xref: /netbsd-src/crypto/external/bsd/heimdal/dist/lib/gssapi/ChangeLog (revision ca1c9b0c534faa5fd4c7d36fd3c199a2a3d7b0e4)
1*ca1c9b0cSelric2008-08-14  Love Hornquist Astrand  <lha@10a140laptop.local>
2*ca1c9b0cSelric
3*ca1c9b0cSelric	* krb5/accept_sec_context.c: If there is a initiator subkey, copy
4*ca1c9b0cSelric	that to acceptor subkey to match windows behavior. From Metze.
5*ca1c9b0cSelric
6*ca1c9b0cSelric2008-08-02  Love Hörnquist Åstrand  <lha@h5l.org>
7*ca1c9b0cSelric
8*ca1c9b0cSelric	* ntlm/init_sec_context.c: Catch error
9*ca1c9b0cSelric
10*ca1c9b0cSelric	* krb5/inquire_sec_context_by_oid.c: Catch store failure.
11*ca1c9b0cSelric
12*ca1c9b0cSelric	* mech/gss_canonicalize_name.c: Not init m, return never
13*ca1c9b0cSelric	used (overwritten later).
14*ca1c9b0cSelric
15*ca1c9b0cSelric2008-07-25  Love Hörnquist Åstrand  <lha@kth.se>
16*ca1c9b0cSelric
17*ca1c9b0cSelric	* ntlm/init_sec_context.c: Use krb5_cc_get_config.
18*ca1c9b0cSelric
19*ca1c9b0cSelric2008-07-25  Love Hörnquist Åstrand  <lha@kth.se>
20*ca1c9b0cSelric
21*ca1c9b0cSelric	* krb5/init_sec_context.c: Match the orignal patch I got from
22*ca1c9b0cSelric	metze, seems that DCE-STYLE is even more weirer then what I though
23*ca1c9b0cSelric	when I merged the patch.
24*ca1c9b0cSelric
25*ca1c9b0cSelric2008-06-02  Love Hörnquist Åstrand  <lha@kth.se>
26*ca1c9b0cSelric
27*ca1c9b0cSelric	* krb5/init_sec_context.c: Don't add asn1 wrapping to token when
28*ca1c9b0cSelric	using DCE_STYLE.  Patch from Stefan Metzmacher.
29*ca1c9b0cSelric
30*ca1c9b0cSelric2008-05-27  Love Hörnquist Åstrand  <lha@kth.se>
31*ca1c9b0cSelric
32*ca1c9b0cSelric	* ntlm/init_sec_context.c: use krb5_get_error_message
33*ca1c9b0cSelric
34*ca1c9b0cSelric2008-05-05  Love Hörnquist Åstrand  <lha@kth.se>
35*ca1c9b0cSelric
36*ca1c9b0cSelric	* spnego/spnego_locl.h: Add back "mech/utils.h", its needed for
37*ca1c9b0cSelric	oid/buffer functions.
38*ca1c9b0cSelric
39*ca1c9b0cSelric2008-05-02  Love Hörnquist Åstrand  <lha@it.su.se>
40*ca1c9b0cSelric
41*ca1c9b0cSelric	* spnego: Changes from doug barton to make spnego indepedant of
42*ca1c9b0cSelric	the heimdal version of the plugin system.
43*ca1c9b0cSelric
44*ca1c9b0cSelric2008-04-27  Love Hörnquist Åstrand  <lha@it.su.se>
45*ca1c9b0cSelric
46*ca1c9b0cSelric	* krb5: use DES_set_key_unchecked()
47*ca1c9b0cSelric
48*ca1c9b0cSelric2008-04-17  Love Hörnquist Åstrand  <lha@it.su.se>
49*ca1c9b0cSelric
50*ca1c9b0cSelric	* add __declspec() for windows.
51*ca1c9b0cSelric
52*ca1c9b0cSelric2008-04-15  Love Hörnquist Åstrand  <lha@it.su.se>
53*ca1c9b0cSelric
54*ca1c9b0cSelric	* krb5/import_sec_context.c: Use tmp to read ac->flags value to
55*ca1c9b0cSelric	avoid warning.
56*ca1c9b0cSelric
57*ca1c9b0cSelric2008-04-07  Love Hörnquist Åstrand  <lha@it.su.se>
58*ca1c9b0cSelric
59*ca1c9b0cSelric	* mech/gss_mech_switch.c: Use unsigned where appropriate.
60*ca1c9b0cSelric
61*ca1c9b0cSelric2008-03-14  Love Hörnquist Åstrand  <lha@it.su.se>
62*ca1c9b0cSelric
63*ca1c9b0cSelric	* test_context.c: Add test for gsskrb5_register_acceptor_identity.
64*ca1c9b0cSelric
65*ca1c9b0cSelric2008-03-09  Love Hörnquist Åstrand  <lha@it.su.se>
66*ca1c9b0cSelric
67*ca1c9b0cSelric	* krb5/init_sec_context.c (init_auth): use right variable to
68*ca1c9b0cSelric	detect if we want to free or not.
69*ca1c9b0cSelric
70*ca1c9b0cSelric2008-02-26  Love Hörnquist Åstrand  <lha@it.su.se>
71*ca1c9b0cSelric
72*ca1c9b0cSelric	* Makefile.am: add missing \
73*ca1c9b0cSelric
74*ca1c9b0cSelric	* Makefile.am: reshuffle depenencies
75*ca1c9b0cSelric
76*ca1c9b0cSelric	* Add flag to krb5 to not add GSS-API INT|CONF to the negotiation
77*ca1c9b0cSelric
78*ca1c9b0cSelric2008-02-21  Love Hörnquist Åstrand  <lha@it.su.se>
79*ca1c9b0cSelric
80*ca1c9b0cSelric	* make the SPNEGO mech store the error itself instead, works for
81*ca1c9b0cSelric	everything except other stackable mechs
82*ca1c9b0cSelric
83*ca1c9b0cSelric2008-02-18  Love Hörnquist Åstrand  <lha@it.su.se>
84*ca1c9b0cSelric
85*ca1c9b0cSelric	* spnego/init_sec_context.c (spnego_reply): if the reply token was
86*ca1c9b0cSelric	of length 0, make it the same as no token. Pointed out by Zeqing
87*ca1c9b0cSelric	Xia.
88*ca1c9b0cSelric
89*ca1c9b0cSelric	* krb5/acquire_cred.c (acquire_initiator_cred): handle the
90*ca1c9b0cSelric	credential cache better, use destroy/close when appriate and for
91*ca1c9b0cSelric	all cases. Thanks to Michael Allen for point out the memory-leak
92*ca1c9b0cSelric	that I also fixed.
93*ca1c9b0cSelric
94*ca1c9b0cSelric2008-02-03  Love Hörnquist Åstrand  <lha@it.su.se>
95*ca1c9b0cSelric
96*ca1c9b0cSelric	* spnego/accept_sec_context.c: Make error reporting somewhat more
97*ca1c9b0cSelric	correct for SPNEGO.
98*ca1c9b0cSelric
99*ca1c9b0cSelric2008-01-27  Love Hörnquist Åstrand  <lha@it.su.se>
100*ca1c9b0cSelric
101*ca1c9b0cSelric	* test_common.c: Improve the error message.
102*ca1c9b0cSelric
103*ca1c9b0cSelric2008-01-24  Love Hörnquist Åstrand  <lha@it.su.se>
104*ca1c9b0cSelric
105*ca1c9b0cSelric	* ntlm/accept_sec_context.c: Avoid free-ing type1 message before
106*ca1c9b0cSelric	its allocated.
107*ca1c9b0cSelric
108*ca1c9b0cSelric2008-01-13  Love Hörnquist Åstrand  <lha@it.su.se>
109*ca1c9b0cSelric
110*ca1c9b0cSelric	* test_ntlm.c: Test source name (and make the acceptor in ntlm gss
111*ca1c9b0cSelric	mech useful).
112*ca1c9b0cSelric
113*ca1c9b0cSelric2007-12-30  Love Hörnquist Åstrand  <lha@it.su.se>
114*ca1c9b0cSelric
115*ca1c9b0cSelric	* ntlm/init_sec_context.c: Don't confuse target name and source
116*ca1c9b0cSelric	name, make regressiont tests pass again.
117*ca1c9b0cSelric
118*ca1c9b0cSelric2007-12-29  Love Hörnquist Åstrand  <lha@it.su.se>
119*ca1c9b0cSelric
120*ca1c9b0cSelric	* ntlm: clean up name handling
121*ca1c9b0cSelric
122*ca1c9b0cSelric2007-12-04  Love Hörnquist Åstrand  <lha@it.su.se>
123*ca1c9b0cSelric
124*ca1c9b0cSelric	* ntlm/init_sec_context.c: Use credential if it was passed in.
125*ca1c9b0cSelric
126*ca1c9b0cSelric	* ntlm/acquire_cred.c: Check if there is initial creds with
127*ca1c9b0cSelric	_gss_ntlm_get_user_cred().
128*ca1c9b0cSelric
129*ca1c9b0cSelric	* ntlm/init_sec_context.c: Add _gss_ntlm_get_user_info() that
130*ca1c9b0cSelric	return the user info so it can be used by external modules.
131*ca1c9b0cSelric
132*ca1c9b0cSelric	* ntlm/inquire_cred.c: use the right error code.
133*ca1c9b0cSelric
134*ca1c9b0cSelric	* ntlm/inquire_cred.c: Return GSS_C_NO_CREDENTIAL if there is no
135*ca1c9b0cSelric	credential, ntlm have (not yet) a default credential.
136*ca1c9b0cSelric
137*ca1c9b0cSelric	* mech/gss_release_oid_set.c: Avoid trying to deref NULL, from
138*ca1c9b0cSelric	Phil Fisher.
139*ca1c9b0cSelric
140*ca1c9b0cSelric2007-12-03  Love Hörnquist Åstrand  <lha@it.su.se>
141*ca1c9b0cSelric
142*ca1c9b0cSelric	* test_acquire_cred.c: Always try to fetch cred (even with
143*ca1c9b0cSelric	GSS_C_NO_NAME).
144*ca1c9b0cSelric
145*ca1c9b0cSelric2007-08-09  Love Hörnquist Åstrand  <lha@it.su.se>
146*ca1c9b0cSelric
147*ca1c9b0cSelric	* mech/gss_krb5.c: Readd gss_krb5_get_tkt_flags.
148*ca1c9b0cSelric
149*ca1c9b0cSelric2007-08-08  Love Hörnquist Åstrand  <lha@it.su.se>
150*ca1c9b0cSelric
151*ca1c9b0cSelric	* spnego/compat.c (_gss_spnego_internal_delete_sec_context):
152*ca1c9b0cSelric	release ctx->target_name too From Rafal Malinowski.
153*ca1c9b0cSelric
154*ca1c9b0cSelric2007-07-26  Love Hörnquist Åstrand  <lha@it.su.se>
155*ca1c9b0cSelric
156*ca1c9b0cSelric	* mech/gss_mech_switch.c: Don't try to do dlopen if system doesn't
157*ca1c9b0cSelric	have dlopen. From Rune of Chalmers.
158*ca1c9b0cSelric
159*ca1c9b0cSelric2007-07-10  Love Hörnquist Åstrand  <lha@it.su.se>
160*ca1c9b0cSelric
161*ca1c9b0cSelric	* mech/gss_duplicate_name.c: New signature of _gss_find_mn.
162*ca1c9b0cSelric
163*ca1c9b0cSelric	* mech/gss_init_sec_context.c: New signature of _gss_find_mn.
164*ca1c9b0cSelric
165*ca1c9b0cSelric	* mech/gss_acquire_cred.c: New signature of _gss_find_mn.
166*ca1c9b0cSelric
167*ca1c9b0cSelric	* mech/name.h: New signature of _gss_find_mn.
168*ca1c9b0cSelric
169*ca1c9b0cSelric	* mech/gss_canonicalize_name.c: New signature of _gss_find_mn.
170*ca1c9b0cSelric
171*ca1c9b0cSelric	* mech/gss_compare_name.c: New signature of _gss_find_mn.
172*ca1c9b0cSelric
173*ca1c9b0cSelric	* mech/gss_add_cred.c: New signature of _gss_find_mn.
174*ca1c9b0cSelric
175*ca1c9b0cSelric	* mech/gss_names.c (_gss_find_mn): Return an error code for
176*ca1c9b0cSelric	caller.
177*ca1c9b0cSelric
178*ca1c9b0cSelric	* spnego/accept_sec_context.c: remove checks that are done by the
179*ca1c9b0cSelric	previous function.
180*ca1c9b0cSelric
181*ca1c9b0cSelric	* Makefile.am: New library version.
182*ca1c9b0cSelric
183*ca1c9b0cSelric2007-07-04  Love Hörnquist Åstrand  <lha@it.su.se>
184*ca1c9b0cSelric
185*ca1c9b0cSelric	* mech/gss_oid_to_str.c: Refuse to print GSS_C_NULL_OID, from
186*ca1c9b0cSelric	Rafal Malinowski.
187*ca1c9b0cSelric
188*ca1c9b0cSelric	* spnego/spnego.asn1: Indent and make NegTokenInit and
189*ca1c9b0cSelric	NegTokenResp extendable.
190*ca1c9b0cSelric
191*ca1c9b0cSelric2007-06-21  Love Hörnquist Åstrand  <lha@it.su.se>
192*ca1c9b0cSelric
193*ca1c9b0cSelric	* ntlm/inquire_cred.c: Implement _gss_ntlm_inquire_cred.
194*ca1c9b0cSelric
195*ca1c9b0cSelric	* mech/gss_display_status.c: Provide message for GSS_S_COMPLETE.
196*ca1c9b0cSelric
197*ca1c9b0cSelric	* mech/context.c: If the canned string is "", its no use to the
198*ca1c9b0cSelric	user, make it fall back to the default error string.
199*ca1c9b0cSelric
200*ca1c9b0cSelric2007-06-20  Love Hörnquist Åstrand  <lha@it.su.se>
201*ca1c9b0cSelric
202*ca1c9b0cSelric	* mech/gss_display_name.c (gss_display_name): no name ->
203*ca1c9b0cSelric	fail. From Rafal Malinswski.
204*ca1c9b0cSelric
205*ca1c9b0cSelric	* spnego/accept_sec_context.c: Wrap name in a spnego_name instead
206*ca1c9b0cSelric	of just a copy of the underlaying object. From Rafal Malinswski.
207*ca1c9b0cSelric
208*ca1c9b0cSelric	* spnego/accept_sec_context.c: Handle underlaying mech not
209*ca1c9b0cSelric	returning mn.
210*ca1c9b0cSelric
211*ca1c9b0cSelric	* mech/gss_accept_sec_context.c: Handle underlaying mech not
212*ca1c9b0cSelric	returning mn.
213*ca1c9b0cSelric
214*ca1c9b0cSelric	* spnego/accept_sec_context.c: Make sure src_name is always set to
215*ca1c9b0cSelric	GSS_C_NO_NAME when returning.
216*ca1c9b0cSelric
217*ca1c9b0cSelric	* krb5/acquire_cred.c (acquire_acceptor_cred): don't claim
218*ca1c9b0cSelric	everything is well on failure.  From Phil Fisher.
219*ca1c9b0cSelric
220*ca1c9b0cSelric	* mech/gss_duplicate_name.c: catch error (and ignore it)
221*ca1c9b0cSelric
222*ca1c9b0cSelric	* ntlm/init_sec_context.c: Use heim_ntlm_calculate_ntlm2_sess.
223*ca1c9b0cSelric
224*ca1c9b0cSelric	* mech/gss_accept_sec_context.c: Only wrap the delegated cred if
225*ca1c9b0cSelric	we got a delegated mech cred.  From Rafal Malinowski.
226*ca1c9b0cSelric
227*ca1c9b0cSelric	* spnego/accept_sec_context.c: Only wrap the delegated cred if we
228*ca1c9b0cSelric	are going to return it to the consumer.  From Rafal Malinowski.
229*ca1c9b0cSelric
230*ca1c9b0cSelric	* spnego/accept_sec_context.c: Fixed memory leak pointed out by
231*ca1c9b0cSelric	Rafal Malinowski, also while here moved to use NegotiationToken
232*ca1c9b0cSelric	for decoding.
233*ca1c9b0cSelric
234*ca1c9b0cSelric2007-06-18  Love Hörnquist Åstrand  <lha@it.su.se>
235*ca1c9b0cSelric
236*ca1c9b0cSelric	* krb5/prf.c (_gsskrb5_pseudo_random): add missing break.
237*ca1c9b0cSelric
238*ca1c9b0cSelric	* krb5/release_name.c: Set *minor_status unconditionallty, its
239*ca1c9b0cSelric	done later anyway.
240*ca1c9b0cSelric
241*ca1c9b0cSelric	* spnego/accept_sec_context.c: Init get_mic to 0.
242*ca1c9b0cSelric
243*ca1c9b0cSelric	* mech/gss_set_cred_option.c: Free memory in failure case, found
244*ca1c9b0cSelric	by beam.
245*ca1c9b0cSelric
246*ca1c9b0cSelric	* mech/gss_inquire_context.c: Handle mech_type being NULL.
247*ca1c9b0cSelric
248*ca1c9b0cSelric	* mech/gss_inquire_cred_by_mech.c: Handle cred_name being NULL.
249*ca1c9b0cSelric
250*ca1c9b0cSelric	* mech/gss_krb5.c: Free memory in error case, found by beam.
251*ca1c9b0cSelric
252*ca1c9b0cSelric2007-06-12  Love Hörnquist Åstrand  <lha@it.su.se>
253*ca1c9b0cSelric
254*ca1c9b0cSelric	* ntlm/inquire_context.c: Use ctx->gssflags for flags.
255*ca1c9b0cSelric
256*ca1c9b0cSelric	* krb5/display_name.c: Use KRB5_PRINCIPAL_UNPARSE_DISPLAY, this is
257*ca1c9b0cSelric	not ment for machine consumption.
258*ca1c9b0cSelric
259*ca1c9b0cSelric2007-06-09  Love Hörnquist Åstrand  <lha@it.su.se>
260*ca1c9b0cSelric
261*ca1c9b0cSelric	* ntlm/digest.c (kdc_alloc): free memory on failure, pointed out
262*ca1c9b0cSelric	by Rafal Malinowski.
263*ca1c9b0cSelric
264*ca1c9b0cSelric	* ntlm/digest.c (kdc_destroy): free context when done, pointed out
265*ca1c9b0cSelric	by Rafal Malinowski.
266*ca1c9b0cSelric
267*ca1c9b0cSelric	* spnego/context_stubs.c (_gss_spnego_display_name): if input_name
268*ca1c9b0cSelric	is null, fail.  From Rafal Malinowski.
269*ca1c9b0cSelric
270*ca1c9b0cSelric2007-06-04  Love Hörnquist Åstrand  <lha@it.su.se>
271*ca1c9b0cSelric
272*ca1c9b0cSelric	* ntlm/digest.c: Free memory when done.
273*ca1c9b0cSelric
274*ca1c9b0cSelric2007-06-02  Love Hörnquist Åstrand  <lha@it.su.se>
275*ca1c9b0cSelric
276*ca1c9b0cSelric	* test_ntlm.c: Test both with and without keyex.
277*ca1c9b0cSelric
278*ca1c9b0cSelric	* ntlm/digest.c: If we didn't set session key, don't expect one
279*ca1c9b0cSelric	back.
280*ca1c9b0cSelric
281*ca1c9b0cSelric	* test_ntlm.c: Set keyex flag and calculate session key.
282*ca1c9b0cSelric
283*ca1c9b0cSelric2007-05-31  Love Hörnquist Åstrand  <lha@it.su.se>
284*ca1c9b0cSelric
285*ca1c9b0cSelric	* spnego/accept_sec_context.c: Use the return value before is
286*ca1c9b0cSelric	overwritten by later calls.  From Rafal Malinowski
287*ca1c9b0cSelric
288*ca1c9b0cSelric	* krb5/release_cred.c: Give an minor_status argument to
289*ca1c9b0cSelric	gss_release_oid_set.  From Rafal Malinowski
290*ca1c9b0cSelric
291*ca1c9b0cSelric2007-05-30  Love Hörnquist Åstrand  <lha@it.su.se>
292*ca1c9b0cSelric
293*ca1c9b0cSelric	* ntlm/accept_sec_context.c: Catch errors and return the up the
294*ca1c9b0cSelric	stack.
295*ca1c9b0cSelric
296*ca1c9b0cSelric	* test_kcred.c: more testing of lifetimes
297*ca1c9b0cSelric
298*ca1c9b0cSelric2007-05-17  Love Hörnquist Åstrand  <lha@it.su.se>
299*ca1c9b0cSelric
300*ca1c9b0cSelric	* Makefile.am: Drop the gss oid_set function for the krb5 mech,
301*ca1c9b0cSelric	use the mech glue versions instead. Pointed out by Rafal
302*ca1c9b0cSelric	Malinowski.
303*ca1c9b0cSelric
304*ca1c9b0cSelric	* krb5: Use gss oid_set functions from mechglue
305*ca1c9b0cSelric
306*ca1c9b0cSelric2007-05-14  Love Hörnquist Åstrand  <lha@it.su.se>
307*ca1c9b0cSelric
308*ca1c9b0cSelric	* ntlm/accept_sec_context.c: Set session key only if we are
309*ca1c9b0cSelric	returned a session key. Found by David Love.
310*ca1c9b0cSelric
311*ca1c9b0cSelric2007-05-13  Love Hörnquist Åstrand  <lha@it.su.se>
312*ca1c9b0cSelric
313*ca1c9b0cSelric	* krb5/prf.c: switched MIN to min to make compile on solaris,
314*ca1c9b0cSelric	pointed out by David Love.
315*ca1c9b0cSelric
316*ca1c9b0cSelric2007-05-09 Love Hörnquist Åstrand <lha@it.su.se>
317*ca1c9b0cSelric
318*ca1c9b0cSelric	* krb5/inquire_cred_by_mech.c: Fill in all of the variables if
319*ca1c9b0cSelric	they are passed in. Pointed out by Phil Fisher.
320*ca1c9b0cSelric
321*ca1c9b0cSelric2007-05-08  Love Hörnquist Åstrand  <lha@it.su.se>
322*ca1c9b0cSelric
323*ca1c9b0cSelric	* krb5/inquire_cred.c: Fix copy and paste error, bug spotted by
324*ca1c9b0cSelric	from Phil Fisher.
325*ca1c9b0cSelric
326*ca1c9b0cSelric	* mech: dont keep track of gc_usage, just figure it out at
327*ca1c9b0cSelric	gss_inquire_cred() time
328*ca1c9b0cSelric
329*ca1c9b0cSelric	* mech/gss_mech_switch.c (add_builtin): ok for
330*ca1c9b0cSelric	__gss_mech_initialize() to return NULL
331*ca1c9b0cSelric
332*ca1c9b0cSelric	* test_kcred.c: more correct tests
333*ca1c9b0cSelric
334*ca1c9b0cSelric	* spnego/cred_stubs.c (gss_inquire_cred*): wrap the name with a
335*ca1c9b0cSelric	spnego_name.
336*ca1c9b0cSelric
337*ca1c9b0cSelric	* ntlm/inquire_cred.c: make ntlm gss_inquire_cred fail for now,
338*ca1c9b0cSelric	need to find default cred and friends.
339*ca1c9b0cSelric
340*ca1c9b0cSelric	* krb5/inquire_cred_by_mech.c: reimplement
341*ca1c9b0cSelric
342*ca1c9b0cSelric2007-05-07  Love Hörnquist Åstrand  <lha@it.su.se>
343*ca1c9b0cSelric
344*ca1c9b0cSelric	* ntlm/acquire_cred.c: drop unused variable.
345*ca1c9b0cSelric
346*ca1c9b0cSelric	* ntlm/acquire_cred.c: Reimplement.
347*ca1c9b0cSelric
348*ca1c9b0cSelric	* Makefile.am: add ntlm/digest.c
349*ca1c9b0cSelric
350*ca1c9b0cSelric	* ntlm: split out backend ntlm server processing
351*ca1c9b0cSelric
352*ca1c9b0cSelric2007-04-24  Love Hörnquist Åstrand  <lha@it.su.se>
353*ca1c9b0cSelric
354*ca1c9b0cSelric	* ntlm/delete_sec_context.c (_gss_ntlm_delete_sec_context): free
355*ca1c9b0cSelric	credcache when done
356*ca1c9b0cSelric
357*ca1c9b0cSelric2007-04-22  Love Hörnquist Åstrand  <lha@it.su.se>
358*ca1c9b0cSelric
359*ca1c9b0cSelric	* ntlm/init_sec_context.c: ntlm-key credential entry is prefix with @
360*ca1c9b0cSelric
361*ca1c9b0cSelric	* ntlm/init_sec_context.c (get_user_ccache): pick up the ntlm
362*ca1c9b0cSelric	creds from the krb5 credential cache.
363*ca1c9b0cSelric
364*ca1c9b0cSelric2007-04-21  Love Hörnquist Åstrand  <lha@it.su.se>
365*ca1c9b0cSelric
366*ca1c9b0cSelric	* ntlm/delete_sec_context.c: free the key stored in the context
367*ca1c9b0cSelric
368*ca1c9b0cSelric	* ntlm/ntlm.h: switch password for a key
369*ca1c9b0cSelric
370*ca1c9b0cSelric	* test_oid.c: Switch oid to one that is exported.
371*ca1c9b0cSelric
372*ca1c9b0cSelric2007-04-20  Love Hörnquist Åstrand  <lha@it.su.se>
373*ca1c9b0cSelric
374*ca1c9b0cSelric	* ntlm/init_sec_context.c: move where hash is calculated to make
375*ca1c9b0cSelric	it easier to add ccache support.
376*ca1c9b0cSelric
377*ca1c9b0cSelric	* Makefile.am: Add version-script.map to EXTRA_DIST.
