1*ca1c9b0cSelric2008-08-14 Love Hornquist Astrand <lha@10a140laptop.local> 2*ca1c9b0cSelric 3*ca1c9b0cSelric * krb5/accept_sec_context.c: If there is a initiator subkey, copy 4*ca1c9b0cSelric that to acceptor subkey to match windows behavior. From Metze. 5*ca1c9b0cSelric 6*ca1c9b0cSelric2008-08-02 Love Hörnquist Åstrand <lha@h5l.org> 7*ca1c9b0cSelric 8*ca1c9b0cSelric * ntlm/init_sec_context.c: Catch error 9*ca1c9b0cSelric 10*ca1c9b0cSelric * krb5/inquire_sec_context_by_oid.c: Catch store failure. 11*ca1c9b0cSelric 12*ca1c9b0cSelric * mech/gss_canonicalize_name.c: Not init m, return never 13*ca1c9b0cSelric used (overwritten later). 14*ca1c9b0cSelric 15*ca1c9b0cSelric2008-07-25 Love Hörnquist Åstrand <lha@kth.se> 16*ca1c9b0cSelric 17*ca1c9b0cSelric * ntlm/init_sec_context.c: Use krb5_cc_get_config. 18*ca1c9b0cSelric 19*ca1c9b0cSelric2008-07-25 Love Hörnquist Åstrand <lha@kth.se> 20*ca1c9b0cSelric 21*ca1c9b0cSelric * krb5/init_sec_context.c: Match the orignal patch I got from 22*ca1c9b0cSelric metze, seems that DCE-STYLE is even more weirer then what I though 23*ca1c9b0cSelric when I merged the patch. 24*ca1c9b0cSelric 25*ca1c9b0cSelric2008-06-02 Love Hörnquist Åstrand <lha@kth.se> 26*ca1c9b0cSelric 27*ca1c9b0cSelric * krb5/init_sec_context.c: Don't add asn1 wrapping to token when 28*ca1c9b0cSelric using DCE_STYLE. Patch from Stefan Metzmacher. 29*ca1c9b0cSelric 30*ca1c9b0cSelric2008-05-27 Love Hörnquist Åstrand <lha@kth.se> 31*ca1c9b0cSelric 32*ca1c9b0cSelric * ntlm/init_sec_context.c: use krb5_get_error_message 33*ca1c9b0cSelric 34*ca1c9b0cSelric2008-05-05 Love Hörnquist Åstrand <lha@kth.se> 35*ca1c9b0cSelric 36*ca1c9b0cSelric * spnego/spnego_locl.h: Add back "mech/utils.h", its needed for 37*ca1c9b0cSelric oid/buffer functions. 38*ca1c9b0cSelric 39*ca1c9b0cSelric2008-05-02 Love Hörnquist Åstrand <lha@it.su.se> 40*ca1c9b0cSelric 41*ca1c9b0cSelric * spnego: Changes from doug barton to make spnego indepedant of 42*ca1c9b0cSelric the heimdal version of the plugin system. 43*ca1c9b0cSelric 44*ca1c9b0cSelric2008-04-27 Love Hörnquist Åstrand <lha@it.su.se> 45*ca1c9b0cSelric 46*ca1c9b0cSelric * krb5: use DES_set_key_unchecked() 47*ca1c9b0cSelric 48*ca1c9b0cSelric2008-04-17 Love Hörnquist Åstrand <lha@it.su.se> 49*ca1c9b0cSelric 50*ca1c9b0cSelric * add __declspec() for windows. 51*ca1c9b0cSelric 52*ca1c9b0cSelric2008-04-15 Love Hörnquist Åstrand <lha@it.su.se> 53*ca1c9b0cSelric 54*ca1c9b0cSelric * krb5/import_sec_context.c: Use tmp to read ac->flags value to 55*ca1c9b0cSelric avoid warning. 56*ca1c9b0cSelric 57*ca1c9b0cSelric2008-04-07 Love Hörnquist Åstrand <lha@it.su.se> 58*ca1c9b0cSelric 59*ca1c9b0cSelric * mech/gss_mech_switch.c: Use unsigned where appropriate. 60*ca1c9b0cSelric 61*ca1c9b0cSelric2008-03-14 Love Hörnquist Åstrand <lha@it.su.se> 62*ca1c9b0cSelric 63*ca1c9b0cSelric * test_context.c: Add test for gsskrb5_register_acceptor_identity. 64*ca1c9b0cSelric 65*ca1c9b0cSelric2008-03-09 Love Hörnquist Åstrand <lha@it.su.se> 66*ca1c9b0cSelric 67*ca1c9b0cSelric * krb5/init_sec_context.c (init_auth): use right variable to 68*ca1c9b0cSelric detect if we want to free or not. 69*ca1c9b0cSelric 70*ca1c9b0cSelric2008-02-26 Love Hörnquist Åstrand <lha@it.su.se> 71*ca1c9b0cSelric 72*ca1c9b0cSelric * Makefile.am: add missing \ 73*ca1c9b0cSelric 74*ca1c9b0cSelric * Makefile.am: reshuffle depenencies 75*ca1c9b0cSelric 76*ca1c9b0cSelric * Add flag to krb5 to not add GSS-API INT|CONF to the negotiation 77*ca1c9b0cSelric 78*ca1c9b0cSelric2008-02-21 Love Hörnquist Åstrand <lha@it.su.se> 79*ca1c9b0cSelric 80*ca1c9b0cSelric * make the SPNEGO mech store the error itself instead, works for 81*ca1c9b0cSelric everything except other stackable mechs 82*ca1c9b0cSelric 83*ca1c9b0cSelric2008-02-18 Love Hörnquist Åstrand <lha@it.su.se> 84*ca1c9b0cSelric 85*ca1c9b0cSelric * spnego/init_sec_context.c (spnego_reply): if the reply token was 86*ca1c9b0cSelric of length 0, make it the same as no token. Pointed out by Zeqing 87*ca1c9b0cSelric Xia. 88*ca1c9b0cSelric 89*ca1c9b0cSelric * krb5/acquire_cred.c (acquire_initiator_cred): handle the 90*ca1c9b0cSelric credential cache better, use destroy/close when appriate and for 91*ca1c9b0cSelric all cases. Thanks to Michael Allen for point out the memory-leak 92*ca1c9b0cSelric that I also fixed. 93*ca1c9b0cSelric 94*ca1c9b0cSelric2008-02-03 Love Hörnquist Åstrand <lha@it.su.se> 95*ca1c9b0cSelric 96*ca1c9b0cSelric * spnego/accept_sec_context.c: Make error reporting somewhat more 97*ca1c9b0cSelric correct for SPNEGO. 98*ca1c9b0cSelric 99*ca1c9b0cSelric2008-01-27 Love Hörnquist Åstrand <lha@it.su.se> 100*ca1c9b0cSelric 101*ca1c9b0cSelric * test_common.c: Improve the error message. 102*ca1c9b0cSelric 103*ca1c9b0cSelric2008-01-24 Love Hörnquist Åstrand <lha@it.su.se> 104*ca1c9b0cSelric 105*ca1c9b0cSelric * ntlm/accept_sec_context.c: Avoid free-ing type1 message before 106*ca1c9b0cSelric its allocated. 107*ca1c9b0cSelric 108*ca1c9b0cSelric2008-01-13 Love Hörnquist Åstrand <lha@it.su.se> 109*ca1c9b0cSelric 110*ca1c9b0cSelric * test_ntlm.c: Test source name (and make the acceptor in ntlm gss 111*ca1c9b0cSelric mech useful). 112*ca1c9b0cSelric 113*ca1c9b0cSelric2007-12-30 Love Hörnquist Åstrand <lha@it.su.se> 114*ca1c9b0cSelric 115*ca1c9b0cSelric * ntlm/init_sec_context.c: Don't confuse target name and source 116*ca1c9b0cSelric name, make regressiont tests pass again. 117*ca1c9b0cSelric 118*ca1c9b0cSelric2007-12-29 Love Hörnquist Åstrand <lha@it.su.se> 119*ca1c9b0cSelric 120*ca1c9b0cSelric * ntlm: clean up name handling 121*ca1c9b0cSelric 122*ca1c9b0cSelric2007-12-04 Love Hörnquist Åstrand <lha@it.su.se> 123*ca1c9b0cSelric 124*ca1c9b0cSelric * ntlm/init_sec_context.c: Use credential if it was passed in. 125*ca1c9b0cSelric 126*ca1c9b0cSelric * ntlm/acquire_cred.c: Check if there is initial creds with 127*ca1c9b0cSelric _gss_ntlm_get_user_cred(). 128*ca1c9b0cSelric 129*ca1c9b0cSelric * ntlm/init_sec_context.c: Add _gss_ntlm_get_user_info() that 130*ca1c9b0cSelric return the user info so it can be used by external modules. 131*ca1c9b0cSelric 132*ca1c9b0cSelric * ntlm/inquire_cred.c: use the right error code. 133*ca1c9b0cSelric 134*ca1c9b0cSelric * ntlm/inquire_cred.c: Return GSS_C_NO_CREDENTIAL if there is no 135*ca1c9b0cSelric credential, ntlm have (not yet) a default credential. 136*ca1c9b0cSelric 137*ca1c9b0cSelric * mech/gss_release_oid_set.c: Avoid trying to deref NULL, from 138*ca1c9b0cSelric Phil Fisher. 139*ca1c9b0cSelric 140*ca1c9b0cSelric2007-12-03 Love Hörnquist Åstrand <lha@it.su.se> 141*ca1c9b0cSelric 142*ca1c9b0cSelric * test_acquire_cred.c: Always try to fetch cred (even with 143*ca1c9b0cSelric GSS_C_NO_NAME). 144*ca1c9b0cSelric 145*ca1c9b0cSelric2007-08-09 Love Hörnquist Åstrand <lha@it.su.se> 146*ca1c9b0cSelric 147*ca1c9b0cSelric * mech/gss_krb5.c: Readd gss_krb5_get_tkt_flags. 148*ca1c9b0cSelric 149*ca1c9b0cSelric2007-08-08 Love Hörnquist Åstrand <lha@it.su.se> 150*ca1c9b0cSelric 151*ca1c9b0cSelric * spnego/compat.c (_gss_spnego_internal_delete_sec_context): 152*ca1c9b0cSelric release ctx->target_name too From Rafal Malinowski. 153*ca1c9b0cSelric 154*ca1c9b0cSelric2007-07-26 Love Hörnquist Åstrand <lha@it.su.se> 155*ca1c9b0cSelric 156*ca1c9b0cSelric * mech/gss_mech_switch.c: Don't try to do dlopen if system doesn't 157*ca1c9b0cSelric have dlopen. From Rune of Chalmers. 158*ca1c9b0cSelric 159*ca1c9b0cSelric2007-07-10 Love Hörnquist Åstrand <lha@it.su.se> 160*ca1c9b0cSelric 161*ca1c9b0cSelric * mech/gss_duplicate_name.c: New signature of _gss_find_mn. 162*ca1c9b0cSelric 163*ca1c9b0cSelric * mech/gss_init_sec_context.c: New signature of _gss_find_mn. 164*ca1c9b0cSelric 165*ca1c9b0cSelric * mech/gss_acquire_cred.c: New signature of _gss_find_mn. 166*ca1c9b0cSelric 167*ca1c9b0cSelric * mech/name.h: New signature of _gss_find_mn. 168*ca1c9b0cSelric 169*ca1c9b0cSelric * mech/gss_canonicalize_name.c: New signature of _gss_find_mn. 170*ca1c9b0cSelric 171*ca1c9b0cSelric * mech/gss_compare_name.c: New signature of _gss_find_mn. 172*ca1c9b0cSelric 173*ca1c9b0cSelric * mech/gss_add_cred.c: New signature of _gss_find_mn. 174*ca1c9b0cSelric 175*ca1c9b0cSelric * mech/gss_names.c (_gss_find_mn): Return an error code for 176*ca1c9b0cSelric caller. 177*ca1c9b0cSelric 178*ca1c9b0cSelric * spnego/accept_sec_context.c: remove checks that are done by the 179*ca1c9b0cSelric previous function. 180*ca1c9b0cSelric 181*ca1c9b0cSelric * Makefile.am: New library version. 182*ca1c9b0cSelric 183*ca1c9b0cSelric2007-07-04 Love Hörnquist Åstrand <lha@it.su.se> 184*ca1c9b0cSelric 185*ca1c9b0cSelric * mech/gss_oid_to_str.c: Refuse to print GSS_C_NULL_OID, from 186*ca1c9b0cSelric Rafal Malinowski. 187*ca1c9b0cSelric 188*ca1c9b0cSelric * spnego/spnego.asn1: Indent and make NegTokenInit and 189*ca1c9b0cSelric NegTokenResp extendable. 190*ca1c9b0cSelric 191*ca1c9b0cSelric2007-06-21 Love Hörnquist Åstrand <lha@it.su.se> 192*ca1c9b0cSelric 193*ca1c9b0cSelric * ntlm/inquire_cred.c: Implement _gss_ntlm_inquire_cred. 194*ca1c9b0cSelric 195*ca1c9b0cSelric * mech/gss_display_status.c: Provide message for GSS_S_COMPLETE. 196*ca1c9b0cSelric 197*ca1c9b0cSelric * mech/context.c: If the canned string is "", its no use to the 198*ca1c9b0cSelric user, make it fall back to the default error string. 199*ca1c9b0cSelric 200*ca1c9b0cSelric2007-06-20 Love Hörnquist Åstrand <lha@it.su.se> 201*ca1c9b0cSelric 202*ca1c9b0cSelric * mech/gss_display_name.c (gss_display_name): no name -> 203*ca1c9b0cSelric fail. From Rafal Malinswski. 204*ca1c9b0cSelric 205*ca1c9b0cSelric * spnego/accept_sec_context.c: Wrap name in a spnego_name instead 206*ca1c9b0cSelric of just a copy of the underlaying object. From Rafal Malinswski. 207*ca1c9b0cSelric 208*ca1c9b0cSelric * spnego/accept_sec_context.c: Handle underlaying mech not 209*ca1c9b0cSelric returning mn. 210*ca1c9b0cSelric 211*ca1c9b0cSelric * mech/gss_accept_sec_context.c: Handle underlaying mech not 212*ca1c9b0cSelric returning mn. 213*ca1c9b0cSelric 214*ca1c9b0cSelric * spnego/accept_sec_context.c: Make sure src_name is always set to 215*ca1c9b0cSelric GSS_C_NO_NAME when returning. 216*ca1c9b0cSelric 217*ca1c9b0cSelric * krb5/acquire_cred.c (acquire_acceptor_cred): don't claim 218*ca1c9b0cSelric everything is well on failure. From Phil Fisher. 219*ca1c9b0cSelric 220*ca1c9b0cSelric * mech/gss_duplicate_name.c: catch error (and ignore it) 221*ca1c9b0cSelric 222*ca1c9b0cSelric * ntlm/init_sec_context.c: Use heim_ntlm_calculate_ntlm2_sess. 223*ca1c9b0cSelric 224*ca1c9b0cSelric * mech/gss_accept_sec_context.c: Only wrap the delegated cred if 225*ca1c9b0cSelric we got a delegated mech cred. From Rafal Malinowski. 226*ca1c9b0cSelric 227*ca1c9b0cSelric * spnego/accept_sec_context.c: Only wrap the delegated cred if we 228*ca1c9b0cSelric are going to return it to the consumer. From Rafal Malinowski. 229*ca1c9b0cSelric 230*ca1c9b0cSelric * spnego/accept_sec_context.c: Fixed memory leak pointed out by 231*ca1c9b0cSelric Rafal Malinowski, also while here moved to use NegotiationToken 232*ca1c9b0cSelric for decoding. 233*ca1c9b0cSelric 234*ca1c9b0cSelric2007-06-18 Love Hörnquist Åstrand <lha@it.su.se> 235*ca1c9b0cSelric 236*ca1c9b0cSelric * krb5/prf.c (_gsskrb5_pseudo_random): add missing break. 237*ca1c9b0cSelric 238*ca1c9b0cSelric * krb5/release_name.c: Set *minor_status unconditionallty, its 239*ca1c9b0cSelric done later anyway. 240*ca1c9b0cSelric 241*ca1c9b0cSelric * spnego/accept_sec_context.c: Init get_mic to 0. 242*ca1c9b0cSelric 243*ca1c9b0cSelric * mech/gss_set_cred_option.c: Free memory in failure case, found 244*ca1c9b0cSelric by beam. 245*ca1c9b0cSelric 246*ca1c9b0cSelric * mech/gss_inquire_context.c: Handle mech_type being NULL. 247*ca1c9b0cSelric 248*ca1c9b0cSelric * mech/gss_inquire_cred_by_mech.c: Handle cred_name being NULL. 249*ca1c9b0cSelric 250*ca1c9b0cSelric * mech/gss_krb5.c: Free memory in error case, found by beam. 251*ca1c9b0cSelric 252*ca1c9b0cSelric2007-06-12 Love Hörnquist Åstrand <lha@it.su.se> 253*ca1c9b0cSelric 254*ca1c9b0cSelric * ntlm/inquire_context.c: Use ctx->gssflags for flags. 255*ca1c9b0cSelric 256*ca1c9b0cSelric * krb5/display_name.c: Use KRB5_PRINCIPAL_UNPARSE_DISPLAY, this is 257*ca1c9b0cSelric not ment for machine consumption. 258*ca1c9b0cSelric 259*ca1c9b0cSelric2007-06-09 Love Hörnquist Åstrand <lha@it.su.se> 260*ca1c9b0cSelric 261*ca1c9b0cSelric * ntlm/digest.c (kdc_alloc): free memory on failure, pointed out 262*ca1c9b0cSelric by Rafal Malinowski. 263*ca1c9b0cSelric 264*ca1c9b0cSelric * ntlm/digest.c (kdc_destroy): free context when done, pointed out 265*ca1c9b0cSelric by Rafal Malinowski. 266*ca1c9b0cSelric 267*ca1c9b0cSelric * spnego/context_stubs.c (_gss_spnego_display_name): if input_name 268*ca1c9b0cSelric is null, fail. From Rafal Malinowski. 269*ca1c9b0cSelric 270*ca1c9b0cSelric2007-06-04 Love Hörnquist Åstrand <lha@it.su.se> 271*ca1c9b0cSelric 272*ca1c9b0cSelric * ntlm/digest.c: Free memory when done. 273*ca1c9b0cSelric 274*ca1c9b0cSelric2007-06-02 Love Hörnquist Åstrand <lha@it.su.se> 275*ca1c9b0cSelric 276*ca1c9b0cSelric * test_ntlm.c: Test both with and without keyex. 277*ca1c9b0cSelric 278*ca1c9b0cSelric * ntlm/digest.c: If we didn't set session key, don't expect one 279*ca1c9b0cSelric back. 280*ca1c9b0cSelric 281*ca1c9b0cSelric * test_ntlm.c: Set keyex flag and calculate session key. 282*ca1c9b0cSelric 283*ca1c9b0cSelric2007-05-31 Love Hörnquist Åstrand <lha@it.su.se> 284*ca1c9b0cSelric 285*ca1c9b0cSelric * spnego/accept_sec_context.c: Use the return value before is 286*ca1c9b0cSelric overwritten by later calls. From Rafal Malinowski 287*ca1c9b0cSelric 288*ca1c9b0cSelric * krb5/release_cred.c: Give an minor_status argument to 289*ca1c9b0cSelric gss_release_oid_set. From Rafal Malinowski 290*ca1c9b0cSelric 291*ca1c9b0cSelric2007-05-30 Love Hörnquist Åstrand <lha@it.su.se> 292*ca1c9b0cSelric 293*ca1c9b0cSelric * ntlm/accept_sec_context.c: Catch errors and return the up the 294*ca1c9b0cSelric stack. 295*ca1c9b0cSelric 296*ca1c9b0cSelric * test_kcred.c: more testing of lifetimes 297*ca1c9b0cSelric 298*ca1c9b0cSelric2007-05-17 Love Hörnquist Åstrand <lha@it.su.se> 299*ca1c9b0cSelric 300*ca1c9b0cSelric * Makefile.am: Drop the gss oid_set function for the krb5 mech, 301*ca1c9b0cSelric use the mech glue versions instead. Pointed out by Rafal 302*ca1c9b0cSelric Malinowski. 303*ca1c9b0cSelric 304*ca1c9b0cSelric * krb5: Use gss oid_set functions from mechglue 305*ca1c9b0cSelric 306*ca1c9b0cSelric2007-05-14 Love Hörnquist Åstrand <lha@it.su.se> 307*ca1c9b0cSelric 308*ca1c9b0cSelric * ntlm/accept_sec_context.c: Set session key only if we are 309*ca1c9b0cSelric returned a session key. Found by David Love. 310*ca1c9b0cSelric 311*ca1c9b0cSelric2007-05-13 Love Hörnquist Åstrand <lha@it.su.se> 312*ca1c9b0cSelric 313*ca1c9b0cSelric * krb5/prf.c: switched MIN to min to make compile on solaris, 314*ca1c9b0cSelric pointed out by David Love. 315*ca1c9b0cSelric 316*ca1c9b0cSelric2007-05-09 Love Hörnquist Åstrand <lha@it.su.se> 317*ca1c9b0cSelric 318*ca1c9b0cSelric * krb5/inquire_cred_by_mech.c: Fill in all of the variables if 319*ca1c9b0cSelric they are passed in. Pointed out by Phil Fisher. 320*ca1c9b0cSelric 321*ca1c9b0cSelric2007-05-08 Love Hörnquist Åstrand <lha@it.su.se> 322*ca1c9b0cSelric 323*ca1c9b0cSelric * krb5/inquire_cred.c: Fix copy and paste error, bug spotted by 324*ca1c9b0cSelric from Phil Fisher. 325*ca1c9b0cSelric 326*ca1c9b0cSelric * mech: dont keep track of gc_usage, just figure it out at 327*ca1c9b0cSelric gss_inquire_cred() time 328*ca1c9b0cSelric 329*ca1c9b0cSelric * mech/gss_mech_switch.c (add_builtin): ok for 330*ca1c9b0cSelric __gss_mech_initialize() to return NULL 331*ca1c9b0cSelric 332*ca1c9b0cSelric * test_kcred.c: more correct tests 333*ca1c9b0cSelric 334*ca1c9b0cSelric * spnego/cred_stubs.c (gss_inquire_cred*): wrap the name with a 335*ca1c9b0cSelric spnego_name. 336*ca1c9b0cSelric 337*ca1c9b0cSelric * ntlm/inquire_cred.c: make ntlm gss_inquire_cred fail for now, 338*ca1c9b0cSelric need to find default cred and friends. 339*ca1c9b0cSelric 340*ca1c9b0cSelric * krb5/inquire_cred_by_mech.c: reimplement 341*ca1c9b0cSelric 342*ca1c9b0cSelric2007-05-07 Love Hörnquist Åstrand <lha@it.su.se> 343*ca1c9b0cSelric 344*ca1c9b0cSelric * ntlm/acquire_cred.c: drop unused variable. 345*ca1c9b0cSelric 346*ca1c9b0cSelric * ntlm/acquire_cred.c: Reimplement. 347*ca1c9b0cSelric 348*ca1c9b0cSelric * Makefile.am: add ntlm/digest.c 349*ca1c9b0cSelric 350*ca1c9b0cSelric * ntlm: split out backend ntlm server processing 351*ca1c9b0cSelric 352*ca1c9b0cSelric2007-04-24 Love Hörnquist Åstrand <lha@it.su.se> 353*ca1c9b0cSelric 354*ca1c9b0cSelric * ntlm/delete_sec_context.c (_gss_ntlm_delete_sec_context): free 355*ca1c9b0cSelric credcache when done 356*ca1c9b0cSelric 357*ca1c9b0cSelric2007-04-22 Love Hörnquist Åstrand <lha@it.su.se> 358*ca1c9b0cSelric 359*ca1c9b0cSelric * ntlm/init_sec_context.c: ntlm-key credential entry is prefix with @ 360*ca1c9b0cSelric 361*ca1c9b0cSelric * ntlm/init_sec_context.c (get_user_ccache): pick up the ntlm 362*ca1c9b0cSelric creds from the krb5 credential cache. 363*ca1c9b0cSelric 364*ca1c9b0cSelric2007-04-21 Love Hörnquist Åstrand <lha@it.su.se> 365*ca1c9b0cSelric 366*ca1c9b0cSelric * ntlm/delete_sec_context.c: free the key stored in the context 367*ca1c9b0cSelric 368*ca1c9b0cSelric * ntlm/ntlm.h: switch password for a key 369*ca1c9b0cSelric 370*ca1c9b0cSelric * test_oid.c: Switch oid to one that is exported. 371*ca1c9b0cSelric 372*ca1c9b0cSelric2007-04-20 Love Hörnquist Åstrand <lha@it.su.se> 373*ca1c9b0cSelric 374*ca1c9b0cSelric * ntlm/init_sec_context.c: move where hash is calculated to make 375*ca1c9b0cSelric it easier to add ccache support. 376*ca1c9b0cSelric 377*ca1c9b0cSelric * Makefile.am: Add version-script.map to EXTRA_DIST. 378*ca1c9b0cSelric 379*ca1c9b0cSelric2007-04-19 Love Hörnquist Åstrand <lha@it.su.se> 380*ca1c9b0cSelric 381*ca1c9b0cSelric * Makefile.am: Unconfuse newer versions of automake that doesn't 382*ca1c9b0cSelric know the diffrence between depenences and setting variables. foo: 383*ca1c9b0cSelric vs foo=. 