1 2001-06-16 Ken Raeburn <raeburn@mit.edu>
3 * fwd_tgt.c (krb5_fwd_tgt_creds): Copy enctype for new creds from
6 2001-06-12 Ezra Peisach <epeisach@mit.edu>
8 * Makefile.in (t_walk_rtree, t_kerb): Do not link against kdb libraries
9 for these test executables.
11 * srv_rcache.c (krb5_get_server_rcache): Cast argument to
14 * init_ctx.c: Cast arguments to isspace() to int. If unix is defined,
15 include ../krb5_libinit.h. There has to be a better was for windows.
17 * conv_princ.c (krb5_425_conv_principal): Cast argument to isupper().
20 2001-06-11 Ezra Peisach <epeisach@mit.edu>
22 * str_conv.c: If strptime() is present on system without a
23 prototype, provide one.
25 2001-06-07 Ezra Peisach <epeisach@mit.edu>
27 * vfy_increds.c (krb5_verify_init_creds): Get rid of a variable
28 that was set in a conditional and never used afterwards.
30 2001-06-01 Ken Raeburn <raeburn@mit.edu>
32 * init_ctx.c (get_profile_etype_list): Zero out multiple separator
33 characters between tokens, so the second can be recognized
36 2001-04-04 Tom Yu <tlyu@mit.edu>
38 * mk_safe.c (krb5_mk_safe): Only use safe_cksumtype from the
39 auth_context (derived from the config file or hardcoded default)
40 if it's suitable for the enctype of the key we're going to
41 use. [pullup from krb5-1-2-2-branch]
43 2001-03-28 Ken Raeburn <raeburn@mit.edu>
45 * init_ctx.c (DEFAULT_ETYPE_LIST): New macro. Old etype list,
46 plus des-md4, with des-crc before des-mdX for now.
47 (get_profile_etype_list): Use DEFAULT_ETYPE_LIST.
49 2001-03-10 Ezra Peisach <epeisach@mit.edu>
51 * init_ctx.c: Provide a full prototype for init_common().
53 * recvauth.c (recvauth_common): Declare recvauth_common as static.
55 * parse.c, sendauth.c: Changes to prevent shadowing of local
58 * get_in_tkt.c, tgtname.c: Include int-proto.h for prototypes.
60 2001-03-03 Ken Raeburn <raeburn@mit.edu>
62 * preauth2.c (pa_sam): Return an error if no prompter was
65 2001-02-15 Ezra Peisach <epeisach@mit.edu>
67 * t_deltat.c (main): Test of overflow and underflow of krb5_int32.
69 * x-deltat.y: Test for over/underflow of krb5_int32 for a
70 krb5_deltat. Return EINVAL. [krb5-libs/922]
72 * deltat.c: Regenerated from x-deltat.y
74 * str_conv.c (krb5_string_to_timestamp): Do not accept a time
75 format that only partially matches the input string. [krb5-lib/922]
77 2001-01-30 Tom Yu <tlyu@mit.edu>
79 * preauth.c (krb5_obtain_padata): Don't dereference a NULL pointer
80 if we receive an empty ETYPE_INFO preauth. [krb5-libs/903 from
81 craziboy77@hotmail.com]
83 * preauth2.c (krb5_do_preauth): Don't dereference a NULL pointer
84 if we receive an empty ETYPE_INFO preauth. [krb5-libs/903 from
85 craziboy77@hotmail.com]
87 2001-01-30 Ezra Peisach <epeisach@mit.edu>
89 * rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): Free
90 krb5_keytab_entry if call to krb5_decrypt_tkt_part()
91 fails. [krb5-libs/855 reported by guy@packeteer.com]
93 2001-01-19 Ken Raeburn <raeburn@mit.edu>
95 * preauth.c: Don't use PROTOTYPE macro, just always use the
98 2001-01-19 Tom Yu <tlyu@mit.edu>
100 * preauth.c: Remove uses of KRB5_NPROTOTYPE() macro.
102 2000-10-26 Ezra Peisach <epeisach@mit.edu>
104 * t_ser.c: Cast getpid() calls to int as arguments to sprintf.
106 * ser_actx.c: Move prototypes (listed below) to int-proto.h
108 * int-proto.h: Add prototypes for krb5_ser_authdata_init,
109 krb5_ser_address_init, krb5_ser_authenticator_init,
110 krb5_ser_checksum_init, krb5_ser_keyblock_init,
111 krb5_ser_principal_init.
113 * ser_adata.c, ser_addr.c, ser_auth.c, ser_cksum.c, ser_key.c,
114 ser_princ.c: Include int-proto.h for prototypes.
116 2000-10-17 Ezra Peisach <epeisach@mit.edu>
118 * bld_pr_ext.c, bld_princ.c (krb5_build_principal_ext,
119 krb5_build_principal_va, krb5_build_principal): Take an unsigned
122 * get_in_tkt.c (krb5_get_init_creds): Use SALT_TYPE_AFS_LENGTH
125 * gic_pwd.c (krb5_get_as_key_password): Use SALT_TYPE_AFS_LENGTH
128 * in_tkt_pwd.c (pwd_keyproc): Argument to krb5_read_password is
131 * pr_to_salt.c (krb5_principal2salt_internal): Declare as
132 static. Unsigned int fix.
134 * preauth.c (krb5_obtain_padata): Use SALT_TYPE_AFS_LENGTH instead
137 * preauth2.c (pa_salt): Use SALT_TYPE_AFS_LENGTH instead of -1.
139 * conv_princ.c, copy_auth.c, copy_princ.c, gc_frm_kdc.c, parse.c,
140 send_tgs.c, srv_rcache.c: Unsigned/signed int cleanup.
142 * unparse.c (krb5_unparse_name_ext): size parameter changed to
145 2000-10-04 Ezra Peisach <epeisach@mit.edu>
147 * rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): Fix memory leak if
148 krb5_decrypt_tkt_part() fails. [krb5-libs/855]
150 2000-10-03 Ezra Peisach <epeisach@mit.edu>
152 * srv_rcache.c (krb5_get_server_rcache): Signed vs unsigned int
155 * pr_to_salt.c (krb5_principal2salt_internal): Add prototype for
156 internal function, and declare static.
158 * copy_addrs.c (krb5_copy_addresses): Cleanup unsigned vs signed
159 warnings as arguments to malloc().
161 Tue Sep 26 13:00:54 2000 Ezra Peisach <epeisach@mit.edu>
163 * conv_princ.c (krb5_425_conv_principal): Call profile_free_list
164 on v4realms during the iteration loop. Do not call
165 profile_release_string with a NULL pointer.
167 2000-09-25 Ezra Peisach <epeisach@mit.edu>
169 * t_kerb.c: Add prototypes for test functions.
171 2000-08-29 Ken Raeburn <raeburn@mit.edu>
173 * get_creds.c (krb5_get_credentials_core): If the supplied enctype
174 is not supported, return an error; can't satisfy both
175 TC_SUPPORTED_KTYPES and TC_MATCH_KTYPE that way. Delete unused
176 arguments CCACHE and OUT_CREDS; fix callers.
178 2000-07-18 Ezra Peisach <epeisach@mit.edu>
180 * vfy_increds.c: include int-proto.h for krb5_libdefault_boolean
183 * t_ser.c (ser_eblock_test): ifdef out old eblock serialization
184 test which is no longer called. (see 1999-09-01 ChangeLog)
186 * t_kerb.c: Cast argument to fprintf to long to agree with format
189 * t_deltat.c: If MIN is defined, undef before redefined as 60.
191 * str_conv.c: Provide strptime prototype if the system header
192 files fail to provide a prototype.
194 * int-proto.h: Add prototype for krb5_libdefault_boolean()
196 2000-06-30 Tom Yu <tlyu@mit.edu>
198 * conv_princ.c (krb5_425_conv_principal): NULL, not nil.
200 2000-06-30 Miro Jurisic <meeroh@mit.edu>
202 * conv_princ.c (krb5_425_conv_principal): Fixed a memory leak
204 2000-06-29 Ezra Peisach <epeisach@engrailed.mit.edu>
206 * t_walk_rtree.c (main): Declare as returning int.
208 * get_in_tkt.c (_krb5_conf_boolean): Declare as taking a const char *
210 * str_conv.c (krb5_timestamp_to_string): Work around gcc's warning
211 that %c format in strftime might return only two digits for the
214 * mk_safe.c, rd_rep.c, send_tgs.c: Remove unused goto label.
216 * kdc_rep_dc.c (krb5_kdc_rep_decrypt_proc): Remove code with no
219 * init_ctx.c: Make krb5_brand[] look used.
221 * chpw.c, decode_kdc.c, decrypt_tk.c, enc_helper.c, get_creds.c,
222 get_in_tkt.c, gic_keytab.c, gic_pwd.c, preauth2.c, vfy_increds.c:
223 Add parentheses around assignment used as truth value
225 2000-06-28 Ezra Peisach <epeisach@mit.edu>
227 * conv_princ.c, get_creds.c, get_in_tkt.c, mk_rep.c, parse.c,
228 send_tgs.c: Remove unused variable.
230 2000-06-23 Miro Jurisic <meeroh@mit.edu>
232 * conv_princ.c (krb5_425_conv_principal): Fixed v4->v5 realm
235 * conv_princ.c (krb5_425_conv_principal): Honor v4/v5 realm name
236 differences when convertion from v4 principals to v5.
238 2000-06-23 Tom Yu <tlyu@mit.edu>
240 * get_creds.c (krb5_get_credentials): Translate KRB5_CC_NOTFOUND
241 returned from krb5_get_cred_from_kdc() if a prior call to
242 krb5_cc_retrieve_cred() returned KRB5_CC_NOT_KTYPE.
244 * rd_priv.c (krb5_rd_priv_basic): Delete code that was incorrectly
245 doing explicit ivec chaining; c_decrypt() does it now.
247 * mk_priv.c (krb5_mk_priv_basic): Delete code that was incorrectly
248 doing explicit ivec chaining; c_encrypt() does it now.
250 * conv_princ.c (krb5_524_conv_principal): Make a copy of the krb5
251 realm that is nul-terminated to avoid falling off the end of the
252 krb5 realm, which is not necessarily nul-terminated.
254 2000-06-23 Danilo Almeida <dalmeida@mit.edu>
256 * init_ctx.c (krb5_get_tgs_ktypes, krb5_free_ktypes): Fix linkage to
259 2000-06-23 Ken Raeburn <raeburn@mit.edu>
261 * get_in_tkt.c (krb5_get_in_tkt): If enctypes are specified, send
262 the server the intersection of that list and the supported types,
263 in the order requested.
265 * recvauth.c (krb5_recvauth_version): New routine, takes a
266 krb5_data in which to store the client's application version
268 (recvauth_common): Renamed from krb5_recvauth, added above
269 functionality depending on extra argument values.
270 (krb5_recvauth): New stub, calls above routine with extra dummy
273 * kfree.c: Remove unneeded "return" statements at the end of many
275 (krb5_free_*_content, krb5_free_*_contents,
276 krb5_free_cred_enc_part, krb5_free_pwd_sequences): Set freed
277 pointer members to null when containing structure isn't being
280 * t_kerb.c (test_524_conv_principal): New test code, to exercise
281 bbense's code addition.
282 (main, usage): Updated.
283 * t_krb5.conf: Added stanford.edu->IR.STANFORD.EDU mapping, and a
284 test case for improperly long v4 realm names.
285 * Makefile.in (check-unix): Run 524 conversion test for some test
286 Athena and Stanford names.
287 * t_ref_kerb.out: Updated.
289 * init_ctx.c (init_common): Feed current-microsecond time and
290 process-id into PRNG, instead of just current-second time.
291 * mk_req_ext.c (krb5_mk_req_extended): Feed current time into
292 PRNG if a subkey will be generated.
293 * sendauth.c (krb5_sendauth): Feed local and remote addresses of
294 socket, if they can be determined, into the PRNG if a subkey will
297 * init_ctx.c (krb5_free_ktypes): New routine, to free values
298 returned by krb5_get_tgs_ktypes, krb5_get_permitted_enctypes, and
299 krb5_get_default_in_tkt_ktypes.
300 (krb5_set_default_tgs_ktypes, krb5_is_permitted_enctype): Use it.
301 (get_profile_etype_list): Use passed-in enctype list if the
302 passed-in count is non-zero, instead of checking the
303 in_tkt_ktype_count value in the context.
305 2000-06-23 Ken Raeburn <raeburn@mit.edu>
306 Nalin Dahyabhai <nalin@redhat.com>
308 * conv_princ.c (krb5_524_conv_principal): Return an error if name
309 is too long. Use memcpy for character data since we already know
312 2000-06-23 Nalin Dahyabhai <nalin@redhat.com>
314 * kfree.c (krb5_free_keyblock_contents): Set contents pointer to
317 * chk_trans.c (krb5_check_transited_list): Don't overflow buffers
319 * conv_princ.c (krb5_425_conv_principal): Don't overflow buffer
322 2000-06-23 Ken Raeburn <raeburn@mit.edu>
323 Booker C. Bense <bbense@networking.stanford.edu>
325 * conv_princ.c (krb5_524_conv_principal): Look up v4_realm in
326 config file, in case site's krb4 realm name isn't the same as the
329 2000-05-31 Wilfredo Sanchez <tritan@mit.edu>
331 * fwd_tgt.c: Check for existance of <memory.h>.
332 [from Nathan Neulinger <nneul@umr.edu>]
334 2000-5-19 Alexandra Ellwood <lxs@mit.edu>
336 * sendauth.c, fwd_tgt.c: Changed to use krb5int_cc_default. This function
337 supports the Kerberos Login Library and pops up a dialog if the cache does
338 not contain valid tickets. This is used to automatically get a tgt before
339 obtaining service tickets. Note that this should be an internal function
340 because callers don't expect krb5_cc_default to pop up a dialog!