378*ca1c9b0cSelric
379*ca1c9b0cSelric2007-04-19  Love Hörnquist Åstrand  <lha@it.su.se>
380*ca1c9b0cSelric
381*ca1c9b0cSelric	* Makefile.am: Unconfuse newer versions of automake that doesn't
382*ca1c9b0cSelric	know the diffrence between depenences and setting variables. foo:
383*ca1c9b0cSelric	vs foo=.
384*ca1c9b0cSelric
385*ca1c9b0cSelric	* test_ntlm.c: delete sec context when done.
386*ca1c9b0cSelric
387*ca1c9b0cSelric	* version-script.map: export more symbols.
388*ca1c9b0cSelric
389*ca1c9b0cSelric	* Makefile.am: add version script if ld supports it
390*ca1c9b0cSelric
391*ca1c9b0cSelric	* version-script.map: add version script if ld supports it
392*ca1c9b0cSelric
393*ca1c9b0cSelric2007-04-18  Love Hörnquist Åstrand  <lha@it.su.se>
394*ca1c9b0cSelric
395*ca1c9b0cSelric	* Makefile.am: test_acquire_cred need test_common.[ch]
396*ca1c9b0cSelric
397*ca1c9b0cSelric	* test_acquire_cred.c: add more test options.
398*ca1c9b0cSelric
399*ca1c9b0cSelric	* krb5/external.c: add GSS_KRB5_CCACHE_NAME_X
400*ca1c9b0cSelric
401*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: add GSS_KRB5_CCACHE_NAME_X
402*ca1c9b0cSelric
403*ca1c9b0cSelric	* krb5/set_sec_context_option.c: refactor code, implement
404*ca1c9b0cSelric	GSS_KRB5_CCACHE_NAME_X
405*ca1c9b0cSelric
406*ca1c9b0cSelric	* mech/gss_krb5.c: reimplement gss_krb5_ccache_name
407*ca1c9b0cSelric
408*ca1c9b0cSelric2007-04-17  Love Hörnquist Åstrand <lha@it.su.se>
409*ca1c9b0cSelric
410*ca1c9b0cSelric	* spnego/cred_stubs.c: Need to import spnego name before we can
411*ca1c9b0cSelric	use it as a gss_name_t.
412*ca1c9b0cSelric
413*ca1c9b0cSelric	* test_acquire_cred.c: use this test as part of the regression
414*ca1c9b0cSelric	suite.
415*ca1c9b0cSelric
416*ca1c9b0cSelric	* mech/gss_acquire_cred.c (gss_acquire_cred): dont init
417*ca1c9b0cSelric	cred->gc_mc every time in the loop.
418*ca1c9b0cSelric
419*ca1c9b0cSelric2007-04-15  Love Hörnquist Åstrand  <lha@it.su.se>
420*ca1c9b0cSelric
421*ca1c9b0cSelric	* Makefile.am: add test_common.h
422*ca1c9b0cSelric
423*ca1c9b0cSelric2007-02-16  Love Hörnquist Åstrand  <lha@it.su.se>
424*ca1c9b0cSelric
425*ca1c9b0cSelric	* gss_acquire_cred.3: Add link for
426*ca1c9b0cSelric	gsskrb5_register_acceptor_identity.
427*ca1c9b0cSelric
428*ca1c9b0cSelric2007-02-08  Love Hörnquist Åstrand  <lha@it.su.se>
429*ca1c9b0cSelric
430*ca1c9b0cSelric	* krb5/copy_ccache.c: Try to leak less memory in the failure case.
431*ca1c9b0cSelric
432*ca1c9b0cSelric2007-01-31  Love Hörnquist Åstrand  <lha@it.su.se>
433*ca1c9b0cSelric
434*ca1c9b0cSelric	* mech/gss_display_status.c: Use right printf formater.
435*ca1c9b0cSelric
436*ca1c9b0cSelric	* test_*.[ch]: split out the error printing function and try to
437*ca1c9b0cSelric	return better errors
438*ca1c9b0cSelric
439*ca1c9b0cSelric2007-01-30  Love Hörnquist Åstrand  <lha@it.su.se>
440*ca1c9b0cSelric
441*ca1c9b0cSelric	* krb5/init_sec_context.c: revert 1.75: (init_auth): only turn on
442*ca1c9b0cSelric	GSS_C_CONF_FLAG and GSS_C_INT_FLAG if the caller requseted it.
443*ca1c9b0cSelric
444*ca1c9b0cSelric	This is because Kerberos always support INT|CONF, matches behavior
445*ca1c9b0cSelric	with MS and MIT. The creates problems for the GSS-SPNEGO mech.
446*ca1c9b0cSelric
447*ca1c9b0cSelric2007-01-24  Love Hörnquist Åstrand  <lha@it.su.se>
448*ca1c9b0cSelric
449*ca1c9b0cSelric	* krb5/prf.c: constrain desired_output_len
450*ca1c9b0cSelric
451*ca1c9b0cSelric	* krb5/external.c (krb5_mech): add _gsskrb5_pseudo_random
452*ca1c9b0cSelric
453*ca1c9b0cSelric	* mech/gss_pseudo_random.c: Catch error from underlaying mech on
454*ca1c9b0cSelric	failure.
455*ca1c9b0cSelric
456*ca1c9b0cSelric	* Makefile.am: Add krb5/prf.c
457*ca1c9b0cSelric
458*ca1c9b0cSelric	* krb5/prf.c: gss_pseudo_random for krb5
459*ca1c9b0cSelric
460*ca1c9b0cSelric	* test_context.c: Checks for gss_pseudo_random.
461*ca1c9b0cSelric
462*ca1c9b0cSelric	* krb5/gkrb5_err.et: add KG_INPUT_TOO_LONG
463*ca1c9b0cSelric
464*ca1c9b0cSelric	* Makefile.am: Add mech/gss_pseudo_random.c
465*ca1c9b0cSelric
466*ca1c9b0cSelric	* gssapi/gssapi.h: try to load pseudo_random
467*ca1c9b0cSelric
468*ca1c9b0cSelric	* mech/gss_mech_switch.c: try to load pseudo_random
469*ca1c9b0cSelric
470*ca1c9b0cSelric	* mech/gss_pseudo_random.c: Add gss_pseudo_random.
471*ca1c9b0cSelric
472*ca1c9b0cSelric	* gssapi_mech.h: Add hook for gm_pseudo_random.
473*ca1c9b0cSelric
474*ca1c9b0cSelric2007-01-17  Love Hörnquist Åstrand  <lha@it.su.se>
475*ca1c9b0cSelric
476*ca1c9b0cSelric	* test_context.c: Don't assume bufer from gss_display_status is
477*ca1c9b0cSelric	ok.
478*ca1c9b0cSelric
479*ca1c9b0cSelric	* mech/gss_wrap_size_limit.c: Reset out variables.
480*ca1c9b0cSelric
481*ca1c9b0cSelric	* mech/gss_wrap.c: Reset out variables.
482*ca1c9b0cSelric
483*ca1c9b0cSelric	* mech/gss_verify_mic.c: Reset out variables.
484*ca1c9b0cSelric
485*ca1c9b0cSelric	* mech/gss_utils.c: Reset out variables.
486*ca1c9b0cSelric
487*ca1c9b0cSelric	* mech/gss_release_oid_set.c: Reset out variables.
488*ca1c9b0cSelric
489*ca1c9b0cSelric	* mech/gss_release_cred.c: Reset out variables.
490*ca1c9b0cSelric
491*ca1c9b0cSelric	* mech/gss_release_buffer.c: Reset variables.
492*ca1c9b0cSelric
493*ca1c9b0cSelric	* mech/gss_oid_to_str.c: Reset out variables.
494*ca1c9b0cSelric
495*ca1c9b0cSelric	* mech/gss_inquire_sec_context_by_oid.c: Fix reset out variables.
496*ca1c9b0cSelric
497*ca1c9b0cSelric	* mech/gss_mech_switch.c: Reset out variables.
498*ca1c9b0cSelric
499*ca1c9b0cSelric	* mech/gss_inquire_sec_context_by_oid.c: Reset out variables.
500*ca1c9b0cSelric
501*ca1c9b0cSelric	* mech/gss_inquire_names_for_mech.c: Reset out variables.
502*ca1c9b0cSelric
503*ca1c9b0cSelric	* mech/gss_inquire_cred_by_oid.c: Reset out variables.
504*ca1c9b0cSelric
505*ca1c9b0cSelric	* mech/gss_inquire_cred_by_oid.c: Reset out variables.
506*ca1c9b0cSelric
507*ca1c9b0cSelric	* mech/gss_inquire_cred_by_mech.c: Reset out variables.
508*ca1c9b0cSelric
509*ca1c9b0cSelric	* mech/gss_inquire_cred.c: Reset out variables, fix memory leak.
510*ca1c9b0cSelric
511*ca1c9b0cSelric	* mech/gss_inquire_context.c: Reset out variables.
512*ca1c9b0cSelric
513*ca1c9b0cSelric	* mech/gss_init_sec_context.c: Zero out outbuffer on failure.
514*ca1c9b0cSelric
515*ca1c9b0cSelric	* mech/gss_import_name.c: Reset out variables.
516*ca1c9b0cSelric
517*ca1c9b0cSelric	* mech/gss_import_name.c: Reset out variables.
518*ca1c9b0cSelric
519*ca1c9b0cSelric	* mech/gss_get_mic.c: Reset out variables.
520*ca1c9b0cSelric
521*ca1c9b0cSelric	* mech/gss_export_name.c: Reset out variables.
522*ca1c9b0cSelric
523*ca1c9b0cSelric	* mech/gss_encapsulate_token.c: Reset out variables.
524*ca1c9b0cSelric
525*ca1c9b0cSelric	* mech/gss_duplicate_oid.c: Reset out variables.
526*ca1c9b0cSelric
527*ca1c9b0cSelric	* mech/gss_duplicate_oid.c: Reset out variables.
528*ca1c9b0cSelric
529*ca1c9b0cSelric	* mech/gss_duplicate_name.c: Reset out variables.
530*ca1c9b0cSelric
531*ca1c9b0cSelric	* mech/gss_display_status.c: Reset out variables.
532*ca1c9b0cSelric
533*ca1c9b0cSelric	* mech/gss_display_name.c: Reset out variables.
534*ca1c9b0cSelric
535*ca1c9b0cSelric	* mech/gss_delete_sec_context.c: Reset out variables using propper
536*ca1c9b0cSelric	macros.
537*ca1c9b0cSelric
538*ca1c9b0cSelric	* mech/gss_decapsulate_token.c: Reset out variables using propper
539*ca1c9b0cSelric	macros.
540*ca1c9b0cSelric
541*ca1c9b0cSelric	* mech/gss_add_cred.c: Reset out variables.
542*ca1c9b0cSelric
543*ca1c9b0cSelric	* mech/gss_acquire_cred.c: Reset out variables.
544*ca1c9b0cSelric
545*ca1c9b0cSelric	* mech/gss_accept_sec_context.c: Reset out variables using propper
546*ca1c9b0cSelric	macros.
547*ca1c9b0cSelric
548*ca1c9b0cSelric	* mech/gss_init_sec_context.c: Reset out variables.
549*ca1c9b0cSelric
550*ca1c9b0cSelric	* mech/mech_locl.h (_mg_buffer_zero): new macro that zaps a
551*ca1c9b0cSelric	gss_buffer_t
552*ca1c9b0cSelric
553*ca1c9b0cSelric2007-01-16  Love Hörnquist Åstrand  <lha@it.su.se>
554*ca1c9b0cSelric
555*ca1c9b0cSelric	* mech: sprinkel _gss_mg_error
556*ca1c9b0cSelric
557*ca1c9b0cSelric	* mech/gss_display_status.c (gss_display_status): use
558*ca1c9b0cSelric	_gss_mg_get_error to fetch the error from underlaying mech, if it
559*ca1c9b0cSelric	failes, let do the regular dance for GSS-CODE version and a
560*ca1c9b0cSelric	generic print-the-error code for MECH-CODE.
561*ca1c9b0cSelric
562*ca1c9b0cSelric	* mech/gss_oid_to_str.c: Don't include the NUL in the length of
563*ca1c9b0cSelric	the string.
564*ca1c9b0cSelric
565*ca1c9b0cSelric	* mech/context.h: Protoypes for _gss_mg_.
566*ca1c9b0cSelric
567*ca1c9b0cSelric	* mech/context.c: Glue to catch the error from the lower gss-api
568*ca1c9b0cSelric	layer and save that for later so gss_display_status() can show the
569*ca1c9b0cSelric	error.
570*ca1c9b0cSelric
571*ca1c9b0cSelric	* gss.c: Detect NTLM.
572*ca1c9b0cSelric
573*ca1c9b0cSelric2007-01-11  Love Hörnquist Åstrand  <lha@it.su.se>
574*ca1c9b0cSelric
575*ca1c9b0cSelric	* mech/gss_accept_sec_context.c: spelling
576*ca1c9b0cSelric
577*ca1c9b0cSelric2007-01-04  Love Hörnquist Åstrand  <lha@it.su.se>
578*ca1c9b0cSelric
579*ca1c9b0cSelric	* Makefile.am: Include build (private) prototypes header files.
580*ca1c9b0cSelric
581*ca1c9b0cSelric	* Makefile.am (ntlmsrc): add ntlm/ntlm-private.h
582*ca1c9b0cSelric
583*ca1c9b0cSelric2006-12-28  Love Hörnquist Åstrand  <lha@it.su.se>
584*ca1c9b0cSelric
585*ca1c9b0cSelric	* ntlm/accept_sec_context.c: Pass signseal argument to
586*ca1c9b0cSelric	_gss_ntlm_set_key.
587*ca1c9b0cSelric
588*ca1c9b0cSelric	* ntlm/init_sec_context.c: Pass signseal argument to
589*ca1c9b0cSelric	_gss_ntlm_set_key.
590*ca1c9b0cSelric
591*ca1c9b0cSelric	* ntlm/crypto.c (_gss_ntlm_set_key): add signseal argument
592*ca1c9b0cSelric
593*ca1c9b0cSelric	* test_ntlm.c: add ntlmv2 test
594*ca1c9b0cSelric
595*ca1c9b0cSelric	* ntlm/ntlm.h: break out struct ntlmv2_key;
596*ca1c9b0cSelric
597*ca1c9b0cSelric	* ntlm/crypto.c (_gss_ntlm_set_key): set ntlm v2 keys.
598*ca1c9b0cSelric
599*ca1c9b0cSelric	* ntlm/accept_sec_context.c: Set dummy ntlmv2 keys and Check TI.
600*ca1c9b0cSelric
601*ca1c9b0cSelric	* ntlm/ntlm.h: NTLMv2 keys.
602*ca1c9b0cSelric
603*ca1c9b0cSelric	* ntlm/crypto.c: NTLMv2 sign and verify.
604*ca1c9b0cSelric
605*ca1c9b0cSelric2006-12-20  Love Hörnquist Åstrand  <lha@it.su.se>
606*ca1c9b0cSelric
607*ca1c9b0cSelric	* ntlm/accept_sec_context.c: Don't send targetinfo now.
608*ca1c9b0cSelric
609*ca1c9b0cSelric	* ntlm/init_sec_context.c: Build ntlmv2 answer buffer.
610*ca1c9b0cSelric
611*ca1c9b0cSelric	* ntlm/init_sec_context.c: Leak less memory.
612*ca1c9b0cSelric
613*ca1c9b0cSelric	* ntlm/init_sec_context.c: Announce that we support key exchange.
614*ca1c9b0cSelric
615*ca1c9b0cSelric	* ntlm/init_sec_context.c: Add NTLM_NEG_NTLM2_SESSION, NTLMv2
616*ca1c9b0cSelric	session security (disable because missing sign and seal).
617*ca1c9b0cSelric
618*ca1c9b0cSelric2006-12-19  Love Hörnquist Åstrand  <lha@it.su.se>
619*ca1c9b0cSelric
620*ca1c9b0cSelric	* ntlm/accept_sec_context.c: split RC4 send and recv keystreams
621*ca1c9b0cSelric
622*ca1c9b0cSelric	* ntlm/init_sec_context.c: split RC4 send and recv keystreams
623*ca1c9b0cSelric
624*ca1c9b0cSelric	* ntlm/ntlm.h: split RC4 send and recv keystreams
625*ca1c9b0cSelric
626*ca1c9b0cSelric	* ntlm/crypto.c: Implement SEAL.
627*ca1c9b0cSelric
628*ca1c9b0cSelric	* ntlm/crypto.c: move gss_wrap/gss_unwrap here
629*ca1c9b0cSelric
630*ca1c9b0cSelric	* test_context.c: request INT and CONF from the gss layer, test
631*ca1c9b0cSelric	get and verify MIC.
632*ca1c9b0cSelric
633*ca1c9b0cSelric	* ntlm/ntlm.h: add crypto bits.
634*ca1c9b0cSelric
635*ca1c9b0cSelric	* ntlm/accept_sec_context.c: Save session master key.
636*ca1c9b0cSelric
637*ca1c9b0cSelric	* Makefile.am: Move get and verify mic to the same file (crypto.c)
638*ca1c9b0cSelric	since they share code.
639*ca1c9b0cSelric
640*ca1c9b0cSelric	* ntlm/crypto.c: Move get and verify mic to the same file since
641*ca1c9b0cSelric	they share code, implement NTLM v1 and dummy signatures.
642*ca1c9b0cSelric
643*ca1c9b0cSelric	* ntlm/init_sec_context.c: pass on GSS_C_CONF_FLAG and
644*ca1c9b0cSelric	GSS_C_INTEG_FLAG, save the session master key
645*ca1c9b0cSelric
646*ca1c9b0cSelric	* spnego/accept_sec_context.c: try using gss_accept_sec_context()
647*ca1c9b0cSelric	on the opportunistic token instead of guessing the acceptor name
648*ca1c9b0cSelric	and do gss_acquire_cred, this make SPNEGO work like before.
649*ca1c9b0cSelric
650*ca1c9b0cSelric2006-12-18  Love Hörnquist Åstrand  <lha@it.su.se>
651*ca1c9b0cSelric
652*ca1c9b0cSelric	* ntlm/init_sec_context.c: Calculate the NTLM version 1 "master"
653*ca1c9b0cSelric	key.
654*ca1c9b0cSelric
655*ca1c9b0cSelric	* spnego/accept_sec_context.c: Resurect negHints for the acceptor
656*ca1c9b0cSelric	sends first packet.
657*ca1c9b0cSelric
658*ca1c9b0cSelric	* Makefile.am: Add "windows" versions of the NegTokenInitWin and
659*ca1c9b0cSelric	friends.
660*ca1c9b0cSelric
661*ca1c9b0cSelric	* test_context.c: add --wrapunwrap flag
662*ca1c9b0cSelric
663*ca1c9b0cSelric	* spnego/compat.c: move _gss_spnego_indicate_mechtypelist() to
664*ca1c9b0cSelric	compat.c, use the sequence types of MechTypeList, make
665*ca1c9b0cSelric	add_mech_type() static.
666*ca1c9b0cSelric
667*ca1c9b0cSelric	* spnego/accept_sec_context.c: move
668*ca1c9b0cSelric	_gss_spnego_indicate_mechtypelist() to compat.c
669*ca1c9b0cSelric
670*ca1c9b0cSelric	* Makefile.am: Generate sequence code for MechTypeList
671*ca1c9b0cSelric
672*ca1c9b0cSelric	* spnego: check that the generated acceptor mechlist is acceptable too
673*ca1c9b0cSelric
674*ca1c9b0cSelric	* spnego/init_sec_context.c: Abstract out the initiator filter
675*ca1c9b0cSelric	function, it will be needed for the acceptor too.
676*ca1c9b0cSelric
677*ca1c9b0cSelric	* spnego/accept_sec_context.c: Abstract out the initiator filter
678*ca1c9b0cSelric	function, it will be needed for the acceptor too. Remove negHints.
679*ca1c9b0cSelric
680*ca1c9b0cSelric	* test_context.c: allow asserting return mech
681*ca1c9b0cSelric
682*ca1c9b0cSelric	* ntlm/accept_sec_context.c: add _gss_ntlm_allocate_ctx
683*ca1c9b0cSelric
684*ca1c9b0cSelric	* ntlm/acquire_cred.c: Check that the KDC seem to there and
685*ca1c9b0cSelric	answering us, we can't do better then that wen checking if we will
686*ca1c9b0cSelric	accept the credential.
687*ca1c9b0cSelric
688*ca1c9b0cSelric	* ntlm/get_mic.c: return GSS_S_UNAVAILABLE
689*ca1c9b0cSelric
690*ca1c9b0cSelric	* mech/utils.h: add _gss_free_oid, reverse of _gss_copy_oid
691*ca1c9b0cSelric
692*ca1c9b0cSelric	* mech/gss_utils.c: add _gss_free_oid, reverse of _gss_copy_oid
693*ca1c9b0cSelric
694*ca1c9b0cSelric	* spnego/spnego.asn1: Its very sad, but NegHints its are not part
695*ca1c9b0cSelric	of the NegTokenInit, this makes SPNEGO acceptor life a lot harder.
696*ca1c9b0cSelric
697*ca1c9b0cSelric	* spnego: try harder to handle names better. handle missing
698*ca1c9b0cSelric	acceptor and initator creds better (ie dont propose/accept mech
699*ca1c9b0cSelric	that there are no credentials for) split NegTokenInit and
700*ca1c9b0cSelric	NegTokenResp in acceptor
701*ca1c9b0cSelric
702*ca1c9b0cSelric2006-12-16  Love Hörnquist Åstrand  <lha@it.su.se>
703*ca1c9b0cSelric
704*ca1c9b0cSelric	* ntlm/import_name.c: Allocate the buffer from the right length.
705*ca1c9b0cSelric
706*ca1c9b0cSelric2006-12-15  Love Hörnquist Åstrand  <lha@it.su.se>
707*ca1c9b0cSelric
708*ca1c9b0cSelric	* ntlm/init_sec_context.c (init_sec_context): Tell the other side
709*ca1c9b0cSelric	what domain we think we are talking to.
710*ca1c9b0cSelric
711*ca1c9b0cSelric	* ntlm/delete_sec_context.c: free username and password
712*ca1c9b0cSelric
713*ca1c9b0cSelric	* ntlm/release_name.c (_gss_ntlm_release_name): free name.
714*ca1c9b0cSelric
715*ca1c9b0cSelric	* ntlm/import_name.c (_gss_ntlm_import_name): add support for
716*ca1c9b0cSelric	GSS_C_NT_HOSTBASED_SERVICE names
717*ca1c9b0cSelric
718*ca1c9b0cSelric	* ntlm/ntlm.h: Add ntlm_name.
719*ca1c9b0cSelric
720*ca1c9b0cSelric	* test_context.c: allow testing of ntlm.
721*ca1c9b0cSelric
722*ca1c9b0cSelric	* gssapi_mech.h: add __gss_ntlm_initialize
723*ca1c9b0cSelric
724*ca1c9b0cSelric	* ntlm/accept_sec_context.c (handle_type3): verify that the kdc
725*ca1c9b0cSelric	approved of the ntlm exchange too
726*ca1c9b0cSelric
727*ca1c9b0cSelric	* mech/gss_mech_switch.c: Add the builtin ntlm mech
728*ca1c9b0cSelric
729*ca1c9b0cSelric	* test_ntlm.c: NTLM test app.
730*ca1c9b0cSelric
731*ca1c9b0cSelric	* mech/gss_accept_sec_context.c: Add detection of NTLMSSP.
732*ca1c9b0cSelric
733*ca1c9b0cSelric	* gssapi/gssapi.h: add ntlm mech oid
734*ca1c9b0cSelric
735*ca1c9b0cSelric	* ntlm/external.c: Switch OID to the ms ntlmssp oid
736*ca1c9b0cSelric
737*ca1c9b0cSelric	* Makefile.am: Add ntlm gss-api module.
738*ca1c9b0cSelric
739*ca1c9b0cSelric	* ntlm/accept_sec_context.c: Catch more error errors.
740*ca1c9b0cSelric
741*ca1c9b0cSelric	* ntlm/accept_sec_context.c: Check after a credential to use.
742*ca1c9b0cSelric
743*ca1c9b0cSelric2006-12-14  Love Hörnquist Åstrand  <lha@it.su.se>
744*ca1c9b0cSelric
745*ca1c9b0cSelric	* krb5/set_sec_context_option.c (GSS_KRB5_SET_DEFAULT_REALM_X):
746*ca1c9b0cSelric	don't fail on success.  Bug report from Stefan Metzmacher.
747*ca1c9b0cSelric
748*ca1c9b0cSelric2006-12-13  Love Hörnquist Åstrand  <lha@it.su.se>
749*ca1c9b0cSelric
750*ca1c9b0cSelric	* krb5/init_sec_context.c (init_auth): only turn on
751*ca1c9b0cSelric	GSS_C_CONF_FLAG and GSS_C_INT_FLAG if the caller requseted it.
752*ca1c9b0cSelric	From Stefan Metzmacher.
753*ca1c9b0cSelric
754*ca1c9b0cSelric2006-12-11  Love Hörnquist Åstrand  <lha@it.su.se>
755*ca1c9b0cSelric
756*ca1c9b0cSelric	* Makefile.am (libgssapi_la_OBJECTS): depends on gssapi_asn1.h
757*ca1c9b0cSelric	spnego_asn1.h.
758*ca1c9b0cSelric
759*ca1c9b0cSelric2006-11-20  Love Hörnquist Åstrand  <lha@it.su.se>
760*ca1c9b0cSelric
761*ca1c9b0cSelric	* krb5/acquire_cred.c: Make krb5_get_init_creds_opt_free take a
762*ca1c9b0cSelric	context argument.
763*ca1c9b0cSelric
764*ca1c9b0cSelric2006-11-16  Love Hörnquist Åstrand <lha@it.su.se>
765*ca1c9b0cSelric
766*ca1c9b0cSelric	* test_context.c: Test that token keys are the same, return
767*ca1c9b0cSelric	actual_mech.
768*ca1c9b0cSelric
769*ca1c9b0cSelric2006-11-15  Love Hörnquist Åstrand <lha@it.su.se>
770*ca1c9b0cSelric
771*ca1c9b0cSelric	* spnego/spnego_locl.h: Make bitfields unsigned, add maybe_open.