384*ca1c9b0cSelric 385*ca1c9b0cSelric * test_ntlm.c: delete sec context when done. 386*ca1c9b0cSelric 387*ca1c9b0cSelric * version-script.map: export more symbols. 388*ca1c9b0cSelric 389*ca1c9b0cSelric * Makefile.am: add version script if ld supports it 390*ca1c9b0cSelric 391*ca1c9b0cSelric * version-script.map: add version script if ld supports it 392*ca1c9b0cSelric 393*ca1c9b0cSelric2007-04-18 Love Hörnquist Åstrand <lha@it.su.se> 394*ca1c9b0cSelric 395*ca1c9b0cSelric * Makefile.am: test_acquire_cred need test_common.[ch] 396*ca1c9b0cSelric 397*ca1c9b0cSelric * test_acquire_cred.c: add more test options. 398*ca1c9b0cSelric 399*ca1c9b0cSelric * krb5/external.c: add GSS_KRB5_CCACHE_NAME_X 400*ca1c9b0cSelric 401*ca1c9b0cSelric * gssapi/gssapi_krb5.h: add GSS_KRB5_CCACHE_NAME_X 402*ca1c9b0cSelric 403*ca1c9b0cSelric * krb5/set_sec_context_option.c: refactor code, implement 404*ca1c9b0cSelric GSS_KRB5_CCACHE_NAME_X 405*ca1c9b0cSelric 406*ca1c9b0cSelric * mech/gss_krb5.c: reimplement gss_krb5_ccache_name 407*ca1c9b0cSelric 408*ca1c9b0cSelric2007-04-17 Love Hörnquist Åstrand <lha@it.su.se> 409*ca1c9b0cSelric 410*ca1c9b0cSelric * spnego/cred_stubs.c: Need to import spnego name before we can 411*ca1c9b0cSelric use it as a gss_name_t. 412*ca1c9b0cSelric 413*ca1c9b0cSelric * test_acquire_cred.c: use this test as part of the regression 414*ca1c9b0cSelric suite. 415*ca1c9b0cSelric 416*ca1c9b0cSelric * mech/gss_acquire_cred.c (gss_acquire_cred): dont init 417*ca1c9b0cSelric cred->gc_mc every time in the loop. 418*ca1c9b0cSelric 419*ca1c9b0cSelric2007-04-15 Love Hörnquist Åstrand <lha@it.su.se> 420*ca1c9b0cSelric 421*ca1c9b0cSelric * Makefile.am: add test_common.h 422*ca1c9b0cSelric 423*ca1c9b0cSelric2007-02-16 Love Hörnquist Åstrand <lha@it.su.se> 424*ca1c9b0cSelric 425*ca1c9b0cSelric * gss_acquire_cred.3: Add link for 426*ca1c9b0cSelric gsskrb5_register_acceptor_identity. 427*ca1c9b0cSelric 428*ca1c9b0cSelric2007-02-08 Love Hörnquist Åstrand <lha@it.su.se> 429*ca1c9b0cSelric 430*ca1c9b0cSelric * krb5/copy_ccache.c: Try to leak less memory in the failure case. 431*ca1c9b0cSelric 432*ca1c9b0cSelric2007-01-31 Love Hörnquist Åstrand <lha@it.su.se> 433*ca1c9b0cSelric 434*ca1c9b0cSelric * mech/gss_display_status.c: Use right printf formater. 435*ca1c9b0cSelric 436*ca1c9b0cSelric * test_*.[ch]: split out the error printing function and try to 437*ca1c9b0cSelric return better errors 438*ca1c9b0cSelric 439*ca1c9b0cSelric2007-01-30 Love Hörnquist Åstrand <lha@it.su.se> 440*ca1c9b0cSelric 441*ca1c9b0cSelric * krb5/init_sec_context.c: revert 1.75: (init_auth): only turn on 442*ca1c9b0cSelric GSS_C_CONF_FLAG and GSS_C_INT_FLAG if the caller requseted it. 443*ca1c9b0cSelric 444*ca1c9b0cSelric This is because Kerberos always support INT|CONF, matches behavior 445*ca1c9b0cSelric with MS and MIT. The creates problems for the GSS-SPNEGO mech. 446*ca1c9b0cSelric 447*ca1c9b0cSelric2007-01-24 Love Hörnquist Åstrand <lha@it.su.se> 448*ca1c9b0cSelric 449*ca1c9b0cSelric * krb5/prf.c: constrain desired_output_len 450*ca1c9b0cSelric 451*ca1c9b0cSelric * krb5/external.c (krb5_mech): add _gsskrb5_pseudo_random 452*ca1c9b0cSelric 453*ca1c9b0cSelric * mech/gss_pseudo_random.c: Catch error from underlaying mech on 454*ca1c9b0cSelric failure. 455*ca1c9b0cSelric 456*ca1c9b0cSelric * Makefile.am: Add krb5/prf.c 457*ca1c9b0cSelric 458*ca1c9b0cSelric * krb5/prf.c: gss_pseudo_random for krb5 459*ca1c9b0cSelric 460*ca1c9b0cSelric * test_context.c: Checks for gss_pseudo_random. 461*ca1c9b0cSelric 462*ca1c9b0cSelric * krb5/gkrb5_err.et: add KG_INPUT_TOO_LONG 463*ca1c9b0cSelric 464*ca1c9b0cSelric * Makefile.am: Add mech/gss_pseudo_random.c 465*ca1c9b0cSelric 466*ca1c9b0cSelric * gssapi/gssapi.h: try to load pseudo_random 467*ca1c9b0cSelric 468*ca1c9b0cSelric * mech/gss_mech_switch.c: try to load pseudo_random 469*ca1c9b0cSelric 470*ca1c9b0cSelric * mech/gss_pseudo_random.c: Add gss_pseudo_random. 471*ca1c9b0cSelric 472*ca1c9b0cSelric * gssapi_mech.h: Add hook for gm_pseudo_random. 473*ca1c9b0cSelric 474*ca1c9b0cSelric2007-01-17 Love Hörnquist Åstrand <lha@it.su.se> 475*ca1c9b0cSelric 476*ca1c9b0cSelric * test_context.c: Don't assume bufer from gss_display_status is 477*ca1c9b0cSelric ok. 478*ca1c9b0cSelric 479*ca1c9b0cSelric * mech/gss_wrap_size_limit.c: Reset out variables. 480*ca1c9b0cSelric 481*ca1c9b0cSelric * mech/gss_wrap.c: Reset out variables. 482*ca1c9b0cSelric 483*ca1c9b0cSelric * mech/gss_verify_mic.c: Reset out variables. 484*ca1c9b0cSelric 485*ca1c9b0cSelric * mech/gss_utils.c: Reset out variables. 486*ca1c9b0cSelric 487*ca1c9b0cSelric * mech/gss_release_oid_set.c: Reset out variables. 488*ca1c9b0cSelric 489*ca1c9b0cSelric * mech/gss_release_cred.c: Reset out variables. 490*ca1c9b0cSelric 491*ca1c9b0cSelric * mech/gss_release_buffer.c: Reset variables. 492*ca1c9b0cSelric 493*ca1c9b0cSelric * mech/gss_oid_to_str.c: Reset out variables. 494*ca1c9b0cSelric 495*ca1c9b0cSelric * mech/gss_inquire_sec_context_by_oid.c: Fix reset out variables. 496*ca1c9b0cSelric 497*ca1c9b0cSelric * mech/gss_mech_switch.c: Reset out variables. 498*ca1c9b0cSelric 499*ca1c9b0cSelric * mech/gss_inquire_sec_context_by_oid.c: Reset out variables. 500*ca1c9b0cSelric 501*ca1c9b0cSelric * mech/gss_inquire_names_for_mech.c: Reset out variables. 502*ca1c9b0cSelric 503*ca1c9b0cSelric * mech/gss_inquire_cred_by_oid.c: Reset out variables. 504*ca1c9b0cSelric 505*ca1c9b0cSelric * mech/gss_inquire_cred_by_oid.c: Reset out variables. 506*ca1c9b0cSelric 507*ca1c9b0cSelric * mech/gss_inquire_cred_by_mech.c: Reset out variables. 508*ca1c9b0cSelric 509*ca1c9b0cSelric * mech/gss_inquire_cred.c: Reset out variables, fix memory leak. 510*ca1c9b0cSelric 511*ca1c9b0cSelric * mech/gss_inquire_context.c: Reset out variables. 512*ca1c9b0cSelric 513*ca1c9b0cSelric * mech/gss_init_sec_context.c: Zero out outbuffer on failure. 514*ca1c9b0cSelric 515*ca1c9b0cSelric * mech/gss_import_name.c: Reset out variables. 516*ca1c9b0cSelric 517*ca1c9b0cSelric * mech/gss_import_name.c: Reset out variables. 518*ca1c9b0cSelric 519*ca1c9b0cSelric * mech/gss_get_mic.c: Reset out variables. 520*ca1c9b0cSelric 521*ca1c9b0cSelric * mech/gss_export_name.c: Reset out variables. 522*ca1c9b0cSelric 523*ca1c9b0cSelric * mech/gss_encapsulate_token.c: Reset out variables. 524*ca1c9b0cSelric 525*ca1c9b0cSelric * mech/gss_duplicate_oid.c: Reset out variables. 526*ca1c9b0cSelric 527*ca1c9b0cSelric * mech/gss_duplicate_oid.c: Reset out variables. 528*ca1c9b0cSelric 529*ca1c9b0cSelric * mech/gss_duplicate_name.c: Reset out variables. 530*ca1c9b0cSelric 531*ca1c9b0cSelric * mech/gss_display_status.c: Reset out variables. 532*ca1c9b0cSelric 533*ca1c9b0cSelric * mech/gss_display_name.c: Reset out variables. 534*ca1c9b0cSelric 535*ca1c9b0cSelric * mech/gss_delete_sec_context.c: Reset out variables using propper 536*ca1c9b0cSelric macros. 537*ca1c9b0cSelric 538*ca1c9b0cSelric * mech/gss_decapsulate_token.c: Reset out variables using propper 539*ca1c9b0cSelric macros. 540*ca1c9b0cSelric 541*ca1c9b0cSelric * mech/gss_add_cred.c: Reset out variables. 542*ca1c9b0cSelric 543*ca1c9b0cSelric * mech/gss_acquire_cred.c: Reset out variables. 544*ca1c9b0cSelric 545*ca1c9b0cSelric * mech/gss_accept_sec_context.c: Reset out variables using propper 546*ca1c9b0cSelric macros. 547*ca1c9b0cSelric 548*ca1c9b0cSelric * mech/gss_init_sec_context.c: Reset out variables. 549*ca1c9b0cSelric 550*ca1c9b0cSelric * mech/mech_locl.h (_mg_buffer_zero): new macro that zaps a 551*ca1c9b0cSelric gss_buffer_t 552*ca1c9b0cSelric 553*ca1c9b0cSelric2007-01-16 Love Hörnquist Åstrand <lha@it.su.se> 554*ca1c9b0cSelric 555*ca1c9b0cSelric * mech: sprinkel _gss_mg_error 556*ca1c9b0cSelric 557*ca1c9b0cSelric * mech/gss_display_status.c (gss_display_status): use 558*ca1c9b0cSelric _gss_mg_get_error to fetch the error from underlaying mech, if it 559*ca1c9b0cSelric failes, let do the regular dance for GSS-CODE version and a 560*ca1c9b0cSelric generic print-the-error code for MECH-CODE. 561*ca1c9b0cSelric 562*ca1c9b0cSelric * mech/gss_oid_to_str.c: Don't include the NUL in the length of 563*ca1c9b0cSelric the string. 564*ca1c9b0cSelric 565*ca1c9b0cSelric * mech/context.h: Protoypes for _gss_mg_. 566*ca1c9b0cSelric 567*ca1c9b0cSelric * mech/context.c: Glue to catch the error from the lower gss-api 568*ca1c9b0cSelric layer and save that for later so gss_display_status() can show the 569*ca1c9b0cSelric error. 570*ca1c9b0cSelric 571*ca1c9b0cSelric * gss.c: Detect NTLM. 572*ca1c9b0cSelric 573*ca1c9b0cSelric2007-01-11 Love Hörnquist Åstrand <lha@it.su.se> 574*ca1c9b0cSelric 575*ca1c9b0cSelric * mech/gss_accept_sec_context.c: spelling 576*ca1c9b0cSelric 577*ca1c9b0cSelric2007-01-04 Love Hörnquist Åstrand <lha@it.su.se> 578*ca1c9b0cSelric 579*ca1c9b0cSelric * Makefile.am: Include build (private) prototypes header files. 580*ca1c9b0cSelric 581*ca1c9b0cSelric * Makefile.am (ntlmsrc): add ntlm/ntlm-private.h 582*ca1c9b0cSelric 583*ca1c9b0cSelric2006-12-28 Love Hörnquist Åstrand <lha@it.su.se> 584*ca1c9b0cSelric 585*ca1c9b0cSelric * ntlm/accept_sec_context.c: Pass signseal argument to 586*ca1c9b0cSelric _gss_ntlm_set_key. 587*ca1c9b0cSelric 588*ca1c9b0cSelric * ntlm/init_sec_context.c: Pass signseal argument to 589*ca1c9b0cSelric _gss_ntlm_set_key. 590*ca1c9b0cSelric 591*ca1c9b0cSelric * ntlm/crypto.c (_gss_ntlm_set_key): add signseal argument 592*ca1c9b0cSelric 593*ca1c9b0cSelric * test_ntlm.c: add ntlmv2 test 594*ca1c9b0cSelric 595*ca1c9b0cSelric * ntlm/ntlm.h: break out struct ntlmv2_key; 596*ca1c9b0cSelric 597*ca1c9b0cSelric * ntlm/crypto.c (_gss_ntlm_set_key): set ntlm v2 keys. 598*ca1c9b0cSelric 599*ca1c9b0cSelric * ntlm/accept_sec_context.c: Set dummy ntlmv2 keys and Check TI. 600*ca1c9b0cSelric 601*ca1c9b0cSelric * ntlm/ntlm.h: NTLMv2 keys. 602*ca1c9b0cSelric 603*ca1c9b0cSelric * ntlm/crypto.c: NTLMv2 sign and verify. 604*ca1c9b0cSelric 605*ca1c9b0cSelric2006-12-20 Love Hörnquist Åstrand <lha@it.su.se> 606*ca1c9b0cSelric 607*ca1c9b0cSelric * ntlm/accept_sec_context.c: Don't send targetinfo now. 608*ca1c9b0cSelric 609*ca1c9b0cSelric * ntlm/init_sec_context.c: Build ntlmv2 answer buffer. 610*ca1c9b0cSelric 611*ca1c9b0cSelric * ntlm/init_sec_context.c: Leak less memory. 612*ca1c9b0cSelric 613*ca1c9b0cSelric * ntlm/init_sec_context.c: Announce that we support key exchange. 614*ca1c9b0cSelric 615*ca1c9b0cSelric * ntlm/init_sec_context.c: Add NTLM_NEG_NTLM2_SESSION, NTLMv2 616*ca1c9b0cSelric session security (disable because missing sign and seal). 617*ca1c9b0cSelric 618*ca1c9b0cSelric2006-12-19 Love Hörnquist Åstrand <lha@it.su.se> 619*ca1c9b0cSelric 620*ca1c9b0cSelric * ntlm/accept_sec_context.c: split RC4 send and recv keystreams 621*ca1c9b0cSelric 622*ca1c9b0cSelric * ntlm/init_sec_context.c: split RC4 send and recv keystreams 623*ca1c9b0cSelric 624*ca1c9b0cSelric * ntlm/ntlm.h: split RC4 send and recv keystreams 625*ca1c9b0cSelric 626*ca1c9b0cSelric * ntlm/crypto.c: Implement SEAL. 627*ca1c9b0cSelric 628*ca1c9b0cSelric * ntlm/crypto.c: move gss_wrap/gss_unwrap here 629*ca1c9b0cSelric 630*ca1c9b0cSelric * test_context.c: request INT and CONF from the gss layer, test 631*ca1c9b0cSelric get and verify MIC. 632*ca1c9b0cSelric 633*ca1c9b0cSelric * ntlm/ntlm.h: add crypto bits. 634*ca1c9b0cSelric 635*ca1c9b0cSelric * ntlm/accept_sec_context.c: Save session master key. 636*ca1c9b0cSelric 637*ca1c9b0cSelric * Makefile.am: Move get and verify mic to the same file (crypto.c) 638*ca1c9b0cSelric since they share code. 639*ca1c9b0cSelric 640*ca1c9b0cSelric * ntlm/crypto.c: Move get and verify mic to the same file since 641*ca1c9b0cSelric they share code, implement NTLM v1 and dummy signatures. 642*ca1c9b0cSelric 643*ca1c9b0cSelric * ntlm/init_sec_context.c: pass on GSS_C_CONF_FLAG and 644*ca1c9b0cSelric GSS_C_INTEG_FLAG, save the session master key 645*ca1c9b0cSelric 646*ca1c9b0cSelric * spnego/accept_sec_context.c: try using gss_accept_sec_context() 647*ca1c9b0cSelric on the opportunistic token instead of guessing the acceptor name 648*ca1c9b0cSelric and do gss_acquire_cred, this make SPNEGO work like before. 649*ca1c9b0cSelric 650*ca1c9b0cSelric2006-12-18 Love Hörnquist Åstrand <lha@it.su.se> 651*ca1c9b0cSelric 652*ca1c9b0cSelric * ntlm/init_sec_context.c: Calculate the NTLM version 1 "master" 653*ca1c9b0cSelric key. 654*ca1c9b0cSelric 655*ca1c9b0cSelric * spnego/accept_sec_context.c: Resurect negHints for the acceptor 656*ca1c9b0cSelric sends first packet. 657*ca1c9b0cSelric 658*ca1c9b0cSelric * Makefile.am: Add "windows" versions of the NegTokenInitWin and 659*ca1c9b0cSelric friends. 660*ca1c9b0cSelric 661*ca1c9b0cSelric * test_context.c: add --wrapunwrap flag 662*ca1c9b0cSelric 663*ca1c9b0cSelric * spnego/compat.c: move _gss_spnego_indicate_mechtypelist() to 664*ca1c9b0cSelric compat.c, use the sequence types of MechTypeList, make 665*ca1c9b0cSelric add_mech_type() static. 666*ca1c9b0cSelric 667*ca1c9b0cSelric * spnego/accept_sec_context.c: move 668*ca1c9b0cSelric _gss_spnego_indicate_mechtypelist() to compat.c 669*ca1c9b0cSelric 670*ca1c9b0cSelric * Makefile.am: Generate sequence code for MechTypeList 671*ca1c9b0cSelric 672*ca1c9b0cSelric * spnego: check that the generated acceptor mechlist is acceptable too 673*ca1c9b0cSelric 674*ca1c9b0cSelric * spnego/init_sec_context.c: Abstract out the initiator filter 675*ca1c9b0cSelric function, it will be needed for the acceptor too. 676*ca1c9b0cSelric 677*ca1c9b0cSelric * spnego/accept_sec_context.c: Abstract out the initiator filter 678*ca1c9b0cSelric function, it will be needed for the acceptor too. Remove negHints. 679*ca1c9b0cSelric 680*ca1c9b0cSelric * test_context.c: allow asserting return mech 681*ca1c9b0cSelric 682*ca1c9b0cSelric * ntlm/accept_sec_context.c: add _gss_ntlm_allocate_ctx 683*ca1c9b0cSelric 684*ca1c9b0cSelric * ntlm/acquire_cred.c: Check that the KDC seem to there and 685*ca1c9b0cSelric answering us, we can't do better then that wen checking if we will 686*ca1c9b0cSelric accept the credential. 687*ca1c9b0cSelric 688*ca1c9b0cSelric * ntlm/get_mic.c: return GSS_S_UNAVAILABLE 689*ca1c9b0cSelric 690*ca1c9b0cSelric * mech/utils.h: add _gss_free_oid, reverse of _gss_copy_oid 691*ca1c9b0cSelric 692*ca1c9b0cSelric * mech/gss_utils.c: add _gss_free_oid, reverse of _gss_copy_oid 693*ca1c9b0cSelric 694*ca1c9b0cSelric * spnego/spnego.asn1: Its very sad, but NegHints its are not part 695*ca1c9b0cSelric of the NegTokenInit, this makes SPNEGO acceptor life a lot harder. 696*ca1c9b0cSelric 697*ca1c9b0cSelric * spnego: try harder to handle names better. handle missing 698*ca1c9b0cSelric acceptor and initator creds better (ie dont propose/accept mech 699*ca1c9b0cSelric that there are no credentials for) split NegTokenInit and 700*ca1c9b0cSelric NegTokenResp in acceptor 701*ca1c9b0cSelric 702*ca1c9b0cSelric2006-12-16 Love Hörnquist Åstrand <lha@it.su.se> 703*ca1c9b0cSelric 704*ca1c9b0cSelric * ntlm/import_name.c: Allocate the buffer from the right length. 705*ca1c9b0cSelric 706*ca1c9b0cSelric2006-12-15 Love Hörnquist Åstrand <lha@it.su.se> 707*ca1c9b0cSelric 708*ca1c9b0cSelric * ntlm/init_sec_context.c (init_sec_context): Tell the other side 709*ca1c9b0cSelric what domain we think we are talking to. 710*ca1c9b0cSelric 711*ca1c9b0cSelric * ntlm/delete_sec_context.c: free username and password 712*ca1c9b0cSelric 713*ca1c9b0cSelric * ntlm/release_name.c (_gss_ntlm_release_name): free name. 714*ca1c9b0cSelric 715*ca1c9b0cSelric * ntlm/import_name.c (_gss_ntlm_import_name): add support for 716*ca1c9b0cSelric GSS_C_NT_HOSTBASED_SERVICE names 717*ca1c9b0cSelric 718*ca1c9b0cSelric * ntlm/ntlm.h: Add ntlm_name. 719*ca1c9b0cSelric 720*ca1c9b0cSelric * test_context.c: allow testing of ntlm. 721*ca1c9b0cSelric 722*ca1c9b0cSelric * gssapi_mech.h: add __gss_ntlm_initialize 723*ca1c9b0cSelric 724*ca1c9b0cSelric * ntlm/accept_sec_context.c (handle_type3): verify that the kdc 725*ca1c9b0cSelric approved of the ntlm exchange too 726*ca1c9b0cSelric 727*ca1c9b0cSelric * mech/gss_mech_switch.c: Add the builtin ntlm mech 728*ca1c9b0cSelric 729*ca1c9b0cSelric * test_ntlm.c: NTLM test app. 730*ca1c9b0cSelric 731*ca1c9b0cSelric * mech/gss_accept_sec_context.c: Add detection of NTLMSSP. 732*ca1c9b0cSelric 733*ca1c9b0cSelric * gssapi/gssapi.h: add ntlm mech oid 734*ca1c9b0cSelric 735*ca1c9b0cSelric * ntlm/external.c: Switch OID to the ms ntlmssp oid 736*ca1c9b0cSelric 737*ca1c9b0cSelric * Makefile.am: Add ntlm gss-api module. 738*ca1c9b0cSelric 739*ca1c9b0cSelric * ntlm/accept_sec_context.c: Catch more error errors. 740*ca1c9b0cSelric 741*ca1c9b0cSelric * ntlm/accept_sec_context.c: Check after a credential to use. 742*ca1c9b0cSelric 743*ca1c9b0cSelric2006-12-14 Love Hörnquist Åstrand <lha@it.su.se> 744*ca1c9b0cSelric 745*ca1c9b0cSelric * krb5/set_sec_context_option.c (GSS_KRB5_SET_DEFAULT_REALM_X): 746*ca1c9b0cSelric don't fail on success. Bug report from Stefan Metzmacher. 747*ca1c9b0cSelric 748*ca1c9b0cSelric2006-12-13 Love Hörnquist Åstrand <lha@it.su.se> 749*ca1c9b0cSelric 750*ca1c9b0cSelric * krb5/init_sec_context.c (init_auth): only turn on 751*ca1c9b0cSelric GSS_C_CONF_FLAG and GSS_C_INT_FLAG if the caller requseted it. 752*ca1c9b0cSelric From Stefan Metzmacher. 753*ca1c9b0cSelric 754*ca1c9b0cSelric2006-12-11 Love Hörnquist Åstrand <lha@it.su.se> 755*ca1c9b0cSelric 756*ca1c9b0cSelric * Makefile.am (libgssapi_la_OBJECTS): depends on gssapi_asn1.h 757*ca1c9b0cSelric spnego_asn1.h. 758*ca1c9b0cSelric 759*ca1c9b0cSelric2006-11-20 Love Hörnquist Åstrand <lha@it.su.se> 760*ca1c9b0cSelric 761*ca1c9b0cSelric * krb5/acquire_cred.c: Make krb5_get_init_creds_opt_free take a 762*ca1c9b0cSelric context argument. 