 * conv_princ.c (sconv_list): Now const.
1743 (krb5_*_conv_principal): Use pointer to const for it.
1745 Tue Apr 23 19:39:59 1996 Mark Eichin <eichin@cygnus.com>
1747 * get_creds.c (krb5_get_credentials): this isn't the kernel, so
1748 don't return negative errno values.
1750 Sat Apr 27 19:14:21 1996 Richard Basch <basch@lehman.com>
1752 * fwd_tgt.c (krb5_fwd_tgt_creds): fixed a possible null dereference.
1754 Wed Apr 17 14:22:10 1996 Theodore Y. Ts'o <tytso@mit.edu>
1756 * conv_princ.c: Added ftp and ecat to the list of services which
1757 should be converted. This really ought to be something
1758 that's configurable in the profile...
1760 Thu Apr 11 21:30:23 1996 Theodore Y. Ts'o <tytso@dcl>
1762 * init_ctx.c (krb5_init_context): On a Macintosh, turn on
1763 kdc_timesync and use the v4 credentials cache by default.
1765 * get_in_tkt.c (stash_as_reply, verify_as_reply): Move time offset
1766 code from stash_as_reply to verify_as_reply, and fix it so
1767 that it actually works.
1769 Wed Apr 3 16:04:36 1996 Theodore Y. Ts'o <tytso@dcl>
1771 * rd_req_dec.c (krb5_rd_req_decoded): Move code which
1772 validated the ticket times to krb5_validate_times.
1774 * valid_times.c (krb5_validate_times): New function which
1775 determines whether or not the ticket times are valid.
1777 * mk_req_ext.c (krb5_mk_req_extended): Call krb5_validate_time()
1778 to determine whether or not the ticket in passed-in
1779 credentials is valid. If it isn't, return an error right
1782 Wed Mar 27 17:05:47 1996 Richard Basch <basch@lehman.com>
1784 * in_tkt_ktb.c (keytab_keyproc): Do not check to see that the
1785 enctype of the key is identical; there are several equivalent
1788 * in_tkt_ktb.c (krb5_get_in_tkt_with_keytab): Removed the fancy
1789 logic to only request the keytypes that correspond to those in
1790 the keytab. There were too many fencepost conditions that could
1791 get you into trouble. Either it should be there and *fully*
1792 functional, or not in there at all. Besides, there are too many
1793 other components in Kerberos that expect the end-service to know
1794 all its keys that this sanity check is overkill.
1796 Tue Mar 26 14:45:03 1996 Richard Basch <basch@lehman.com>
1798 * conv_princ.c: added "imap" service to the conversion list as
1799 requiring domain conversion for the instance. (imap/<host> is used
1800 by some of the new imap mail implementations)
1802 Sun Mar 24 01:34:14 1996 Sam Hartman <hartmans@tertius.mit.edu>
1804 * send_tgs.c (krb5_send_tgs_basic): You want to setup the eblock
1805 used for the authenticator using the in_cred->keyblock, *not*
1806 request.ticket.enc_part.enctype. Under a multi-enctype system,
1807 the session key may be different from the ticket key.
1809 Wed Mar 20 23:00:59 1996 Theodore Y. Ts'o <tytso@dcl>
1811 * walk_rtree.c (krb5_walk_realm_tree): Fix 16bit vs. 32bit error.
1812 (cap_code should been a krb5_error_code, not an int!)
1814 * mk_cred.c (krb5_mk_ncred_basic): Fix windows lint flame.
1816 * get_in_tkt.c (krb5_get_in_tkt): Fix 16bit vs. 32bit error.
1817 (do_more should not have been an int!)
1819 Tue Mar 19 13:03:26 1996 Richard Basch <basch@lehman.com>
1821 * in_tkt_ktb.c (krb5_get_in_tkt_with_keytab):
1822 Only request keytypes that correspond to those in the keytab.
1824 Mon Mar 18 21:49:39 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
1826 * configure.in: Add KRB5_RUN_FLAGS
1828 * Makefile.in: Use runtime flags.
1830 Sun Mar 17 20:32:08 1996 Ezra Peisach <epeisach@dumpster.rose.brandeis.edu>
1832 * configure.in: Add USE_ANAME, USE_KRB5_LIBRARY, KRB5_LIBRARIES so
1833 that Makefile does not have to know build tree layout.
1835 * Makefile.in: Rework to be consistant with configure defines so
1836 that configure can specify other needed libraries.
1838 Sun Mar 17 02:10:19 1996 Mark W. Eichin <eichin@cygnus.com>
1840 * copy_addrs.c (krb5_copy_addr): make non-static so we can use it
1842 * mk_cred.c (krb5_mk_ncred_basic): copy local_addr and remote_addr
1843 instead of just aliasing them, so we can safely free them ourselves.
1845 Fri Mar 15 14:29:00 1996 Richard Basch <basch@lehman.com>
1847 * in_tkt_ktb.c: Close the keytab if we opened it, not if the
1850 Wed Mar 13 17:31:30 1996 Ken Raeburn <raeburn@cygnus.com>
1852 * configure.in: Use AC_HEADER_STDARG.
1854 Mon Mar 11 11:15:26 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
1856 * str_conv.c (krb5_timestamp_to_string): Handle statement not
1859 * ser_addr.c (krb5_address_internalize): Add magic numbers
1861 Thu Feb 29 11:49:38 1996 Theodore Y. Ts'o <tytso@dcl>
1863 * fwd_tgt.c (NEED_SOCKETS): Use NEED_SOCKETS instead of #including
1866 Sat Feb 24 16:27:54 1996 Theodore Y. Ts'o <tytso@dcl>
1868 * gc_via_tkt.c (krb5_get_cred_via_tkt): Fix memory leak; free
1871 Thu Jan 25 01:35:52 1996 Sam Hartman <hartmans@tertius.mit.edu>
1873 * rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): Remove outdated
1874 comment about mapping etype to ktype.
1876 * gc_via_tkt.c (krb5_get_cred_via_tkt): If the keyblock.enctype is
1877 non-null in in_cred, then request that particular key.
1879 Wed Jan 24 21:48:53 1996 Sam Hartman <hartmans@tertius.mit.edu>
1881 * get_creds.c (krb5_get_credentials): Only match against enctype
1882 if it is non-null in increds.
1884 Sun Jan 21 23:32:53 1996 Tom Yu <tlyu@dragons-lair.MIT.EDU>
1886 * gc_via_tkt.c (krb5_kdcrep2creds): Set is_skey so get_creds won't
1887 break trying to match is_skey in the ccache. This way we
1888 won't end up with many copies of user-to-user tickets.
1890 Fri Jan 19 23:16:17 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
1892 * mk_req.c (krb5_mk_req): krb5_get_credentials does not take
1893 default_kdc_options.
1895 * sendauth.c (krb5_sendauth): krb5_get_credentials does not take
1896 default_kdc_options.
1898 Wed Jan 10 21:01:36 1996 Theodore Y. Ts'o <tytso@dcl>
1900 * init_ctx.c (krb5_init_context): Added checking of profile for
1901 DCE compatability options (ccache type, and checksum type).
1903 * fwd_tgt.c (krb5_fwd_tgt_creds): Initialize addrs to 0 so that we
1904 don't try to free stack garbage on an error.
