Files
heimdal/ChangeLog
Love Hörnquist Åstrand af73b8f85f x
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@17860 ec53bebd-3082-4978-b11e-865c3cabbd6b
2006-07-20 10:58:02 +00:00

961 lines
29 KiB
Plaintext
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

2006-07-20 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/crypto.c: Remove CMS symmetric encryption support.
2006-07-13 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/pkinit.c (_kdc_pk_check_client): make it not crash when
there are no acl
* kdc/pkinit.c (_kdc_pk_check_client): use the acl in the kerberos
database
* lib/hdb/hdb.asn1: Rename HDB-Ext-PKINIT-certificate to
HDB-Ext-PKINIT-hash. Add trust anchor to HDB-Ext-PKINIT-acl.
* lib/hdb/Makefile.am: rename asn1_HDB_Ext_PKINIT_certificate to
asn1_HDB_Ext_PKINIT_hash
* lib/hdb/ext.c: Add hdb_entry_get_pkinit_hash().
2006-07-10 Love Hörnquist Åstrand <lha@it.su.se>
* kuser/kinit.c: If --password-file gets STDIN, read the password
from the standard input.
* kuser/kinit.1: Document --password-file=STDIN.
* lib/krb5/krb5_string_to_key.3: Remove duplicate to.
2006-07-06 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/krb5tgs.c: (tgs_build_reply): when checking for removed
principals, check the second component of the krbtgt, otherwise
cross realm wont work. Prompted by report from Mattias Amnefelt.
2006-07-05 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/connect.c (handle_vanilla_tcp): use unsigned integer for for
length
(handle_tcp): if the high bit it set in the unknown case, send
back a KRB_ERR_FIELD_TOOLONG
2006-07-03 Love Hörnquist Åstrand <lha@it.su.se>
* appl/gssmask/gssmaestro.c: Add get_version_capa, cache
target_name.
* appl/gssmask/gssmask.c: use utname() to find the local hostname
and version of operatingsystem
* appl/gssmask/common.h: include <sys/utsname.h>
* appl/gssmask/gssmask.c: break out creation of a client and make
handleServer pthread_create compatible
* appl/gssmask/gssmaestro.c: break out out the build context
function
2006-07-01 Love Hörnquist Åstrand <lha@it.su.se>
* appl/gssmask/gssmaestro.c: externalize slave handling, add
GetTargetName glue
* appl/gssmask/gssmaestro.c: externalize principal/password handling
* lib/krb5/principal.c (krb5_parse_name): set *principal to NULL
the first thing we do, so that on failure its set to a known value
* appl/gssmask/gssmask.c: AcquireCreds: set principal to NULL to
avoid memory corruption GetTargetName: always send a string, even
though we don't have a targetname
* appl/gssmask: break out common function; add gssmaestro (that
only tests one context for now)
2006-06-30 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/store_fd.c (krb5_storage_from_fd): don't leak fd on
malloc failure
* appl/gssmask/gssmask.c: split out fetching of credentials for
easier reuse for pk-init testing
* appl/gssmask: maggot replacement, handles context testing
* lib/krb5/cache.c (krb5_cc_new_unique): use KRB5_DEFAULT_CCNAME
as the default prefix
2006-06-28 Love Hörnquist Åstrand <lha@it.su.se>
* doc/heimdal.texi: Add Doug Rabson's license
2006-06-22 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/init_creds.c: Add storing and getting KRB-ERROR in the
krb5_get_init_creds_opt structure.
* lib/krb5/init_creds_pw.c: Save KRB-ERROR on error.