763*ca1c9b0cSelric 764*ca1c9b0cSelric2006-11-16 Love Hörnquist Åstrand <lha@it.su.se> 765*ca1c9b0cSelric 766*ca1c9b0cSelric * test_context.c: Test that token keys are the same, return 767*ca1c9b0cSelric actual_mech. 768*ca1c9b0cSelric 769*ca1c9b0cSelric2006-11-15 Love Hörnquist Åstrand <lha@it.su.se> 770*ca1c9b0cSelric 771*ca1c9b0cSelric * spnego/spnego_locl.h: Make bitfields unsigned, add maybe_open. 772*ca1c9b0cSelric 773*ca1c9b0cSelric * spnego/accept_sec_context.c: Use ASN.1 encoder functions to 774*ca1c9b0cSelric encode CHOICE structure now that we can handle it. 775*ca1c9b0cSelric 776*ca1c9b0cSelric * spnego/init_sec_context.c: Use ASN.1 encoder functions to encode 777*ca1c9b0cSelric CHOICE structure now that we can handle it. 778*ca1c9b0cSelric 779*ca1c9b0cSelric * spnego/accept_sec_context.c (_gss_spnego_accept_sec_context): 780*ca1c9b0cSelric send back ad accept_completed when the security context is ->open, 781*ca1c9b0cSelric w/o this the client doesn't know that the server have completed 782*ca1c9b0cSelric the transaction. 783*ca1c9b0cSelric 784*ca1c9b0cSelric * test_context.c: Add delegate flag and check that the delegated 785*ca1c9b0cSelric cred works. 786*ca1c9b0cSelric 787*ca1c9b0cSelric * spnego/init_sec_context.c: Keep track of the opportunistic token 788*ca1c9b0cSelric in the inital message, it might be a complete gss-api context, in 789*ca1c9b0cSelric that case we'll get back accept_completed without any token. With 790*ca1c9b0cSelric this change, krb5 w/o mutual authentication works. 791*ca1c9b0cSelric 792*ca1c9b0cSelric * spnego/accept_sec_context.c: Use ASN.1 encoder functions to 793*ca1c9b0cSelric encode CHOICE structure now that we can handle it. 794*ca1c9b0cSelric 795*ca1c9b0cSelric * spnego/accept_sec_context.c: Filter out SPNEGO from the out 796*ca1c9b0cSelric supported mechs list and make sure we don't select that for the 797*ca1c9b0cSelric preferred mechamism. 798*ca1c9b0cSelric 799*ca1c9b0cSelric2006-11-14 Love Hörnquist Åstrand <lha@it.su.se> 800*ca1c9b0cSelric 801*ca1c9b0cSelric * mech/gss_init_sec_context.c (_gss_mech_cred_find): break out the 802*ca1c9b0cSelric cred finding to its own function 803*ca1c9b0cSelric 804*ca1c9b0cSelric * krb5/wrap.c: Better error strings, from Andrew Bartlet. 805*ca1c9b0cSelric 806*ca1c9b0cSelric2006-11-13 Love Hörnquist Åstrand <lha@it.su.se> 807*ca1c9b0cSelric 808*ca1c9b0cSelric * test_context.c: Create our own krb5_context. 809*ca1c9b0cSelric 810*ca1c9b0cSelric * krb5: Switch from using a specific error message context in the 811*ca1c9b0cSelric TLS to have a whole krb5_context in TLS. This have some 812*ca1c9b0cSelric interestion side-effekts for the configruration setting options 813*ca1c9b0cSelric since they operate on per-thread basis now. 814*ca1c9b0cSelric 815*ca1c9b0cSelric * mech/gss_set_cred_option.c: When calling ->gm_set_cred_option 816*ca1c9b0cSelric and checking for success, use GSS_S_COMPLETE. From Andrew Bartlet. 817*ca1c9b0cSelric 818*ca1c9b0cSelric2006-11-12 Love Hörnquist Åstrand <lha@it.su.se> 819*ca1c9b0cSelric 820*ca1c9b0cSelric * Makefile.am: Help solaris make even more. 821*ca1c9b0cSelric 822*ca1c9b0cSelric * Makefile.am: Help solaris make. 823*ca1c9b0cSelric 824*ca1c9b0cSelric2006-11-09 Love Hörnquist Åstrand <lha@it.su.se> 825*ca1c9b0cSelric 826*ca1c9b0cSelric * Makefile.am: remove include $(srcdir)/Makefile-digest.am for now 827*ca1c9b0cSelric 828*ca1c9b0cSelric * mech/gss_accept_sec_context.c: Try better guessing what is mech 829*ca1c9b0cSelric we are going to select by looking harder at the input_token, idea 830*ca1c9b0cSelric from Luke Howard's mechglue branch. 831*ca1c9b0cSelric 832*ca1c9b0cSelric * Makefile.am: libgssapi_la_OBJECTS: add depency on gkrb5_err.h 833*ca1c9b0cSelric 834*ca1c9b0cSelric * gssapi/gssapi_krb5.h: add GSS_KRB5_SET_ALLOWABLE_ENCTYPES_X 835*ca1c9b0cSelric 836*ca1c9b0cSelric * mech/gss_krb5.c: implement gss_krb5_set_allowable_enctypes 837*ca1c9b0cSelric 838*ca1c9b0cSelric * gssapi/gssapi.h: GSS_KRB5_S_ 839*ca1c9b0cSelric 840*ca1c9b0cSelric * krb5/gsskrb5_locl.h: Include <gkrb5_err.h>. 841*ca1c9b0cSelric 842*ca1c9b0cSelric * gssapi/gssapi_krb5.h: Add gss_krb5_set_allowable_enctypes. 843*ca1c9b0cSelric 844*ca1c9b0cSelric * Makefile.am: Build and install gkrb5_err.h 845*ca1c9b0cSelric 846*ca1c9b0cSelric * krb5/gkrb5_err.et: Move the GSS_KRB5_S error here. 847*ca1c9b0cSelric 848*ca1c9b0cSelric2006-11-08 Love Hörnquist Åstrand <lha@it.su.se> 849*ca1c9b0cSelric 850*ca1c9b0cSelric * mech/gss_krb5.c: Add gsskrb5_set_default_realm. 851*ca1c9b0cSelric 852*ca1c9b0cSelric * krb5/set_sec_context_option.c: Support 853*ca1c9b0cSelric GSS_KRB5_SET_DEFAULT_REALM_X. 854*ca1c9b0cSelric 855*ca1c9b0cSelric * gssapi/gssapi_krb5.h: add GSS_KRB5_SET_DEFAULT_REALM_X 856*ca1c9b0cSelric 857*ca1c9b0cSelric * krb5/external.c: add GSS_KRB5_SET_DEFAULT_REALM_X 858*ca1c9b0cSelric 859*ca1c9b0cSelric2006-11-07 Love Hörnquist Åstrand <lha@it.su.se> 860*ca1c9b0cSelric 861*ca1c9b0cSelric * test_context.c: rename krb5_[gs]et_time_wrap to 862*ca1c9b0cSelric krb5_[gs]et_max_time_skew 863*ca1c9b0cSelric 864*ca1c9b0cSelric * krb5/copy_ccache.c: _gsskrb5_extract_authz_data_from_sec_context 865*ca1c9b0cSelric no longer used, bye bye 866*ca1c9b0cSelric 867*ca1c9b0cSelric * mech/gss_krb5.c: No depenency of the krb5 gssapi mech. 868*ca1c9b0cSelric 869*ca1c9b0cSelric * mech/gss_krb5.c (gsskrb5_extract_authtime_from_sec_context): use 870*ca1c9b0cSelric _gsskrb5_decode_om_uint32. From Andrew Bartlet. 871*ca1c9b0cSelric 872*ca1c9b0cSelric * mech/gss_krb5.c: Add dummy gss_krb5_set_allowable_enctypes for 873*ca1c9b0cSelric now. 874*ca1c9b0cSelric 875*ca1c9b0cSelric * spnego/spnego_locl.h: Include <roken.h> for compatiblity. 876*ca1c9b0cSelric 877*ca1c9b0cSelric * krb5/arcfour.c: Use IS_DCE_STYLE flag. There is no padding in 878*ca1c9b0cSelric DCE-STYLE, don't try to use to. From Andrew Bartlett. 879*ca1c9b0cSelric 880*ca1c9b0cSelric * test_context.c: test wrap/unwrap, add flag for dce-style and 881*ca1c9b0cSelric mutual auth, also support multi-roundtrip sessions 882*ca1c9b0cSelric 883*ca1c9b0cSelric * krb5/gsskrb5_locl.h: Add IS_DCE_STYLE macro. 884*ca1c9b0cSelric 885*ca1c9b0cSelric * krb5/accept_sec_context.c (gsskrb5_acceptor_start): use 886*ca1c9b0cSelric krb5_rd_req_ctx 887*ca1c9b0cSelric 888*ca1c9b0cSelric * mech/gss_krb5.c (gsskrb5_get_subkey): return the per message 889*ca1c9b0cSelric token subkey 890*ca1c9b0cSelric 891*ca1c9b0cSelric * krb5/inquire_sec_context_by_oid.c: check if there is any key at 892*ca1c9b0cSelric all 893*ca1c9b0cSelric 894*ca1c9b0cSelric2006-11-06 Love Hörnquist Åstrand <lha@it.su.se> 895*ca1c9b0cSelric 896*ca1c9b0cSelric * krb5/inquire_sec_context_by_oid.c: Set more error strings, use 897*ca1c9b0cSelric right enum for acceptor subkey. From Andrew Bartlett. 898*ca1c9b0cSelric 899*ca1c9b0cSelric2006-11-04 Love Hörnquist Åstrand <lha@it.su.se> 900*ca1c9b0cSelric 901*ca1c9b0cSelric * test_context.c: Test gsskrb5_extract_service_keyblock, needed in 902*ca1c9b0cSelric PAC valication. From Andrew Bartlett 903*ca1c9b0cSelric 904*ca1c9b0cSelric * mech/gss_krb5.c: Add gsskrb5_extract_authz_data_from_sec_context 905*ca1c9b0cSelric and keyblock extraction functions. 906*ca1c9b0cSelric 907*ca1c9b0cSelric * gssapi/gssapi_krb5.h: Add extraction of keyblock function, from 908*ca1c9b0cSelric Andrew Bartlett. 909*ca1c9b0cSelric 910*ca1c9b0cSelric * krb5/external.c: Add GSS_KRB5_GET_SERVICE_KEYBLOCK_X 911*ca1c9b0cSelric 912*ca1c9b0cSelric2006-11-03 Love Hörnquist Åstrand <lha@it.su.se> 913*ca1c9b0cSelric 914*ca1c9b0cSelric * test_context.c: Rename various routines and constants from 915*ca1c9b0cSelric canonize to canonicalize. From Andrew Bartlett 916*ca1c9b0cSelric 917*ca1c9b0cSelric * mech/gss_krb5.c: Rename various routines and constants from 918*ca1c9b0cSelric canonize to canonicalize. From Andrew Bartlett 919*ca1c9b0cSelric 920*ca1c9b0cSelric * krb5/set_sec_context_option.c: Rename various routines and 921*ca1c9b0cSelric constants from canonize to canonicalize. From Andrew Bartlett 922*ca1c9b0cSelric 923*ca1c9b0cSelric * krb5/external.c: Rename various routines and constants from 924*ca1c9b0cSelric canonize to canonicalize. From Andrew Bartlett 925*ca1c9b0cSelric 926*ca1c9b0cSelric * gssapi/gssapi_krb5.h: Rename various routines and constants from 927*ca1c9b0cSelric canonize to canonicalize. From Andrew Bartlett 928*ca1c9b0cSelric 929*ca1c9b0cSelric2006-10-25 Love Hörnquist Åstrand <lha@it.su.se> 930*ca1c9b0cSelric 931*ca1c9b0cSelric * krb5/accept_sec_context.c (gsskrb5_accept_delegated_token): need 932*ca1c9b0cSelric to free ccache 933*ca1c9b0cSelric 934*ca1c9b0cSelric2006-10-24 Love Hörnquist Åstrand <lha@it.su.se> 935*ca1c9b0cSelric 936*ca1c9b0cSelric * test_context.c (loop): free target_name 937*ca1c9b0cSelric 938*ca1c9b0cSelric * mech/gss_accept_sec_context.c: SLIST_INIT the ->gc_mc' 939*ca1c9b0cSelric 940*ca1c9b0cSelric * mech/gss_acquire_cred.c : SLIST_INIT the ->gc_mc' 941*ca1c9b0cSelric 942*ca1c9b0cSelric * krb5/init_sec_context.c: Avoid leaking memory. 943*ca1c9b0cSelric 944*ca1c9b0cSelric * mech/gss_buffer_set.c (gss_release_buffer_set): don't leak the 945*ca1c9b0cSelric ->elements memory. 946*ca1c9b0cSelric 947*ca1c9b0cSelric * test_context.c: make compile 948*ca1c9b0cSelric 949*ca1c9b0cSelric * krb5/cfx.c (_gssapi_verify_mic_cfx): always free crypto context. 950*ca1c9b0cSelric 951*ca1c9b0cSelric * krb5/set_cred_option.c (import_cred): free sp 952*ca1c9b0cSelric 953*ca1c9b0cSelric2006-10-22 Love Hörnquist Åstrand <lha@it.su.se> 954*ca1c9b0cSelric 955*ca1c9b0cSelric * mech/gss_add_oid_set_member.c: Use old implementation of 956*ca1c9b0cSelric gss_add_oid_set_member, it leaks less memory. 957*ca1c9b0cSelric 958*ca1c9b0cSelric * krb5/test_cfx.c: free krb5_crypto. 959*ca1c9b0cSelric 960*ca1c9b0cSelric * krb5/test_cfx.c: free krb5_context 961*ca1c9b0cSelric 962*ca1c9b0cSelric * mech/gss_release_name.c (gss_release_name): free input_name 963*ca1c9b0cSelric it-self. 964*ca1c9b0cSelric 965*ca1c9b0cSelric2006-10-21 Love Hörnquist Åstrand <lha@it.su.se> 966*ca1c9b0cSelric 967*ca1c9b0cSelric * test_context.c: Call setprogname. 968*ca1c9b0cSelric 969*ca1c9b0cSelric * mech/gss_krb5.c: Add gsskrb5_extract_authtime_from_sec_context. 970*ca1c9b0cSelric 971*ca1c9b0cSelric * gssapi/gssapi_krb5.h: add 972*ca1c9b0cSelric gsskrb5_extract_authtime_from_sec_context 973*ca1c9b0cSelric 974*ca1c9b0cSelric2006-10-20 Love Hörnquist Åstrand <lha@it.su.se> 975*ca1c9b0cSelric 976*ca1c9b0cSelric * krb5/inquire_sec_context_by_oid.c: Add get_authtime. 977*ca1c9b0cSelric 978*ca1c9b0cSelric * krb5/external.c: add GSS_KRB5_GET_AUTHTIME_X 979*ca1c9b0cSelric 980*ca1c9b0cSelric * gssapi/gssapi_krb5.h: add GSS_KRB5_GET_AUTHTIME_X 981*ca1c9b0cSelric 982*ca1c9b0cSelric * krb5/set_sec_context_option.c: Implement GSS_KRB5_SEND_TO_KDC_X. 983*ca1c9b0cSelric 984*ca1c9b0cSelric * mech/gss_krb5.c: Add gsskrb5_set_send_to_kdc 985*ca1c9b0cSelric 986*ca1c9b0cSelric * gssapi/gssapi_krb5.h: Add GSS_KRB5_SEND_TO_KDC_X and 987*ca1c9b0cSelric gsskrb5_set_send_to_kdc 988*ca1c9b0cSelric 989*ca1c9b0cSelric * krb5/external.c: add GSS_KRB5_SEND_TO_KDC_X 990*ca1c9b0cSelric 991*ca1c9b0cSelric * Makefile.am: more files 992*ca1c9b0cSelric 993*ca1c9b0cSelric2006-10-19 Love Hörnquist Åstrand <lha@it.su.se> 994*ca1c9b0cSelric 995*ca1c9b0cSelric * Makefile.am: remove spnego/gssapi_spnego.h, its now in gssapi/ 996*ca1c9b0cSelric 997*ca1c9b0cSelric * test_context.c: Allow specifing mech. 998*ca1c9b0cSelric 999*ca1c9b0cSelric * krb5/external.c: add GSS_SASL_DIGEST_MD5_MECHANISM (for now) 1000*ca1c9b0cSelric 1001*ca1c9b0cSelric * gssapi/gssapi.h: Rename GSS_DIGEST_MECHANISM to 1002*ca1c9b0cSelric GSS_SASL_DIGEST_MD5_MECHANISM 1003*ca1c9b0cSelric 1004*ca1c9b0cSelric2006-10-18 Love Hörnquist Åstrand <lha@it.su.se> 1005*ca1c9b0cSelric 1006*ca1c9b0cSelric * mech/gssapi.asn1: Make it into a heim_any_set, its doesn't 1007*ca1c9b0cSelric except a tag. 1008*ca1c9b0cSelric 1009*ca1c9b0cSelric * mech/gssapi.asn1: GSSAPIContextToken is IMPLICIT SEQUENCE 1010*ca1c9b0cSelric 1011*ca1c9b0cSelric * gssapi/gssapi_krb5.h: add GSS_KRB5_GET_ACCEPTOR_SUBKEY_X 1012*ca1c9b0cSelric 1013*ca1c9b0cSelric * krb5/external.c: Add GSS_KRB5_GET_ACCEPTOR_SUBKEY_X. 1014*ca1c9b0cSelric 1015*ca1c9b0cSelric * gssapi/gssapi_krb5.h: add GSS_KRB5_GET_INITIATOR_SUBKEY_X and 1016*ca1c9b0cSelric GSS_KRB5_GET_SUBKEY_X 1017*ca1c9b0cSelric 1018*ca1c9b0cSelric * krb5/external.c: add GSS_KRB5_GET_INITIATOR_SUBKEY_X, 1019*ca1c9b0cSelric GSS_KRB5_GET_SUBKEY_X 1020*ca1c9b0cSelric 1021*ca1c9b0cSelric2006-10-17 Love Hörnquist Åstrand <lha@it.su.se> 1022*ca1c9b0cSelric 1023*ca1c9b0cSelric * test_context.c: Support switching on name type oid's 1024*ca1c9b0cSelric 1025*ca1c9b0cSelric * test_context.c: add test for dns canon flag 1026*ca1c9b0cSelric 1027*ca1c9b0cSelric * mech/gss_krb5.c: Add gsskrb5_set_dns_canonlize. 1028*ca1c9b0cSelric 1029*ca1c9b0cSelric * gssapi/gssapi_krb5.h: remove gss_krb5_compat_des3_mic 1030*ca1c9b0cSelric 1031*ca1c9b0cSelric * gssapi/gssapi_krb5.h: Add gsskrb5_set_dns_canonlize. 1032*ca1c9b0cSelric 1033*ca1c9b0cSelric * krb5/set_sec_context_option.c: implement 1034*ca1c9b0cSelric GSS_KRB5_SET_DNS_CANONIZE_X 1035*ca1c9b0cSelric 1036*ca1c9b0cSelric * gssapi/gssapi_krb5.h: add GSS_KRB5_SET_DNS_CANONIZE_X 1037*ca1c9b0cSelric 1038*ca1c9b0cSelric * krb5/external.c: add GSS_KRB5_SET_DNS_CANONIZE_X 1039*ca1c9b0cSelric 1040*ca1c9b0cSelric * mech/gss_krb5.c: add bits to make lucid context work 1041*ca1c9b0cSelric 1042*ca1c9b0cSelric2006-10-14 Love Hörnquist Åstrand <lha@it.su.se> 1043*ca1c9b0cSelric 1044*ca1c9b0cSelric * mech/gss_oid_to_str.c: Prefix der primitives with der_. 1045*ca1c9b0cSelric 1046*ca1c9b0cSelric * krb5/inquire_sec_context_by_oid.c: Prefix der primitives with 1047*ca1c9b0cSelric der_. 1048*ca1c9b0cSelric 1049*ca1c9b0cSelric * krb5/encapsulate.c: Prefix der primitives with der_. 1050*ca1c9b0cSelric 1051*ca1c9b0cSelric * mech/gss_oid_to_str.c: New der_print_heim_oid signature. 1052*ca1c9b0cSelric 1053*ca1c9b0cSelric2006-10-12 Love Hörnquist Åstrand <lha@it.su.se> 1054*ca1c9b0cSelric 1055*ca1c9b0cSelric * Makefile.am: add test_context 1056*ca1c9b0cSelric 1057*ca1c9b0cSelric * krb5/inquire_sec_context_by_oid.c: Make it work. 1058*ca1c9b0cSelric 1059*ca1c9b0cSelric * test_oid.c: Test lucid oid. 1060*ca1c9b0cSelric 1061*ca1c9b0cSelric * gssapi/gssapi.h: Add OM_uint64_t. 1062*ca1c9b0cSelric 1063*ca1c9b0cSelric * krb5/inquire_sec_context_by_oid.c: Add lucid interface. 1064*ca1c9b0cSelric 1065*ca1c9b0cSelric * krb5/external.c: Add lucid interface, renumber oids to my 1066*ca1c9b0cSelric delegated space. 1067*ca1c9b0cSelric 1068*ca1c9b0cSelric * mech/gss_krb5.c: Add lucid interface. 1069*ca1c9b0cSelric 1070*ca1c9b0cSelric * gssapi/gssapi_krb5.h: Add lucid interface. 1071*ca1c9b0cSelric 1072*ca1c9b0cSelric * spnego/spnego_locl.h: Maybe include <netdb.h>. 1073*ca1c9b0cSelric 1074*ca1c9b0cSelric2006-10-09 Love Hörnquist Åstrand <lha@it.su.se> 1075*ca1c9b0cSelric 1076*ca1c9b0cSelric * mech/gss_mech_switch.c: define RTLD_LOCAL to 0 if not defined. 1077*ca1c9b0cSelric 1078*ca1c9b0cSelric2006-10-08 Love Hörnquist Åstrand <lha@it.su.se> 1079*ca1c9b0cSelric 1080*ca1c9b0cSelric * Makefile.am: install gssapi_krb5.H and gssapi_spnego.h 1081*ca1c9b0cSelric 1082*ca1c9b0cSelric * gssapi/gssapi_krb5.h: Move krb5 stuff to <gssapi/gssapi_krb5.h>. 1083*ca1c9b0cSelric 1084*ca1c9b0cSelric * gssapi/gssapi.h: Move krb5 stuff to <gssapi/gssapi_krb5.h>. 1085*ca1c9b0cSelric 1086*ca1c9b0cSelric * Makefile.am: Drop some -I no longer needed. 1087*ca1c9b0cSelric 1088*ca1c9b0cSelric * gssapi/gssapi_spnego.h: Move gssapi_spengo.h over here. 1089*ca1c9b0cSelric 1090*ca1c9b0cSelric * krb5: reference all include files using 'krb5/' 1091*ca1c9b0cSelric 1092*ca1c9b0cSelric2006-10-07 Love Hörnquist Åstrand <lha@it.su.se> 1093*ca1c9b0cSelric 1094*ca1c9b0cSelric * gssapi.h: Add file inclusion protection. 1095*ca1c9b0cSelric 1096*ca1c9b0cSelric * gssapi/gssapi.h: Correct header file inclusion protection. 1097*ca1c9b0cSelric 1098*ca1c9b0cSelric * gssapi/gssapi.h: Move the gssapi.h from lib/gssapi/ to 1099*ca1c9b0cSelric lib/gssapi/gssapi/ to please automake. 1100*ca1c9b0cSelric 1101*ca1c9b0cSelric * spnego/spnego_locl.h: Maybe include <sys/types.h>. 1102*ca1c9b0cSelric 1103*ca1c9b0cSelric * mech/mech_locl.h: Include <roken.h>. 1104*ca1c9b0cSelric 1105*ca1c9b0cSelric * Makefile.am: split build files into dist_ and noinst_ SOURCES 1106*ca1c9b0cSelric 1107*ca1c9b0cSelric2006-10-06 Love Hörnquist Åstrand <lha@it.su.se> 1108*ca1c9b0cSelric 1109*ca1c9b0cSelric * gss.c: #if 0 out unused code. 1110*ca1c9b0cSelric 1111*ca1c9b0cSelric * mech/gss_mech_switch.c: Cast argument to ctype(3) functions 1112*ca1c9b0cSelric to (unsigned char). 1113*ca1c9b0cSelric 1114*ca1c9b0cSelric2006-10-05 Love Hörnquist Åstrand <lha@it.su.se> 1115*ca1c9b0cSelric 1116*ca1c9b0cSelric * mech/name.h: remove <sys/queue.h> 1117*ca1c9b0cSelric 1118*ca1c9b0cSelric * mech/mech_switch.h: remove <sys/queue.h> 1119*ca1c9b0cSelric 1120*ca1c9b0cSelric * mech/cred.h: remove <sys/queue.h> 1121*ca1c9b0cSelric 1122*ca1c9b0cSelric2006-10-02 Love Hörnquist Åstrand <lha@it.su.se> 1123*ca1c9b0cSelric 1124*ca1c9b0cSelric * krb5/arcfour.c: Thinker more with header lengths. 1125*ca1c9b0cSelric 1126*ca1c9b0cSelric * krb5/arcfour.c: Improve the calcucation of header 1127*ca1c9b0cSelric lengths. DCE-STYLE data is also padded so remove if (1 || ...) 1128*ca1c9b0cSelric code. 1129*ca1c9b0cSelric 1130*ca1c9b0cSelric * krb5/wrap.c (_gsskrb5_wrap_size_limit): use 1131*ca1c9b0cSelric _gssapi_wrap_size_arcfour for arcfour 1132*ca1c9b0cSelric 1133*ca1c9b0cSelric * krb5/arcfour.c: Move _gssapi_wrap_size_arcfour here. 1134*ca1c9b0cSelric 1135*ca1c9b0cSelric * Makefile.am: Split all mech to diffrent mechsrc variables. 1136*ca1c9b0cSelric 1137*ca1c9b0cSelric * spnego/context_stubs.c: Make internal function static (and 1138*ca1c9b0cSelric rename). 1139*ca1c9b0cSelric 1140*ca1c9b0cSelric2006-10-01 Love Hörnquist Åstrand <lha@it.su.se> 1141*ca1c9b0cSelric 1142*ca1c9b0cSelric * krb5/inquire_cred.c: Fix "if (x) lock(y)" bug. From Harald 1143*ca1c9b0cSelric Barth. 1144*ca1c9b0cSelric 1145*ca1c9b0cSelric * spnego/spnego_locl.h: Include <sys/param.h> for MAXHOSTNAMELEN. 1146*ca1c9b0cSelric 1147*ca1c9b0cSelric2006-09-25 Love Hörnquist Åstrand <lha@it.su.se> 1148*ca1c9b0cSelric 1149*ca1c9b0cSelric * krb5/arcfour.c: Add wrap support, interrop with itself but not 1150*ca1c9b0cSelric w2k3s-sp1 1151*ca1c9b0cSelric 1152*ca1c9b0cSelric * krb5/gsskrb5_locl.h: move the arcfour specific stuff to the 1153*ca1c9b0cSelric arcfour header. 