1906 * krbconfig.c, Makefile.in: Removed krbconfig.c; it contained
1907 global variables which are no longer used.
1909 * recvauth.c: Removed the global extern of
1910 krb5_kdc_default_options, which wasn't being used anyway.
1912 * mk_req.c (krb5_mk_req): Replace use of krb5_kdc_default_options
1913 with context->kdc_default_options.
1915 * gc_frm_kdc.c: Remove the global extern of krb5_kdc_req_sumtype,
1916 which wasn't being used anymore anyway.
1918 * send_tgs.c (krb5_send_tgs_basic): Remove use of the global
1919 variable krb5_kdc_req_sumtype, and use the kdc_req_sumtype
1920 in the context structure instead.
1922 * walk_rtree.c (krb5_walk_realm_tree): Applied patch submitted by
1923 Doug Engbert, so that the configurable authentication
1924 patch takes into account the null entry at the end of the
1927 Tue Jan 9 22:04:09 1996 Theodore Y. Ts'o <tytso@dcl>
1929 * fwd_tgt.c (krb5_fwd_tgt_creds): New function which handles all
1930 of the dirty work of forwarding TGT's.
1932 * rd_cred.c (krb5_rd_cred_basic): Clean up memory allocation
1933 discpline to remove memory leaks.
1935 * mk_cred.c (krb5_mk_ncred_basic, krb5_mk_ncred, krb5_mk_1cred):
1936 Clean up memory allocation discpline to remove memory
1939 * init_ctx.c (krb5_get_tgs_ktypes): Clean up parsing of the etype
1940 list. Don't overrun the string containing the etype list.
1942 Wed Jan 3 21:32:59 1996 Theodore Y. Ts'o <tytso@dcl>
1944 * rd_cred.c (krb5_rd_cred_basic): When the keyblock is NULL,
1945 assume we're being called from the gssapi code, which
1946 doesn't have access to the sender or receive address
1947 information, don't check the sender address, since it
1950 * rd_cred.c (decrypt_credencdata): When calling krb5_rd_credd(),
1951 if the keyblock is null, just copy the encoded structure
1952 from the "ciphertext" part of the structure and decode it.
1954 * mk_cred.c (encrypt_credencpart): When calling krb5_mk_cred(), if
1955 the keyblock is NULL, don't encrypt it; just encode it and
1956 leave it in the ciphertext area of the structure.
1958 Thu Dec 21 18:47:54 1995 Theodore Y. Ts'o <tytso@dcl>
1960 * rd_rep.c (krb5_rd_rep): Change use of
1961 KRB5_SENDAUTH_MUTUAL_FAILED to KRB5_MUTUAL_FAILED.
1963 Tue Dec 19 17:15:40 1995 Theodore Y. Ts'o <tytso@dcl>
1965 * rd_cred.c (krb5_rd_cred_basic): Missing parenthesis meant that
1966 wrong number of bytes was being allocated.
1968 Sun Dec 3 11:49:09 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1970 * Makefile.in (SRCS/OBJS): Move compat_recv.c to krb5util library.
1972 Fri Dec 1 17:04:43 1995 Theodore Y. Ts'o <tytso@dcl>
1974 * recvauth.c (krb5_recvauth): Initialize rcache to zero, so that
1975 on cleanup we don't try to free stack garbage.
1977 Sun Nov 26 19:31:18 1995 Tom Yu <tlyu@dragons-lair.MIT.EDU>
1979 * preauth.c: Ultrix is broken. Prototype obtain_enc_ts_padata()
1980 and process_pw_salt() explicitly rather than using the
1981 typedef in k5-int.h becaus that typedef is to a function
1984 Fri Nov 17 22:35:52 1995 Theodore Y. Ts'o <tytso@dcl>
1986 * get_in_tkt.c (decrypt_as_reply):
1987 * preauth.c (process_pw_salt): When fetching the key to decrypting
1988 the encrypted kdc reply, use the etype associated with the
1989 etype reply, not the etype associated with the included
1992 * encode_kdc.c: Remove eblock argument from krb5_encode_kdc_rep;
1993 set the eblock type from the client_key's enctype.
1995 Thu Nov 16 20:29:17 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1997 * srv_rcache.c (krb5_get_server_rcache): Use krb5_rc_default_type
1998 instead of assuming default rcache type is "dfl".
2000 Mon Nov 13 14:40:05 1995 <tytso@rsts-11.mit.edu>
2002 * walk_rtree.c (krb5_walk_realm_tree): Added ANL changes to
2003 support configuration authentication paths.
2005 Mon Nov 13 12:57:12 1995 Theodore Y. Ts'o <tytso@dcl>
2007 * preauth.c (krb5_process_padata): Added generalized processing
2008 for preauth information which is returned by the KDC.
2009 This should be general enough to support the AFS3_SALT
2010 preauth type, the SNK4 preauth type, and the public-key
2012 (process_pw_salt): New function for processing the KRB5_PW_SALT
2013 preauthentication type.
2015 * get_in_tkt.c (decrypt_as_reply): Removed temporary kludge for
2016 processing the PW_SALT preauth type; that's now done in
2018 (krb5_get_in_tkt): Call krb5_process_padata with new arguments so
2019 that the preauth code can set the decryption_key if
2022 Thu Nov 09 17:05:57 1995 Chris Provenzano (proven@mit.edu)
2024 * in_tkt_pwd.c : Remove krb5_enctype from krb5_string_to_key() args.
2026 Thu Nov 9 00:02:43 1995 Theodore Y. Ts'o <tytso@dcl>
2028 * get_in_tkt.c (krb5_get_in_tkt): Remove the etype_info argument
2029 from the call to krb5_obtain_padata.
2031 * preauth.c (krb5_obtain_padata): Use the PADATA_ETYPE_INFO
2032 preauth, if it exists, to determine which salt type to use
2033 when encrypting the preauthentication data. Remove the
2034 etype_info argument.
2036 Wed Nov 8 02:50:59 1995 Theodore Y. Ts'o <tytso@dcl>
2038 * krbconfig.c: Removed the krb5_clockskew variable.
2040 * srv_rcache.c (krb5_get_server_rcache):
2041 * rd_safe.c (krb5_rd_safe):
2042 * rd_req_dec.c (krb5_rd_req_decoded):
2043 * rd_priv.c (krb5_rd_priv):
2044 * rd_cred.c (krb5_rd_cred):
2045 * gc_via_tkt.c (krb5_get_cred_via_tkt):
2046 * get_in_tkt.c (verify_as_reply): Replace use of krb5_clockskew
2047 with context->clockskew.
2049 * encrypt_tk.c (cleanup_scratch): Changed interface to no longer
2050 require an eblock; we can use our own and figure out the
2051 enctype from the passed-in key.
2053 * get_in_tkt.c (krb5_get_in_tkt): Added calls to
2054 krb5_obtain_padata().
2056 * preauth.c: Completely restructured file to support
2060 Fri Oct 27 22:15:33 1995 Theodore Y. Ts'o <tytso@dcl>
2062 * get_in_tkt.c (krb5_get_in_tkt): Extensive reworking of the
2063 structure of this file to make it possible to support
2066 Mon Oct 23 17:08:59 1995 Theodore Y. Ts'o <tytso@dcl>
2068 * in_tkt_pwd.c (krb5_get_in_tkt_with_password): Fix to properly
2069 malloc password buffer.