341 (We found this out the hard way :-)
343 2000-05-15 Jeffrey Altman <jaltman@columbia.edu>
345 * Added new source file appdefault.c
346 Implements new public functions
348 krb5_appdefault_string
349 krb5_appdefault_boolean
351 2000-04-28 Alexandra Ellwood <lxs@mit.edu>
353 * gic_pwd.c (krb5_init_creds_password) added code to return to
354 login library if the password is expired (login library handles
355 this error appropriately).
357 2000-04-08 Tom Yu <tlyu@mit.edu>
359 * vfy_increds.c (krb5_verify_init_creds): appdefault_boolean ->
360 libdefault_boolean; it somehow got missed earlier.
362 2000-04-07 Jeffrey Altman <jaltman@columbia.edu>
364 * gic_pwd.c (krb5_get_init_creds_keytab), gic_pwd.c
365 (krb5_get_init_creds_password) when determining whether or not to
366 retry with a "master kdc" do not retry if the return value from
367 the first attempt was KRB5_REALM_CANT_RESOLV. Also, do not
368 overwrite the return code if the return value from the access to
369 the "master kdc" was KRB5_REALM_CANT_RESOLV.
371 2000-03-15 Danilo Almeida <dalmeida@mit.edu>
373 * init_ctx.c (init_common), gic_pwd.c (krb5_get_as_key_password,
374 krb5_get_init_creds_password), preauth2.c (pa_sam): Add support
375 for krb5_get_prompt_types().
377 2000-03-13 Ken Raeburn <raeburn@mit.edu>
379 * preauth2.c (pa_function): Called function now takes new
380 krb5_enctype pointer argument.
381 (pa_salt, pa_sam): Accept new arg, ignore it.
382 (pa_enc_timestamp): Accept new arg. If value pointed to is
383 nonzero, pass it to get-AS-key fn instead of first requested
384 enctype. Added some debugging fprintf calls, conditionally
386 (krb5_do_preauth): Accept new arg, and pass it through to the
387 specific preauth functions. Added some debugging fprintf calls,
388 conditionally compiled.
390 * get_in_tkt.c (krb5_get_init_creds): Pass etype pointer to
393 2000-03-12 Ezra Peisach <epeisach@mit.edu>
395 * addr_comp.c, addr_order.c, addr_srch.c, bld_pr_ext.c,
396 bld_princ.c, encrypt_tk.c, gen_seqnum.c, gen_subkey.c: Change
397 prototypes to use krb5_const instead of const to match the entries
400 2000-03-10 Miro Jurisic <meeroh@mit.edu>
402 * get_in_tkt.c (krb5_get_init_creds): Always initialize local_as_reply
403 to avoid returning garbage on error returns.
405 2000-02-25 Ken Raeburn <raeburn@mit.edu>
407 * preauth2.c (krb5_do_preauth): Check paorder[h] not h for
408 PA_REAL. Fix from Matt Crawford.
410 2000-02-16 Ken Raeburn <raeburn@mit.edu>
412 * preauth2.c (pa_sam): In send-encrypted-sad mode, check for magic
413 salt length and generate a salt from the principal name if found;
414 use the password and salt to generate a key. Provide timestamp if
415 nonce is zero, regardless of preauth mode. (Patch from Chas
418 2000-02-07 Ken Raeburn <raeburn@mit.edu>
420 * gic_pwd.c (krb5_get_as_key_password): If the as_key enctype is
421 already set to the correct type, do continue and ask for the
422 password anyways. (Patch from Chas Williams, PR krb5-libs/730.)
424 * preauth2.c (pa_sam): If no sam_flags were set, return
425 KRB5_PREAUTH_BAD_TYPE, because we don't currently handle that
428 2000-02-06 Ken Raeburn <raeburn@mit.edu>
430 * preauth2.c (pa_sam): Remove unused variable use_sam_key.
431 (SAMDATA): Cast first result to int, which is what sprintf needs.
432 (pa_salt): Delete unused variable ret.
434 Patches from Frank Cusack:
435 * kfree.c (krb5_free_predicted_sam_response_contents): Fix typo.
436 Free new data fields if needed.
437 (krb5_free_enc_sam_response_enc_contents): Update for field name
439 * preauth.c (obtain_sam_padata): Update for field name change.
440 * preauth2.c (pa_sam): Likewise.
442 2000-01-27 Ken Raeburn <raeburn@mit.edu>
444 * init_ctx.c (get_profile_etype_list): Discard DESONLY changes
445 from 1999-09-01, and revert call sites.
447 1999-12-02 Ken Raeburn <raeburn@mit.edu>
449 * init_ctx.c (get_profile_etype_list): Report an error if no
450 recognized enctypes are found in the config file.
452 1999-11-23 Ken Raeburn <raeburn@mit.edu>
454 * init_ctx.c (init_common): Renamed from krb5_init_context, now
455 static. New argument SECURE provides initialization of
456 profile_secure field.
457 (krb5_init_context): Call it.
458 (krb5_init_secure_context): New function.
460 * in_tkt_ktb.c (keytab_keyproc): Now static.
461 * in_tkt_pwd.c (pwd_keyproc): Now static.
462 * in_tkt_sky.c (skey_keyproc): Now static.
464 * preauth2.c (krb5_do_preauth): Fix syntax in switch statement.
465 Cast padata contents pointer to avoid warning.
466 (pa_types): Now static.
468 * str_conv.c (krb5_deltat_to_string): Always write to a local
469 temporary buffer that's guaranteed to be large enough, then see if
470 the supplied output buffer is big enough.
471 (krb5_string_to_deltat): Deleted.
472 * x-deltat.y, deltat.c: New files.
473 * Makefile.in (deltat.c): Add rule for building from x-deltat.y,
474 but comment out dependencies for easier maintenance.
475 (BISON, BISONFLAGS): New variables.
477 * str_conv.c: Removed most static char arrays, substituting the
479 (krb5_string_to_timestamp): Move atime_format_table inside here.
480 (krb5_timestamp_to_sfstring): Move sftime_format_table inside
483 * str_conv.c: If strftime or strptime are not available, include
484 the renamed NetBSD versions, and define the function names as
485 macros to map them to the replacement names.
486 (__P, _CurrentTimeLocale, dummy_locale_info, TM_YEAR_BASE,
487 DAYSPERLYEAR, DAYSPERNYEAR, DAYSPERWEEK, isleap, tzname, tzset):
488 Define some dummies for strftime/strptime to use.
489 (strptime): Deleted old stub version.
490 (krb5_timestamp_to_string, krb5_timestamp_to_sfstring): Always
491 assume strftime is available.
492 (krb5_string_to_timestamp): Assume strptime is always available.
493 * strftime.c, strptime.c: New files, based on NetBSD versions.
494 Modified to rename the functions and not export any symbols.
496 * Makefile.in (T_DELTAT_OBJS): New variable.
497 (TEST_PROGS): Add t_deltat.
498 (t_deltat): Add rule.
499 (clean): Added t_deltat stuff. Run rm only once.
500 * t_deltat.c: New file.
502 1999-11-02 Ken Raeburn <raeburn@mit.edu>
504 * t_ref_kerb.out: Fix expected zephyr/zephyr output.
506 1999-10-26 Wilfredo Sanchez <tritan@mit.edu>
508 * Makefile.in: Clean up usage of CFLAGS, CPPFLAGS, DEFS, DEFINES,
509 LOCAL_INCLUDES such that one can override CFLAGS from the command
510 line without losing CPP search patchs and defines. Some associated
513 1999-10-12 Ken Raeburn <raeburn@mit.edu>
515 * conv_princ.c (sconv_list): Don't do conversion for "zephyr"
516 principal. (Noticed by Derrick Brashear.) Delete about a dozen
519 1999-09-01 Ken Raeburn <raeburn@mit.edu>
521 * init_ctx.c (get_profile_etype_list): Update name of the des3
522 entry in the default etype list.
524 * init_ctx.c (get_profile_etype_list): New argument DESONLY; if
525 set, ignore any ktype values other than NULL, DES_CBC_CRC, and
527 (krb5_get_default_in_tkt_ktypes, krb5_get_tgs_ktypes): Set it.
528 (krb5_get_permitted_enctypes): Don't set it.
530 * fwd_tgt.c (krb5_fwd_tgt_creds): Use KRB5_TC_SUPPORTED_KTYPES
531 when calling krb5_cc_retrieve_cred.
532 * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): Ditto.
533 * get_creds.c (krb5_get_credentials_core): Set that flag.
534 (krb5_get_credentials): Check for KRB5_CC_NOT_KTYPE error return.
536 * t_ser.c (main): Disable eblock serialization test, since the
537 code it tests was disabled nearly a year ago.
539 * str_conv.c (krb5_timestamp_to_sfstring): Don't pass extra
542 1999-08-10 Alexandra Ellwood <lxs@mit.edu>
544 * chpw.c (krb5_mk_chpw_req):
545 Added call to free cipherpw.data. cipherpw.data is allocated
546 by krb5_mk_priv and passed back. Since cipherpw is never
547 passed back, krb5_mk_chpw_req should free it.
549 1999-08-05 Danilo Almeida <dalmeida@mit.edu>
551 * init_ctx.c (krb5_init_context): Document why krb5_win_ccdll_load
552 is called way early in code. (It is because we need to have the
553 ccapi stuff loaded before trying to get the OS-specific context
554 initialization where we figure out default cache names and such.)
556 1999-08-05 Danilo Almeida <dalmeida@mit.edu>
558 * init_ctx.c (get_profile_etype_list): Use profile_release_string
559 to free string allocated by profile_get_string.
560 (krb5_init_context): Use a real context for krb5_win_ccdll_load.
562 * get_in_tkt.c (krb5_appdefault_string):
563 * conv_princ.c (krb5_425_conv_principal): Use profile_free_list
564 to free values allocated by profile_get_values.
566 1999-08-04 Danilo Almeida <dalmeida@mit.edu>
568 * get_in_tkt.c (_krb5_conf_boolean, krb5_appdefault_boolean):
569 Rename krb5_conf_boolean to _krb5_conf_boolean to denote that
570 it is not public so that folks outside the libraries won't
571 be tempted to use it.
573 1999-08-03 Danilo Almeida <dalmeida@mit.edu>
575 * get_creds.c (krb5_validate_or_renew_creds): Intialize out_creds
576 pointer to 0 and then check whether it is 0 before trying to
577 dereference it, in case lower-level routine failed to assign
580 1999-07-22 Jeffrey Altman <jaltman@columbia.edu>
582 get_in_tkt.c: rename conf_boolean to krb5_conf_boolean so that
583 it may be used in additional modules.
585 1999-06-28 Tom Yu <tlyu@mit.edu>
587 * enc_helper.c (krb5_encrypt_helper): NULL out the pointer to the
588 ciphertext if there is an error; this prevents stuff farther up
589 from freeing freed memory.
591 1999-06-18 Ken Raeburn <raeburn@mit.edu>
593 * init_ctx.c (krb5_free_context): Set field pointers to NULL after
594 freeing targets, in case higher-level code retains pointers into
595 the context structure. (From Jeffrey Altman.)
597 Thu May 13 17:31:34 1999 Theodore Y. Ts'o <tytso@mit.edu>
599 * init_ctx.c (krb5_init_context): Pass the context to
600 kkrb5_win_ccdll_load so that it can register the FILE
601 ccache type if using ccapi (so that the FILE ccache type
604 Mon May 10 15:26:00 1999 Danilo Almeida <dalmeida@mit.edu>
606 * Makefile.in: Do win32 build in subdir.
608 1999-04-09 Theodore Ts'o <tytso@rsts-11.mit.edu>
610 * kfree.c (krb5_free_sam_challenge, krb5_free_sam_challenge_contents,
611 krb5_free_sam_response, krb5_free_sam_response_contents,
612 krb5_free_predicted_sam_response,
613 krb5_free_predicted_sam_response_contents,
614 krb5_free_enc_sam_response_enc,
615 krb5_free_enc_sam_response_enc_contents,
616 krb5_free_pa_enc_ts): Added new functions. Part of
617 patches from [krb5-kdc/662]
619 * gic_pwd.c (krb5_get_init_creds_password): Add new argument to
620 calls to the prompter function. Part of patches from
623 * preauth2.c (pa_enc_timestamp, pa_sam): Update calls to new
624 prompter function. [krb5-kdc/662].
626 1999-03-31 Theodore Ts'o <tytso@rsts-11.mit.edu>
628 * init_ctx.c (krb5_init_context): Call krb5_win_ccdll_load() to
629 load the krbcc32.dll under windows.
631 Mon Mar 8 22:39:01 1999 Tom Yu <tlyu@mit.edu>
633 * sendauth.c (krb5_sendauth): Set credspout to NULL if it's
634 destined to be returned to avoid freeing it. Also,
635 unconditionally free credspout if it's non-NULL so that if someone
636 doesn't pass in a ticket and doesn't give us a non-NULL out_creds,
637 we don't leak it. [krb5-libs/699]
639 1998-11-13 Theodore Ts'o <tytso@rsts-11.mit.edu>
641 * Makefile.in: Set the myfulldir and mydir variables (which are
642 relative to buildtop and thisconfigdir, respectively.)
644 Mon Nov 2 19:00:23 1998 Tom Yu <tlyu@mit.edu>
646 * str_conv.c: Remove krb5_cksumtype_to_string after merge.
648 1998-10-27 Marc Horowitz <marc@mit.edu>
650 * vfy_increds.c: rearrange the code a bit to make it more clear
651 that the logic is correct.
653 * str_conv.c: remove enctype and cksumtype string converstions.