* lib/krb5/krb5_locl.h (_krb5_get_init_creds_opt_private): add
KRB-ERROR
2006-06-21 Love Hörnquist Åstrand <lha@it.su.se>
* doc/setup.texi: section about verify_krb5_conf and kadmin check
2006-06-15 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/init_creds_pw.c (get_init_creds_common): drop cred
argument, its unused
* lib/krb5/Makefile.am: install krb5_get_creds.3
* lib/krb5/krb5_get_creds.3: new file
2006-06-14 Love Hörnquist Åstrand <lha@it.su.se>
* lib/hdb/hdb-ldap.c: don't use the sambaNTPassword if there is
ARCFOUR key already. Idea from Andreas Hasenack. While here, set
pw change time using sambaPwdLastSet
* kdc/kerberos4.c: Use enable_v4_per_principal and check the new
hdb flag.
* kdc/kdc.h: Add enable_v4_per_principal
2006-06-12 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/kerberos5.c (_kdc_as_rep): if kdc_time +
config->kdc_warn_pwexpire is past pw_end, add expiration
message. From Bernard Antoine.
* kdc/default_config.c (krb5_kdc_default_config): set
kdc_warn_pwexpire to 0
* kdc/kerberos5.c: indent.
2006-06-07 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/kerberos5.c: constify
2006-06-06 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/get_cred.c: Allow setting additional tickets in the
tgs-req
* kuser/kgetcred.c: add --delegation-credential-cache
* kdc/krb5tgs.c (tgs_build_reply): add constrained delegation.
* kdc/krb5tgs.c: Add impersonation.
* kuser/kgetcred.c: use new krb5_get_creds interface, add
impersonation.
* lib/krb5/get_cred.c (krb5_get_creds): add
KRB5_GC_NO_TRANSIT_CHECK
* lib/krb5/misc.c: Add impersonate support functions.
* lib/krb5/get_cred.c: Add impersonate and new krb5_get_creds interface.
* lib/hdb/hdb.asn1 (HDBFlags): add trusted-for-delegation
* lib/krb5/krb5.h: Add krb5_get_creds_opt_data and some more
KRB5_GC flags.
2006-06-01 Love Hörnquist Åstrand <lha@it.su.se>
* lib/hdb/ext.c (hdb_entry_get_ConstrainedDelegACL): new function.
* lib/krb5/pkinit.c: Avoid more shadowing.
* kdc/connect.c (do_request): clean reply with krb5_data_zero
* kdc/krb5tgs.c: Split up the reverse cross krbtgt check and local
clien must exists test.
* kdc/krb5tgs.c: Plug old memory leaks, unify all goto's.
* kdc/krb5tgs.c: Split tgs_rep2 into tgs_parse_request and
tgs_build_reply.
* kdc/kerberos5.c: split out krb5 tgs req to make it easier to
reorganize the code.
2006-05-29 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/krb5_get_init_creds.3: spelling Björn Sandell
* lib/krb5/krb5_get_in_cred.3: spelling Björn Sandell
2006-05-13 Love Hörnquist Åstrand <lha@it.su.se>
* kpasswd/kpasswdd.c (change): select the realm based on the
target principal From Gabor Gombas
* lib/krb5/krb5_get_init_creds.3: Add KRB5_PROMPT_TYPE_INFO
* lib/krb5/krb5.h: Add KRB5_PROMPT_TYPE_INFO
2006-05-12 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/pkinit.c: Hidden field of hx509 prompter is removed.
Fix a warning.
* doc/setup.texi: Point to more examples, hint that you have to
use openssl 0.9.8a or later.
* doc/setup.texi: DIR now handles both PEM and DER.
* kuser/kinit.c: Pass down prompter and password to
krb5_get_init_creds_opt_set_pkinit.
* lib/krb5/pkinit.c (_krb5_pk_load_id): only use password if its
longer then 0
* doc/ack.texi: Add Jason McIntyre.
* lib/krb5/krb5_acl_match_file.3: Various tweaks, from Jason
McIntyre.
2006-05-11 Love Hörnquist Åstrand <lha@it.su.se>
* kuser/kinit.c: Move parsing of the PK-INIT configuration file to
the library so application doesn't need to deal with it.