772*ca1c9b0cSelric
773*ca1c9b0cSelric	* spnego/accept_sec_context.c: Use ASN.1 encoder functions to
774*ca1c9b0cSelric	encode CHOICE structure now that we can handle it.
775*ca1c9b0cSelric
776*ca1c9b0cSelric	* spnego/init_sec_context.c: Use ASN.1 encoder functions to encode
777*ca1c9b0cSelric	CHOICE structure now that we can handle it.
778*ca1c9b0cSelric
779*ca1c9b0cSelric	* spnego/accept_sec_context.c (_gss_spnego_accept_sec_context):
780*ca1c9b0cSelric	send back ad accept_completed when the security context is ->open,
781*ca1c9b0cSelric	w/o this the client doesn't know that the server have completed
782*ca1c9b0cSelric	the transaction.
783*ca1c9b0cSelric
784*ca1c9b0cSelric	* test_context.c: Add delegate flag and check that the delegated
785*ca1c9b0cSelric	cred works.
786*ca1c9b0cSelric
787*ca1c9b0cSelric	* spnego/init_sec_context.c: Keep track of the opportunistic token
788*ca1c9b0cSelric	in the inital message, it might be a complete gss-api context, in
789*ca1c9b0cSelric	that case we'll get back accept_completed without any token. With
790*ca1c9b0cSelric	this change, krb5 w/o mutual authentication works.
791*ca1c9b0cSelric
792*ca1c9b0cSelric	* spnego/accept_sec_context.c: Use ASN.1 encoder functions to
793*ca1c9b0cSelric	encode CHOICE structure now that we can handle it.
794*ca1c9b0cSelric
795*ca1c9b0cSelric	* spnego/accept_sec_context.c: Filter out SPNEGO from the out
796*ca1c9b0cSelric	supported mechs list and make sure we don't select that for the
797*ca1c9b0cSelric	preferred mechamism.
798*ca1c9b0cSelric
799*ca1c9b0cSelric2006-11-14  Love Hörnquist Åstrand  <lha@it.su.se>
800*ca1c9b0cSelric
801*ca1c9b0cSelric	* mech/gss_init_sec_context.c (_gss_mech_cred_find): break out the
802*ca1c9b0cSelric	cred finding to its own function
803*ca1c9b0cSelric
804*ca1c9b0cSelric	* krb5/wrap.c: Better error strings, from Andrew Bartlet.
805*ca1c9b0cSelric
806*ca1c9b0cSelric2006-11-13  Love Hörnquist Åstrand  <lha@it.su.se>
807*ca1c9b0cSelric
808*ca1c9b0cSelric	* test_context.c: Create our own krb5_context.
809*ca1c9b0cSelric
810*ca1c9b0cSelric	* krb5: Switch from using a specific error message context in the
811*ca1c9b0cSelric	TLS to have a whole krb5_context in TLS. This have some
812*ca1c9b0cSelric	interestion side-effekts for the configruration setting options
813*ca1c9b0cSelric	since they operate on per-thread basis now.
814*ca1c9b0cSelric
815*ca1c9b0cSelric	* mech/gss_set_cred_option.c: When calling ->gm_set_cred_option
816*ca1c9b0cSelric	and checking for success, use GSS_S_COMPLETE. From Andrew Bartlet.
817*ca1c9b0cSelric
818*ca1c9b0cSelric2006-11-12  Love Hörnquist Åstrand  <lha@it.su.se>
819*ca1c9b0cSelric
820*ca1c9b0cSelric	* Makefile.am: Help solaris make even more.
821*ca1c9b0cSelric
822*ca1c9b0cSelric	* Makefile.am: Help solaris make.
823*ca1c9b0cSelric
824*ca1c9b0cSelric2006-11-09  Love Hörnquist Åstrand  <lha@it.su.se>
825*ca1c9b0cSelric
826*ca1c9b0cSelric	* Makefile.am: remove include $(srcdir)/Makefile-digest.am for now
827*ca1c9b0cSelric
828*ca1c9b0cSelric	* mech/gss_accept_sec_context.c: Try better guessing what is mech
829*ca1c9b0cSelric	we are going to select by looking harder at the input_token, idea
830*ca1c9b0cSelric	from Luke Howard's mechglue branch.
831*ca1c9b0cSelric
832*ca1c9b0cSelric	* Makefile.am: libgssapi_la_OBJECTS: add depency on gkrb5_err.h
833*ca1c9b0cSelric
834*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: add GSS_KRB5_SET_ALLOWABLE_ENCTYPES_X
835*ca1c9b0cSelric
836*ca1c9b0cSelric	* mech/gss_krb5.c: implement gss_krb5_set_allowable_enctypes
837*ca1c9b0cSelric
838*ca1c9b0cSelric	* gssapi/gssapi.h: GSS_KRB5_S_
839*ca1c9b0cSelric
840*ca1c9b0cSelric	* krb5/gsskrb5_locl.h: Include <gkrb5_err.h>.
841*ca1c9b0cSelric
842*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: Add gss_krb5_set_allowable_enctypes.
843*ca1c9b0cSelric
844*ca1c9b0cSelric	* Makefile.am: Build and install gkrb5_err.h
845*ca1c9b0cSelric
846*ca1c9b0cSelric	* krb5/gkrb5_err.et: Move the GSS_KRB5_S error here.
847*ca1c9b0cSelric
848*ca1c9b0cSelric2006-11-08  Love Hörnquist Åstrand  <lha@it.su.se>
849*ca1c9b0cSelric
850*ca1c9b0cSelric	* mech/gss_krb5.c: Add gsskrb5_set_default_realm.
851*ca1c9b0cSelric
852*ca1c9b0cSelric	* krb5/set_sec_context_option.c: Support
853*ca1c9b0cSelric	GSS_KRB5_SET_DEFAULT_REALM_X.
854*ca1c9b0cSelric
855*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: add GSS_KRB5_SET_DEFAULT_REALM_X
856*ca1c9b0cSelric
857*ca1c9b0cSelric	* krb5/external.c: add GSS_KRB5_SET_DEFAULT_REALM_X
858*ca1c9b0cSelric
859*ca1c9b0cSelric2006-11-07  Love Hörnquist Åstrand  <lha@it.su.se>
860*ca1c9b0cSelric
861*ca1c9b0cSelric	* test_context.c: rename krb5_[gs]et_time_wrap to
862*ca1c9b0cSelric	krb5_[gs]et_max_time_skew
863*ca1c9b0cSelric
864*ca1c9b0cSelric	* krb5/copy_ccache.c: _gsskrb5_extract_authz_data_from_sec_context
865*ca1c9b0cSelric	no longer used, bye bye
866*ca1c9b0cSelric
867*ca1c9b0cSelric	* mech/gss_krb5.c: No depenency of the krb5 gssapi mech.
868*ca1c9b0cSelric
869*ca1c9b0cSelric	* mech/gss_krb5.c (gsskrb5_extract_authtime_from_sec_context): use
870*ca1c9b0cSelric	_gsskrb5_decode_om_uint32. From Andrew Bartlet.
871*ca1c9b0cSelric
872*ca1c9b0cSelric	* mech/gss_krb5.c: Add dummy gss_krb5_set_allowable_enctypes for
873*ca1c9b0cSelric	now.
874*ca1c9b0cSelric
875*ca1c9b0cSelric	* spnego/spnego_locl.h: Include <roken.h> for compatiblity.
876*ca1c9b0cSelric
877*ca1c9b0cSelric	* krb5/arcfour.c: Use IS_DCE_STYLE flag. There is no padding in
878*ca1c9b0cSelric	DCE-STYLE, don't try to use to.  From Andrew Bartlett.
879*ca1c9b0cSelric
880*ca1c9b0cSelric	* test_context.c: test wrap/unwrap, add flag for dce-style and
881*ca1c9b0cSelric	mutual auth, also support multi-roundtrip sessions
882*ca1c9b0cSelric
883*ca1c9b0cSelric	* krb5/gsskrb5_locl.h: Add IS_DCE_STYLE macro.
884*ca1c9b0cSelric
885*ca1c9b0cSelric	* krb5/accept_sec_context.c (gsskrb5_acceptor_start): use
886*ca1c9b0cSelric	krb5_rd_req_ctx
887*ca1c9b0cSelric
888*ca1c9b0cSelric	* mech/gss_krb5.c (gsskrb5_get_subkey): return the per message
889*ca1c9b0cSelric	token subkey
890*ca1c9b0cSelric
891*ca1c9b0cSelric	* krb5/inquire_sec_context_by_oid.c: check if there is any key at
892*ca1c9b0cSelric	all
893*ca1c9b0cSelric
894*ca1c9b0cSelric2006-11-06  Love Hörnquist Åstrand <lha@it.su.se>
895*ca1c9b0cSelric
896*ca1c9b0cSelric	* krb5/inquire_sec_context_by_oid.c: Set more error strings, use
897*ca1c9b0cSelric	right enum for acceptor subkey.  From Andrew Bartlett.
898*ca1c9b0cSelric
899*ca1c9b0cSelric2006-11-04  Love Hörnquist Åstrand  <lha@it.su.se>
900*ca1c9b0cSelric
901*ca1c9b0cSelric	* test_context.c: Test gsskrb5_extract_service_keyblock, needed in
902*ca1c9b0cSelric	PAC valication.  From Andrew Bartlett
903*ca1c9b0cSelric
904*ca1c9b0cSelric	* mech/gss_krb5.c: Add gsskrb5_extract_authz_data_from_sec_context
905*ca1c9b0cSelric	and keyblock extraction functions.
906*ca1c9b0cSelric
907*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: Add extraction of keyblock function, from
908*ca1c9b0cSelric	Andrew Bartlett.
909*ca1c9b0cSelric
910*ca1c9b0cSelric	* krb5/external.c: Add GSS_KRB5_GET_SERVICE_KEYBLOCK_X
911*ca1c9b0cSelric
912*ca1c9b0cSelric2006-11-03  Love Hörnquist Åstrand  <lha@it.su.se>
913*ca1c9b0cSelric
914*ca1c9b0cSelric	* test_context.c: Rename various routines and constants from
915*ca1c9b0cSelric	canonize to canonicalize.  From Andrew Bartlett
916*ca1c9b0cSelric
917*ca1c9b0cSelric	* mech/gss_krb5.c: Rename various routines and constants from
918*ca1c9b0cSelric	canonize to canonicalize.  From Andrew Bartlett
919*ca1c9b0cSelric
920*ca1c9b0cSelric	* krb5/set_sec_context_option.c: Rename various routines and
921*ca1c9b0cSelric	constants from canonize to canonicalize.  From Andrew Bartlett
922*ca1c9b0cSelric
923*ca1c9b0cSelric	* krb5/external.c: Rename various routines and constants from
924*ca1c9b0cSelric	canonize to canonicalize.  From Andrew Bartlett
925*ca1c9b0cSelric
926*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: Rename various routines and constants from
927*ca1c9b0cSelric	canonize to canonicalize.  From Andrew Bartlett
928*ca1c9b0cSelric
929*ca1c9b0cSelric2006-10-25  Love Hörnquist Åstrand  <lha@it.su.se>
930*ca1c9b0cSelric
931*ca1c9b0cSelric	* krb5/accept_sec_context.c (gsskrb5_accept_delegated_token): need
932*ca1c9b0cSelric	to free ccache
933*ca1c9b0cSelric
934*ca1c9b0cSelric2006-10-24  Love Hörnquist Åstrand  <lha@it.su.se>
935*ca1c9b0cSelric
936*ca1c9b0cSelric	* test_context.c (loop): free target_name
937*ca1c9b0cSelric
938*ca1c9b0cSelric	* mech/gss_accept_sec_context.c: SLIST_INIT the ->gc_mc'
939*ca1c9b0cSelric
940*ca1c9b0cSelric	* mech/gss_acquire_cred.c : SLIST_INIT the ->gc_mc'
941*ca1c9b0cSelric
942*ca1c9b0cSelric	* krb5/init_sec_context.c: Avoid leaking memory.
943*ca1c9b0cSelric
944*ca1c9b0cSelric	* mech/gss_buffer_set.c (gss_release_buffer_set): don't leak the
945*ca1c9b0cSelric	->elements memory.
946*ca1c9b0cSelric
947*ca1c9b0cSelric	* test_context.c: make compile
948*ca1c9b0cSelric
949*ca1c9b0cSelric	* krb5/cfx.c (_gssapi_verify_mic_cfx): always free crypto context.
950*ca1c9b0cSelric
951*ca1c9b0cSelric	* krb5/set_cred_option.c (import_cred): free sp
952*ca1c9b0cSelric
953*ca1c9b0cSelric2006-10-22  Love Hörnquist Åstrand  <lha@it.su.se>
954*ca1c9b0cSelric
955*ca1c9b0cSelric	* mech/gss_add_oid_set_member.c: Use old implementation of
956*ca1c9b0cSelric	gss_add_oid_set_member, it leaks less memory.
957*ca1c9b0cSelric
958*ca1c9b0cSelric	* krb5/test_cfx.c: free krb5_crypto.
959*ca1c9b0cSelric
960*ca1c9b0cSelric	* krb5/test_cfx.c: free krb5_context
961*ca1c9b0cSelric
962*ca1c9b0cSelric	* mech/gss_release_name.c (gss_release_name): free input_name
963*ca1c9b0cSelric	it-self.
964*ca1c9b0cSelric
965*ca1c9b0cSelric2006-10-21  Love Hörnquist Åstrand  <lha@it.su.se>
966*ca1c9b0cSelric
967*ca1c9b0cSelric	* test_context.c: Call setprogname.
968*ca1c9b0cSelric
969*ca1c9b0cSelric	* mech/gss_krb5.c: Add gsskrb5_extract_authtime_from_sec_context.
970*ca1c9b0cSelric
971*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: add
972*ca1c9b0cSelric	gsskrb5_extract_authtime_from_sec_context
973*ca1c9b0cSelric
974*ca1c9b0cSelric2006-10-20  Love Hörnquist Åstrand  <lha@it.su.se>
975*ca1c9b0cSelric
976*ca1c9b0cSelric	* krb5/inquire_sec_context_by_oid.c: Add get_authtime.
977*ca1c9b0cSelric
978*ca1c9b0cSelric	* krb5/external.c: add GSS_KRB5_GET_AUTHTIME_X
979*ca1c9b0cSelric
980*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: add GSS_KRB5_GET_AUTHTIME_X
981*ca1c9b0cSelric
982*ca1c9b0cSelric	* krb5/set_sec_context_option.c: Implement GSS_KRB5_SEND_TO_KDC_X.
983*ca1c9b0cSelric
984*ca1c9b0cSelric	* mech/gss_krb5.c: Add gsskrb5_set_send_to_kdc
985*ca1c9b0cSelric
986*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: Add GSS_KRB5_SEND_TO_KDC_X and
987*ca1c9b0cSelric	gsskrb5_set_send_to_kdc
988*ca1c9b0cSelric
989*ca1c9b0cSelric	* krb5/external.c: add GSS_KRB5_SEND_TO_KDC_X
990*ca1c9b0cSelric
991*ca1c9b0cSelric	* Makefile.am: more files
992*ca1c9b0cSelric
993*ca1c9b0cSelric2006-10-19  Love Hörnquist Åstrand  <lha@it.su.se>
994*ca1c9b0cSelric
995*ca1c9b0cSelric	* Makefile.am: remove spnego/gssapi_spnego.h, its now in gssapi/
996*ca1c9b0cSelric
997*ca1c9b0cSelric	* test_context.c: Allow specifing mech.
998*ca1c9b0cSelric
999*ca1c9b0cSelric	* krb5/external.c: add GSS_SASL_DIGEST_MD5_MECHANISM (for now)
1000*ca1c9b0cSelric
1001*ca1c9b0cSelric	* gssapi/gssapi.h: Rename GSS_DIGEST_MECHANISM to
1002*ca1c9b0cSelric	GSS_SASL_DIGEST_MD5_MECHANISM
1003*ca1c9b0cSelric
1004*ca1c9b0cSelric2006-10-18  Love Hörnquist Åstrand  <lha@it.su.se>
1005*ca1c9b0cSelric
1006*ca1c9b0cSelric	* mech/gssapi.asn1: Make it into a heim_any_set, its doesn't
1007*ca1c9b0cSelric	except a tag.
1008*ca1c9b0cSelric
1009*ca1c9b0cSelric	* mech/gssapi.asn1: GSSAPIContextToken is IMPLICIT SEQUENCE
1010*ca1c9b0cSelric
1011*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: add GSS_KRB5_GET_ACCEPTOR_SUBKEY_X
1012*ca1c9b0cSelric
1013*ca1c9b0cSelric	* krb5/external.c: Add GSS_KRB5_GET_ACCEPTOR_SUBKEY_X.
1014*ca1c9b0cSelric
1015*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: add GSS_KRB5_GET_INITIATOR_SUBKEY_X and
1016*ca1c9b0cSelric	GSS_KRB5_GET_SUBKEY_X
1017*ca1c9b0cSelric
1018*ca1c9b0cSelric	* krb5/external.c: add GSS_KRB5_GET_INITIATOR_SUBKEY_X,
1019*ca1c9b0cSelric	GSS_KRB5_GET_SUBKEY_X
1020*ca1c9b0cSelric
1021*ca1c9b0cSelric2006-10-17  Love Hörnquist Åstrand  <lha@it.su.se>
1022*ca1c9b0cSelric
1023*ca1c9b0cSelric	* test_context.c: Support switching on name type oid's
1024*ca1c9b0cSelric
1025*ca1c9b0cSelric	* test_context.c: add test for dns canon flag
1026*ca1c9b0cSelric
1027*ca1c9b0cSelric	* mech/gss_krb5.c: Add gsskrb5_set_dns_canonlize.
1028*ca1c9b0cSelric
1029*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: remove gss_krb5_compat_des3_mic
1030*ca1c9b0cSelric
1031*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: Add gsskrb5_set_dns_canonlize.
1032*ca1c9b0cSelric
1033*ca1c9b0cSelric	* krb5/set_sec_context_option.c: implement
1034*ca1c9b0cSelric	GSS_KRB5_SET_DNS_CANONIZE_X
1035*ca1c9b0cSelric
1036*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: add GSS_KRB5_SET_DNS_CANONIZE_X
1037*ca1c9b0cSelric
1038*ca1c9b0cSelric	* krb5/external.c: add GSS_KRB5_SET_DNS_CANONIZE_X
1039*ca1c9b0cSelric
1040*ca1c9b0cSelric	* mech/gss_krb5.c: add bits to make lucid context work
1041*ca1c9b0cSelric
1042*ca1c9b0cSelric2006-10-14  Love Hörnquist Åstrand  <lha@it.su.se>
1043*ca1c9b0cSelric
1044*ca1c9b0cSelric	* mech/gss_oid_to_str.c: Prefix der primitives with der_.
1045*ca1c9b0cSelric
1046*ca1c9b0cSelric	* krb5/inquire_sec_context_by_oid.c: Prefix der primitives with
1047*ca1c9b0cSelric	der_.
1048*ca1c9b0cSelric
1049*ca1c9b0cSelric	* krb5/encapsulate.c: Prefix der primitives with der_.
1050*ca1c9b0cSelric
1051*ca1c9b0cSelric	* mech/gss_oid_to_str.c: New der_print_heim_oid signature.
1052*ca1c9b0cSelric
1053*ca1c9b0cSelric2006-10-12  Love Hörnquist Åstrand  <lha@it.su.se>
1054*ca1c9b0cSelric
1055*ca1c9b0cSelric	* Makefile.am: add test_context
1056*ca1c9b0cSelric
1057*ca1c9b0cSelric	* krb5/inquire_sec_context_by_oid.c: Make it work.
1058*ca1c9b0cSelric
1059*ca1c9b0cSelric	* test_oid.c: Test lucid oid.
1060*ca1c9b0cSelric
1061*ca1c9b0cSelric	* gssapi/gssapi.h: Add OM_uint64_t.
1062*ca1c9b0cSelric
1063*ca1c9b0cSelric	* krb5/inquire_sec_context_by_oid.c: Add lucid interface.
1064*ca1c9b0cSelric
1065*ca1c9b0cSelric	* krb5/external.c: Add lucid interface, renumber oids to my
1066*ca1c9b0cSelric	delegated space.
1067*ca1c9b0cSelric
1068*ca1c9b0cSelric	* mech/gss_krb5.c: Add lucid interface.
1069*ca1c9b0cSelric
1070*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: Add lucid interface.
1071*ca1c9b0cSelric
1072*ca1c9b0cSelric	* spnego/spnego_locl.h: Maybe include <netdb.h>.
1073*ca1c9b0cSelric
1074*ca1c9b0cSelric2006-10-09  Love Hörnquist Åstrand  <lha@it.su.se>
1075*ca1c9b0cSelric
1076*ca1c9b0cSelric	* mech/gss_mech_switch.c: define RTLD_LOCAL to 0 if not defined.
1077*ca1c9b0cSelric
1078*ca1c9b0cSelric2006-10-08  Love Hörnquist Åstrand  <lha@it.su.se>
1079*ca1c9b0cSelric
1080*ca1c9b0cSelric	* Makefile.am: install gssapi_krb5.H and gssapi_spnego.h
1081*ca1c9b0cSelric
1082*ca1c9b0cSelric	* gssapi/gssapi_krb5.h: Move krb5 stuff to <gssapi/gssapi_krb5.h>.
1083*ca1c9b0cSelric
1084*ca1c9b0cSelric	* gssapi/gssapi.h: Move krb5 stuff to <gssapi/gssapi_krb5.h>.
1085*ca1c9b0cSelric
1086*ca1c9b0cSelric	* Makefile.am: Drop some -I no longer needed.
1087*ca1c9b0cSelric
1088*ca1c9b0cSelric	* gssapi/gssapi_spnego.h: Move gssapi_spengo.h over here.
1089*ca1c9b0cSelric
1090*ca1c9b0cSelric	* krb5: reference all include files using 'krb5/'
1091*ca1c9b0cSelric
1092*ca1c9b0cSelric2006-10-07  Love Hörnquist Åstrand  <lha@it.su.se>
1093*ca1c9b0cSelric
1094*ca1c9b0cSelric	* gssapi.h: Add file inclusion protection.
1095*ca1c9b0cSelric
1096*ca1c9b0cSelric	* gssapi/gssapi.h: Correct header file inclusion protection.
1097*ca1c9b0cSelric
1098*ca1c9b0cSelric	* gssapi/gssapi.h: Move the gssapi.h from lib/gssapi/ to
1099*ca1c9b0cSelric	lib/gssapi/gssapi/ to please automake.
1100*ca1c9b0cSelric
1101*ca1c9b0cSelric	* spnego/spnego_locl.h: Maybe include <sys/types.h>.
1102*ca1c9b0cSelric
1103*ca1c9b0cSelric	* mech/mech_locl.h: Include <roken.h>.
1104*ca1c9b0cSelric
1105*ca1c9b0cSelric	* Makefile.am: split build files into dist_ and noinst_ SOURCES
1106*ca1c9b0cSelric
1107*ca1c9b0cSelric2006-10-06  Love Hörnquist Åstrand  <lha@it.su.se>
1108*ca1c9b0cSelric
1109*ca1c9b0cSelric	* gss.c: #if 0 out unused code.
1110*ca1c9b0cSelric
1111*ca1c9b0cSelric	* mech/gss_mech_switch.c: Cast argument to ctype(3) functions
1112*ca1c9b0cSelric	to (unsigned char).
1113*ca1c9b0cSelric
1114*ca1c9b0cSelric2006-10-05  Love Hörnquist Åstrand  <lha@it.su.se>
1115*ca1c9b0cSelric
1116*ca1c9b0cSelric	* mech/name.h: remove <sys/queue.h>
1117*ca1c9b0cSelric
1118*ca1c9b0cSelric	* mech/mech_switch.h: remove <sys/queue.h>
1119*ca1c9b0cSelric
1120*ca1c9b0cSelric	* mech/cred.h: remove <sys/queue.h>
1121*ca1c9b0cSelric
1122*ca1c9b0cSelric2006-10-02  Love Hörnquist Åstrand  <lha@it.su.se>
1123*ca1c9b0cSelric
1124*ca1c9b0cSelric	* krb5/arcfour.c: Thinker more with header lengths.
1125*ca1c9b0cSelric
1126*ca1c9b0cSelric	* krb5/arcfour.c: Improve the calcucation of header
1127*ca1c9b0cSelric	lengths. DCE-STYLE data is also padded so remove if (1 || ...)
1128*ca1c9b0cSelric	code.
1129*ca1c9b0cSelric
1130*ca1c9b0cSelric	* krb5/wrap.c (_gsskrb5_wrap_size_limit): use
1131*ca1c9b0cSelric	_gssapi_wrap_size_arcfour for arcfour
1132*ca1c9b0cSelric
1133*ca1c9b0cSelric	* krb5/arcfour.c: Move _gssapi_wrap_size_arcfour here.
1134*ca1c9b0cSelric
1135*ca1c9b0cSelric	* Makefile.am: Split all mech to diffrent mechsrc variables.
1136*ca1c9b0cSelric
1137*ca1c9b0cSelric	* spnego/context_stubs.c: Make internal function static (and
1138*ca1c9b0cSelric	rename).
1139*ca1c9b0cSelric
1140*ca1c9b0cSelric2006-10-01  Love Hörnquist Åstrand  <lha@it.su.se>
1141*ca1c9b0cSelric
1142*ca1c9b0cSelric	* krb5/inquire_cred.c: Fix "if (x) lock(y)" bug. From Harald
1143*ca1c9b0cSelric	Barth.
1144*ca1c9b0cSelric
1145*ca1c9b0cSelric	* spnego/spnego_locl.h: Include <sys/param.h> for MAXHOSTNAMELEN.
