]> git.ipfire.org Git - thirdparty/krb5.git/log
thirdparty/krb5.git
11 years agoUpdate manpages
Tom Yu [Thu, 16 Jan 2014 20:53:26 +0000 (15:53 -0500)] 
Update manpages

11 years agomake depend
Tom Yu [Thu, 16 Jan 2014 20:52:33 +0000 (15:52 -0500)] 
make depend

11 years agoSort file list for msgfmt
Tom Yu [Wed, 15 Jan 2014 23:40:57 +0000 (18:40 -0500)] 
Sort file list for msgfmt

The list of input files for msgfmt was unsorted find output, resulting
in excessively large changes when running "make update-po".

(cherry picked from commit f131c5a4e266d07753a1f219d35c1bf82d98c0fb)

ticket: 7835 (new)
version_fixed: 1.11.5
status: resolved

11 years agoRemove mentions of krb5-send-pr
Tom Yu [Tue, 14 Jan 2014 20:43:35 +0000 (15:43 -0500)] 
Remove mentions of krb5-send-pr

Start the process of deprecating krb5-send-pr.  In practice, it causes
frustration for some users, and free-form email is good enough for
most bug reports.

Continue to install krb5-send-pr for now, but plan to remove it from
the tree in the future, probably replaced by a script that instructs
the user to send email manually.

(cherry picked from commit e972ce069dd45aad74e4f4853570ab27cfea05c2)

ticket: 7834 (new)
version_fixed: 1.11.5
status: resolved

11 years agoFix typo in sphinx manpage output
Tom Yu [Tue, 14 Jan 2014 21:13:44 +0000 (16:13 -0500)] 
Fix typo in sphinx manpage output

Some versions of the sphinx manpage writer have a typo in the name
'reStructuredText' written into the comments.  Add a sed command to
fix this.

(cherry picked from commit 4d30cc5d0838f6b5b3873046b0dfe72df2bdad11)

ticket: 7833 (new)
version_fixed: 1.11.5
status: resolved

11 years agoTest bogus KDC-REQs
Tom Yu [Thu, 16 Jan 2014 20:18:46 +0000 (15:18 -0500)] 
Test bogus KDC-REQs

Send encodings that are invalid KDC-REQs, but pass krb5_is_as_req()
and krb5_is_tgs_req(), to make sure that the KDC recovers correctly
from failures in decode_krb5_as_req() and decode_krb5_tgs_req().  Also
send an encoding that isn't a valid KDC-REQ.

(back ported from commit dae7693f8bf970d89d4c697f3d66a7d458281b93)

ticket: 7832 (new)
version_fixed: 1.11.5
status: resolved

11 years agoFix possible null deref in previous
Tom Yu [Wed, 1 Jan 2014 00:41:12 +0000 (19:41 -0500)] 
Fix possible null deref in previous

My rework of the do_tgs_req.c patch introduced a null deref if
decode_krb5_tgs_req() failed.

(cherry picked from commit 30589b2a1636de9f9b68591f0e546cb0fa21989f)

ticket: 7831
version_fixed: 1.11.5
status: resolved

11 years agoLog service princ in KDC more reliably
rbasch [Mon, 16 Dec 2013 15:54:41 +0000 (10:54 -0500)] 
Log service princ in KDC more reliably

Under some error conditions, the KDC would log "<unknown server>" for
the service principal because service principal information is not yet
available to the logging functions.  Set the appropriate variables
earlier.

do_as_req.c: After unparsing the client, immediately unparse the
server before searching for the client principal in the KDB.

do_tgs_req.c: Save a pointer to the client-requested service
principal, to make sure it gets logged if an error happens before
search_sprinc() successfully completes.

[tlyu@mit.edu: commit message; fix TGS to catch more error cases]

ticket: 7831 (new)

11 years agoFix typo that broke 'make clean'
Tom Yu [Thu, 16 Jan 2014 20:05:23 +0000 (15:05 -0500)] 
Fix typo that broke 'make clean'

Missing $

(cherry picked from commit 28633f186a943721b6948875ca85a4a34bc87da4)

ticket: 7826
version_fixed: 1.11.5
status: resolved

11 years agoAdd a test program for krb5_copy_context
Tom Yu [Thu, 16 Jan 2014 19:39:53 +0000 (14:39 -0500)] 
Add a test program for krb5_copy_context

This test program isn't completely proof against the kind of mistakes
we've made with krb5_copy_context in the past, but it at least
exercises krb5_copy_context and can detect some kinds of bugs.

(back ported from commit b78c3c8c5025aec870d20472f80d4a652062f921)

ticket: 7826

11 years agoFix krb5_copy_context
Tom Yu [Thu, 16 Jan 2014 19:34:54 +0000 (14:34 -0500)] 
Fix krb5_copy_context

krb5_copy_context has been broken since 1.8 (it broke in r22456)
because k5_copy_etypes crashes on null enctype lists.  Subsequent
additions to the context structure were not reflected in
krb5_copy_context, creating double-free bugs.  Make k5_copy_etypes
handle null input and account for all new fields in krb5_copy_context.
Reported by Arran Cudbard-Bell.

(back ported from commit c452644d91d57d8b05ef396a029e34d0c7a48920)

ticket: 7826 (new)

11 years agoClarify klist -s documentation
Greg Hudson [Tue, 17 Dec 2013 21:56:41 +0000 (16:56 -0500)] 
Clarify klist -s documentation

The documentation for klist -s erroneously suggests that it doesn't
affect the exit status behavior and that it merely checks for the
existence of the ccache (only mentioning the expired ticket check at
the end).  Make it clearer and simpler, but avoid going into a lot of
detail about the nature of the expiration check.

(cherry picked from commit bf1d3c7b0b060be4b3e9e793b633c07e489ac76f)

ticket: 7830 (new)
version_fixed: 1.11.5
status: resolved

11 years agoFix GSS krb5 acceptor acquire_cred error handling
Greg Hudson [Mon, 16 Dec 2013 20:37:56 +0000 (15:37 -0500)] 
Fix GSS krb5 acceptor acquire_cred error handling

When acquiring acceptor creds with a specified name, if we fail to
open a replay cache, we leak the keytab handle.  If there is no
specified name and we discover that there is no content in the keytab,
we leak the keytab handle and return the wrong major code.  Memory
leak reported by Andrea Campi.

(cherry picked from commit decccbcb5075f8fbc28a535a9b337afc84a15dee)

ticket: 7829 (new)
version_fixed: 1.11.5
status: resolved

11 years agoFix memory leak in SPNEGO initiator
Simo Sorce [Fri, 13 Dec 2013 17:00:41 +0000 (12:00 -0500)] 
Fix memory leak in SPNEGO initiator

If we eliminate a mechanism from the initiator list because
gss_init_sec_context fails, free the memory for that mech OID before
removing it from the list.