2071 Mon Oct 23 11:09:56 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
2073 * rd_req_dec.c (krb5_rd_req_decoded): For heirarchal cross-realm,
2074 set the length after initializing string.
2076 * rd_req.c (krb5_rd_req): If a new auth_context is created
2077 and then there is an error, make sure return pointer is not
2078 looking at freed memory.
2080 Fri Oct 6 22:04:42 1995 Theodore Y. Ts'o <tytso@dcl>
2082 * Makefile.in: Remove ##DOS!include of config/windows.in.
2083 config/windows.in is now included by wconfig.
2085 Fri Sep 29 00:08:53 1995 Theodore Y. Ts'o <tytso@dcl>
2087 * gc_via_tkt.c (krb5_get_cred_via_tkt): Only check the returned
2088 starttime to make sure it matches the requested starttime
2089 if we requested a postdated ticket.
2091 Thu Sep 28 22:58:53 1995 Theodore Y. Ts'o <tytso@dcl>
2093 * conv_princ.c (krb5_425_conv_principal): Only convert instances
2094 which don't have a '.' in them. If they have a '.',
2095 assume that they are fully qualified already.
2097 Thu Sep 28 12:00:00 1995 John Rivlin <jrivlin@fusion.com)
2099 * gc_via_tkt.c: Cleaned up corrupt ticket error testing to
2100 make it more debugable and I think work around a compiler
2103 Mon Sep 25 16:57:59 1995 Theodore Y. Ts'o <tytso@dcl>
2105 * Makefile.in: Removed "foo:: foo-$(WHAT)" lines from the
2108 Wed Sep 13 10:58:20 1995 Keith Vetter (keithv@fusion.com)
2110 * get_in_t.c: removed unused variable.
2111 * rd_cred.c: removed INTERFACE keyword.
2112 * ser_auth.c: passing int32 where a size_t is wanted.
2113 * ser_ctx.c: 16/32 bit int size mismatch.
2115 Sun Sep 17 23:41:19 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
2117 * rd_safe.c: Fix typo error.
2119 Sat Sep 16 01:23:14 1995 Theodore Y. Ts'o <tytso@dcl>
2121 * sendauth.c (krb5_sendauth): Make sure the scratch credentials
2122 structure may have possible been used be freed..
2124 * rd_safe.c (krb5_rd_safe_basic): Fall through to the cleanup code
2125 at the end, to make sure the decoded message in message is
2128 * rd_req_dec.c (krb5_rd_req_decoded): Use krb5_copy_keyblock to
2129 copy authent->subkey to auth_context->remote_subkey.
2130 Keeping them separate avoids aliasing problems.
2132 * mk_req_ext.c (krb5_generate_authenticator): Fix memory leak.
2133 Don't bash authent->subkey with key after carefully
2134 copying it using krb5_copy_keyblock!
2136 * recvauth.c (krb5_recvauth): krb5_get_server_rcache() already
2137 opens the rcache; doing it again merely causes a memory leak.
2139 Fri Sep 15 17:20:08 1995 Theodore Y. Ts'o <tytso@dcl>
2141 * gen_subkey.c (krb5_generate_subkey): Eliminate memory leak.
2142 krb5_init_random_key() does its own allocation of the
2145 * gc_via_tkt.c (krb5_kdcrep2creds): Fix memory leak.
2147 * srv_rcache.c (krb5_get_server_rcache): Fix memory leak.
2149 * rd_safe.c (krb5_rd_safe_basic): Fix memory leak.
2151 Tue Sep 12 12:40:30 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
2153 * t_ser.c (ser_cksum_test): Work around an optimizer bug unser
2156 Sun Sep 10 12:00:00 1995 James Mattly (mattly@fusion.com)
2158 * gen_seqnum.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
2159 * get_in_tkt.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
2160 * mk_priv.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
2161 * mk_req_ext.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
2162 * send_tgs.c: change usage of krb5_timeofday over to krb5_crypto_us_timeofday
2164 Wed Sep 06 14:20:57 1995 Chris Provenzano (proven@mit.edu)
2166 * auth_con.c, decrypt_tk.c, encode_kdc.c, encrypt_tk.c,
2167 * gc_frm_kdc.c, gen_seqnum.c, get_creds.c, get_in_tkt.c,
2168 * in_tkt_ktb.c, in_tkt_pwd.c, in_tkt_sky.c, init_ctx.c,
2169 * kdc_rep_dc.c, mk_cred.c, mk_priv.c, mk_rep.c, mk_req._ext.c,
2170 * preauth.c, rd_cred.c, rd_priv.c, rd_rep.c, rd_req_dec.c,
2171 * send_tgs.c, sendauth.c, ser_actx.c, ser_ctx.c, ser_eblk.c,
2172 * ser_key.c, t_ser.c : s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
2174 Wed Sept 6 12:00:00 EDT 1995 James Mattly (mattly@fusion.com)
2176 * get_in_tkt.c: change usage of krb5_timeofday to krb5_crypto_us_timeofday
2177 * mk_req_ext.c: change usage of timeofday
2178 * parse.c: disabled a usage of exit for macintosh
2179 * send_tgs.c: change usage of krb5_timeofday over to
2180 krb5_crypto_us_timeofday
2181 * unparse.c: include <stdio.h>
2184 Tue Sep 05 22:10:34 1995 Chris Provenzano (proven@mit.edu)
2186 * decode_kdc.c, decrypt_tk.c, encode_kdc.c, encrypt_tk.c, gc_frm_kdc.c
2187 * gc_via_tkt.c, get_in_tkt.c, in_tkt_ktb.c, in_tkt_pwd.c, in_tkt_sky.c
2188 * init_ctx.c, kdc_rep_dc.c, mk_cred.c, mk_priv.c, mk_rep.c
2189 * mk_req_ext.c, rd_cred.c, rd_priv.c, rd_rep.c, rd_req_dec.c,
2190 * send_tgs.c, ser_ctx.c, ser_eblk.c, ser_key.c, t_ser.c:
2191 Remove krb5_enctype references, and replace with
2192 krb5_keytype where appropriate
2194 Fri Sep 1 20:03:41 1995 Theodore Y. Ts'o <tytso@dcl>
2196 * get_in_tkt.c (krb5_get_in_tkt): If kdc_settime is enabled, then
2197 set the time_offset fields from the returned ticket's
2200 * init_ctx.c (krb5_init_context): Initialize new fields in
2201 krb5_context (clockskew, kdc_req_sumtype, and
2202 kdc_default_options).
2204 * gc_via_tkt.c (krb5_get_cred_via_tkt): Perform the necessary
2205 sanity checking on the KDC response to make sure we detect
2208 * send_tgs.c (krb5_send_tgs): Set the expected nonce in the
2211 * krbconfig.c: Set the default checksum to use MD5
2213 Fri Sep 1 11:16:43 EDT 1995 Paul Park (pjpark@mit.edu)
2214 * ser_ctx.c - Add handling of new time offset fields in the os_context.
2217 Tue Aug 29 14:14:26 EDT 1995 Paul Park (pjpark@mit.edu)
2218 * Makefile.in, .Sanitize, ser_{actx,adata,addr,auth,cksum,ctx,eblk,key,
2219 princ}.c, serialize.c, t_ser.c - Add serialization operations
2220 for data structures required to serialize krb5_context, krb5_
2221 auth_context, krb5_encrypt_block and krb5_principal.