654 They're in the crypto library now, since the information drops
655 right into the enctype table.
657 * ser_eblk.c: ifdef the whole file out, since it's not used
658 anywhere. it should probably be deleted, but I'm not sure about
659 backward-compatibility issues yet.
661 * rd_req_dec.c: check the auth_context permit-all flag and
662 permitted_enctypes list, and reject the request if the policy
665 * init_ctx.c: add code to initialize the prng. It's not great,
666 but can be improved, and the prng is reseeded when new keys are
667 processed. Read permitted_enctypes from the krb5.conf file, and
668 provide accessor functions for it. Make the various etype list
669 parsers share code as a side effect.
671 * get_creds.c: add krb5_get_{validat,renew}ed_creds functions,
672 which are part of the new init_creds api. The prototypes were
673 already in, krb5.hin but there was no implementing code.
675 * auth_con.c, auth_con.h: add a list of permitted enctypes to the
676 auth_context for rd_req to check, and create accessor functions
679 * Makefile.in, enc_helper.c: add enc_helper.c. This provides a
680 wrapper around the conventional way the library encrypts and wraps
681 encoded asn.1 structures, so the code isn't repeated in a dozen
684 Wed Aug 19 17:27:51 1998 Tom Yu <tlyu@mit.edu>
686 * conv_princ.c: Add some additional entries to sconv_list that
689 Wed Jul 15 11:46:05 1998 Ezra Peisach <epeisach@mit.edu>
691 * gic_pwd.c (krb5_get_init_creds_password): Remove unused argument
694 * t_ref_kerb.out: Fix test case for zephyr principal to reflect
695 addition to conv_princ.c
697 Tue Jul 7 17:06:13 1998 Theodore Y. Ts'o <tytso@mit.edu>
699 * conv_princ.c: Add additional commonly seen Kerberos V4 services
700 to the hard-coded list.
702 Tue Jul 7 16:59:03 1998 Tom Yu <tlyu@mit.edu>
704 * chk_trans.c: Fix up previous fix; short-circuit out when
707 Wed Jul 1 17:59:26 1998 Theodore Y. Ts'o <tytso@mit.edu>
709 * chk_trans.c (krb5_check_transited_list): Fix use of an
710 uninitialized variable; apparently the code was depending
711 on the stack garbage being non-zero(!)
713 1998-05-26 Theodore Ts'o <tytso@rsts-11.mit.edu>
715 * srv_rcache.c (krb5_get_server_rcache):
716 * auth_con.c (krb5_auth_con_setrcache): Export this function in
719 1998-05-12 Theodore Ts'o <tytso@rsts-11.mit.edu>
721 * str_conv.c (krb5_timestamp_to_sfstring): Make sure the date
722 string printed uses 4 digit years.
724 1998-05-08 Theodore Ts'o <tytso@rsts-11.mit.edu>
726 * str_conv.c (krb5_string_to_timestamp, strptime): Fix routines to
727 be able to properly parse Y2K dates.
729 * t_kerb.c: Add ability to test krb5_string_to_timestamp
731 1998-05-06 Theodore Ts'o <tytso@rsts-11.mit.edu>
733 * t_ser.c (main): POSIX states that getopt returns -1
734 when it is done parsing options, not EOF.
736 1998-05-05 Theodore Ts'o <tytso@rsts-11.mit.edu>
738 * get_in_tkt.c (krb5_get_init_creds): If
739 libdefaults/{REALM}/noaddresses is true, then don't put
740 any addresses in the ticket request.
742 Mon May 4 15:54:07 1998 Tom Yu <tlyu@mit.edu>
744 * get_in_tkt.c: Add prototype for make_preauth_list.
746 Sat May 2 21:46:02 1998 Tom Yu <tlyu@mit.edu>
748 * get_in_tkt.c (krb5_get_in_tkt): Add missing argument to call to
749 make_preauth_list to avoid stack smashing. Pointed out by lxs.
751 Mon Mar 16 19:50:55 1998 Tom Yu <tlyu@mit.edu>
753 * chk_trans.c (krb5_check_transited_list): Check lengths when
754 appending to next and prev.
756 Fri Feb 27 18:03:33 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
758 * Makefile.in: Changed thisconfigdir to point at the lib/krb5
759 directory, since we've moved the configure.in tests in
760 this directory to the toplevel lib/krb5 configure.in
762 Thu Feb 19 19:03:20 1998 Tom Yu <tlyu@mit.edu>
764 * recvauth.c (krb5_recvauth): Add some bookkeeping flags so we
765 know how much stuff to free upon cleanup. Fix the up cleanup
768 Wed Feb 18 16:24:02 1998 Tom Yu <tlyu@mit.edu>
770 * Makefile.in: Remove trailing slash from thisconfigdir. Fix up
771 BUILDTOP for new conventions.
773 Fri Feb 13 15:27:35 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
775 * Makefile.in: Added new file kfree.c, which contained all of the
776 functions previously in the lib/krb5/free directory.
778 Mon Feb 2 17:02:29 1998 Theodore Ts'o <tytso@rsts-11.mit.edu>
780 * Makefile.in: Define BUILDTOP and thisconfigdir in the Makefile
782 Thu Feb 5 23:48:34 1998 Theodore Y. Ts'o <tytso@mit.edu>
784 * rd_cred.c (krb5_rd_cred):
785 * rd_safe.c (krb5_rd_safe):
786 * rd_priv.c (krb5_rd_priv): Use the remote_subkey first, since the
787 mk_* routines try to use their local_subkey first.
788 Otherwise, the wrong keys will get used if subkeys are
789 used in both directions.
791 Fri Jan 2 21:21:29 1998 Tom Yu <tlyu@mit.edu>
793 * preauth.c (handle_sam_labels):
794 (obtain_sam_padata): Check return of malloc. [krb5-libs/518]
796 * chpw.c (krb5_mk_chpw_req): Check return of malloc.
797 (krb5_rd_chpw_rep): Check return of malloc. [krb5-libs/518]
799 Tue Dec 16 00:08:33 1997 Tom Yu <tlyu@mit.edu>
801 * mk_req_ext.c (krb5_mk_req_extended): Check enctype of session
802 key, not that of the ticket, which we really shouldn't care about.
804 Sun Dec 7 07:24:23 1997 Ezra Peisach <epeisach@dumpster.rose.brandeis.edu>
806 * gic_pwd.c (krb5_get_init_creds_password): Change fourth argument
807 in call to prompter (which is an int) from NULL to 0.
809 Sat Dec 6 02:28:17 1997 Tom Yu <tlyu@mit.edu>
811 * Makefile.in: Add files chpw.c, gic_*, preauth2.c, vfy_increds.c,
814 * chpw.c: New file; implement Cygnus chpw.
816 * get_in_tkt.c: Implement support for Cygnus initial credentials
819 * gic_keytab.c: New file; Cygnus initial creds.
821 * gic_opt.c: New file; Cygnus initial creds.
823 * gic_pwd.c: New file; Cygnus initial creds.
825 * preauth.c: Add more SAM support (from Cygnus).
827 * preauth2.c: New file; additional SAM support from Cygnus.
829 * send_tgs.c: Account for additional parameter to sendto_kdc.
831 * vfy_increds.c: New file; Cygnus initial creds.
833 * vic_opt.c: New file; Cygnus initial creds.
835 Wed Oct 22 00:29:33 1997 Theodore Y. Ts'o <tytso@mit.edu>
837 * send_tgs.c (krb5_send_tgs): Don't send a zero endtime; if the
838 requested endtime is zero, set it equal to the TGT endtime.
840 Mon Oct 6 12:07:19 1997 Ezra Peisach <epeisach@kangaroo.mit.edu>
842 * set_realm.c (krb5_set_principal_realm): Allocate extra byte for
845 Mon Sep 1 21:38:16 1997 Tom Yu <tlyu@mit.edu>
847 * rd_cred.c (krb5_rd_cred_basic): Fix swapped args to memset.
849 Fri Aug 29 16:41:25 1997 Tom Yu <tlyu@mit.edu>
851 * get_in_tkt.c (krb5_get_in_tkt): Move nulling out of
852 request.padata before the os_localaddr call in order to avoid
853 freeing a null pointer in the cleanup code.
855 Tue Aug 12 09:13:22 1997 Ezra Peisach <epeisach@mit.edu>
857 * init_ctx.c (krb5_init_context): Initialize local variable ctx
858 before calling krb5_init_ets.
860 Fri Aug 8 17:04:54 1997 Tom Yu <tlyu@mit.edu>
862 * rd_cred.c (krb5_rd_cred_basic): Check remote_addr and
863 encpart.s_address before calling krb5_address_compare. Fixes
866 Fri Jul 25 15:25:32 1997 Tom Yu <tlyu@mit.edu>
868 * t_ser.c: Add support for changed kdb API.
870 Tue Jul 15 22:15:09 1997 Theodore Y. Ts'o <tytso@mit.edu>
872 * serialize.c (krb5_register_serializer): Only copy over the old
873 table when there's an old table to copy over. Otherwise,
874 BoundsChecker complains about memcpy(foo, NULL, 0).
876 Tue Mar 25 00:32:55 1997 Theodore Y. Ts'o <tytso@mit.edu>
878 * preauth.c (obtain_sam_padata): Fix handling of the sam-timestamp
879 and sam-usec fields, which should always be set if the
880 nonce is not available, not just SAM_USE_SAD_AS_KEY is
881 being used. [krb5-libs/325]
883 Mon Mar 24 12:21:38 1997 Theodore Ts'o <tytso@rsts-11.mit.edu>
885 * t_ser.c: Clean up error reporting for krb5_init_context(). Also
886 report errors for each subtest, so we know which subtest
889 Sat Feb 22 22:39:49 1997 Richard Basch <basch@lehman.com>
891 * Makefile.in: Use some of the new library list build rules in
894 Fri Feb 21 18:38:06 1997 Sam Hartman <hartmans@tertius.mit.edu>
896 * crypto_glue.c: Move into libcrypto as krb5_glue.c; I need to
897 avoid libcrypto depending on libkrb5
899 Wed Feb 19 14:21:12 1997 Theodore Y. Ts'o <tytso@mit.edu>
901 * t_kerb.c (test_set_realm): New function used to test
902 krb5_set_principal_realm(). Called by using the new "set_realm"
905 * set_realm.c (krb5_set_principal_realm): New function which sets
906 the realm of a principal.
908 Thu Feb 13 14:17:00 1997 Richard Basch <basch@lehman.com>
910 * get_in_tkt.c (krb5_get_in_tkt): Initialize as_reply; if
911 krb5_os_localaddr() returns an error, the cleanup
912 routine may try to free a garbage pointer (as_reply).
914 Wed Feb 12 20:47:30 1997 Tom Yu <tlyu@mit.edu>
916 * fwd_tgt.c (krb5_fwd_tgt_creds): Use the client's realm rather
917 than the server's realm for constructing the tgs principal.
918 Remove TC_MATCH_SRV_NAMEONLY from call to retrieve_cred()
919 because we want to get an exact match.
921 Mon Feb 10 10:41:36 1997 Ezra Peisach <epeisach@mit.edu>
923 * crypto_glue.c (krb5_calculate_checksum): Add krb5_const to
924 krb5_pointer of in data to match prototype.
926 Sat Feb 8 15:02:39 1997 Richard Basch <basch@lehman.com>
929 Export krb5_get_credentials_{renew,validate} (win32)
930 Removed unused variable.
932 Fri Feb 7 09:41:33 1997 Richard Basch <basch@lehman.com>
934 * mk_cred.c (krb5_mk_ncred): Declare ncred as krb5_int32 so that
935 the right value is pushed onto the stack when calling
936 krb5_mk_ncred_basic()
938 * copy_addrs.c fwd_tgt.c mk_cred.c:
939 Use FAR keyword in pointer declarations.
941 * sendauth.c (krb5_sendauth): Do not free the credentials if they
942 are being returned to the caller [krb5-libs/357]
944 Sun Feb 2 20:57:15 1997 Richard Basch <basch@lehman.com>
946 * serialize.c: Added FAR declarations to pointer arguments for
947 all functions declared as KRB5_DLLIMP.
949 Thu Jan 30 21:44:37 1997 Richard Basch <basch@lehman.com>
952 Export more crypto-layer functions:
953 krb5_encrypt, krb5_decrypt, krb5_eblock_enctype,
954 krb5_process_key, krb5_finish_key, krb5_string_to_key,
955 krb5_init_random_key, krb5_finish_random_key, krb5_random_key
957 Sat Feb 8 18:41:42 1997 Tom Yu <tlyu@mit.edu>
960 * configure.in: Update to new program build procedure.
962 Thu Jan 2 17:16:18 1997 Tom Yu <tlyu@mit.edu>
965 * configure.in: Update to new library build procedure.
967 Mon Dec 23 17:20:03 1996 Theodore Y. Ts'o <tytso@mit.edu>
969 * Makefile.in (SRCS): Add brand.c to the SRCS line so that the
970 kerbsrc.mac.tar includes brand.c
972 Sat Dec 21 01:26:11 1996 Theodore Y. Ts'o <tytso@mit.edu>
974 * brand.c: New file, which allows a release engineer to "brand"
975 the krb5 library or a binary application program
976 statically linked against the krb5 library. This file is
977 statically included by init_ctx.c, to force it be in a
978 binary library or application program.