[ghudson@mit.edu: clarified commit message]

(cherry picked from commit 1cda48a7ed4069cfc052f974ec3d76a9137c8c5a)

ticket: 7828 (new)
version_fixed: 1.11.5
status: resolved

11 years agoFix SPNEGO one-hop interop against old IIS
Greg Hudson [Tue, 10 Dec 2013 17:04:18 +0000 (12:04 -0500)] 
Fix SPNEGO one-hop interop against old IIS

IIS 6.0 and similar return a zero length reponse buffer in the last
SPNEGO packet when context initiation is performed without mutual
authentication.  In this case the underlying Kerberos mechanism has
already completed successfully on the first invocation, and SPNEGO
does not expect a mech response token in the answer.  If we get an
empty mech response token when the mech is complete during
negotiation, ignore it.

[ghudson@mit.edu: small code style and commit message changes]

(cherry picked from commit 37af638b742dbd642eb70092e4f7781c3f69d86d)

ticket: 7827 (new)
version_fixed: 1.11.5
status: resolved

11 years agoAvoid malloc(0) in SPNEGO get_input_token
Greg Hudson [Fri, 6 Dec 2013 23:56:56 +0000 (18:56 -0500)] 
Avoid malloc(0) in SPNEGO get_input_token

If we read a zero-length token in spnego_mech.c's get_input_token(),
set the value pointer to NULL instead of calling malloc(0).

(cherry picked from commit 13fd26e1863c79f616653f6a10a58c01f65fceff)

ticket: 7825 (new)
version_fixed: 1.11.5
status: resolved

11 years agoFix S4U2Self against non-FAST KDCs
Greg Hudson [Fri, 6 Dec 2013 01:32:05 +0000 (20:32 -0500)] 
Fix S4U2Self against non-FAST KDCs

When we added FAST TGS support in 1.11, we broke S4U2Self against KDCs
which don't support FAST, because the S4U2Self padata is only present
within the FAST request.  For now, duplicate that padata in the outer
request so that both FAST and non-FAST KDCs can see it.

(cherry picked from commit 55c3a5f69919c2b5435bac0cb48ab09b11be869c)

ticket: 7824 (new)
version_fixed: 1.11.5
status: resolved

11 years agoTest SPNEGO error message in t_s4u.py
Tom Yu [Thu, 16 Jan 2014 19:31:55 +0000 (14:31 -0500)] 
Test SPNEGO error message in t_s4u.py

Now that #7045 is fixed, we can check for the correct error message
from t_s4u2proxy_krb5 with --spnego.

(back ported from commit 4faca53e3a8ee213d43da8998f6889e7bfd36248)

ticket: 7823
version_fixed: 1.11.5
status: resolved

11 years agoLet SPNEGO display mechanism errors
Simo Sorce [Tue, 17 Dec 2013 21:15:14 +0000 (16:15 -0500)] 
Let SPNEGO display mechanism errors

To avoid potential recursion we use a thread local variable that tells
us whether the ancestor was called via spnego_gss_display_name().  If
we detect recursion, we assume that we returned a com_err code like
ENOMEM and call error_message(); in the worst case that will result in
an "Unknown error" message.

[ghudson@mit.edu: Edited comments and commit message; removed an
unneeded line of code.]

(cherry picked from commit d160bc733a3dbeb6d84f4e175234ff18738d9f66)

ticket: 7823 (new)

11 years agoBetter keysalt docs
Tom Yu [Mon, 9 Dec 2013 20:48:02 +0000 (15:48 -0500)] 
Better keysalt docs

Add a new section to kdc_conf.rst to describe keysalt lists, and
update other documentation to better distinguish enctype lists from
keysalt lists.

(cherry picked from commit 23a75649277afc24a9dfea199689e18129fa390c)

ticket: 7799 (new)
version_fixed: 1.11.5
status: resolved

11 years agoFix error message quotations in install_kdc.rst
Tom Yu [Tue, 3 Dec 2013 19:47:51 +0000 (14:47 -0500)] 
Fix error message quotations in install_kdc.rst

Some error messages that kprop could print were quoted incorrectly in
install_kdc.rst.

Also fix minor typos.

(cherry picked from commit 68d7fcf11553c29a2e0c28a57896fbce4a3ef611)

ticket: 7798 (new)
version_fixed: 1.11.5
status: resolved

11 years agoUpdate doc for current kdb5_util dump version
Tom Yu [Fri, 22 Nov 2013 23:23:52 +0000 (18:23 -0500)] 
Update doc for current kdb5_util dump version

kdb5_util.rst incorrectly describes the current default dump format
version as 6 when it should be 7.  Reported by Jeff D'Angelo.

(cherry picked from commit f0d7309a20665ac16a22856e0c8cffdb156f2d24)

ticket: 7783 (new)
version_fixed: 1.11.5
status: resolved

11 years agoEdit ccache_def.rst
Greg Hudson [Fri, 22 Nov 2013 21:53:35 +0000 (16:53 -0500)] 
Edit ccache_def.rst

Re-fill to 70 columns.  Replace non-ascii apostrophes with ASCII ones.
Edit wording slightly.

(cherry picked from commit 482869d393807d02668cf49ce74666d682cf77a6)

ticket: 7782
version_fixed: 1.11.5
status: resolved

11 years agoAdded a new ccache doc to "Kerberos V5 concepts"
Zhanna Tsitkov [Fri, 22 Nov 2013 19:02:57 +0000 (14:02 -0500)] 
Added a new ccache doc to "Kerberos V5 concepts"

This is to add a short introductory document on credential
caches to the Concepts section of Kerberos documentation.

(cherry picked from commit 251f94621328277044e3ae1a10ecd3ddfdda1dbb)

ticket: 7782 (new)

11 years agoImprove default ccache name API documentation
Tom Yu [Tue, 26 Nov 2013 22:57:51 +0000 (17:57 -0500)] 
Improve default ccache name API documentation

Document the lifetime and caching behavior of the
krb5_cc_default_name() return value.  Document that
krb5_cc_set_default_name() may be called with NULL to purge the cached
value.  Correct a typo in the krb5_cc_default() summary and explicitly
reference krb5_cc_default_name().

(back ported from commit 3e5fe754b9f9742d1c9b1564633d4172277166db)

ticket: 7781 (new)
version_fixed: 1.11.5
status: resolved

11 years agoCorrect kadm5.acl back-reference documentation
Greg Hudson [Thu, 21 Nov 2013 21:22:48 +0000 (16:22 -0500)] 
Correct kadm5.acl back-reference documentation

In kadm5.acl, *N in the target principal name refers to the Nth
wildcard in the acting principal pattern, not the Nth component.