2222 * auth_con.h - Add magic number.
2223 * auth_con.c - Add static routine to copy an address and use this
2224 instead of the other code. Set the magic number when initing
2225 an auth_context. Use krb5_free_address to release an address.
2226 * init_ctx.c - Free the allocated serializers when releasing context.
2227 * rd_rep.c - Copy the keyblock from the message instead of setting
2230 Thu Aug 24 18:55:50 1995 Theodore Y. Ts'o <tytso@dcl>
2232 * .Sanitize: Update file list.
2234 Mon Aug 7 18:54:35 1995 Theodore Y. Ts'o <tytso@dcl>
2236 * in_tkt_ktb.c (keytab_keyproc): If there is an error looking up
2237 the key, make sure the keytab is closed as part of the
2240 Fri Aug 4 22:04:08 1995 Tom Yu <tlyu@dragons-lair.MIT.EDU>
2242 * conv_princ.c: Add braces to initializer to shut up gcc -Wall
2244 Fri Jul 7 16:31:06 EDT 1995 Paul Park (pjpark@mit.edu)
2245 * Makefile.in - Find com_err in TOPLIBD.
2246 * rd_safe.c - Use checksum verifier instead of doing it manually.
2248 Thu Jul 6 17:31:40 1995 Tom Yu <tlyu@lothlorien.MIT.EDU>
2250 * rd_safe.c (krb5_rd_safe_basic): Pass context to os_localaddr.
2252 * rd_priv.c (krb5_rd_priv_basic): Pass context to os_localaddr.
2254 * rd_cred.c (krb5_rd_cred_basic): Pass context to os_localaddr.
2256 * get_in_tkt.c (krb5_get_in_tkt): Pass context to os_localaddr.
2258 Wed July 5 15:52:31 1995 James Mattly <mattly@fusion.com>
2259 * added condition for _MACINTOSH
2261 Sun Jul 2 18:59:53 1995 Sam Hartman <hartmans@tertius.mit.edu>
2263 * recvauth.c (krb5_recvauth): recvauth should send an error reply
2264 if problem is not zero. Removed if that caused it to only send a
2267 Fri Jun 16 22:11:21 1995 Theodore Y. Ts'o (tytso@dcl)
2269 * get_in_tkt.c (krb5_get_in_tkt): Allow the credentials cache
2270 argument to be optional; allow it to be NULL, meaning that
2271 the credentials shouldn't be stored in a credentials cache.
2273 Mon Jun 12 16:49:42 1995 Chris Provenzano (proven@mit.edu)
2275 A couple bug reports/patches from Ed Phillips (flaregun@udel.edu)
2276 * in_tkt_ktb.c (keytab_keyproc()): Fix memory leak.
2277 * recvauth.c (krb5_recvauth()): Don't open a new rcache if
2278 the auth_context already has one.
2279 * auth_con.c (krb5_auth_con_free()): Close rcache is the
2280 auth_context has one set.
2281 * auth_con.c (krb5_auth_con_getrcache()): Return pointer
2282 to the rcache set in the auth_context.
2284 Sun Jun 11 12:31:39 1995 Ezra Peisach (epeisach@kangaroo.mit.edu)
2286 * auth_con.c (krb5_auth_con_init): Zero newly allocated
2287 krb5_auth_context. (Fixed error in redefinitions).
2289 Sat Jun 10 23:05:51 1995 Tom Yu (tlyu@dragons-lair)
2291 * auth_con.c, compat_recv.c, mk_cred.c, mk_priv.c, mk_rep.c,
2292 mk_req.c, mk_req_ext.c, mk_safe.c, rd_cred.c, rd_priv.c,
2293 rd_rep.c, rd_req.c rd_req_dec.c, rd_safe.c, recvauth.c,
2294 sendauth.c: krb5_auth_context redefinitions
2296 Fri Jun 9 18:48:43 1995 <tytso@rsx-11.mit.edu>
2298 * rd_req_dec.c (krb5_rd_req_decoded): Fix -Wall nits
2300 * configure.in: Remove standardized set of autoconf macros, which
2301 are now handled by CONFIG_RULES.
2303 * Makefile.in, faddr_ordr.c: Remove faddr_ordr.c; its function,
2304 krb5_fulladdr_order, isn't used anywhere.
2306 Fri Jun 9 02:42:54 1995 Tom Yu (tlyu@dragons-lair)
2308 * rd_cred.c (krb5_rd_cred_basic): fix typo (extra "context"
2309 argument passed to krb5_xfree)
2311 Thu Jun 8 22:48:27 1995 Theodore Y. Ts'o <tytso@dcl>
2313 * rd_cred.c (krb5_rd_cred_basic): Fix problem where the ticket
2314 field was assigned with a krb5_data, which was then
2317 Thu Jun 8 16:06:44 1995 <tytso@rsx-11.mit.edu>
2319 * compat_recv.c, auth_con.c, chk_trans.c, encrypt_tk.c,
2320 gc_frm_kdc.c, gc_via_tkt.c, gen_seqnum.c, gen_subkey.c,
2321 get_creds.c, get_in_tkt.c, in_tkt_ktb.c, in_tkt_pwd.c,
2322 in_tkt_skey.c, init_ctx.c, kdc_rep_dc.c, mk_cred.c,
2323 mk_error.c, mk_priv.c, mk_rep.c, mk_req.c, mk_req_ext.c,
2324 mk_cred.c, mk_safe.c, parse.c, preauth.c, rd_cred.c,
2325 rd_rep.c, rd_req.c, rd_req_dec.c, rd_safe.c, recvauth.c,
2326 sendauth.c, send_tgs.c, srv_rcache.c, walk_rtree.c: Clean
2327 up GCC -Wall flames.
2329 Wed Jun 7 15:23:21 1995 <tytso@rsx-11.mit.edu>
2331 * conv_princ.c (krb5_425_conv_principal): Remove old CONFIG_FILES
2334 Fri May 26 10:18:28 1995 Keith Vetter (keithv@fusion.com)
2336 * makefile.in: removed for the PC creating shared directory.
2337 (still bug with the '@SHARED_RULE@' line but I'm waiting
2338 on tytso for that since I don't want to break Unix).
2340 Thu May 25 09:58:42 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
2342 * gc_via_tkt.c (krb5_kdcrep2creds): Fix syntax error in the
2343 freeing of the keyblock.
2345 Wed May 24 18:19:17 1995 Theodore Y. Ts'o (tytso@dcl)
2347 * Makefile.in, configure.in: Add rules for building shared library.
2349 * gc_via_tkt.c (krb5_kdcrep2creds): On an error, free the keyblock.