980 * init_ctx.c (krb5_init_context): Use new call krb5_vercheck() for
981 Windows timebomb checking; this call returns an error
982 code, which is returned to the user if the timebomb should
985 Thu Nov 21 14:55:16 EST 1996 Richard Basch <basch@lehman.com>
987 * Makefile.in: win32 build
989 * auth_con.c bld_pr_ext.c conv_princ.c copy_addrs.c copy_athctr.c
990 copy_auth.c copy_cksum.c copy_creds.c copy_data.c copy_key.c
991 copy_princ.c copy_tick.c cp_key_cnt.c decrypt_tk.c fwd_tgt.c
992 gc_via_tkt.c get_creds.c get_in_tkt.c in_tkt_ktb.c in_tkt_pwd.c
993 in_tkt_sky.c init_ctx.c mk_cred.c mk_error.c mk_priv.c mk_rep.c
994 mk_req.c mk_req_ext.c mk_safe.c parse.c princ_comp.c rd_cred.c
995 rd_error.c rd_priv.c rd_rep.c rd_req.c rd_safe.c recvauth.c
996 sendauth.c str_conv.c unparse.c valid_times.c
997 DLL export various functions (see lib/krb5.def for full list)
999 Thu Nov 21 13:54:01 1996 Ezra Peisach <epeisach@mit.edu>
1001 * recvauth.c (krb5_recvauth): If there is an error, and the server
1002 argument to krb5_recvauth is NULL, create a dummy server
1003 entry for the krb5_error structure so that krb5_mk_error
1004 will not die with missing required fields. [krb5-libs/209]
1006 Wed Nov 13 14:30:47 1996 Tom Yu <tlyu@mit.edu>
1008 * init_ctx.c: Revert previous kt_default_name changes.
1010 Tue Nov 12 22:07:33 1996 Tom Yu <tlyu@mit.edu>
1012 * init_ctx.c (krb5_init_context): Oops. Initialize kt_default_name
1015 * init_ctx.c (krb5_free_context): Free kt_default_name if it's
1018 Sat Nov 9 14:19:28 1996 Ezra Peisach <epeisach@mit.edu>
1020 * Makefile.in (check-unix): Invoking t_ser requires that
1021 KRB5_CONFIG points to a valid krb5.conf
1023 * t_ser.c (main): If verbose flag is set and there is an error,
1024 display error message.
1026 Wed Nov 6 14:02:21 1996 Theodore Y. Ts'o <tytso@mit.edu>
1028 * init_ctx.c (krb5_init_context): Initialize the error tables, so
1029 applications don't need to call krb5_init_ets().
1031 Tue Nov 5 08:09:23 1996 Ezra Peisach <epeisach@mit.edu>
1033 * serialize.c (krb5_register_serializer): Do not free a NULL pointer.
1035 Thu Oct 31 13:48:14 1996 Theodore Y. Ts'o <tytso@mit.edu>
1037 * init_ctx.c (krb5_init_context): Make it more obvious that
1038 default ticket lifetimes is not yet supported.
1040 Tue Sep 24 20:59:14 1996 Theodore Y. Ts'o <tytso@mit.edu>
1042 * get_in_tkt.c (make_preauth_list): Correctly null-terminate the
1043 preauth list generated by make_preauth_list.
1045 Thu Sep 19 12:29:59 1996 Theodore Y. Ts'o <tytso@mit.edu>
1047 * unparse.c (krb5_unparse_name_ext): Make unparse correctly handle
1048 a all cases where a principal contains a nulls, backspace,
1051 * t_kerb.c (test_parse_principal): Add test for checking
1052 krb5_parse_principal()
1054 * parse.c (krb5_parse_name): Set all of the magic field values.
1056 Wed Jul 24 17:09:39 1996 Theodore Y. Ts'o <tytso@mit.edu>
1058 * preauth.c (find_pa_system): Change type of first argument to be
1059 krb5_preauthtype, to eliminate compiler warnings under
1062 Wed Jul 10 20:22:41 1996 Theodore Y. Ts'o <tytso@mit.edu>
1064 * init_ctx.c (krb5_init_context): Add a call to krb5_win_do_init()
1065 on Win16 and Win32 machines. This is where we do timebomb
1066 and version server checking.
1068 Sun Jul 7 15:14:43 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
1070 * get_creds.c: (krb5_get_credentials_val_renew_core) Combine
1071 common internals needed from krb5_get_credentials_validate()
1072 and used by new function krb5_get_credentials_renew()
1074 * gc_frm_kdc.c (krb5_get_cred_from_kdc_renew): A wrapper that
1075 passes KDC_OPT_RENEW to the static
1076 krb5_get_cred_from_kdc_opt so that kinit can use it.
1079 Mon Jun 24 09:45:04 1996 Theodore Ts'o <tytso@rsts-11.mit.edu>
1081 * bld_princ.c (krb5_build_principal_va): Change const to
1082 krb5_const, so that it works on compilers that don't
1085 Mon Jun 17 20:23:48 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
1087 * str_conv.c (krb5_string_to_timestamp): Ensure that all fields of
1088 the timestamp are filled in if strptime does not fill in
1091 Wed Jun 12 01:10:09 1996 Theodore Ts'o <tytso@rsts-11.mit.edu>
1093 * sendauth.c (krb5_sendauth): If ECCONABORTED is not defined, try
1094 using the Winsock equivalent (WSAECONNABORTED).
1096 Mon Jun 10 21:47:21 1996 Theodore Ts'o <tytso@rsts-11.mit.edu>
1098 * parse.c (krb5_parse_name): Change use of _WINDOWS to _MSDOS, and
1099 add check for _WIN32.
1101 Thu Jun 6 00:06:18 1996 Theodore Y. Ts'o <tytso@mit.edu>
1103 * get_creds.c (krb5_get_credentials_core): A static function must
1104 not use the INTERFACE keyword.
1106 Tue May 14 18:39:22 1996 Richard Basch <basch@lehman.com>
1108 * mk_req_ext.c mk_safe.c send_tgs.c:
1109 set the length field of the krb5_checksum structure before
1110 calling krb5_calculate_checksum.
1112 * str_conv.c: replaced sha-des3 cksum with hmac-sha.
1114 Tue May 14 02:53:42 1996 Theodore Y. Ts'o <tytso@mit.edu>
1116 * ser_ctx.c (krb5_context_size, krb5_context_externalize,
1117 krb5_context_internalize): Add missing fields from the
1118 serialized context: clockskew, default_kdc_req_sumtype,
1119 default_ap_req_sumtype, default_safe_sumtype,
1120 kdc_default_options, library_options, profile_secure,
1121 fcc_default_format, scc_default_format.
1123 * ser_actx.c (krb5_auth_context_size, krb5_auth_context_externalize,
1124 krb5_auth_context_internalize): Serialize the two fields
1125 req_cksumtype and safe_cksumtype, instead of the one
1128 * mk_safe.c (krb_mk_safe): Use safe_cksumtype instead of cksumtype
1129 in the auth context.
1131 * mk_req_ext.c (krb5_mk_req_extended): Use req_cksumtype instead
1132 of cksumtype in the auth context.
1134 * init_ctx.c (krb5_init_context): Add support for new profile
1135 relations libdefaults/tkt_lifetime,
1136 libdefaults/kdc_req_checksum_type,
1137 libdefaults/ap_req_cksumtype,
1138 libdefaults/safe_checksumtype, and
1139 libdefaults/kdc_default_options.
1141 * auth_con.h: Remove old cksumtype element, and replace it with
1142 req_cksumtype and safe_cksumtype.
1144 * auth_con.c (krb5_auth_con_init): Initialize the req_cksumtype
1145 and safe_cksumtype from the context's default
1146 req_cksumtype and safe_cksumtype.
1147 (krb5_auth_con_set_req_cksumtype,
1148 krb5_auth_con_set_safe_cksumtype): New functions, to
1149 replace old krb5_auth_con_setcksumtype
1151 Fri May 10 18:48:38 EDT 1996 Richard Basch <basch@lehman.com>
1153 * init_ctx.c: Removed des3-cbc-md5 default support
1155 Fri May 10 02:51:17 1996 Richard Basch <basch@lehman.com>
1157 * str_conv.c: changes des3-md5 to des3-sha & added sha cksum types
1159 Sun May 5 09:46:18 1996 Ezra Peisach (epeisach@kangaroo.mit.edu)
1161 * preauth.c: Add casts and const keywords as needed.
1163 Fri May 3 00:15:18 1996 Mark Eichin <eichin@cygnus.com>
1165 * get_creds.c (krb5_get_credentials_core): new function. Common
1166 part of krb5_get_credentials and krb5_get_credentials_validate.
1167 Some formerly local variables are now arguments.
1168 (krb5_get_credentials): same as before, but calls _core to do some
1170 (krb5_get_credentials_validate): uses
1171 krb5_get_cred_from_kdc_validate and only stores the returned
1172 credential in the cache, instead of storing all of them.
1174 Thu May 2 22:48:56 1996 Mark Eichin <eichin@cygnus.com>
1176 * gc_frm_kdc.c (krb5_get_cred_from_kdc_opt): new function. Same
1177 body as krb5_get_cred_from_kdc, but takes one new argument,
1178 kdcopts, and combines it with the other kdc options when calling
1179 krb5_get_cred_via_tkt. This is static and only called by
1180 (krb5_get_cred_from_kdc): a wrapper that provides the same
1181 function it did before, and
1182 (krb5_get_cred_from_kdc_validate): a wrapper that passes
1183 KDC_OPT_VALIDATE, so that kinit can use it.
1184 We'll probably need another one for renewing tickets as well.
1186 * rd_req_dec.c (krb5_rd_req_decoded_opt): new function. Same body
1187 as krb5_rd_req_decoded, but takes one new argument,
1188 check_valid_flag, to determine whether or not to check if the
1189 "invalid flag" is set in the ticket. Also made static, so that it
1191 (krb5_rd_req_decoded): wrapper for krb5_rd_req_decoded_opt that
1192 specifies the "invalid flag" gets checked, and
1193 (krb5_rd_req_decoded_anyflag): wrapper for krb5_rd_req_decoded_opt
1194 that specifies that the "invalid flag" doesn't get checked. (This
1195 version is only called from kdc_util.c:kdc_process_tgs_req.)
1197 Wed May 1 14:30:29 1996 Richard Basch <basch@lehman.com>
1199 * srv_rcache.c (krb5_get_server_rcache): include the uid in the
1200 default server replay cachename, for systems with geteuid.
1202 * configure.in: test if the system has geteuid()
1204 Wed May 1 02:26:53 1996 Mark Eichin <eichin@cygnus.com>
1206 * str_conv.c (krb5_string_to_timestamp): double check that
1207 strptime at least parsed *some* of the string, avoid degenerate
1208 cases from GNU libc strptime.
1210 Tue Apr 30 18:19:01 1996 Ken Raeburn <raeburn@cygnus.com>
1212 * t_ser.c (stuff): New variable.
1213 (ser_acontext_test, ser_eblock_test, ser_cksum_test): Use it,
1214 instead of assuming it's valid to treat &FUNCTION as a data
1217 * conv_princ.c (sconv_list): Now const.
1218 (krb5_*_conv_principal): Use pointer to const for it.
1220 Tue Apr 23 19:39:59 1996 Mark Eichin <eichin@cygnus.com>
1222 * get_creds.c (krb5_get_credentials): this isn't the kernel, so
1223 don't return negative errno values.
1225 Sat Apr 27 19:14:21 1996 Richard Basch <basch@lehman.com>
1227 * fwd_tgt.c (krb5_fwd_tgt_creds): fixed a possible null dereference.
1229 Wed Apr 17 14:22:10 1996 Theodore Y. Ts'o <tytso@mit.edu>
1231 * conv_princ.c: Added ftp and ecat to the list of services which
1232 should be converted. This really ought to be something
1233 that's configurable in the profile...
1235 Thu Apr 11 21:30:23 1996 Theodore Y. Ts'o <tytso@dcl>
1237 * init_ctx.c (krb5_init_context): On a Macintosh, turn on
1238 kdc_timesync and use the v4 credentials cache by default.
1240 * get_in_tkt.c (stash_as_reply, verify_as_reply): Move time offset
1241 code from stash_as_reply to verify_as_reply, and fix it so
1242 that it actually works.
1244 Wed Apr 3 16:04:36 1996 Theodore Y. Ts'o <tytso@dcl>
1246 * rd_req_dec.c (krb5_rd_req_decoded): Move code which
1247 validated the ticket times to krb5_validate_times.
1249 * valid_times.c (krb5_validate_times): New function which
1250 determines whether or not the ticket times are valid.
1252 * mk_req_ext.c (krb5_mk_req_extended): Call krb5_validate_time()
1253 to determine whether or not the ticket in passed-in
1254 credentials is valid. If it isn't, return an error right
1257 Wed Mar 27 17:05:47 1996 Richard Basch <basch@lehman.com>
1259 * in_tkt_ktb.c (keytab_keyproc): Do not check to see that the
1260 enctype of the key is identical; there are several equivalent
1263 * in_tkt_ktb.c (krb5_get_in_tkt_with_keytab): Removed the fancy
1264 logic to only request the keytypes that correspond to those in
1265 the keytab. There were too many fencepost conditions that could
1266 get you into trouble. Either it should be there and *fully*
1267 functional, or not in there at all. Besides, there are too many
1268 other components in Kerberos that expect the end-service to know
1269 all its keys that this sanity check is overkill.
1271 Tue Mar 26 14:45:03 1996 Richard Basch <basch@lehman.com>
1273 * conv_princ.c: added "imap" service to the conversion list as
1274 requiring domain conversion for the instance. (imap/<host> is used
1275 by some of the new imap mail implementations)
1277 Sun Mar 24 01:34:14 1996 Sam Hartman <hartmans@tertius.mit.edu>
1279 * send_tgs.c (krb5_send_tgs_basic): You want to setup the eblock
1280 used for the authenticator using the in_cred->keyblock, *not*
1281 request.ticket.enc_part.enctype. Under a multi-enctype system,
1282 the session key may be different from the ticket key.