(cherry picked from commit 39bac22ed7f5ff583e92d082b34f0c5a2a3cad4c)

ticket: 7780 (new)
version_fixed: 1.11.5
status: resolved

11 years agoClarify lockout replication issues in docs
Greg Hudson [Mon, 18 Nov 2013 23:59:17 +0000 (18:59 -0500)] 
Clarify lockout replication issues in docs

In the "KDC replication and account lockout" section of lockout.rst,
specifically call out kprop and incremental propagation as the
mechanisms which do not replicate account lockout state, and add a
note that KDCs using LDAP may not be affected by that section's
concerns.

(cherry picked from commit 8eb9e6fe1b01faa875dcf91b618ad4cd7793438a)

ticket: 7779 (new)
version_fixed: 1.11.5
status: resolved

11 years agoRemove dangling --with-kdc-kdb-update references
Tom Yu [Tue, 26 Nov 2013 22:53:52 +0000 (17:53 -0500)] 
Remove dangling --with-kdc-kdb-update references

This configure option hasn't done anything since 1.8, so don't mention
it in configure --help or the documentation.  The disable_last_success
and disable_lockout DB options are now used to turn it off.

(back ported from commit 0b3225d63f50d4e6297be5d751cae1d3368fcdb1)

ticket: 7778 (new)
version_fixed: 1.11.5
status: resolved

11 years agoFix use-before-init in two test programs
Greg Hudson [Fri, 15 Mar 2013 05:57:40 +0000 (01:57 -0400)] 
Fix use-before-init in two test programs

If krb5_init_context fails, use a null context for getting the error
message, not a context we haven't yet initialized.  Observed by David
Benjamin <davidben@mit.edu> using clang.

(cherry picked from commit 525eafc83a0fbe8f215b7749b5774d54468a19d1)

ticket: 7760
version_fixed: 1.11.5
status: resolved

11 years agoClarify realm and dbmodules configuration docs
Greg Hudson [Wed, 6 Nov 2013 18:33:04 +0000 (13:33 -0500)] 
Clarify realm and dbmodules configuration docs

In kdc_conf.rst, add examples showing how to configure a realm
parameter and a database parameter.  Document that the default DB
configuration section is the realm name, and use that in the example.
Move the db_module_dir description to the end of the [dbmodules]
documentation since it is rarely used and could confuse a reader about
the usual structure of the section.

(cherry picked from commit 689d769c10c53bd4fa40e82421c89b96cc86cbae)

ticket: 7762 (new)
version_fixed: 1.11.5
status: resolved

12 years agoUpdate for krb5-1.11.4-postrelease
Tom Yu [Tue, 5 Nov 2013 01:14:17 +0000 (20:14 -0500)] 
Update for krb5-1.11.4-postrelease

12 years agoUpdates for krb5-1.11.4 krb5-1.11.4-final
Tom Yu [Mon, 4 Nov 2013 20:24:40 +0000 (15:24 -0500)] 
Updates for krb5-1.11.4

12 years agoFix reference for trace logging
Tom Yu [Tue, 5 Nov 2013 00:21:29 +0000 (19:21 -0500)] 
Fix reference for trace logging

The documentation change in #7727 depends on missing link target for
the trace logging section in doc/admin/troubleshoot.rst.  Add it.

ticket: 7758 (new)
version_fixed: 1.11.4
status: resolved

12 years agoMulti-realm KDC null deref [CVE-2013-1418]
Tom Yu [Mon, 4 Nov 2013 20:33:09 +0000 (15:33 -0500)] 
Multi-realm KDC null deref [CVE-2013-1418]

If a KDC serves multiple realms, certain requests can cause
setup_server_realm() to dereference a null pointer, crashing the KDC.

CVSSv2: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

A related but more minor vulnerability requires authentication to
exploit, and is only present if a third-party KDC database module can
dereference a null pointer under certain conditions.

(back ported from commit 5d2d9a1abe46a2c1a8614d4672d08d9d30a5f8bf)

ticket: 7756 (new)
version_fixed: 1.11.4
status: resolved

12 years agoClarify kpropd standalone mode documentation
Greg Hudson [Wed, 30 Oct 2013 22:22:00 +0000 (18:22 -0400)] 
Clarify kpropd standalone mode documentation

The kpropd -S option is no longer needed to run kpropd in standalone
mode, but its functionality is not deprecated; standalone mode is
automatically activated when appropriate.  Clarify the kpropd
documentation on standalone mode to avoid giving the impression that
the mode is deprecated.

(cherry picked from commit bfec0671ca6df811453d46a2f47afc7168b980fc)

ticket: 7752 (new)
version_fixed: 1.11.4
status: resolved

12 years agoDocument master key rollover
Greg Hudson [Fri, 25 Oct 2013 16:30:48 +0000 (12:30 -0400)] 
Document master key rollover

Add a new section to database.rst documenting the procedure for
rolling the master key.

(cherry picked from commit e4b5d426a1e1e00367cc44a9619535ab71b20393)

ticket: 7748 (new)
version_fixed: 1.11.4
status: resolved

12 years agoImprove LDAP KDB initialization error messages
Greg Hudson [Mon, 28 Oct 2013 15:23:11 +0000 (11:23 -0400)] 
Improve LDAP KDB initialization error messages

In krb5_ldap_initialize, don't just blat the LDAP error into the
extended message; give an indication of which LDAP operation we were
trying to do and show what parameters we gave to it.

(Also, krb5_set_error_message can handle a null context argument, so
don't bother to check before calling.)

(cherry picked from commit 5a77bb85294f37d1dfa4c7faedfdfb0d7faaf8dc)

ticket: 7747 (new)
version_fixed: 1.11.4
status: resolved

12 years agoFix decoding of mkey kvno in mkey_aux tl-data
Greg Hudson [Sun, 27 Oct 2013 00:17:10 +0000 (20:17 -0400)] 
Fix decoding of mkey kvno in mkey_aux tl-data

krb5_dbe_lookup_mkey_aux was decoding a 16-bit value directly into an
int, resulting in the wrong value on big-endian platforms.  The
consequences are mostly invisible because we ignore this field and try
all mkey_aux nodes in krb5_def_fetch_mkey_list.

(cherry picked from commit 64ec2941af1561ef06e7e885b2ffb65a675516ce)

ticket: 7746 (new)
version_fixed: 1.11.4
status: resolved

12 years agoReset key-generation parameters for each enctype
Ben Kaduk [Fri, 25 Oct 2013 18:00:29 +0000 (14:00 -0400)] 
Reset key-generation parameters for each enctype

In add_key_pwd, initialize s2k_params to NULL inside the loop over
enctypes instead of outside the loop, so that if the afs3 salt type
is used it does not contaminate later enctype/salt pairs in the list.