2351 Tue May 23 16:28:42 1995 Theodore Y. Ts'o (tytso@dcl)
2353 * gc_frm_kdc.c, preauth.c, t_kerb.c, t_walk_rtree.c, unparse.c:
2354 Rearrange #include files so that krb5.h gets included
2355 first, so that the debugging information can be more
2356 efficiently collapsed since the type numbers will be the
2359 Sat May 20 14:01:16 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
2361 * rd_safe.c (krb5_rd_safe): Increment remote_seq_number if
2362 KRB5_AUTH_CONTEXT_DO_SEQUENCE is set.
2364 Thu May 11 22:42:30 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
2366 * rd_cred.c (krb5_rd_cred_basic): If address don't match, return
2367 KRB5KRB_AP_ERR_BADADDR (add missing retval).
2369 Thu May 11 18:30:21 1995 Chris Provenzano (proven@mit.edu)
2371 * mk_cred.c (krb5_mk_cred()), mk_priv.c (krb5_mk_priv()),
2372 * mk_safe.c (krb5_mk_safe()), rd_cred.c (krb5_rd_cred()),
2373 * rd_priv.c (krb5_rd_prev()), rd_safe.c (krb5_rd_safe()):
2374 Pass the contents pointer returned from krb5_make_fulladdr()
2375 to free() not the address of the pointer.
2377 Tue May 9 08:34:21 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
2379 * Makefile.in (clean): Remove t_kerb and t_kerb.o
2381 Fri May 5 00:06:24 1995 Theodore Y. Ts'o (tytso@dcl)
2383 * conv_princ.c (krb5_425_conv_principal): Use new calling
2384 convention of krb5_get_realm_domain, which is that it
2385 returns the realm *without* the leading dot.
2387 Also use the profile code to look up individual instance
2388 conversions using [realms]/<realm>/v4_instance_convert/<inst>
2389 This allows special case handling of mit.edu and
2390 lithium.lcs.mit.edu.
2392 * t_kerb.c: New file for testing krb library functions. Currently
2393 only tests krb5_425_conv_principal.
2395 Wed May 03 03:30:51 1995 Chris Provenzano (proven@mit.edu)
2397 * recvauth.c, compat_recv.c (krb5_recvauth()):
2398 * compat_recv.c (krb5_compat_recvauth()):
2399 No longer needs the rc_type arg.
2401 Tue May 02 19:29:18 1995 Chris Provenzano (proven@mit.edu)
2403 * mk_cred.c (mk_cred()), mk_priv.c (mk_priv()), mk_safe.c (mk_safe()),
2404 * rd_cred.c (rd_cred()), rd_priv.c (rd_priv()), rd_safe.c (rd_safe()):
2405 Don't call krb5_make_fulladdrs() if a port isn't specified.
2407 Mon May 01 15:56:32 1995 Chris Provenzano (proven@mit.edu)
2409 * auth_con.c (krb5_auth_con_free()) :
2410 Free all the data associated with the auth_context.
2412 * auth_con.c (krb5_auth_con_setkey()) : Removed.
2413 * mk_rep.c (mk_rep()),
2414 The krb5_mk_rep() routine must always encode the data in
2415 the keyblock of the ticket, not the subkey.
2417 * cleanup.h, auth_con.c (krb5_auth_con_setports()) : Added.
2418 * auth_con.h, mk_cred.c (mk_cred()), mk_priv.c (mk_priv()),
2419 * mk_safe.c (mk_safe()), rd_cred.c (rd_cred()),
2420 * rd_priv.c (rd_priv()), rd_safe.c (rd_safe()) :
2421 Changes to auth_context to better support full addresses.
2423 Sat Apr 29 00:09:40 1995 Theodore Y. Ts'o <tytso@dcl>
2425 * srv_rcache.c (krb5_get_server_rcache): Fix fencepost error which
2426 caused an access beyond the allocated memory of piece->data.
2428 * rd_priv.c (krb5_rd_priv_basic): Call krb5_free_priv_enc_part to free
2429 the entire privenc_msg structure.
2431 Fri Apr 28 09:54:51 EDT 1995 Paul Park (pjpark@mit.edu)
2433 Move adm_rw.c from libkrb5 to libkadm.
2435 Fri Apr 28 08:36:03 1995 Theodore Y. Ts'o <tytso@lurch.mit.edu>
2437 * init_ctx.c (krb5_free_context): Extra semicolon meant the etypes
2438 field in the context was never being freed.
2440 Fri Apr 28 01:44:51 1995 Chris Provenzano (proven@mit.edu)
2442 * send_tgs.c (krb5_send_tgs()), gc_via_tkt.c (krb5_get_cred_via_tkt()):
2443 Removed krb5_cksumtype argument.
2445 Thu Apr 27 21:36:01 1995 Chris Provenzano (proven@mit.edu)
2447 * auth_con.c (krb5_auth_con_getaddrs() and krb5_auth_con_getflags()):
2448 Added for completeness.
2449 * mk_req_ext.c (krb5_mk_req_extended()) : Don't send the
2450 AP_OPTS_USE_SUBKEY option over the wire.
2452 Thu Apr 27 17:40:20 1995 Keith Vetter (keithv@fusion.com)
2454 * adm_rw.c, mk_cred.c, rd_cred.c:
2455 malloc on the PC must be size SIZE_T not int32.
2456 * adm_rw.c: krb5_free_adm_data second argument now a krb5_int32.
2458 Thu Apr 27 16:33:17 EDT 1995 Paul Park (pjpark@mit.edu)
2460 * mk_priv.c - Back out previous change which always put in
2461 timestamp, regardless of DO_TIME setting and
2462 instead, clear out the replaydata before calling
2463 mk_priv_basic from mk_priv.
2464 * mk_safe.c - Same replaydata fix.
2466 Thu Apr 26 15:59:51 EDT 1995 Paul Park (pjpark@mit.edu)
2468 * Add adm_rw.c - routines to read and write commands from/to the
2469 administrative (kpasswd/kadmin) server.
2471 Wed Apr 27 11:30:00 1995 Keith Vetter (keithv@fusion.com)
2473 * init_ctx.c: krb5_init_context wasn't checking return values.
2474 * mk_req.c: deleted unused local variable.
2476 Wed Apr 26 22:49:18 1995 Chris Provenzano (proven@mit.edu)
2478 * gc_via_tgt.c, and gc_2tgt.c : Removed.
2479 * Makefile.in, gc_via_tkt.c, gc_frm_kdc.c, and, int-proto.h :
2480 Replaced get_cred_via_tgt() and get_cred_via_2tgt()
2481 with more general function get_cred_via_tkt().
2483 Tue Apr 25 21:58:23 1995 Chris Provenzano (proven@mit.edu)
2485 * Makefile.in : Added gc_via_tkt.c and removed get_fcreds.c
2486 * auth_con.c (krb5_auth_con_setaddrs()) : Fixed so it allocates
2487 space and copies addresses, not just pointer.
2488 * mk_cred.c: Completely rewritten from sources donated by asriniva.
2489 * rd_cred.c: Completely rewritten from sources donated by asriniva.
2490 * mk_priv.c (krb5_mk_priv()), mk_safe.c (krb5_mk_safe()),
2491 rd_priv.c (krb5_rd_priv()), and rd_safe (krb5_rd_safe()) :
2492 Try using a subkey before using the session key for encryption.
2493 * recvauth.c (krb5_recvauth()): Don't close the rcache on success.
2495 Mon Apr 24 23:12:21 1995 Theodore Y. Ts'o <tytso@dcl>
2497 * Makefile.in, configure.in (t_walk_rtree): Add WITH_NETLIBS and
2498 $(LIBS), so that t_walk_rtree can compile under solaris.