* lib/krb5/pkinit.c (krb5_get_init_creds_opt_set_pkinit): move
parsing of the configuration file to the library so application
doesn't need to deal with it.
* lib/krb5/pkinit.c (_krb5_pk_load_id): pass the hx509_lock to
when trying to read the user certificate.
* lib/krb5/pkinit.c (hx_pass_prompter): return 0 on success and 1
on failure. Pointed out by Douglas E. Engert.
2006-05-08 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/crypto.c: Catches both keyed checkout w/o crypto
context cases and doesn't reset the string, and corrects the
grammar.
* lib/krb5/crypto.c: Drop aes-cbc, rc2 and CMS padding support,
its all containted in libhcrypto and libhx509 now.
2006-05-07 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/pkinit.c (_krb5_pk_verify_sign): Use
hx509_get_one_cert.
* lib/krb5/crypto.c (create_checksum): provide a error message
that a key checksum needs a key. From Andew Bartlett.
2006-05-06 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/pkinit.c: Now that hcrypto supports DH, remove check
for hx509 null DH.
* kdc/pkinit.c: Don't call DH_check_pubkey, it doesn't exists in
older OpenSSL.
* doc/heimdal.texi: Add blob about imath.
* doc/ack.texi: Add blob about imath.
* include/make_crypto.c: Move up evp.h to please OpenSSL, from
Douglas E. Engert.
* kcm/acl.c: Multicache kcm interation isn't done yet, let wait
with this enum.
2006-05-05 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/krb5_set_default_realm.3: Spelling/mdoc from Björn
Sandell
* lib/krb5/krb5_rcache.3: Spelling/mdoc from Björn Sandell
* lib/krb5/krb5_keytab.3: Spelling/mdoc from Björn Sandell
* lib/krb5/krb5_get_in_cred.3: Spelling/mdoc from Björn Sandell
* lib/krb5/krb5_expand_hostname.3: Spelling/mdoc from Björn
Sandell
* lib/krb5/krb5_c_make_checksum.3: Spelling/mdoc from Björn
Sandell
* lib/krb5/keytab_file.c (fkt_next_entry_int): read the 32 bit
kvno if the reset of the data is longer then 4 bytes in hope to be
forward compatible. Pointed out by Michael B Allen.
* doc/programming.texi: Add fileformats.
* appl/test: Rename u_intXX_t to uintXX_t
* kuser: Rename u_intXX_t to uintXX_t
* kdc: Rename u_intXX_t to uintXX_t
* lib/hdb: Rename u_intXX_t to uintXX_t
* lib/45]: Rename u_intXX_t to uintXX_t
* lib/krb5: Rename u_intXX_t to uintXX_t
* lib/krb5/Makefile.am: Add test_store to TESTS
* lib/krb5/pkinit.c: Catch using hx509 null DH and print a more
useful error message.
* lib/krb5/store.c: Rewrite the krb5_ret_u as proposed by Johan.
2006-05-04 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/kerberos4.c: Use the new unsigned integer storage types.
* kdc/kaserver.c: Use the new unsigned integer storage
types. Sprinkle some error handling.
* lib/krb5/krb5_storage.3: Document ret and store function for the
unsigned fixed size integer types.
* lib/krb5/v4_glue.c: Use the new unsigned integer storage
types. Fail that the address doesn't match, not the reverse.
* lib/krb5/store.c: Add ret and store function for the unsigned
fixed size integer types.
* lib/krb5/test_store.c: Test the integer storage types.
2006-05-03 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/store.c (krb5_store_principal): make it take a
krb5_const_principal, indent
* lib/krb5/krb5_storage.3: krb5_store_principal takes a
krb5_const_principal
* lib/krb5/pkinit.c: Deal with that hx509_prompt.reply is no
longer a pointer.