(cherry picked from commit 381cf01afb13ad28de0927de37f8e1d12749bf49)

ticket: 7742 (new)
version_fixed: 1.11.4
status: resolved

12 years agoCorrectly activate master keys in pre-1.7 KDBs
Greg Hudson [Thu, 24 Oct 2013 16:51:18 +0000 (12:51 -0400)] 
Correctly activate master keys in pre-1.7 KDBs

Starting with 1.7, databases are created with actkvno tl-data in the
K/M entry which gives the initial master key version an activation
time of 0.  A database created before 1.7 will not have this tl-data,
but we should behave in the same way as we do for a more recent
database.

Move the actkvno list synthesis code from krb5_dbe_fetch_act_key_list
to krb5_dbe_lookup_actkvno so it applies to kdb5_util commands as well
as libkadm5.  Synthesize the same list as we would have initialized
the KDB with, with an activation time of 0 for the earliest master
key.

(cherry picked from commit ec560fac83912abaa15fb158101c8174497081c5)

ticket: 7737 (new)
version_fixed: 1.11.4
status: resolved

12 years agoUse active master key in update_princ_encryption
Greg Hudson [Wed, 23 Oct 2013 15:55:19 +0000 (11:55 -0400)] 
Use active master key in update_princ_encryption

kdb5_util update_princ_encryption should update to the active master
key version, not the most recent.

(cherry picked from commit 4ccc18bc3ddc49d0fd0d2de00ec91c0fa44c53a8)

ticket: 7735 (new)
version_fixed: 1.11.4
status: resolved

12 years agoFix typos in kdb5_util master key command outputs
Greg Hudson [Mon, 21 Oct 2013 20:46:15 +0000 (16:46 -0400)] 
Fix typos in kdb5_util master key command outputs

kdb5_util list_mkeys was beginning lines with "KNVO" instead of
"KVNO".  kdb5_util purge_mkeys was displaying "follwing" instead of
"following" for both dry-run and normal cases.

(cherry picked from commit 7fee58ccadf1b61eec9a8c62f47dac43986e2ad1)

ticket: 7734 (new)
version_fixed: 1.11.4
status: resolved

12 years agoDiscuss cert expiry, no-key princs in PKINIT docs
Greg Hudson [Mon, 14 Oct 2013 22:14:00 +0000 (18:14 -0400)] 
Discuss cert expiry, no-key princs in PKINIT docs

In pkinit.rst, add "-days" options to the example commands for
creating certificate and briefly discuss the issue of expiration dates
so that the administrator thinks about it.  In troubleshoot.rst, add
an entry for the "certificate has expired" error which results from
PKINIT (when linked with OpenSSL) when a certificate has expired.

(cherry picked from commit f3977b6883f0172a2af9006522a1b35546f86749)

ticket: 7727 (new)
version_fixed: 1.11.4
status: resolved

12 years agoUse protocol error for PKINIT cert expiry
Greg Hudson [Mon, 14 Oct 2013 21:02:31 +0000 (17:02 -0400)] 
Use protocol error for PKINIT cert expiry

If we fail to create a cert chain in cms_signeddata_create(), return
KRB5KDC_ERR_PREAUTH_FAILED, which corresponds to a protocol code,
rather than KRB5_PREAUTH_FAILED, which doesn't.  This is also more
consistent with other error clauses in the same function.

(cherry picked from commit cd59782cb32b79e4001a86b0fe47af8b6275ef0c)

ticket: 7726 (new)
version_fixed: 1.11.4
status: resolved

12 years agoChange KRB5KDC_ERR_NO_ACCEPTABLE_KDF to 100
Greg Hudson [Wed, 9 Oct 2013 17:37:17 +0000 (13:37 -0400)] 
Change KRB5KDC_ERR_NO_ACCEPTABLE_KDF to 100

draft-ietf-krb-wg-pkinit-alg-agility-07 specifies
KDC_ERR_NO_ACCEPTABLE_KDF as 82, but this value conflicts with
KRB_AP_ERR_PRINCIPAL_UNKNOWN from RFC 6111.  The former value has been
reassigned to 100 to fix the conflict.  Use the correct value.

We believe that this error won't crop up in practice for a long time
(when SHA-2 has been superceded by other hash algorithms and people
are desupporting it), by which time implementations will mostly have
been upgraded to use the new value.

(cherry picked from commit 2938851a5ec77ab68bcd1f5cfd07991c7ccabea6)

ticket: 7724 (new)
version_fixed: 1.11.4
status: resolved

12 years agoFix GSSAPI krb5 cred ccache import
Tom Yu [Thu, 17 Oct 2013 22:20:37 +0000 (18:20 -0400)] 
Fix GSSAPI krb5 cred ccache import

json_to_ccache was incorrectly indexing the JSON array when restoring
a memory ccache.  Fix it.

Add test coverage for a multi-cred ccache by exporting/importing the
synthesized S4U2Proxy delegated cred in t_s4u2proxy_krb5.c; move
export_import_cred from t_export_cred.c to common.c to facilitate
this.  Make a note in t_export_cred.py that this case is covered in
t_s4u.py.

(cherry picked from commit 48dd01f29b893a958a64dcf6eb0b734e8463425b)

ticket: 7723 (new)
version_fixed: 1.11.4
status: resolved

12 years agoDon't warn or error on variadic macros
Greg Hudson [Sat, 25 May 2013 18:35:41 +0000 (14:35 -0400)] 
Don't warn or error on variadic macros

Our portability assumptions now allow the use of variadic macros, so
don't warn or error on them.

(cherry picked from commit d211001ba17fddfb952beb00118dc5c7e598355e)

ticket: 7702
version_fixed: 1.11.4
status: resolved

12 years agoAdd test case for CVE-2013-1417
Tom Yu [Tue, 2 Jul 2013 02:20:41 +0000 (22:20 -0400)] 
Add test case for CVE-2013-1417

(back ported from commit f3328214a01fe9ca4de72cb9593ee10c39c638e9)

ticket: 7670
version_fixed: 1.11.4
status: resolved

12 years agoKDC null deref due to referrals [CVE-2013-1417]
Tom Yu [Fri, 21 Jun 2013 21:58:25 +0000 (17:58 -0400)] 
KDC null deref due to referrals [CVE-2013-1417]

An authenticated remote client can cause a KDC to crash by making a
valid TGS-REQ to a KDC serving a realm with a single-component name.
The process_tgs_req() function dereferences a null pointer because an
unusual failure condition causes a helper function to return success.

