]> git.ipfire.org Git - thirdparty/krb5.git/log
thirdparty/krb5.git
18 years agoPatch from Ken Renard to avoid double-free coffman/pkinit
Kevin Coffman [Thu, 5 Jul 2007 16:20:38 +0000 (16:20 +0000)] 
Patch from Ken Renard to avoid double-free

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19676 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoFix pa-type 15 request against Heimdal server which
Kevin Coffman [Wed, 20 Jun 2007 22:01:15 +0000 (22:01 +0000)] 
Fix pa-type 15 request against Heimdal server which
returns a different OID.

Fix a typo in the doc pointed out by Olga Kornievskaia

Add a comment about why SILLYDECRYPT is there.

Fix some formatting to prevent line-wrapping.

Encapsulate all the work-arounds for working against a
Longhorn server within #ifdef LONGHORN_BETA_COMPAT so they
are easily recognized and can be removed when the issues
are fixed in released versions of Longhorn.

Fix a memory leak in the server.  (Change the client code
to copy OID values rather than returning pointers to static
memory so that no special cases are required when freeing
structures which reference them.)

Remove an fprintf() from the pkinit_matching code.

Change functino definitions in pkinit_lib.c to match the
coding style.

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19610 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoFrom Rees, Laboratory, not Laborartory
Kevin Coffman [Mon, 18 Jun 2007 17:32:00 +0000 (17:32 +0000)] 
From Rees, Laboratory, not Laborartory

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19581 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoFix admin.texinfo so that admin-guide.info builds.
Kevin Coffman [Fri, 15 Jun 2007 22:30:11 +0000 (22:30 +0000)] 
Fix admin.texinfo so that admin-guide.info builds.
Fix copyright statement.

Add encode routine for an authorization data element so pkinit
authz data can be encoded and wrapped in if-relevant.

Add accessor for new encode function.

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19579 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoFix error returns from ca/crl processing functions
Kevin Coffman [Fri, 15 Jun 2007 00:09:28 +0000 (00:09 +0000)] 
Fix error returns from ca/crl processing functions

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19578 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoUpdate documentation:
Kevin Coffman [Thu, 14 Jun 2007 23:20:13 +0000 (23:20 +0000)] 
Update documentation:
  kinit man-page
  admin-guide: krb5.conf options
  admin-guide: kdc.conf options
---
Add more functions to accessor structure.
---
Patch from Ken Raeburn, minus the README changes.
README needs major updating or should be removed.
Hopefully, it is now all captured in the doc changes.

Log:
  r807@dh169:  raeburn | 2007-05-30 19:23:15 -0400
    dev
  r810@dh169:  raeburn | 2007-05-31 15:44:25 -0400
    Add crypto lib check at top level, to make maintainer mode happier.
    No comma at end of enum lists.
    Remove extraneous ';'.
    Fix uninitialized variable.
    No variadic macros.
---
returning authorization data only for pa-type 16
---
return signed attributes only for pa-type 16
---
Don't segfault if we fail to decode the PKCS7 message in
cms_signeddata_verify().
---
append PIN warnings to PIN prompt
---
translate pkcs11 error codes to text
---
Change get_cert() and get_key() to return an error code so we can
give a better reason why they failed.
---
Fix more compiler warnings.
---
In crypto_cert_select_default(), enforce that there is exactly one
cert to choose from.
---
add (currently-hardcoded des3) supportedCMSTypes to pa-type 16 request
---
accept various oids in the envelopeddata for pa-type 15 request
---
fix ad_type for authorization data
---

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19577 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoRemove some old code from src/lib/krb5/asn.1/asn1_k_decode.c and
Kevin Coffman [Tue, 29 May 2007 22:20:17 +0000 (22:20 +0000)] 
Remove some old code from src/lib/krb5/asn.1/asn1_k_decode.c and
src/lib/krb5/krb/preauth2.c

Add new file pkinit_matching.c which implements the ability
for an admin to configure things such that the "right" certificate
from several available ones will be used for pkinit.

Fix a couple of things the Solaris compiler doesn't like.

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19562 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago- Create a new file, pkinit_identity.c, which has all the identity
Kevin Coffman [Thu, 24 May 2007 02:06:43 +0000 (02:06 +0000)] 
- Create a new file, pkinit_identity.c, which has all the identity
  parsing and processing code outside the crypto-spcecific code
  into common code.  Some of this came out of pkinit_lib.c and
  some came out of pkinit_crypto_openssl.c.

- Move some corresponding #defines from pkinit_crypto_openssl.h
  into pkinit.h.

- Moved some of the identity values out of the id_cryptoctx and
  into the idopts.  (Some are later duplicated into the id_cryptoctx.)

- Create "new" crypto functions, crypto_load_certs() and
  crypto_load_cas_and_crls().  These are slight modifications of
  the pre-existing functions.

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19561 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoFix enctype checking. (Look at more than the first one.)
Kevin Coffman [Wed, 23 May 2007 23:09:08 +0000 (23:09 +0000)] 
Fix enctype checking.  (Look at more than the first one.)

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19560 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoProcess the allow_upn config option and add more debugging
Kevin Coffman [Wed, 23 May 2007 22:24:24 +0000 (22:24 +0000)] 
Process the allow_upn config option and add more debugging

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19559 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoRe-enable build WITHOUT_PKCS11
Kevin Coffman [Fri, 18 May 2007 15:38:07 +0000 (15:38 +0000)] 
Re-enable build WITHOUT_PKCS11

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19552 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago- Add new config file option pkinit_longhorn which indicates
Kevin Coffman [Thu, 17 May 2007 18:15:14 +0000 (18:15 +0000)] 
- Add new config file option pkinit_longhorn which indicates
  we are talking to a Longhorn KDC and allows the necessary
  hacks to work with a Longhorn (beta 3) server
- Add pkcs12 support (required for gssmonger testing)
- Modify SAN and EKU processing so that it does not use
  pa_type and so that it allows checking with certificates
  containing more than one SAN
- add new configuration file option, "pkinit_eku_checking"
  for the kdc, this can be specified as [kpClientAuth | scLogin | none]
  for the client, this can be specified as [kpKDC | kpServerAuth | none]
- Restructure code to make DN and SAN matching possible.
  Still need the actual matching code.
- Fix from Ken Renard re: using ENV: for identity processing
- Create new header, pkinit_crypto.h separating out the crypto
  interface definition.