2500 Mon Apr 24 17:09:36 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
2502 * parse.c (krb5_parse_name): Add magic number to new structure
2504 * get_creds.c: Fix comments describing operation
2506 * gc_frm_kdc.c: Fix comments describing operation
2508 * copy_cksum.c (krb5_copy_checksum): Fix comment in file
2510 * copy_addrs.c (krb5_append_addresses): ifdef out unused
2511 krb5_append_addresses function. (no API or prototype
2514 * copy_data.c (krb5_copy_data): Initialize magic number
2516 * init_ctx.c (krb5_init_context): If an error is returned from
2517 krb5_set_default_in_tkt_etypes or krb5_os_init_context,
2518 pass to caller instead of stack garbage.
2520 Sat Apr 22 11:06:45 1995 Ezra Peisach (epeisach@kangaroo.mit.edu)
2522 * Makefile.in: t_walk_rtree needs libcrypto
2524 * t_walk_rtree.c: error in checking for argument count
2526 Thu Apr 20 16:23:23 1995 Theodore Y. Ts'o (tytso@dcl)
2528 * copy_addrs.c, copy_athctr.c, copy_auth.c, copy_cksum.c,
2529 copy_creds.c, copy_key.c, copy_princ.c, copy_tick.c,
2530 gc_2tgt.c, gc_frm_kdc.c, gc_via_tgt.c, get_creds.c,
2531 mk_req_ext.c: Unless HAVE_C_STRUCTURE_ASSIGNMENT is defined, use
2532 memcpy to copy structures around, instead of using
2533 structure assignments. (Which aren't guaranteed to work
2534 on some broken compilers.)
2536 * mk_req.c (krb5_mk_req): Use krb5_sname_to_principal() in order
2537 to create the service principal from the service and
2538 hostname pair. This allows for the host cannoncialization
2541 * mk_req_ext.c (krb5_mk_req_extended): Revamp checksum handling
2542 code so that no checksum is performed in in_data is NULL,
2543 and the special case handing of cksumtype == 0x8003 for
2544 the GSSAPI library is handled correctly.
2546 Wed Apr 19 13:39:34 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
2548 * init_ctx.c: (krb5_init_context) initialize context default
2549 realm. (krb5_free_context) free default realm.
2551 Fri Apr 14 15:05:51 1995 <tytso@rsx-11.mit.edu>
2553 * sendauth.c (krb5_sendauth): initialize error return parameter
2555 * copy_princ.c (krb5_copy_principal): Fix bug where
2556 krb5_copy_principal can fail if it is asked to copy a
2557 principal with a zero-length component on a system where
2558 malloc(0) returns null.
2560 Thu Apr 13 15:49:16 1995 Keith Vetter (keithv@fusion.com)
2562 * *.[ch]: removed unneeded INTERFACE from non-api functions.
2564 Fri Mar 31 16:45:47 1995 Keith Vetter (keithv@fusion.com)
2566 * krb5_get_in_tkt: changed error return value for when clocks
2567 are out of skew to be KRB5_KDCREP_SKEW.
2569 Fri Mar 31 00:44:26 1995 Theodore Y. Ts'o (tytso@dcl)
2571 * rd_req.c (krb5_rd_req): Fix typo which caused new_keytab to not
2572 get freed, causing a memory leak.
2574 Thu Mar 30 15:49:27 1995 Keith Vetter (keithv@fusion.com)
2576 * rd_req.c: removed unused local variable.
2578 Tue Mar 28 18:34:20 1995 John Gilmore (gnu at toad.com)
2580 * rd_req_sim.c: Really remove the file.
2582 Mon Mar 27 08:34:49 1995 Chris Provenzano (proven@mit.edu)
2584 * Makefile.in: Removed rd_req_sim.c
2586 * auth_con.c: Default cksumtype is now CKSUMTYPE_RSA_MD4_DES.
2588 * auth_con.c: Added krb5_auth_con_setuseruserkey(),
2589 krb5_auth_con_getkey(),
2590 krb5_auth_con_getremotesubkey(),
2591 krb5_auth_con_getauthenticator(),
2592 krb5_auth_con_getremoteseqnumber(),
2593 krb5_auth_con_initivector().
2595 * auth_con.c: Fixed krb5_auth_con_getlocalsubkey() to check for
2596 a valid local_subkey before calling krb5_copy_keyblock().
2598 * auth_con.h: Fixed some comments.
2600 * mk_req_ext.c (krb5_mk_req_extended()): Always pass in a seed
2601 (the keyblock contents) to krb5_calculate_checksum()
2603 * rd_rep.c (krb5_rd_rep()): Use appropriate key to decode reply.
2605 * rd_safe.c (krb5_rd_safe()): Don't pass checksum to
2606 krb5_rd_safe_basic(), it's unnecessary.
2608 * compat_recv.c (krb5_compat_recvauth()):
2609 * mk_rep.c (krb5_mk_rep()):
2610 * rd_req.c (krb5_rd_req()):
2611 * rd_req_dec.c (krb5_rd_req_decode()):
2612 * recvauth.c (krb5_recvauth()):
2613 Added a krb5_auth_context argument and eliminated many of
2614 the other arguments because they are included in the
2615 krb5_auth_context structure.
2618 Tue Mar 21 19:22:51 1995 Keith Vetter (keithv@fusion.com)
2620 * mk_safe.c: fixed signed/unsigned mismatch.
2621 * rd_safe.c: removed unused local variable currentime.
2622 * mk_req_e.c: fixed signed/unsigned mismatch.
2624 Sat Mar 18 18:58:02 1995 John Gilmore (gnu at toad.com)
2626 * bld_pr_ext.c, bld_princ.c: Replace STDARG_PROTOTYPES with
2627 HAVE_STDARG_H for consistency.
2629 Fri Mar 17 19:48:07 1995 John Gilmore (gnu at toad.com)
2631 * Makefile.in (check-mac): Add.
2632 * compat_recv.c, get_fcreds.c, recvauth.c: Eliminate Unix socket
2633 #includes, which are now handled by k5-int.h (via k5-config.h).
2634 * conv_princ.c: Rename variable "comp" to another name; "comp"
2635 apparently bothers the MPW compiler...
2636 * rd_cred.c: Avoid (void) casts of void functions, for MPW.
2637 * t_walk_rtree.c: Put com_err.h after k5_int for <sys/types> stuff.
2638 (main): Declare and initialize the krb5_context that's being
2639 passed to everything.
2641 Fri Mar 10 10:58:59 1995 Chris Provenzano (proven@mit.edu)
2643 * auth_con.h auth_con.c Added for krb5_auth_con definition and
2646 * mk_req.c (krb5_mk_req())
2647 * mk_req_ext.c (krb5_mk_req_extended())
2648 * rd_rep.c (krb5_rd_rep())
2649 * sendauth.c (krb5_sendauth())
2650 * mk_priv.c (krb5_mk_priv())
2651 * mk_safe.c (krb5_mk_safe())
2652 * rd_priv.c (krb5_rd_priv())
2653 * rd_safe.c (krb5_rd_safe())
2654 Added a krb5_auth_context argument and eliminated many of
2655 the other arguments because they are included in the
2656 krb5_auth_context structure.
2658 * send_tgs.c (krb5_send_tgs()) Eliminate call to krb5_mk_req_extended(),
2659 which does far more than krb5_send_tgs() needs.
2661 Tue Mar 7 19:57:34 1995 Mark Eichin <eichin@cygnus.com>
2663 * configure.in: take out ISODE_INCLUDE.