While attempting to provide cross-realm referrals for host-based
service principals, the find_referral_tgs() function could return a
TGS principal for a zero-length realm name (indicating that the
hostname in the service principal has no known realm associated with
it).

Subsequently, the find_alternate_tgs() function would attempt to
construct a path to this empty-string realm, and return success along
with a null pointer in its output parameter.  This happens because
krb5_walk_realm_tree() returns a list of length one when it attempts
to construct a transit path between a single-component realm and the
empty-string realm.  This list causes a loop in find_alternate_tgs()
to iterate over zero elements, resulting in the unexpected output of a
null pointer, which process_tgs_req() proceeds to dereference because
there is no error condition.

Add an error condition to find_referral_tgs() when
krb5_get_host_realm() returns an empty realm name.  Also add an error
condition to find_alternate_tgs() to handle the length-one output from
krb5_walk_realm_tree().

The vulnerable configuration is not likely to arise in practice.
(Realm names that have a single component are likely to be test
realms.)  Releases prior to krb5-1.11 are not vulnerable.

Thanks to Sol Jerome for reporting this problem.

CVSSv2: AV:N/AC:M/Au:S/C:N/I:N/A:P/E:H/RL:O/RC:C

(cherry picked from commit 3c7f1c21ffaaf6c90f1045f0f5440303c766acc0)

ticket: 7668
version_fixed: 1.11.4
status: resolved

12 years agoInstall ccselect_plugin.h
Tom Yu [Mon, 1 Jul 2013 19:34:36 +0000 (15:34 -0400)] 
Install ccselect_plugin.h

The ccselect pluggable interface was added in release 1.10, but we
neglected to install its header file.

(back ported from commit a1933d02c87e9d78ddbc586d460028aabbd747cb)

ticket: 7671
version_fixed: 1.11.4
status: resolved

12 years agoFix spin loop reading from KDC TCP socket
Tom Yu [Mon, 1 Jul 2013 19:18:33 +0000 (15:18 -0400)] 
Fix spin loop reading from KDC TCP socket

In the k5_sendto code for reading from a TCP socket, detect
end-of-stream when reading the length.  Otherwise we can get stuck in
an infinite loop of poll() and read().

[ghudson@mit.edu: commit message]

(back ported from commit 53e5c850e05f011e9e7f25c2032aec51d8b352a9)

ticket: 7508
version_fixed: 1.11.4
status: resolved

12 years agoBuild with Visual Studio 2012
Ben Kaduk [Mon, 24 Jun 2013 22:19:45 +0000 (18:19 -0400)] 
Build with Visual Studio 2012

It's more aggressive about enforcing that keywords are not macros
in C++ mode, and has bumped the MFC version to 11.

Keep compatibility with older versions of Visual Studio, appropriately
conditionalized.

(cherry picked from commit 7bca89626e53f258397818a9b0d838a0a3e00f5b)

ticket: 7664
version_fixed: 1.11.4
status: resolved

12 years agoProperly handle use_master in k5_init_creds_get
Greg Hudson [Thu, 30 May 2013 15:39:54 +0000 (11:39 -0400)] 
Properly handle use_master in k5_init_creds_get

If we make multiple requests in an initial creds exchange, the
krb5_sendto_kdc call in k5_init_creds_get may flip the use_master
value from 0 to 1 if it detects that the response was from a master
KDC.  Don't turn this into a requirement for future requests during
the same exchange, or we may have trouble following AS referrals.
Reported by Sumit Bose.

(cherry picked from commit a12a5ddb9b932061bad7b83df058c7c6e2e4b044)

ticket: 7650
version_fixed: 1.11.4
status: resolved

12 years agoUpdate for krb5-1.11.3-postrelease
Tom Yu [Mon, 3 Jun 2013 21:49:05 +0000 (17:49 -0400)] 
Update for krb5-1.11.3-postrelease

12 years agoUpdates for krb5-1.11.3 krb5-1.11.3-final
Tom Yu [Fri, 31 May 2013 21:50:55 +0000 (17:50 -0400)] 
Updates for krb5-1.11.3

12 years agoClean up dangling antecedent in allow_weak_crypto
Ben Kaduk [Fri, 31 May 2013 16:48:46 +0000 (12:48 -0400)] 
Clean up dangling antecedent in allow_weak_crypto

The "previous three lists" are not previous any more.
Say explicitly which three lists, and make the parenthetical bind
to the correct noun.

(cherry picked from commit 2a10e19e19c65af0e3890bdeae03c37089ef02ea)

ticket: 7655
version_fixed: 1.11.3
status: resolved

12 years agoClarify retiring-des based on user feedback
Ben Kaduk [Fri, 31 May 2013 16:40:10 +0000 (12:40 -0400)] 
Clarify retiring-des based on user feedback

Explain why DES keys should be removed from principals, and clarify
that allow_weak_crypto overrides all other configuration.

(cherry picked from commit fa6de1bf73926751a2f68bff31ef020eb7db9260)

ticket: 7654
version_fixed: 1.11.3
status: resolved

12 years agoDocument preauth flags for service principals
Ben Kaduk [Thu, 30 May 2013 22:49:36 +0000 (18:49 -0400)] 
Document preauth flags for service principals

These flags are overloaded to mean different things for clients and
servers; previously we only documented the client behavior.

(cherry picked from commit 7425e9b69566c241c54eb2686fb37f216122423f)

ticket: 7653
version_fixed: 1.11.3
status: resolved

12 years agoClarify krb5_rd_req documentation
Greg Hudson [Wed, 22 May 2013 05:55:12 +0000 (01:55 -0400)] 
Clarify krb5_rd_req documentation

For the user-to-user case, document that callers should pass a server
principal to krb5_rd_req.  For the keytab case, more accurately
document which keytab keys are tried against the ticket.

(cherry picked from commit 98aa233e18245981b491affe5fa70623cb83b705)

ticket: 7641
version_fixed: 1.11.3
status: resolved

12 years agoFix transited handling for GSSAPI acceptors
Greg Hudson [Mon, 20 May 2013 15:03:04 +0000 (11:03 -0400)] 
Fix transited handling for GSSAPI acceptors

The Acceptor Names project (#6855) extended krb5_rd_req so that it can
accept a "matching principal" in the server parameter.  If the
matching principal has an empty realm, rd_req_decoded_opt attempted to
do transited checking with an empty server realm.

To fix this, always reset server to req->ticket->server for future
processing steps if we decrypt the ticket using a keytab.
decrypt_ticket replaces req->ticket->server with the principal name
from the keytab entry, so we know this name is correct.