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19549 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago[lib/krb5/asn.1/asn1_k_decode.c]
Kevin Coffman [Fri, 20 Apr 2007 20:22:01 +0000 (20:22 +0000)] 
[lib/krb5/asn.1/asn1_k_decode.c]
- define two macros to deal with implicitly tagged
  octet strings
- modified begin_choice() macro and removed
  begin_explicit_choice()
- use the get_implicit_octet_string() and
  opt_implicit_octet_string() macros to clean up
  a lot of hand-coded stuff.
- remove (almost) all the "#if 0" stuff (see below)

- asn1_decode_trusted_ca() still needs testing and cleanup
  of "#if 0" code!

[lib/krb5/asn.1/asn1_k_decode.h]
  - add prototype for asn1_decode_sequence_of_algorithm_identifier

[lib/krb5/asn.1/asn1_k_encode.cs]
  - Fix up some comments for our added macros

[pkinit directory changes]
- Move parsing of filesystem identity location into a separate function,
  parse_fs_options(), like parse_pkcs11_options().
- Add the ability to specify ENV: as suggested by Doug Engert.
- Add the ability to specify alternatives to use for finding identity.
  (This adds a pkinit_identity_alt config file option that specifies
  alternative locations to try and find user identity information.
  This config file option may be specified multiple times, and the
  alternatives are tried in the order given in the config file.)

  For example:

  [libdefaults]
    pkinit_identity_alt = ENV:X509_USER_IDENTITY
    pkinit_identity_alt = ENV:X509_USER_PROXY
    pkinit_identity_alt = PKCS11:opensc-pkcs11.so

  If the user does not specify -X X509_user_identity on the command
  line, then the code will check if the environment variable
  X509_USER_IDENTITY is defined. If it is not defined, or does not
  specify a valid identity, then envvar X509_USER_PROXY will be tried.
  If that fails, then it will attempt PKCS11 with module opensc-pkcs11.so.
  If all the alternatives fail, then pkinit preauth is not available
  and password authentication is attempted.

- Many changes to clean up almost all compiler warnings

- Add config option, pkinit_win2k_hostname, to specify win2k
  hostname(s) to be checked in the certificate.

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19512 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoPullup r19183:r19510 from trunk
Kevin Coffman [Fri, 20 Apr 2007 19:41:32 +0000 (19:41 +0000)] 
Pullup r19183:r19510 from trunk

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19511 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoFix cksum_body preauth plugin init function definition
Kevin Coffman [Tue, 6 Mar 2007 15:43:16 +0000 (15:43 +0000)] 
Fix cksum_body preauth plugin init function definition

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19210 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoAllow pkinit to support multiple realms within a single KDC.
Kevin Coffman [Tue, 6 Mar 2007 15:31:40 +0000 (15:31 +0000)] 
Allow pkinit to support multiple realms within a single KDC.
Allow per-realm pkinit configuration.

- include/krb5/preauth_plugin.h
  Add NULL-terminated realm name list to preauth_server_init_proc interface.

- kdc/kdc_preauth.c
  Construct realm name list and pass it to preauth_server_init_proc
  (and free it).

- plugins/preauth/pkinit/pkinit.h
  Add realmname and name length to kdc (per-realm) plugin context.
  Change interface to config/profile routines to pass the realm name.

- plugins/preauth/pkinit/pkinit_crypto_openssl.c
  Restructure the init/fini functions a bit.
  Make sure OBJ_cleanup() is only called once by using a refcount.

- plugins/preauth/pkinit/pkinit_profile.c
  Change routines to pass in realm name rather than depending on
  default_realm being set in the context.

- plugins/preauth/pkinit/pkinit_srv.c
  Create a plugin context for each realm that should be supported.
  Add function to find the correct realm context.  Call it at the
  beginning of each major preauth function (get_edata,
  verify_padata, return_padata).

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19209 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoPull up r19052:r19183 from trunk
Kevin Coffman [Tue, 27 Feb 2007 16:41:02 +0000 (16:41 +0000)] 
Pull up r19052:r19183 from trunk

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19184 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoVarious fixes:
Kevin Coffman [Thu, 15 Feb 2007 14:44:22 +0000 (14:44 +0000)] 
Various fixes:
---
Ignore the mechanism list, always use CKM_RSA_PKCS and calculate the sha1
digest ourselves.

Works for Cryptoflex, Activcard, and (I think) CAC.
---
don't specify a usage when looking for a private key, it confuses
some cards (coolkey)
---
send invalid certificate instead of trusted certifiers for
the TD-INVALID-CERTIFICATE typed data
---
include the right oid for the draft9 reply
---
Remove all traces of krb5_get_init_creds_opt_set_pkinit()
---

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19164 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago-- thanks to Ken Renard, fixed checksum problem in the KDC.
Kevin Coffman [Thu, 11 Jan 2007 22:07:56 +0000 (22:07 +0000)] 
-- thanks to Ken Renard, fixed checksum problem in the KDC.
   The KDC may alter the original request after decoding it.
   We need to do the checksum on the original request contents
   from the client.  Use the original packet data to calculate
   the checksum.
-- client now sends the certificate chain in the request
-- added a debug message for when we fail to create a certificate
   chain on the client and fail the request

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19058 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago- Add missing function prototypes in the appropriate places.
Kevin Coffman [Thu, 11 Jan 2007 16:47:30 +0000 (16:47 +0000)] 
- Add missing function prototypes in the appropriate places.
- Remove saved code which had been previously #ifdef'd out.

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19057 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoDoh! Forget to add these two files!
Kevin Coffman [Wed, 10 Jan 2007 18:35:29 +0000 (18:35 +0000)] 
Doh! Forget to add these two files!