* kdc/kdc.h (krb5_kdc_configuration): add pkinit_kdc_ocsp_file
* kdc/config.c: read [kdc]pki-kdc-ocsp
2006-05-02 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/pkinit.c (_kdc_pk_mk_pa_reply): send back ocsp response if
it seems to be valid, simplfy the pkinit-windows DH case (it
doesn't exists).
2006-05-01 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/krb5_warn.3: Spelling/mdoc changes, from Björn Sandell.
* lib/krb5/krb5_verify_user.3: Spelling/mdoc changes, from Björn
Sandell.
* lib/krb5/krb5_verify_init_creds.3: Spelling/mdoc changes, from
Björn Sandell.
* lib/krb5/krb5_timeofday.3: Spelling/mdoc changes, from Björn
Sandell.
* lib/krb5/krb5_ticket.3: Spelling/mdoc changes, from Björn
Sandell.
* lib/krb5/krb5_rd_safe.3: Spelling/mdoc changes, from Björn
Sandell.
* lib/krb5/krb5_rcache.3: Spelling/mdoc changes, from Björn
Sandell.
* lib/krb5/krb5_principal.3: Spelling/mdoc changes, from Björn
Sandell.
* lib/krb5/krb5_parse_name.3: Spelling/mdoc changes, from Björn
Sandell.
* lib/krb5/krb5_mk_safe.3: Spelling/mdoc changes, from Björn
Sandell.
* lib/krb5/krb5_keyblock.3: Spelling/mdoc changes, from Björn
Sandell.
* lib/krb5/krb5_is_thread_safe.3: Spelling/mdoc changes, from
Björn Sandell.
* lib/krb5/krb5_generate_random_block.3: Spelling/mdoc changes,
from Björn Sandell.
* lib/krb5/krb5_generate_random_block.3: Spelling/mdoc changes,
from Björn Sandell.
* lib/krb5/krb5_expand_hostname.3: Spelling/mdoc changes, from
Björn Sandell.
* lib/krb5/krb5_check_transited.3: Spelling/mdoc changes, from
Björn Sandell.
* lib/krb5/krb5_c_make_checksum.3: Spelling/mdoc changes, from
Björn Sandell.
* lib/krb5/krb5_address.3: Spelling/mdoc changes, from
Björn Sandell.
* lib/krb5/krb5_acl_match_file.3: Spelling/mdoc changes, from
Björn Sandell.
* lib/krb5/krb5.3: Spelling, from Björn Sandell.
* doc/ack.texi: add Björn
2006-04-30 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/pkinit.c (cert2epi): don't include subject if its null
2006-04-29 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/pkinit.c: Send over what trust anchors the client have
configured.
* lib/krb5/pkinit.c (pk_verify_host): set better error string,
only check kdc name/address when we got a hostname/address passed
in the the function.
* kdc/pkinit.c (_kdc_pk_check_client): reorganize and make log
when a SAN matches.
2006-04-28 Love Hörnquist Åstrand <lha@it.su.se>
* doc/setup.texi: More options and some text about windows
clients, certificate and KDCs.
* doc/setup.texi: notice about pki-mappings file space sensitive
* doc/setup.texi: Example pki-mapping file.
* lib/krb5/pkinit.c (pk_verify_host): verify hostname/address
* lib/hdb/hdb.h: Bump hdb interface version to 4.
2006-04-27 Love Hörnquist Åstrand <lha@it.su.se>
* kuser/kdestroy.1: Document --credential=principal.
* kdc/kerberos5.c (tgs_rep2): check that the client exists in the
kerberos database if its local request.
* kdc/{misc.c,524.c,kaserver.c,kerberos5.c}: pass down HDB_F_GET_
flags as appropriate
* kdc/kerberos4.c (_kdc_db_fetch4): pass down flags though
krb5_425_conv_principal_ext2
* kdc/misc.c (_kdc_db_fetch): Break out the that we request from
principal from the entry and pass it in as a seprate argument.