1284 Wed Mar 20 23:00:59 1996 Theodore Y. Ts'o <tytso@dcl>
1286 * walk_rtree.c (krb5_walk_realm_tree): Fix 16bit vs. 32bit error.
1287 (cap_code should been a krb5_error_code, not an int!)
1289 * mk_cred.c (krb5_mk_ncred_basic): Fix windows lint flame.
1291 * get_in_tkt.c (krb5_get_in_tkt): Fix 16bit vs. 32bit error.
1292 (do_more should not have been an int!)
1294 Tue Mar 19 13:03:26 1996 Richard Basch <basch@lehman.com>
1296 * in_tkt_ktb.c (krb5_get_in_tkt_with_keytab):
1297 Only request keytypes that correspond to those in the keytab.
1299 Mon Mar 18 21:49:39 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
1301 * configure.in: Add KRB5_RUN_FLAGS
1303 * Makefile.in: Use runtime flags.
1305 Sun Mar 17 20:32:08 1996 Ezra Peisach <epeisach@dumpster.rose.brandeis.edu>
1307 * configure.in: Add USE_ANAME, USE_KRB5_LIBRARY, KRB5_LIBRARIES so
1308 that Makefile does not have to know build tree layout.
1310 * Makefile.in: Rework to be consistant with configure defines so
1311 that configure can specify other needed libraries.
1313 Sun Mar 17 02:10:19 1996 Mark W. Eichin <eichin@cygnus.com>
1315 * copy_addrs.c (krb5_copy_addr): make non-static so we can use it
1317 * mk_cred.c (krb5_mk_ncred_basic): copy local_addr and remote_addr
1318 instead of just aliasing them, so we can safely free them ourselves.
1320 Fri Mar 15 14:29:00 1996 Richard Basch <basch@lehman.com>
1322 * in_tkt_ktb.c: Close the keytab if we opened it, not if the
1325 Wed Mar 13 17:31:30 1996 Ken Raeburn <raeburn@cygnus.com>
1327 * configure.in: Use AC_HEADER_STDARG.
1329 Mon Mar 11 11:15:26 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
1331 * str_conv.c (krb5_timestamp_to_string): Handle statement not
1334 * ser_addr.c (krb5_address_internalize): Add magic numbers
1336 Thu Feb 29 11:49:38 1996 Theodore Y. Ts'o <tytso@dcl>
1338 * fwd_tgt.c (NEED_SOCKETS): Use NEED_SOCKETS instead of #including
1341 Sat Feb 24 16:27:54 1996 Theodore Y. Ts'o <tytso@dcl>
1343 * gc_via_tkt.c (krb5_get_cred_via_tkt): Fix memory leak; free
1346 Thu Jan 25 01:35:52 1996 Sam Hartman <hartmans@tertius.mit.edu>
1348 * rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): Remove outdated
1349 comment about mapping etype to ktype.
1351 * gc_via_tkt.c (krb5_get_cred_via_tkt): If the keyblock.enctype is
1352 non-null in in_cred, then request that particular key.
1354 Wed Jan 24 21:48:53 1996 Sam Hartman <hartmans@tertius.mit.edu>
1356 * get_creds.c (krb5_get_credentials): Only match against enctype
1357 if it is non-null in increds.
1359 Sun Jan 21 23:32:53 1996 Tom Yu <tlyu@dragons-lair.MIT.EDU>
1361 * gc_via_tkt.c (krb5_kdcrep2creds): Set is_skey so get_creds won't
1362 break trying to match is_skey in the ccache. This way we
1363 won't end up with many copies of user-to-user tickets.
1365 Fri Jan 19 23:16:17 1996 Ezra Peisach <epeisach@kangaroo.mit.edu>
1367 * mk_req.c (krb5_mk_req): krb5_get_credentials does not take
1368 default_kdc_options.
1370 * sendauth.c (krb5_sendauth): krb5_get_credentials does not take
1371 default_kdc_options.
1373 Wed Jan 10 21:01:36 1996 Theodore Y. Ts'o <tytso@dcl>
1375 * init_ctx.c (krb5_init_context): Added checking of profile for
1376 DCE compatability options (ccache type, and checksum type).
1378 * fwd_tgt.c (krb5_fwd_tgt_creds): Initialize addrs to 0 so that we
1379 don't try to free stack garbage on an error.
1381 * krbconfig.c, Makefile.in: Removed krbconfig.c; it contained
1382 global variables which are no longer used.
1384 * recvauth.c: Removed the global extern of
1385 krb5_kdc_default_options, which wasn't being used anyway.
1387 * mk_req.c (krb5_mk_req): Replace use of krb5_kdc_default_options
1388 with context->kdc_default_options.
1390 * gc_frm_kdc.c: Remove the global extern of krb5_kdc_req_sumtype,
1391 which wasn't being used anymore anyway.
1393 * send_tgs.c (krb5_send_tgs_basic): Remove use of the global
1394 variable krb5_kdc_req_sumtype, and use the kdc_req_sumtype
1395 in the context structure instead.
1397 * walk_rtree.c (krb5_walk_realm_tree): Applied patch submitted by
1398 Doug Engbert, so that the configurable authentication
1399 patch takes into account the null entry at the end of the
1402 Tue Jan 9 22:04:09 1996 Theodore Y. Ts'o <tytso@dcl>
1404 * fwd_tgt.c (krb5_fwd_tgt_creds): New function which handles all
1405 of the dirty work of forwarding TGT's.
1407 * rd_cred.c (krb5_rd_cred_basic): Clean up memory allocation
1408 discpline to remove memory leaks.
1410 * mk_cred.c (krb5_mk_ncred_basic, krb5_mk_ncred, krb5_mk_1cred):
1411 Clean up memory allocation discpline to remove memory
1414 * init_ctx.c (krb5_get_tgs_ktypes): Clean up parsing of the etype
1415 list. Don't overrun the string containing the etype list.
1417 Wed Jan 3 21:32:59 1996 Theodore Y. Ts'o <tytso@dcl>
1419 * rd_cred.c (krb5_rd_cred_basic): When the keyblock is NULL,
1420 assume we're being called from the gssapi code, which
1421 doesn't have access to the sender or receive address
1422 information, don't check the sender address, since it
1425 * rd_cred.c (decrypt_credencdata): When calling krb5_rd_credd(),
1426 if the keyblock is null, just copy the encoded structure
1427 from the "ciphertext" part of the structure and decode it.
1429 * mk_cred.c (encrypt_credencpart): When calling krb5_mk_cred(), if
1430 the keyblock is NULL, don't encrypt it; just encode it and
1431 leave it in the ciphertext area of the structure.
1433 Thu Dec 21 18:47:54 1995 Theodore Y. Ts'o <tytso@dcl>
1435 * rd_rep.c (krb5_rd_rep): Change use of
1436 KRB5_SENDAUTH_MUTUAL_FAILED to KRB5_MUTUAL_FAILED.
1438 Tue Dec 19 17:15:40 1995 Theodore Y. Ts'o <tytso@dcl>
1440 * rd_cred.c (krb5_rd_cred_basic): Missing parenthesis meant that
1441 wrong number of bytes was being allocated.
1443 Sun Dec 3 11:49:09 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1445 * Makefile.in (SRCS/OBJS): Move compat_recv.c to krb5util library.
1447 Fri Dec 1 17:04:43 1995 Theodore Y. Ts'o <tytso@dcl>
1449 * recvauth.c (krb5_recvauth): Initialize rcache to zero, so that
1450 on cleanup we don't try to free stack garbage.
1452 Sun Nov 26 19:31:18 1995 Tom Yu <tlyu@dragons-lair.MIT.EDU>
1454 * preauth.c: Ultrix is broken. Prototype obtain_enc_ts_padata()
1455 and process_pw_salt() explicitly rather than using the
1456 typedef in k5-int.h becaus that typedef is to a function
1459 Fri Nov 17 22:35:52 1995 Theodore Y. Ts'o <tytso@dcl>
1461 * get_in_tkt.c (decrypt_as_reply):
1462 * preauth.c (process_pw_salt): When fetching the key to decrypting
1463 the encrypted kdc reply, use the etype associated with the
1464 etype reply, not the etype associated with the included
1467 * encode_kdc.c: Remove eblock argument from krb5_encode_kdc_rep;
1468 set the eblock type from the client_key's enctype.
1470 Thu Nov 16 20:29:17 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1472 * srv_rcache.c (krb5_get_server_rcache): Use krb5_rc_default_type
1473 instead of assuming default rcache type is "dfl".
1475 Mon Nov 13 14:40:05 1995 <tytso@rsts-11.mit.edu>
1477 * walk_rtree.c (krb5_walk_realm_tree): Added ANL changes to
1478 support configuration authentication paths.
1480 Mon Nov 13 12:57:12 1995 Theodore Y. Ts'o <tytso@dcl>
1482 * preauth.c (krb5_process_padata): Added generalized processing
1483 for preauth information which is returned by the KDC.
1484 This should be general enough to support the AFS3_SALT
1485 preauth type, the SNK4 preauth type, and the public-key
1487 (process_pw_salt): New function for processing the KRB5_PW_SALT
1488 preauthentication type.
1490 * get_in_tkt.c (decrypt_as_reply): Removed temporary kludge for
1491 processing the PW_SALT preauth type; that's now done in
1493 (krb5_get_in_tkt): Call krb5_process_padata with new arguments so
1494 that the preauth code can set the decryption_key if
1497 Thu Nov 09 17:05:57 1995 Chris Provenzano (proven@mit.edu)
1499 * in_tkt_pwd.c : Remove krb5_enctype from krb5_string_to_key() args.
1501 Thu Nov 9 00:02:43 1995 Theodore Y. Ts'o <tytso@dcl>
1503 * get_in_tkt.c (krb5_get_in_tkt): Remove the etype_info argument
1504 from the call to krb5_obtain_padata.
1506 * preauth.c (krb5_obtain_padata): Use the PADATA_ETYPE_INFO
1507 preauth, if it exists, to determine which salt type to use
1508 when encrypting the preauthentication data. Remove the
1509 etype_info argument.
1511 Wed Nov 8 02:50:59 1995 Theodore Y. Ts'o <tytso@dcl>
1513 * krbconfig.c: Removed the krb5_clockskew variable.
1515 * srv_rcache.c (krb5_get_server_rcache):
1516 * rd_safe.c (krb5_rd_safe):
1517 * rd_req_dec.c (krb5_rd_req_decoded):
1518 * rd_priv.c (krb5_rd_priv):
1519 * rd_cred.c (krb5_rd_cred):
1520 * gc_via_tkt.c (krb5_get_cred_via_tkt):
1521 * get_in_tkt.c (verify_as_reply): Replace use of krb5_clockskew
1522 with context->clockskew.
1524 * encrypt_tk.c (cleanup_scratch): Changed interface to no longer
1525 require an eblock; we can use our own and figure out the
1526 enctype from the passed-in key.
1528 * get_in_tkt.c (krb5_get_in_tkt): Added calls to
1529 krb5_obtain_padata().
1531 * preauth.c: Completely restructured file to support
1535 Fri Oct 27 22:15:33 1995 Theodore Y. Ts'o <tytso@dcl>
1537 * get_in_tkt.c (krb5_get_in_tkt): Extensive reworking of the
1538 structure of this file to make it possible to support
1541 Mon Oct 23 17:08:59 1995 Theodore Y. Ts'o <tytso@dcl>
1543 * in_tkt_pwd.c (krb5_get_in_tkt_with_password): Fix to properly
1544 malloc password buffer.
1546 Mon Oct 23 11:09:56 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1548 * rd_req_dec.c (krb5_rd_req_decoded): For heirarchal cross-realm,
1549 set the length after initializing string.
1551 * rd_req.c (krb5_rd_req): If a new auth_context is created
1552 and then there is an error, make sure return pointer is not
1553 looking at freed memory.
1555 Fri Oct 6 22:04:42 1995 Theodore Y. Ts'o <tytso@dcl>
1557 * Makefile.in: Remove ##DOS!include of config/windows.in.
1558 config/windows.in is now included by wconfig.
1560 Fri Sep 29 00:08:53 1995 Theodore Y. Ts'o <tytso@dcl>
1562 * gc_via_tkt.c (krb5_get_cred_via_tkt): Only check the returned
1563 starttime to make sure it matches the requested starttime
1564 if we requested a postdated ticket.
1566 Thu Sep 28 22:58:53 1995 Theodore Y. Ts'o <tytso@dcl>
1568 * conv_princ.c (krb5_425_conv_principal): Only convert instances
1569 which don't have a '.' in them. If they have a '.',
1570 assume that they are fully qualified already.
1572 Thu Sep 28 12:00:00 1995 John Rivlin <jrivlin@fusion.com)
1574 * gc_via_tkt.c: Cleaned up corrupt ticket error testing to
1575 make it more debugable and I think work around a compiler
1578 Mon Sep 25 16:57:59 1995 Theodore Y. Ts'o <tytso@dcl>
1580 * Makefile.in: Removed "foo:: foo-$(WHAT)" lines from the
1583 Wed Sep 13 10:58:20 1995 Keith Vetter (keithv@fusion.com)
1585 * get_in_t.c: removed unused variable.
1586 * rd_cred.c: removed INTERFACE keyword.
1587 * ser_auth.c: passing int32 where a size_t is wanted.
1588 * ser_ctx.c: 16/32 bit int size mismatch.
1590 Sun Sep 17 23:41:19 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1592 * rd_safe.c: Fix typo error.
1594 Sat Sep 16 01:23:14 1995 Theodore Y. Ts'o <tytso@dcl>
1596 * sendauth.c (krb5_sendauth): Make sure the scratch credentials
1597 structure may have possible been used be freed..