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19054 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoPullup r18915:r19052 from trunk
Kevin Coffman [Wed, 10 Jan 2007 15:26:01 +0000 (15:26 +0000)] 
Pullup r18915:r19052 from trunk

Update pkinit code to include changes for separation of the
crypto interface.

pkinit also updated to use configuration files and command-line
options rather than environment variables.

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@19053 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoDon't try to do any checks on the PKCS11 info,
Kevin Coffman [Tue, 12 Dec 2006 20:51:23 +0000 (20:51 +0000)] 
Don't try to do any checks on the PKCS11 info,
just set the environment variable!

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@18938 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoPull in changes for the extended get_init_creds_opt structure
Kevin Coffman [Tue, 12 Dec 2006 03:08:07 +0000 (03:08 +0000)] 
Pull in changes for the extended get_init_creds_opt structure

Pull in changes to add get_init_creds_opt_set_pa(),
    get_init_creds_opt_get_pa(), and get_init_creds_opt_free_pa()

Change client interface to pass in the get_init_creds_opt structure
    to the process and tryagain functions.

Pull in changes to kinit to pass preauth options entered with "-X"

Create typedefs for all the preauth plugin client and server
    interface functions and use them.  Eliminates mismatches
    and enables better type checking of the interface paremeters.

Add *temporary* code to client side of pkinit to handle preauth options
    and set the appropriate environment variables.
    (Currently only X509_user_identity, X509_anchors, and
    flag_RSA_PROTOCOL are handled.)

Add code to use krb5int_accessor to obtain pointers to internal functions
    for ASN.1 encode/decode routines rather than exporting them from
    libkrb5.

Various updates and improvements in the pkinit smartcard code.

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@18937 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoFrom Olga and Jim, split out pkcs7_decrypt to be able to use smartcard
Kevin Coffman [Mon, 4 Dec 2006 22:33:14 +0000 (22:33 +0000)] 
From Olga and Jim, split out pkcs7_decrypt to be able to use smartcard

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@18920 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoUpdate to CITI code as of 20061203
Kevin Coffman [Sun, 3 Dec 2006 18:06:39 +0000 (18:06 +0000)] 
Update to CITI code as of 20061203

Implements e-data and client_tryagain.

Implements reading of config/profile parameters.

Some smartcard improvements.

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@18917 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoPullup r18873:18915 from trunk
Kevin Coffman [Sun, 3 Dec 2006 14:16:42 +0000 (14:16 +0000)] 
Pullup r18873:18915 from trunk

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@18916 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoPullup changes r18861:r18873 from the trunk
Kevin Coffman [Wed, 29 Nov 2006 00:42:42 +0000 (00:42 +0000)] 
Pullup changes r18861:r18873 from the trunk

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@18874 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoFix segfault trying to create e-data
Kevin Coffman [Tue, 28 Nov 2006 17:36:51 +0000 (17:36 +0000)] 
Fix segfault trying to create e-data

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@18866 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoInitial commit of the pkinit code
Kevin Coffman [Wed, 22 Nov 2006 16:58:01 +0000 (16:58 +0000)] 
Initial commit of the pkinit code

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@18861 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoAdding initial pkinit branch
Kevin Coffman [Wed, 22 Nov 2006 01:09:38 +0000 (01:09 +0000)] 
Adding initial pkinit branch

git-svn-id: svn://anonsvn.mit.edu/krb5/users/coffman/pkinit@18860 dc483132-0cff-0310-8789-dd5450dbe970

18 years agofix debug messages
Kevin Coffman [Wed, 22 Nov 2006 00:53:34 +0000 (00:53 +0000)] 
fix debug messages

Change debugging messages so they print salt value correctly
and clean up warnings when compiling with DEBUG.

ticket: new
Tags: pullup
Target_Version: 1.6

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18859 dc483132-0cff-0310-8789-dd5450dbe970

18 years agofree error message when freeing context
Kevin Coffman [Tue, 21 Nov 2006 14:37:11 +0000 (14:37 +0000)] 
free error message when freeing context

Call krb5_clear_error_message() to free any allocated error message
before freeing the context.

The condition that triggered this was a plugin library which fails to
load because of unresolved references.  It appears dlopen() on Linux
leaks four bytes for each failing library in this situation.

ticket: new
Target_Version: 1.6
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18858 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago * src/lib/krb5/ccache/ccbase.c (krb5int_cc_getops): Internal
Tom Yu [Sat, 18 Nov 2006 01:53:27 +0000 (01:53 +0000)] 
* src/lib/krb5/ccache/ccbase.c (krb5int_cc_getops): Internal
function to fetch ops vector given ccache prefix string.
(krb5_cc_new_unique): New function to generate a new unique
ccache of a given type.

* src/include/krb5/krb5.hin: Prototype for krb5_cc_new_unique().

* src/lib/krb5/libkrb5.exports:
* src/lib/krb5_32.def: Add krb5_cc_new_unique().

ticket: 3091
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18857 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago krb5_get_init_creds_password:
Jeffrey Altman [Fri, 17 Nov 2006 23:41:40 +0000 (23:41 +0000)] 
krb5_get_init_creds_password:

remove unintentionally committed code not meant for 1.4 branch

ticket: 4802

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18842 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoone more commit for kfw 3.1 beta 4
Jeffrey Altman [Fri, 17 Nov 2006 23:24:59 +0000 (23:24 +0000)] 
one more commit for kfw 3.1 beta 4

  - when the krb5 prompter callback function is called,
    set the focus to the first input field provided by
    the caller.

ticket: new
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18841 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoreset use_master flag when master_kdc cannot be found
Jeffrey Altman [Fri, 17 Nov 2006 23:14:27 +0000 (23:14 +0000)] 
reset use_master flag when master_kdc cannot be found

   krb5_get_init_creds_password:

if the master_kdc cannot be identified reset the use_master
    flag.  otherwise, the krb5_get_init_creds("kadmin/changepw")
call will attempt to communicate with the master_kdc that
cannot be reached.

ticket: new
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18840 dc483132-0cff-0310-8789-dd5450dbe970

18 years agouse krb5_c_valid_enctype, not valid_enctype
Ken Raeburn [Fri, 17 Nov 2006 20:21:59 +0000 (20:21 +0000)] 
use krb5_c_valid_enctype, not valid_enctype

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18839 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoDidn't include header changes in the previous commit
Kevin Coffman [Fri, 17 Nov 2006 19:56:35 +0000 (19:56 +0000)] 
Didn't include header changes in the previous commit

ticket: 4799
Target_Version: 1.6
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18837 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoupdate krb5_c_keylength function, create krb5_c_random_to_key function
Kevin Coffman [Fri, 17 Nov 2006 19:48:17 +0000 (19:48 +0000)] 
update krb5_c_keylength function, create krb5_c_random_to_key function

Modify the keylength function to return both keybytes and keylength.
Change the name of the function and source file to reflect this.