* lib/hdb/keytab.c (hdb_get_entry): Break out the that we request
from principal from the entry and pass it in as a seprate
argument.
* lib/hdb/common.c: Break out the that we request from principal
from the entry and pass it in as a seprate argument.
* lib/hdb/hdb.h: Break out the that we request from principal from
the entry and pass it in as a seprate argument. Add more flags to
->hdb_get(). Re-indent.
2006-04-26 Love Hörnquist Åstrand <lha@it.su.se>
* doc/setup.texi: document pki-allow-proxy-certificate
* kdc/pkinit.c: Add option [kdc]pki-allow-proxy-certificate=bool
to allow using proxy certificate.
* lib/krb5/pkinit.c (_krb5_pk_allow_proxy_certificates): expose
hx509_verify_set_proxy_certificate
* kdc/pkinit.c (_kdc_pk_check_client): Use
hx509_cert_get_base_subject to get subject name of the
certificate, needed for proxy certificates.
* kdc/kerberos5.c: Now that find_keys speaks for it self, remove
extra logging.
* kdc/kerberos5.c (find_keys): add client_name and server_name
argument and use them, and adapt callers.
2006-04-25 Love Hörnquist Åstrand <lha@it.su.se>
* kuser/kinit.1: document option password-file
* kuser/kinit.c: Add option password-file, read password from the
first line of a file.
* configure.in: make tests/kdc/Makefile
* kdc/kerberos5.c: Catch the case where the client sends no
encryption types or no pa-types.
* lib/hdb/ext.c (hdb_replace_extension): set error message on
failure, not success.
* lib/hdb/keys.c (parse_key_set): handle error case better
(hdb_generate_key_set): return better error
2006-04-24 Love Hörnquist Åstrand <lha@it.su.se>
* lib/hdb/hdb.c (hdb_create): print out what we don't support
* lib/krb5/principal.c: Remove a double free introduced in 1.93
* lib/krb5/log.c (log_file): reset pointer to freed memory
* lib/krb5/keytab_keyfile.c (get_cell_and_realm): reset d->cell to
make sure its not refereced
* tools/krb5-config.in: libhcrypto might depend on libasn1, switch
order
* lib/krb5/recvauth.c: indent
* doc/heimdal.texi: Add Setting up PK-INIT to Detailed Node
Listing.
* lib/krb5/pkinit.c: Pass down realm to pk_verify_host so the
function can verify the certificate is from the right realm.
* lib/krb5/init_creds_pw.c: Pass down realm to
_krb5_pk_rd_pa_reply
2006-04-23 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/pkinit.c (pk_verify_host): Add begining of finding
subjectAltName_otherName pk-init-san and verifing it.
* lib/krb5/sendauth.c: reindent
* doc/Makefile.am: use --no-split to make one large file, mostly
for html
* doc/setup.texi: "document" pkinit_require_eku and
pkinit_require_krbtgt_otherName
* lib/krb5/pkinit.c: Add pkinit_require_eku and
pkinit_require_krbtgt_otherName
* doc/setup.texi: Add text about pk-init
* tools/kdc-log-analyze.pl: count v5 cross realms too
2006-04-22 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/pkinit.c: Adapt to change in hx509_cms_create_signed_1.
* lib/krb5/pkinit.c: Adapt to change in hx509_cms_create_signed_1.
2006-04-20 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/pkinit.c (_kdc_pk_rd_padata): use
hx509_cms_unwrap_ContentInfo.
* kdc/config.c: unbreak
* lib/krb5/pkinit.c: Handle diffrences between libhcrypto and
libcrypto.
* kdc/config.c: Rename pki-chain to pki-pool to match rest of
code.
2006-04-12 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/rd_priv.c: Fix argument to krb5_data_zero.
* kdc/config.c: Added certificate revoke information from
configuration file.
* kdc/pkinit.c: Added certificate revoke information.