1599 * rd_safe.c (krb5_rd_safe_basic): Fall through to the cleanup code
1600 at the end, to make sure the decoded message in message is
1603 * rd_req_dec.c (krb5_rd_req_decoded): Use krb5_copy_keyblock to
1604 copy authent->subkey to auth_context->remote_subkey.
1605 Keeping them separate avoids aliasing problems.
1607 * mk_req_ext.c (krb5_generate_authenticator): Fix memory leak.
1608 Don't bash authent->subkey with key after carefully
1609 copying it using krb5_copy_keyblock!
1611 * recvauth.c (krb5_recvauth): krb5_get_server_rcache() already
1612 opens the rcache; doing it again merely causes a memory leak.
1614 Fri Sep 15 17:20:08 1995 Theodore Y. Ts'o <tytso@dcl>
1616 * gen_subkey.c (krb5_generate_subkey): Eliminate memory leak.
1617 krb5_init_random_key() does its own allocation of the
1620 * gc_via_tkt.c (krb5_kdcrep2creds): Fix memory leak.
1622 * srv_rcache.c (krb5_get_server_rcache): Fix memory leak.
1624 * rd_safe.c (krb5_rd_safe_basic): Fix memory leak.
1626 Tue Sep 12 12:40:30 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1628 * t_ser.c (ser_cksum_test): Work around an optimizer bug unser
1631 Sun Sep 10 12:00:00 1995 James Mattly (mattly@fusion.com)
1633 * gen_seqnum.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
1634 * get_in_tkt.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
1635 * mk_priv.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
1636 * mk_req_ext.c: change usage of krb5_crypto_us_timeofday to krb5_timeofday
1637 * send_tgs.c: change usage of krb5_timeofday over to krb5_crypto_us_timeofday
1639 Wed Sep 06 14:20:57 1995 Chris Provenzano (proven@mit.edu)
1641 * auth_con.c, decrypt_tk.c, encode_kdc.c, encrypt_tk.c,
1642 * gc_frm_kdc.c, gen_seqnum.c, get_creds.c, get_in_tkt.c,
1643 * in_tkt_ktb.c, in_tkt_pwd.c, in_tkt_sky.c, init_ctx.c,
1644 * kdc_rep_dc.c, mk_cred.c, mk_priv.c, mk_rep.c, mk_req._ext.c,
1645 * preauth.c, rd_cred.c, rd_priv.c, rd_rep.c, rd_req_dec.c,
1646 * send_tgs.c, sendauth.c, ser_actx.c, ser_ctx.c, ser_eblk.c,
1647 * ser_key.c, t_ser.c : s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
1649 Wed Sept 6 12:00:00 EDT 1995 James Mattly (mattly@fusion.com)
1651 * get_in_tkt.c: change usage of krb5_timeofday to krb5_crypto_us_timeofday
1652 * mk_req_ext.c: change usage of timeofday
1653 * parse.c: disabled a usage of exit for macintosh
1654 * send_tgs.c: change usage of krb5_timeofday over to
1655 krb5_crypto_us_timeofday
1656 * unparse.c: include <stdio.h>
1659 Tue Sep 05 22:10:34 1995 Chris Provenzano (proven@mit.edu)
1661 * decode_kdc.c, decrypt_tk.c, encode_kdc.c, encrypt_tk.c, gc_frm_kdc.c
1662 * gc_via_tkt.c, get_in_tkt.c, in_tkt_ktb.c, in_tkt_pwd.c, in_tkt_sky.c
1663 * init_ctx.c, kdc_rep_dc.c, mk_cred.c, mk_priv.c, mk_rep.c
1664 * mk_req_ext.c, rd_cred.c, rd_priv.c, rd_rep.c, rd_req_dec.c,
1665 * send_tgs.c, ser_ctx.c, ser_eblk.c, ser_key.c, t_ser.c:
1666 Remove krb5_enctype references, and replace with
1667 krb5_keytype where appropriate
1669 Fri Sep 1 20:03:41 1995 Theodore Y. Ts'o <tytso@dcl>
1671 * get_in_tkt.c (krb5_get_in_tkt): If kdc_settime is enabled, then
1672 set the time_offset fields from the returned ticket's
1675 * init_ctx.c (krb5_init_context): Initialize new fields in
1676 krb5_context (clockskew, kdc_req_sumtype, and
1677 kdc_default_options).
1679 * gc_via_tkt.c (krb5_get_cred_via_tkt): Perform the necessary
1680 sanity checking on the KDC response to make sure we detect
1683 * send_tgs.c (krb5_send_tgs): Set the expected nonce in the
1686 * krbconfig.c: Set the default checksum to use MD5
1688 Fri Sep 1 11:16:43 EDT 1995 Paul Park (pjpark@mit.edu)
1689 * ser_ctx.c - Add handling of new time offset fields in the os_context.
1692 Tue Aug 29 14:14:26 EDT 1995 Paul Park (pjpark@mit.edu)
1693 * Makefile.in, .Sanitize, ser_{actx,adata,addr,auth,cksum,ctx,eblk,key,
1694 princ}.c, serialize.c, t_ser.c - Add serialization operations
1695 for data structures required to serialize krb5_context, krb5_
1696 auth_context, krb5_encrypt_block and krb5_principal.
1697 * auth_con.h - Add magic number.
1698 * auth_con.c - Add static routine to copy an address and use this
1699 instead of the other code. Set the magic number when initing
1700 an auth_context. Use krb5_free_address to release an address.
1701 * init_ctx.c - Free the allocated serializers when releasing context.
1702 * rd_rep.c - Copy the keyblock from the message instead of setting
1705 Thu Aug 24 18:55:50 1995 Theodore Y. Ts'o <tytso@dcl>
1707 * .Sanitize: Update file list.
1709 Mon Aug 7 18:54:35 1995 Theodore Y. Ts'o <tytso@dcl>
1711 * in_tkt_ktb.c (keytab_keyproc): If there is an error looking up
1712 the key, make sure the keytab is closed as part of the
1715 Fri Aug 4 22:04:08 1995 Tom Yu <tlyu@dragons-lair.MIT.EDU>
1717 * conv_princ.c: Add braces to initializer to shut up gcc -Wall
1719 Fri Jul 7 16:31:06 EDT 1995 Paul Park (pjpark@mit.edu)
1720 * Makefile.in - Find com_err in TOPLIBD.
1721 * rd_safe.c - Use checksum verifier instead of doing it manually.
1723 Thu Jul 6 17:31:40 1995 Tom Yu <tlyu@lothlorien.MIT.EDU>
1725 * rd_safe.c (krb5_rd_safe_basic): Pass context to os_localaddr.
1727 * rd_priv.c (krb5_rd_priv_basic): Pass context to os_localaddr.
1729 * rd_cred.c (krb5_rd_cred_basic): Pass context to os_localaddr.
1731 * get_in_tkt.c (krb5_get_in_tkt): Pass context to os_localaddr.
1733 Wed July 5 15:52:31 1995 James Mattly <mattly@fusion.com>
1734 * added condition for _MACINTOSH
1736 Sun Jul 2 18:59:53 1995 Sam Hartman <hartmans@tertius.mit.edu>
1738 * recvauth.c (krb5_recvauth): recvauth should send an error reply
1739 if problem is not zero. Removed if that caused it to only send a
1742 Fri Jun 16 22:11:21 1995 Theodore Y. Ts'o (tytso@dcl)
1744 * get_in_tkt.c (krb5_get_in_tkt): Allow the credentials cache
1745 argument to be optional; allow it to be NULL, meaning that
1746 the credentials shouldn't be stored in a credentials cache.
1748 Mon Jun 12 16:49:42 1995 Chris Provenzano (proven@mit.edu)
1750 A couple bug reports/patches from Ed Phillips (flaregun@udel.edu)
1751 * in_tkt_ktb.c (keytab_keyproc()): Fix memory leak.
1752 * recvauth.c (krb5_recvauth()): Don't open a new rcache if
1753 the auth_context already has one.
1754 * auth_con.c (krb5_auth_con_free()): Close rcache is the
1755 auth_context has one set.
1756 * auth_con.c (krb5_auth_con_getrcache()): Return pointer
1757 to the rcache set in the auth_context.
1759 Sun Jun 11 12:31:39 1995 Ezra Peisach (epeisach@kangaroo.mit.edu)
1761 * auth_con.c (krb5_auth_con_init): Zero newly allocated
1762 krb5_auth_context. (Fixed error in redefinitions).
1764 Sat Jun 10 23:05:51 1995 Tom Yu (tlyu@dragons-lair)
1766 * auth_con.c, compat_recv.c, mk_cred.c, mk_priv.c, mk_rep.c,
1767 mk_req.c, mk_req_ext.c, mk_safe.c, rd_cred.c, rd_priv.c,
1768 rd_rep.c, rd_req.c rd_req_dec.c, rd_safe.c, recvauth.c,
1769 sendauth.c: krb5_auth_context redefinitions
1771 Fri Jun 9 18:48:43 1995 <tytso@rsx-11.mit.edu>
1773 * rd_req_dec.c (krb5_rd_req_decoded): Fix -Wall nits
1775 * configure.in: Remove standardized set of autoconf macros, which
1776 are now handled by CONFIG_RULES.
1778 * Makefile.in, faddr_ordr.c: Remove faddr_ordr.c; its function,
1779 krb5_fulladdr_order, isn't used anywhere.
1781 Fri Jun 9 02:42:54 1995 Tom Yu (tlyu@dragons-lair)
1783 * rd_cred.c (krb5_rd_cred_basic): fix typo (extra "context"
1784 argument passed to krb5_xfree)
1786 Thu Jun 8 22:48:27 1995 Theodore Y. Ts'o <tytso@dcl>
1788 * rd_cred.c (krb5_rd_cred_basic): Fix problem where the ticket
1789 field was assigned with a krb5_data, which was then
1792 Thu Jun 8 16:06:44 1995 <tytso@rsx-11.mit.edu>
1794 * compat_recv.c, auth_con.c, chk_trans.c, encrypt_tk.c,
1795 gc_frm_kdc.c, gc_via_tkt.c, gen_seqnum.c, gen_subkey.c,
1796 get_creds.c, get_in_tkt.c, in_tkt_ktb.c, in_tkt_pwd.c,
1797 in_tkt_skey.c, init_ctx.c, kdc_rep_dc.c, mk_cred.c,
1798 mk_error.c, mk_priv.c, mk_rep.c, mk_req.c, mk_req_ext.c,
1799 mk_cred.c, mk_safe.c, parse.c, preauth.c, rd_cred.c,
1800 rd_rep.c, rd_req.c, rd_req_dec.c, rd_safe.c, recvauth.c,
1801 sendauth.c, send_tgs.c, srv_rcache.c, walk_rtree.c: Clean
1802 up GCC -Wall flames.
1804 Wed Jun 7 15:23:21 1995 <tytso@rsx-11.mit.edu>
1806 * conv_princ.c (krb5_425_conv_principal): Remove old CONFIG_FILES
1809 Fri May 26 10:18:28 1995 Keith Vetter (keithv@fusion.com)
1811 * makefile.in: removed for the PC creating shared directory.
1812 (still bug with the '@SHARED_RULE@' line but I'm waiting
1813 on tytso for that since I don't want to break Unix).
1815 Thu May 25 09:58:42 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1817 * gc_via_tkt.c (krb5_kdcrep2creds): Fix syntax error in the
1818 freeing of the keyblock.
1820 Wed May 24 18:19:17 1995 Theodore Y. Ts'o (tytso@dcl)
1822 * Makefile.in, configure.in: Add rules for building shared library.
1824 * gc_via_tkt.c (krb5_kdcrep2creds): On an error, free the keyblock.
1826 Tue May 23 16:28:42 1995 Theodore Y. Ts'o (tytso@dcl)
1828 * gc_frm_kdc.c, preauth.c, t_kerb.c, t_walk_rtree.c, unparse.c:
1829 Rearrange #include files so that krb5.h gets included
1830 first, so that the debugging information can be more
1831 efficiently collapsed since the type numbers will be the
1834 Sat May 20 14:01:16 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1836 * rd_safe.c (krb5_rd_safe): Increment remote_seq_number if
1837 KRB5_AUTH_CONTEXT_DO_SEQUENCE is set.
1839 Thu May 11 22:42:30 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1841 * rd_cred.c (krb5_rd_cred_basic): If address don't match, return
1842 KRB5KRB_AP_ERR_BADADDR (add missing retval).
1844 Thu May 11 18:30:21 1995 Chris Provenzano (proven@mit.edu)
1846 * mk_cred.c (krb5_mk_cred()), mk_priv.c (krb5_mk_priv()),
1847 * mk_safe.c (krb5_mk_safe()), rd_cred.c (krb5_rd_cred()),
1848 * rd_priv.c (krb5_rd_prev()), rd_safe.c (krb5_rd_safe()):
1849 Pass the contents pointer returned from krb5_make_fulladdr()
1850 to free() not the address of the pointer.
1852 Tue May 9 08:34:21 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1854 * Makefile.in (clean): Remove t_kerb and t_kerb.o
1856 Fri May 5 00:06:24 1995 Theodore Y. Ts'o (tytso@dcl)
1858 * conv_princ.c (krb5_425_conv_principal): Use new calling
1859 convention of krb5_get_realm_domain, which is that it
1860 returns the realm *without* the leading dot.
1862 Also use the profile code to look up individual instance
1863 conversions using [realms]/<realm>/v4_instance_convert/<inst>
1864 This allows special case handling of mit.edu and
1865 lithium.lcs.mit.edu.
1867 * t_kerb.c: New file for testing krb library functions. Currently
1868 only tests krb5_425_conv_principal.