Based on a bug report and patch from nalin@redhat.com.

(cherry picked from commit 57acee11b5c6682a7f4f036e35d8b2fc9292875e)

ticket: 7639
version_fixed: 1.11.3
status: resolved

12 years agoClarify that kdc.conf and krb5.conf are merged
Ben Kaduk [Mon, 20 May 2013 17:04:32 +0000 (13:04 -0400)] 
Clarify that kdc.conf and krb5.conf are merged

These two files are merged into the profile for KDC applications

(cherry picked from commit e818d27a372d021bc6025e7bce867ed06a8fc1ad)

ticket: 7460
version_fixed: 1.11.3
status: resolved

12 years agoClean up python bytecode from doc build
Ben Kaduk [Tue, 2 Apr 2013 16:03:40 +0000 (12:03 -0400)] 
Clean up python bytecode from doc build

Otherwise they escape into the release tarball.

(cherry picked from commit 424bed7b2943e0bc32a3feab4c55a4ea056bfa21)

ticket: 7644
version_fixed: 1.11.3
status: resolved

12 years agoRename internal Camellia symbols
Greg Hudson [Tue, 14 May 2013 02:59:35 +0000 (22:59 -0400)] 
Rename internal Camellia symbols

Symbols from the NTT Camellia sources, used in the builtin crypto
provider, could conflict with symbols from other libraries such as
OpenSSL's libcrypto.  Rename those like we rename the Gladman AES
symbols.

(cherry picked from commit 19c9cc879c6fdc9420d3d9e9fb3affbb692668b9)

ticket: 7626
version_fixed: 1.11.3
status: resolved

12 years agoFix kpasswd UDP ping-pong [CVE-2002-2443]
Tom Yu [Fri, 3 May 2013 20:26:46 +0000 (16:26 -0400)] 
Fix kpasswd UDP ping-pong [CVE-2002-2443]

The kpasswd service provided by kadmind was vulnerable to a UDP
"ping-pong" attack [CVE-2002-2443].  Don't respond to packets unless
they pass some basic validation, and don't respond to our own error
packets.

Some authors use CVE-1999-0103 to refer to the kpasswd UDP ping-pong
attack or UDP ping-pong attacks in general, but there is discussion
leading toward narrowing the definition of CVE-1999-0103 to the echo,
chargen, or other similar built-in inetd services.

Thanks to Vincent Danen for alerting us to this issue.

CVSSv2: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:P/RL:O/RC:C

(cherry picked from commit cf1a0c411b2668c57c41e9c4efd15ba17b6b322c)

ticket: 7637
version_fixed: 1.11.3
status: resolved

12 years agoSet msg_type when decoding FAST requests
Greg Hudson [Fri, 12 Apr 2013 20:28:14 +0000 (16:28 -0400)] 
Set msg_type when decoding FAST requests

An RFC 6113 KrbFastReq contains a padata sequence and a KDC-REQ-BODY,
neither of which contain the msg-type field found in a KDC-REQ.  So
when we decode the FAST request, the resulting krb5_kdc_req structure
has a msg_type of 0.  Copy msg_type from the outer body, since we make
use of it in further KDC processing.

(cherry picked from commit 3a447c5a8c95758501cf5a20c161a2d735a02f6d)

ticket: 7605
version_fixed: 1.11.3
status: resolved

12 years agoAllow config of dh_min_bits < 2048
Tom Yu [Wed, 10 Apr 2013 03:47:54 +0000 (23:47 -0400)] 
Allow config of dh_min_bits < 2048

Allow configuration to override the default dh_min_bits of 2048 to
1024.  Disallow configuration of dh_min_bits < 1024, but continue to
default to 2048.

(cherry picked from commit cae44d2d014985022a001924dce4a56d12c63818)

ticket: 7602
version_fixed: 1.11.3
status: resolved

12 years agoIgnore missing Q in dh_params
Tom Yu [Thu, 28 Mar 2013 23:09:04 +0000 (19:09 -0400)] 
Ignore missing Q in dh_params

Some implementations don't send the required Q value in dh_params, so
allow it to be absent.

(cherry picked from commit ed77a25c53ed6afd41372838f205a98a561a89fb)

ticket: 7596
version_fixed: 1.11.3
status: resolved

12 years agoUpdate for krb5-1.11.2-postrelease
Tom Yu [Sat, 13 Apr 2013 01:59:41 +0000 (21:59 -0400)] 
Update for krb5-1.11.2-postrelease

12 years agoUpdates for krb5-1.11.2 release
Tom Yu [Wed, 10 Apr 2013 22:44:29 +0000 (18:44 -0400)] 
Updates for krb5-1.11.2 release

Update README and patchlevel.h for krb5-1.11.2 release.  Regenerate
man pages also.

12 years agoUpdate documentation copyright dates: 1985-2013
Tom Yu [Wed, 10 Apr 2013 21:09:04 +0000 (17:09 -0400)] 
Update documentation copyright dates: 1985-2013

(cherry picked from commit 48e750799dff48239a044c6a732f41ded25cc624)

12 years agoInstall krb5-config man page
Ben Kaduk [Wed, 3 Apr 2013 22:46:25 +0000 (18:46 -0400)] 
Install krb5-config man page

Don't just build it.

(cherry picked from commit 2defbe8939c1c11a9f76334443c63603a8b749bf)

ticket: 7601
version_fixed: 1.11.2
status: resolved

12 years agoRegenerate man pages
Tom Yu [Tue, 9 Apr 2013 20:38:12 +0000 (16:38 -0400)] 
Regenerate man pages

12 years agoAdd a krb5-config man page
Ben Kaduk [Wed, 3 Apr 2013 04:06:45 +0000 (00:06 -0400)] 
Add a krb5-config man page

Missed when converting the old nroff man pages.

(cherry picked from commit 5a6d14918a3b5d003f248b66e88028f1b5e450b7)

ticket: 7601

12 years agoReset ulog if database load failed
rbasch [Mon, 4 Mar 2013 03:55:41 +0000 (22:55 -0500)] 
Reset ulog if database load failed

If an iprop slave tries to load a dump from the master and it fails,
reset the ulog header so we take another full dump, instead of
reporting that the slave is current when it isn't.

[ghudson@mit.edu: commit message]

ticket: 7530
version_fixed: 1.11.2
status: resolved

12 years agoExport verto_set_flags from libverto
Greg Hudson [Mon, 25 Mar 2013 16:42:49 +0000 (12:42 -0400)] 
Export verto_set_flags from libverto

When the bundled libverto was updated from 0.2.2 to 0.2.5,
verto_set_flags should have been added to libverto.exports along with
the other new functions.