1154*ca1c9b0cSelric 1155*ca1c9b0cSelric * krb5/arcfour.c: Support DCE-style unwrap, tested with 1156*ca1c9b0cSelric w2k3server-sp1. 1157*ca1c9b0cSelric 1158*ca1c9b0cSelric * mech/gss_accept_sec_context.c (gss_accept_sec_context): if the 1159*ca1c9b0cSelric token doesn't start with [APPLICATION 0] SEQUENCE, lets assume its 1160*ca1c9b0cSelric a DCE-style kerberos 5 connection. XXX this needs to be made 1161*ca1c9b0cSelric better in cause we get another GSS-API protocol violating 1162*ca1c9b0cSelric protocol. It should be possible to detach the Kerberos DCE-style 1163*ca1c9b0cSelric since it starts with a AP-REQ PDU, but that have to wait for now. 1164*ca1c9b0cSelric 1165*ca1c9b0cSelric2006-09-22 Love Hörnquist Åstrand <lha@it.su.se> 1166*ca1c9b0cSelric 1167*ca1c9b0cSelric * gssapi.h: Add GSS_C flags from 1168*ca1c9b0cSelric draft-brezak-win2k-krb-rc4-hmac-04.txt. 1169*ca1c9b0cSelric 1170*ca1c9b0cSelric * krb5/delete_sec_context.c: Free service_keyblock and fwd_data, 1171*ca1c9b0cSelric indent. 1172*ca1c9b0cSelric 1173*ca1c9b0cSelric * krb5/accept_sec_context.c: Merge of the acceptor part from the 1174*ca1c9b0cSelric samba patch by Stefan Metzmacher and Andrew Bartlet. 1175*ca1c9b0cSelric 1176*ca1c9b0cSelric * krb5/init_sec_context.c: Add GSS_C_DCE_STYLE. 1177*ca1c9b0cSelric 1178*ca1c9b0cSelric * krb5/{init_sec_context.c,gsskrb5_locl.h}: merge most of the 1179*ca1c9b0cSelric initiator part from the samba patch by Stefan Metzmacher and 1180*ca1c9b0cSelric Andrew Bartlet (still missing DCE/RPC support) 1181*ca1c9b0cSelric 1182*ca1c9b0cSelric2006-08-28 Love Hörnquist Åstrand <lha@it.su.se> 1183*ca1c9b0cSelric 1184*ca1c9b0cSelric * gss.c (help): use sl_slc_help(). 1185*ca1c9b0cSelric 1186*ca1c9b0cSelric2006-07-22 Love Hörnquist Åstrand <lha@it.su.se> 1187*ca1c9b0cSelric 1188*ca1c9b0cSelric * gss-commands.in: rename command to supported-mechanisms 1189*ca1c9b0cSelric 1190*ca1c9b0cSelric * Makefile.am: Make gss objects depend on the slc built 1191*ca1c9b0cSelric gss-commands.h 1192*ca1c9b0cSelric 1193*ca1c9b0cSelric2006-07-20 Love Hörnquist Åstrand <lha@it.su.se> 1194*ca1c9b0cSelric 1195*ca1c9b0cSelric * gss-commands.in: add slc commands for gss 1196*ca1c9b0cSelric 1197*ca1c9b0cSelric * krb5/gsskrb5_locl.h: Remove dup prototype of _gsskrb5_init() 1198*ca1c9b0cSelric 1199*ca1c9b0cSelric * Makefile.am: Add test_cfx 1200*ca1c9b0cSelric 1201*ca1c9b0cSelric * krb5/external.c: add GSS_KRB5_REGISTER_ACCEPTOR_IDENTITY_X 1202*ca1c9b0cSelric 1203*ca1c9b0cSelric * krb5/set_sec_context_option.c: catch 1204*ca1c9b0cSelric GSS_KRB5_REGISTER_ACCEPTOR_IDENTITY_X 1205*ca1c9b0cSelric 1206*ca1c9b0cSelric * krb5/accept_sec_context.c: reimplement 1207*ca1c9b0cSelric gsskrb5_register_acceptor_identity 1208*ca1c9b0cSelric 1209*ca1c9b0cSelric * mech/gss_krb5.c: implement gsskrb5_register_acceptor_identity 1210*ca1c9b0cSelric 1211*ca1c9b0cSelric * mech/gss_inquire_mechs_for_name.c: call _gss_load_mech 1212*ca1c9b0cSelric 1213*ca1c9b0cSelric * mech/gss_inquire_cred.c (gss_inquire_cred): call _gss_load_mech 1214*ca1c9b0cSelric 1215*ca1c9b0cSelric * mech/gss_mech_switch.c: Make _gss_load_mech() atomic and run 1216*ca1c9b0cSelric only once, this have the side effect that _gss_mechs and 1217*ca1c9b0cSelric _gss_mech_oids is only initialized once, so if just the users of 1218*ca1c9b0cSelric these two global variables calls _gss_load_mech() first, it will 1219*ca1c9b0cSelric act as a barrier and make sure the variables are never changed and 1220*ca1c9b0cSelric we don't need to lock them. 1221*ca1c9b0cSelric 1222*ca1c9b0cSelric * mech/utils.h: no need to mark functions extern. 1223*ca1c9b0cSelric 1224*ca1c9b0cSelric * mech/name.h: no need to mark _gss_find_mn extern. 1225*ca1c9b0cSelric 1226*ca1c9b0cSelric2006-07-19 Love Hörnquist Åstrand <lha@it.su.se> 1227*ca1c9b0cSelric 1228*ca1c9b0cSelric * krb5/cfx.c: Redo the wrap length calculations. 1229*ca1c9b0cSelric 1230*ca1c9b0cSelric * krb5/test_cfx.c: test max_wrap_size in cfx.c 1231*ca1c9b0cSelric 1232*ca1c9b0cSelric * mech/gss_display_status.c: Handle more error codes. 1233*ca1c9b0cSelric 1234*ca1c9b0cSelric2006-07-07 Love Hörnquist Åstrand <lha@it.su.se> 1235*ca1c9b0cSelric 1236*ca1c9b0cSelric * mech/mech_locl.h: Include <krb5-types.h> and "mechqueue.h" 1237*ca1c9b0cSelric 1238*ca1c9b0cSelric * mech/mechqueue.h: Add SLIST macros. 1239*ca1c9b0cSelric 1240*ca1c9b0cSelric * krb5/inquire_context.c: Don't free return values on success. 1241*ca1c9b0cSelric 1242*ca1c9b0cSelric * krb5/inquire_cred.c (_gsskrb5_inquire_cred): When cred provided 1243*ca1c9b0cSelric is the default cred, acquire the acceptor cred and initator cred 1244*ca1c9b0cSelric in two diffrent steps and then query them for the information, 1245*ca1c9b0cSelric this way, the code wont fail if there are no keytab, but there is 1246*ca1c9b0cSelric a credential cache. 1247*ca1c9b0cSelric 1248*ca1c9b0cSelric * mech/gss_inquire_cred.c: move the check if we found any cred 1249*ca1c9b0cSelric where it matter for both cases 1250*ca1c9b0cSelric (default cred and provided cred) 1251*ca1c9b0cSelric 1252*ca1c9b0cSelric * mech/gss_init_sec_context.c: If the desired mechanism can't 1253*ca1c9b0cSelric convert the name to a MN, fail with GSS_S_BAD_NAME rather then a 1254*ca1c9b0cSelric NULL de-reference. 1255*ca1c9b0cSelric 1256*ca1c9b0cSelric2006-07-06 Love Hörnquist Åstrand <lha@it.su.se> 1257*ca1c9b0cSelric 1258*ca1c9b0cSelric * spnego/external.c: readd gss_spnego_inquire_names_for_mech 1259*ca1c9b0cSelric 1260*ca1c9b0cSelric * spnego/spnego_locl.h: reimplement 1261*ca1c9b0cSelric gss_spnego_inquire_names_for_mech add support function 1262*ca1c9b0cSelric _gss_spnego_supported_mechs 1263*ca1c9b0cSelric 1264*ca1c9b0cSelric * spnego/context_stubs.h: reimplement 1265*ca1c9b0cSelric gss_spnego_inquire_names_for_mech add support function 1266*ca1c9b0cSelric _gss_spnego_supported_mechs 1267*ca1c9b0cSelric 1268*ca1c9b0cSelric * spnego/context_stubs.c: drop gss_spnego_indicate_mechs 1269*ca1c9b0cSelric 1270*ca1c9b0cSelric * mech/gss_indicate_mechs.c: if the underlaying mech doesn't 1271*ca1c9b0cSelric support gss_indicate_mechs, use the oid in the mechswitch 1272*ca1c9b0cSelric structure 1273*ca1c9b0cSelric 1274*ca1c9b0cSelric * spnego/external.c: let the mech glue layer implement 1275*ca1c9b0cSelric gss_indicate_mechs 1276*ca1c9b0cSelric 1277*ca1c9b0cSelric * spnego/cred_stubs.c (gss_spnego_acquire_cred): don't care about 1278*ca1c9b0cSelric desired_mechs, get our own list with indicate_mechs and remove 1279*ca1c9b0cSelric ourself. 1280*ca1c9b0cSelric 1281*ca1c9b0cSelric2006-07-05 Love Hörnquist Åstrand <lha@it.su.se> 1282*ca1c9b0cSelric 1283*ca1c9b0cSelric * spnego/external.c: remove gss_spnego_inquire_names_for_mech, let 1284*ca1c9b0cSelric the mechglue layer implement it 1285*ca1c9b0cSelric 1286*ca1c9b0cSelric * spnego/context_stubs.c: remove gss_spnego_inquire_names_for_mech, let 1287*ca1c9b0cSelric the mechglue layer implement it 1288*ca1c9b0cSelric 1289*ca1c9b0cSelric * spnego/spnego_locl.c: remove gss_spnego_inquire_names_for_mech, let 1290*ca1c9b0cSelric the mechglue layer implement it 1291*ca1c9b0cSelric 1292*ca1c9b0cSelric2006-07-01 Love Hörnquist Åstrand <lha@it.su.se> 1293*ca1c9b0cSelric 1294*ca1c9b0cSelric * mech/gss_set_cred_option.c: fix argument to gss_release_cred 1295*ca1c9b0cSelric 1296*ca1c9b0cSelric2006-06-30 Love Hörnquist Åstrand <lha@it.su.se> 1297*ca1c9b0cSelric 1298*ca1c9b0cSelric * krb5/init_sec_context.c: Make work on compilers that are 1299*ca1c9b0cSelric somewhat more picky then gcc4 (like gcc2.95) 1300*ca1c9b0cSelric 1301*ca1c9b0cSelric * krb5/init_sec_context.c (do_delegation): use KDCOptions2int to 1302*ca1c9b0cSelric convert fwd_flags to an integer, since otherwise int2KDCOptions in 1303*ca1c9b0cSelric krb5_get_forwarded_creds wont do the right thing. 1304*ca1c9b0cSelric 1305*ca1c9b0cSelric * mech/gss_set_cred_option.c (gss_set_cred_option): free memory on 1306*ca1c9b0cSelric failure 1307*ca1c9b0cSelric 1308*ca1c9b0cSelric * krb5/set_sec_context_option.c (_gsskrb5_set_sec_context_option): 1309*ca1c9b0cSelric init global kerberos context 1310*ca1c9b0cSelric 1311*ca1c9b0cSelric * krb5/set_cred_option.c (_gsskrb5_set_cred_option): init global 1312*ca1c9b0cSelric kerberos context 1313*ca1c9b0cSelric 1314*ca1c9b0cSelric * mech/gss_accept_sec_context.c: Insert the delegated sub cred on 1315*ca1c9b0cSelric the delegated cred handle, not cred handle 1316*ca1c9b0cSelric 1317*ca1c9b0cSelric * mech/gss_accept_sec_context.c (gss_accept_sec_context): handle 1318*ca1c9b0cSelric the case where ret_flags == NULL 1319*ca1c9b0cSelric 1320*ca1c9b0cSelric * mech/gss_mech_switch.c (add_builtin): set 1321*ca1c9b0cSelric _gss_mech_switch->gm_mech_oid 1322*ca1c9b0cSelric 1323*ca1c9b0cSelric * mech/gss_set_cred_option.c (gss_set_cred_option): laod mechs 1324*ca1c9b0cSelric 1325*ca1c9b0cSelric * test_cred.c (gss_print_errors): don't try to print error when 1326*ca1c9b0cSelric gss_display_status failed 1327*ca1c9b0cSelric 1328*ca1c9b0cSelric * Makefile.am: Add mech/gss_release_oid.c 1329*ca1c9b0cSelric 1330*ca1c9b0cSelric * mech/gss_release_oid.c: Add gss_release_oid, reverse of 1331*ca1c9b0cSelric gss_duplicate_oid 1332*ca1c9b0cSelric 1333*ca1c9b0cSelric * spnego/compat.c: preferred_mech_type was allocated with 1334*ca1c9b0cSelric gss_duplicate_oid in one place and assigned static varianbles a 1335*ca1c9b0cSelric the second place. change that static assignement to 1336*ca1c9b0cSelric gss_duplicate_oid and bring back gss_release_oid. 1337*ca1c9b0cSelric 1338*ca1c9b0cSelric * spnego/compat.c (_gss_spnego_delete_sec_context): don't release 1339*ca1c9b0cSelric preferred_mech_type and negotiated_mech_type, they where never 1340*ca1c9b0cSelric allocated from the begining. 1341*ca1c9b0cSelric 1342*ca1c9b0cSelric2006-06-29 Love Hörnquist Åstrand <lha@it.su.se> 1343*ca1c9b0cSelric 1344*ca1c9b0cSelric * mech/gss_import_name.c (gss_import_name): avoid 1345*ca1c9b0cSelric type-punned/strict aliasing rules 1346*ca1c9b0cSelric 1347*ca1c9b0cSelric * mech/gss_add_cred.c: avoid type-punned/strict aliasing rules 1348*ca1c9b0cSelric 1349*ca1c9b0cSelric * gssapi.h: Make gss_name_t an opaque type. 1350*ca1c9b0cSelric 1351*ca1c9b0cSelric * krb5: make gss_name_t an opaque type 1352*ca1c9b0cSelric 1353*ca1c9b0cSelric * krb5/set_cred_option.c: Add 1354*ca1c9b0cSelric 1355*ca1c9b0cSelric * mech/gss_set_cred_option.c (gss_set_cred_option): support the 1356*ca1c9b0cSelric case where *cred_handle == NULL 1357*ca1c9b0cSelric 1358*ca1c9b0cSelric * mech/gss_krb5.c (gss_krb5_import_cred): make sure cred is 1359*ca1c9b0cSelric GSS_C_NO_CREDENTIAL on failure. 1360*ca1c9b0cSelric 1361*ca1c9b0cSelric * mech/gss_acquire_cred.c (gss_acquire_cred): if desired_mechs is 1362*ca1c9b0cSelric NO_OID_SET, there is a need to load the mechs, so always do that. 1363*ca1c9b0cSelric 1364*ca1c9b0cSelric2006-06-28 Love Hörnquist Åstrand <lha@it.su.se> 1365*ca1c9b0cSelric 1366*ca1c9b0cSelric * krb5/inquire_cred_by_oid.c: Reimplement GSS_KRB5_COPY_CCACHE_X 1367*ca1c9b0cSelric to instead pass a fullname to the credential, then resolve and 1368*ca1c9b0cSelric copy out the content, and then close the cred. 1369*ca1c9b0cSelric 1370*ca1c9b0cSelric * mech/gss_krb5.c: Reimplement GSS_KRB5_COPY_CCACHE_X to instead 1371*ca1c9b0cSelric pass a fullname to the credential, then resolve and copy out the 1372*ca1c9b0cSelric content, and then close the cred. 1373*ca1c9b0cSelric 1374*ca1c9b0cSelric * krb5/inquire_cred_by_oid.c: make "work", GSS_KRB5_COPY_CCACHE_X 1375*ca1c9b0cSelric interface needs to be re-done, currently its utterly broken. 1376*ca1c9b0cSelric 1377*ca1c9b0cSelric * mech/gss_set_cred_option.c: Make work. 1378*ca1c9b0cSelric 1379*ca1c9b0cSelric * krb5/external.c: Add _gsskrb5_set_{sec_context,cred}_option 1380*ca1c9b0cSelric 1381*ca1c9b0cSelric * mech/gss_krb5.c (gss_krb5_import_cred): implement 1382*ca1c9b0cSelric 1383*ca1c9b0cSelric * Makefile.am: Add gss_set_{sec_context,cred}_option and sort 1384*ca1c9b0cSelric 1385*ca1c9b0cSelric * mech/gss_set_{sec_context,cred}_option.c: add 1386*ca1c9b0cSelric 1387*ca1c9b0cSelric * gssapi.h: Add GSS_KRB5_IMPORT_CRED_X 1388*ca1c9b0cSelric 1389*ca1c9b0cSelric * test_*.c: make compile again 1390*ca1c9b0cSelric 1391*ca1c9b0cSelric * Makefile.am: Add lib dependencies and test programs 1392*ca1c9b0cSelric 1393*ca1c9b0cSelric * spnego: remove dependency on libkrb5 1394*ca1c9b0cSelric 1395*ca1c9b0cSelric * mech: Bug fixes, cleanup, compiler warnings, restructure code. 1396*ca1c9b0cSelric 1397*ca1c9b0cSelric * spnego: Rename gss_context_id_t and gss_cred_id_t to local names 1398*ca1c9b0cSelric 1399*ca1c9b0cSelric * krb5: repro copy the krb5 files here 1400*ca1c9b0cSelric 1401*ca1c9b0cSelric * mech: import Doug Rabson mechglue from freebsd 1402*ca1c9b0cSelric 1403*ca1c9b0cSelric * spnego: Import Luke Howard's SPNEGO from the mechglue branch 1404*ca1c9b0cSelric 1405*ca1c9b0cSelric2006-06-22 Love Hörnquist Åstrand <lha@it.su.se> 1406*ca1c9b0cSelric 1407*ca1c9b0cSelric * gssapi.h: Add oid_to_str. 1408*ca1c9b0cSelric 1409*ca1c9b0cSelric * Makefile.am: add oid_to_str and test_oid 1410*ca1c9b0cSelric 1411*ca1c9b0cSelric * oid_to_str.c: Add gss_oid_to_str 1412*ca1c9b0cSelric 1413*ca1c9b0cSelric * test_oid.c: Add test for gss_oid_to_str() 1414*ca1c9b0cSelric 1415*ca1c9b0cSelric2006-05-13 Love Hörnquist Åstrand <lha@it.su.se> 1416*ca1c9b0cSelric 1417*ca1c9b0cSelric * verify_mic.c: Less pointer signedness warnings. 1418*ca1c9b0cSelric 1419*ca1c9b0cSelric * unwrap.c: Less pointer signedness warnings. 1420*ca1c9b0cSelric 1421*ca1c9b0cSelric * arcfour.c: Less pointer signedness warnings. 1422*ca1c9b0cSelric 1423*ca1c9b0cSelric * gssapi_locl.h: Use const void * to instead of unsigned char * to 1424*ca1c9b0cSelric avoid pointer signedness warnings. 1425*ca1c9b0cSelric 1426*ca1c9b0cSelric * encapsulate.c: Use const void * to instead of unsigned char * to 1427*ca1c9b0cSelric avoid pointer signedness warnings. 1428*ca1c9b0cSelric 1429*ca1c9b0cSelric * decapsulate.c: Use const void * to instead of unsigned char * to 1430*ca1c9b0cSelric avoid pointer signedness warnings. 1431*ca1c9b0cSelric 1432*ca1c9b0cSelric * decapsulate.c: Less pointer signedness warnings. 1433*ca1c9b0cSelric 1434*ca1c9b0cSelric * cfx.c: Less pointer signedness warnings. 1435*ca1c9b0cSelric 1436*ca1c9b0cSelric * init_sec_context.c: Less pointer signedness warnings (partly by 1437*ca1c9b0cSelric using the new asn.1 CHOICE decoder) 1438*ca1c9b0cSelric 1439*ca1c9b0cSelric * import_sec_context.c: Less pointer signedness warnings. 1440*ca1c9b0cSelric 1441*ca1c9b0cSelric2006-05-09 Love Hörnquist Åstrand <lha@it.su.se> 1442*ca1c9b0cSelric 1443*ca1c9b0cSelric * accept_sec_context.c (gsskrb5_is_cfx): always set is_cfx. From 1444*ca1c9b0cSelric Andrew Abartlet. 1445*ca1c9b0cSelric 1446*ca1c9b0cSelric2006-05-08 Love Hörnquist Åstrand <lha@it.su.se> 1447*ca1c9b0cSelric 1448*ca1c9b0cSelric * get_mic.c (mic_des3): make sure message_buffer doesn't point to 1449*ca1c9b0cSelric free()ed memory on failure. Pointed out by IBM checker. 1450*ca1c9b0cSelric 1451*ca1c9b0cSelric2006-05-05 Love Hörnquist Åstrand <lha@it.su.se> 1452*ca1c9b0cSelric 1453*ca1c9b0cSelric * Rename u_intXX_t to uintXX_t 1454*ca1c9b0cSelric 1455*ca1c9b0cSelric2006-05-04 Love Hörnquist Åstrand <lha@it.su.se> 1456*ca1c9b0cSelric 1457*ca1c9b0cSelric * cfx.c: Less pointer signedness warnings. 1458*ca1c9b0cSelric 1459*ca1c9b0cSelric * arcfour.c: Avoid pointer signedness warnings. 1460*ca1c9b0cSelric 1461*ca1c9b0cSelric * gssapi_locl.h (gssapi_decode_*): make data argument const void * 1462*ca1c9b0cSelric 1463*ca1c9b0cSelric * 8003.c (gssapi_decode_*): make data argument const void * 1464*ca1c9b0cSelric 1465*ca1c9b0cSelric2006-04-12 Love Hörnquist Åstrand <lha@it.su.se> 1466*ca1c9b0cSelric 1467*ca1c9b0cSelric * export_sec_context.c: Export sequence order element. From Wynn 1468*ca1c9b0cSelric Wilkes <wynn.wilkes@quest.com>. 1469*ca1c9b0cSelric 1470*ca1c9b0cSelric * import_sec_context.c: Import sequence order element. From Wynn 1471*ca1c9b0cSelric Wilkes <wynn.wilkes@quest.com>. 1472*ca1c9b0cSelric 1473*ca1c9b0cSelric * sequence.c (_gssapi_msg_order_import,_gssapi_msg_order_export): 1474*ca1c9b0cSelric New functions, used by {import,export}_sec_context. From Wynn 1475*ca1c9b0cSelric Wilkes <wynn.wilkes@quest.com>. 1476*ca1c9b0cSelric 1477*ca1c9b0cSelric * test_sequence.c: Add test for import/export sequence. 1478*ca1c9b0cSelric 1479*ca1c9b0cSelric2006-04-09 Love Hörnquist Åstrand <lha@it.su.se> 1480*ca1c9b0cSelric 1481*ca1c9b0cSelric * add_cred.c: Check that cred != GSS_C_NO_CREDENTIAL, this is a 1482*ca1c9b0cSelric standard conformance failure, but much better then a crash. 1483*ca1c9b0cSelric 1484*ca1c9b0cSelric2006-04-02 Love Hörnquist Åstrand <lha@it.su.se> 1485*ca1c9b0cSelric 1486*ca1c9b0cSelric * get_mic.c (get_mic*)_: make sure message_token is cleaned on 1487*ca1c9b0cSelric error, found by IBM checker. 1488*ca1c9b0cSelric 1489*ca1c9b0cSelric * wrap.c (wrap*): Reset output_buffer on error, found by IBM 1490*ca1c9b0cSelric checker. 1491*ca1c9b0cSelric 1492*ca1c9b0cSelric2006-02-15 Love Hörnquist Åstrand <lha@it.su.se> 1493*ca1c9b0cSelric 1494*ca1c9b0cSelric * import_name.c: Accept both GSS_C_NT_HOSTBASED_SERVICE and 1495*ca1c9b0cSelric GSS_C_NT_HOSTBASED_SERVICE_X as nametype for hostbased names. 1496*ca1c9b0cSelric 1497*ca1c9b0cSelric2006-01-16 Love Hörnquist Åstrand <lha@it.su.se> 1498*ca1c9b0cSelric 1499*ca1c9b0cSelric * delete_sec_context.c (gss_delete_sec_context): if the context 1500*ca1c9b0cSelric handle is GSS_C_NO_CONTEXT, don't fall over. 1501*ca1c9b0cSelric 1502*ca1c9b0cSelric2005-12-12 Love Hörnquist Åstrand <lha@it.su.se> 1503*ca1c9b0cSelric 1504*ca1c9b0cSelric * gss_acquire_cred.3: Replace gss_krb5_import_ccache with 1505*ca1c9b0cSelric gss_krb5_import_cred and add more references 1506*ca1c9b0cSelric 1507*ca1c9b0cSelric2005-12-05 Love Hörnquist Åstrand <lha@it.su.se> 1508*ca1c9b0cSelric 1509*ca1c9b0cSelric * gssapi.h: Change gss_krb5_import_ccache to gss_krb5_import_cred, 1510*ca1c9b0cSelric it can handle keytabs too. 1511*ca1c9b0cSelric 1512*ca1c9b0cSelric * add_cred.c (gss_add_cred): avoid deadlock 1513*ca1c9b0cSelric 1514*ca1c9b0cSelric * context_time.c (gssapi_lifetime_left): define the 0 lifetime as 1515*ca1c9b0cSelric GSS_C_INDEFINITE. 