2665 Tue Mar 7 13:20:06 1995 Keith Vetter (keithv@fusion.com)
2667 * Makefile.in: changed library name on the pc.
2668 * parse.c: disabled for the PC error messages to stderr.
2669 * chk_trans.c: fixed signed/unsigned assignment.
2671 Thu Mar 2 11:45:00 1995 Keith Vetter (keithv@fusion.com)
2673 * compat_recv.c, get_fcre.c, recvauth.c, sendauth.c: changed
2674 NEED_WINSOCK_H to NEED_SOCKETS.
2676 Wed Mar 1 20:15:00 1995 Keith Vetter (keithv@fusion.com)
2678 * compat_r.c, copy_pri.c, get_fcre.c, get_in_t.c, init_ctx.c, in_tkt_p.c
2679 in_tkt_s.c, preauth.c, princ_co.c, pr_to_sa.c, rd_req_d.c, recvauth.c
2680 sendauth.c, send_tgs.c, unparse.c: 16 vs 32 bit casts, removed some
2681 unused local variables, and pulled in winsock.h for network byte
2684 Tue Feb 28 01:14:57 1995 John Gilmore (gnu at toad.com)
2686 * *.c: Avoid <krb5/...> includes.
2687 * parse.c: Exdent #ifndef to left margin for old compilers.
2689 Wed Feb 22 17:14:31 1995 Keith Vetter (keithv@fusion.com)
2691 * walk_rtr.c (krb5_walk_realm_tree): formal parameter wasn't declared.
2692 * send_tgs.c: const in wrong place in the prototype.
2693 * get_in_tkt.c, preauth.c, rd_cred.c, rd_priv.c, rd_req_dec.c,
2694 rd_safe.c: needed a 32 bit abs() function.
2695 * parse.c: removed call to fprintf on error the windows version
2696 * send_auth.c: defined for windows the ECONNABORTED errno (will
2697 be removed when the socket layer is fully implemented).
2699 Tue Feb 21 23:38:34 1995 Theodore Y. Ts'o (tytso@dcl)
2701 * mk_cred.c (krb5_mk_cred): Fix argument type to
2702 krb5_free_cred_enc_part().
2704 Mon Feb 13 20:25:20 1995 Theodore Y. Ts'o (tytso@dcl)
2706 * get_in_tkt.c (krb5_get_in_tkt): Fix memory leak --- the default
2707 encryption types was not being freed.
2709 Fri Feb 10 15:45:59 1995 Theodore Y. Ts'o <tytso@dcl>
2711 * rd_req.c (krb5_rd_req): Remove ISODE cruft.
2713 Thu Feb 9 17:43:04 1995 Theodore Y. Ts'o <tytso@dcl>
2715 * gc_via_tgt.c (krb5_get_cred_via_tgt): Set up the keyblock's
2716 etype field correctly (after copying the keyblock, so it
2717 doesn't get overwritten!)
2719 Mon Feb 06 17:19:04 1995 Chris Provenzano (proven@mit.edu)
2721 * get_in_tkt.c (krb5_get_in_tkt())
2722 * in_tkt_sky.c (krb5_get_in_tkt_with_skey())
2723 * in_tkt_pwd.c (krb5_get_in_tkt_with_password())
2724 Removed krb5_keytype, changed krb5_enctype to krb5_enctype *,
2725 changed krb5_preauthtype to krb5_preauthtype *.
2727 Changed the args to the key_proc arg of krb5_get_in_tkt()
2728 to be the following (krb5_context, const krb5_keytype,
2729 krb5_data *, krb5_const_pointer, krb5_keyblock **)
2731 * in_tkt_ktb.c (krb5_get_in_tkt_with_keytab()) Added this routine
2732 to replace krb5_get_in_tkt_with_skey() in kinit.
2734 * Makefile.in Added new source file in_tkt_ktb.c.
2736 Fri Feb 3 16:41:19 1995 Mark Eichin (eichin@cygnus.com)
2738 * get_in_tkt.c (krb5_get_in_tkt): also check for the version
2739 number of the reply being whatever we had in the first byte of the
2742 Fri Feb 3 08:07:55 1995 Theodore Y. Ts'o (tytso@dcl)
2744 * compat_recv.c (krb_v4_recvauth): Use explicit 32 bit types so
2745 this will work on an Alpha.
2747 Fri Feb 3 00:43:48 1995 Tom Yu (tlyu@dragons-lair)
2749 * get_in_tkt.c (krb5_get_in_tkt): fix typo
2751 Thu Feb 2 20:51:55 1995 Mark Eichin (eichin@cygnus.com)
2753 * get_in_tkt.c (krb5_get_in_tkt): if krb5_is_as_rep fails, check
2754 if the packet might be a V4 error packet. Use modified V4 check so
2755 that it compiles under SCO.
2757 Mon Jan 30 15:46:14 1995 Chris Provenzano (proven@mit.edu)
2759 * int-proto.h Update prototypes for krb5_get_cred_via_tgt(), and
2760 krb5_get_cred_via_2tgt().
2762 * get_fcreds.c (krb5_get_for_creds())
2763 * gc_via_tgt.c (krb5_get_cred_via_tgt())
2764 * gc_2tgt.c (krb5_get_cred_via_2tgt())
2765 Removed krb5_enctype argument. Pass NULL list of encryption
2766 types to krb5_send_tgs to get default encryption types.
2768 * gc_frm_kdc.c Removed krb5_enctype argument passed to
2769 krb5_get_cred_via_tgt()
2771 * send_tgs.c (krb5_send_tgs()) Changed krb5_enctype arg to
2772 krb5_enctype *, a NULL terminated array of encryption
2773 types. If argument is NULL then krb5_send_tgs() will
2774 use defaul list of encryption types.
2776 * send_tgs.c (krb5_send_tgs()) To encrypt request ticket use
2777 usecred->keyblock.etype instead of (and now defunct)
2780 * init_ctx.c Added krb5_set_default_in_tkt_etypes() and
2781 krb5_get_default_in_tkt_etypes().
2783 * rd_req.c, rd_req_decode.c Removed typedef for rdreq_key_proc
2784 and use krb5_rd_req_decoded in its place.
2786 Mon Jan 30 11:26:05 1995 Chris Provenzano (proven@mit.edu)
2788 * get_fcreds.c Really needs #include<krb5/asn1.h> for definition
2789 of krb5_is_krb_error()
2791 Sat Jan 28 14:45:55 1995 Chris Provenzano (proven@mit.edu)
2793 * in_tkt_sky.c (skey_keyproc()), rd_req_dec.c (krb5_rd_req_decoded())
2794 use new API for krb5_kt_get_entry.
2796 Fri Jan 27 15:45:45 1995 Chris Provenzano (proven@mit.edu)
2798 * get_fcreds.c Removed #include<krb5/crc-32.h> and #include<krb5/asn1.h>
2800 Wed Jan 25 16:54:40 1995 Chris Provenzano (proven@mit.edu)
2802 * Removed all narrow types and references to wide.h and narrow.h
2804 Fri Jan 13 15:23:47 1995 Chris Provenzano (proven@mit.edu)
2806 * Added krb5_context to all krb5_routines
2808 Mon Dec 19 21:55:44 1994 Theodore Y. Ts'o (tytso@dcl)
2810 * init_ctx.c: New file. Initializes and frees the krb5_context
2813 Wed Dec 7 17:52:08 1994 <tytso@localhost>
2815 * rd_req_dec.c (decrypt_authenticator): If the subkey doesn't
2816 exist, don't try to set the subkey's etype.