(cherry picked from commit fb92e73d12081d36b0497e55489293d296eb416d)

ticket: 7594
version_fixed: 1.11.2
status: resolved

12 years agoFix import_sec_context with interposers
Simo Sorce [Sat, 16 Mar 2013 19:23:03 +0000 (15:23 -0400)] 
Fix import_sec_context with interposers

The code was correctly selecting the mechanism to execute, but it was
improperly setting the mechanism type of the internal context when the
selected mechanism was that of an interposer and vice versa.

When an interposer is involved the internal context is that of the
interposer, so the mechanism type of the context needs to be the
interposer oid.  Conversely, when an interposer re-enters gssapi and
presents a token with a special oid, the mechanism called is the real
mechanism, and the context returned is a real mechanism context.  In
this case the mechanism type of the context needs to be that of the
real mechanism.

(cherry picked from commit 36c76aa3c625afc9291b9e1df071db51ccf37dab)

ticket: 7592
version_fixed: 1.11.2
status: resolved

12 years agoFix condition with empty body
David Benjamin [Wed, 13 Mar 2013 05:08:01 +0000 (01:08 -0400)] 
Fix condition with empty body

Found by clang's warnings.

(cherry picked from commit 18796a2eb6c05706c6635453b3e425955aab93f4)

ticket: 7591
version_fixed: 1.11.2
status: resolved

12 years agoFix dependencies in tests/gssapi
Nickolai Zeldovich [Sun, 3 Mar 2013 06:38:22 +0000 (01:38 -0500)] 
Fix dependencies in tests/gssapi

Use $(COMMON_DEPS) instead of $(COMMON_DEPLIBS) for dependencies; the
latter appears to be a typo.  Fixes build when using "make -j".

(cherry picked from commit 055d1ffa81d0730e92aa3f1ed5045cd805c74957)

ticket: 7587
version_fixed: 1.11.2
status: resolved

12 years agoFix a memory leak in krb5_get_init_creds_keytab
Greg Hudson [Thu, 28 Feb 2013 23:55:31 +0000 (18:55 -0500)] 
Fix a memory leak in krb5_get_init_creds_keytab

lookup_etypes_for_keytab was not freeing the keytab entries it
iterated over.  Reported by nalin@redhat.com.

(cherry picked from commit a39af2971e03d3dc6da2cfd8959feebd40a0ffc0)

ticket: 7586
version_fixed: 1.11.2
status: resolved

12 years agoUpdate patchlevel.h for krb5-1.11.1-postrelease
Tom Yu [Fri, 22 Feb 2013 04:34:13 +0000 (23:34 -0500)] 
Update patchlevel.h for krb5-1.11.1-postrelease

12 years agoUpdate README and patchlevel.h for krb5-1.11.1 krb5-1.11.1-final
Tom Yu [Thu, 21 Feb 2013 21:30:47 +0000 (16:30 -0500)] 
Update README and patchlevel.h for krb5-1.11.1

12 years agoUpdate acknowledgments in README
Tom Yu [Thu, 21 Feb 2013 19:38:58 +0000 (14:38 -0500)] 
Update acknowledgments in README

Also update copyright years.

12 years agoFix fd leak in DIR ccache cursor function
Greg Hudson [Thu, 21 Feb 2013 17:36:07 +0000 (12:36 -0500)] 
Fix fd leak in DIR ccache cursor function

If dcc_ptcursor_next reached the end of a directory, it called free()
on the directory handle instead of closedir(), causing the directory
fd to be leaked.  Call closedir() instead.

(cherry picked from commit c29d5f61af301aa8993b01ed0e3eb4f529d6862c)

ticket: 7573
version_fixed: 1.11.1
status: resolved

12 years agoFix memory leak closing DIR ccaches
Greg Hudson [Wed, 20 Feb 2013 17:06:12 +0000 (12:06 -0500)] 
Fix memory leak closing DIR ccaches

A ccache type's close function is supposed to free the cache container
as well as the type-specific data.  dcc_close was not doing so,
causing a small memory leak each time a ccache is created or
destroyed.

(cherry picked from commit c264c4e824e1abe77806e7bf43ab2641459b7ee9)

ticket: 7574
version_fixed: 1.11.1
status: resolved

12 years agoConvert success in krb5_chpw_result_code_string
Jonathan Reams [Fri, 15 Feb 2013 07:11:57 +0000 (02:11 -0500)] 
Convert success in krb5_chpw_result_code_string

Result code 0 used to be converted properly by krb5_set_password,
though not krb5_change_password; this changed in 1.10 when
krb5int_setpw_result_code_string was folded into
krb5_chpw_result_code_string.  Restore the old behavior, and make it
apply to krb5_change_password as well, by making
krb5_chpw_result_code_string convert result code 0.

[ghudson@mit.edu: commit message]

(cherry picked from commit 316bf74b4696058e2b60c95c9d0fc90d6c2c2ffe)

ticket: 7569
version_fixed: 1.11.1
status: resolved

12 years agoAllow multi-hop SAM-2 exchanges
Greg Hudson [Sun, 17 Feb 2013 17:23:30 +0000 (12:23 -0500)] 
Allow multi-hop SAM-2 exchanges

Prior to 1.11, it was possible to do SAM-2 preauth exchanges with
multiple hops by sending repeated preauth-required errors with
different challenges (which is not the way multi-hop exchanges are
described in RFC 6113, but it can still work).  This stopped working
when SAM-2 was converted to a built-in module because of the use_count
field.  Disable the use count for SAM-2 specifically.

ticket: 7571
version_fixed: 1.11.1
status: resolved

12 years agoPKINIT null pointer deref [CVE-2013-1415]
Xi Wang [Thu, 14 Feb 2013 23:17:40 +0000 (18:17 -0500)] 
PKINIT null pointer deref [CVE-2013-1415]

Don't dereference a null pointer when cleaning up.

The KDC plugin for PKINIT can dereference a null pointer when a
malformed packet causes processing to terminate early, leading to
a crash of the KDC process.  An attacker would need to have a valid
PKINIT certificate or have observed a successful PKINIT authentication,
or an unauthenticated attacker could execute the attack if anonymous
PKINIT is enabled.

CVSSv2 vector: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:P/RL:O/RC:C

This is a minimal commit for pullup; style fixes in a followup.
[kaduk@mit.edu: reformat and edit commit message]

(cherry picked from commit c773d3c775e9b2d88bcdff5f8a8ba88d7ec4e8ed)

ticket: 7570
version_fixed: 1.11.1
status: resolved

12 years agoFix RFC 5587 const pointer typedefs
Greg Hudson [Tue, 12 Feb 2013 02:13:15 +0000 (21:13 -0500)] 
Fix RFC 5587 const pointer typedefs

gss_const_ctx_id_t, gss_const_cred_id_t, and gss_const_name_t are
supposed to be const pointers to the appropriate structures, not the
structures themselves.  These are not used by any prototypes yet, and
no application would have any reason to use them as they are, so it
should be safe to change them within the public header.

