Commit Graph

4647 Commits

Author SHA1 Message Date
Love Hornquist Astrand
f2c29f2b1e use ret 0 2010-05-27 12:43:09 -05:00
Love Hornquist Astrand
44fd145d05 always use _krb5_expand_path_tokens 2010-05-27 12:31:23 -05:00
Love Hornquist Astrand
886914f8f9 always use _krb5_expand_path_tokens 2010-05-27 12:25:47 -05:00
Love Hornquist Astrand
f9481967c7 clean up 2010-05-27 12:20:36 -05:00
Love Hornquist Astrand
869b099f00 remove _w32 2010-05-27 11:56:03 -05:00
Love Hornquist Astrand
88c5f75b16 remove _w32 and support unix enviroments too 2010-05-27 11:55:20 -05:00
Love Hornquist Astrand
58022d0721 use _krb5_expand_path_tokens 2010-05-27 11:54:39 -05:00
Love Hornquist Astrand
f97ce2849d remove unused functions 2010-05-27 11:08:51 -05:00
Love Hornquist Astrand
2664543dd5 spelling 2010-05-27 10:41:39 -05:00
Asanka Herath
5c0f3f99c6 Use path tokens when locating plug-in .dlls 2010-05-26 10:38:44 -04:00
Asanka Herath
b9567cb158 Don't attempt to release unallocated resource in fcc_move() 2010-05-26 10:38:43 -04:00
Asanka Herath
b9dc82e09e Fix slashes while expanding path tokens
On Windows, some (external) APIs get confused if we mix both back and
forward slashes.  When expanding path tokens we use back-slashes for
token expansions because they come from the OS.  For consistency, fix
the path so that the remaining path separators are also backslashes.
2010-05-26 10:38:43 -04:00
Asanka Herath
6d132f1d7d Remove spurious slash when expanding path tokens
Path tokens that expand to directories are expected to end in a slash.
2010-05-26 10:38:42 -04:00
Asanka Herath
500603506f Link libkrb5 against DNSAPI.lib on Windows 2010-05-26 10:38:42 -04:00
Asanka Herath
154de6b3a3 krb5_kuserok() only does the local principal test on Windows
Remove the other tests for now.  The file and directory access checks must be
made against the respective DACLs.
2010-05-26 10:38:39 -04:00
Love Hornquist Astrand
aa371571f9 insert _FLAG into the name 2010-03-29 19:08:00 -07:00
Love Hornquist Astrand
cf35620ecf name flag 1 as KRB5_INIT_CREDS_STEP_CONTINUE 2010-03-29 18:55:41 -07:00
Love Hornquist Astrand
4660ec8358 check for underruns 2010-03-21 21:05:21 -07:00
Love Hornquist Astrand
f26d6c2398 (krb5_set_default_in_tkt_etypes): filter out unwanted enctypes
Needed for Samba that tries really hard to use DES encryption types.

Reported by Natanael Copa on heimdal-discuss
2010-03-17 09:30:11 -07:00
Matthias Dieter Wallnöfer
69ea9b38e9 heimdal - fix overlapped identifiers in the "krb5" library
heimdal - fix overlapped identifiers in the "krb5" library

Signed-off-by: Love Hornquist Astrand <lha@h5l.org>
2010-03-16 10:05:35 -07:00
Love Hornquist Astrand
50990d61cf free always "ctx->password" when it isn't needed anymore
Patch originally from Matthias Dieter Wallnöfer, changed by me to keep
clearing the password from memory.
2010-03-16 10:04:20 -07:00
Love Hornquist Astrand
313a2243bb Allow users to specify their own configuration file ~/.krb5/config
Idea from Rune L on heimdal-discuss
2010-03-16 09:09:27 -07:00
Love Hornquist Astrand
ae74dc7316 allow a cross realm ticket returned in the non referrals case 2010-03-07 01:02:02 -08:00
Love Hornquist Astrand
03262460dd use krb5_principal_is_krbtgt 2010-03-07 01:01:32 -08:00
Love Hornquist Astrand
71150bb1bc add krb5_principal_is_krbtgt 2010-03-07 01:00:48 -08:00
Love Hornquist Astrand
711ef346a0 move krb5_set_home_dir_access() group krb5 2010-02-10 18:26:46 -08:00
Love Hornquist Astrand
c9a0c39786 add check for [libdefaults_entries]allow_weak_crypto 2010-02-04 16:13:06 -08:00
Russ Allbery
8a57d5cb08 Add krb5_allow_weak_crypto API to enable weak enctypes
Add krb5_allow_weak_crypto parallel to the API introduced in MIT
Kerberos 1.8.  Enables or disables all enctypes marked as weak.
Add a new enctype flag marking weak enctypes (all of the ones that
are disabled by default).