* kuser/kinit.c: Added certificate revoke information from
configuration file.
* lib/krb5/pkinit.c (_krb5_pk_load_id): Added certificate revoke
information, ie CRL's
2006-04-10 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/replay.c (krb5_rc_resolve_full): make compile again.
* lib/krb5/keytab_krb4.c (krb4_kt_start_seq_get_int): make compile
again.
* lib/krb5/transited.c (make_path): make sure we return allocated
memory Coverity, NetBSD CID#1892
* lib/krb5/transited.c (make_path): make sure we return allocated
memory Coverity, NetBSD CID#1892
* lib/krb5/rd_req.c (krb5_verify_authenticator_checksum): on
protocol failure, avoid leaking memory Coverity, NetBSD CID#1900
* lib/krb5/principal.c (krb5_parse_name): remember to free realm
in case of error Coverity, NetBSD CID#1883
* lib/krb5/principal.c (krb5_425_conv_principal_ext2): remove
memory leak in case of weird formated dns replys.
Coverity, NetBSD CID#1885
* lib/krb5/replay.c (krb5_rc_resolve_full): don't return pointer
to a allocated krb5_rcache in case of error.
* lib/krb5/log.c (krb5_addlog_dest): free fn in case of error
Coverity, NetBSD CID#1882
* lib/krb5/keytab_krb4.c: Fix deref before NULL check, fix error
handling. Coverity, NetBSD CID#2369
* lib/krb5/get_for_creds.c (krb5_get_forwarded_creds):
in_creds->client should always be set, assume so.
* lib/krb5/keytab_any.c (any_next_entry): restructure to make it
easier to read Fixes Coverity, NetBSD CID#625
* lib/krb5/crypto.c (krb5_string_to_key_derived): deref after NULL
check. Coverity NetBSD CID#2367
* lib/krb5/build_auth.c (krb5_build_authenticator): use
calloc. removed check that was never really used. Coverity NetBSD
CID#2370
2006-04-09 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/rd_req.c (krb5_verify_ap_req2): make sure `ticket´
points to NULL in case of error, add error handling, use calloc.
* kpasswd/kpasswdd.c (doit): when done, close all fd in the
sockets array and free it. Coverity NetBSD CID#1916
2006-04-08 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/store.c (krb5_ret_principal): fix memory leak Coverity,
NetBSD CID#1695
* kdc/524.c (_kdc_do_524): Handle memory allocation failure
Coverity, NetBSD CID#2752
2006-04-07 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/keytab_file.c (krb5_kt_ret_principal): plug a memory
leak Coverity NetBSD CID#1890
* kdc/hprop.c (main): make sure type doesn't need to be set
* kdc/mit_dump.c (mit_prop_dump): close fd when done processing
Coverity NetBSD CID#1955
* kdc/string2key.c (tokey): catch warnings, free memory after use.
Based on Coverity NetBSD CID#1894
* kdc/hprop.c (main): remove dead code. Coverity NetBSD CID#633
2006-04-04 Love Hörnquist Åstrand <lha@it.su.se>
* kpasswd/kpasswd-generator.c (read_words): catch empty file case,
will cause PBE (division by zero) later. From Tobias Stoeckmann.
2006-04-02 Love Hörnquist Åstrand <lha@it.su.se>
* lib/hdb/keytab.c: Remove a delta from last revision that should
have gone in later.
* lib/krb5/krbhst.c: fix spelling
* lib/krb5/send_to_kdc.c (send_and_recv_http): don't expose freed
pointer, found by IBM checker.
* lib/krb5/rd_cred.c (krb5_rd_cred): don't expose freed pointer,
found by IBM checker.
* lib/krb5/addr_families.c (krb5_make_addrport): clear return
value on error, found by IBM checker.