1516*ca1c9b0cSelric 1517*ca1c9b0cSelric2005-12-01 Love Hörnquist Åstrand <lha@it.su.se> 1518*ca1c9b0cSelric 1519*ca1c9b0cSelric * acquire_cred.c (acquire_acceptor_cred): only check if principal 1520*ca1c9b0cSelric exists if we got called with principal as an argument. 1521*ca1c9b0cSelric 1522*ca1c9b0cSelric * acquire_cred.c (acquire_acceptor_cred): check that the acceptor 1523*ca1c9b0cSelric exists in the keytab before returning ok. 1524*ca1c9b0cSelric 1525*ca1c9b0cSelric2005-11-29 Love Hörnquist Åstrand <lha@it.su.se> 1526*ca1c9b0cSelric 1527*ca1c9b0cSelric * copy_ccache.c (gss_krb5_import_cred): fix buglet, from Andrew 1528*ca1c9b0cSelric Bartlett. 1529*ca1c9b0cSelric 1530*ca1c9b0cSelric2005-11-25 Love Hörnquist Åstrand <lha@it.su.se> 1531*ca1c9b0cSelric 1532*ca1c9b0cSelric * test_kcred.c: Rename gss_krb5_import_ccache to 1533*ca1c9b0cSelric gss_krb5_import_cred. 1534*ca1c9b0cSelric 1535*ca1c9b0cSelric * copy_ccache.c: Rename gss_krb5_import_ccache to 1536*ca1c9b0cSelric gss_krb5_import_cred and let it grow code to handle keytabs too. 1537*ca1c9b0cSelric 1538*ca1c9b0cSelric2005-11-02 Love Hörnquist Åstrand <lha@it.su.se> 1539*ca1c9b0cSelric 1540*ca1c9b0cSelric * init_sec_context.c: Change sematics of ok-as-delegate to match 1541*ca1c9b0cSelric windows if 1542*ca1c9b0cSelric [gssapi]realm/ok-as-delegate=true is set, otherwise keep old 1543*ca1c9b0cSelric sematics. 1544*ca1c9b0cSelric 1545*ca1c9b0cSelric * release_cred.c (gss_release_cred): use 1546*ca1c9b0cSelric GSS_CF_DESTROY_CRED_ON_RELEASE to decide if the cache should be 1547*ca1c9b0cSelric krb5_cc_destroy-ed 1548*ca1c9b0cSelric 1549*ca1c9b0cSelric * acquire_cred.c (acquire_initiator_cred): 1550*ca1c9b0cSelric GSS_CF_DESTROY_CRED_ON_RELEASE on created credentials. 1551*ca1c9b0cSelric 1552*ca1c9b0cSelric * accept_sec_context.c (gsskrb5_accept_delegated_token): rewrite 1553*ca1c9b0cSelric to use gss_krb5_import_ccache 1554*ca1c9b0cSelric 1555*ca1c9b0cSelric2005-11-01 Love Hörnquist Åstrand <lha@it.su.se> 1556*ca1c9b0cSelric 1557*ca1c9b0cSelric * arcfour.c: Remove signedness warnings. 1558*ca1c9b0cSelric 1559*ca1c9b0cSelric2005-10-31 Love Hörnquist Åstrand <lha@it.su.se> 1560*ca1c9b0cSelric 1561*ca1c9b0cSelric * gss_acquire_cred.3: Document that gss_krb5_import_ccache is copy 1562*ca1c9b0cSelric by reference. 1563*ca1c9b0cSelric 1564*ca1c9b0cSelric * copy_ccache.c (gss_krb5_import_ccache): Instead of making a copy 1565*ca1c9b0cSelric of the ccache, make a reference by getting the name and resolving 1566*ca1c9b0cSelric the name. This way the cache is shared, this flipp side is of 1567*ca1c9b0cSelric course that if someone calls krb5_cc_destroy the cache is lost for 1568*ca1c9b0cSelric everyone. 1569*ca1c9b0cSelric 1570*ca1c9b0cSelric * test_kcred.c: Remove memory leaks. 1571*ca1c9b0cSelric 1572*ca1c9b0cSelric2005-10-26 Love Hörnquist Åstrand <lha@it.su.se> 1573*ca1c9b0cSelric 1574*ca1c9b0cSelric * Makefile.am: build test_kcred 1575*ca1c9b0cSelric 1576*ca1c9b0cSelric * gss_acquire_cred.3: Document gss_krb5_import_ccache 1577*ca1c9b0cSelric 1578*ca1c9b0cSelric * gssapi.3: Sort and add gss_krb5_import_ccache. 1579*ca1c9b0cSelric 1580*ca1c9b0cSelric * acquire_cred.c (_gssapi_krb5_ccache_lifetime): break out code 1581*ca1c9b0cSelric used to extract lifetime from a credential cache 1582*ca1c9b0cSelric 1583*ca1c9b0cSelric * gssapi_locl.h: Add _gssapi_krb5_ccache_lifetime, used to extract 1584*ca1c9b0cSelric lifetime from a credential cache. 1585*ca1c9b0cSelric 1586*ca1c9b0cSelric * gssapi.h: add gss_krb5_import_ccache, reverse of 1587*ca1c9b0cSelric gss_krb5_copy_ccache 1588*ca1c9b0cSelric 1589*ca1c9b0cSelric * copy_ccache.c: add gss_krb5_import_ccache, reverse of 1590*ca1c9b0cSelric gss_krb5_copy_ccache 1591*ca1c9b0cSelric 1592*ca1c9b0cSelric * test_kcred.c: test gss_krb5_import_ccache 1593*ca1c9b0cSelric 1594*ca1c9b0cSelric2005-10-21 Love Hörnquist Åstrand <lha@it.su.se> 1595*ca1c9b0cSelric 1596*ca1c9b0cSelric * acquire_cred.c (acquire_initiator_cred): use krb5_cc_cache_match 1597*ca1c9b0cSelric to find a matching creditial cache, if that failes, fallback to 1598*ca1c9b0cSelric the default cache. 1599*ca1c9b0cSelric 1600*ca1c9b0cSelric2005-10-12 Love Hörnquist Åstrand <lha@it.su.se> 1601*ca1c9b0cSelric 1602*ca1c9b0cSelric * gssapi_locl.h: Add gssapi_krb5_set_status and 1603*ca1c9b0cSelric gssapi_krb5_clear_status 1604*ca1c9b0cSelric 1605*ca1c9b0cSelric * init_sec_context.c (spnego_reply): Don't pass back raw Kerberos 1606*ca1c9b0cSelric errors, use GSS-API errors instead. From Michael B Allen. 1607*ca1c9b0cSelric 1608*ca1c9b0cSelric * display_status.c: Add gssapi_krb5_clear_status, 1609*ca1c9b0cSelric gssapi_krb5_set_status for handling error messages. 1610*ca1c9b0cSelric 1611*ca1c9b0cSelric2005-08-23 Love Hörnquist Åstrand <lha@it.su.se> 1612*ca1c9b0cSelric 1613*ca1c9b0cSelric * external.c: Use rk_UNCONST to avoid const warning. 1614*ca1c9b0cSelric 1615*ca1c9b0cSelric * display_status.c: Constify strings to avoid warnings. 1616*ca1c9b0cSelric 1617*ca1c9b0cSelric2005-08-11 Love Hörnquist Åstrand <lha@it.su.se> 1618*ca1c9b0cSelric 1619*ca1c9b0cSelric * init_sec_context.c: avoid warnings, update (c) 1620*ca1c9b0cSelric 1621*ca1c9b0cSelric2005-07-13 Love Hörnquist Åstrand <lha@it.su.se> 1622*ca1c9b0cSelric 1623*ca1c9b0cSelric * init_sec_context.c (spnego_initial): use NegotiationToken 1624*ca1c9b0cSelric encoder now that we have one with the new asn1. compiler. 1625*ca1c9b0cSelric 1626*ca1c9b0cSelric * Makefile.am: the new asn.1 compiler includes the modules name in 1627*ca1c9b0cSelric the depend file 1628*ca1c9b0cSelric 1629*ca1c9b0cSelric2005-06-16 Love Hörnquist Åstrand <lha@it.su.se> 1630*ca1c9b0cSelric 1631*ca1c9b0cSelric * decapsulate.c: use rk_UNCONST 1632*ca1c9b0cSelric 1633*ca1c9b0cSelric * ccache_name.c: rename to avoid shadowing 1634*ca1c9b0cSelric 1635*ca1c9b0cSelric * gssapi_locl.h: give kret in GSSAPI_KRB5_INIT a more unique name 1636*ca1c9b0cSelric 1637*ca1c9b0cSelric * process_context_token.c: use rk_UNCONST to unconstify 1638*ca1c9b0cSelric 1639*ca1c9b0cSelric * test_cred.c: rename optind to optidx 1640*ca1c9b0cSelric 1641*ca1c9b0cSelric2005-05-30 Love Hörnquist Åstrand <lha@it.su.se> 1642*ca1c9b0cSelric 1643*ca1c9b0cSelric * init_sec_context.c (init_auth): honor ok-as-delegate if local 1644*ca1c9b0cSelric configuration approves 1645*ca1c9b0cSelric 1646*ca1c9b0cSelric * gssapi_locl.h: prototype for _gss_check_compat 1647*ca1c9b0cSelric 1648*ca1c9b0cSelric * compat.c: export check_compat as _gss_check_compat 1649*ca1c9b0cSelric 1650*ca1c9b0cSelric2005-05-29 Love Hörnquist Åstrand <lha@it.su.se> 1651*ca1c9b0cSelric 1652*ca1c9b0cSelric * init_sec_context.c: Prefix Der_class with ASN1_C_ to avoid 1653*ca1c9b0cSelric problems with system headerfiles that pollute the name space. 1654*ca1c9b0cSelric 1655*ca1c9b0cSelric * accept_sec_context.c: Prefix Der_class with ASN1_C_ to avoid 1656*ca1c9b0cSelric problems with system headerfiles that pollute the name space. 1657*ca1c9b0cSelric 1658*ca1c9b0cSelric2005-05-17 Love Hörnquist Åstrand <lha@it.su.se> 1659*ca1c9b0cSelric 1660*ca1c9b0cSelric * init_sec_context.c (init_auth): set 1661*ca1c9b0cSelric KRB5_AUTH_CONTEXT_CLEAR_FORWARDED_CRED (for java compatibility), 1662*ca1c9b0cSelric also while here, use krb5_auth_con_addflags 1663*ca1c9b0cSelric 1664*ca1c9b0cSelric2005-05-06 Love Hörnquist Åstrand <lha@it.su.se> 1665*ca1c9b0cSelric 1666*ca1c9b0cSelric * arcfour.c (_gssapi_wrap_arcfour): fix calculating the encap 1667*ca1c9b0cSelric length. From: Tom Maher <tmaher@eecs.berkeley.edu> 1668*ca1c9b0cSelric 1669*ca1c9b0cSelric2005-05-02 Dave Love <fx@gnu.org> 1670*ca1c9b0cSelric 1671*ca1c9b0cSelric * test_cred.c (main): Call setprogname. 1672*ca1c9b0cSelric 1673*ca1c9b0cSelric2005-04-27 Love Hörnquist Åstrand <lha@it.su.se> 1674*ca1c9b0cSelric 1675*ca1c9b0cSelric * prefix all sequence symbols with _, they are not part of the 1676*ca1c9b0cSelric GSS-API api. By comment from Wynn Wilkes <wynnw@vintela.com> 1677*ca1c9b0cSelric 1678*ca1c9b0cSelric2005-04-10 Love Hörnquist Åstrand <lha@it.su.se> 1679*ca1c9b0cSelric 1680*ca1c9b0cSelric * accept_sec_context.c: break out the processing of the delegated 1681*ca1c9b0cSelric credential to a separate function to make error handling easier, 1682*ca1c9b0cSelric move the credential handling to after other setup is done 1683*ca1c9b0cSelric 1684*ca1c9b0cSelric * test_sequence.c: make less verbose in case of success 1685*ca1c9b0cSelric 1686*ca1c9b0cSelric * Makefile.am: add test_sequence to TESTS 1687*ca1c9b0cSelric 1688*ca1c9b0cSelric2005-04-01 Love Hörnquist Åstrand <lha@it.su.se> 1689*ca1c9b0cSelric 1690*ca1c9b0cSelric * 8003.c (gssapi_krb5_verify_8003_checksum): check that cksum 1691*ca1c9b0cSelric isn't NULL From: Nicolas Pouvesle <npouvesle@tenablesecurity.com> 1692*ca1c9b0cSelric 1693*ca1c9b0cSelric2005-03-21 Love Hörnquist Åstrand <lha@it.su.se> 1694*ca1c9b0cSelric 1695*ca1c9b0cSelric * Makefile.am: use $(LIB_roken) 1696*ca1c9b0cSelric 1697*ca1c9b0cSelric2005-03-16 Love Hörnquist Åstrand <lha@it.su.se> 1698*ca1c9b0cSelric 1699*ca1c9b0cSelric * display_status.c (gssapi_krb5_set_error_string): pass in the 1700*ca1c9b0cSelric krb5_context to krb5_free_error_string 1701*ca1c9b0cSelric 1702*ca1c9b0cSelric2005-03-15 Love Hörnquist Åstrand <lha@it.su.se> 1703*ca1c9b0cSelric 1704*ca1c9b0cSelric * display_status.c (gssapi_krb5_set_error_string): don't misuse 1705*ca1c9b0cSelric the krb5_get_error_string api 1706*ca1c9b0cSelric 1707*ca1c9b0cSelric2005-03-01 Love Hörnquist Åstrand <lha@it.su.se> 1708*ca1c9b0cSelric 1709*ca1c9b0cSelric * compat.c (_gss_DES3_get_mic_compat): don't unlock mutex 1710*ca1c9b0cSelric here. Bug reported by Stefan Metzmacher <metze@samba.org> 1711*ca1c9b0cSelric 1712*ca1c9b0cSelric2005-02-21 Luke Howard <lukeh@padl.com> 1713*ca1c9b0cSelric 1714*ca1c9b0cSelric * init_sec_context.c: don't call krb5_get_credentials() with 1715*ca1c9b0cSelric KRB5_TC_MATCH_KEYTYPE, it can lead to the credentials cache 1716*ca1c9b0cSelric growing indefinitely as no key is found with KEYTYPE_NULL 1717*ca1c9b0cSelric 1718*ca1c9b0cSelric * compat.c: remove GSS_C_EXPECTING_MECH_LIST_MIC_FLAG, it is 1719*ca1c9b0cSelric no longer used (however the mechListMIC behaviour is broken, 1720*ca1c9b0cSelric rfc2478bis support requires the code in the mechglue branch) 1721*ca1c9b0cSelric 1722*ca1c9b0cSelric * init_sec_context.c: remove GSS_C_EXPECTING_MECH_LIST_MIC_FLAG 1723*ca1c9b0cSelric 1724*ca1c9b0cSelric * gssapi.h: remove GSS_C_EXPECTING_MECH_LIST_MIC_FLAG 1725*ca1c9b0cSelric 1726*ca1c9b0cSelric2005-01-05 Luke Howard <lukeh@padl.com> 1727*ca1c9b0cSelric 1728*ca1c9b0cSelric * 8003.c: use symbolic name for checksum type 1729*ca1c9b0cSelric 1730*ca1c9b0cSelric * accept_sec_context.c: allow client to indicate 1731*ca1c9b0cSelric that subkey should be used 1732*ca1c9b0cSelric 1733*ca1c9b0cSelric * acquire_cred.c: plug leak 1734*ca1c9b0cSelric 1735*ca1c9b0cSelric * get_mic.c: use gss_krb5_get_subkey() instead 1736*ca1c9b0cSelric of gss_krb5_get_{local,remote}key(), support 1737*ca1c9b0cSelric KEYTYPE_ARCFOUR_56 1738*ca1c9b0cSelric 1739*ca1c9b0cSelric * gssapi_local.c: use gss_krb5_get_subkey(), 1740*ca1c9b0cSelric support KEYTYPE_ARCFOUR_56 1741*ca1c9b0cSelric 1742*ca1c9b0cSelric * import_sec_context.c: plug leak 1743*ca1c9b0cSelric 1744*ca1c9b0cSelric * unwrap.c: use gss_krb5_get_subkey(), 1745*ca1c9b0cSelric support KEYTYPE_ARCFOUR_56 1746*ca1c9b0cSelric 1747*ca1c9b0cSelric * verify_mic.c: use gss_krb5_get_subkey(), 1748*ca1c9b0cSelric support KEYTYPE_ARCFOUR_56 1749*ca1c9b0cSelric 1750*ca1c9b0cSelric * wrap.c: use gss_krb5_get_subkey(), 1751*ca1c9b0cSelric support KEYTYPE_ARCFOUR_56 1752*ca1c9b0cSelric 1753*ca1c9b0cSelric2004-11-30 Love Hörnquist Åstrand <lha@it.su.se> 1754*ca1c9b0cSelric 1755*ca1c9b0cSelric * inquire_cred.c: Reverse order of HEIMDAL_MUTEX_unlock and 1756*ca1c9b0cSelric gss_release_cred to avoid deadlock, from Luke Howard 1757*ca1c9b0cSelric <lukeh@padl.com>. 1758*ca1c9b0cSelric 1759*ca1c9b0cSelric2004-09-06 Love Hörnquist Åstrand <lha@it.su.se> 1760*ca1c9b0cSelric 1761*ca1c9b0cSelric * gss_acquire_cred.3: gss_krb5_extract_authz_data_from_sec_context 1762*ca1c9b0cSelric was renamed to gsskrb5_extract_authz_data_from_sec_context 1763*ca1c9b0cSelric 1764*ca1c9b0cSelric2004-08-07 Love Hörnquist Åstrand <lha@it.su.se> 1765*ca1c9b0cSelric 1766*ca1c9b0cSelric * unwrap.c: mutex buglet, From: Luke Howard <lukeh@PADL.COM> 1767*ca1c9b0cSelric 1768*ca1c9b0cSelric * arcfour.c: mutex buglet, From: Luke Howard <lukeh@PADL.COM> 1769*ca1c9b0cSelric 1770*ca1c9b0cSelric2004-05-06 Love Hörnquist Åstrand <lha@it.su.se> 1771*ca1c9b0cSelric 1772*ca1c9b0cSelric * gssapi.3: spelling from Josef El-Rayes <josef@FreeBSD.org> while 1773*ca1c9b0cSelric here, write some text about the SPNEGO situation 1774*ca1c9b0cSelric 1775*ca1c9b0cSelric2004-04-08 Love Hörnquist Åstrand <lha@it.su.se> 1776*ca1c9b0cSelric 1777*ca1c9b0cSelric * cfx.c: s/CTXAcceptorSubkey/CFXAcceptorSubkey/ 1778*ca1c9b0cSelric 1779*ca1c9b0cSelric2004-04-07 Love Hörnquist Åstrand <lha@it.su.se> 1780*ca1c9b0cSelric 1781*ca1c9b0cSelric * gssapi.h: add GSS_C_EXPECTING_MECH_LIST_MIC_FLAG From: Luke 1782*ca1c9b0cSelric Howard <lukeh@padl.com> 1783*ca1c9b0cSelric 1784*ca1c9b0cSelric * init_sec_context.c (spnego_reply): use 1785*ca1c9b0cSelric _gss_spnego_require_mechlist_mic to figure out if we need to check 1786*ca1c9b0cSelric MechListMIC; From: Luke Howard <lukeh@padl.com> 1787*ca1c9b0cSelric 1788*ca1c9b0cSelric * accept_sec_context.c (send_accept): use 1789*ca1c9b0cSelric _gss_spnego_require_mechlist_mic to figure out if we need to send 1790*ca1c9b0cSelric MechListMIC; From: Luke Howard <lukeh@padl.com> 1791*ca1c9b0cSelric 1792*ca1c9b0cSelric * gssapi_locl.h: add _gss_spnego_require_mechlist_mic 1793*ca1c9b0cSelric From: Luke Howard <lukeh@padl.com> 1794*ca1c9b0cSelric 1795*ca1c9b0cSelric * compat.c: add _gss_spnego_require_mechlist_mic for compatibility 1796*ca1c9b0cSelric with MS SPNEGO, From: Luke Howard <lukeh@padl.com> 1797*ca1c9b0cSelric 1798*ca1c9b0cSelric2004-04-05 Love Hörnquist Åstrand <lha@it.su.se> 1799*ca1c9b0cSelric 1800*ca1c9b0cSelric * accept_sec_context.c (gsskrb5_is_cfx): krb5_keyblock->keytype is 1801*ca1c9b0cSelric an enctype, not keytype 1802*ca1c9b0cSelric 1803*ca1c9b0cSelric * accept_sec_context.c: use ASN1_MALLOC_ENCODE 1804*ca1c9b0cSelric 1805*ca1c9b0cSelric * init_sec_context.c: avoid the malloc loop and just allocate the 1806*ca1c9b0cSelric propper amount of data 1807*ca1c9b0cSelric 1808*ca1c9b0cSelric * init_sec_context.c (spnego_initial): handle mech_token better 1809*ca1c9b0cSelric 1810*ca1c9b0cSelric2004-03-19 Love Hörnquist Åstrand <lha@it.su.se> 1811*ca1c9b0cSelric 1812*ca1c9b0cSelric * gssapi.h: add gss_krb5_get_tkt_flags 1813*ca1c9b0cSelric 1814*ca1c9b0cSelric * Makefile.am: add ticket_flags.c 1815*ca1c9b0cSelric 1816*ca1c9b0cSelric * ticket_flags.c: Get ticket-flags from acceptor ticket From: Luke 1817*ca1c9b0cSelric Howard <lukeh@PADL.COM> 1818*ca1c9b0cSelric 1819*ca1c9b0cSelric * gss_acquire_cred.3: document gss_krb5_get_tkt_flags 1820*ca1c9b0cSelric 1821*ca1c9b0cSelric2004-03-14 Love Hörnquist Åstrand <lha@it.su.se> 1822*ca1c9b0cSelric 1823*ca1c9b0cSelric * acquire_cred.c (gss_acquire_cred): check usage before even 1824*ca1c9b0cSelric bothering to process it, add both keytab and initial tgt if 1825*ca1c9b0cSelric requested 1826*ca1c9b0cSelric 1827*ca1c9b0cSelric * wrap.c: support cfx, try to handle acceptor asserted subkey 1828*ca1c9b0cSelric 1829*ca1c9b0cSelric * unwrap.c: support cfx, try to handle acceptor asserted subkey 1830*ca1c9b0cSelric 1831*ca1c9b0cSelric * verify_mic.c: support cfx 1832*ca1c9b0cSelric 1833*ca1c9b0cSelric * get_mic.c: support cfx 1834*ca1c9b0cSelric 1835*ca1c9b0cSelric * test_sequence.c: handle changed signature of 1836*ca1c9b0cSelric gssapi_msg_order_create 1837*ca1c9b0cSelric 1838*ca1c9b0cSelric * import_sec_context.c: handle acceptor asserted subkey 1839*ca1c9b0cSelric 1840*ca1c9b0cSelric * init_sec_context.c: handle acceptor asserted subkey 1841*ca1c9b0cSelric 1842*ca1c9b0cSelric * accept_sec_context.c: handle acceptor asserted subkey 1843*ca1c9b0cSelric 1844*ca1c9b0cSelric * sequence.c: add dummy use_64 argument to gssapi_msg_order_create 1845*ca1c9b0cSelric 1846*ca1c9b0cSelric * gssapi_locl.h: add partial support for CFX 1847*ca1c9b0cSelric 1848*ca1c9b0cSelric * Makefile.am (noinst_PROGRAMS) += test_cred 1849*ca1c9b0cSelric 1850*ca1c9b0cSelric * test_cred.c: gssapi credential testing 1851*ca1c9b0cSelric 1852*ca1c9b0cSelric * test_acquire_cred.c: fix comment 1853*ca1c9b0cSelric 1854*ca1c9b0cSelric2004-03-07 Love Hörnquist Åstrand <lha@it.su.se> 1855*ca1c9b0cSelric 1856*ca1c9b0cSelric * arcfour.h: drop structures for message formats, no longer used 1857*ca1c9b0cSelric 1858*ca1c9b0cSelric * arcfour.c: comment describing message formats 1859*ca1c9b0cSelric 1860*ca1c9b0cSelric * accept_sec_context.c (spnego_accept_sec_context): make sure the 1861*ca1c9b0cSelric length of the choice element doesn't overrun us 1862*ca1c9b0cSelric 1863*ca1c9b0cSelric * init_sec_context.c (spnego_reply): make sure the length of the 1864*ca1c9b0cSelric choice element doesn't overrun us 1865*ca1c9b0cSelric 1866*ca1c9b0cSelric * spnego.asn1: move NegotiationToken to avoid warning 1867*ca1c9b0cSelric 1868*ca1c9b0cSelric * spnego.asn1: uncomment NegotiationToken 1869*ca1c9b0cSelric 1870*ca1c9b0cSelric * Makefile.am: spnego_files += asn1_NegotiationToken.x 1871*ca1c9b0cSelric 1872*ca1c9b0cSelric2004-01-25 Love Hörnquist Åstrand <lha@it.su.se> 1873*ca1c9b0cSelric 1874*ca1c9b0cSelric * gssapi.h: add gss_krb5_ccache_name 1875*ca1c9b0cSelric 1876*ca1c9b0cSelric * Makefile.am (libgssapi_la_SOURCES): += ccache_name.c 1877*ca1c9b0cSelric 1878*ca1c9b0cSelric * ccache_name.c (gss_krb5_ccache_name): help function enable to 1879*ca1c9b0cSelric set krb5 name, using out_name argument makes function no longer 1880*ca1c9b0cSelric thread-safe 