Add a function, krb5_c_random_to_key() that takes random input data
of the right length (keybytes) and produce a valid key for a given
enctype.

ticket: new
Target_Version: 1.6
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18836 dc483132-0cff-0310-8789-dd5450dbe970

18 years agocommits for KFW 3.1 Beta 4
Jeffrey Altman [Fri, 17 Nov 2006 17:23:24 +0000 (17:23 +0000)] 
commits for KFW 3.1 Beta 4

     KfW 3.1 beta 4 (NetIDMgr 1.1.6.0)

     nidmgr32.dll (1.1.6.0)

     - Fix a race condition where the initialization process might be
       flagged as complete even if the identity provider hasn't finished
       initialization yet.

     krb5cred.dll (1.1.6.0)

     - When assigning the default credentials cache for each identity,
       favor API and FILE caches over MSLSA if they exist.

     - When renewing an identity which was the result of importing
       credentials from the MSLSA cache, attempt to re-import the
       credentials from MSLSA instead of renewing the imported credentials.

     - Prevent possible crash if a Kerberos 5 context could not be obtained
       during the renewal operation.

     - Prevent memory leak in the credentials destroy handler due to the
       failure to free a Kerberos 5 context.

     - Properly match principals and realms when importing credentials from
       the MSLSA cache.

     - Determine the correct credentials cache to place imported
       credentials in by checking the configuration for preferred cache
       name.

     - Keep track of identities where credentials imports have occurred.

     - When setting the default identity, ignore the KRB5CCNAME environment
       variable.

     - Do not re-compute the credentials cache and timestamps when updating
       an identity.  The cache and timestamp information is computed when
       listing credentials and do not change between listing and identity
       update.

     - When refreshing the default identity, also handle the case where the
       default credentials cache does not contain a principal, but the name
       of the cache can be used to infer the principal name.

     - Invoke a listing of credentials after a successful import.

     - Do not free a Kerberos 5 context prematurely during plug-in
       initialization.

     netidmgr.exe (1.1.6.0)

     - Fix the UI context logic to handle layouts which aren't based around
       identities.

     - Don't try to show a property sheet when there are no property pages
       supplied for the corresponding UI context.

     - Use consistent context menus.

     - Bring a modal dialog box to the foreground when it should be active.

     - Do not accept action triggers when the application is not ready to
       process actions yet.

     - Do not force the new credentials dialog to the top if there's
       already a modal dialog box showing.

     - Change the default per-identity layout to also group by location.

ticket: new
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18828 dc483132-0cff-0310-8789-dd5450dbe970

18 years agokrb5_stdccv3_generate_new returns NULL ccache
Alexandra Ellwood [Thu, 16 Nov 2006 20:48:03 +0000 (20:48 +0000)] 
krb5_stdccv3_generate_new returns NULL ccache

Fixed krb5_stdccv3_generate_new so it no longer returns a NULL ccache.

ticket: new
target_version: 1.6
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18820 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago* rd_req_dec.c: Whitespace changes in function headers.
Ken Raeburn [Thu, 16 Nov 2006 01:20:47 +0000 (01:20 +0000)] 
* rd_req_dec.c: Whitespace changes in function headers.
(krb5_rd_req_decoded_opt): Include more info in error text for AP_WRONG_PRINC
and NOPERM_ETYPE errors.

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18817 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoinclude realm in "can't resolve KDC" error message
Ken Raeburn [Thu, 16 Nov 2006 01:19:01 +0000 (01:19 +0000)] 
include realm in "can't resolve KDC" error message

* locate_kdc.c (krb5int_locate_server): Store an error message for
REALM_CANT_RESOLVE error that lists the realm.

ticket: new
target_version: 1.6
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18816 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoavoid double frees in ccache manipulation around gen_new
Ken Raeburn [Thu, 16 Nov 2006 01:14:14 +0000 (01:14 +0000)] 
avoid double frees in ccache manipulation around gen_new

* krb5/krb/vfy_increds.c (krb5_verify_init_creds): If krb5_cc_gen_new fails,
don't both close and destroy the template ccache.
* gssapi/krb5/accept_sec_context.c (rd_and_store_for_creds): Likewise.

ticket: new
target_version: 1.6
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18815 dc483132-0cff-0310-8789-dd5450dbe970

18 years agofix warning in preauth_plugin.h header
Ken Raeburn [Thu, 16 Nov 2006 00:53:10 +0000 (00:53 +0000)] 
fix warning in preauth_plugin.h header

* preauth_plugin.h (enum krb5plugin_preauth_client_request_type): Omit trailing
comma.

ticket: new

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18814 dc483132-0cff-0310-8789-dd5450dbe970

18 years agofix some warnings in ldap code
Ken Raeburn [Thu, 16 Nov 2006 00:51:21 +0000 (00:51 +0000)] 
fix some warnings in ldap code