1146*ca1c9b0cSelric
1147*ca1c9b0cSelric2006-09-25  Love Hörnquist Åstrand  <lha@it.su.se>
1148*ca1c9b0cSelric
1149*ca1c9b0cSelric	* krb5/arcfour.c: Add wrap support, interrop with itself but not
1150*ca1c9b0cSelric	w2k3s-sp1
1151*ca1c9b0cSelric
1152*ca1c9b0cSelric	* krb5/gsskrb5_locl.h: move the arcfour specific stuff to the
1153*ca1c9b0cSelric	arcfour header.
1154*ca1c9b0cSelric
1155*ca1c9b0cSelric	* krb5/arcfour.c: Support DCE-style unwrap, tested with
1156*ca1c9b0cSelric	w2k3server-sp1.
1157*ca1c9b0cSelric
1158*ca1c9b0cSelric	* mech/gss_accept_sec_context.c (gss_accept_sec_context): if the
1159*ca1c9b0cSelric	token doesn't start with [APPLICATION 0] SEQUENCE, lets assume its
1160*ca1c9b0cSelric	a DCE-style kerberos 5 connection. XXX this needs to be made
1161*ca1c9b0cSelric	better in cause we get another GSS-API protocol violating
1162*ca1c9b0cSelric	protocol. It should be possible to detach the Kerberos DCE-style
1163*ca1c9b0cSelric	since it starts with a AP-REQ PDU, but that have to wait for now.
1164*ca1c9b0cSelric
1165*ca1c9b0cSelric2006-09-22  Love Hörnquist Åstrand  <lha@it.su.se>
1166*ca1c9b0cSelric
1167*ca1c9b0cSelric	* gssapi.h: Add GSS_C flags from
1168*ca1c9b0cSelric	draft-brezak-win2k-krb-rc4-hmac-04.txt.
1169*ca1c9b0cSelric
1170*ca1c9b0cSelric	* krb5/delete_sec_context.c: Free service_keyblock and fwd_data,
1171*ca1c9b0cSelric	indent.
1172*ca1c9b0cSelric
1173*ca1c9b0cSelric	* krb5/accept_sec_context.c: Merge of the acceptor part from the
1174*ca1c9b0cSelric	samba patch by Stefan Metzmacher and Andrew Bartlet.
1175*ca1c9b0cSelric
1176*ca1c9b0cSelric	* krb5/init_sec_context.c: Add GSS_C_DCE_STYLE.
1177*ca1c9b0cSelric
1178*ca1c9b0cSelric	* krb5/{init_sec_context.c,gsskrb5_locl.h}: merge most of the
1179*ca1c9b0cSelric	initiator part from the samba patch by Stefan Metzmacher and
1180*ca1c9b0cSelric	Andrew Bartlet (still missing DCE/RPC support)
1181*ca1c9b0cSelric
1182*ca1c9b0cSelric2006-08-28  Love Hörnquist Åstrand  <lha@it.su.se>
1183*ca1c9b0cSelric
1184*ca1c9b0cSelric	* gss.c (help): use sl_slc_help().
1185*ca1c9b0cSelric
1186*ca1c9b0cSelric2006-07-22  Love Hörnquist Åstrand  <lha@it.su.se>
1187*ca1c9b0cSelric
1188*ca1c9b0cSelric	* gss-commands.in: rename command to supported-mechanisms
1189*ca1c9b0cSelric
1190*ca1c9b0cSelric	* Makefile.am: Make gss objects depend on the slc built
1191*ca1c9b0cSelric	gss-commands.h
1192*ca1c9b0cSelric
1193*ca1c9b0cSelric2006-07-20  Love Hörnquist Åstrand  <lha@it.su.se>
1194*ca1c9b0cSelric
1195*ca1c9b0cSelric	* gss-commands.in: add slc commands for gss
1196*ca1c9b0cSelric
1197*ca1c9b0cSelric	* krb5/gsskrb5_locl.h: Remove dup prototype of _gsskrb5_init()
1198*ca1c9b0cSelric
1199*ca1c9b0cSelric	* Makefile.am: Add test_cfx
1200*ca1c9b0cSelric
1201*ca1c9b0cSelric	* krb5/external.c: add GSS_KRB5_REGISTER_ACCEPTOR_IDENTITY_X
1202*ca1c9b0cSelric
1203*ca1c9b0cSelric	* krb5/set_sec_context_option.c: catch
1204*ca1c9b0cSelric	GSS_KRB5_REGISTER_ACCEPTOR_IDENTITY_X
1205*ca1c9b0cSelric
1206*ca1c9b0cSelric	* krb5/accept_sec_context.c: reimplement
1207*ca1c9b0cSelric	gsskrb5_register_acceptor_identity
1208*ca1c9b0cSelric
1209*ca1c9b0cSelric	* mech/gss_krb5.c: implement gsskrb5_register_acceptor_identity
1210*ca1c9b0cSelric
1211*ca1c9b0cSelric	* mech/gss_inquire_mechs_for_name.c: call _gss_load_mech
1212*ca1c9b0cSelric
1213*ca1c9b0cSelric	* mech/gss_inquire_cred.c (gss_inquire_cred): call _gss_load_mech
1214*ca1c9b0cSelric
1215*ca1c9b0cSelric	* mech/gss_mech_switch.c: Make _gss_load_mech() atomic and run
1216*ca1c9b0cSelric	only once, this have the side effect that _gss_mechs and
1217*ca1c9b0cSelric	_gss_mech_oids is only initialized once, so if just the users of
1218*ca1c9b0cSelric	these two global variables calls _gss_load_mech() first, it will
1219*ca1c9b0cSelric	act as a barrier and make sure the variables are never changed and
1220*ca1c9b0cSelric	we don't need to lock them.
1221*ca1c9b0cSelric
1222*ca1c9b0cSelric	* mech/utils.h: no need to mark functions extern.
1223*ca1c9b0cSelric
1224*ca1c9b0cSelric	* mech/name.h: no need to mark _gss_find_mn extern.
1225*ca1c9b0cSelric
1226*ca1c9b0cSelric2006-07-19  Love Hörnquist Åstrand <lha@it.su.se>
1227*ca1c9b0cSelric
1228*ca1c9b0cSelric	* krb5/cfx.c: Redo the wrap length calculations.
1229*ca1c9b0cSelric
1230*ca1c9b0cSelric	* krb5/test_cfx.c: test max_wrap_size in cfx.c
1231*ca1c9b0cSelric
1232*ca1c9b0cSelric	* mech/gss_display_status.c: Handle more error codes.
1233*ca1c9b0cSelric
1234*ca1c9b0cSelric2006-07-07  Love Hörnquist Åstrand  <lha@it.su.se>
1235*ca1c9b0cSelric
1236*ca1c9b0cSelric	* mech/mech_locl.h: Include <krb5-types.h> and "mechqueue.h"
1237*ca1c9b0cSelric
1238*ca1c9b0cSelric	* mech/mechqueue.h: Add SLIST macros.
1239*ca1c9b0cSelric
1240*ca1c9b0cSelric	* krb5/inquire_context.c: Don't free return values on success.
1241*ca1c9b0cSelric
1242*ca1c9b0cSelric	* krb5/inquire_cred.c (_gsskrb5_inquire_cred): When cred provided
1243*ca1c9b0cSelric	is the default cred, acquire the acceptor cred and initator cred
1244*ca1c9b0cSelric	in two diffrent steps and then query them for the information,
1245*ca1c9b0cSelric	this way, the code wont fail if there are no keytab, but there is
1246*ca1c9b0cSelric	a credential cache.
1247*ca1c9b0cSelric
1248*ca1c9b0cSelric	* mech/gss_inquire_cred.c: move the check if we found any cred
1249*ca1c9b0cSelric	where it matter for both cases
1250*ca1c9b0cSelric	(default cred and provided cred)
1251*ca1c9b0cSelric
1252*ca1c9b0cSelric	* mech/gss_init_sec_context.c: If the desired mechanism can't
1253*ca1c9b0cSelric	convert the name to a MN, fail with GSS_S_BAD_NAME rather then a
1254*ca1c9b0cSelric	NULL de-reference.
1255*ca1c9b0cSelric
1256*ca1c9b0cSelric2006-07-06  Love Hörnquist Åstrand  <lha@it.su.se>
1257*ca1c9b0cSelric
1258*ca1c9b0cSelric	* spnego/external.c: readd gss_spnego_inquire_names_for_mech
1259*ca1c9b0cSelric
1260*ca1c9b0cSelric	* spnego/spnego_locl.h: reimplement
1261*ca1c9b0cSelric	gss_spnego_inquire_names_for_mech add support function
1262*ca1c9b0cSelric	_gss_spnego_supported_mechs
1263*ca1c9b0cSelric
1264*ca1c9b0cSelric	* spnego/context_stubs.h: reimplement
1265*ca1c9b0cSelric	gss_spnego_inquire_names_for_mech add support function
1266*ca1c9b0cSelric	_gss_spnego_supported_mechs
1267*ca1c9b0cSelric
1268*ca1c9b0cSelric	* spnego/context_stubs.c: drop gss_spnego_indicate_mechs
1269*ca1c9b0cSelric
1270*ca1c9b0cSelric	* mech/gss_indicate_mechs.c: if the underlaying mech doesn't
1271*ca1c9b0cSelric	support gss_indicate_mechs, use the oid in the mechswitch
1272*ca1c9b0cSelric	structure
1273*ca1c9b0cSelric
1274*ca1c9b0cSelric	* spnego/external.c: let the mech glue layer implement
1275*ca1c9b0cSelric	gss_indicate_mechs
1276*ca1c9b0cSelric
1277*ca1c9b0cSelric	* spnego/cred_stubs.c (gss_spnego_acquire_cred): don't care about
1278*ca1c9b0cSelric	desired_mechs, get our own list with indicate_mechs and remove
1279*ca1c9b0cSelric	ourself.
1280*ca1c9b0cSelric
1281*ca1c9b0cSelric2006-07-05 Love Hörnquist Åstrand <lha@it.su.se>
1282*ca1c9b0cSelric
1283*ca1c9b0cSelric	* spnego/external.c: remove gss_spnego_inquire_names_for_mech, let
1284*ca1c9b0cSelric	the mechglue layer implement it
1285*ca1c9b0cSelric
1286*ca1c9b0cSelric	* spnego/context_stubs.c: remove gss_spnego_inquire_names_for_mech, let
1287*ca1c9b0cSelric	the mechglue layer implement it
1288*ca1c9b0cSelric
1289*ca1c9b0cSelric	* spnego/spnego_locl.c: remove gss_spnego_inquire_names_for_mech, let
1290*ca1c9b0cSelric	the mechglue layer implement it
1291*ca1c9b0cSelric
1292*ca1c9b0cSelric2006-07-01  Love Hörnquist Åstrand  <lha@it.su.se>
1293*ca1c9b0cSelric
1294*ca1c9b0cSelric	* mech/gss_set_cred_option.c: fix argument to gss_release_cred
1295*ca1c9b0cSelric
1296*ca1c9b0cSelric2006-06-30  Love Hörnquist Åstrand  <lha@it.su.se>
1297*ca1c9b0cSelric
1298*ca1c9b0cSelric	* krb5/init_sec_context.c: Make work on compilers that are
1299*ca1c9b0cSelric	somewhat more picky then gcc4 (like gcc2.95)
1300*ca1c9b0cSelric
1301*ca1c9b0cSelric	* krb5/init_sec_context.c (do_delegation): use KDCOptions2int to
1302*ca1c9b0cSelric	convert fwd_flags to an integer, since otherwise int2KDCOptions in
1303*ca1c9b0cSelric	krb5_get_forwarded_creds wont do the right thing.
1304*ca1c9b0cSelric
1305*ca1c9b0cSelric	* mech/gss_set_cred_option.c (gss_set_cred_option): free memory on
1306*ca1c9b0cSelric	failure
1307*ca1c9b0cSelric
1308*ca1c9b0cSelric	* krb5/set_sec_context_option.c (_gsskrb5_set_sec_context_option):
1309*ca1c9b0cSelric	init global kerberos context
1310*ca1c9b0cSelric
1311*ca1c9b0cSelric	* krb5/set_cred_option.c (_gsskrb5_set_cred_option): init global
1312*ca1c9b0cSelric	kerberos context
1313*ca1c9b0cSelric
1314*ca1c9b0cSelric	* mech/gss_accept_sec_context.c: Insert the delegated sub cred on
1315*ca1c9b0cSelric	the delegated cred handle, not cred handle
1316*ca1c9b0cSelric
1317*ca1c9b0cSelric	* mech/gss_accept_sec_context.c (gss_accept_sec_context): handle
1318*ca1c9b0cSelric	the case where ret_flags == NULL
1319*ca1c9b0cSelric
1320*ca1c9b0cSelric	* mech/gss_mech_switch.c (add_builtin): set
1321*ca1c9b0cSelric	_gss_mech_switch->gm_mech_oid
1322*ca1c9b0cSelric
1323*ca1c9b0cSelric	* mech/gss_set_cred_option.c (gss_set_cred_option): laod mechs
1324*ca1c9b0cSelric
1325*ca1c9b0cSelric	* test_cred.c (gss_print_errors): don't try to print error when
1326*ca1c9b0cSelric	gss_display_status failed
1327*ca1c9b0cSelric
1328*ca1c9b0cSelric	* Makefile.am: Add mech/gss_release_oid.c
1329*ca1c9b0cSelric
1330*ca1c9b0cSelric	* mech/gss_release_oid.c: Add gss_release_oid, reverse of
1331*ca1c9b0cSelric	gss_duplicate_oid
1332*ca1c9b0cSelric
1333*ca1c9b0cSelric	* spnego/compat.c: preferred_mech_type was allocated with
1334*ca1c9b0cSelric	gss_duplicate_oid in one place and assigned static varianbles a
1335*ca1c9b0cSelric	the second place. change that static assignement to
1336*ca1c9b0cSelric	gss_duplicate_oid and bring back gss_release_oid.
1337*ca1c9b0cSelric
1338*ca1c9b0cSelric	* spnego/compat.c (_gss_spnego_delete_sec_context): don't release
1339*ca1c9b0cSelric	preferred_mech_type and negotiated_mech_type, they where never
1340*ca1c9b0cSelric	allocated from the begining.
1341*ca1c9b0cSelric
1342*ca1c9b0cSelric2006-06-29  Love Hörnquist Åstrand  <lha@it.su.se>
1343*ca1c9b0cSelric
1344*ca1c9b0cSelric	* mech/gss_import_name.c (gss_import_name): avoid
1345*ca1c9b0cSelric	type-punned/strict aliasing rules
1346*ca1c9b0cSelric
1347*ca1c9b0cSelric	* mech/gss_add_cred.c: avoid type-punned/strict aliasing rules
1348*ca1c9b0cSelric
1349*ca1c9b0cSelric	* gssapi.h: Make gss_name_t an opaque type.
1350*ca1c9b0cSelric
1351*ca1c9b0cSelric	* krb5: make gss_name_t an opaque type
1352*ca1c9b0cSelric
1353*ca1c9b0cSelric	* krb5/set_cred_option.c: Add
1354*ca1c9b0cSelric
1355*ca1c9b0cSelric	* mech/gss_set_cred_option.c (gss_set_cred_option): support the
1356*ca1c9b0cSelric	case where *cred_handle == NULL
1357*ca1c9b0cSelric
1358*ca1c9b0cSelric	* mech/gss_krb5.c (gss_krb5_import_cred): make sure cred is
1359*ca1c9b0cSelric	GSS_C_NO_CREDENTIAL on failure.
1360*ca1c9b0cSelric
1361*ca1c9b0cSelric	* mech/gss_acquire_cred.c (gss_acquire_cred): if desired_mechs is
1362*ca1c9b0cSelric	NO_OID_SET, there is a need to load the mechs, so always do that.
1363*ca1c9b0cSelric
1364*ca1c9b0cSelric2006-06-28  Love Hörnquist Åstrand  <lha@it.su.se>
1365*ca1c9b0cSelric
1366*ca1c9b0cSelric	* krb5/inquire_cred_by_oid.c: Reimplement GSS_KRB5_COPY_CCACHE_X
1367*ca1c9b0cSelric	to instead pass a fullname to the credential, then resolve and
1368*ca1c9b0cSelric	copy out the content, and then close the cred.
1369*ca1c9b0cSelric
1370*ca1c9b0cSelric	* mech/gss_krb5.c: Reimplement GSS_KRB5_COPY_CCACHE_X to instead
1371*ca1c9b0cSelric	pass a fullname to the credential, then resolve and copy out the
1372*ca1c9b0cSelric	content, and then close the cred.
1373*ca1c9b0cSelric
1374*ca1c9b0cSelric	* krb5/inquire_cred_by_oid.c: make "work", GSS_KRB5_COPY_CCACHE_X
1375*ca1c9b0cSelric	interface needs to be re-done, currently its utterly broken.
1376*ca1c9b0cSelric
1377*ca1c9b0cSelric	* mech/gss_set_cred_option.c: Make work.
1378*ca1c9b0cSelric
1379*ca1c9b0cSelric	* krb5/external.c: Add _gsskrb5_set_{sec_context,cred}_option
1380*ca1c9b0cSelric
1381*ca1c9b0cSelric	* mech/gss_krb5.c (gss_krb5_import_cred): implement
1382*ca1c9b0cSelric
1383*ca1c9b0cSelric	* Makefile.am: Add gss_set_{sec_context,cred}_option and sort
1384*ca1c9b0cSelric
1385*ca1c9b0cSelric	* mech/gss_set_{sec_context,cred}_option.c: add
1386*ca1c9b0cSelric
1387*ca1c9b0cSelric	* gssapi.h: Add GSS_KRB5_IMPORT_CRED_X
1388*ca1c9b0cSelric
1389*ca1c9b0cSelric	* test_*.c: make compile again
1390*ca1c9b0cSelric
1391*ca1c9b0cSelric	* Makefile.am: Add lib dependencies and test programs
1392*ca1c9b0cSelric
1393*ca1c9b0cSelric	* spnego: remove dependency on libkrb5
1394*ca1c9b0cSelric
1395*ca1c9b0cSelric	* mech: Bug fixes, cleanup, compiler warnings, restructure code.
1396*ca1c9b0cSelric
1397*ca1c9b0cSelric	* spnego: Rename gss_context_id_t and gss_cred_id_t to local names
1398*ca1c9b0cSelric
1399*ca1c9b0cSelric	* krb5: repro copy the krb5 files here
1400*ca1c9b0cSelric
1401*ca1c9b0cSelric	* mech: import Doug Rabson mechglue from freebsd
1402*ca1c9b0cSelric
1403*ca1c9b0cSelric	* spnego: Import Luke Howard's SPNEGO from the mechglue branch
1404*ca1c9b0cSelric
1405*ca1c9b0cSelric2006-06-22  Love Hörnquist Åstrand  <lha@it.su.se>
1406*ca1c9b0cSelric
1407*ca1c9b0cSelric	* gssapi.h: Add oid_to_str.
1408*ca1c9b0cSelric
1409*ca1c9b0cSelric	* Makefile.am: add oid_to_str and test_oid
1410*ca1c9b0cSelric
1411*ca1c9b0cSelric	* oid_to_str.c: Add gss_oid_to_str
1412*ca1c9b0cSelric
1413*ca1c9b0cSelric	* test_oid.c: Add test for gss_oid_to_str()
1414*ca1c9b0cSelric
1415*ca1c9b0cSelric2006-05-13  Love Hörnquist Åstrand  <lha@it.su.se>
1416*ca1c9b0cSelric
1417*ca1c9b0cSelric	* verify_mic.c: Less pointer signedness warnings.
1418*ca1c9b0cSelric
1419*ca1c9b0cSelric	* unwrap.c: Less pointer signedness warnings.
1420*ca1c9b0cSelric
1421*ca1c9b0cSelric	* arcfour.c: Less pointer signedness warnings.
1422*ca1c9b0cSelric
1423*ca1c9b0cSelric	* gssapi_locl.h: Use const void * to instead of unsigned char * to
1424*ca1c9b0cSelric	avoid pointer signedness warnings.
1425*ca1c9b0cSelric
1426*ca1c9b0cSelric	* encapsulate.c: Use const void * to instead of unsigned char * to
1427*ca1c9b0cSelric	avoid pointer signedness warnings.
1428*ca1c9b0cSelric
1429*ca1c9b0cSelric	* decapsulate.c: Use const void * to instead of unsigned char * to
1430*ca1c9b0cSelric	avoid pointer signedness warnings.
1431*ca1c9b0cSelric
1432*ca1c9b0cSelric	* decapsulate.c: Less pointer signedness warnings.
1433*ca1c9b0cSelric
1434*ca1c9b0cSelric	* cfx.c: Less pointer signedness warnings.
1435*ca1c9b0cSelric
1436*ca1c9b0cSelric	* init_sec_context.c: Less pointer signedness warnings (partly by
1437*ca1c9b0cSelric	using the new asn.1 CHOICE decoder)
1438*ca1c9b0cSelric
1439*ca1c9b0cSelric	* import_sec_context.c: Less pointer signedness warnings.
1440*ca1c9b0cSelric
1441*ca1c9b0cSelric2006-05-09  Love Hörnquist Åstrand  <lha@it.su.se>
1442*ca1c9b0cSelric
1443*ca1c9b0cSelric	* accept_sec_context.c (gsskrb5_is_cfx): always set is_cfx. From
1444*ca1c9b0cSelric	Andrew Abartlet.
1445*ca1c9b0cSelric
1446*ca1c9b0cSelric2006-05-08  Love Hörnquist Åstrand  <lha@it.su.se>
1447*ca1c9b0cSelric
1448*ca1c9b0cSelric	* get_mic.c (mic_des3): make sure message_buffer doesn't point to
1449*ca1c9b0cSelric	free()ed memory on failure. Pointed out by IBM checker.
1450*ca1c9b0cSelric
1451*ca1c9b0cSelric2006-05-05  Love Hörnquist Åstrand  <lha@it.su.se>
1452*ca1c9b0cSelric
1453*ca1c9b0cSelric	* Rename u_intXX_t to uintXX_t
1454*ca1c9b0cSelric
1455*ca1c9b0cSelric2006-05-04 Love Hörnquist Åstrand <lha@it.su.se>
1456*ca1c9b0cSelric
1457*ca1c9b0cSelric	* cfx.c: Less pointer signedness warnings.
1458*ca1c9b0cSelric
1459*ca1c9b0cSelric	* arcfour.c: Avoid pointer signedness warnings.
1460*ca1c9b0cSelric
1461*ca1c9b0cSelric	* gssapi_locl.h (gssapi_decode_*): make data argument const void *
1462*ca1c9b0cSelric
1463*ca1c9b0cSelric	* 8003.c (gssapi_decode_*): make data argument const void *
1464*ca1c9b0cSelric
1465*ca1c9b0cSelric2006-04-12  Love Hörnquist Åstrand  <lha@it.su.se>
1466*ca1c9b0cSelric
1467*ca1c9b0cSelric	* export_sec_context.c: Export sequence order element. From Wynn
1468*ca1c9b0cSelric	Wilkes <wynn.wilkes@quest.com>.
1469*ca1c9b0cSelric
1470*ca1c9b0cSelric	* import_sec_context.c: Import sequence order element. From Wynn
1471*ca1c9b0cSelric	Wilkes <wynn.wilkes@quest.com>.
1472*ca1c9b0cSelric
1473*ca1c9b0cSelric	* sequence.c (_gssapi_msg_order_import,_gssapi_msg_order_export):
1474*ca1c9b0cSelric	New functions, used by {import,export}_sec_context.  From Wynn
1475*ca1c9b0cSelric	Wilkes <wynn.wilkes@quest.com>.
1476*ca1c9b0cSelric
1477*ca1c9b0cSelric	* test_sequence.c: Add test for import/export sequence.
1478*ca1c9b0cSelric
1479*ca1c9b0cSelric2006-04-09  Love Hörnquist Åstrand  <lha@it.su.se>
1480*ca1c9b0cSelric
1481*ca1c9b0cSelric	* add_cred.c: Check that cred != GSS_C_NO_CREDENTIAL, this is a
1482*ca1c9b0cSelric	standard conformance failure, but much better then a crash.
1483*ca1c9b0cSelric
1484*ca1c9b0cSelric2006-04-02  Love Hörnquist Åstrand  <lha@it.su.se>
1485*ca1c9b0cSelric
1486*ca1c9b0cSelric	* get_mic.c (get_mic*)_: make sure message_token is cleaned on
1487*ca1c9b0cSelric	error, found by IBM checker.
1488*ca1c9b0cSelric
1489*ca1c9b0cSelric	* wrap.c (wrap*): Reset output_buffer on error, found by IBM
1490*ca1c9b0cSelric	checker.
1491*ca1c9b0cSelric
1492*ca1c9b0cSelric2006-02-15  Love Hörnquist Åstrand  <lha@it.su.se>
1493*ca1c9b0cSelric
1494*ca1c9b0cSelric	* import_name.c: Accept both GSS_C_NT_HOSTBASED_SERVICE and
1495*ca1c9b0cSelric	GSS_C_NT_HOSTBASED_SERVICE_X as nametype for hostbased names.
1496*ca1c9b0cSelric
1497*ca1c9b0cSelric2006-01-16  Love Hörnquist Åstrand  <lha@it.su.se>
1498*ca1c9b0cSelric
1499*ca1c9b0cSelric	* delete_sec_context.c (gss_delete_sec_context): if the context
1500*ca1c9b0cSelric	handle is GSS_C_NO_CONTEXT, don't fall over.
1501*ca1c9b0cSelric
1502*ca1c9b0cSelric2005-12-12  Love Hörnquist Åstrand  <lha@it.su.se>
1503*ca1c9b0cSelric
1504*ca1c9b0cSelric	* gss_acquire_cred.3: Replace gss_krb5_import_ccache with
1505*ca1c9b0cSelric	gss_krb5_import_cred and add more references
1506*ca1c9b0cSelric
1507*ca1c9b0cSelric2005-12-05  Love Hörnquist Åstrand  <lha@it.su.se>
1508*ca1c9b0cSelric
1509*ca1c9b0cSelric	* gssapi.h: Change gss_krb5_import_ccache to gss_krb5_import_cred,
1510*ca1c9b0cSelric	it can handle keytabs too.