1870 Wed May 03 03:30:51 1995 Chris Provenzano (proven@mit.edu)
1872 * recvauth.c, compat_recv.c (krb5_recvauth()):
1873 * compat_recv.c (krb5_compat_recvauth()):
1874 No longer needs the rc_type arg.
1876 Tue May 02 19:29:18 1995 Chris Provenzano (proven@mit.edu)
1878 * mk_cred.c (mk_cred()), mk_priv.c (mk_priv()), mk_safe.c (mk_safe()),
1879 * rd_cred.c (rd_cred()), rd_priv.c (rd_priv()), rd_safe.c (rd_safe()):
1880 Don't call krb5_make_fulladdrs() if a port isn't specified.
1882 Mon May 01 15:56:32 1995 Chris Provenzano (proven@mit.edu)
1884 * auth_con.c (krb5_auth_con_free()) :
1885 Free all the data associated with the auth_context.
1887 * auth_con.c (krb5_auth_con_setkey()) : Removed.
1888 * mk_rep.c (mk_rep()),
1889 The krb5_mk_rep() routine must always encode the data in
1890 the keyblock of the ticket, not the subkey.
1892 * cleanup.h, auth_con.c (krb5_auth_con_setports()) : Added.
1893 * auth_con.h, mk_cred.c (mk_cred()), mk_priv.c (mk_priv()),
1894 * mk_safe.c (mk_safe()), rd_cred.c (rd_cred()),
1895 * rd_priv.c (rd_priv()), rd_safe.c (rd_safe()) :
1896 Changes to auth_context to better support full addresses.
1898 Sat Apr 29 00:09:40 1995 Theodore Y. Ts'o <tytso@dcl>
1900 * srv_rcache.c (krb5_get_server_rcache): Fix fencepost error which
1901 caused an access beyond the allocated memory of piece->data.
1903 * rd_priv.c (krb5_rd_priv_basic): Call krb5_free_priv_enc_part to free
1904 the entire privenc_msg structure.
1906 Fri Apr 28 09:54:51 EDT 1995 Paul Park (pjpark@mit.edu)
1908 Move adm_rw.c from libkrb5 to libkadm.
1910 Fri Apr 28 08:36:03 1995 Theodore Y. Ts'o <tytso@lurch.mit.edu>
1912 * init_ctx.c (krb5_free_context): Extra semicolon meant the etypes
1913 field in the context was never being freed.
1915 Fri Apr 28 01:44:51 1995 Chris Provenzano (proven@mit.edu)
1917 * send_tgs.c (krb5_send_tgs()), gc_via_tkt.c (krb5_get_cred_via_tkt()):
1918 Removed krb5_cksumtype argument.
1920 Thu Apr 27 21:36:01 1995 Chris Provenzano (proven@mit.edu)
1922 * auth_con.c (krb5_auth_con_getaddrs() and krb5_auth_con_getflags()):
1923 Added for completeness.
1924 * mk_req_ext.c (krb5_mk_req_extended()) : Don't send the
1925 AP_OPTS_USE_SUBKEY option over the wire.
1927 Thu Apr 27 17:40:20 1995 Keith Vetter (keithv@fusion.com)
1929 * adm_rw.c, mk_cred.c, rd_cred.c:
1930 malloc on the PC must be size SIZE_T not int32.
1931 * adm_rw.c: krb5_free_adm_data second argument now a krb5_int32.
1933 Thu Apr 27 16:33:17 EDT 1995 Paul Park (pjpark@mit.edu)
1935 * mk_priv.c - Back out previous change which always put in
1936 timestamp, regardless of DO_TIME setting and
1937 instead, clear out the replaydata before calling
1938 mk_priv_basic from mk_priv.
1939 * mk_safe.c - Same replaydata fix.
1941 Thu Apr 26 15:59:51 EDT 1995 Paul Park (pjpark@mit.edu)
1943 * Add adm_rw.c - routines to read and write commands from/to the
1944 administrative (kpasswd/kadmin) server.
1946 Wed Apr 27 11:30:00 1995 Keith Vetter (keithv@fusion.com)
1948 * init_ctx.c: krb5_init_context wasn't checking return values.
1949 * mk_req.c: deleted unused local variable.
1951 Wed Apr 26 22:49:18 1995 Chris Provenzano (proven@mit.edu)
1953 * gc_via_tgt.c, and gc_2tgt.c : Removed.
1954 * Makefile.in, gc_via_tkt.c, gc_frm_kdc.c, and, int-proto.h :
1955 Replaced get_cred_via_tgt() and get_cred_via_2tgt()
1956 with more general function get_cred_via_tkt().
1958 Tue Apr 25 21:58:23 1995 Chris Provenzano (proven@mit.edu)
1960 * Makefile.in : Added gc_via_tkt.c and removed get_fcreds.c
1961 * auth_con.c (krb5_auth_con_setaddrs()) : Fixed so it allocates
1962 space and copies addresses, not just pointer.
1963 * mk_cred.c: Completely rewritten from sources donated by asriniva.
1964 * rd_cred.c: Completely rewritten from sources donated by asriniva.
1965 * mk_priv.c (krb5_mk_priv()), mk_safe.c (krb5_mk_safe()),
1966 rd_priv.c (krb5_rd_priv()), and rd_safe (krb5_rd_safe()) :
1967 Try using a subkey before using the session key for encryption.
1968 * recvauth.c (krb5_recvauth()): Don't close the rcache on success.
1970 Mon Apr 24 23:12:21 1995 Theodore Y. Ts'o <tytso@dcl>
1972 * Makefile.in, configure.in (t_walk_rtree): Add WITH_NETLIBS and
1973 $(LIBS), so that t_walk_rtree can compile under solaris.
1975 Mon Apr 24 17:09:36 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
1977 * parse.c (krb5_parse_name): Add magic number to new structure
1979 * get_creds.c: Fix comments describing operation
1981 * gc_frm_kdc.c: Fix comments describing operation
1983 * copy_cksum.c (krb5_copy_checksum): Fix comment in file
1985 * copy_addrs.c (krb5_append_addresses): ifdef out unused
1986 krb5_append_addresses function. (no API or prototype
1989 * copy_data.c (krb5_copy_data): Initialize magic number
1991 * init_ctx.c (krb5_init_context): If an error is returned from
1992 krb5_set_default_in_tkt_etypes or krb5_os_init_context,
1993 pass to caller instead of stack garbage.
1995 Sat Apr 22 11:06:45 1995 Ezra Peisach (epeisach@kangaroo.mit.edu)
1997 * Makefile.in: t_walk_rtree needs libcrypto
1999 * t_walk_rtree.c: error in checking for argument count
2001 Thu Apr 20 16:23:23 1995 Theodore Y. Ts'o (tytso@dcl)
2003 * copy_addrs.c, copy_athctr.c, copy_auth.c, copy_cksum.c,
2004 copy_creds.c, copy_key.c, copy_princ.c, copy_tick.c,
2005 gc_2tgt.c, gc_frm_kdc.c, gc_via_tgt.c, get_creds.c,
2006 mk_req_ext.c: Unless HAVE_C_STRUCTURE_ASSIGNMENT is defined, use
2007 memcpy to copy structures around, instead of using
2008 structure assignments. (Which aren't guaranteed to work
2009 on some broken compilers.)
2011 * mk_req.c (krb5_mk_req): Use krb5_sname_to_principal() in order
2012 to create the service principal from the service and
2013 hostname pair. This allows for the host cannoncialization
2016 * mk_req_ext.c (krb5_mk_req_extended): Revamp checksum handling
2017 code so that no checksum is performed in in_data is NULL,
2018 and the special case handing of cksumtype == 0x8003 for
2019 the GSSAPI library is handled correctly.
2021 Wed Apr 19 13:39:34 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
2023 * init_ctx.c: (krb5_init_context) initialize context default
2024 realm. (krb5_free_context) free default realm.
2026 Fri Apr 14 15:05:51 1995 <tytso@rsx-11.mit.edu>
2028 * sendauth.c (krb5_sendauth): initialize error return parameter
2030 * copy_princ.c (krb5_copy_principal): Fix bug where
2031 krb5_copy_principal can fail if it is asked to copy a
2032 principal with a zero-length component on a system where
2033 malloc(0) returns null.
2035 Thu Apr 13 15:49:16 1995 Keith Vetter (keithv@fusion.com)
2037 * *.[ch]: removed unneeded INTERFACE from non-api functions.
2039 Fri Mar 31 16:45:47 1995 Keith Vetter (keithv@fusion.com)
2041 * krb5_get_in_tkt: changed error return value for when clocks
2042 are out of skew to be KRB5_KDCREP_SKEW.
2044 Fri Mar 31 00:44:26 1995 Theodore Y. Ts'o (tytso@dcl)
2046 * rd_req.c (krb5_rd_req): Fix typo which caused new_keytab to not
2047 get freed, causing a memory leak.
2049 Thu Mar 30 15:49:27 1995 Keith Vetter (keithv@fusion.com)
2051 * rd_req.c: removed unused local variable.
2053 Tue Mar 28 18:34:20 1995 John Gilmore (gnu at toad.com)
2055 * rd_req_sim.c: Really remove the file.
2057 Mon Mar 27 08:34:49 1995 Chris Provenzano (proven@mit.edu)
2059 * Makefile.in: Removed rd_req_sim.c
2061 * auth_con.c: Default cksumtype is now CKSUMTYPE_RSA_MD4_DES.
2063 * auth_con.c: Added krb5_auth_con_setuseruserkey(),
2064 krb5_auth_con_getkey(),
2065 krb5_auth_con_getremotesubkey(),
2066 krb5_auth_con_getauthenticator(),
2067 krb5_auth_con_getremoteseqnumber(),
2068 krb5_auth_con_initivector().
2070 * auth_con.c: Fixed krb5_auth_con_getlocalsubkey() to check for
2071 a valid local_subkey before calling krb5_copy_keyblock().
2073 * auth_con.h: Fixed some comments.
2075 * mk_req_ext.c (krb5_mk_req_extended()): Always pass in a seed
2076 (the keyblock contents) to krb5_calculate_checksum()
2078 * rd_rep.c (krb5_rd_rep()): Use appropriate key to decode reply.
2080 * rd_safe.c (krb5_rd_safe()): Don't pass checksum to
2081 krb5_rd_safe_basic(), it's unnecessary.
2083 * compat_recv.c (krb5_compat_recvauth()):
2084 * mk_rep.c (krb5_mk_rep()):
2085 * rd_req.c (krb5_rd_req()):
2086 * rd_req_dec.c (krb5_rd_req_decode()):
2087 * recvauth.c (krb5_recvauth()):
2088 Added a krb5_auth_context argument and eliminated many of
2089 the other arguments because they are included in the
2090 krb5_auth_context structure.
2093 Tue Mar 21 19:22:51 1995 Keith Vetter (keithv@fusion.com)
2095 * mk_safe.c: fixed signed/unsigned mismatch.
2096 * rd_safe.c: removed unused local variable currentime.
2097 * mk_req_e.c: fixed signed/unsigned mismatch.
2099 Sat Mar 18 18:58:02 1995 John Gilmore (gnu at toad.com)
2101 * bld_pr_ext.c, bld_princ.c: Replace STDARG_PROTOTYPES with
2102 HAVE_STDARG_H for consistency.
2104 Fri Mar 17 19:48:07 1995 John Gilmore (gnu at toad.com)
2106 * Makefile.in (check-mac): Add.
2107 * compat_recv.c, get_fcreds.c, recvauth.c: Eliminate Unix socket
2108 #includes, which are now handled by k5-int.h (via k5-config.h).
2109 * conv_princ.c: Rename variable "comp" to another name; "comp"
2110 apparently bothers the MPW compiler...
2111 * rd_cred.c: Avoid (void) casts of void functions, for MPW.
2112 * t_walk_rtree.c: Put com_err.h after k5_int for <sys/types> stuff.
2113 (main): Declare and initialize the krb5_context that's being
2114 passed to everything.
2116 Fri Mar 10 10:58:59 1995 Chris Provenzano (proven@mit.edu)
2118 * auth_con.h auth_con.c Added for krb5_auth_con definition and
2121 * mk_req.c (krb5_mk_req())
2122 * mk_req_ext.c (krb5_mk_req_extended())
2123 * rd_rep.c (krb5_rd_rep())
2124 * sendauth.c (krb5_sendauth())
2125 * mk_priv.c (krb5_mk_priv())
2126 * mk_safe.c (krb5_mk_safe())
2127 * rd_priv.c (krb5_rd_priv())
2128 * rd_safe.c (krb5_rd_safe())
2129 Added a krb5_auth_context argument and eliminated many of
2130 the other arguments because they are included in the
2131 krb5_auth_context structure.
2133 * send_tgs.c (krb5_send_tgs()) Eliminate call to krb5_mk_req_extended(),
2134 which does far more than krb5_send_tgs() needs.
2136 Tue Mar 7 19:57:34 1995 Mark Eichin <eichin@cygnus.com>
2138 * configure.in: take out ISODE_INCLUDE.
2140 Tue Mar 7 13:20:06 1995 Keith Vetter (keithv@fusion.com)
2142 * Makefile.in: changed library name on the pc.
2143 * parse.c: disabled for the PC error messages to stderr.
2144 * chk_trans.c: fixed signed/unsigned assignment.
2146 Thu Mar 2 11:45:00 1995 Keith Vetter (keithv@fusion.com)
2148 * compat_recv.c, get_fcre.c, recvauth.c, sendauth.c: changed
2149 NEED_WINSOCK_H to NEED_SOCKETS.
2151 Wed Mar 1 20:15:00 1995 Keith Vetter (keithv@fusion.com)
2153 * compat_r.c, copy_pri.c, get_fcre.c, get_in_t.c, init_ctx.c, in_tkt_p.c
2154 in_tkt_s.c, preauth.c, princ_co.c, pr_to_sa.c, rd_req_d.c, recvauth.c
2155 sendauth.c, send_tgs.c, unparse.c: 16 vs 32 bit casts, removed some
2156 unused local variables, and pulled in winsock.h for network byte
2159 Tue Feb 28 01:14:57 1995 John Gilmore (gnu at toad.com)
2161 * *.c: Avoid <krb5/...> includes.