(cherry picked from commit 884e040c0478c94585395a03dfbb0bbdee7c5ed4)

ticket: 7567
version_fixed: 1.11.1
status: resolved

12 years agoMake kprop/kpropd work with RC4 session key
Greg Hudson [Sun, 3 Feb 2013 18:21:34 +0000 (13:21 -0500)] 
Make kprop/kpropd work with RC4 session key

In krb5_auth_con_initivector and mk_priv/rd_priv, stop assuming that
the enctype's block size is the size of the cipher state.  Instead,
make and discard a cipher state to get the size.

(cherry picked from commit 8d01455ec9ed88bd3ccae939961a6e123bb3d45f)

ticket: 7561
version_fixed: 1.11.1
status: resolved

12 years agoFix kdb5_util dump.c uninitialized warnings
Greg Hudson [Fri, 1 Feb 2013 16:52:48 +0000 (11:52 -0500)] 
Fix kdb5_util dump.c uninitialized warnings

Some versions of clang report an uninitialized variable warning (which
we treat as an error) in process_k5beta_record.  Due to the if-ladder
style of the function, uninitialized tmpint values can be copied
around in certain error cases, although the garbage values would be
ultimately ignored.  As a minimal fix, initialize the tmpint
variables.

(cherry picked from commit 1b7f7eef8a95bda0135159b2c06a168b56d9f42b)

ticket: 7560
version_fixed: 1.11.1
status: resolved

12 years agoFix "search" accesskey in layout.html
Tom Yu [Fri, 18 Jan 2013 03:42:23 +0000 (22:42 -0500)] 
Fix "search" accesskey in layout.html

The accesskey for the "search" link conflicted with the one for the
"contents" link.

(cherry picked from commit ba8a8a6b25027079ffd3e565a6e6ed450217a024)

ticket: 7559
version_fixed: 1.11.1
status: resolved

12 years agoFix typos in layout.html
Tom Yu [Fri, 18 Jan 2013 03:39:57 +0000 (22:39 -0500)] 
Fix typos in layout.html

There were multiple misplaced semicolons, etc.

(cherry picked from commit 95fc179c21cab802469907b2759f0e8bd1cafef1)

ticket: 7558
version_fixed: 1.11.1
status: resolved

12 years agoFix h1 end tag in Sphinx header titles
Tom Yu [Thu, 17 Jan 2013 22:56:53 +0000 (17:56 -0500)] 
Fix h1 end tag in Sphinx header titles

A </h1> end tag was incorrectly written as <h1>.  Also adjust style
settings so that the resulting computed style remains the same for
div.rel.

(cherry picked from commit 21e14aed841e109b31a9f27c0e78751e450364f2)

ticket: 7557
version_fixed: 1.11.1
status: resolved

12 years agoCheck for negative poll timeout in k5_sendto_kdc
Greg Hudson [Fri, 25 Jan 2013 18:11:27 +0000 (13:11 -0500)] 
Check for negative poll timeout in k5_sendto_kdc

(cherry picked from commit 74bee54227deb64a41c2e79f57dd2a2c5ea010a3)

ticket: 7553
version_fixed: 1.11.1
status: resolved

12 years agoFix iprop safety net in kdb5_util load
Greg Hudson [Thu, 17 Jan 2013 17:49:57 +0000 (12:49 -0500)] 
Fix iprop safety net in kdb5_util load

The error message was missing a newline, and the exit behavior causes
the database to be destroyed.

(cherry picked from commit b264161818eba43263b4d7f137dbae6b266907f0)

ticket: 7370
version_fixed: 1.11.1
status: resolved

12 years agoFix no_host_referral concatention in KDC
Greg Hudson [Fri, 11 Jan 2013 15:13:25 +0000 (10:13 -0500)] 
Fix no_host_referral concatention in KDC

If no_host_referral is set in both [kdcdefaults] and the realm
subsection, we're supposed to concatenate their values.  But the logic
in handle_referral_params would overwrite the value with the
non-concatenated realm value.  Similar bugs of this nature were fixed
in 639c9d0f5a7c68dc98a2a452abc05ca32443cddf (r22037) but this one was
missed.

(cherry picked from commit 6338d039cbd0b138642e3b123ac58dc802d1d907)

ticket: 7539
version_fixed: 1.11.1
status: resolved

12 years agoFix various result checks
Nickolai Zeldovich [Mon, 7 Jan 2013 06:37:19 +0000 (01:37 -0500)] 
Fix various result checks

Correct three cases where the wrong expression was checked to see if
an allocation function returned null.

[ghudson@mit.edu: commit message, patch splitting]

(cherry picked from commit a9ee4a040eeacab1d410ff9e4c862484b531c401)

ticket: 7534
version_fixed: 1.11.1
status: resolved

12 years agoFix initial call to svcraw_create
Nickolai Zeldovich [Mon, 7 Jan 2013 06:33:15 +0000 (01:33 -0500)] 
Fix initial call to svcraw_create

gssrpc raw services could not work because svcraw_create did not set
svcraw_private after allocating memory for it.

[ghudson@mit.edu: commit message, patch splitting]

(cherry picked from commit 5e3bf4ac6cb02601c5f10c5b2804fd5028c80119)

ticket: 7534

12 years agoFix gss_str_to_oid for OIDs with zero-valued arcs
Luke Howard [Sun, 30 Dec 2012 15:36:25 +0000 (10:36 -0500)] 
Fix gss_str_to_oid for OIDs with zero-valued arcs

gss_str_to_oid wasn't outputting any bytes for a zero-valued arc.  It
should output one byte with value 0.

[ghudson@mit.edu: commit message]

(cherry picked from commit 54fa4433df7412267375240aba40959e97ac4fe2)

ticket: 7523
version_fixed: 1.11.1
status: resolved

12 years agoFix DPRINT in ipropd_svc.c
Guillaume Rousse [Tue, 1 Jan 2013 06:40:34 +0000 (01:40 -0500)] 
Fix DPRINT in ipropd_svc.c

cea0b28045b262b1098f17f17f78b2efbf89a6c1 contained an incorrect
definition of DPRINT.  Fix it.

[ghudson@mit.edu: commit message]

(cherry picked from commit 02de9812378cf62293b4acbdaa5f1e13d9c38c6d)

ticket: 7525
version_fixed: 1.11.1
status: resolved