Signed-off-by: Love Hornquist Astrand <lha@h5l.org>
2010-01-27 21:50:58 -08:00
Love Hornquist Astrand
deee0bbad9 put SOCK_CLOEXEC in the right argument, from Harald Barth 2010-01-25 23:01:09 -08:00
Russ Allbery
4038832098 Export krb5_principal_get_num_comp
krb5_principal_get_num_comp was prototyped as a public function but
not exported from libkrb5.  Add it to the export version map.

Signed-off-by: Love Hornquist Astrand <lha@h5l.org>
2010-01-25 22:39:14 -08:00
Love Hornquist Astrand
1f4bb75eef Only free hx509ctx if its actually allocated 2010-01-12 17:47:54 -08:00
Love Hornquist Astrand
c24a7d2d80 fix const-ifyier on cc-ops 2010-01-08 13:07:27 +01:00
Love Hornquist Astrand
26770c90f3 move unused variable to inside #ifdef 2010-01-08 12:59:35 +01:00
Love Hornquist Astrand
f3ea26c759 remove unused variable 2010-01-08 12:58:20 +01:00
Love Hornquist Astrand
332f988737 make verify checksum ct 2010-01-01 13:09:22 +01:00
Love Hornquist Astrand
8d28c442d5 Merge branch 'master' into win32-port 2009-12-23 14:03:37 +01:00
Asanka Herath
68cfbb7e19 Add rk_cloexec_dir() to lib/roken 2009-12-22 14:03:39 -05:00
Guido Günther
33f3be4d52 Don't free the hx509ctx
otherwise we crash if we fail to init certs (e.g. due to missing
smartcard).

Signed-off-by: Love Hornquist Astrand <lha@h5l.org>
2009-12-22 18:49:39 +01:00
Asanka Herath
ff11a8ae43 Merge remote branch 'lha/master' into win32-port2
* lha/master:
  Clean kadm5-pwcheck.h
  rename closesocket to rk_closesocket
  Log what principal was used in the failure case
2009-12-22 11:05:03 -05:00
Love Hornquist Astrand
4182a61eba rename closesocket to rk_closesocket 2009-12-22 09:03:05 +01:00
Asanka Herath
7f5b105fd6 Fix exports 2009-12-21 18:06:05 -05:00
Asanka Herath
16faee892e Use correct socket glue and try to maintain constness 2009-12-21 18:05:39 -05:00
Asanka Herath
a0ae9f5a0e Merge remote branch 'h-github/master' into win32-port2
* h-github/master: (64 commits)
  refix socket wrappers with rk_
  Patch from Secure Endpoints/Asanka Herath for windows support
  unset KRB5CCNAME
  its really just LIBADD more most of them
  correct quoting
  Use -lpthread for modern freebsd instead
  clean KRB5CCNAME and KRB5_CONFIG, require test to reset them
  more up ${env_setup}
  use PTHREADS_LIBADD for freebsd6 and newer
  add PTHREAD_LIBADD
  add PTHREAD_LIBADD
  add PTHREAD_LIBADD
  switch to PTHREADS_LIBADD
  log what the error string say too
  More debug logging
  sprinkle more 'echo "test failed"'
  sprinkle 'echo "test failed"'
  use calloc(), indent more prettier
  in sh, equal compare is really = for strings, not ==
  Check for duplicates, already loaded mechs
  ...

Conflicts (resolved):
	lib/krb5/auth_context.c
	lib/krb5/changepw.c
	lib/krb5/context.c
	lib/krb5/error_string.c
	lib/krb5/kuserok.c
	lib/krb5/libkrb5-exports.def.in
	lib/krb5/net_write.c
	lib/krb5/store_fd.c
	lib/krb5/test_cc.c
	lib/roken/strerror_r.c
2009-12-21 13:44:00 -05:00
Love Hornquist Astrand
d1d0de730d refix socket wrappers with rk_ 2009-12-21 08:50:46 +01:00
Love Hornquist Astrand
687db64c56 Patch from Secure Endpoints/Asanka Herath for windows support 2009-12-21 08:45:28 +01:00
Love Hornquist Astrand
d9e7f5cd97 add PTHREAD_LIBADD 2009-12-17 09:25:30 +01:00
Love Hornquist Astrand
986aff5a86 (kcm_send_request): if heim_ipc_init_context, we have not kcm 2009-12-14 16:05:10 -08:00
Love Hornquist Astrand
8df64cb195 add krb5_auth_con_getremoteseqnumber 2009-12-13 13:33:41 -08:00
Love Hornquist Astrand
722a54f6ba add missing ; 2009-12-13 13:29:02 -08:00
Love Hornquist Astrand
fff9350227 less dup rk_ 2009-12-13 12:24:47 -08:00