* libkdb_ldap/ldap_realm.c (ignore_duplicates, compare): Unused functions deleted.
(krb5_ldap_modify_realm, krb5_ldap_read_realm_params): Conditionalize declarations of
automatic variables that are only used for eDirectory.
* libkdb_ldap/ldap_service_stash.c (tohex): Use one sprintf call instead of two.
(dec_password): Use an unsigned type to fetch values with %x.
* libkdb_ldap/ldap_realm.h (ldap_filter_correct): Declare.
* libkdb_dlap/ldap_misc.c (my_strndup): Only define if HAVE_LDAP_STR2DN.
(populate_krb5_db_entry): Remove unused automatic variable.
* ldap_util/kdb5_ldap_util.c (cmd_table): Fix typo in preprocessing conditional.
* ldap_util/kdb5_ldap_realm.c (get_ticket_policy): Declarations first, then code.
* ldap_util/kdb5_ldap_services.c (kdb5_ldap_stash_service_password): On error, increment
exit_status; don't return a value.
* ldap_util/kdb5_ldap_services.h (kdb5_ldap_stash_service_password): Update decl.

ticket: new
target_version: 1.6
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18813 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoLDAP patch from Novell, 2006-10-13
Ken Raeburn [Wed, 15 Nov 2006 23:56:02 +0000 (23:56 +0000)] 
LDAP patch from Novell, 2006-10-13

Patch from 13 November from Savitha R:
> Fix for delpol deleting ticket policies
> Removed references to old schema
> Moved some unused code under #ifdef HAVE_EDIRECTORY

ticket: new
target_version: 1.6
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18812 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoAdd macros for __attribute__((deprecated)) for krb4 and des APIs
Alexandra Ellwood [Wed, 15 Nov 2006 22:05:48 +0000 (22:05 +0000)] 
Add macros for __attribute__((deprecated)) for krb4 and des APIs

Added KRB5INT_KRB4_DEPRECATED and KRB5INT_DES_DEPRECATED.

ticket: new
target_version: 1.6
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18811 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoupdate copyrights and acknowledgments
Tom Yu [Tue, 14 Nov 2006 23:23:34 +0000 (23:23 +0000)] 
update copyrights and acknowledgments

Update copyrights and acknowledgments for 1.6.

ticket: new
target_version: 1.6
component: krb5-doc
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18805 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoallow server preauth plugin verify_padata function to return e-data
Kevin Coffman [Mon, 13 Nov 2006 22:59:55 +0000 (22:59 +0000)] 
allow server preauth plugin verify_padata function to return e-data

Change server-side preauth plugin interface to allow the plugin's
verify_padata function to return e-data to be returned to the client.
(Patch from Nalin Dahyabhai <nalin@redhat.com>)

Update sample plugins to return e-data to exercise the code.

Fix memory leak in the wpse plugin.

ticket: new
Component: krb5-kdc
Target_Version: 1.6
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18801 dc483132-0cff-0310-8789-dd5450dbe970

18 years agocorrect client preauth plugin request_context
Kevin Coffman [Mon, 13 Nov 2006 22:51:23 +0000 (22:51 +0000)] 
correct client preauth plugin request_context

Correctly share the same request_context between all modules
within a single client preauth plugin.

ticket: new
Component: krb5-libs
Target_Version: 1.6
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18800 dc483132-0cff-0310-8789-dd5450dbe970

18 years agomore Novell ldap patches from Nov 6 and Fix for wrong password policy reference count
Will Fiveash [Mon, 13 Nov 2006 20:25:08 +0000 (20:25 +0000)] 
more Novell ldap patches from Nov 6 and Fix for wrong password policy reference count

This commit is to update the code with the following Novell patches from
Nov 6, 2006:

patch-ldap-kadm5-macro.diff
patch-ldap-fixes.diff
patch-ldap-key-seq-salt.diff
patch-ldap-misc.diff

And this patch from Nov 8:
patch-ldap-pwd-policy.c

ticket: new
Target_Version: krb5-1.6
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18799 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoDelay kadmind random number initialization until after fork
Russ Allbery [Thu, 9 Nov 2006 23:29:26 +0000 (23:29 +0000)] 
Delay kadmind random number initialization until after fork

Target_Version 1.6
Tags: pullup

Delay initialization of the random number generator in kadmind until
after the fork and backgrounding of the process.  Otherwise, a lack of
sufficient entropy during the system boot process will delay system
boot on systems that run each init script in series and that start
kadmind via an init script.

ticket: new
Component: krb5-admin
Version_Reported: 1.4.4

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18793 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoDocument how to change the krbtgt key for a realm
Russ Allbery [Thu, 9 Nov 2006 22:58:02 +0000 (22:58 +0000)] 
Document how to change the krbtgt key for a realm

ticket: new
Componet: krb5-doc
Version_Reported: 1.4.4
Target_Version: 1.6
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18792 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoInstall gssapi.h in includedir that includes gssapi/gssapi.h so that either
Russ Allbery [Thu, 9 Nov 2006 22:56:39 +0000 (22:56 +0000)] 
Install gssapi.h in includedir that includes gssapi/gssapi.h so that either
form of #include will work.  Provides better compatibility with Heimdal.

ticket: 2240
Component: krb5-libs
Version_Reported: 1.3.2
Target_Version: 1.6
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18791 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoAdd "get_data" function to the client preauth plugin interface
Kevin Coffman [Thu, 9 Nov 2006 20:40:29 +0000 (20:40 +0000)] 
Add "get_data" function to the client preauth plugin interface

Modify the client preauth plugin interface to pass in a function
pointer and data pointer so the plugin may request information
otherwise unavailable.

ticket: new
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18790 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoAdd public function to get keylenth associated with an enctype
Kevin Coffman [Thu, 9 Nov 2006 20:15:54 +0000 (20:15 +0000)] 
Add public function to get keylenth associated with an enctype

Add a new function, krb5_c_keylength, to libk5crypto to obtain the
keylength associated with an enctype.

ticket: new
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18789 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoRemove obsolete/conflicting prototype for krb524_convert_princs
Kevin Coffman [Thu, 9 Nov 2006 15:25:52 +0000 (15:25 +0000)] 
Remove obsolete/conflicting prototype for krb524_convert_princs

After krb524_convert_princs() was made static, the prototype in krb524d.h
no longer matches the actual function declaration and is no longer needed.

ticket: new
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18787 dc483132-0cff-0310-8789-dd5450dbe970

18 years agocommit for KFW 3.1 beta 3 (part two)
Jeffrey Altman [Wed, 8 Nov 2006 23:59:58 +0000 (23:59 +0000)] 
commit for KFW 3.1 beta 3 (part two)

remove prototype for removed function

ticket: new
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18781 dc483132-0cff-0310-8789-dd5450dbe970

18 years agocommits for KFW 3.1 Beta 3
Jeffrey Altman [Wed, 8 Nov 2006 09:58:49 +0000 (09:58 +0000)] 
commits for KFW 3.1 Beta 3

     KfW 3.1 beta 3 (NetIDMgr 1.1.4.0)

     source for 1.1.4.0

     - Eliminate unused commented out code.

     nidmgr32.dll (1.1.4.0)

     - The configuration provider was incorrectly handling the case where a
       configuration value also specifies a configuration path, resulting
       in the configuration value not being found.  Fixed.