2818 Wed Nov 30 17:10:39 1994 Theodore Y. Ts'o (tytso@dcl)
2820 * bld_princ.c (krb5_build_principal_va): Set the principal's type
2823 * Makefile.in: Build new test driver (t_walk_rtree) for
2824 krb5_walk_realm_tree.
2826 * walk_realm_tree.c (krb5_walk_realm_tree): Fix bug which occured
2827 when the client or the server is a subdomain of the other;
2828 walk_realm_tree would return the wrong answer, and suffer
2829 from memory access errors.
2831 * unparse.c (krb5_unparse_name_ext): Quote the '/' and '@'
2832 characters properly.
2834 * configure.in: Add appropriate help text for the --with-krb4
2835 option. Remove ISODE_DEFS call, since ISODE_INCLUDES now
2836 defines ISODE automatically.
2838 Mon Nov 21 15:30:07 1994 Theodore Y. Ts'o (tytso@dcl)
2840 * mk_req_ext.c (krb5_mk_req_extended): Sanitize how memory is
2841 freed in both error and normal cases, to remove memory
2844 * mk_req_ext.c (krb5_mk_req_extended): Use the encryption type
2845 specified by the ticket to generate the authenticator.
2847 * encode_kdc.c (krb5_encode_kdc_rep): Now requires that the
2848 caller pass in the encryption block to be used for
2849 encrpyting the ticket. That way, this routine doesn't
2850 need to create its own encryption block.
2852 * encrypt_tk.c (krb5_encrypt_tkt_part): Now requires that the
2853 caller pass in the encryption block to be used for
2854 encrpyting the ticket. That way, this routine doesn't
2855 need to create its own encryption block.
2857 Fri Nov 18 17:30:44 1994 Theodore Y. Ts'o (tytso@dcl)
2859 * mk_req_ext.c (krb5_mk_req_extended): Encrypt the authenticator
2860 using the same encryption system used to encrypt the ticket.
2862 Thu Nov 17 01:56:05 1994 Theodore Y. Ts'o (tytso@dcl)
2864 * gc_via_tgt.c (krb5_get_cred_via_tgt):
2865 * gc_2tgt.c (krb5_get_cred_via_2tgt): Set the encryption type of
2866 the session keyblock to be the type used to encrypt the
2869 Fri Nov 11 01:20:22 1994 Theodore Y. Ts'o (tytso@dcl)
2871 * get_in_tkt.c (krb5_get_in_tkt): Set the encryption type of the
2872 session keyblock to be the type used to encrypt the
2875 Thu Nov 10 23:56:43 1994 Theodore Y. Ts'o (tytso@dcl)
2877 * rd_rep.c (krb5_rd_rep): Set the encryption type in
2878 the subkey keyblock to be the encryption type used to
2879 encrypt the rd_rep message.
2881 * decrypt_tk.c (krb5_decrypt_tkt_part): Set the encryption type in
2882 the session keyblock to be the encryption type used to
2885 * rd_req_dec.c (decrypt_authenticator): Set the encryption type in
2886 the subkey keyblock to be the encryption type used to
2887 encrypt the authenticator.
2889 Tue Nov 8 17:09:48 1994 Theodore Y. Ts'o (tytso@dcl)
2891 * in_tkt_pwd.c (pwd_keyproc): Use the documented interface for
2892 calling krb5_string_to_key().
2894 Tue Oct 25 23:34:57 1994 Theodore Y. Ts'o (tytso@dcl)
2896 * srv_rcache.c (krb5_get_server_rcache): Added missing continue so
2897 that we don't copy both the unprintable character as well
2898 as the quoted version of it.
2900 Mon Oct 24 15:50:19 1994 Theodore Y. Ts'o (tytso@dcl)
2902 * configure.in: If KRB4 is defined, define KRB5_KRB4_COMPAT for
2905 Thu Oct 13 17:26:28 1994 Theodore Y. Ts'o (tytso@maytag)
2907 * configure.in: Add ISODE_DEFS
2909 Tue Oct 4 16:29:19 1994 Theodore Y. Ts'o (tytso@dcl)
2911 * in_tkt_sky.c (skey_keyproc):
2912 * in_tkt_pwd.c (pwd_keyproc): Add widen.h and narrow.h includes
2913 around pwd_keyproc, so that the keyproc input arguments
2914 are appropriately widened.
2916 Fri Sep 30 21:58:15 1994 Theodore Y. Ts'o (tytso@dcl)
2918 * preauth.c (preauth_systems): Add placeholder for magic number
2920 Thu Sep 29 15:31:10 1994 Theodore Y. Ts'o (tytso@dcl)
2922 * srv_rcache.c (krb5_get_server_rcache): cachename was not being
2923 properly null-terminated.
2925 * get_in_tkt.c (krb5_get_in_tkt): Return KRB5_IN_TKT_REALM_MISATCH
2926 if the client and server realms don't match. Return
2927 KRB5_KDCREP_SKEW if the KDC reply has an unacceptible
2928 clock skew (instead of KDCREP_MODIFIED.)
2930 * gc_via_tgt.c (krb5_get_cred_via_tgt): Use a distinct error code
2931 for KDC skew separate from the standard KDCREP_MODIFIED
2933 * princ_comp.c (krb5_realm_compare): Added new function from
2936 Wed Sep 21 17:57:35 1994 Theodore Y. Ts'o (tytso@dcl)
2938 * rd_req_dec.c (krb5_rd_req_decoded): Added Changes from Cybersafe
2939 to do transited realm path checking.
2941 * chk_trans.c: Added donated module from CyberSafe. It checks to
2942 see if a transited path is a legal one between two realms.
2944 Thu Sep 15 11:08:39 1994 Theodore Y. Ts'o (tytso@dcl)
2946 * rd_req_sim.c (krb5_rd_req_simple): Use krb5_rd_req instead of
2947 krb5_rd_req_decoded, to eliminate some code duplication.
2949 Sat Aug 20 01:43:43 1994 Theodore Y. Ts'o (tytso at tsx-11)
2951 * mk_req_ext.c (krb5_generate_authenticator): Fix pointer aliasing
2952 problem between newkey and authent->subkey.
2954 Wed Aug 17 17:58:22 1994 Theodore Y. Ts'o (tytso at tsx-11)
2956 * encode_kdc.c (krb5_encode_kdc_rep): Pass in to
2957 encode_krb5_enc_kdc_rep_part the msg_type which should be used.
2958 Old versions of Kerberos always assume TGS_REP; this merely allows
2959 the right msg_type to be passed down to the encoding routines.
2960 For now, the encoding routines will ignore this value and do
2961 things the old way, for compatibility's sake.
2963 Mon Aug 8 22:38:16 1994 Theodore Y. Ts'o (tytso at tsx-11)
2965 * preauth.c: Renamed preauthentication mechanism names to match
2966 what bcn and I agreed upon.
2968 Tue Jun 28 19:35:07 1994 Tom Yu (tlyu at dragons-lair)
2970 * decode_kdc.c: folding in Harry's changes
2972 * rd_req_sim.c: ditto
2973 * configure.in: adding ISODE_DEFS