* kdc/kerberos5.c (check_addresses): treat netbios as no addresses
* kdc/{kerberos4,kaserver}.c: _kdc_check_flags takes hdb_entry_ex
* kdc/kerberos5.c (_kdc_check_flags): make it take hdb_entry_ex to
avoid ?:'s at callers
* lib/krb5/v4_glue.c: Avoid using free memory, found by IBM
checker.
* lib/krb5/transited.c (expand_realm): avoid passing NULL to
strlen, found by IBM checker.
* lib/krb5/rd_cred.c (krb5_rd_cred): avoid a memory leak on malloc
failure, found by IBM checker.
* lib/krb5/krbhst.c (_krb5_krbhost_info_move): replace a strcpy
with a memcpy
* lib/krb5/keytab_keyfile.c (get_cell_and_realm): plug a memory
leak, found by IBM checker.
* lib/krb5/keytab_file.c (fkt_next_entry_int): remove a
dereferencing NULL pointer, found by IBM checker.
* lib/krb5/init_creds_pw.c (init_creds_init_as_req): in AS-REQ the
cname must always be given, don't avoid that fact and remove a
cname == NULL case. Plugs a memory leak found by IBM checker.
* lib/krb5/init_creds_pw.c (default_s2k_func): avoid exposing
free-ed memory on error. Found by IBM checker.
* lib/krb5/init_creds.c (_krb5_get_init_creds_opt_copy): use
calloc to avoid uninitialized memory problem.
* lib/krb5/data.c (krb5_copy_data): avoid exposing free-ed memory
on error. Found by IBM checker.
* lib/krb5/fcache.c (fcc_gen_new): fix a use after free, found by
IBM checker.
* lib/krb5/config_file.c (krb5_config_vget_strings): IBM checker
thought it found a memory leak, it didn't, but there was another
error in the code, lets fix that instead.
* lib/krb5/cache.c (_krb5_expand_default_cc_name): plug memory
leak. Found by IBM checker.
* lib/krb5/cache.c (_krb5_expand_default_cc_name): avoid return
pointer to freed memory in the error case. Found by IBM checker.
* lib/hdb/keytab.c (hdb_resolve): off by one, found by IBM
checker.
* lib/hdb/keys.c (hdb_generate_key_set): set ret_key_set before
going into the error clause and freeing key_set. Found by IBM
checker. Make sure ret == 0 after of parse error, we catch the
"no entries parsed" case later.
* lib/krb5/log.c (krb5_addlog_dest): make string length match
strings in strcasecmp. Found by IBM checker.
2006-03-30 Love Hörnquist Åstrand <lha@it.su.se>
* lib/hdb/hdb-ldap.c (LDAP_message2entry): in declaration set
variable_name as "hdb_entry_ex"
(hdb_ldap_common): change "arg" in condition (if) to "search_base"
(hdb_ldapi_create): change "serach_base" to "search_base" From
Alex V. Labuta.
* lib/krb5/pkinit.c (krb5_get_init_creds_opt_set_pkinit); fix
prototype
* kuser/kinit.c: Add pool of certificates to help certificate path
building for clients sending incomplete path in the signedData.
2006-03-28 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/pkinit.c: Add pool of certificates to help certificate path
building for clients sending incomplete path in the signedData.
* lib/krb5/pkinit.c: Add pool of certificates to help certificate
path building for clients sending incomplete path in the
signedData.
2006-03-27 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/config.c: Allow passing in related certificates used to
build the chain.
* kdc/pkinit.c: Allow passing in related certificates used to
build the chain.
* kdc/kerberos5.c (log_patype): Add case for
KRB5_PADATA_PA_PK_OCSP_RESPONSE.
* tools/Makefile.am: Spelling
* tools/krb5-config.in: Add hx509 when using PK-INIT.
* tools/Makefile.am: Add hx509 when using PK-INIT.
2006-03-26 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/acache.c: Use ticket flags definition, might fix Mac OS
X Kerberos.app problems.