1881*ca1c9b0cSelric 1882*ca1c9b0cSelric * gssapi.3: add missing gss_krb5_ references 1883*ca1c9b0cSelric 1884*ca1c9b0cSelric * gss_acquire_cred.3: document gss_krb5_ccache_name 1885*ca1c9b0cSelric 1886*ca1c9b0cSelric2003-12-12 Love Hörnquist Åstrand <lha@it.su.se> 1887*ca1c9b0cSelric 1888*ca1c9b0cSelric * cfx.c: make rrc a modulus operation if its longer then the 1889*ca1c9b0cSelric length of the message, noticed by Sam Hartman 1890*ca1c9b0cSelric 1891*ca1c9b0cSelric2003-12-07 Love Hörnquist Åstrand <lha@it.su.se> 1892*ca1c9b0cSelric 1893*ca1c9b0cSelric * accept_sec_context.c: use krb5_auth_con_addflags 1894*ca1c9b0cSelric 1895*ca1c9b0cSelric2003-12-05 Love Hörnquist Åstrand <lha@it.su.se> 1896*ca1c9b0cSelric 1897*ca1c9b0cSelric * cfx.c: Wrap token id was in wrong order, found by Sam Hartman 1898*ca1c9b0cSelric 1899*ca1c9b0cSelric2003-12-04 Love Hörnquist Åstrand <lha@it.su.se> 1900*ca1c9b0cSelric 1901*ca1c9b0cSelric * cfx.c: add AcceptorSubkey (but no code understand it yet) ignore 1902*ca1c9b0cSelric unknown token flags 1903*ca1c9b0cSelric 1904*ca1c9b0cSelric2003-11-22 Love Hörnquist Åstrand <lha@it.su.se> 1905*ca1c9b0cSelric 1906*ca1c9b0cSelric * accept_sec_context.c: Don't require timestamp to be set on 1907*ca1c9b0cSelric delegated token, its already protected by the outer token (and 1908*ca1c9b0cSelric windows doesn't alway send it) Pointed out by Zi-Bin Yang 1909*ca1c9b0cSelric <zbyang@decru.com> on heimdal-discuss 1910*ca1c9b0cSelric 1911*ca1c9b0cSelric2003-11-14 Love Hörnquist Åstrand <lha@it.su.se> 1912*ca1c9b0cSelric 1913*ca1c9b0cSelric * cfx.c: fix {} error, pointed out by Liqiang Zhu 1914*ca1c9b0cSelric 1915*ca1c9b0cSelric2003-11-10 Love Hörnquist Åstrand <lha@it.su.se> 1916*ca1c9b0cSelric 1917*ca1c9b0cSelric * cfx.c: Sequence number should be stored in bigendian order From: 1918*ca1c9b0cSelric Luke Howard <lukeh@padl.com> 1919*ca1c9b0cSelric 1920*ca1c9b0cSelric2003-11-09 Love Hörnquist Åstrand <lha@it.su.se> 1921*ca1c9b0cSelric 1922*ca1c9b0cSelric * delete_sec_context.c (gss_delete_sec_context): don't free 1923*ca1c9b0cSelric ticket, krb5_free_ticket does that now 1924*ca1c9b0cSelric 1925*ca1c9b0cSelric2003-11-06 Love Hörnquist Åstrand <lha@it.su.se> 1926*ca1c9b0cSelric 1927*ca1c9b0cSelric * cfx.c: checksum the header last in MIC token, update to -03 1928*ca1c9b0cSelric From: Luke Howard <lukeh@padl.com> 1929*ca1c9b0cSelric 1930*ca1c9b0cSelric2003-10-07 Love Hörnquist Åstrand <lha@it.su.se> 1931*ca1c9b0cSelric 1932*ca1c9b0cSelric * add_cred.c: If its a MEMORY cc, make a copy. We need to do this 1933*ca1c9b0cSelric since now gss_release_cred will destroy the cred. This should be 1934*ca1c9b0cSelric really be solved a better way. 1935*ca1c9b0cSelric 1936*ca1c9b0cSelric * acquire_cred.c (gss_release_cred): if its a mcc, destroy it 1937*ca1c9b0cSelric rather the just release it Found by: "Zi-Bin Yang" 1938*ca1c9b0cSelric <zbyang@decru.com> 1939*ca1c9b0cSelric 1940*ca1c9b0cSelric * acquire_cred.c (acquire_initiator_cred): use kret instead of ret 1941*ca1c9b0cSelric where appropriate 1942*ca1c9b0cSelric 1943*ca1c9b0cSelric2003-09-30 Love Hörnquist Åstrand <lha@it.su.se> 1944*ca1c9b0cSelric 1945*ca1c9b0cSelric * gss_acquire_cred.3: spelling 1946*ca1c9b0cSelric From: jmc <jmc@prioris.mini.pw.edu.pl> 1947*ca1c9b0cSelric 1948*ca1c9b0cSelric2003-09-23 Love Hörnquist Åstrand <lha@it.su.se> 1949*ca1c9b0cSelric 1950*ca1c9b0cSelric * cfx.c: - EC and RRC are big-endian, not little-endian - The 1951*ca1c9b0cSelric default is now to rotate regardless of GSS_C_DCE_STYLE. There are 1952*ca1c9b0cSelric no longer any references to GSS_C_DCE_STYLE. - rrc_rotate() 1953*ca1c9b0cSelric avoids allocating memory on the heap if rrc <= 256 1954*ca1c9b0cSelric From: Luke Howard <lukeh@padl.com> 1955*ca1c9b0cSelric 1956*ca1c9b0cSelric2003-09-22 Love Hörnquist Åstrand <lha@it.su.se> 1957*ca1c9b0cSelric 1958*ca1c9b0cSelric * cfx.[ch]: rrc_rotate() was untested and broken, fix it. 1959*ca1c9b0cSelric Set and verify wrap Token->Filler. 1960*ca1c9b0cSelric Correct token ID for wrap tokens, 1961*ca1c9b0cSelric were accidentally swapped with delete tokens. 1962*ca1c9b0cSelric From: Luke Howard <lukeh@PADL.COM> 1963*ca1c9b0cSelric 1964*ca1c9b0cSelric2003-09-21 Love Hörnquist Åstrand <lha@it.su.se> 1965*ca1c9b0cSelric 1966*ca1c9b0cSelric * cfx.[ch]: no ASN.1-ish header on per-message tokens 1967*ca1c9b0cSelric From: Luke Howard <lukeh@PADL.COM> 1968*ca1c9b0cSelric 1969*ca1c9b0cSelric2003-09-19 Love Hörnquist Åstrand <lha@it.su.se> 1970*ca1c9b0cSelric 1971*ca1c9b0cSelric * arcfour.h: remove depenency on gss_arcfour_mic_token and 1972*ca1c9b0cSelric gss_arcfour_warp_token 1973*ca1c9b0cSelric 1974*ca1c9b0cSelric * arcfour.c: remove depenency on gss_arcfour_mic_token and 1975*ca1c9b0cSelric gss_arcfour_warp_token 1976*ca1c9b0cSelric 1977*ca1c9b0cSelric2003-09-18 Love Hörnquist Åstrand <lha@it.su.se> 1978*ca1c9b0cSelric 1979*ca1c9b0cSelric * 8003.c: remove #if 0'ed code 1980*ca1c9b0cSelric 1981*ca1c9b0cSelric2003-09-17 Love Hörnquist Åstrand <lha@it.su.se> 1982*ca1c9b0cSelric 1983*ca1c9b0cSelric * accept_sec_context.c (gsskrb5_accept_sec_context): set sequence 1984*ca1c9b0cSelric number when not requesting mutual auth From: Luke Howard 1985*ca1c9b0cSelric <lukeh@PADL.COM> 1986*ca1c9b0cSelric 1987*ca1c9b0cSelric * init_sec_context.c (init_auth): set sequence number when not 1988*ca1c9b0cSelric requesting mutual auth From: Luke Howard <lukeh@PADL.COM> 1989*ca1c9b0cSelric 1990*ca1c9b0cSelric2003-09-16 Love Hörnquist Åstrand <lha@it.su.se> 1991*ca1c9b0cSelric 1992*ca1c9b0cSelric * arcfour.c (*): set minor_status 1993*ca1c9b0cSelric (gss_wrap): set conf_state to conf_req_flags on success 1994*ca1c9b0cSelric From: Luke Howard <lukeh@PADL.COM> 1995*ca1c9b0cSelric 1996*ca1c9b0cSelric * wrap.c (gss_wrap_size_limit): use existing function From: Luke 1997*ca1c9b0cSelric Howard <lukeh@PADL.COM> 1998*ca1c9b0cSelric 1999*ca1c9b0cSelric2003-09-12 Love Hörnquist Åstrand <lha@it.su.se> 2000*ca1c9b0cSelric 2001*ca1c9b0cSelric * indicate_mechs.c (gss_indicate_mechs): in case of error, free 2002*ca1c9b0cSelric mech_set 2003*ca1c9b0cSelric 2004*ca1c9b0cSelric * indicate_mechs.c (gss_indicate_mechs): add SPNEGO 2005*ca1c9b0cSelric 2006*ca1c9b0cSelric2003-09-10 Love Hörnquist Åstrand <lha@it.su.se> 2007*ca1c9b0cSelric 2008*ca1c9b0cSelric * init_sec_context.c (spnego_initial): catch errors and return 2009*ca1c9b0cSelric them 2010*ca1c9b0cSelric 2011*ca1c9b0cSelric * init_sec_context.c (spnego_initial): add #if 0 out version of 2012*ca1c9b0cSelric the CHOICE branch encoding, also where here, free no longer used 2013*ca1c9b0cSelric memory 2014*ca1c9b0cSelric 2015*ca1c9b0cSelric2003-09-09 Love Hörnquist Åstrand <lha@it.su.se> 2016*ca1c9b0cSelric 2017*ca1c9b0cSelric * gss_acquire_cred.3: support GSS_SPNEGO_MECHANISM 2018*ca1c9b0cSelric 2019*ca1c9b0cSelric * accept_sec_context.c: SPNEGO doesn't include gss wrapping on 2020*ca1c9b0cSelric SubsequentContextToken like the Kerberos 5 mech does. 2021*ca1c9b0cSelric 2022*ca1c9b0cSelric * init_sec_context.c (spnego_reply): SPNEGO doesn't include gss 2023*ca1c9b0cSelric wrapping on SubsequentContextToken like the Kerberos 5 mech 2024*ca1c9b0cSelric does. Lets check for it anyway. 2025*ca1c9b0cSelric 2026*ca1c9b0cSelric * accept_sec_context.c: Add support for SPNEGO on the initator 2027*ca1c9b0cSelric side. Implementation initially from Assar Westerlund, passes 2028*ca1c9b0cSelric though quite a lot of hands before I commited it. 2029*ca1c9b0cSelric 2030*ca1c9b0cSelric * init_sec_context.c: Add support for SPNEGO on the initator side. 2031*ca1c9b0cSelric Tested with ldap server on a Windows 2000 DC. Implementation 2032*ca1c9b0cSelric initially from Assar Westerlund, passes though quite a lot of 2033*ca1c9b0cSelric hands before I commited it. 2034*ca1c9b0cSelric 2035*ca1c9b0cSelric * gssapi.h: export GSS_SPNEGO_MECHANISM 2036*ca1c9b0cSelric 2037*ca1c9b0cSelric * gssapi_locl.h: include spnego_as.h add prototype for 2038*ca1c9b0cSelric gssapi_krb5_get_mech 2039*ca1c9b0cSelric 2040*ca1c9b0cSelric * decapsulate.c (gssapi_krb5_get_mech): make non static 2041*ca1c9b0cSelric 2042*ca1c9b0cSelric * Makefile.am: build SPNEGO file 2043*ca1c9b0cSelric 2044*ca1c9b0cSelric2003-09-08 Love Hörnquist Åstrand <lha@it.su.se> 2045*ca1c9b0cSelric 2046*ca1c9b0cSelric * external.c: SPENGO and IAKERB oids 2047*ca1c9b0cSelric 2048*ca1c9b0cSelric * spnego.asn1: SPENGO ASN1 2049*ca1c9b0cSelric 2050*ca1c9b0cSelric2003-09-05 Love Hörnquist Åstrand <lha@it.su.se> 2051*ca1c9b0cSelric 2052*ca1c9b0cSelric * cfx.c: RRC also need to be zero before wraping them 2053*ca1c9b0cSelric From: Luke Howard <lukeh@PADL.COM> 2054*ca1c9b0cSelric 2055*ca1c9b0cSelric2003-09-04 Love Hörnquist Åstrand <lha@it.su.se> 2056*ca1c9b0cSelric 2057*ca1c9b0cSelric * encapsulate.c (gssapi_krb5_encap_length): don't return void 2058*ca1c9b0cSelric 2059*ca1c9b0cSelric2003-09-03 Love Hörnquist Åstrand <lha@it.su.se> 2060*ca1c9b0cSelric 2061*ca1c9b0cSelric * verify_mic.c: switch from the des_ to the DES_ api 2062*ca1c9b0cSelric 2063*ca1c9b0cSelric * get_mic.c: switch from the des_ to the DES_ api 2064*ca1c9b0cSelric 2065*ca1c9b0cSelric * unwrap.c: switch from the des_ to the DES_ api 2066*ca1c9b0cSelric 2067*ca1c9b0cSelric * wrap.c: switch from the des_ to the DES_ api 2068*ca1c9b0cSelric 2069*ca1c9b0cSelric * cfx.c: EC is not included in the checksum since the length might 2070*ca1c9b0cSelric change depending on the data. From: Luke Howard <lukeh@PADL.COM> 2071*ca1c9b0cSelric 2072*ca1c9b0cSelric * acquire_cred.c: use 2073*ca1c9b0cSelric krb5_get_init_creds_opt_alloc/krb5_get_init_creds_opt_free 2074*ca1c9b0cSelric 2075*ca1c9b0cSelric2003-09-01 Love Hörnquist Åstrand <lha@it.su.se> 2076*ca1c9b0cSelric 2077*ca1c9b0cSelric * copy_ccache.c: rename 2078*ca1c9b0cSelric gss_krb5_extract_authz_data_from_sec_context to 2079*ca1c9b0cSelric gsskrb5_extract_authz_data_from_sec_context 2080*ca1c9b0cSelric 2081*ca1c9b0cSelric * gssapi.h: rename gss_krb5_extract_authz_data_from_sec_context to 2082*ca1c9b0cSelric gsskrb5_extract_authz_data_from_sec_context 2083*ca1c9b0cSelric 2084*ca1c9b0cSelric2003-08-31 Love Hörnquist Åstrand <lha@it.su.se> 2085*ca1c9b0cSelric 2086*ca1c9b0cSelric * copy_ccache.c (gss_krb5_extract_authz_data_from_sec_context): 2087*ca1c9b0cSelric check that we have a ticket before we start to use it 2088*ca1c9b0cSelric 2089*ca1c9b0cSelric * gss_acquire_cred.3: document 2090*ca1c9b0cSelric gss_krb5_extract_authz_data_from_sec_context 2091*ca1c9b0cSelric 2092*ca1c9b0cSelric * gssapi.h (gss_krb5_extract_authz_data_from_sec_context): 2093*ca1c9b0cSelric return the kerberos authorizationdata, from idea of Luke Howard 2094*ca1c9b0cSelric 2095*ca1c9b0cSelric * copy_ccache.c (gss_krb5_extract_authz_data_from_sec_context): 2096*ca1c9b0cSelric return the kerberos authorizationdata, from idea of Luke Howard 2097*ca1c9b0cSelric 2098*ca1c9b0cSelric * verify_mic.c (gss_verify_mic_internal): switch type and key 2099*ca1c9b0cSelric argument 2100*ca1c9b0cSelric 2101*ca1c9b0cSelric2003-08-30 Love Hörnquist Åstrand <lha@it.su.se> 2102*ca1c9b0cSelric 2103*ca1c9b0cSelric * cfx.[ch]: draft-ietf-krb-wg-gssapi-cfx-01.txt implemetation 2104*ca1c9b0cSelric From: Luke Howard <lukeh@PADL.COM> 2105*ca1c9b0cSelric 2106*ca1c9b0cSelric2003-08-28 Love Hörnquist Åstrand <lha@it.su.se> 2107*ca1c9b0cSelric 2108*ca1c9b0cSelric * arcfour.c (arcfour_mic_cksum): use free_Checksum to free the 2109*ca1c9b0cSelric checksum 2110*ca1c9b0cSelric 2111*ca1c9b0cSelric * arcfour.h: swap two last arguments to verify_mic for consistency 2112*ca1c9b0cSelric with des3 2113*ca1c9b0cSelric 2114*ca1c9b0cSelric * wrap.c,unwrap.c,get_mic.c,verify_mic.c,cfx.c,cfx.h: 2115*ca1c9b0cSelric prefix cfx symbols with _gssapi_ 2116*ca1c9b0cSelric 2117*ca1c9b0cSelric * arcfour.c: release the right buffer 2118*ca1c9b0cSelric 2119*ca1c9b0cSelric * arcfour.c: rename token structure in consistency with rest of 2120*ca1c9b0cSelric GSS-API From: Luke Howard <lukeh@PADL.COM> 2121*ca1c9b0cSelric 2122*ca1c9b0cSelric * unwrap.c (unwrap_des3): use _gssapi_verify_pad 2123*ca1c9b0cSelric (unwrap_des): use _gssapi_verify_pad 2124*ca1c9b0cSelric 2125*ca1c9b0cSelric * arcfour.c (_gssapi_wrap_arcfour): set the correct padding 2126*ca1c9b0cSelric (_gssapi_unwrap_arcfour): verify and strip padding 2127*ca1c9b0cSelric 2128*ca1c9b0cSelric * gssapi_locl.h: added _gssapi_verify_pad 2129*ca1c9b0cSelric 2130*ca1c9b0cSelric * decapsulate.c (_gssapi_verify_pad): verify padding of a gss 2131*ca1c9b0cSelric wrapped message and return its length 2132*ca1c9b0cSelric 2133*ca1c9b0cSelric * arcfour.c: support KEYTYPE_ARCFOUR_56 keys, from Luke Howard 2134*ca1c9b0cSelric <lukeh@PADL.COM> 2135*ca1c9b0cSelric 2136*ca1c9b0cSelric * arcfour.c: use right seal alg, inherit keytype from parent key 2137*ca1c9b0cSelric 2138*ca1c9b0cSelric * arcfour.c: include the confounder in the checksum use the right 2139*ca1c9b0cSelric key usage number for warped/unwraped tokens 2140*ca1c9b0cSelric 2141*ca1c9b0cSelric * gssapi.h: add gss_krb5_nt_general_name as an mit compat glue 2142*ca1c9b0cSelric (same as GSS_KRB5_NT_PRINCIPAL_NAME) 2143*ca1c9b0cSelric 2144*ca1c9b0cSelric * unwrap.c: hook in arcfour unwrap 2145*ca1c9b0cSelric 2146*ca1c9b0cSelric * wrap.c: hook in arcfour wrap 2147*ca1c9b0cSelric 2148*ca1c9b0cSelric * verify_mic.c: hook in arcfour verify_mic 2149*ca1c9b0cSelric 2150*ca1c9b0cSelric * get_mic.c: hook in arcfour get_mic 2151*ca1c9b0cSelric 2152*ca1c9b0cSelric * arcfour.c: implement wrap/unwarp 2153*ca1c9b0cSelric 2154*ca1c9b0cSelric * gssapi_locl.h: add gssapi_{en,de}code_be_om_uint32 2155*ca1c9b0cSelric 2156*ca1c9b0cSelric * 8003.c: add gssapi_{en,de}code_be_om_uint32 2157*ca1c9b0cSelric 2158*ca1c9b0cSelric2003-08-27 Love Hörnquist Åstrand <lha@it.su.se> 2159*ca1c9b0cSelric 2160*ca1c9b0cSelric * arcfour.c (_gssapi_verify_mic_arcfour): Do the checksum on right 2161*ca1c9b0cSelric area. Swap filler check, it was reversed. 2162*ca1c9b0cSelric 2163*ca1c9b0cSelric * Makefile.am (libgssapi_la_SOURCES): += arcfour.c 2164*ca1c9b0cSelric 2165*ca1c9b0cSelric * gssapi_locl.h: include "arcfour.h" 2166*ca1c9b0cSelric 2167*ca1c9b0cSelric * arcfour.c: arcfour gss-api mech, get_mic/verify_mic working 2168*ca1c9b0cSelric 2169*ca1c9b0cSelric * arcfour.h: arcfour gss-api mech, get_mic/verify_mic working 2170*ca1c9b0cSelric 2171*ca1c9b0cSelric2003-08-26 Love Hörnquist Åstrand <lha@it.su.se> 2172*ca1c9b0cSelric 2173*ca1c9b0cSelric * gssapi_locl.h: always include cfx.h add prototype for 2174*ca1c9b0cSelric _gssapi_decapsulate 2175*ca1c9b0cSelric 2176*ca1c9b0cSelric * cfx.[ch]: Implementation of draft-ietf-krb-wg-gssapi-cfx-00.txt 2177*ca1c9b0cSelric from Luke Howard <lukeh@PADL.COM> 2178*ca1c9b0cSelric 2179*ca1c9b0cSelric * decapsulate.c: add _gssapi_decapsulate, from Luke Howard 2180*ca1c9b0cSelric <lukeh@PADL.COM> 2181*ca1c9b0cSelric 2182*ca1c9b0cSelric2003-08-25 Love Hörnquist Åstrand <lha@it.su.se> 2183*ca1c9b0cSelric 2184*ca1c9b0cSelric * unwrap.c: encap/decap now takes a oid if the enctype/keytype is 2185*ca1c9b0cSelric arcfour, return error add hook for cfx 2186*ca1c9b0cSelric 2187*ca1c9b0cSelric * verify_mic.c: encap/decap now takes a oid if the enctype/keytype 2188*ca1c9b0cSelric is arcfour, return error add hook for cfx 2189*ca1c9b0cSelric 2190*ca1c9b0cSelric * get_mic.c: encap/decap now takes a oid if the enctype/keytype is 2191*ca1c9b0cSelric arcfour, return error add hook for cfx 2192*ca1c9b0cSelric 2193*ca1c9b0cSelric * accept_sec_context.c: encap/decap now takes a oid 2194*ca1c9b0cSelric 2195*ca1c9b0cSelric * init_sec_context.c: encap/decap now takes a oid 2196*ca1c9b0cSelric 2197*ca1c9b0cSelric * gssapi_locl.h: include cfx.h if we need it lifetime is a 2198*ca1c9b0cSelric OM_uint32, depend on gssapi interface add all new encap/decap 2199*ca1c9b0cSelric functions 2200*ca1c9b0cSelric 2201*ca1c9b0cSelric * decapsulate.c: add decap functions that doesn't take the token 2202*ca1c9b0cSelric type also make all decap function take the oid mech that they 2203*ca1c9b0cSelric should use 2204*ca1c9b0cSelric 2205*ca1c9b0cSelric * encapsulate.c: add encap functions that doesn't take the token 2206*ca1c9b0cSelric type also make all encap function take the oid mech that they 2207*ca1c9b0cSelric should use 2208*ca1c9b0cSelric 2209*ca1c9b0cSelric * sequence.c (elem_insert): fix a off by one index counter 2210*ca1c9b0cSelric 2211*ca1c9b0cSelric * inquire_cred.c (gss_inquire_cred): handle cred_handle being 2212*ca1c9b0cSelric GSS_C_NO_CREDENTIAL and use the default cred then. 2213*ca1c9b0cSelric 2214*ca1c9b0cSelric2003-08-19 Love Hörnquist Åstrand <lha@it.su.se> 2215*ca1c9b0cSelric 2216*ca1c9b0cSelric * gss_acquire_cred.3: break out extensions and document 2217*ca1c9b0cSelric gsskrb5_register_acceptor_identity 2218*ca1c9b0cSelric 2219*ca1c9b0cSelric2003-08-18 Love Hörnquist Åstrand <lha@it.su.se> 2220*ca1c9b0cSelric 2221*ca1c9b0cSelric * test_acquire_cred.c (print_time): time is returned in seconds 2222*ca1c9b0cSelric from now, not unix time 2223*ca1c9b0cSelric 2224*ca1c9b0cSelric2003-08-17 Love Hörnquist Åstrand <lha@it.su.se> 2225*ca1c9b0cSelric 2226*ca1c9b0cSelric * compat.c (check_compat): avoid leaking principal when finding a 2227*ca1c9b0cSelric match 2228*ca1c9b0cSelric 2229*ca1c9b0cSelric * address_to_krb5addr.c: sa_size argument to krb5_addr2sockaddr is 2230*ca1c9b0cSelric a krb5_socklen_t 2231*ca1c9b0cSelric 2232*ca1c9b0cSelric * acquire_cred.c (gss_acquire_cred): 4th argument to 2233*ca1c9b0cSelric gss_test_oid_set_member is a int 2234*ca1c9b0cSelric 2235*ca1c9b0cSelric2003-07-22 Love Hörnquist Åstrand <lha@it.su.se> 2236*ca1c9b0cSelric 2237*ca1c9b0cSelric * init_sec_context.c (repl_mutual): don't set kerberos error where 2238*ca1c9b0cSelric there was no kerberos error 2239*ca1c9b0cSelric 2240*ca1c9b0cSelric * gssapi_locl.h: Add destruction/creation prototypes and structure 2241*ca1c9b0cSelric for the thread specific storage. 