2162 * parse.c: Exdent #ifndef to left margin for old compilers.
2164 Wed Feb 22 17:14:31 1995 Keith Vetter (keithv@fusion.com)
2166 * walk_rtr.c (krb5_walk_realm_tree): formal parameter wasn't declared.
2167 * send_tgs.c: const in wrong place in the prototype.
2168 * get_in_tkt.c, preauth.c, rd_cred.c, rd_priv.c, rd_req_dec.c,
2169 rd_safe.c: needed a 32 bit abs() function.
2170 * parse.c: removed call to fprintf on error the windows version
2171 * send_auth.c: defined for windows the ECONNABORTED errno (will
2172 be removed when the socket layer is fully implemented).
2174 Tue Feb 21 23:38:34 1995 Theodore Y. Ts'o (tytso@dcl)
2176 * mk_cred.c (krb5_mk_cred): Fix argument type to
2177 krb5_free_cred_enc_part().
2179 Mon Feb 13 20:25:20 1995 Theodore Y. Ts'o (tytso@dcl)
2181 * get_in_tkt.c (krb5_get_in_tkt): Fix memory leak --- the default
2182 encryption types was not being freed.
2184 Fri Feb 10 15:45:59 1995 Theodore Y. Ts'o <tytso@dcl>
2186 * rd_req.c (krb5_rd_req): Remove ISODE cruft.
2188 Thu Feb 9 17:43:04 1995 Theodore Y. Ts'o <tytso@dcl>
2190 * gc_via_tgt.c (krb5_get_cred_via_tgt): Set up the keyblock's
2191 etype field correctly (after copying the keyblock, so it
2192 doesn't get overwritten!)
2194 Mon Feb 06 17:19:04 1995 Chris Provenzano (proven@mit.edu)
2196 * get_in_tkt.c (krb5_get_in_tkt())
2197 * in_tkt_sky.c (krb5_get_in_tkt_with_skey())
2198 * in_tkt_pwd.c (krb5_get_in_tkt_with_password())
2199 Removed krb5_keytype, changed krb5_enctype to krb5_enctype *,
2200 changed krb5_preauthtype to krb5_preauthtype *.
2202 Changed the args to the key_proc arg of krb5_get_in_tkt()
2203 to be the following (krb5_context, const krb5_keytype,
2204 krb5_data *, krb5_const_pointer, krb5_keyblock **)
2206 * in_tkt_ktb.c (krb5_get_in_tkt_with_keytab()) Added this routine
2207 to replace krb5_get_in_tkt_with_skey() in kinit.
2209 * Makefile.in Added new source file in_tkt_ktb.c.
2211 Fri Feb 3 16:41:19 1995 Mark Eichin (eichin@cygnus.com)
2213 * get_in_tkt.c (krb5_get_in_tkt): also check for the version
2214 number of the reply being whatever we had in the first byte of the
2217 Fri Feb 3 08:07:55 1995 Theodore Y. Ts'o (tytso@dcl)
2219 * compat_recv.c (krb_v4_recvauth): Use explicit 32 bit types so
2220 this will work on an Alpha.
2222 Fri Feb 3 00:43:48 1995 Tom Yu (tlyu@dragons-lair)
2224 * get_in_tkt.c (krb5_get_in_tkt): fix typo
2226 Thu Feb 2 20:51:55 1995 Mark Eichin (eichin@cygnus.com)
2228 * get_in_tkt.c (krb5_get_in_tkt): if krb5_is_as_rep fails, check
2229 if the packet might be a V4 error packet. Use modified V4 check so
2230 that it compiles under SCO.
2232 Mon Jan 30 15:46:14 1995 Chris Provenzano (proven@mit.edu)
2234 * int-proto.h Update prototypes for krb5_get_cred_via_tgt(), and
2235 krb5_get_cred_via_2tgt().
2237 * get_fcreds.c (krb5_get_for_creds())
2238 * gc_via_tgt.c (krb5_get_cred_via_tgt())
2239 * gc_2tgt.c (krb5_get_cred_via_2tgt())
2240 Removed krb5_enctype argument. Pass NULL list of encryption
2241 types to krb5_send_tgs to get default encryption types.
2243 * gc_frm_kdc.c Removed krb5_enctype argument passed to
2244 krb5_get_cred_via_tgt()
2246 * send_tgs.c (krb5_send_tgs()) Changed krb5_enctype arg to
2247 krb5_enctype *, a NULL terminated array of encryption
2248 types. If argument is NULL then krb5_send_tgs() will
2249 use defaul list of encryption types.
2251 * send_tgs.c (krb5_send_tgs()) To encrypt request ticket use
2252 usecred->keyblock.etype instead of (and now defunct)
2255 * init_ctx.c Added krb5_set_default_in_tkt_etypes() and
2256 krb5_get_default_in_tkt_etypes().
2258 * rd_req.c, rd_req_decode.c Removed typedef for rdreq_key_proc
2259 and use krb5_rd_req_decoded in its place.
2261 Mon Jan 30 11:26:05 1995 Chris Provenzano (proven@mit.edu)
2263 * get_fcreds.c Really needs #include<krb5/asn1.h> for definition
2264 of krb5_is_krb_error()
2266 Sat Jan 28 14:45:55 1995 Chris Provenzano (proven@mit.edu)
2268 * in_tkt_sky.c (skey_keyproc()), rd_req_dec.c (krb5_rd_req_decoded())
2269 use new API for krb5_kt_get_entry.
2271 Fri Jan 27 15:45:45 1995 Chris Provenzano (proven@mit.edu)
2273 * get_fcreds.c Removed #include<krb5/crc-32.h> and #include<krb5/asn1.h>
2275 Wed Jan 25 16:54:40 1995 Chris Provenzano (proven@mit.edu)
2277 * Removed all narrow types and references to wide.h and narrow.h
2279 Fri Jan 13 15:23:47 1995 Chris Provenzano (proven@mit.edu)
2281 * Added krb5_context to all krb5_routines
2283 Mon Dec 19 21:55:44 1994 Theodore Y. Ts'o (tytso@dcl)
2285 * init_ctx.c: New file. Initializes and frees the krb5_context
2288 Wed Dec 7 17:52:08 1994 <tytso@localhost>
2290 * rd_req_dec.c (decrypt_authenticator): If the subkey doesn't
2291 exist, don't try to set the subkey's etype.
2293 Wed Nov 30 17:10:39 1994 Theodore Y. Ts'o (tytso@dcl)
2295 * bld_princ.c (krb5_build_principal_va): Set the principal's type
2298 * Makefile.in: Build new test driver (t_walk_rtree) for
2299 krb5_walk_realm_tree.
2301 * walk_realm_tree.c (krb5_walk_realm_tree): Fix bug which occured
2302 when the client or the server is a subdomain of the other;
2303 walk_realm_tree would return the wrong answer, and suffer
2304 from memory access errors.
2306 * unparse.c (krb5_unparse_name_ext): Quote the '/' and '@'
2307 characters properly.
2309 * configure.in: Add appropriate help text for the --with-krb4
2310 option. Remove ISODE_DEFS call, since ISODE_INCLUDES now
2311 defines ISODE automatically.
2313 Mon Nov 21 15:30:07 1994 Theodore Y. Ts'o (tytso@dcl)
2315 * mk_req_ext.c (krb5_mk_req_extended): Sanitize how memory is
2316 freed in both error and normal cases, to remove memory
2319 * mk_req_ext.c (krb5_mk_req_extended): Use the encryption type
2320 specified by the ticket to generate the authenticator.
2322 * encode_kdc.c (krb5_encode_kdc_rep): Now requires that the
2323 caller pass in the encryption block to be used for
2324 encrpyting the ticket. That way, this routine doesn't
2325 need to create its own encryption block.
2327 * encrypt_tk.c (krb5_encrypt_tkt_part): Now requires that the
2328 caller pass in the encryption block to be used for
2329 encrpyting the ticket. That way, this routine doesn't
2330 need to create its own encryption block.
2332 Fri Nov 18 17:30:44 1994 Theodore Y. Ts'o (tytso@dcl)
2334 * mk_req_ext.c (krb5_mk_req_extended): Encrypt the authenticator
2335 using the same encryption system used to encrypt the ticket.
2337 Thu Nov 17 01:56:05 1994 Theodore Y. Ts'o (tytso@dcl)
2339 * gc_via_tgt.c (krb5_get_cred_via_tgt):
2340 * gc_2tgt.c (krb5_get_cred_via_2tgt): Set the encryption type of
2341 the session keyblock to be the type used to encrypt the
2344 Fri Nov 11 01:20:22 1994 Theodore Y. Ts'o (tytso@dcl)
2346 * get_in_tkt.c (krb5_get_in_tkt): Set the encryption type of the
2347 session keyblock to be the type used to encrypt the
2350 Thu Nov 10 23:56:43 1994 Theodore Y. Ts'o (tytso@dcl)
2352 * rd_rep.c (krb5_rd_rep): Set the encryption type in
2353 the subkey keyblock to be the encryption type used to
2354 encrypt the rd_rep message.
2356 * decrypt_tk.c (krb5_decrypt_tkt_part): Set the encryption type in
2357 the session keyblock to be the encryption type used to
2360 * rd_req_dec.c (decrypt_authenticator): Set the encryption type in
2361 the subkey keyblock to be the encryption type used to
2362 encrypt the authenticator.
2364 Tue Nov 8 17:09:48 1994 Theodore Y. Ts'o (tytso@dcl)
2366 * in_tkt_pwd.c (pwd_keyproc): Use the documented interface for
2367 calling krb5_string_to_key().
2369 Tue Oct 25 23:34:57 1994 Theodore Y. Ts'o (tytso@dcl)
2371 * srv_rcache.c (krb5_get_server_rcache): Added missing continue so
2372 that we don't copy both the unprintable character as well
2373 as the quoted version of it.
2375 Mon Oct 24 15:50:19 1994 Theodore Y. Ts'o (tytso@dcl)
2377 * configure.in: If KRB4 is defined, define KRB5_KRB4_COMPAT for
2380 Thu Oct 13 17:26:28 1994 Theodore Y. Ts'o (tytso@maytag)
2382 * configure.in: Add ISODE_DEFS
2384 Tue Oct 4 16:29:19 1994 Theodore Y. Ts'o (tytso@dcl)
2386 * in_tkt_sky.c (skey_keyproc):
2387 * in_tkt_pwd.c (pwd_keyproc): Add widen.h and narrow.h includes
2388 around pwd_keyproc, so that the keyproc input arguments
2389 are appropriately widened.
2391 Fri Sep 30 21:58:15 1994 Theodore Y. Ts'o (tytso@dcl)
2393 * preauth.c (preauth_systems): Add placeholder for magic number
2395 Thu Sep 29 15:31:10 1994 Theodore Y. Ts'o (tytso@dcl)
2397 * srv_rcache.c (krb5_get_server_rcache): cachename was not being
2398 properly null-terminated.
2400 * get_in_tkt.c (krb5_get_in_tkt): Return KRB5_IN_TKT_REALM_MISATCH
2401 if the client and server realms don't match. Return
2402 KRB5_KDCREP_SKEW if the KDC reply has an unacceptible
2403 clock skew (instead of KDCREP_MODIFIED.)
2405 * gc_via_tgt.c (krb5_get_cred_via_tgt): Use a distinct error code
2406 for KDC skew separate from the standard KDCREP_MODIFIED
2408 * princ_comp.c (krb5_realm_compare): Added new function from
2411 Wed Sep 21 17:57:35 1994 Theodore Y. Ts'o (tytso@dcl)
2413 * rd_req_dec.c (krb5_rd_req_decoded): Added Changes from Cybersafe
2414 to do transited realm path checking.
2416 * chk_trans.c: Added donated module from CyberSafe. It checks to
2417 see if a transited path is a legal one between two realms.
2419 Thu Sep 15 11:08:39 1994 Theodore Y. Ts'o (tytso@dcl)
2421 * rd_req_sim.c (krb5_rd_req_simple): Use krb5_rd_req instead of
2422 krb5_rd_req_decoded, to eliminate some code duplication.
2424 Sat Aug 20 01:43:43 1994 Theodore Y. Ts'o (tytso at tsx-11)
2426 * mk_req_ext.c (krb5_generate_authenticator): Fix pointer aliasing
2427 problem between newkey and authent->subkey.
2429 Wed Aug 17 17:58:22 1994 Theodore Y. Ts'o (tytso at tsx-11)
2431 * encode_kdc.c (krb5_encode_kdc_rep): Pass in to
2432 encode_krb5_enc_kdc_rep_part the msg_type which should be used.
2433 Old versions of Kerberos always assume TGS_REP; this merely allows
2434 the right msg_type to be passed down to the encoding routines.
2435 For now, the encoding routines will ignore this value and do
2436 things the old way, for compatibility's sake.
2438 Mon Aug 8 22:38:16 1994 Theodore Y. Ts'o (tytso at tsx-11)
2440 * preauth.c: Renamed preauthentication mechanism names to match
2441 what bcn and I agreed upon.
2443 Tue Jun 28 19:35:07 1994 Tom Yu (tlyu at dragons-lair)
2445 * decode_kdc.c: folding in Harry's changes
2447 * rd_req_sim.c: ditto
2448 * configure.in: adding ISODE_DEFS