1511*ca1c9b0cSelric
1512*ca1c9b0cSelric	* add_cred.c (gss_add_cred): avoid deadlock
1513*ca1c9b0cSelric
1514*ca1c9b0cSelric	* context_time.c (gssapi_lifetime_left): define the 0 lifetime as
1515*ca1c9b0cSelric	GSS_C_INDEFINITE.
1516*ca1c9b0cSelric
1517*ca1c9b0cSelric2005-12-01  Love Hörnquist Åstrand  <lha@it.su.se>
1518*ca1c9b0cSelric
1519*ca1c9b0cSelric	* acquire_cred.c (acquire_acceptor_cred): only check if principal
1520*ca1c9b0cSelric	exists if we got called with principal as an argument.
1521*ca1c9b0cSelric
1522*ca1c9b0cSelric	* acquire_cred.c (acquire_acceptor_cred): check that the acceptor
1523*ca1c9b0cSelric	exists in the keytab before returning ok.
1524*ca1c9b0cSelric
1525*ca1c9b0cSelric2005-11-29  Love Hörnquist Åstrand  <lha@it.su.se>
1526*ca1c9b0cSelric
1527*ca1c9b0cSelric	* copy_ccache.c (gss_krb5_import_cred): fix buglet, from Andrew
1528*ca1c9b0cSelric	Bartlett.
1529*ca1c9b0cSelric
1530*ca1c9b0cSelric2005-11-25  Love Hörnquist Åstrand  <lha@it.su.se>
1531*ca1c9b0cSelric
1532*ca1c9b0cSelric	* test_kcred.c: Rename gss_krb5_import_ccache to
1533*ca1c9b0cSelric	gss_krb5_import_cred.
1534*ca1c9b0cSelric
1535*ca1c9b0cSelric	* copy_ccache.c: Rename gss_krb5_import_ccache to
1536*ca1c9b0cSelric	gss_krb5_import_cred and let it grow code to handle keytabs too.
1537*ca1c9b0cSelric
1538*ca1c9b0cSelric2005-11-02  Love Hörnquist Åstrand  <lha@it.su.se>
1539*ca1c9b0cSelric
1540*ca1c9b0cSelric	* init_sec_context.c: Change sematics of ok-as-delegate to match
1541*ca1c9b0cSelric	windows if
1542*ca1c9b0cSelric	[gssapi]realm/ok-as-delegate=true is set, otherwise keep old
1543*ca1c9b0cSelric	sematics.
1544*ca1c9b0cSelric
1545*ca1c9b0cSelric	* release_cred.c (gss_release_cred): use
1546*ca1c9b0cSelric	GSS_CF_DESTROY_CRED_ON_RELEASE to decide if the cache should be
1547*ca1c9b0cSelric	krb5_cc_destroy-ed
1548*ca1c9b0cSelric
1549*ca1c9b0cSelric	* acquire_cred.c (acquire_initiator_cred):
1550*ca1c9b0cSelric	GSS_CF_DESTROY_CRED_ON_RELEASE on created credentials.
1551*ca1c9b0cSelric
1552*ca1c9b0cSelric	* accept_sec_context.c (gsskrb5_accept_delegated_token): rewrite
1553*ca1c9b0cSelric	to use gss_krb5_import_ccache
1554*ca1c9b0cSelric
1555*ca1c9b0cSelric2005-11-01  Love Hörnquist Åstrand  <lha@it.su.se>
1556*ca1c9b0cSelric
1557*ca1c9b0cSelric	* arcfour.c: Remove signedness warnings.
1558*ca1c9b0cSelric
1559*ca1c9b0cSelric2005-10-31  Love Hörnquist Åstrand  <lha@it.su.se>
1560*ca1c9b0cSelric
1561*ca1c9b0cSelric	* gss_acquire_cred.3: Document that gss_krb5_import_ccache is copy
1562*ca1c9b0cSelric	by reference.
1563*ca1c9b0cSelric
1564*ca1c9b0cSelric	* copy_ccache.c (gss_krb5_import_ccache): Instead of making a copy
1565*ca1c9b0cSelric	of the ccache, make a reference by getting the name and resolving
1566*ca1c9b0cSelric	the name. This way the cache is shared, this flipp side is of
1567*ca1c9b0cSelric	course that if someone calls krb5_cc_destroy the cache is lost for
1568*ca1c9b0cSelric	everyone.
1569*ca1c9b0cSelric
1570*ca1c9b0cSelric	* test_kcred.c: Remove memory leaks.
1571*ca1c9b0cSelric
1572*ca1c9b0cSelric2005-10-26  Love Hörnquist Åstrand  <lha@it.su.se>
1573*ca1c9b0cSelric
1574*ca1c9b0cSelric	* Makefile.am: build test_kcred
1575*ca1c9b0cSelric
1576*ca1c9b0cSelric	* gss_acquire_cred.3: Document gss_krb5_import_ccache
1577*ca1c9b0cSelric
1578*ca1c9b0cSelric	* gssapi.3: Sort and add gss_krb5_import_ccache.
1579*ca1c9b0cSelric
1580*ca1c9b0cSelric	* acquire_cred.c (_gssapi_krb5_ccache_lifetime): break out code
1581*ca1c9b0cSelric	used to extract lifetime from a credential cache
1582*ca1c9b0cSelric
1583*ca1c9b0cSelric	* gssapi_locl.h: Add _gssapi_krb5_ccache_lifetime, used to extract
1584*ca1c9b0cSelric	lifetime from a credential cache.
1585*ca1c9b0cSelric
1586*ca1c9b0cSelric	* gssapi.h: add gss_krb5_import_ccache, reverse of
1587*ca1c9b0cSelric	gss_krb5_copy_ccache
1588*ca1c9b0cSelric
1589*ca1c9b0cSelric	* copy_ccache.c: add gss_krb5_import_ccache, reverse of
1590*ca1c9b0cSelric	gss_krb5_copy_ccache
1591*ca1c9b0cSelric
1592*ca1c9b0cSelric	* test_kcred.c: test gss_krb5_import_ccache
1593*ca1c9b0cSelric
1594*ca1c9b0cSelric2005-10-21  Love Hörnquist Åstrand  <lha@it.su.se>
1595*ca1c9b0cSelric
1596*ca1c9b0cSelric	* acquire_cred.c (acquire_initiator_cred): use krb5_cc_cache_match
1597*ca1c9b0cSelric	to find a matching creditial cache, if that failes, fallback to
1598*ca1c9b0cSelric	the default cache.
1599*ca1c9b0cSelric
1600*ca1c9b0cSelric2005-10-12  Love Hörnquist Åstrand  <lha@it.su.se>
1601*ca1c9b0cSelric
1602*ca1c9b0cSelric	* gssapi_locl.h: Add gssapi_krb5_set_status and
1603*ca1c9b0cSelric	gssapi_krb5_clear_status
1604*ca1c9b0cSelric
1605*ca1c9b0cSelric	* init_sec_context.c (spnego_reply): Don't pass back raw Kerberos
1606*ca1c9b0cSelric	errors, use GSS-API errors instead. From Michael B Allen.
1607*ca1c9b0cSelric
1608*ca1c9b0cSelric	* display_status.c: Add gssapi_krb5_clear_status,
1609*ca1c9b0cSelric	gssapi_krb5_set_status for handling error messages.
1610*ca1c9b0cSelric
1611*ca1c9b0cSelric2005-08-23  Love Hörnquist Åstrand  <lha@it.su.se>
1612*ca1c9b0cSelric
1613*ca1c9b0cSelric	* external.c: Use rk_UNCONST to avoid const warning.
1614*ca1c9b0cSelric
1615*ca1c9b0cSelric	* display_status.c: Constify strings to avoid warnings.
1616*ca1c9b0cSelric
1617*ca1c9b0cSelric2005-08-11 Love Hörnquist Åstrand  <lha@it.su.se>
1618*ca1c9b0cSelric
1619*ca1c9b0cSelric	* init_sec_context.c: avoid warnings, update (c)
1620*ca1c9b0cSelric
1621*ca1c9b0cSelric2005-07-13  Love Hörnquist Åstrand  <lha@it.su.se>
1622*ca1c9b0cSelric
1623*ca1c9b0cSelric	* init_sec_context.c (spnego_initial): use NegotiationToken
1624*ca1c9b0cSelric	encoder now that we have one with the new asn1. compiler.
1625*ca1c9b0cSelric
1626*ca1c9b0cSelric	* Makefile.am: the new asn.1 compiler includes the modules name in
1627*ca1c9b0cSelric	the depend file
1628*ca1c9b0cSelric
1629*ca1c9b0cSelric2005-06-16  Love Hörnquist Åstrand  <lha@it.su.se>
1630*ca1c9b0cSelric
1631*ca1c9b0cSelric	* decapsulate.c: use rk_UNCONST
1632*ca1c9b0cSelric
1633*ca1c9b0cSelric	* ccache_name.c: rename to avoid shadowing
1634*ca1c9b0cSelric
1635*ca1c9b0cSelric	* gssapi_locl.h: give kret in GSSAPI_KRB5_INIT a more unique name
1636*ca1c9b0cSelric
1637*ca1c9b0cSelric	* process_context_token.c: use rk_UNCONST to unconstify
1638*ca1c9b0cSelric
1639*ca1c9b0cSelric	* test_cred.c: rename optind to optidx
1640*ca1c9b0cSelric
1641*ca1c9b0cSelric2005-05-30  Love Hörnquist Åstrand  <lha@it.su.se>
1642*ca1c9b0cSelric
1643*ca1c9b0cSelric	* init_sec_context.c (init_auth): honor ok-as-delegate if local
1644*ca1c9b0cSelric	configuration approves
1645*ca1c9b0cSelric
1646*ca1c9b0cSelric	* gssapi_locl.h: prototype for _gss_check_compat
1647*ca1c9b0cSelric
1648*ca1c9b0cSelric	* compat.c: export check_compat as _gss_check_compat
1649*ca1c9b0cSelric
1650*ca1c9b0cSelric2005-05-29  Love Hörnquist Åstrand  <lha@it.su.se>
1651*ca1c9b0cSelric
1652*ca1c9b0cSelric	* init_sec_context.c: Prefix Der_class with ASN1_C_ to avoid
1653*ca1c9b0cSelric	problems with system headerfiles that pollute the name space.
1654*ca1c9b0cSelric
1655*ca1c9b0cSelric	* accept_sec_context.c: Prefix Der_class with ASN1_C_ to avoid
1656*ca1c9b0cSelric	problems with system headerfiles that pollute the name space.
1657*ca1c9b0cSelric
1658*ca1c9b0cSelric2005-05-17  Love Hörnquist Åstrand  <lha@it.su.se>
1659*ca1c9b0cSelric
1660*ca1c9b0cSelric	* init_sec_context.c (init_auth): set
1661*ca1c9b0cSelric	KRB5_AUTH_CONTEXT_CLEAR_FORWARDED_CRED (for java compatibility),
1662*ca1c9b0cSelric	also while here, use krb5_auth_con_addflags
1663*ca1c9b0cSelric
1664*ca1c9b0cSelric2005-05-06  Love Hörnquist Åstrand  <lha@it.su.se>
1665*ca1c9b0cSelric
1666*ca1c9b0cSelric	* arcfour.c (_gssapi_wrap_arcfour): fix calculating the encap
1667*ca1c9b0cSelric	length. From: Tom Maher <tmaher@eecs.berkeley.edu>
1668*ca1c9b0cSelric
1669*ca1c9b0cSelric2005-05-02  Dave Love  <fx@gnu.org>
1670*ca1c9b0cSelric
1671*ca1c9b0cSelric	* test_cred.c (main): Call setprogname.
1672*ca1c9b0cSelric
1673*ca1c9b0cSelric2005-04-27  Love Hörnquist Åstrand  <lha@it.su.se>
1674*ca1c9b0cSelric
1675*ca1c9b0cSelric	* prefix all sequence symbols with _, they are not part of the
1676*ca1c9b0cSelric	GSS-API api. By comment from Wynn Wilkes <wynnw@vintela.com>
1677*ca1c9b0cSelric
1678*ca1c9b0cSelric2005-04-10  Love Hörnquist Åstrand  <lha@it.su.se>
1679*ca1c9b0cSelric
1680*ca1c9b0cSelric	* accept_sec_context.c: break out the processing of the delegated
1681*ca1c9b0cSelric	credential to a separate function to make error handling easier,
1682*ca1c9b0cSelric	move the credential handling to after other setup is done
1683*ca1c9b0cSelric
1684*ca1c9b0cSelric	* test_sequence.c: make less verbose in case of success
1685*ca1c9b0cSelric
1686*ca1c9b0cSelric	* Makefile.am: add test_sequence to TESTS
1687*ca1c9b0cSelric
1688*ca1c9b0cSelric2005-04-01  Love Hörnquist Åstrand  <lha@it.su.se>
1689*ca1c9b0cSelric
1690*ca1c9b0cSelric	* 8003.c (gssapi_krb5_verify_8003_checksum): check that cksum
1691*ca1c9b0cSelric	isn't NULL From: Nicolas Pouvesle <npouvesle@tenablesecurity.com>
1692*ca1c9b0cSelric
1693*ca1c9b0cSelric2005-03-21  Love Hörnquist Åstrand  <lha@it.su.se>
1694*ca1c9b0cSelric
1695*ca1c9b0cSelric	* Makefile.am: use $(LIB_roken)
1696*ca1c9b0cSelric
1697*ca1c9b0cSelric2005-03-16  Love Hörnquist Åstrand  <lha@it.su.se>
1698*ca1c9b0cSelric
1699*ca1c9b0cSelric	* display_status.c (gssapi_krb5_set_error_string): pass in the
1700*ca1c9b0cSelric	krb5_context to krb5_free_error_string
1701*ca1c9b0cSelric
1702*ca1c9b0cSelric2005-03-15  Love Hörnquist Åstrand  <lha@it.su.se>
1703*ca1c9b0cSelric
1704*ca1c9b0cSelric	* display_status.c (gssapi_krb5_set_error_string): don't misuse
1705*ca1c9b0cSelric	the krb5_get_error_string api
1706*ca1c9b0cSelric
1707*ca1c9b0cSelric2005-03-01  Love Hörnquist Åstrand  <lha@it.su.se>
1708*ca1c9b0cSelric
1709*ca1c9b0cSelric	* compat.c (_gss_DES3_get_mic_compat): don't unlock mutex
1710*ca1c9b0cSelric	here. Bug reported by Stefan Metzmacher <metze@samba.org>
1711*ca1c9b0cSelric
1712*ca1c9b0cSelric2005-02-21  Luke Howard  <lukeh@padl.com>
1713*ca1c9b0cSelric
1714*ca1c9b0cSelric	* init_sec_context.c: don't call krb5_get_credentials() with
1715*ca1c9b0cSelric	  KRB5_TC_MATCH_KEYTYPE, it can lead to the credentials cache
1716*ca1c9b0cSelric	  growing indefinitely as no key is found with KEYTYPE_NULL
1717*ca1c9b0cSelric
1718*ca1c9b0cSelric	* compat.c: remove GSS_C_EXPECTING_MECH_LIST_MIC_FLAG, it is
1719*ca1c9b0cSelric	  no longer used (however the mechListMIC behaviour is broken,
1720*ca1c9b0cSelric	  rfc2478bis support requires the code in the mechglue branch)
1721*ca1c9b0cSelric
1722*ca1c9b0cSelric	* init_sec_context.c: remove GSS_C_EXPECTING_MECH_LIST_MIC_FLAG
1723*ca1c9b0cSelric
1724*ca1c9b0cSelric	* gssapi.h: remove GSS_C_EXPECTING_MECH_LIST_MIC_FLAG
1725*ca1c9b0cSelric
1726*ca1c9b0cSelric2005-01-05  Luke Howard  <lukeh@padl.com>
1727*ca1c9b0cSelric
1728*ca1c9b0cSelric	* 8003.c: use symbolic name for checksum type
1729*ca1c9b0cSelric
1730*ca1c9b0cSelric	* accept_sec_context.c: allow client to indicate
1731*ca1c9b0cSelric	  that subkey should be used
1732*ca1c9b0cSelric
1733*ca1c9b0cSelric	* acquire_cred.c: plug leak
1734*ca1c9b0cSelric
1735*ca1c9b0cSelric	* get_mic.c: use gss_krb5_get_subkey() instead
1736*ca1c9b0cSelric	  of gss_krb5_get_{local,remote}key(), support
1737*ca1c9b0cSelric	  KEYTYPE_ARCFOUR_56
1738*ca1c9b0cSelric
1739*ca1c9b0cSelric	* gssapi_local.c: use gss_krb5_get_subkey(),
1740*ca1c9b0cSelric	  support KEYTYPE_ARCFOUR_56
1741*ca1c9b0cSelric
1742*ca1c9b0cSelric	* import_sec_context.c: plug leak
1743*ca1c9b0cSelric
1744*ca1c9b0cSelric	* unwrap.c: use gss_krb5_get_subkey(),
1745*ca1c9b0cSelric	  support KEYTYPE_ARCFOUR_56
1746*ca1c9b0cSelric
1747*ca1c9b0cSelric	* verify_mic.c: use gss_krb5_get_subkey(),
1748*ca1c9b0cSelric	  support KEYTYPE_ARCFOUR_56
1749*ca1c9b0cSelric
1750*ca1c9b0cSelric	* wrap.c: use gss_krb5_get_subkey(),
1751*ca1c9b0cSelric	  support KEYTYPE_ARCFOUR_56
1752*ca1c9b0cSelric
1753*ca1c9b0cSelric2004-11-30  Love Hörnquist Åstrand  <lha@it.su.se>
1754*ca1c9b0cSelric
1755*ca1c9b0cSelric	* inquire_cred.c: Reverse order of HEIMDAL_MUTEX_unlock and
1756*ca1c9b0cSelric	gss_release_cred to avoid deadlock, from Luke Howard
1757*ca1c9b0cSelric	<lukeh@padl.com>.
1758*ca1c9b0cSelric
1759*ca1c9b0cSelric2004-09-06  Love Hörnquist Åstrand  <lha@it.su.se>
1760*ca1c9b0cSelric
1761*ca1c9b0cSelric	* gss_acquire_cred.3: gss_krb5_extract_authz_data_from_sec_context
1762*ca1c9b0cSelric	was renamed to gsskrb5_extract_authz_data_from_sec_context
1763*ca1c9b0cSelric
1764*ca1c9b0cSelric2004-08-07  Love Hörnquist Åstrand  <lha@it.su.se>
1765*ca1c9b0cSelric
1766*ca1c9b0cSelric	* unwrap.c: mutex buglet, From: Luke Howard <lukeh@PADL.COM>
1767*ca1c9b0cSelric
1768*ca1c9b0cSelric	* arcfour.c: mutex buglet, From: Luke Howard <lukeh@PADL.COM>
1769*ca1c9b0cSelric
1770*ca1c9b0cSelric2004-05-06  Love Hörnquist Åstrand  <lha@it.su.se>
1771*ca1c9b0cSelric
1772*ca1c9b0cSelric	* gssapi.3: spelling from Josef El-Rayes <josef@FreeBSD.org> while
1773*ca1c9b0cSelric	here, write some text about the SPNEGO situation
1774*ca1c9b0cSelric
1775*ca1c9b0cSelric2004-04-08  Love Hörnquist Åstrand  <lha@it.su.se>
1776*ca1c9b0cSelric
1777*ca1c9b0cSelric	* cfx.c: s/CTXAcceptorSubkey/CFXAcceptorSubkey/
1778*ca1c9b0cSelric
1779*ca1c9b0cSelric2004-04-07  Love Hörnquist Åstrand  <lha@it.su.se>
1780*ca1c9b0cSelric
1781*ca1c9b0cSelric	* gssapi.h: add GSS_C_EXPECTING_MECH_LIST_MIC_FLAG From: Luke
1782*ca1c9b0cSelric	Howard <lukeh@padl.com>
1783*ca1c9b0cSelric
1784*ca1c9b0cSelric	* init_sec_context.c (spnego_reply): use
1785*ca1c9b0cSelric	_gss_spnego_require_mechlist_mic to figure out if we need to check
1786*ca1c9b0cSelric	MechListMIC; From: Luke Howard <lukeh@padl.com>
1787*ca1c9b0cSelric
1788*ca1c9b0cSelric	* accept_sec_context.c (send_accept): use
1789*ca1c9b0cSelric	_gss_spnego_require_mechlist_mic to figure out if we need to send
1790*ca1c9b0cSelric	MechListMIC; From: Luke Howard <lukeh@padl.com>
1791*ca1c9b0cSelric
1792*ca1c9b0cSelric	* gssapi_locl.h: add _gss_spnego_require_mechlist_mic
1793*ca1c9b0cSelric	From: Luke Howard <lukeh@padl.com>
1794*ca1c9b0cSelric
1795*ca1c9b0cSelric	* compat.c: add _gss_spnego_require_mechlist_mic for compatibility
1796*ca1c9b0cSelric	with MS SPNEGO, From: Luke Howard <lukeh@padl.com>
1797*ca1c9b0cSelric
1798*ca1c9b0cSelric2004-04-05  Love Hörnquist Åstrand  <lha@it.su.se>
1799*ca1c9b0cSelric
1800*ca1c9b0cSelric	* accept_sec_context.c (gsskrb5_is_cfx): krb5_keyblock->keytype is
1801*ca1c9b0cSelric	an enctype, not keytype
1802*ca1c9b0cSelric
1803*ca1c9b0cSelric	* accept_sec_context.c: use ASN1_MALLOC_ENCODE
1804*ca1c9b0cSelric
1805*ca1c9b0cSelric	* init_sec_context.c: avoid the malloc loop and just allocate the
1806*ca1c9b0cSelric	propper amount of data
1807*ca1c9b0cSelric
1808*ca1c9b0cSelric	* init_sec_context.c (spnego_initial): handle mech_token better
1809*ca1c9b0cSelric
1810*ca1c9b0cSelric2004-03-19  Love Hörnquist Åstrand  <lha@it.su.se>
1811*ca1c9b0cSelric
1812*ca1c9b0cSelric	* gssapi.h: add gss_krb5_get_tkt_flags
1813*ca1c9b0cSelric
1814*ca1c9b0cSelric	* Makefile.am: add ticket_flags.c
1815*ca1c9b0cSelric
1816*ca1c9b0cSelric	* ticket_flags.c: Get ticket-flags from acceptor ticket From: Luke
1817*ca1c9b0cSelric	Howard <lukeh@PADL.COM>
1818*ca1c9b0cSelric
1819*ca1c9b0cSelric	* gss_acquire_cred.3: document gss_krb5_get_tkt_flags
1820*ca1c9b0cSelric
1821*ca1c9b0cSelric2004-03-14  Love Hörnquist Åstrand  <lha@it.su.se>
1822*ca1c9b0cSelric
1823*ca1c9b0cSelric	* acquire_cred.c (gss_acquire_cred): check usage before even
1824*ca1c9b0cSelric	bothering to process it, add both keytab and initial tgt if
1825*ca1c9b0cSelric	requested
1826*ca1c9b0cSelric
1827*ca1c9b0cSelric	* wrap.c: support cfx, try to handle acceptor asserted subkey
1828*ca1c9b0cSelric
1829*ca1c9b0cSelric	* unwrap.c: support cfx, try to handle acceptor asserted subkey
1830*ca1c9b0cSelric
1831*ca1c9b0cSelric	* verify_mic.c: support cfx
1832*ca1c9b0cSelric
1833*ca1c9b0cSelric	* get_mic.c: support cfx
1834*ca1c9b0cSelric
1835*ca1c9b0cSelric	* test_sequence.c: handle changed signature of
1836*ca1c9b0cSelric	gssapi_msg_order_create
1837*ca1c9b0cSelric
1838*ca1c9b0cSelric	* import_sec_context.c: handle acceptor asserted subkey
1839*ca1c9b0cSelric
1840*ca1c9b0cSelric	* init_sec_context.c: handle acceptor asserted subkey
1841*ca1c9b0cSelric
1842*ca1c9b0cSelric	* accept_sec_context.c: handle acceptor asserted subkey
1843*ca1c9b0cSelric
1844*ca1c9b0cSelric	* sequence.c: add dummy use_64 argument to gssapi_msg_order_create
1845*ca1c9b0cSelric
1846*ca1c9b0cSelric	* gssapi_locl.h: add partial support for CFX
1847*ca1c9b0cSelric
1848*ca1c9b0cSelric	* Makefile.am (noinst_PROGRAMS) += test_cred
1849*ca1c9b0cSelric
1850*ca1c9b0cSelric	* test_cred.c: gssapi credential testing
1851*ca1c9b0cSelric
1852*ca1c9b0cSelric	* test_acquire_cred.c: fix comment
1853*ca1c9b0cSelric
1854*ca1c9b0cSelric2004-03-07  Love Hörnquist Åstrand  <lha@it.su.se>
1855*ca1c9b0cSelric
1856*ca1c9b0cSelric	* arcfour.h: drop structures for message formats, no longer used
1857*ca1c9b0cSelric
1858*ca1c9b0cSelric	* arcfour.c: comment describing message formats
1859*ca1c9b0cSelric
1860*ca1c9b0cSelric	* accept_sec_context.c (spnego_accept_sec_context): make sure the
1861*ca1c9b0cSelric	length of the choice element doesn't overrun us
1862*ca1c9b0cSelric
1863*ca1c9b0cSelric	* init_sec_context.c (spnego_reply): make sure the length of the
1864*ca1c9b0cSelric	choice element doesn't overrun us
1865*ca1c9b0cSelric
1866*ca1c9b0cSelric	* spnego.asn1: move NegotiationToken to avoid warning
1867*ca1c9b0cSelric
1868*ca1c9b0cSelric	* spnego.asn1: uncomment NegotiationToken
1869*ca1c9b0cSelric
1870*ca1c9b0cSelric	* Makefile.am: spnego_files += asn1_NegotiationToken.x
1871*ca1c9b0cSelric
1872*ca1c9b0cSelric2004-01-25  Love Hörnquist Åstrand  <lha@it.su.se>
1873*ca1c9b0cSelric
1874*ca1c9b0cSelric	* gssapi.h: add gss_krb5_ccache_name
1875*ca1c9b0cSelric
1876*ca1c9b0cSelric	* Makefile.am (libgssapi_la_SOURCES): += ccache_name.c
1877*ca1c9b0cSelric
1878*ca1c9b0cSelric	* ccache_name.c (gss_krb5_ccache_name): help function enable to
1879*ca1c9b0cSelric	set krb5 name, using out_name argument makes function no longer
1880*ca1c9b0cSelric	thread-safe
1881*ca1c9b0cSelric
1882*ca1c9b0cSelric	* gssapi.3: add missing gss_krb5_ references
1883*ca1c9b0cSelric
1884*ca1c9b0cSelric	* gss_acquire_cred.3: document gss_krb5_ccache_name
1885*ca1c9b0cSelric
1886*ca1c9b0cSelric2003-12-12  Love Hörnquist Åstrand  <lha@it.su.se>
1887*ca1c9b0cSelric
1888*ca1c9b0cSelric	* cfx.c: make rrc a modulus operation if its longer then the
1889*ca1c9b0cSelric	length of the message, noticed by Sam Hartman
1890*ca1c9b0cSelric
1891*ca1c9b0cSelric2003-12-07  Love Hörnquist Åstrand  <lha@it.su.se>
1892*ca1c9b0cSelric
1893*ca1c9b0cSelric	* accept_sec_context.c: use krb5_auth_con_addflags
1894*ca1c9b0cSelric
1895*ca1c9b0cSelric2003-12-05  Love Hörnquist Åstrand  <lha@it.su.se>
1896*ca1c9b0cSelric
1897*ca1c9b0cSelric	* cfx.c: Wrap token id was in wrong order, found by Sam Hartman
1898*ca1c9b0cSelric
1899*ca1c9b0cSelric2003-12-04  Love Hörnquist Åstrand  <lha@it.su.se>
1900*ca1c9b0cSelric
1901*ca1c9b0cSelric	* cfx.c: add AcceptorSubkey (but no code understand it yet) ignore
1902*ca1c9b0cSelric	unknown token flags
1903*ca1c9b0cSelric
1904*ca1c9b0cSelric2003-11-22  Love Hörnquist Åstrand  <lha@it.su.se>
1905*ca1c9b0cSelric
1906*ca1c9b0cSelric	* accept_sec_context.c: Don't require timestamp to be set on
1907*ca1c9b0cSelric	delegated token, its already protected by the outer token (and
1908*ca1c9b0cSelric	windows doesn't alway send it) Pointed out by Zi-Bin Yang
1909*ca1c9b0cSelric	<zbyang@decru.com> on heimdal-discuss
1910*ca1c9b0cSelric
1911*ca1c9b0cSelric2003-11-14  Love Hörnquist Åstrand  <lha@it.su.se>
1912*ca1c9b0cSelric
1913*ca1c9b0cSelric	* cfx.c: fix {} error, pointed out by Liqiang Zhu
1914*ca1c9b0cSelric
1915*ca1c9b0cSelric2003-11-10  Love Hörnquist Åstrand  <lha@it.su.se>
1916*ca1c9b0cSelric
1917*ca1c9b0cSelric	* cfx.c: Sequence number should be stored in bigendian order From:
1918*ca1c9b0cSelric	Luke Howard <lukeh@padl.com>
1919*ca1c9b0cSelric
1920*ca1c9b0cSelric2003-11-09  Love Hörnquist Åstrand  <lha@it.su.se>
1921*ca1c9b0cSelric
1922*ca1c9b0cSelric	* delete_sec_context.c (gss_delete_sec_context): don't free
1923*ca1c9b0cSelric	ticket, krb5_free_ticket does that now
1924*ca1c9b0cSelric
1925*ca1c9b0cSelric2003-11-06  Love Hörnquist Åstrand  <lha@it.su.se>
1926*ca1c9b0cSelric
1927*ca1c9b0cSelric	* cfx.c: checksum the header last in MIC token, update to -03
1928*ca1c9b0cSelric	From: Luke Howard <lukeh@padl.com>
1929*ca1c9b0cSelric
1930*ca1c9b0cSelric2003-10-07  Love Hörnquist Åstrand  <lha@it.su.se>
1931*ca1c9b0cSelric
1932*ca1c9b0cSelric	* add_cred.c: If its a MEMORY cc, make a copy. We need to do this
1933*ca1c9b0cSelric	since now gss_release_cred will destroy the cred. This should be
1934*ca1c9b0cSelric	really be solved a better way.