     - Fix a race condition when refreshing identities where removing an
       identity during a refresh cycle may a crash.

     - Fix a bug which would cause an assertion to fail if an item was
       removed from one of the system defined menus.

     - When creating an indirect UI context, khui_context_create() will
       correctly fill up a credential set using the selected credentials.

     krb5cred.dll (1.1.4.0)

     - Fix a race condition during new credentials acquisition which may
       cause the Krb5 plug-in to abandon a call to
       krb5_get_init_creds_password() and make another call unnecessarily.

     - If krb5_get_init_creds_password() KRB5KDC_ERR_KEY_EXP, the new
       credentials dialog will automatically prompt for a password change
       instead of notifying the user that the password needs to be changed.

     - When handling WMNC_DIALOG_PREPROCESS messages, the plug-in thread
       would only be notified of any changes to option if the user
       confirmed the new credentials operation instead of cancelling it.

     - Additional debug output for the DEBUG build.

     - Reset the sync flag when reloading new credentials options for an
       identity.  Earlier, the flag was not being reset, which can result
       in the new credentials dialog not obtaining credentials using the
       new options.

     - Handle the case where the new credentials dialog maybe closed during
       the plug-in thread is processing a request.

     - Fix a condition which would cause the Krb5 plug-in to clear the
       custom prompts even if Krb5 was not the identity provider.

     - Once a password is changed, use the new password to obtain new
       credentials for the identity.

     netidmgr.exe (1.1.4.0)

     - Fix a redraw issue which left areas of the credentials window
       unupdated if another window was dragged across it.

     - Handle WM_PRINTCLIENT messages so that the NetIDMgr window will
       support window animation and other features that require a valid
       WM_PRINTCLIENT handler.

     - During window repaints, NetIDMgr will no longer invoke the default
       window procedure.

     - Add support for properly activating and bringing the NetIDMgr window
       to the foreground when necessary.  If the window cannot be brought
       to the foreground, it will flash the window to notify the user that
       she needs to manually activate the NetIDMgr window.

     - When a new credentials dialog is launched as a result of an external
       application requesting credentials, if the NetIDMgr application is
       not minimized, it will be brought to the foreground before the new
       credentials dialog is brought to the foreground.  Earlier, the new
       credentials dialog may remain hidden behind other windows in some
       circumstances.

     - When displaying custom prompts for the new credentials dialog, align
       the input controls on the right.

ticket:new
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18767 dc483132-0cff-0310-8789-dd5450dbe970

18 years agokrb5.h not C++-safe due to "struct krb5_cccol_cursor"
Alexandra Ellwood [Tue, 7 Nov 2006 20:15:40 +0000 (20:15 +0000)] 
krb5.h not C++-safe due to "struct krb5_cccol_cursor"

Fixed definition of "struct krb5_cccol_cursor" in krb5.h to be C++ safe.
In C++ the struct name is also a type so there can't be a typedef of the same
name, in this case "typedef struct krb5_cccol_cursor *krb5_cccol_cursor;".

ticket: new
status: open
target_version: 1.6
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18765 dc483132-0cff-0310-8789-dd5450dbe970

18 years agokrb5_get_init_creds_password does not consistently prompt for password changing
Jeffrey Altman [Mon, 6 Nov 2006 21:55:13 +0000 (21:55 +0000)] 
krb5_get_init_creds_password does not consistently prompt for password changing

  krb5_get_init_creds_password() previously did not consistently
handle KRB5KDC_ERR_KEY_EXP errors.  If there is a "master_kdc"
  entry for the realm and the KDC is reachable, then the function
will prompt the user for a password change.  Otherwise, it will
return the error code to the caller.  If the caller is a ticket
manager, it will prompt the user for a password change with a
dialog that is different from the one generated by the prompter
function passed to krb5_get_init_creds_password.

With this change krb5_get_init_creds_password() will always
prompt the user if it would return KRB5KDC_ERR_KEY_EXP unless
the function is compiled with USE_LOGIN_LIBRARY.  (KFM)

ticket: new
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18764 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoMake clean in lib/kdb leaves error table files
Ezra Peisach [Sun, 5 Nov 2006 14:37:28 +0000 (14:37 +0000)] 
Make clean in lib/kdb leaves error table files

Remove adb_err.c and adb_err.h on make clean.

ticket: new
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18763 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoMake clean does not remove lib/crypto/t_prf
Ezra Peisach [Sun, 5 Nov 2006 14:29:24 +0000 (14:29 +0000)] 
Make clean does not remove lib/crypto/t_prf

Remove t_prf and t_prf.o on make clean.

ticket: new
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18762 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago* tcl_kadm5.c (parse_principal_ent, parse_policy_ent): Don't pass back an
Ken Raeburn [Thu, 2 Nov 2006 03:47:34 +0000 (03:47 +0000)] 
* tcl_kadm5.c (parse_principal_ent, parse_policy_ent): Don't pass back an
uninitialized pointer in error case.
* tcl_ovsec_kadm.c (parse_principal_ent, parse_policy_ent): Likewise.

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18761 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago* secure.c (secure_putbuf): Initialize automatic variable LENGTH to 0.
Ken Raeburn [Thu, 2 Nov 2006 03:44:36 +0000 (03:44 +0000)] 
* secure.c (secure_putbuf): Initialize automatic variable LENGTH to 0.
* ftp.c (gss_trials, n_gss_trials): Make static and const.