2242*ca1c9b0cSelric 2243*ca1c9b0cSelric * display_status.c: use thread specific storage to set/get the 2244*ca1c9b0cSelric kerberos error message 2245*ca1c9b0cSelric 2246*ca1c9b0cSelric * init.c: Provide locking around the creation of the global 2247*ca1c9b0cSelric krb5_context. Add destruction/creation functions for the thread 2248*ca1c9b0cSelric specific storage that the error string handling is using. 2249*ca1c9b0cSelric 2250*ca1c9b0cSelric2003-07-20 Love Hörnquist Åstrand <lha@it.su.se> 2251*ca1c9b0cSelric 2252*ca1c9b0cSelric * gss_acquire_cred.3: add missing prototype and missing .Ft 2253*ca1c9b0cSelric arguments 2254*ca1c9b0cSelric 2255*ca1c9b0cSelric2003-06-17 Love Hörnquist Åstrand <lha@it.su.se> 2256*ca1c9b0cSelric 2257*ca1c9b0cSelric * verify_mic.c: reorder code so sequence numbers can can be used 2258*ca1c9b0cSelric 2259*ca1c9b0cSelric * unwrap.c: reorder code so sequence numbers can can be used 2260*ca1c9b0cSelric 2261*ca1c9b0cSelric * sequence.c: remove unused function, indent, add 2262*ca1c9b0cSelric gssapi_msg_order_f that filter gss flags to gss_msg_order flags 2263*ca1c9b0cSelric 2264*ca1c9b0cSelric * gssapi_locl.h: prototypes for 2265*ca1c9b0cSelric gssapi_{encode_om_uint32,decode_om_uint32} add sequence number 2266*ca1c9b0cSelric verifier prototypes 2267*ca1c9b0cSelric 2268*ca1c9b0cSelric * delete_sec_context.c: destroy sequence number verifier 2269*ca1c9b0cSelric 2270*ca1c9b0cSelric * init_sec_context.c: remember to free data use sequence number 2271*ca1c9b0cSelric verifier 2272*ca1c9b0cSelric 2273*ca1c9b0cSelric * accept_sec_context.c: don't clear output_token twice remember to 2274*ca1c9b0cSelric free data use sequence number verifier 2275*ca1c9b0cSelric 2276*ca1c9b0cSelric * 8003.c: export and rename encode_om_uint32/decode_om_uint32 and 2277*ca1c9b0cSelric start to use them 2278*ca1c9b0cSelric 2279*ca1c9b0cSelric2003-06-09 Johan Danielsson <joda@pdc.kth.se> 2280*ca1c9b0cSelric 2281*ca1c9b0cSelric * Makefile.am: can't have sequence.c in two different places 2282*ca1c9b0cSelric 2283*ca1c9b0cSelric2003-06-06 Love Hörnquist Åstrand <lha@it.su.se> 2284*ca1c9b0cSelric 2285*ca1c9b0cSelric * test_sequence.c: check rollover, print summery 2286*ca1c9b0cSelric 2287*ca1c9b0cSelric * wrap.c (sub_wrap_size): gss_wrap_size_limit() has 2288*ca1c9b0cSelric req_output_size and max_input_size around the wrong way -- it 2289*ca1c9b0cSelric returns the output token size for a given input size, rather than 2290*ca1c9b0cSelric the maximum input size for a given output token size. 2291*ca1c9b0cSelric 2292*ca1c9b0cSelric From: Luke Howard <lukeh@PADL.COM> 2293*ca1c9b0cSelric 2294*ca1c9b0cSelric2003-06-05 Love Hörnquist Åstrand <lha@it.su.se> 2295*ca1c9b0cSelric 2296*ca1c9b0cSelric * gssapi_locl.h: add prototypes for sequence.c 2297*ca1c9b0cSelric 2298*ca1c9b0cSelric * Makefile.am (libgssapi_la_SOURCES): add sequence.c 2299*ca1c9b0cSelric (test_sequence): build 2300*ca1c9b0cSelric 2301*ca1c9b0cSelric * sequence.c: sequence number checks, order and replay 2302*ca1c9b0cSelric * test_sequence.c: sequence number checks, order and replay 2303*ca1c9b0cSelric 2304*ca1c9b0cSelric2003-06-03 Love Hörnquist Åstrand <lha@it.su.se> 2305*ca1c9b0cSelric 2306*ca1c9b0cSelric * accept_sec_context.c (gss_accept_sec_context): make sure time is 2307*ca1c9b0cSelric returned in seconds from now, not in kerberos time 2308*ca1c9b0cSelric 2309*ca1c9b0cSelric * acquire_cred.c (gss_aquire_cred): make sure time is returned in 2310*ca1c9b0cSelric seconds from now, not in kerberos time 2311*ca1c9b0cSelric 2312*ca1c9b0cSelric * init_sec_context.c (init_auth): if the cred is expired before we 2313*ca1c9b0cSelric tries to create a token, fail so the peer doesn't need reject us 2314*ca1c9b0cSelric (*): make sure time is returned in seconds from now, 2315*ca1c9b0cSelric not in kerberos time 2316*ca1c9b0cSelric (repl_mutual): remember to unlock the context mutex 2317*ca1c9b0cSelric 2318*ca1c9b0cSelric * context_time.c (gss_context_time): remove unused variable 2319*ca1c9b0cSelric 2320*ca1c9b0cSelric * verify_mic.c: make sure minor_status is always set, pointed out 2321*ca1c9b0cSelric by Luke Howard <lukeh@PADL.COM> 2322*ca1c9b0cSelric 2323*ca1c9b0cSelric2003-05-21 Love Hörnquist Åstrand <lha@it.su.se> 2324*ca1c9b0cSelric 2325*ca1c9b0cSelric * *.[ch]: do some basic locking (no reference counting so contexts 2326*ca1c9b0cSelric can be removed while still used) 2327*ca1c9b0cSelric - don't export gss_ctx_id_t_desc_struct and gss_cred_id_t_desc_struct 2328*ca1c9b0cSelric - make sure all lifetime are returned in seconds left until expired, 2329*ca1c9b0cSelric not in unix epoch 2330*ca1c9b0cSelric 2331*ca1c9b0cSelric * gss_acquire_cred.3: document argument lifetime_rec to function 2332*ca1c9b0cSelric gss_inquire_context 2333*ca1c9b0cSelric 2334*ca1c9b0cSelric2003-05-17 Love Hörnquist Åstrand <lha@it.su.se> 2335*ca1c9b0cSelric 2336*ca1c9b0cSelric * test_acquire_cred.c: test gss_add_cred more then once 2337*ca1c9b0cSelric 2338*ca1c9b0cSelric2003-05-06 Love Hörnquist Åstrand <lha@it.su.se> 2339*ca1c9b0cSelric 2340*ca1c9b0cSelric * gssapi.h: if __cplusplus, wrap the extern variable (just to be 2341*ca1c9b0cSelric safe) and functions in extern "C" { } 2342*ca1c9b0cSelric 2343*ca1c9b0cSelric2003-04-30 Love Hörnquist Åstrand <lha@it.su.se> 2344*ca1c9b0cSelric 2345*ca1c9b0cSelric * gssapi.3: more about the des3 mic mess 2346*ca1c9b0cSelric 2347*ca1c9b0cSelric * verify_mic.c (verify_mic_des3): always check if the mic is the 2348*ca1c9b0cSelric correct mic or the mic that old heimdal would have generated 2349*ca1c9b0cSelric 2350*ca1c9b0cSelric2003-04-28 Jacques Vidrine <nectar@kth.se> 2351*ca1c9b0cSelric 2352*ca1c9b0cSelric * verify_mic.c (verify_mic_des3): If MIC verification fails, 2353*ca1c9b0cSelric retry using the `old' MIC computation (with zero IV). 2354*ca1c9b0cSelric 2355*ca1c9b0cSelric2003-04-26 Love Hörnquist Åstrand <lha@it.su.se> 2356*ca1c9b0cSelric 2357*ca1c9b0cSelric * gss_acquire_cred.3: more about difference between comparing IN 2358*ca1c9b0cSelric and MN 2359*ca1c9b0cSelric 2360*ca1c9b0cSelric * gss_acquire_cred.3: more about name type and access control 2361*ca1c9b0cSelric 2362*ca1c9b0cSelric2003-04-25 Love Hörnquist Åstrand <lha@it.su.se> 2363*ca1c9b0cSelric 2364*ca1c9b0cSelric * gss_acquire_cred.3: document gss_context_time 2365*ca1c9b0cSelric 2366*ca1c9b0cSelric * context_time.c: if lifetime of context have expired, set 2367*ca1c9b0cSelric time_rec to 0 and return GSS_S_CONTEXT_EXPIRED 2368*ca1c9b0cSelric 2369*ca1c9b0cSelric * gssapi.3: document [gssapi]correct_des3_mic 2370*ca1c9b0cSelric [gssapi]broken_des3_mic 2371*ca1c9b0cSelric 2372*ca1c9b0cSelric * gss_acquire_cred.3: document gss_krb5_compat_des3_mic 2373*ca1c9b0cSelric 2374*ca1c9b0cSelric * compat.c (gss_krb5_compat_des3_mic): enable turning on/off des3 2375*ca1c9b0cSelric mic compat 2376*ca1c9b0cSelric (_gss_DES3_get_mic_compat): handle [gssapi]correct_des3_mic too 2377*ca1c9b0cSelric 2378*ca1c9b0cSelric * gssapi.h (gss_krb5_compat_des3_mic): new function, turn on/off 2379*ca1c9b0cSelric des3 mic compat 2380*ca1c9b0cSelric (GSS_C_KRB5_COMPAT_DES3_MIC): cpp symbol that exists if 2381*ca1c9b0cSelric gss_krb5_compat_des3_mic exists 2382*ca1c9b0cSelric 2383*ca1c9b0cSelric2003-04-24 Love Hörnquist Åstrand <lha@it.su.se> 2384*ca1c9b0cSelric 2385*ca1c9b0cSelric * Makefile.am: (libgssapi_la_LDFLAGS): update major 2386*ca1c9b0cSelric version of gssapi for incompatiblity in 3des getmic support 2387*ca1c9b0cSelric 2388*ca1c9b0cSelric2003-04-23 Love Hörnquist Åstrand <lha@it.su.se> 2389*ca1c9b0cSelric 2390*ca1c9b0cSelric * Makefile.am: test_acquire_cred_LDADD: use libgssapi.la not 2391*ca1c9b0cSelric ./libgssapi.la (make make -jN work) 2392*ca1c9b0cSelric 2393*ca1c9b0cSelric2003-04-16 Love Hörnquist Åstrand <lha@it.su.se> 2394*ca1c9b0cSelric 2395*ca1c9b0cSelric * gssapi.3: spelling 2396*ca1c9b0cSelric 2397*ca1c9b0cSelric * gss_acquire_cred.3: Change .Fd #include <header.h> to .In 2398*ca1c9b0cSelric header.h, from Thomas Klausner <wiz@netbsd.org> 2399*ca1c9b0cSelric 2400*ca1c9b0cSelric 2401*ca1c9b0cSelric2003-04-06 Love Hörnquist Åstrand <lha@it.su.se> 2402*ca1c9b0cSelric 2403*ca1c9b0cSelric * gss_acquire_cred.3: spelling 2404*ca1c9b0cSelric 2405*ca1c9b0cSelric * Makefile.am: remove stuff that sneaked in with last commit 2406*ca1c9b0cSelric 2407*ca1c9b0cSelric * acquire_cred.c (acquire_initiator_cred): if the requested name 2408*ca1c9b0cSelric isn't in the ccache, also check keytab. Extact the krbtgt for the 2409*ca1c9b0cSelric default realm to check how long the credentials will last. 2410*ca1c9b0cSelric 2411*ca1c9b0cSelric * add_cred.c (gss_add_cred): don't create a new ccache, just open 2412*ca1c9b0cSelric the old one; better check if output handle is compatible with new 2413*ca1c9b0cSelric (copied) handle 2414*ca1c9b0cSelric 2415*ca1c9b0cSelric * test_acquire_cred.c: test gss_add_cred too 2416*ca1c9b0cSelric 2417*ca1c9b0cSelric2003-04-03 Love Hörnquist Åstrand <lha@it.su.se> 2418*ca1c9b0cSelric 2419*ca1c9b0cSelric * Makefile.am: build test_acquire_cred 2420*ca1c9b0cSelric 2421*ca1c9b0cSelric * test_acquire_cred.c: simple gss_acquire_cred test 2422*ca1c9b0cSelric 2423*ca1c9b0cSelric2003-04-02 Love Hörnquist Åstrand <lha@it.su.se> 2424*ca1c9b0cSelric 2425*ca1c9b0cSelric * gss_acquire_cred.3: s/gssapi/GSS-API/ 2426*ca1c9b0cSelric 2427*ca1c9b0cSelric2003-03-19 Love Hörnquist Åstrand <lha@it.su.se> 2428*ca1c9b0cSelric 2429*ca1c9b0cSelric * gss_acquire_cred.3: document v1 interface (and that they are 2430*ca1c9b0cSelric obsolete) 2431*ca1c9b0cSelric 2432*ca1c9b0cSelric2003-03-18 Love Hörnquist Åstrand <lha@it.su.se> 2433*ca1c9b0cSelric 2434*ca1c9b0cSelric * gss_acquire_cred.3: list supported mechanism and nametypes 2435*ca1c9b0cSelric 2436*ca1c9b0cSelric2003-03-16 Love Hörnquist Åstrand <lha@it.su.se> 2437*ca1c9b0cSelric 2438*ca1c9b0cSelric * gss_acquire_cred.3: text about gss_display_name 2439*ca1c9b0cSelric 2440*ca1c9b0cSelric * Makefile.am (libgssapi_la_LDFLAGS): bump to 3:6:2 2441*ca1c9b0cSelric (libgssapi_la_SOURCES): add all new functions 2442*ca1c9b0cSelric 2443*ca1c9b0cSelric * gssapi.3: now that we have a functions, uncomment the missing 2444*ca1c9b0cSelric ones 2445*ca1c9b0cSelric 2446*ca1c9b0cSelric * gss_acquire_cred.3: now that we have a functions, uncomment the 2447*ca1c9b0cSelric missing ones 2448*ca1c9b0cSelric 2449*ca1c9b0cSelric * process_context_token.c: implement gss_process_context_token 2450*ca1c9b0cSelric 2451*ca1c9b0cSelric * inquire_names_for_mech.c: implement gss_inquire_names_for_mech 2452*ca1c9b0cSelric 2453*ca1c9b0cSelric * inquire_mechs_for_name.c: implement gss_inquire_mechs_for_name 2454*ca1c9b0cSelric 2455*ca1c9b0cSelric * inquire_cred_by_mech.c: implement gss_inquire_cred_by_mech 2456*ca1c9b0cSelric 2457*ca1c9b0cSelric * add_cred.c: implement gss_add_cred 2458*ca1c9b0cSelric 2459*ca1c9b0cSelric * acquire_cred.c (gss_acquire_cred): more testing of input 2460*ca1c9b0cSelric argument, make sure output arguments are ok, since we don't know 2461*ca1c9b0cSelric the time_rec (for now), set it to time_req 2462*ca1c9b0cSelric 2463*ca1c9b0cSelric * export_sec_context.c: send lifetime, also set minor_status 2464*ca1c9b0cSelric 2465*ca1c9b0cSelric * get_mic.c: set minor_status 2466*ca1c9b0cSelric 2467*ca1c9b0cSelric * import_sec_context.c (gss_import_sec_context): add error 2468*ca1c9b0cSelric checking, pick up lifetime (if there is no lifetime, use 2469*ca1c9b0cSelric GSS_C_INDEFINITE) 2470*ca1c9b0cSelric 2471*ca1c9b0cSelric * init_sec_context.c: take care to set export value to something 2472*ca1c9b0cSelric sane before we start so caller will have harmless values in them 2473*ca1c9b0cSelric if then function fails 2474*ca1c9b0cSelric 2475*ca1c9b0cSelric * release_buffer.c (gss_release_buffer): set minor_status 2476*ca1c9b0cSelric 2477*ca1c9b0cSelric * wrap.c: make sure minor_status get set 2478*ca1c9b0cSelric 2479*ca1c9b0cSelric * verify_mic.c (gss_verify_mic_internal): rename verify_mic to 2480*ca1c9b0cSelric gss_verify_mic_internal and let it take the type as an argument, 2481*ca1c9b0cSelric (gss_verify_mic): call gss_verify_mic_internal 2482*ca1c9b0cSelric set minor_status 2483*ca1c9b0cSelric 2484*ca1c9b0cSelric * unwrap.c: set minor_status 2485*ca1c9b0cSelric 2486*ca1c9b0cSelric * test_oid_set_member.c (gss_test_oid_set_member): use 2487*ca1c9b0cSelric gss_oid_equal 2488*ca1c9b0cSelric 2489*ca1c9b0cSelric * release_oid_set.c (gss_release_oid_set): set minor_status 2490*ca1c9b0cSelric 2491*ca1c9b0cSelric * release_name.c (gss_release_name): set minor_status 2492*ca1c9b0cSelric 2493*ca1c9b0cSelric * release_cred.c (gss_release_cred): set minor_status 2494*ca1c9b0cSelric 2495*ca1c9b0cSelric * add_oid_set_member.c (gss_add_oid_set_member): set minor_status 2496*ca1c9b0cSelric 2497*ca1c9b0cSelric * compare_name.c (gss_compare_name): set minor_status 2498*ca1c9b0cSelric 2499*ca1c9b0cSelric * compat.c (check_compat): make sure ret have a defined value 2500*ca1c9b0cSelric 2501*ca1c9b0cSelric * context_time.c (gss_context_time): set minor_status 2502*ca1c9b0cSelric 2503*ca1c9b0cSelric * copy_ccache.c (gss_krb5_copy_ccache): set minor_status 2504*ca1c9b0cSelric 2505*ca1c9b0cSelric * create_emtpy_oid_set.c (gss_create_empty_oid_set): set 2506*ca1c9b0cSelric minor_status 2507*ca1c9b0cSelric 2508*ca1c9b0cSelric * delete_sec_context.c (gss_delete_sec_context): set minor_status 2509*ca1c9b0cSelric 2510*ca1c9b0cSelric * display_name.c (gss_display_name): set minor_status 2511*ca1c9b0cSelric 2512*ca1c9b0cSelric * display_status.c (gss_display_status): use gss_oid_equal, handle 2513*ca1c9b0cSelric supplementary errors 2514*ca1c9b0cSelric 2515*ca1c9b0cSelric * duplicate_name.c (gss_duplicate_name): set minor_status 2516*ca1c9b0cSelric 2517*ca1c9b0cSelric * inquire_context.c (gss_inquire_context): set lifetime_rec now 2518*ca1c9b0cSelric when we know it, set minor_status 2519*ca1c9b0cSelric 2520*ca1c9b0cSelric * inquire_cred.c (gss_inquire_cred): take care to set export value 2521*ca1c9b0cSelric to something sane before we start so caller will have harmless 2522*ca1c9b0cSelric values in them if the function fails 2523*ca1c9b0cSelric 2524*ca1c9b0cSelric * accept_sec_context.c (gss_accept_sec_context): take care to set 2525*ca1c9b0cSelric export value to something sane before we start so caller will have 2526*ca1c9b0cSelric harmless values in them if then function fails, set lifetime from 2527*ca1c9b0cSelric ticket expiration date 2528*ca1c9b0cSelric 2529*ca1c9b0cSelric * indicate_mechs.c (gss_indicate_mechs): use 2530*ca1c9b0cSelric gss_create_empty_oid_set and gss_add_oid_set_member 2531*ca1c9b0cSelric 2532*ca1c9b0cSelric * gssapi.h (gss_ctx_id_t_desc): store the lifetime in the cred, 2533*ca1c9b0cSelric since there is no ticket transfered in the exported context 2534*ca1c9b0cSelric 2535*ca1c9b0cSelric * export_name.c (gss_export_name): export name with 2536*ca1c9b0cSelric GSS_C_NT_EXPORT_NAME wrapping, not just the principal 2537*ca1c9b0cSelric 2538*ca1c9b0cSelric * import_name.c (import_export_name): new function, parses a 2539*ca1c9b0cSelric GSS_C_NT_EXPORT_NAME 2540*ca1c9b0cSelric (import_krb5_name): factor out common code of parsing krb5 name 2541*ca1c9b0cSelric (gss_oid_equal): rename from oid_equal 2542*ca1c9b0cSelric 2543*ca1c9b0cSelric * gssapi_locl.h: add prototypes for gss_oid_equal and 2544*ca1c9b0cSelric gss_verify_mic_internal 2545*ca1c9b0cSelric 2546*ca1c9b0cSelric * gssapi.h: comment out the argument names 2547*ca1c9b0cSelric 2548*ca1c9b0cSelric2003-03-15 Love Hörnquist Åstrand <lha@it.su.se> 2549*ca1c9b0cSelric 2550*ca1c9b0cSelric * gssapi.3: add LIST OF FUNCTIONS and copyright/license 2551*ca1c9b0cSelric 2552*ca1c9b0cSelric * Makefile.am: s/gss_aquire_cred.3/gss_acquire_cred.3/ 2553*ca1c9b0cSelric 2554*ca1c9b0cSelric * Makefile.am: man_MANS += gss_aquire_cred.3 2555*ca1c9b0cSelric 2556*ca1c9b0cSelric2003-03-14 Love Hörnquist Åstrand <lha@it.su.se> 2557*ca1c9b0cSelric 2558*ca1c9b0cSelric * gss_aquire_cred.3: the gssapi api manpage 2559*ca1c9b0cSelric 2560*ca1c9b0cSelric2003-03-03 Love Hörnquist Åstrand <lha@it.su.se> 2561*ca1c9b0cSelric 2562*ca1c9b0cSelric * inquire_context.c: (gss_inquire_context): rename argument open 2563*ca1c9b0cSelric to open_context 2564*ca1c9b0cSelric 2565*ca1c9b0cSelric * gssapi.h (gss_inquire_context): rename argument open to open_context 2566*ca1c9b0cSelric 2567*ca1c9b0cSelric2003-02-27 Love Hörnquist Åstrand <lha@it.su.se> 2568*ca1c9b0cSelric 2569*ca1c9b0cSelric * init_sec_context.c (do_delegation): remove unused variable 2570*ca1c9b0cSelric subkey 2571*ca1c9b0cSelric 2572*ca1c9b0cSelric * gssapi.3: all 0.5.x version had broken token delegation 2573*ca1c9b0cSelric 2574*ca1c9b0cSelric2003-02-21 Love Hörnquist Åstrand <lha@it.su.se> 2575*ca1c9b0cSelric 2576*ca1c9b0cSelric * (init_auth): only generate one subkey 2577*ca1c9b0cSelric 2578*ca1c9b0cSelric2003-01-27 Love Hörnquist Åstrand <lha@it.su.se> 2579*ca1c9b0cSelric 2580*ca1c9b0cSelric * verify_mic.c (verify_mic_des3): fix 3des verify_mic to conform 2581*ca1c9b0cSelric to rfc (and mit kerberos), provide backward compat hook 2582*ca1c9b0cSelric 2583*ca1c9b0cSelric * get_mic.c (mic_des3): fix 3des get_mic to conform to rfc (and 2584*ca1c9b0cSelric mit kerberos), provide backward compat hook 2585*ca1c9b0cSelric 2586*ca1c9b0cSelric * init_sec_context.c (init_auth): check if we need compat for 2587*ca1c9b0cSelric older get_mic/verify_mic 2588*ca1c9b0cSelric 2589*ca1c9b0cSelric * gssapi_locl.h: add prototype for _gss_DES3_get_mic_compat 2590*ca1c9b0cSelric 2591*ca1c9b0cSelric * gssapi.h (more_flags): add COMPAT_OLD_DES3 2592*ca1c9b0cSelric 2593*ca1c9b0cSelric * Makefile.am: add gssapi.3 and compat.c 2594*ca1c9b0cSelric 2595*ca1c9b0cSelric * gssapi.3: add gssapi COMPATIBILITY documentation 2596*ca1c9b0cSelric 2597*ca1c9b0cSelric * accept_sec_context.c (gss_accept_sec_context): check if we need 2598*ca1c9b0cSelric compat for older get_mic/verify_mic 2599*ca1c9b0cSelric 2600*ca1c9b0cSelric * compat.c: check for compatiblity with other heimdal's 3des 2601*ca1c9b0cSelric get_mic/verify_mic 2602*ca1c9b0cSelric 2603*ca1c9b0cSelric2002-10-31 Johan Danielsson <joda@pdc.kth.se> 2604*ca1c9b0cSelric 2605*ca1c9b0cSelric * check return value from gssapi_krb5_init 2606*ca1c9b0cSelric 2607*ca1c9b0cSelric * 8003.c (gssapi_krb5_verify_8003_checksum): check size of input 2608*ca1c9b0cSelric 2609*ca1c9b0cSelric2002-09-03 Johan Danielsson <joda@pdc.kth.se> 2610*ca1c9b0cSelric 2611*ca1c9b0cSelric * wrap.c (wrap_des3): use ETYPE_DES3_CBC_NONE 2612*ca1c9b0cSelric 2613*ca1c9b0cSelric * unwrap.c (unwrap_des3): use ETYPE_DES3_CBC_NONE 2614*ca1c9b0cSelric 2615*ca1c9b0cSelric2002-09-02 Johan Danielsson <joda@pdc.kth.se> 2616*ca1c9b0cSelric 2617*ca1c9b0cSelric * init_sec_context.c: we need to generate a local subkey here 2618*ca1c9b0cSelric 2619*ca1c9b0cSelric2002-08-20 Jacques Vidrine <n@nectar.com> 2620*ca1c9b0cSelric 2621*ca1c9b0cSelric * acquire_cred.c, inquire_cred.c, release_cred.c: Use default 2622*ca1c9b0cSelric credential resolution if gss_acquire_cred is called with 2623*ca1c9b0cSelric GSS_C_NO_NAME. 2624*ca1c9b0cSelric 2625*ca1c9b0cSelric2002-06-20 Jacques Vidrine <n@nectar.com> 2626*ca1c9b0cSelric 2627*ca1c9b0cSelric * import_name.c: Compare name types by value if pointers do 2628*ca1c9b0cSelric not match. Reported by: "Douglas E. Engert" <deengert@anl.gov> 2629*ca1c9b0cSelric 2630*ca1c9b0cSelric2002-05-20 Jacques Vidrine <n@nectar.com> 2631*ca1c9b0cSelric 2632*ca1c9b0cSelric * verify_mic.c (gss_verify_mic), unwrap.c (gss_unwrap): initialize 2633*ca1c9b0cSelric the qop_state parameter. from Doug Rabson <dfr@nlsystems.com> 2634*ca1c9b0cSelric 2635*ca1c9b0cSelric2002-05-09 Jacques Vidrine <n@nectar.com> 2636*ca1c9b0cSelric 2637*ca1c9b0cSelric * acquire_cred.c: handle GSS_C_INITIATE/GSS_C_ACCEPT/GSS_C_BOTH 2638*ca1c9b0cSelric 2639*ca1c9b0cSelric2002-05-08 Jacques Vidrine <n@nectar.com> 2640*ca1c9b0cSelric 2641*ca1c9b0cSelric * acquire_cred.c: initialize gssapi; handle null desired_name 2642*ca1c9b0cSelric 2643*ca1c9b0cSelric2002-03-22 Johan Danielsson <joda@pdc.kth.se> 2644*ca1c9b0cSelric 2645*ca1c9b0cSelric * Makefile.am: remove non-functional stuff accidentally committed 2646*ca1c9b0cSelric 2647*ca1c9b0cSelric2002-03-11 Assar Westerlund <assar@sics.se> 2648*ca1c9b0cSelric 2649*ca1c9b0cSelric * Makefile.am (libgssapi_la_LDFLAGS): bump version to 3:5:2 2650*ca1c9b0cSelric * 8003.c (gssapi_krb5_verify_8003_checksum): handle zero channel 2651*ca1c9b0cSelric bindings 2652*ca1c9b0cSelric 2653*ca1c9b0cSelric2001-10-31 Jacques Vidrine <n@nectar.com> 2654*ca1c9b0cSelric 2655*ca1c9b0cSelric * get_mic.c (mic_des3): MIC computation using DES3/SHA1 2656*ca1c9b0cSelric was bogusly appending the message buffer to the result, 2657*ca1c9b0cSelric overwriting a heap buffer in the process. 