1935*ca1c9b0cSelric
1936*ca1c9b0cSelric	* acquire_cred.c (gss_release_cred): if its a mcc, destroy it
1937*ca1c9b0cSelric	rather the just release it Found by: "Zi-Bin Yang"
1938*ca1c9b0cSelric	<zbyang@decru.com>
1939*ca1c9b0cSelric
1940*ca1c9b0cSelric	* acquire_cred.c (acquire_initiator_cred): use kret instead of ret
1941*ca1c9b0cSelric	where appropriate
1942*ca1c9b0cSelric
1943*ca1c9b0cSelric2003-09-30  Love Hörnquist Åstrand  <lha@it.su.se>
1944*ca1c9b0cSelric
1945*ca1c9b0cSelric	* gss_acquire_cred.3: spelling
1946*ca1c9b0cSelric	From: jmc <jmc@prioris.mini.pw.edu.pl>
1947*ca1c9b0cSelric
1948*ca1c9b0cSelric2003-09-23  Love Hörnquist Åstrand  <lha@it.su.se>
1949*ca1c9b0cSelric
1950*ca1c9b0cSelric	* cfx.c: - EC and RRC are big-endian, not little-endian - The
1951*ca1c9b0cSelric	default is now to rotate regardless of GSS_C_DCE_STYLE. There are
1952*ca1c9b0cSelric	no longer any references to GSS_C_DCE_STYLE.  - rrc_rotate()
1953*ca1c9b0cSelric	avoids allocating memory on the heap if rrc <= 256
1954*ca1c9b0cSelric	From: Luke Howard <lukeh@padl.com>
1955*ca1c9b0cSelric
1956*ca1c9b0cSelric2003-09-22  Love Hörnquist Åstrand  <lha@it.su.se>
1957*ca1c9b0cSelric
1958*ca1c9b0cSelric	* cfx.[ch]: rrc_rotate() was untested and broken, fix it.
1959*ca1c9b0cSelric	Set and verify wrap Token->Filler.
1960*ca1c9b0cSelric	Correct token ID for wrap tokens,
1961*ca1c9b0cSelric	were accidentally swapped with delete tokens.
1962*ca1c9b0cSelric	From: Luke Howard <lukeh@PADL.COM>
1963*ca1c9b0cSelric
1964*ca1c9b0cSelric2003-09-21  Love Hörnquist Åstrand  <lha@it.su.se>
1965*ca1c9b0cSelric
1966*ca1c9b0cSelric	* cfx.[ch]: no ASN.1-ish header on per-message tokens
1967*ca1c9b0cSelric	From: Luke Howard <lukeh@PADL.COM>
1968*ca1c9b0cSelric
1969*ca1c9b0cSelric2003-09-19  Love Hörnquist Åstrand  <lha@it.su.se>
1970*ca1c9b0cSelric
1971*ca1c9b0cSelric	* arcfour.h: remove depenency on gss_arcfour_mic_token and
1972*ca1c9b0cSelric	gss_arcfour_warp_token
1973*ca1c9b0cSelric
1974*ca1c9b0cSelric	* arcfour.c: remove depenency on gss_arcfour_mic_token and
1975*ca1c9b0cSelric	gss_arcfour_warp_token
1976*ca1c9b0cSelric
1977*ca1c9b0cSelric2003-09-18  Love Hörnquist Åstrand  <lha@it.su.se>
1978*ca1c9b0cSelric
1979*ca1c9b0cSelric	* 8003.c: remove #if 0'ed code
1980*ca1c9b0cSelric
1981*ca1c9b0cSelric2003-09-17  Love Hörnquist Åstrand  <lha@it.su.se>
1982*ca1c9b0cSelric
1983*ca1c9b0cSelric	* accept_sec_context.c (gsskrb5_accept_sec_context): set sequence
1984*ca1c9b0cSelric	number when not requesting mutual auth From: Luke Howard
1985*ca1c9b0cSelric	<lukeh@PADL.COM>
1986*ca1c9b0cSelric
1987*ca1c9b0cSelric	* init_sec_context.c (init_auth): set sequence number when not
1988*ca1c9b0cSelric	requesting mutual auth From: Luke Howard <lukeh@PADL.COM>
1989*ca1c9b0cSelric
1990*ca1c9b0cSelric2003-09-16  Love Hörnquist Åstrand  <lha@it.su.se>
1991*ca1c9b0cSelric
1992*ca1c9b0cSelric	* arcfour.c (*): set minor_status
1993*ca1c9b0cSelric	(gss_wrap): set conf_state to conf_req_flags on success
1994*ca1c9b0cSelric	From: Luke Howard <lukeh@PADL.COM>
1995*ca1c9b0cSelric
1996*ca1c9b0cSelric	* wrap.c (gss_wrap_size_limit): use existing function From: Luke
1997*ca1c9b0cSelric	Howard <lukeh@PADL.COM>
1998*ca1c9b0cSelric
1999*ca1c9b0cSelric2003-09-12  Love Hörnquist Åstrand  <lha@it.su.se>
2000*ca1c9b0cSelric
2001*ca1c9b0cSelric	* indicate_mechs.c (gss_indicate_mechs): in case of error, free
2002*ca1c9b0cSelric	mech_set
2003*ca1c9b0cSelric
2004*ca1c9b0cSelric	* indicate_mechs.c (gss_indicate_mechs): add SPNEGO
2005*ca1c9b0cSelric
2006*ca1c9b0cSelric2003-09-10  Love Hörnquist Åstrand  <lha@it.su.se>
2007*ca1c9b0cSelric
2008*ca1c9b0cSelric	* init_sec_context.c (spnego_initial): catch errors and return
2009*ca1c9b0cSelric	them
2010*ca1c9b0cSelric
2011*ca1c9b0cSelric	* init_sec_context.c (spnego_initial): add #if 0 out version of
2012*ca1c9b0cSelric	the CHOICE branch encoding, also where here, free no longer used
2013*ca1c9b0cSelric	memory
2014*ca1c9b0cSelric
2015*ca1c9b0cSelric2003-09-09  Love Hörnquist Åstrand  <lha@it.su.se>
2016*ca1c9b0cSelric
2017*ca1c9b0cSelric	* gss_acquire_cred.3: support GSS_SPNEGO_MECHANISM
2018*ca1c9b0cSelric
2019*ca1c9b0cSelric	* accept_sec_context.c: SPNEGO doesn't include gss wrapping on
2020*ca1c9b0cSelric	SubsequentContextToken like the Kerberos 5 mech does.
2021*ca1c9b0cSelric
2022*ca1c9b0cSelric	* init_sec_context.c (spnego_reply): SPNEGO doesn't include gss
2023*ca1c9b0cSelric	wrapping on SubsequentContextToken like the Kerberos 5 mech
2024*ca1c9b0cSelric	does. Lets check for it anyway.
2025*ca1c9b0cSelric
2026*ca1c9b0cSelric	* accept_sec_context.c: Add support for SPNEGO on the initator
2027*ca1c9b0cSelric	side.  Implementation initially from Assar Westerlund, passes
2028*ca1c9b0cSelric	though quite a lot of hands before I commited it.
2029*ca1c9b0cSelric
2030*ca1c9b0cSelric	* init_sec_context.c: Add support for SPNEGO on the initator side.
2031*ca1c9b0cSelric	Tested with ldap server on a Windows 2000 DC. Implementation
2032*ca1c9b0cSelric	initially from Assar Westerlund, passes though quite a lot of
2033*ca1c9b0cSelric	hands before I commited it.
2034*ca1c9b0cSelric
2035*ca1c9b0cSelric	* gssapi.h: export GSS_SPNEGO_MECHANISM
2036*ca1c9b0cSelric
2037*ca1c9b0cSelric	* gssapi_locl.h: include spnego_as.h add prototype for
2038*ca1c9b0cSelric	gssapi_krb5_get_mech
2039*ca1c9b0cSelric
2040*ca1c9b0cSelric	* decapsulate.c (gssapi_krb5_get_mech): make non static
2041*ca1c9b0cSelric
2042*ca1c9b0cSelric	* Makefile.am: build SPNEGO file
2043*ca1c9b0cSelric
2044*ca1c9b0cSelric2003-09-08  Love Hörnquist Åstrand  <lha@it.su.se>
2045*ca1c9b0cSelric
2046*ca1c9b0cSelric	* external.c: SPENGO and IAKERB oids
2047*ca1c9b0cSelric
2048*ca1c9b0cSelric	* spnego.asn1: SPENGO ASN1
2049*ca1c9b0cSelric
2050*ca1c9b0cSelric2003-09-05  Love Hörnquist Åstrand  <lha@it.su.se>
2051*ca1c9b0cSelric
2052*ca1c9b0cSelric	* cfx.c: RRC also need to be zero before wraping them
2053*ca1c9b0cSelric	From: Luke Howard <lukeh@PADL.COM>
2054*ca1c9b0cSelric
2055*ca1c9b0cSelric2003-09-04  Love Hörnquist Åstrand  <lha@it.su.se>
2056*ca1c9b0cSelric
2057*ca1c9b0cSelric	* encapsulate.c (gssapi_krb5_encap_length): don't return void
2058*ca1c9b0cSelric
2059*ca1c9b0cSelric2003-09-03  Love Hörnquist Åstrand  <lha@it.su.se>
2060*ca1c9b0cSelric
2061*ca1c9b0cSelric	* verify_mic.c: switch from the des_ to the DES_ api
2062*ca1c9b0cSelric
2063*ca1c9b0cSelric	* get_mic.c: switch from the des_ to the DES_ api
2064*ca1c9b0cSelric
2065*ca1c9b0cSelric	* unwrap.c: switch from the des_ to the DES_ api
2066*ca1c9b0cSelric
2067*ca1c9b0cSelric	* wrap.c: switch from the des_ to the DES_ api
2068*ca1c9b0cSelric
2069*ca1c9b0cSelric	* cfx.c: EC is not included in the checksum since the length might
2070*ca1c9b0cSelric	change depending on the data.  From: Luke Howard <lukeh@PADL.COM>
2071*ca1c9b0cSelric
2072*ca1c9b0cSelric	* acquire_cred.c: use
2073*ca1c9b0cSelric	krb5_get_init_creds_opt_alloc/krb5_get_init_creds_opt_free
2074*ca1c9b0cSelric
2075*ca1c9b0cSelric2003-09-01  Love Hörnquist Åstrand  <lha@it.su.se>
2076*ca1c9b0cSelric
2077*ca1c9b0cSelric	* copy_ccache.c: rename
2078*ca1c9b0cSelric	gss_krb5_extract_authz_data_from_sec_context to
2079*ca1c9b0cSelric	gsskrb5_extract_authz_data_from_sec_context
2080*ca1c9b0cSelric
2081*ca1c9b0cSelric	* gssapi.h: rename gss_krb5_extract_authz_data_from_sec_context to
2082*ca1c9b0cSelric	gsskrb5_extract_authz_data_from_sec_context
2083*ca1c9b0cSelric
2084*ca1c9b0cSelric2003-08-31  Love Hörnquist Åstrand  <lha@it.su.se>
2085*ca1c9b0cSelric
2086*ca1c9b0cSelric	* copy_ccache.c (gss_krb5_extract_authz_data_from_sec_context):
2087*ca1c9b0cSelric	check that we have a ticket before we start to use it
2088*ca1c9b0cSelric
2089*ca1c9b0cSelric	* gss_acquire_cred.3: document
2090*ca1c9b0cSelric	gss_krb5_extract_authz_data_from_sec_context
2091*ca1c9b0cSelric
2092*ca1c9b0cSelric	* gssapi.h (gss_krb5_extract_authz_data_from_sec_context):
2093*ca1c9b0cSelric	return the kerberos authorizationdata, from idea of Luke Howard
2094*ca1c9b0cSelric
2095*ca1c9b0cSelric	* copy_ccache.c (gss_krb5_extract_authz_data_from_sec_context):
2096*ca1c9b0cSelric	return the kerberos authorizationdata, from idea of Luke Howard
2097*ca1c9b0cSelric
2098*ca1c9b0cSelric	* verify_mic.c (gss_verify_mic_internal): switch type and key
2099*ca1c9b0cSelric	argument
2100*ca1c9b0cSelric
2101*ca1c9b0cSelric2003-08-30  Love Hörnquist Åstrand  <lha@it.su.se>
2102*ca1c9b0cSelric
2103*ca1c9b0cSelric	* cfx.[ch]: draft-ietf-krb-wg-gssapi-cfx-01.txt implemetation
2104*ca1c9b0cSelric	From: Luke Howard <lukeh@PADL.COM>
2105*ca1c9b0cSelric
2106*ca1c9b0cSelric2003-08-28  Love Hörnquist Åstrand  <lha@it.su.se>
2107*ca1c9b0cSelric
2108*ca1c9b0cSelric	* arcfour.c (arcfour_mic_cksum): use free_Checksum to free the
2109*ca1c9b0cSelric	checksum
2110*ca1c9b0cSelric
2111*ca1c9b0cSelric	* arcfour.h: swap two last arguments to verify_mic for consistency
2112*ca1c9b0cSelric	with des3
2113*ca1c9b0cSelric
2114*ca1c9b0cSelric	* wrap.c,unwrap.c,get_mic.c,verify_mic.c,cfx.c,cfx.h:
2115*ca1c9b0cSelric	prefix cfx symbols with _gssapi_
2116*ca1c9b0cSelric
2117*ca1c9b0cSelric	* arcfour.c: release the right buffer
2118*ca1c9b0cSelric
2119*ca1c9b0cSelric	* arcfour.c: rename token structure in consistency with rest of
2120*ca1c9b0cSelric	GSS-API From: Luke Howard <lukeh@PADL.COM>
2121*ca1c9b0cSelric
2122*ca1c9b0cSelric	* unwrap.c (unwrap_des3): use _gssapi_verify_pad
2123*ca1c9b0cSelric	(unwrap_des): use _gssapi_verify_pad
2124*ca1c9b0cSelric
2125*ca1c9b0cSelric	* arcfour.c (_gssapi_wrap_arcfour): set the correct padding
2126*ca1c9b0cSelric	(_gssapi_unwrap_arcfour): verify and strip padding
2127*ca1c9b0cSelric
2128*ca1c9b0cSelric	* gssapi_locl.h: added _gssapi_verify_pad
2129*ca1c9b0cSelric
2130*ca1c9b0cSelric	* decapsulate.c (_gssapi_verify_pad): verify padding of a gss
2131*ca1c9b0cSelric	wrapped message and return its length
2132*ca1c9b0cSelric
2133*ca1c9b0cSelric	* arcfour.c: support KEYTYPE_ARCFOUR_56 keys, from Luke Howard
2134*ca1c9b0cSelric	<lukeh@PADL.COM>
2135*ca1c9b0cSelric
2136*ca1c9b0cSelric	* arcfour.c: use right seal alg, inherit keytype from parent key
2137*ca1c9b0cSelric
2138*ca1c9b0cSelric	* arcfour.c: include the confounder in the checksum use the right
2139*ca1c9b0cSelric	key usage number for warped/unwraped tokens
2140*ca1c9b0cSelric
2141*ca1c9b0cSelric	* gssapi.h: add gss_krb5_nt_general_name as an mit compat glue
2142*ca1c9b0cSelric	(same as GSS_KRB5_NT_PRINCIPAL_NAME)
2143*ca1c9b0cSelric
2144*ca1c9b0cSelric	* unwrap.c: hook in arcfour unwrap
2145*ca1c9b0cSelric
2146*ca1c9b0cSelric	* wrap.c: hook in arcfour wrap
2147*ca1c9b0cSelric
2148*ca1c9b0cSelric	* verify_mic.c: hook in arcfour verify_mic
2149*ca1c9b0cSelric
2150*ca1c9b0cSelric	* get_mic.c: hook in arcfour get_mic
2151*ca1c9b0cSelric
2152*ca1c9b0cSelric	* arcfour.c: implement wrap/unwarp
2153*ca1c9b0cSelric
2154*ca1c9b0cSelric	* gssapi_locl.h: add gssapi_{en,de}code_be_om_uint32
2155*ca1c9b0cSelric
2156*ca1c9b0cSelric	* 8003.c: add gssapi_{en,de}code_be_om_uint32
2157*ca1c9b0cSelric
2158*ca1c9b0cSelric2003-08-27  Love Hörnquist Åstrand  <lha@it.su.se>
2159*ca1c9b0cSelric
2160*ca1c9b0cSelric	* arcfour.c (_gssapi_verify_mic_arcfour): Do the checksum on right
2161*ca1c9b0cSelric	area. Swap filler check, it was reversed.
2162*ca1c9b0cSelric
2163*ca1c9b0cSelric	* Makefile.am (libgssapi_la_SOURCES): += arcfour.c
2164*ca1c9b0cSelric
2165*ca1c9b0cSelric	* gssapi_locl.h: include "arcfour.h"
2166*ca1c9b0cSelric
2167*ca1c9b0cSelric	* arcfour.c: arcfour gss-api mech, get_mic/verify_mic working
2168*ca1c9b0cSelric
2169*ca1c9b0cSelric	* arcfour.h: arcfour gss-api mech, get_mic/verify_mic working
2170*ca1c9b0cSelric
2171*ca1c9b0cSelric2003-08-26  Love Hörnquist Åstrand  <lha@it.su.se>
2172*ca1c9b0cSelric
2173*ca1c9b0cSelric	* gssapi_locl.h: always include cfx.h add prototype for
2174*ca1c9b0cSelric	_gssapi_decapsulate
2175*ca1c9b0cSelric
2176*ca1c9b0cSelric	* cfx.[ch]: Implementation of draft-ietf-krb-wg-gssapi-cfx-00.txt
2177*ca1c9b0cSelric	from Luke Howard <lukeh@PADL.COM>
2178*ca1c9b0cSelric
2179*ca1c9b0cSelric	* decapsulate.c: add _gssapi_decapsulate, from Luke Howard
2180*ca1c9b0cSelric	<lukeh@PADL.COM>
2181*ca1c9b0cSelric
2182*ca1c9b0cSelric2003-08-25  Love Hörnquist Åstrand  <lha@it.su.se>
2183*ca1c9b0cSelric
2184*ca1c9b0cSelric	* unwrap.c: encap/decap now takes a oid if the enctype/keytype is
2185*ca1c9b0cSelric	arcfour, return error add hook for cfx
2186*ca1c9b0cSelric
2187*ca1c9b0cSelric	* verify_mic.c: encap/decap now takes a oid if the enctype/keytype
2188*ca1c9b0cSelric	is arcfour, return error add hook for cfx
2189*ca1c9b0cSelric
2190*ca1c9b0cSelric	* get_mic.c: encap/decap now takes a oid if the enctype/keytype is
2191*ca1c9b0cSelric	arcfour, return error add hook for cfx
2192*ca1c9b0cSelric
2193*ca1c9b0cSelric	* accept_sec_context.c: encap/decap now takes a oid
2194*ca1c9b0cSelric
2195*ca1c9b0cSelric	* init_sec_context.c: encap/decap now takes a oid
2196*ca1c9b0cSelric
2197*ca1c9b0cSelric	* gssapi_locl.h: include cfx.h if we need it lifetime is a
2198*ca1c9b0cSelric	OM_uint32, depend on gssapi interface add all new encap/decap
2199*ca1c9b0cSelric	functions
2200*ca1c9b0cSelric
2201*ca1c9b0cSelric	* decapsulate.c: add decap functions that doesn't take the token
2202*ca1c9b0cSelric	type also make all decap function take the oid mech that they
2203*ca1c9b0cSelric	should use
2204*ca1c9b0cSelric
2205*ca1c9b0cSelric	* encapsulate.c: add encap functions that doesn't take the token
2206*ca1c9b0cSelric	type also make all encap function take the oid mech that they
2207*ca1c9b0cSelric	should use
2208*ca1c9b0cSelric
2209*ca1c9b0cSelric	* sequence.c (elem_insert): fix a off by one index counter
2210*ca1c9b0cSelric
2211*ca1c9b0cSelric	* inquire_cred.c (gss_inquire_cred): handle cred_handle being
2212*ca1c9b0cSelric	GSS_C_NO_CREDENTIAL and use the default cred then.
2213*ca1c9b0cSelric
2214*ca1c9b0cSelric2003-08-19  Love Hörnquist Åstrand  <lha@it.su.se>
2215*ca1c9b0cSelric
2216*ca1c9b0cSelric	* gss_acquire_cred.3: break out extensions and document
2217*ca1c9b0cSelric	gsskrb5_register_acceptor_identity
2218*ca1c9b0cSelric
2219*ca1c9b0cSelric2003-08-18  Love Hörnquist Åstrand  <lha@it.su.se>
2220*ca1c9b0cSelric
2221*ca1c9b0cSelric	* test_acquire_cred.c (print_time): time is returned in seconds
2222*ca1c9b0cSelric	from now, not unix time
2223*ca1c9b0cSelric
2224*ca1c9b0cSelric2003-08-17  Love Hörnquist Åstrand  <lha@it.su.se>
2225*ca1c9b0cSelric
2226*ca1c9b0cSelric	* compat.c (check_compat): avoid leaking principal when finding a
2227*ca1c9b0cSelric	match
2228*ca1c9b0cSelric
2229*ca1c9b0cSelric	* address_to_krb5addr.c: sa_size argument to krb5_addr2sockaddr is
2230*ca1c9b0cSelric	a krb5_socklen_t
2231*ca1c9b0cSelric
2232*ca1c9b0cSelric	* acquire_cred.c (gss_acquire_cred): 4th argument to
2233*ca1c9b0cSelric	gss_test_oid_set_member is a int
2234*ca1c9b0cSelric
2235*ca1c9b0cSelric2003-07-22  Love Hörnquist Åstrand  <lha@it.su.se>
2236*ca1c9b0cSelric
2237*ca1c9b0cSelric	* init_sec_context.c (repl_mutual): don't set kerberos error where
2238*ca1c9b0cSelric	there was no kerberos error
2239*ca1c9b0cSelric
2240*ca1c9b0cSelric	* gssapi_locl.h: Add destruction/creation prototypes and structure
2241*ca1c9b0cSelric	for the thread specific storage.