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18760 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago* svr_principal.c (kadm5_use_password_server): Define only if USE_PASSWORD_SERVER
Ken Raeburn [Thu, 2 Nov 2006 03:16:02 +0000 (03:16 +0000)] 
* svr_principal.c (kadm5_use_password_server): Define only if USE_PASSWORD_SERVER

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18759 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago* svc_auth_gss.c (svcauth_gss_import_name): Unused function deleted
Ken Raeburn [Thu, 2 Nov 2006 03:13:31 +0000 (03:13 +0000)] 
* svc_auth_gss.c (svcauth_gss_import_name): Unused function deleted

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18758 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago* g_pw_in_tkt.c (passwd_to_key): Unused function deleted
Ken Raeburn [Thu, 2 Nov 2006 03:10:35 +0000 (03:10 +0000)] 
* g_pw_in_tkt.c (passwd_to_key): Unused function deleted

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18757 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago* prng.c (init_error): Unused variable deleted
Ken Raeburn [Thu, 2 Nov 2006 03:07:17 +0000 (03:07 +0000)] 
* prng.c (init_error): Unused variable deleted

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18756 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago* fake-addrinfo.c (krb5int_lock_fac, krb5int_unlock_fac): Define only if FAI_CACHE
Ken Raeburn [Thu, 2 Nov 2006 02:50:49 +0000 (02:50 +0000)] 
* fake-addrinfo.c (krb5int_lock_fac, krb5int_unlock_fac): Define only if FAI_CACHE

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18755 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoModify the preath plugin interface so that a plugin's context is
Kevin Coffman [Wed, 1 Nov 2006 22:40:30 +0000 (22:40 +0000)] 
Modify the preath plugin interface so that a plugin's context is
global to all the modules within a plugin.  Also, change the
client-side interface so that the preauth plugin context (once
created) lives the lifetime of a krb5_context.  This will allow
future changes that can set plugin parameters.  The client side
request context lives the lifetime of a call to krb5_get_init_creds().

Make the sample preauth plugins buildable outside the source tree.

Fix minor memory leak in sort_krb5_padata_sequence().

Add a prototype for krb5_do_preauth_tryagain() and change the plugin
interface.

Incorporates fixes from Nalin Dahyabhai <nalin@redhat.com> for leaks
of the function table pointers (rt #4566) and fix KDC crash (rt #4567)

ticket: 4566
ticket: 4567
ticket: 4587
Target_Version: 1.6
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18754 dc483132-0cff-0310-8789-dd5450dbe970

18 years agomake depend
Ken Raeburn [Wed, 1 Nov 2006 02:10:17 +0000 (02:10 +0000)] 
make depend

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18753 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago* cnv_tkt_skey.c (krb524_convert_princs): Move here, make static.
Ken Raeburn [Wed, 1 Nov 2006 00:31:38 +0000 (00:31 +0000)] 
* cnv_tkt_skey.c (krb524_convert_princs): Move here, make static.
* conv_princ.c: Deleted.
* Makefile.in (SRCS, SERVER_OBJS): Updated accordingly.

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18752 dc483132-0cff-0310-8789-dd5450dbe970

18 years ago* conv_princ.c (krb5_425_conv_principal): Fix silly typo in arrays' sizes in
Ken Raeburn [Tue, 31 Oct 2006 01:10:34 +0000 (01:10 +0000)] 
* conv_princ.c (krb5_425_conv_principal): Fix silly typo in arrays' sizes in
previous change.

ticket: 4534

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18751 dc483132-0cff-0310-8789-dd5450dbe970

18 years agolatest Novell ldap patches and kdb5_util dump support for ldap
Will Fiveash [Mon, 30 Oct 2006 20:56:57 +0000 (20:56 +0000)] 
latest Novell ldap patches and kdb5_util dump support for ldap

I've applied Novell's latest patches for their LDAP KDB plugin.  I've
also implemented and tested support for kdb5_util dump using the LDAP
KDB plugin.  I also added a Sun copyright on files that I've modified.

ticket: new
Target_Version: krb5-1.6
Tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18750 dc483132-0cff-0310-8789-dd5450dbe970

18 years agodon't confuse profile iterator in 425 princ conversion
Ken Raeburn [Sat, 28 Oct 2006 03:06:30 +0000 (03:06 +0000)] 
don't confuse profile iterator in 425 princ conversion

The profile iterator code hangs onto and uses the list of names passed
in.  The krb5_425_conv_principal code reuses that array when the
iterator may still be used.

* conv_princ.c (krb5_425_conv_principal): Use separate name arrays for
the iterator and the v4_realm lookup that may be done inside the
iteration loop.

ticket: new
target_version: 1.6
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18748 dc483132-0cff-0310-8789-dd5450dbe970

18 years agouse strdup
Ken Raeburn [Sat, 28 Oct 2006 03:02:38 +0000 (03:02 +0000)] 
use strdup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18747 dc483132-0cff-0310-8789-dd5450dbe970

18 years agomore copyright fixes pre-1.6
Tom Yu [Fri, 27 Oct 2006 22:47:32 +0000 (22:47 +0000)] 
more copyright fixes pre-1.6

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18744 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoSynchronise copyright notices. Preliminary update of README for 1.6
Tom Yu [Fri, 27 Oct 2006 03:53:08 +0000 (03:53 +0000)] 
Synchronise copyright notices.  Preliminary update of README for 1.6

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18743 dc483132-0cff-0310-8789-dd5450dbe970

18 years agofix krb5_ldap_iterate to handle NULL match_expr and open_db_and_mkey to use KRB5_KDB_...
Will Fiveash [Mon, 23 Oct 2006 21:36:46 +0000 (21:36 +0000)] 
fix krb5_ldap_iterate to handle NULL match_expr and open_db_and_mkey to use KRB5_KDB_SRV_TYPE_ADMIN