2658*ca1c9b0cSelric 2659*ca1c9b0cSelric2001-08-29 Assar Westerlund <assar@sics.se> 2660*ca1c9b0cSelric 2661*ca1c9b0cSelric * 8003.c (gssapi_krb5_verify_8003_checksum, 2662*ca1c9b0cSelric gssapi_krb5_create_8003_checksum): make more consistent by always 2663*ca1c9b0cSelric returning an gssapi error and setting minor status. update 2664*ca1c9b0cSelric callers 2665*ca1c9b0cSelric 2666*ca1c9b0cSelric2001-08-28 Jacques Vidrine <n@nectar.com> 2667*ca1c9b0cSelric 2668*ca1c9b0cSelric * accept_sec_context.c: Create a cache for delegated credentials 2669*ca1c9b0cSelric when needed. 2670*ca1c9b0cSelric 2671*ca1c9b0cSelric2001-08-28 Assar Westerlund <assar@sics.se> 2672*ca1c9b0cSelric 2673*ca1c9b0cSelric * Makefile.am (libgssapi_la_LDFLAGS): set version to 3:4:2 2674*ca1c9b0cSelric 2675*ca1c9b0cSelric2001-08-23 Assar Westerlund <assar@sics.se> 2676*ca1c9b0cSelric 2677*ca1c9b0cSelric * *.c: handle minor_status more consistently 2678*ca1c9b0cSelric 2679*ca1c9b0cSelric * display_status.c (gss_display_status): handle krb5_get_err_text 2680*ca1c9b0cSelric failing 2681*ca1c9b0cSelric 2682*ca1c9b0cSelric2001-08-15 Johan Danielsson <joda@pdc.kth.se> 2683*ca1c9b0cSelric 2684*ca1c9b0cSelric * gssapi_locl.h: fix prototype for gssapi_krb5_init 2685*ca1c9b0cSelric 2686*ca1c9b0cSelric2001-08-13 Johan Danielsson <joda@pdc.kth.se> 2687*ca1c9b0cSelric 2688*ca1c9b0cSelric * accept_sec_context.c (gsskrb5_register_acceptor_identity): init 2689*ca1c9b0cSelric context and check return value from kt_resolve 2690*ca1c9b0cSelric 2691*ca1c9b0cSelric * init.c: return error code 2692*ca1c9b0cSelric 2693*ca1c9b0cSelric2001-07-19 Assar Westerlund <assar@sics.se> 2694*ca1c9b0cSelric 2695*ca1c9b0cSelric * Makefile.am (libgssapi_la_LDFLAGS): update to 3:3:2 2696*ca1c9b0cSelric 2697*ca1c9b0cSelric2001-07-12 Assar Westerlund <assar@sics.se> 2698*ca1c9b0cSelric 2699*ca1c9b0cSelric * Makefile.am (libgssapi_la_LIBADD): add required library 2700*ca1c9b0cSelric dependencies 2701*ca1c9b0cSelric 2702*ca1c9b0cSelric2001-07-06 Assar Westerlund <assar@sics.se> 2703*ca1c9b0cSelric 2704*ca1c9b0cSelric * accept_sec_context.c (gsskrb5_register_acceptor_identity): set 2705*ca1c9b0cSelric the keytab to be used for gss_acquire_cred too' 2706*ca1c9b0cSelric 2707*ca1c9b0cSelric2001-07-03 Assar Westerlund <assar@sics.se> 2708*ca1c9b0cSelric 2709*ca1c9b0cSelric * Makefile.am (libgssapi_la_LDFLAGS): set version to 3:2:2 2710*ca1c9b0cSelric 2711*ca1c9b0cSelric2001-06-18 Assar Westerlund <assar@sics.se> 2712*ca1c9b0cSelric 2713*ca1c9b0cSelric * wrap.c: replace gss_krb5_getsomekey with gss_krb5_get_localkey 2714*ca1c9b0cSelric and gss_krb5_get_remotekey 2715*ca1c9b0cSelric * verify_mic.c: update krb5_auth_con function names use 2716*ca1c9b0cSelric gss_krb5_get_remotekey 2717*ca1c9b0cSelric * unwrap.c: replace gss_krb5_getsomekey with gss_krb5_get_localkey 2718*ca1c9b0cSelric and gss_krb5_get_remotekey 2719*ca1c9b0cSelric * gssapi_locl.h (gss_krb5_get_remotekey, gss_krb5_get_localkey): 2720*ca1c9b0cSelric add prototypes 2721*ca1c9b0cSelric * get_mic.c: update krb5_auth_con function names. use 2722*ca1c9b0cSelric gss_krb5_get_localkey 2723*ca1c9b0cSelric * accept_sec_context.c: update krb5_auth_con function names 2724*ca1c9b0cSelric 2725*ca1c9b0cSelric2001-05-17 Assar Westerlund <assar@sics.se> 2726*ca1c9b0cSelric 2727*ca1c9b0cSelric * Makefile.am: bump version to 3:1:2 2728*ca1c9b0cSelric 2729*ca1c9b0cSelric2001-05-14 Assar Westerlund <assar@sics.se> 2730*ca1c9b0cSelric 2731*ca1c9b0cSelric * address_to_krb5addr.c: adapt to new address functions 2732*ca1c9b0cSelric 2733*ca1c9b0cSelric2001-05-11 Assar Westerlund <assar@sics.se> 2734*ca1c9b0cSelric 2735*ca1c9b0cSelric * try to return the error string from libkrb5 where applicable 2736*ca1c9b0cSelric 2737*ca1c9b0cSelric2001-05-08 Assar Westerlund <assar@sics.se> 2738*ca1c9b0cSelric 2739*ca1c9b0cSelric * delete_sec_context.c (gss_delete_sec_context): remember to free 2740*ca1c9b0cSelric the memory used by the ticket itself. from <tmartin@mirapoint.com> 2741*ca1c9b0cSelric 2742*ca1c9b0cSelric2001-05-04 Assar Westerlund <assar@sics.se> 2743*ca1c9b0cSelric 2744*ca1c9b0cSelric * gssapi_locl.h: add config.h for completeness 2745*ca1c9b0cSelric * gssapi.h: remove config.h, this is an installed header file 2746*ca1c9b0cSelric sys/types.h is not needed either 2747*ca1c9b0cSelric 2748*ca1c9b0cSelric2001-03-12 Assar Westerlund <assar@sics.se> 2749*ca1c9b0cSelric 2750*ca1c9b0cSelric * acquire_cred.c (gss_acquire_cred): remove memory leaks. from 2751*ca1c9b0cSelric Jason R Thorpe <thorpej@zembu.com> 2752*ca1c9b0cSelric 2753*ca1c9b0cSelric2001-02-18 Assar Westerlund <assar@sics.se> 2754*ca1c9b0cSelric 2755*ca1c9b0cSelric * accept_sec_context.c (gss_accept_sec_context): either return 2756*ca1c9b0cSelric gss_name NULL-ed or set 2757*ca1c9b0cSelric 2758*ca1c9b0cSelric * import_name.c: set minor_status in some cases where it was not 2759*ca1c9b0cSelric done 2760*ca1c9b0cSelric 2761*ca1c9b0cSelric2001-02-15 Assar Westerlund <assar@sics.se> 2762*ca1c9b0cSelric 2763*ca1c9b0cSelric * wrap.c: use krb5_generate_random_block for the confounders 2764*ca1c9b0cSelric 2765*ca1c9b0cSelric2001-01-30 Assar Westerlund <assar@sics.se> 2766*ca1c9b0cSelric 2767*ca1c9b0cSelric * Makefile.am (libgssapi_la_LDFLAGS): bump version to 3:0:2 2768*ca1c9b0cSelric * acquire_cred.c, init_sec_context.c, release_cred.c: add support 2769*ca1c9b0cSelric for getting creds from a keytab, from fvdl@netbsd.org 2770*ca1c9b0cSelric 2771*ca1c9b0cSelric * copy_ccache.c: add gss_krb5_copy_ccache 2772*ca1c9b0cSelric 2773*ca1c9b0cSelric2001-01-27 Assar Westerlund <assar@sics.se> 2774*ca1c9b0cSelric 2775*ca1c9b0cSelric * get_mic.c: cast parameters to des function to non-const pointers 2776*ca1c9b0cSelric to handle the case where these functions actually take non-const 2777*ca1c9b0cSelric des_cblock * 2778*ca1c9b0cSelric 2779*ca1c9b0cSelric2001-01-09 Assar Westerlund <assar@sics.se> 2780*ca1c9b0cSelric 2781*ca1c9b0cSelric * accept_sec_context.c (gss_accept_sec_context): use krb5_rd_cred2 2782*ca1c9b0cSelric instead of krb5_rd_cred 2783*ca1c9b0cSelric 2784*ca1c9b0cSelric2000-12-11 Assar Westerlund <assar@sics.se> 2785*ca1c9b0cSelric 2786*ca1c9b0cSelric * Makefile.am (libgssapi_la_LDFLAGS): bump to 2:3:1 2787*ca1c9b0cSelric 2788*ca1c9b0cSelric2000-12-08 Assar Westerlund <assar@sics.se> 2789*ca1c9b0cSelric 2790*ca1c9b0cSelric * wrap.c (wrap_des3): use the checksum as ivec when encrypting the 2791*ca1c9b0cSelric sequence number 2792*ca1c9b0cSelric * unwrap.c (unwrap_des3): use the checksum as ivec when encrypting 2793*ca1c9b0cSelric the sequence number 2794*ca1c9b0cSelric * init_sec_context.c (init_auth): always zero fwd_data 2795*ca1c9b0cSelric 2796*ca1c9b0cSelric2000-12-06 Johan Danielsson <joda@pdc.kth.se> 2797*ca1c9b0cSelric 2798*ca1c9b0cSelric * accept_sec_context.c: de-pointerise auth_context parameter to 2799*ca1c9b0cSelric krb5_mk_rep 2800*ca1c9b0cSelric 2801*ca1c9b0cSelric2000-11-15 Assar Westerlund <assar@sics.se> 2802*ca1c9b0cSelric 2803*ca1c9b0cSelric * init_sec_context.c (init_auth): update to new 2804*ca1c9b0cSelric krb5_build_authenticator 2805*ca1c9b0cSelric 2806*ca1c9b0cSelric2000-09-19 Assar Westerlund <assar@sics.se> 2807*ca1c9b0cSelric 2808*ca1c9b0cSelric * Makefile.am (libgssapi_la_LDFLAGS): bump to 2:2:1 2809*ca1c9b0cSelric 2810*ca1c9b0cSelric2000-08-27 Assar Westerlund <assar@sics.se> 2811*ca1c9b0cSelric 2812*ca1c9b0cSelric * init_sec_context.c: actually pay attention to `time_req' 2813*ca1c9b0cSelric * init_sec_context.c: re-organize. leak less memory. 2814*ca1c9b0cSelric * gssapi_locl.h (gssapi_krb5_encapsulate, gss_krb5_getsomekey): 2815*ca1c9b0cSelric update prototypes add assert.h 2816*ca1c9b0cSelric * gssapi.h (GSS_KRB5_CONF_C_QOP_DES, GSS_KRB5_CONF_C_QOP_DES3_KD): 2817*ca1c9b0cSelric add 2818*ca1c9b0cSelric * verify_mic.c: re-organize and add 3DES code 2819*ca1c9b0cSelric * wrap.c: re-organize and add 3DES code 2820*ca1c9b0cSelric * unwrap.c: re-organize and add 3DES code 2821*ca1c9b0cSelric * get_mic.c: re-organize and add 3DES code 2822*ca1c9b0cSelric * encapsulate.c (gssapi_krb5_encapsulate): do not free `in_data', 2823*ca1c9b0cSelric let the caller do that. fix the callers. 2824*ca1c9b0cSelric 2825*ca1c9b0cSelric2000-08-16 Assar Westerlund <assar@sics.se> 2826*ca1c9b0cSelric 2827*ca1c9b0cSelric * Makefile.am: bump version to 2:1:1 2828*ca1c9b0cSelric 2829*ca1c9b0cSelric2000-07-29 Assar Westerlund <assar@sics.se> 2830*ca1c9b0cSelric 2831*ca1c9b0cSelric * decapsulate.c (gssapi_krb5_verify_header): sanity-check length 2832*ca1c9b0cSelric 2833*ca1c9b0cSelric2000-07-25 Johan Danielsson <joda@pdc.kth.se> 2834*ca1c9b0cSelric 2835*ca1c9b0cSelric * Makefile.am: bump version to 2:0:1 2836*ca1c9b0cSelric 2837*ca1c9b0cSelric2000-07-22 Assar Westerlund <assar@sics.se> 2838*ca1c9b0cSelric 2839*ca1c9b0cSelric * gssapi.h: update OID for GSS_C_NT_HOSTBASED_SERVICE and other 2840*ca1c9b0cSelric details from rfc2744 2841*ca1c9b0cSelric 2842*ca1c9b0cSelric2000-06-29 Assar Westerlund <assar@sics.se> 2843*ca1c9b0cSelric 2844*ca1c9b0cSelric * address_to_krb5addr.c (gss_address_to_krb5addr): actually use 2845*ca1c9b0cSelric `int' instead of `sa_family_t' for the address family. 2846*ca1c9b0cSelric 2847*ca1c9b0cSelric2000-06-21 Assar Westerlund <assar@sics.se> 2848*ca1c9b0cSelric 2849*ca1c9b0cSelric * add support for token delegation. From Daniel Kouril 2850*ca1c9b0cSelric <kouril@ics.muni.cz> and Miroslav Ruda <ruda@ics.muni.cz> 2851*ca1c9b0cSelric 2852*ca1c9b0cSelric2000-05-15 Assar Westerlund <assar@sics.se> 2853*ca1c9b0cSelric 2854*ca1c9b0cSelric * Makefile.am (libgssapi_la_LDFLAGS): set version to 1:1:1 2855*ca1c9b0cSelric 2856*ca1c9b0cSelric2000-04-12 Assar Westerlund <assar@sics.se> 2857*ca1c9b0cSelric 2858*ca1c9b0cSelric * release_oid_set.c (gss_release_oid_set): clear set for 2859*ca1c9b0cSelric robustness. From GOMBAS Gabor <gombasg@inf.elte.hu> 2860*ca1c9b0cSelric * release_name.c (gss_release_name): reset input_name for 2861*ca1c9b0cSelric robustness. From GOMBAS Gabor <gombasg@inf.elte.hu> 2862*ca1c9b0cSelric * release_buffer.c (gss_release_buffer): set value to NULL to be 2863*ca1c9b0cSelric more robust. From GOMBAS Gabor <gombasg@inf.elte.hu> 2864*ca1c9b0cSelric * add_oid_set_member.c (gss_add_oid_set_member): actually check if 2865*ca1c9b0cSelric the oid is a member first. leave the oid_set unchanged if realloc 2866*ca1c9b0cSelric fails. 2867*ca1c9b0cSelric 2868*ca1c9b0cSelric2000-02-13 Assar Westerlund <assar@sics.se> 2869*ca1c9b0cSelric 2870*ca1c9b0cSelric * Makefile.am: set version to 1:0:1 2871*ca1c9b0cSelric 2872*ca1c9b0cSelric2000-02-12 Assar Westerlund <assar@sics.se> 2873*ca1c9b0cSelric 2874*ca1c9b0cSelric * gssapi_locl.h: add flags for import/export 2875*ca1c9b0cSelric * import_sec_context.c (import_sec_context: add flags for what 2876*ca1c9b0cSelric fields are included. do not include the authenticator for now. 2877*ca1c9b0cSelric * export_sec_context.c (export_sec_context: add flags for what 2878*ca1c9b0cSelric fields are included. do not include the authenticator for now. 2879*ca1c9b0cSelric * accept_sec_context.c (gss_accept_sec_context): set target in 2880*ca1c9b0cSelric context_handle 2881*ca1c9b0cSelric 2882*ca1c9b0cSelric2000-02-11 Assar Westerlund <assar@sics.se> 2883*ca1c9b0cSelric 2884*ca1c9b0cSelric * delete_sec_context.c (gss_delete_sec_context): set context to 2885*ca1c9b0cSelric GSS_C_NO_CONTEXT 2886*ca1c9b0cSelric 2887*ca1c9b0cSelric * Makefile.am: add {export,import}_sec_context.c 2888*ca1c9b0cSelric * export_sec_context.c: new file 2889*ca1c9b0cSelric * import_sec_context.c: new file 2890*ca1c9b0cSelric * accept_sec_context.c (gss_accept_sec_context): set trans flag 2891*ca1c9b0cSelric 2892*ca1c9b0cSelric2000-02-07 Assar Westerlund <assar@sics.se> 2893*ca1c9b0cSelric 2894*ca1c9b0cSelric * Makefile.am: set version to 0:5:0 2895*ca1c9b0cSelric 2896*ca1c9b0cSelric2000-01-26 Assar Westerlund <assar@sics.se> 2897*ca1c9b0cSelric 2898*ca1c9b0cSelric * delete_sec_context.c (gss_delete_sec_context): handle a NULL 2899*ca1c9b0cSelric output_token 2900*ca1c9b0cSelric 2901*ca1c9b0cSelric * wrap.c: update to pseudo-standard APIs for md4,md5,sha. some 2902*ca1c9b0cSelric changes to libdes calls to make them more portable. 2903*ca1c9b0cSelric * verify_mic.c: update to pseudo-standard APIs for md4,md5,sha. 2904*ca1c9b0cSelric some changes to libdes calls to make them more portable. 2905*ca1c9b0cSelric * unwrap.c: update to pseudo-standard APIs for md4,md5,sha. some 2906*ca1c9b0cSelric changes to libdes calls to make them more portable. 2907*ca1c9b0cSelric * get_mic.c: update to pseudo-standard APIs for md4,md5,sha. some 2908*ca1c9b0cSelric changes to libdes calls to make them more portable. 2909*ca1c9b0cSelric * 8003.c: update to pseudo-standard APIs for md4,md5,sha. 2910*ca1c9b0cSelric 2911*ca1c9b0cSelric2000-01-06 Assar Westerlund <assar@sics.se> 2912*ca1c9b0cSelric 2913*ca1c9b0cSelric * Makefile.am: set version to 0:4:0 2914*ca1c9b0cSelric 2915*ca1c9b0cSelric1999-12-26 Assar Westerlund <assar@sics.se> 2916*ca1c9b0cSelric 2917*ca1c9b0cSelric * accept_sec_context.c (gss_accept_sec_context): always set 2918*ca1c9b0cSelric `output_token' 2919*ca1c9b0cSelric * init_sec_context.c (init_auth): always initialize `output_token' 2920*ca1c9b0cSelric * delete_sec_context.c (gss_delete_sec_context): always set 2921*ca1c9b0cSelric `output_token' 2922*ca1c9b0cSelric 2923*ca1c9b0cSelric1999-12-06 Assar Westerlund <assar@sics.se> 2924*ca1c9b0cSelric 2925*ca1c9b0cSelric * Makefile.am: bump version to 0:3:0 2926*ca1c9b0cSelric 2927*ca1c9b0cSelric1999-10-20 Assar Westerlund <assar@sics.se> 2928*ca1c9b0cSelric 2929*ca1c9b0cSelric * Makefile.am: set version to 0:2:0 2930*ca1c9b0cSelric 2931*ca1c9b0cSelric1999-09-21 Assar Westerlund <assar@sics.se> 2932*ca1c9b0cSelric 2933*ca1c9b0cSelric * init_sec_context.c (gss_init_sec_context): initialize `ticket' 2934*ca1c9b0cSelric 2935*ca1c9b0cSelric * gssapi.h (gss_ctx_id_t_desc): add ticket in here. ick. 2936*ca1c9b0cSelric 2937*ca1c9b0cSelric * delete_sec_context.c (gss_delete_sec_context): free ticket 2938*ca1c9b0cSelric 2939*ca1c9b0cSelric * accept_sec_context.c (gss_accept_sec_context): stove away 2940*ca1c9b0cSelric `krb5_ticket' in context so that ugly programs such as 2941*ca1c9b0cSelric gss_nt_server can get at it. uck. 2942*ca1c9b0cSelric 2943*ca1c9b0cSelric1999-09-20 Johan Danielsson <joda@pdc.kth.se> 2944*ca1c9b0cSelric 2945*ca1c9b0cSelric * accept_sec_context.c: set minor_status 2946*ca1c9b0cSelric 2947*ca1c9b0cSelric1999-08-04 Assar Westerlund <assar@sics.se> 2948*ca1c9b0cSelric 2949*ca1c9b0cSelric * display_status.c (calling_error, routine_error): right shift the 2950*ca1c9b0cSelric code to make it possible to index into the arrays 2951*ca1c9b0cSelric 2952*ca1c9b0cSelric1999-07-28 Assar Westerlund <assar@sics.se> 2953*ca1c9b0cSelric 2954*ca1c9b0cSelric * gssapi.h (GSS_C_AF_INET6): add 2955*ca1c9b0cSelric 2956*ca1c9b0cSelric * import_name.c (import_hostbased_name): set minor_status 2957*ca1c9b0cSelric 2958*ca1c9b0cSelric1999-07-26 Assar Westerlund <assar@sics.se> 2959*ca1c9b0cSelric 2960*ca1c9b0cSelric * Makefile.am: set version to 0:1:0 2961*ca1c9b0cSelric 2962*ca1c9b0cSelricWed Apr 7 14:05:15 1999 Johan Danielsson <joda@hella.pdc.kth.se> 2963*ca1c9b0cSelric 2964*ca1c9b0cSelric * display_status.c: set minor_status 2965*ca1c9b0cSelric 2966*ca1c9b0cSelric * init_sec_context.c: set minor_status 2967*ca1c9b0cSelric 2968*ca1c9b0cSelric * lib/gssapi/init.c: remove donep (check gssapi_krb5_context 2969*ca1c9b0cSelric directly) 2970*ca1c9b0cSelric 2971