2242*ca1c9b0cSelric
2243*ca1c9b0cSelric	* display_status.c: use thread specific storage to set/get the
2244*ca1c9b0cSelric	kerberos error message
2245*ca1c9b0cSelric
2246*ca1c9b0cSelric	* init.c: Provide locking around the creation of the global
2247*ca1c9b0cSelric	krb5_context. Add destruction/creation functions for the thread
2248*ca1c9b0cSelric	specific storage that the error string handling is using.
2249*ca1c9b0cSelric
2250*ca1c9b0cSelric2003-07-20  Love Hörnquist Åstrand  <lha@it.su.se>
2251*ca1c9b0cSelric
2252*ca1c9b0cSelric	* gss_acquire_cred.3: add missing prototype and missing .Ft
2253*ca1c9b0cSelric	arguments
2254*ca1c9b0cSelric
2255*ca1c9b0cSelric2003-06-17  Love Hörnquist Åstrand  <lha@it.su.se>
2256*ca1c9b0cSelric
2257*ca1c9b0cSelric	* verify_mic.c: reorder code so sequence numbers can can be used
2258*ca1c9b0cSelric
2259*ca1c9b0cSelric	* unwrap.c: reorder code so sequence numbers can can be used
2260*ca1c9b0cSelric
2261*ca1c9b0cSelric	* sequence.c: remove unused function, indent, add
2262*ca1c9b0cSelric	gssapi_msg_order_f that filter gss flags to gss_msg_order flags
2263*ca1c9b0cSelric
2264*ca1c9b0cSelric	* gssapi_locl.h: prototypes for
2265*ca1c9b0cSelric	gssapi_{encode_om_uint32,decode_om_uint32} add sequence number
2266*ca1c9b0cSelric	verifier prototypes
2267*ca1c9b0cSelric
2268*ca1c9b0cSelric	* delete_sec_context.c: destroy sequence number verifier
2269*ca1c9b0cSelric
2270*ca1c9b0cSelric	* init_sec_context.c: remember to free data use sequence number
2271*ca1c9b0cSelric	verifier
2272*ca1c9b0cSelric
2273*ca1c9b0cSelric	* accept_sec_context.c: don't clear output_token twice remember to
2274*ca1c9b0cSelric	free data use sequence number verifier
2275*ca1c9b0cSelric
2276*ca1c9b0cSelric	* 8003.c: export and rename encode_om_uint32/decode_om_uint32 and
2277*ca1c9b0cSelric	start to use them
2278*ca1c9b0cSelric
2279*ca1c9b0cSelric2003-06-09  Johan Danielsson  <joda@pdc.kth.se>
2280*ca1c9b0cSelric
2281*ca1c9b0cSelric	* Makefile.am: can't have sequence.c in two different places
2282*ca1c9b0cSelric
2283*ca1c9b0cSelric2003-06-06  Love Hörnquist Åstrand  <lha@it.su.se>
2284*ca1c9b0cSelric
2285*ca1c9b0cSelric	* test_sequence.c: check rollover, print summery
2286*ca1c9b0cSelric
2287*ca1c9b0cSelric	* wrap.c (sub_wrap_size): gss_wrap_size_limit() has
2288*ca1c9b0cSelric	req_output_size and max_input_size around the wrong way -- it
2289*ca1c9b0cSelric	returns the output token size for a given input size, rather than
2290*ca1c9b0cSelric	the maximum input size for a given output token size.
2291*ca1c9b0cSelric
2292*ca1c9b0cSelric	From: Luke Howard <lukeh@PADL.COM>
2293*ca1c9b0cSelric
2294*ca1c9b0cSelric2003-06-05  Love Hörnquist Åstrand  <lha@it.su.se>
2295*ca1c9b0cSelric
2296*ca1c9b0cSelric	* gssapi_locl.h: add prototypes for sequence.c
2297*ca1c9b0cSelric
2298*ca1c9b0cSelric	* Makefile.am (libgssapi_la_SOURCES): add sequence.c
2299*ca1c9b0cSelric	(test_sequence): build
2300*ca1c9b0cSelric
2301*ca1c9b0cSelric	* sequence.c: sequence number checks, order and replay
2302*ca1c9b0cSelric	* test_sequence.c: sequence number checks, order and replay
2303*ca1c9b0cSelric
2304*ca1c9b0cSelric2003-06-03  Love Hörnquist Åstrand  <lha@it.su.se>
2305*ca1c9b0cSelric
2306*ca1c9b0cSelric	* accept_sec_context.c (gss_accept_sec_context): make sure time is
2307*ca1c9b0cSelric	returned in seconds from now, not in kerberos time
2308*ca1c9b0cSelric
2309*ca1c9b0cSelric	* acquire_cred.c (gss_aquire_cred): make sure time is returned in
2310*ca1c9b0cSelric	seconds from now, not in kerberos time
2311*ca1c9b0cSelric
2312*ca1c9b0cSelric	* init_sec_context.c (init_auth): if the cred is expired before we
2313*ca1c9b0cSelric	tries to create a token, fail so the peer doesn't need reject us
2314*ca1c9b0cSelric	(*): make sure time is returned in seconds from now,
2315*ca1c9b0cSelric	not in kerberos time
2316*ca1c9b0cSelric	(repl_mutual): remember to unlock the context mutex
2317*ca1c9b0cSelric
2318*ca1c9b0cSelric	* context_time.c (gss_context_time): remove unused variable
2319*ca1c9b0cSelric
2320*ca1c9b0cSelric	* verify_mic.c: make sure minor_status is always set, pointed out
2321*ca1c9b0cSelric	by Luke Howard <lukeh@PADL.COM>
2322*ca1c9b0cSelric
2323*ca1c9b0cSelric2003-05-21  Love Hörnquist Åstrand  <lha@it.su.se>
2324*ca1c9b0cSelric
2325*ca1c9b0cSelric	* *.[ch]: do some basic locking (no reference counting so contexts
2326*ca1c9b0cSelric	  can be removed while still used)
2327*ca1c9b0cSelric	- don't export gss_ctx_id_t_desc_struct and gss_cred_id_t_desc_struct
2328*ca1c9b0cSelric	- make sure all lifetime are returned in seconds left until expired,
2329*ca1c9b0cSelric	  not in unix epoch
2330*ca1c9b0cSelric
2331*ca1c9b0cSelric	* gss_acquire_cred.3: document argument lifetime_rec to function
2332*ca1c9b0cSelric	gss_inquire_context
2333*ca1c9b0cSelric
2334*ca1c9b0cSelric2003-05-17  Love Hörnquist Åstrand  <lha@it.su.se>
2335*ca1c9b0cSelric
2336*ca1c9b0cSelric	* test_acquire_cred.c: test gss_add_cred more then once
2337*ca1c9b0cSelric
2338*ca1c9b0cSelric2003-05-06  Love Hörnquist Åstrand  <lha@it.su.se>
2339*ca1c9b0cSelric
2340*ca1c9b0cSelric	* gssapi.h: if __cplusplus, wrap the extern variable (just to be
2341*ca1c9b0cSelric	safe) and functions in extern "C" { }
2342*ca1c9b0cSelric
2343*ca1c9b0cSelric2003-04-30  Love Hörnquist Åstrand  <lha@it.su.se>
2344*ca1c9b0cSelric
2345*ca1c9b0cSelric	* gssapi.3: more about the des3 mic mess
2346*ca1c9b0cSelric
2347*ca1c9b0cSelric	* verify_mic.c (verify_mic_des3): always check if the mic is the
2348*ca1c9b0cSelric	correct mic or the mic that old heimdal would have generated
2349*ca1c9b0cSelric
2350*ca1c9b0cSelric2003-04-28  Jacques Vidrine  <nectar@kth.se>
2351*ca1c9b0cSelric
2352*ca1c9b0cSelric	* verify_mic.c (verify_mic_des3): If MIC verification fails,
2353*ca1c9b0cSelric	retry using the `old' MIC computation (with zero IV).
2354*ca1c9b0cSelric
2355*ca1c9b0cSelric2003-04-26  Love Hörnquist Åstrand  <lha@it.su.se>
2356*ca1c9b0cSelric
2357*ca1c9b0cSelric	* gss_acquire_cred.3: more about difference between comparing IN
2358*ca1c9b0cSelric	and MN
2359*ca1c9b0cSelric
2360*ca1c9b0cSelric	* gss_acquire_cred.3: more about name type and access control
2361*ca1c9b0cSelric
2362*ca1c9b0cSelric2003-04-25  Love Hörnquist Åstrand  <lha@it.su.se>
2363*ca1c9b0cSelric
2364*ca1c9b0cSelric	* gss_acquire_cred.3: document gss_context_time
2365*ca1c9b0cSelric
2366*ca1c9b0cSelric	* context_time.c: if lifetime of context have expired, set
2367*ca1c9b0cSelric	time_rec to 0 and return GSS_S_CONTEXT_EXPIRED
2368*ca1c9b0cSelric
2369*ca1c9b0cSelric	* gssapi.3: document [gssapi]correct_des3_mic
2370*ca1c9b0cSelric	[gssapi]broken_des3_mic
2371*ca1c9b0cSelric
2372*ca1c9b0cSelric	* gss_acquire_cred.3: document gss_krb5_compat_des3_mic
2373*ca1c9b0cSelric
2374*ca1c9b0cSelric	* compat.c (gss_krb5_compat_des3_mic): enable turning on/off des3
2375*ca1c9b0cSelric	mic compat
2376*ca1c9b0cSelric	(_gss_DES3_get_mic_compat): handle [gssapi]correct_des3_mic too
2377*ca1c9b0cSelric
2378*ca1c9b0cSelric	* gssapi.h (gss_krb5_compat_des3_mic): new function, turn on/off
2379*ca1c9b0cSelric	des3 mic compat
2380*ca1c9b0cSelric	(GSS_C_KRB5_COMPAT_DES3_MIC): cpp symbol that exists if
2381*ca1c9b0cSelric	gss_krb5_compat_des3_mic exists
2382*ca1c9b0cSelric
2383*ca1c9b0cSelric2003-04-24  Love Hörnquist Åstrand  <lha@it.su.se>
2384*ca1c9b0cSelric
2385*ca1c9b0cSelric	* Makefile.am:  (libgssapi_la_LDFLAGS): update major
2386*ca1c9b0cSelric	version of gssapi for incompatiblity in 3des getmic support
2387*ca1c9b0cSelric
2388*ca1c9b0cSelric2003-04-23  Love Hörnquist Åstrand  <lha@it.su.se>
2389*ca1c9b0cSelric
2390*ca1c9b0cSelric	* Makefile.am: test_acquire_cred_LDADD: use libgssapi.la not
2391*ca1c9b0cSelric	./libgssapi.la (make make -jN work)
2392*ca1c9b0cSelric
2393*ca1c9b0cSelric2003-04-16  Love Hörnquist Åstrand  <lha@it.su.se>
2394*ca1c9b0cSelric
2395*ca1c9b0cSelric	* gssapi.3: spelling
2396*ca1c9b0cSelric
2397*ca1c9b0cSelric	* gss_acquire_cred.3: Change .Fd #include <header.h> to .In
2398*ca1c9b0cSelric	header.h, from Thomas Klausner <wiz@netbsd.org>
2399*ca1c9b0cSelric
2400*ca1c9b0cSelric
2401*ca1c9b0cSelric2003-04-06  Love Hörnquist Åstrand  <lha@it.su.se>
2402*ca1c9b0cSelric
2403*ca1c9b0cSelric	* gss_acquire_cred.3: spelling
2404*ca1c9b0cSelric
2405*ca1c9b0cSelric	* Makefile.am: remove stuff that sneaked in with last commit
2406*ca1c9b0cSelric
2407*ca1c9b0cSelric	* acquire_cred.c (acquire_initiator_cred): if the requested name
2408*ca1c9b0cSelric	isn't in the ccache, also check keytab.  Extact the krbtgt for the
2409*ca1c9b0cSelric	default realm to check how long the credentials will last.
2410*ca1c9b0cSelric
2411*ca1c9b0cSelric	* add_cred.c (gss_add_cred): don't create a new ccache, just open
2412*ca1c9b0cSelric	the old one; better check if output handle is compatible with new
2413*ca1c9b0cSelric	(copied) handle
2414*ca1c9b0cSelric
2415*ca1c9b0cSelric	* test_acquire_cred.c: test gss_add_cred too
2416*ca1c9b0cSelric
2417*ca1c9b0cSelric2003-04-03  Love Hörnquist Åstrand  <lha@it.su.se>
2418*ca1c9b0cSelric
2419*ca1c9b0cSelric	* Makefile.am: build test_acquire_cred
2420*ca1c9b0cSelric
2421*ca1c9b0cSelric	* test_acquire_cred.c: simple gss_acquire_cred test
2422*ca1c9b0cSelric
2423*ca1c9b0cSelric2003-04-02  Love Hörnquist Åstrand  <lha@it.su.se>
2424*ca1c9b0cSelric
2425*ca1c9b0cSelric	* gss_acquire_cred.3: s/gssapi/GSS-API/
2426*ca1c9b0cSelric
2427*ca1c9b0cSelric2003-03-19  Love Hörnquist Åstrand  <lha@it.su.se>
2428*ca1c9b0cSelric
2429*ca1c9b0cSelric	* gss_acquire_cred.3: document v1 interface (and that they are
2430*ca1c9b0cSelric	obsolete)
2431*ca1c9b0cSelric
2432*ca1c9b0cSelric2003-03-18  Love Hörnquist Åstrand  <lha@it.su.se>
2433*ca1c9b0cSelric
2434*ca1c9b0cSelric	* gss_acquire_cred.3: list supported mechanism and nametypes
2435*ca1c9b0cSelric
2436*ca1c9b0cSelric2003-03-16  Love Hörnquist Åstrand  <lha@it.su.se>
2437*ca1c9b0cSelric
2438*ca1c9b0cSelric	* gss_acquire_cred.3: text about gss_display_name
2439*ca1c9b0cSelric
2440*ca1c9b0cSelric	* Makefile.am (libgssapi_la_LDFLAGS): bump to 3:6:2
2441*ca1c9b0cSelric	(libgssapi_la_SOURCES): add all new functions
2442*ca1c9b0cSelric
2443*ca1c9b0cSelric	* gssapi.3: now that we have a functions, uncomment the missing
2444*ca1c9b0cSelric	ones
2445*ca1c9b0cSelric
2446*ca1c9b0cSelric	* gss_acquire_cred.3: now that we have a functions, uncomment the
2447*ca1c9b0cSelric	missing ones
2448*ca1c9b0cSelric
2449*ca1c9b0cSelric	* process_context_token.c: implement gss_process_context_token
2450*ca1c9b0cSelric
2451*ca1c9b0cSelric	* inquire_names_for_mech.c: implement gss_inquire_names_for_mech
2452*ca1c9b0cSelric
2453*ca1c9b0cSelric	* inquire_mechs_for_name.c: implement gss_inquire_mechs_for_name
2454*ca1c9b0cSelric
2455*ca1c9b0cSelric	* inquire_cred_by_mech.c: implement gss_inquire_cred_by_mech
2456*ca1c9b0cSelric
2457*ca1c9b0cSelric	* add_cred.c: implement gss_add_cred
2458*ca1c9b0cSelric
2459*ca1c9b0cSelric	* acquire_cred.c (gss_acquire_cred): more testing of input
2460*ca1c9b0cSelric	argument, make sure output arguments are ok, since we don't know
2461*ca1c9b0cSelric	the time_rec (for now), set it to time_req
2462*ca1c9b0cSelric
2463*ca1c9b0cSelric	* export_sec_context.c: send lifetime, also set minor_status
2464*ca1c9b0cSelric
2465*ca1c9b0cSelric	* get_mic.c: set minor_status
2466*ca1c9b0cSelric
2467*ca1c9b0cSelric	* import_sec_context.c (gss_import_sec_context): add error
2468*ca1c9b0cSelric	checking, pick up lifetime (if there is no lifetime, use
2469*ca1c9b0cSelric	GSS_C_INDEFINITE)
2470*ca1c9b0cSelric
2471*ca1c9b0cSelric	* init_sec_context.c: take care to set export value to something
2472*ca1c9b0cSelric	sane before we start so caller will have harmless values in them
2473*ca1c9b0cSelric	if then function fails
2474*ca1c9b0cSelric
2475*ca1c9b0cSelric	* release_buffer.c (gss_release_buffer): set minor_status
2476*ca1c9b0cSelric
2477*ca1c9b0cSelric	* wrap.c: make sure minor_status get set
2478*ca1c9b0cSelric
2479*ca1c9b0cSelric	* verify_mic.c (gss_verify_mic_internal): rename verify_mic to
2480*ca1c9b0cSelric	gss_verify_mic_internal and let it take the type as an argument,
2481*ca1c9b0cSelric	(gss_verify_mic): call gss_verify_mic_internal
2482*ca1c9b0cSelric	set minor_status
2483*ca1c9b0cSelric
2484*ca1c9b0cSelric	* unwrap.c: set minor_status
2485*ca1c9b0cSelric
2486*ca1c9b0cSelric	* test_oid_set_member.c (gss_test_oid_set_member): use
2487*ca1c9b0cSelric	gss_oid_equal
2488*ca1c9b0cSelric
2489*ca1c9b0cSelric	* release_oid_set.c (gss_release_oid_set): set minor_status
2490*ca1c9b0cSelric
2491*ca1c9b0cSelric	* release_name.c (gss_release_name): set minor_status
2492*ca1c9b0cSelric
2493*ca1c9b0cSelric	* release_cred.c (gss_release_cred): set minor_status
2494*ca1c9b0cSelric
2495*ca1c9b0cSelric	* add_oid_set_member.c (gss_add_oid_set_member): set minor_status
2496*ca1c9b0cSelric
2497*ca1c9b0cSelric	* compare_name.c (gss_compare_name): set minor_status
2498*ca1c9b0cSelric
2499*ca1c9b0cSelric	* compat.c (check_compat): make sure ret have a defined value
2500*ca1c9b0cSelric
2501*ca1c9b0cSelric	* context_time.c (gss_context_time): set minor_status
2502*ca1c9b0cSelric
2503*ca1c9b0cSelric	* copy_ccache.c (gss_krb5_copy_ccache): set minor_status
2504*ca1c9b0cSelric
2505*ca1c9b0cSelric	* create_emtpy_oid_set.c (gss_create_empty_oid_set): set
2506*ca1c9b0cSelric	minor_status
2507*ca1c9b0cSelric
2508*ca1c9b0cSelric	* delete_sec_context.c (gss_delete_sec_context): set minor_status
2509*ca1c9b0cSelric
2510*ca1c9b0cSelric	* display_name.c (gss_display_name): set minor_status
2511*ca1c9b0cSelric
2512*ca1c9b0cSelric	* display_status.c (gss_display_status): use gss_oid_equal, handle
2513*ca1c9b0cSelric	supplementary errors
2514*ca1c9b0cSelric
2515*ca1c9b0cSelric	* duplicate_name.c (gss_duplicate_name): set minor_status
2516*ca1c9b0cSelric
2517*ca1c9b0cSelric	* inquire_context.c (gss_inquire_context): set lifetime_rec now
2518*ca1c9b0cSelric	when we know it, set minor_status
2519*ca1c9b0cSelric
2520*ca1c9b0cSelric	* inquire_cred.c (gss_inquire_cred): take care to set export value
2521*ca1c9b0cSelric	to something sane before we start so caller will have harmless
2522*ca1c9b0cSelric	values in them if the function fails
2523*ca1c9b0cSelric
2524*ca1c9b0cSelric	* accept_sec_context.c (gss_accept_sec_context): take care to set
2525*ca1c9b0cSelric	export value to something sane before we start so caller will have
2526*ca1c9b0cSelric	harmless values in them if then function fails, set lifetime from
2527*ca1c9b0cSelric	ticket expiration date
2528*ca1c9b0cSelric
2529*ca1c9b0cSelric	* indicate_mechs.c (gss_indicate_mechs): use
2530*ca1c9b0cSelric	gss_create_empty_oid_set and gss_add_oid_set_member
2531*ca1c9b0cSelric
2532*ca1c9b0cSelric	* gssapi.h (gss_ctx_id_t_desc): store the lifetime in the cred,
2533*ca1c9b0cSelric	since there is no ticket transfered in the exported context
2534*ca1c9b0cSelric
2535*ca1c9b0cSelric	* export_name.c (gss_export_name): export name with
2536*ca1c9b0cSelric	GSS_C_NT_EXPORT_NAME wrapping, not just the principal
2537*ca1c9b0cSelric
2538*ca1c9b0cSelric	* import_name.c (import_export_name): new function, parses a
2539*ca1c9b0cSelric	GSS_C_NT_EXPORT_NAME
2540*ca1c9b0cSelric	(import_krb5_name): factor out common code of parsing krb5 name
2541*ca1c9b0cSelric	(gss_oid_equal): rename from oid_equal
2542*ca1c9b0cSelric
2543*ca1c9b0cSelric	* gssapi_locl.h: add prototypes for gss_oid_equal and
2544*ca1c9b0cSelric	gss_verify_mic_internal
2545*ca1c9b0cSelric
2546*ca1c9b0cSelric	* gssapi.h: comment out the argument names
2547*ca1c9b0cSelric
2548*ca1c9b0cSelric2003-03-15  Love Hörnquist Åstrand  <lha@it.su.se>
2549*ca1c9b0cSelric
2550*ca1c9b0cSelric	* gssapi.3: add LIST OF FUNCTIONS and copyright/license
2551*ca1c9b0cSelric
2552*ca1c9b0cSelric	* Makefile.am: s/gss_aquire_cred.3/gss_acquire_cred.3/
2553*ca1c9b0cSelric
2554*ca1c9b0cSelric	* Makefile.am: man_MANS += gss_aquire_cred.3
2555*ca1c9b0cSelric
2556*ca1c9b0cSelric2003-03-14  Love Hörnquist Åstrand  <lha@it.su.se>
2557*ca1c9b0cSelric
2558*ca1c9b0cSelric	* gss_aquire_cred.3: the gssapi api manpage
2559*ca1c9b0cSelric
2560*ca1c9b0cSelric2003-03-03  Love Hörnquist Åstrand  <lha@it.su.se>
2561*ca1c9b0cSelric
2562*ca1c9b0cSelric	* inquire_context.c: (gss_inquire_context): rename argument open
2563*ca1c9b0cSelric	to open_context
2564*ca1c9b0cSelric
2565*ca1c9b0cSelric	* gssapi.h (gss_inquire_context): rename argument open to open_context
2566*ca1c9b0cSelric
2567*ca1c9b0cSelric2003-02-27  Love Hörnquist Åstrand  <lha@it.su.se>
2568*ca1c9b0cSelric
2569*ca1c9b0cSelric	* init_sec_context.c (do_delegation): remove unused variable
2570*ca1c9b0cSelric	subkey
2571*ca1c9b0cSelric
2572*ca1c9b0cSelric	* gssapi.3: all 0.5.x version had broken token delegation
2573*ca1c9b0cSelric
2574*ca1c9b0cSelric2003-02-21  Love Hörnquist Åstrand  <lha@it.su.se>
2575*ca1c9b0cSelric
2576*ca1c9b0cSelric	* (init_auth): only generate one subkey
2577*ca1c9b0cSelric
2578*ca1c9b0cSelric2003-01-27  Love Hörnquist Åstrand  <lha@it.su.se>
2579*ca1c9b0cSelric
2580*ca1c9b0cSelric	* verify_mic.c (verify_mic_des3): fix 3des verify_mic to conform
2581*ca1c9b0cSelric	to rfc (and mit kerberos), provide backward compat hook
2582*ca1c9b0cSelric
2583*ca1c9b0cSelric	* get_mic.c (mic_des3): fix 3des get_mic to conform to rfc (and
2584*ca1c9b0cSelric	mit kerberos), provide backward compat hook
2585*ca1c9b0cSelric
2586*ca1c9b0cSelric	* init_sec_context.c (init_auth): check if we need compat for
2587*ca1c9b0cSelric	older get_mic/verify_mic
2588*ca1c9b0cSelric
2589*ca1c9b0cSelric	* gssapi_locl.h: add prototype for _gss_DES3_get_mic_compat
2590*ca1c9b0cSelric
2591*ca1c9b0cSelric	* gssapi.h (more_flags): add COMPAT_OLD_DES3
2592*ca1c9b0cSelric
2593*ca1c9b0cSelric	* Makefile.am: add gssapi.3 and compat.c
2594*ca1c9b0cSelric
2595*ca1c9b0cSelric	* gssapi.3: add gssapi COMPATIBILITY documentation
2596*ca1c9b0cSelric
2597*ca1c9b0cSelric	* accept_sec_context.c (gss_accept_sec_context): check if we need
2598*ca1c9b0cSelric	compat for older get_mic/verify_mic
2599*ca1c9b0cSelric
2600*ca1c9b0cSelric	* compat.c: check for compatiblity with other heimdal's 3des
2601*ca1c9b0cSelric	get_mic/verify_mic
2602*ca1c9b0cSelric
2603*ca1c9b0cSelric2002-10-31  Johan Danielsson  <joda@pdc.kth.se>
2604*ca1c9b0cSelric
2605*ca1c9b0cSelric	* check return value from gssapi_krb5_init
2606*ca1c9b0cSelric
2607*ca1c9b0cSelric	* 8003.c (gssapi_krb5_verify_8003_checksum): check size of input
2608*ca1c9b0cSelric
2609*ca1c9b0cSelric2002-09-03  Johan Danielsson  <joda@pdc.kth.se>
2610*ca1c9b0cSelric
2611*ca1c9b0cSelric	* wrap.c (wrap_des3): use ETYPE_DES3_CBC_NONE
2612*ca1c9b0cSelric
2613*ca1c9b0cSelric	* unwrap.c (unwrap_des3): use ETYPE_DES3_CBC_NONE
2614*ca1c9b0cSelric
2615*ca1c9b0cSelric2002-09-02  Johan Danielsson  <joda@pdc.kth.se>
2616*ca1c9b0cSelric
2617*ca1c9b0cSelric	* init_sec_context.c: we need to generate a local subkey here
2618*ca1c9b0cSelric
2619*ca1c9b0cSelric2002-08-20  Jacques Vidrine <n@nectar.com>
2620*ca1c9b0cSelric
2621*ca1c9b0cSelric	* acquire_cred.c, inquire_cred.c, release_cred.c: Use default
2622*ca1c9b0cSelric	  credential resolution if gss_acquire_cred is called with
2623*ca1c9b0cSelric	  GSS_C_NO_NAME.