When I ran kdb5_util dump I had two initial problems.  First, the LDAP
plugin was not finding the bind DN because open_db_and_mkey() was
passing KRB5_KDB_SRV_TYPE_OTHER to krb5_db_open().  When I change this
to KRB5_KDB_SRV_TYPE_ADMIN then the ldap_kadmind_dn parameter is used
from krb5.conf and a valid bind DN is found.  Second,
krb5_ldap_iterate() will core dump when it is called withy a NULL
match_expr arg.  This is how dump_db calls krb5_db_iterate().  I updated
krb5_ldap_iterate() to use a default_match_expr of "*" if match_expr ==
NULL.

ticket: new

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18736 dc483132-0cff-0310-8789-dd5450dbe970

18 years agofix invalid access found by valgrind
Kevin Coffman [Mon, 23 Oct 2006 16:15:50 +0000 (16:15 +0000)] 
fix invalid access found by valgrind

Valgrind found that we were reading past the end of the
preferred padata string.  p is manually updated within
the loop and there is no need for the increment.  It was
causing the null terminator to be skipped over, rather
than properly terminating the loop.

ticket: new

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18735 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoAvoid segfault in krb5_do_preauth_tryagain
Kevin Coffman [Mon, 23 Oct 2006 16:10:37 +0000 (16:10 +0000)] 
Avoid segfault in krb5_do_preauth_tryagain

Check pointer is non-null before using it.  Avoids segfault in
krb5_do_preauth_tryagain().

ticket: new

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18734 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoFor Irix - determine if using gcc and gnu ld - set compiler flags properly
Ezra Peisach [Mon, 23 Oct 2006 03:20:11 +0000 (03:20 +0000)] 
For Irix - determine if using gcc and gnu ld - set compiler flags properly

ticket: 4455

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18733 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoosf1 -oldstyle_liblookup typo
Ezra Peisach [Sun, 22 Oct 2006 11:59:02 +0000 (11:59 +0000)] 
osf1 -oldstyle_liblookup typo

Not really relevant anymore - as we do not support static linking now.
But in ticket 927 (r16776) - a test was added to determine if gnu ld
was in use and change the linker flags accordingly.  The variable in
aclocal.m4 was krb5_cv_prog_gnu_ld and this was testing for
krb5_cv_gnu_ld.

ticket: new

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18732 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoDelete src/lib/ccapi.
Sam Hartman [Sat, 21 Oct 2006 20:20:30 +0000 (20:20 +0000)] 
Delete src/lib/ccapi.
The ccapi shipped in 1.6 will not be based off this code
and will live in src/ccapi.
It will be copied onto the trunk and branch when  ready, but this code is being removed before the branch cut.

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18731 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoUpdate protocol rfcs to the versions we actually implement
Sam Hartman [Sat, 21 Oct 2006 20:12:52 +0000 (20:12 +0000)] 
Update protocol rfcs to the versions we actually implement

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18730 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoenabling LDAP mix-in support for kdb5_util load
Will Fiveash [Sat, 21 Oct 2006 00:33:24 +0000 (00:33 +0000)] 
enabling LDAP mix-in support for kdb5_util load

I now have mix-in working for the kdb5_util load.  If the krbSubTrees
realm attr contains a base DN where non-krb entries live the
load/krb5_ldap_put_principal() code will modify those entries whose
krbPrincipalName attr matches that of the dump princ record being loaded
otherwise a standalone krbprinc entry will be created under the realm
container.

I also fixed a small bug in krb5_ldap_policydn_to_name() for the version
that uses ldap_explode_dn().

ticket: new

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18729 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoAdd supp-int.h to provide prototypes for declared internal functions.
Ezra Peisach [Wed, 18 Oct 2006 03:15:24 +0000 (03:15 +0000)] 
Add supp-int.h to provide prototypes for declared internal functions.
*.x: Include this header
Makefile.in: Update dependencies

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18728 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoMemory leak fixes on exit
Ezra Peisach [Wed, 18 Oct 2006 02:54:05 +0000 (02:54 +0000)] 
Memory leak fixes on exit

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18727 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoFree allocated memory when no longer used
Ezra Peisach [Wed, 18 Oct 2006 02:53:06 +0000 (02:53 +0000)] 
Free allocated memory when no longer used

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18726 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoInvoke krb5_free_principal to remove memory leak
Ezra Peisach [Wed, 18 Oct 2006 02:52:30 +0000 (02:52 +0000)] 
Invoke krb5_free_principal to remove memory leak

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18725 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoCall freeaddrinfo at end - memory leak
Ezra Peisach [Wed, 18 Oct 2006 02:51:55 +0000 (02:51 +0000)] 
Call freeaddrinfo at end - memory leak

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18724 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoDeclare krb5_mcc_get_flags static - it is not exported or used outside of file
Ezra Peisach [Wed, 18 Oct 2006 02:50:43 +0000 (02:50 +0000)] 
Declare krb5_mcc_get_flags static - it is not exported or used outside of file

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18723 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoUnsigned/signed warning fix
Ezra Peisach [Wed, 18 Oct 2006 02:38:01 +0000 (02:38 +0000)] 
Unsigned/signed warning fix

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18722 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoInclude gss_libinit.h for gssint_initialize_library() prototype
Ezra Peisach [Mon, 16 Oct 2006 16:18:29 +0000 (16:18 +0000)] 
Include gss_libinit.h for gssint_initialize_library() prototype

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18721 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoInclude string.h for memcmp prototype
Ezra Peisach [Mon, 16 Oct 2006 12:18:18 +0000 (12:18 +0000)] 
Include string.h for memcmp prototype

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18720 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoInclude time.h for time() prototype
Ezra Peisach [Mon, 16 Oct 2006 12:17:53 +0000 (12:17 +0000)] 
Include time.h for time() prototype

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18719 dc483132-0cff-0310-8789-dd5450dbe970

18 years agoAdd prototype for krb5int_init_context_kdc
Ezra Peisach [Mon, 16 Oct 2006 01:50:49 +0000 (01:50 +0000)] 
Add prototype for krb5int_init_context_kdc

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18718 dc483132-0cff-0310-8789-dd5450dbe970