2624*ca1c9b0cSelric
2625*ca1c9b0cSelric2002-06-20  Jacques Vidrine <n@nectar.com>
2626*ca1c9b0cSelric
2627*ca1c9b0cSelric	* import_name.c: Compare name types by value if pointers do
2628*ca1c9b0cSelric	  not match.  Reported by: "Douglas E. Engert" <deengert@anl.gov>
2629*ca1c9b0cSelric
2630*ca1c9b0cSelric2002-05-20  Jacques Vidrine <n@nectar.com>
2631*ca1c9b0cSelric
2632*ca1c9b0cSelric	* verify_mic.c (gss_verify_mic), unwrap.c (gss_unwrap): initialize
2633*ca1c9b0cSelric	  the qop_state parameter.  from Doug Rabson <dfr@nlsystems.com>
2634*ca1c9b0cSelric
2635*ca1c9b0cSelric2002-05-09  Jacques Vidrine <n@nectar.com>
2636*ca1c9b0cSelric
2637*ca1c9b0cSelric	* acquire_cred.c: handle GSS_C_INITIATE/GSS_C_ACCEPT/GSS_C_BOTH
2638*ca1c9b0cSelric
2639*ca1c9b0cSelric2002-05-08  Jacques Vidrine <n@nectar.com>
2640*ca1c9b0cSelric
2641*ca1c9b0cSelric	* acquire_cred.c: initialize gssapi; handle null desired_name
2642*ca1c9b0cSelric
2643*ca1c9b0cSelric2002-03-22  Johan Danielsson  <joda@pdc.kth.se>
2644*ca1c9b0cSelric
2645*ca1c9b0cSelric	* Makefile.am: remove non-functional stuff accidentally committed
2646*ca1c9b0cSelric
2647*ca1c9b0cSelric2002-03-11  Assar Westerlund  <assar@sics.se>
2648*ca1c9b0cSelric
2649*ca1c9b0cSelric	* Makefile.am (libgssapi_la_LDFLAGS): bump version to 3:5:2
2650*ca1c9b0cSelric	* 8003.c (gssapi_krb5_verify_8003_checksum): handle zero channel
2651*ca1c9b0cSelric	bindings
2652*ca1c9b0cSelric
2653*ca1c9b0cSelric2001-10-31  Jacques Vidrine <n@nectar.com>
2654*ca1c9b0cSelric
2655*ca1c9b0cSelric	* get_mic.c (mic_des3): MIC computation using DES3/SHA1
2656*ca1c9b0cSelric	was bogusly appending the message buffer to the result,
2657*ca1c9b0cSelric	overwriting a heap buffer in the process.
2658*ca1c9b0cSelric
2659*ca1c9b0cSelric2001-08-29  Assar Westerlund  <assar@sics.se>
2660*ca1c9b0cSelric
2661*ca1c9b0cSelric	* 8003.c (gssapi_krb5_verify_8003_checksum,
2662*ca1c9b0cSelric	gssapi_krb5_create_8003_checksum): make more consistent by always
2663*ca1c9b0cSelric	returning an gssapi error and setting minor status.  update
2664*ca1c9b0cSelric	callers
2665*ca1c9b0cSelric
2666*ca1c9b0cSelric2001-08-28  Jacques Vidrine  <n@nectar.com>
2667*ca1c9b0cSelric
2668*ca1c9b0cSelric	* accept_sec_context.c: Create a cache for delegated credentials
2669*ca1c9b0cSelric	  when needed.
2670*ca1c9b0cSelric
2671*ca1c9b0cSelric2001-08-28  Assar Westerlund  <assar@sics.se>
2672*ca1c9b0cSelric
2673*ca1c9b0cSelric	* Makefile.am (libgssapi_la_LDFLAGS): set version to 3:4:2
2674*ca1c9b0cSelric
2675*ca1c9b0cSelric2001-08-23  Assar Westerlund  <assar@sics.se>
2676*ca1c9b0cSelric
2677*ca1c9b0cSelric	*  *.c: handle minor_status more consistently
2678*ca1c9b0cSelric
2679*ca1c9b0cSelric	* display_status.c (gss_display_status): handle krb5_get_err_text
2680*ca1c9b0cSelric	failing
2681*ca1c9b0cSelric
2682*ca1c9b0cSelric2001-08-15  Johan Danielsson  <joda@pdc.kth.se>
2683*ca1c9b0cSelric
2684*ca1c9b0cSelric	* gssapi_locl.h: fix prototype for gssapi_krb5_init
2685*ca1c9b0cSelric
2686*ca1c9b0cSelric2001-08-13  Johan Danielsson  <joda@pdc.kth.se>
2687*ca1c9b0cSelric
2688*ca1c9b0cSelric	* accept_sec_context.c (gsskrb5_register_acceptor_identity): init
2689*ca1c9b0cSelric	context and check return value from kt_resolve
2690*ca1c9b0cSelric
2691*ca1c9b0cSelric	* init.c: return error code
2692*ca1c9b0cSelric
2693*ca1c9b0cSelric2001-07-19  Assar Westerlund  <assar@sics.se>
2694*ca1c9b0cSelric
2695*ca1c9b0cSelric	* Makefile.am (libgssapi_la_LDFLAGS): update to 3:3:2
2696*ca1c9b0cSelric
2697*ca1c9b0cSelric2001-07-12  Assar Westerlund  <assar@sics.se>
2698*ca1c9b0cSelric
2699*ca1c9b0cSelric	* Makefile.am (libgssapi_la_LIBADD): add required library
2700*ca1c9b0cSelric	dependencies
2701*ca1c9b0cSelric
2702*ca1c9b0cSelric2001-07-06  Assar Westerlund  <assar@sics.se>
2703*ca1c9b0cSelric
2704*ca1c9b0cSelric	* accept_sec_context.c (gsskrb5_register_acceptor_identity): set
2705*ca1c9b0cSelric	the keytab to be used for gss_acquire_cred too'
2706*ca1c9b0cSelric
2707*ca1c9b0cSelric2001-07-03  Assar Westerlund  <assar@sics.se>
2708*ca1c9b0cSelric
2709*ca1c9b0cSelric	* Makefile.am (libgssapi_la_LDFLAGS): set version to 3:2:2
2710*ca1c9b0cSelric
2711*ca1c9b0cSelric2001-06-18  Assar Westerlund  <assar@sics.se>
2712*ca1c9b0cSelric
2713*ca1c9b0cSelric	* wrap.c: replace gss_krb5_getsomekey with gss_krb5_get_localkey
2714*ca1c9b0cSelric	and gss_krb5_get_remotekey
2715*ca1c9b0cSelric	* verify_mic.c: update krb5_auth_con function names use
2716*ca1c9b0cSelric	gss_krb5_get_remotekey
2717*ca1c9b0cSelric	* unwrap.c: replace gss_krb5_getsomekey with gss_krb5_get_localkey
2718*ca1c9b0cSelric	and gss_krb5_get_remotekey
2719*ca1c9b0cSelric	* gssapi_locl.h (gss_krb5_get_remotekey, gss_krb5_get_localkey):
2720*ca1c9b0cSelric	add prototypes
2721*ca1c9b0cSelric	* get_mic.c: update krb5_auth_con function names. use
2722*ca1c9b0cSelric	gss_krb5_get_localkey
2723*ca1c9b0cSelric	* accept_sec_context.c: update krb5_auth_con function names
2724*ca1c9b0cSelric
2725*ca1c9b0cSelric2001-05-17  Assar Westerlund  <assar@sics.se>
2726*ca1c9b0cSelric
2727*ca1c9b0cSelric	* Makefile.am: bump version to 3:1:2
2728*ca1c9b0cSelric
2729*ca1c9b0cSelric2001-05-14  Assar Westerlund  <assar@sics.se>
2730*ca1c9b0cSelric
2731*ca1c9b0cSelric	* address_to_krb5addr.c: adapt to new address functions
2732*ca1c9b0cSelric
2733*ca1c9b0cSelric2001-05-11  Assar Westerlund  <assar@sics.se>
2734*ca1c9b0cSelric
2735*ca1c9b0cSelric	* try to return the error string from libkrb5 where applicable
2736*ca1c9b0cSelric
2737*ca1c9b0cSelric2001-05-08  Assar Westerlund  <assar@sics.se>
2738*ca1c9b0cSelric
2739*ca1c9b0cSelric	* delete_sec_context.c (gss_delete_sec_context): remember to free
2740*ca1c9b0cSelric	the memory used by the ticket itself. from <tmartin@mirapoint.com>
2741*ca1c9b0cSelric
2742*ca1c9b0cSelric2001-05-04  Assar Westerlund  <assar@sics.se>
2743*ca1c9b0cSelric
2744*ca1c9b0cSelric	* gssapi_locl.h: add config.h for completeness
2745*ca1c9b0cSelric	* gssapi.h: remove config.h, this is an installed header file
2746*ca1c9b0cSelric	sys/types.h is not needed either
2747*ca1c9b0cSelric
2748*ca1c9b0cSelric2001-03-12  Assar Westerlund  <assar@sics.se>
2749*ca1c9b0cSelric
2750*ca1c9b0cSelric	* acquire_cred.c (gss_acquire_cred): remove memory leaks.  from
2751*ca1c9b0cSelric	Jason R Thorpe <thorpej@zembu.com>
2752*ca1c9b0cSelric
2753*ca1c9b0cSelric2001-02-18  Assar Westerlund  <assar@sics.se>
2754*ca1c9b0cSelric
2755*ca1c9b0cSelric	* accept_sec_context.c (gss_accept_sec_context): either return
2756*ca1c9b0cSelric	gss_name NULL-ed or set
2757*ca1c9b0cSelric
2758*ca1c9b0cSelric	* import_name.c: set minor_status in some cases where it was not
2759*ca1c9b0cSelric	done
2760*ca1c9b0cSelric
2761*ca1c9b0cSelric2001-02-15  Assar Westerlund  <assar@sics.se>
2762*ca1c9b0cSelric
2763*ca1c9b0cSelric	* wrap.c: use krb5_generate_random_block for the confounders
2764*ca1c9b0cSelric
2765*ca1c9b0cSelric2001-01-30  Assar Westerlund  <assar@sics.se>
2766*ca1c9b0cSelric
2767*ca1c9b0cSelric	* Makefile.am (libgssapi_la_LDFLAGS): bump version to 3:0:2
2768*ca1c9b0cSelric	* acquire_cred.c, init_sec_context.c, release_cred.c: add support
2769*ca1c9b0cSelric	for getting creds from a keytab, from fvdl@netbsd.org
2770*ca1c9b0cSelric
2771*ca1c9b0cSelric	* copy_ccache.c: add gss_krb5_copy_ccache
2772*ca1c9b0cSelric
2773*ca1c9b0cSelric2001-01-27  Assar Westerlund  <assar@sics.se>
2774*ca1c9b0cSelric
2775*ca1c9b0cSelric	* get_mic.c: cast parameters to des function to non-const pointers
2776*ca1c9b0cSelric 	to handle the case where these functions actually take non-const
2777*ca1c9b0cSelric 	des_cblock *
2778*ca1c9b0cSelric
2779*ca1c9b0cSelric2001-01-09  Assar Westerlund  <assar@sics.se>
2780*ca1c9b0cSelric
2781*ca1c9b0cSelric	* accept_sec_context.c (gss_accept_sec_context): use krb5_rd_cred2
2782*ca1c9b0cSelric	instead of krb5_rd_cred
2783*ca1c9b0cSelric
2784*ca1c9b0cSelric2000-12-11  Assar Westerlund  <assar@sics.se>
2785*ca1c9b0cSelric
2786*ca1c9b0cSelric	* Makefile.am (libgssapi_la_LDFLAGS): bump to 2:3:1
2787*ca1c9b0cSelric
2788*ca1c9b0cSelric2000-12-08  Assar Westerlund  <assar@sics.se>
2789*ca1c9b0cSelric
2790*ca1c9b0cSelric	* wrap.c (wrap_des3): use the checksum as ivec when encrypting the
2791*ca1c9b0cSelric	sequence number
2792*ca1c9b0cSelric	* unwrap.c (unwrap_des3): use the checksum as ivec when encrypting
2793*ca1c9b0cSelric	the sequence number
2794*ca1c9b0cSelric	* init_sec_context.c (init_auth): always zero fwd_data
2795*ca1c9b0cSelric
2796*ca1c9b0cSelric2000-12-06  Johan Danielsson  <joda@pdc.kth.se>
2797*ca1c9b0cSelric
2798*ca1c9b0cSelric	* accept_sec_context.c: de-pointerise auth_context parameter to
2799*ca1c9b0cSelric	krb5_mk_rep
2800*ca1c9b0cSelric
2801*ca1c9b0cSelric2000-11-15  Assar Westerlund  <assar@sics.se>
2802*ca1c9b0cSelric
2803*ca1c9b0cSelric	* init_sec_context.c (init_auth): update to new
2804*ca1c9b0cSelric	krb5_build_authenticator
2805*ca1c9b0cSelric
2806*ca1c9b0cSelric2000-09-19  Assar Westerlund  <assar@sics.se>
2807*ca1c9b0cSelric
2808*ca1c9b0cSelric	* Makefile.am (libgssapi_la_LDFLAGS): bump to 2:2:1
2809*ca1c9b0cSelric
2810*ca1c9b0cSelric2000-08-27  Assar Westerlund  <assar@sics.se>
2811*ca1c9b0cSelric
2812*ca1c9b0cSelric	* init_sec_context.c: actually pay attention to `time_req'
2813*ca1c9b0cSelric	* init_sec_context.c: re-organize.  leak less memory.
2814*ca1c9b0cSelric	* gssapi_locl.h (gssapi_krb5_encapsulate, gss_krb5_getsomekey):
2815*ca1c9b0cSelric	update prototypes add assert.h
2816*ca1c9b0cSelric	* gssapi.h (GSS_KRB5_CONF_C_QOP_DES, GSS_KRB5_CONF_C_QOP_DES3_KD):
2817*ca1c9b0cSelric	add
2818*ca1c9b0cSelric	* verify_mic.c: re-organize and add 3DES code
2819*ca1c9b0cSelric	* wrap.c: re-organize and add 3DES code
2820*ca1c9b0cSelric	* unwrap.c: re-organize and add 3DES code
2821*ca1c9b0cSelric	* get_mic.c: re-organize and add 3DES code
2822*ca1c9b0cSelric	* encapsulate.c (gssapi_krb5_encapsulate): do not free `in_data',
2823*ca1c9b0cSelric	let the caller do that.  fix the callers.
2824*ca1c9b0cSelric
2825*ca1c9b0cSelric2000-08-16  Assar Westerlund  <assar@sics.se>
2826*ca1c9b0cSelric
2827*ca1c9b0cSelric	* Makefile.am: bump version to 2:1:1
2828*ca1c9b0cSelric
2829*ca1c9b0cSelric2000-07-29  Assar Westerlund  <assar@sics.se>
2830*ca1c9b0cSelric
2831*ca1c9b0cSelric	* decapsulate.c (gssapi_krb5_verify_header): sanity-check length
2832*ca1c9b0cSelric
2833*ca1c9b0cSelric2000-07-25  Johan Danielsson  <joda@pdc.kth.se>
2834*ca1c9b0cSelric
2835*ca1c9b0cSelric	* Makefile.am: bump version to 2:0:1
2836*ca1c9b0cSelric
2837*ca1c9b0cSelric2000-07-22  Assar Westerlund  <assar@sics.se>
2838*ca1c9b0cSelric
2839*ca1c9b0cSelric	* gssapi.h: update OID for GSS_C_NT_HOSTBASED_SERVICE and other
2840*ca1c9b0cSelric	details from rfc2744
2841*ca1c9b0cSelric
2842*ca1c9b0cSelric2000-06-29  Assar Westerlund  <assar@sics.se>
2843*ca1c9b0cSelric
2844*ca1c9b0cSelric	* address_to_krb5addr.c (gss_address_to_krb5addr): actually use
2845*ca1c9b0cSelric	`int' instead of `sa_family_t' for the address family.
2846*ca1c9b0cSelric
2847*ca1c9b0cSelric2000-06-21  Assar Westerlund  <assar@sics.se>
2848*ca1c9b0cSelric
2849*ca1c9b0cSelric	* add support for token delegation.  From Daniel Kouril
2850*ca1c9b0cSelric	<kouril@ics.muni.cz> and Miroslav Ruda <ruda@ics.muni.cz>
2851*ca1c9b0cSelric
2852*ca1c9b0cSelric2000-05-15  Assar Westerlund  <assar@sics.se>
2853*ca1c9b0cSelric
2854*ca1c9b0cSelric	* Makefile.am (libgssapi_la_LDFLAGS): set version to 1:1:1
2855*ca1c9b0cSelric
2856*ca1c9b0cSelric2000-04-12  Assar Westerlund  <assar@sics.se>
2857*ca1c9b0cSelric
2858*ca1c9b0cSelric	* release_oid_set.c (gss_release_oid_set): clear set for
2859*ca1c9b0cSelric	robustness.  From GOMBAS Gabor <gombasg@inf.elte.hu>
2860*ca1c9b0cSelric	* release_name.c (gss_release_name): reset input_name for
2861*ca1c9b0cSelric	robustness.  From GOMBAS Gabor <gombasg@inf.elte.hu>
2862*ca1c9b0cSelric	* release_buffer.c (gss_release_buffer): set value to NULL to be
2863*ca1c9b0cSelric	more robust.  From GOMBAS Gabor <gombasg@inf.elte.hu>
2864*ca1c9b0cSelric	* add_oid_set_member.c (gss_add_oid_set_member): actually check if
2865*ca1c9b0cSelric	the oid is a member first.  leave the oid_set unchanged if realloc
2866*ca1c9b0cSelric	fails.
2867*ca1c9b0cSelric
2868*ca1c9b0cSelric2000-02-13  Assar Westerlund  <assar@sics.se>
2869*ca1c9b0cSelric
2870*ca1c9b0cSelric	* Makefile.am: set version to 1:0:1
2871*ca1c9b0cSelric
2872*ca1c9b0cSelric2000-02-12  Assar Westerlund  <assar@sics.se>
2873*ca1c9b0cSelric
2874*ca1c9b0cSelric	* gssapi_locl.h: add flags for import/export
2875*ca1c9b0cSelric	* import_sec_context.c (import_sec_context: add flags for what
2876*ca1c9b0cSelric	fields are included.  do not include the authenticator for now.
2877*ca1c9b0cSelric	* export_sec_context.c (export_sec_context: add flags for what
2878*ca1c9b0cSelric	fields are included.  do not include the authenticator for now.
2879*ca1c9b0cSelric	* accept_sec_context.c (gss_accept_sec_context): set target in
2880*ca1c9b0cSelric	context_handle
2881*ca1c9b0cSelric
2882*ca1c9b0cSelric2000-02-11  Assar Westerlund  <assar@sics.se>
2883*ca1c9b0cSelric
2884*ca1c9b0cSelric	* delete_sec_context.c (gss_delete_sec_context): set context to
2885*ca1c9b0cSelric	GSS_C_NO_CONTEXT
2886*ca1c9b0cSelric
2887*ca1c9b0cSelric	* Makefile.am: add {export,import}_sec_context.c
2888*ca1c9b0cSelric	* export_sec_context.c: new file
2889*ca1c9b0cSelric	* import_sec_context.c: new file
2890*ca1c9b0cSelric	* accept_sec_context.c (gss_accept_sec_context): set trans flag
2891*ca1c9b0cSelric
2892*ca1c9b0cSelric2000-02-07  Assar Westerlund  <assar@sics.se>
2893*ca1c9b0cSelric
2894*ca1c9b0cSelric	* Makefile.am: set version to 0:5:0
2895*ca1c9b0cSelric
2896*ca1c9b0cSelric2000-01-26  Assar Westerlund  <assar@sics.se>
2897*ca1c9b0cSelric
2898*ca1c9b0cSelric	* delete_sec_context.c (gss_delete_sec_context): handle a NULL
2899*ca1c9b0cSelric	output_token
2900*ca1c9b0cSelric
2901*ca1c9b0cSelric	* wrap.c: update to pseudo-standard APIs for md4,md5,sha.  some
2902*ca1c9b0cSelric	changes to libdes calls to make them more portable.
2903*ca1c9b0cSelric	* verify_mic.c: update to pseudo-standard APIs for md4,md5,sha.
2904*ca1c9b0cSelric	some changes to libdes calls to make them more portable.
2905*ca1c9b0cSelric	* unwrap.c: update to pseudo-standard APIs for md4,md5,sha.  some
2906*ca1c9b0cSelric	changes to libdes calls to make them more portable.
2907*ca1c9b0cSelric	* get_mic.c: update to pseudo-standard APIs for md4,md5,sha.  some
2908*ca1c9b0cSelric	changes to libdes calls to make them more portable.
2909*ca1c9b0cSelric	* 8003.c: update to pseudo-standard APIs for md4,md5,sha.
2910*ca1c9b0cSelric
2911*ca1c9b0cSelric2000-01-06  Assar Westerlund  <assar@sics.se>
2912*ca1c9b0cSelric
2913*ca1c9b0cSelric	* Makefile.am: set version to 0:4:0
2914*ca1c9b0cSelric
2915*ca1c9b0cSelric1999-12-26  Assar Westerlund  <assar@sics.se>
2916*ca1c9b0cSelric
2917*ca1c9b0cSelric	* accept_sec_context.c (gss_accept_sec_context): always set
2918*ca1c9b0cSelric 	`output_token'
2919*ca1c9b0cSelric	* init_sec_context.c (init_auth): always initialize `output_token'
2920*ca1c9b0cSelric	* delete_sec_context.c (gss_delete_sec_context): always set
2921*ca1c9b0cSelric 	`output_token'
2922*ca1c9b0cSelric
2923*ca1c9b0cSelric1999-12-06  Assar Westerlund  <assar@sics.se>
2924*ca1c9b0cSelric
2925*ca1c9b0cSelric	* Makefile.am: bump version to 0:3:0
2926*ca1c9b0cSelric
2927*ca1c9b0cSelric1999-10-20  Assar Westerlund  <assar@sics.se>
2928*ca1c9b0cSelric
2929*ca1c9b0cSelric	* Makefile.am: set version to 0:2:0
2930*ca1c9b0cSelric
2931*ca1c9b0cSelric1999-09-21  Assar Westerlund  <assar@sics.se>
2932*ca1c9b0cSelric
2933*ca1c9b0cSelric	* init_sec_context.c (gss_init_sec_context): initialize `ticket'
2934*ca1c9b0cSelric
2935*ca1c9b0cSelric	* gssapi.h (gss_ctx_id_t_desc): add ticket in here.  ick.
2936*ca1c9b0cSelric
2937*ca1c9b0cSelric	* delete_sec_context.c (gss_delete_sec_context): free ticket
2938*ca1c9b0cSelric
2939*ca1c9b0cSelric	* accept_sec_context.c (gss_accept_sec_context): stove away
2940*ca1c9b0cSelric 	`krb5_ticket' in context so that ugly programs such as
2941*ca1c9b0cSelric 	gss_nt_server can get at it.  uck.
2942*ca1c9b0cSelric
2943*ca1c9b0cSelric1999-09-20  Johan Danielsson  <joda@pdc.kth.se>
2944*ca1c9b0cSelric
2945*ca1c9b0cSelric	* accept_sec_context.c: set minor_status
2946*ca1c9b0cSelric
2947*ca1c9b0cSelric1999-08-04  Assar Westerlund  <assar@sics.se>
2948*ca1c9b0cSelric
2949*ca1c9b0cSelric	* display_status.c (calling_error, routine_error): right shift the
2950*ca1c9b0cSelric 	code to make it possible to index into the arrays
2951*ca1c9b0cSelric
2952*ca1c9b0cSelric1999-07-28  Assar Westerlund  <assar@sics.se>
2953*ca1c9b0cSelric
2954*ca1c9b0cSelric	* gssapi.h (GSS_C_AF_INET6): add
2955*ca1c9b0cSelric
2956*ca1c9b0cSelric	* import_name.c (import_hostbased_name): set minor_status
2957*ca1c9b0cSelric
2958*ca1c9b0cSelric1999-07-26  Assar Westerlund  <assar@sics.se>
2959*ca1c9b0cSelric
2960*ca1c9b0cSelric	* Makefile.am: set version to 0:1:0
2961*ca1c9b0cSelric
2962*ca1c9b0cSelricWed Apr  7 14:05:15 1999  Johan Danielsson  <joda@hella.pdc.kth.se>
2963*ca1c9b0cSelric
2964*ca1c9b0cSelric	* display_status.c: set minor_status
2965*ca1c9b0cSelric
2966*ca1c9b0cSelric	* init_sec_context.c: set minor_status
2967*ca1c9b0cSelric
2968*ca1c9b0cSelric	* lib/gssapi/init.c: remove donep (check gssapi_krb5_context
2969*ca1c9b0cSelric 	directly)
2970*ca1c9b0cSelric
2971