* lib/krb5/krb5_ccapi.h: Add ticket flags definitions
* lib/krb5/pkinit.c: Use less openssl, spell chelling.
* kdc/pkinit.c (pk_mk_pa_reply_dh): encode the DH public key with
asn1 wrapping
* configure.in (AC_CONFIG_FILES): add lib/hx509/Makefile
* lib/Makefile.am: Add hx509.
* lib/krb5/Makefile.am: Add libhx509.la when PKINIT is used.
* configure.in: define automake PKINIT variable
* kdc/pkinit.c: Switch to hx509.
* lib/krb5/pkinit.c: Switch to hx509.
2006-03-24 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/kerberos5.c (log_patypes): log the patypes requested by the
client
2006-03-23 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/pkinit.c (_krb5_pk_rd_pa_reply): pass down the
req_buffer in the w2k case too. From Douglas E. Engert.
2006-03-19 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/mk_req_ext.c (_krb5_mk_req_internal): on failure, goto
error handling. Fixes Coverity NetBSD CID 2591 by catching a
failing krb5_copy_keyblock()
2006-03-17 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/addr_families.c (krb5_free_addresses): reset val,len in
address when free-ing. Fixes Coverity NetBSD bug #2605
(krb5_parse_address): reset val,len before possibly return errors
Fixes Coverity NetBSD bug #2605
2006-03-07 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/send_to_kdc.c (recv_loop): it should never happen, but
make sure nbytes > 0
* lib/krb5/get_for_creds.c (add_addrs): handle the case where
addr->len == 0 and n == 0, then realloc might return NULL.
* lib/krb5/crypto.c (decrypt_*): handle the case where the
plaintext is 0 bytes long, realloc might then return NULL.
2006-02-28 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/krb5_string_to_key.3: Drop krb5_string_to_key_derived.
* lib/krb5/krb5.3: Remove krb5_string_to_key_derived.
* lib/krb5/crypto.c (AES_string_to_key): drop _krb5_PKCS5_PBKDF2
and use PKCS5_PBKDF2_HMAC_SHA1 instead.
* lib/krb5/aes-test.c: reformat, avoid free-ing un-init'd memory
* lib/krb5/aes-test.c: Only use PKCS5_PBKDF2_HMAC_SHA1.
2006-02-27 Johan Danielsson <joda@pdc.kth.se>
* doc/setup.texi: remove cartouches - we don't use them anywhere
else, they should be around the example, not inside it, and
probably shouldn't be used in html at all
2006-02-18 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/krb5_warn.3: Document that applications want to use
krb5_get_error_message, add example.
2006-02-16 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/crypto.c (krb5_generate_random_block): check return
value from RAND_bytes
* lib/krb5/error_string.c: Change indentation, update (c)
2006-02-14 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/pkinit.c: Make struct krb5_dh_moduli available when
compiling w/o pkinit.
2006-02-13 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/pkinit.c: update to new paChecksum definition, update
the dhgroup handling
* kdc/pkinit.c: update to new paChecksum definition, use
hdb_entry_ex
2006-02-09 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/krb5_locl.h: Move Configurable options to last in the
file.
* lib/krb5/krb5_locl.h: Wrap KRB5_ADDRESSLESS_DEFAULT with #ifndef
2006-02-03 Love Hörnquist Åstrand <lha@it.su.se>
* kpasswd/kpasswdd.c: Send back a better error-message to the
client in case the password change was rejected.
* lib/krb5/krb5_warn.3: Document krb5_get_error_message.
* lib/krb5/error_string.c (krb5_get_error_message): new function,
and combination of krb5_get_error_string and krb5_get_err_text
* lib/krb5/krb5.3: sort, and krb5_get_error_message
* lib/hdb/hdb-ldap.c: Log the filter string to the error message
when doing searches.
* lib/krb5/init_creds.c (krb5_get_init_creds_opt_set_default_flags):
Use KRB5_ADDRESSLESS_DEFAULT when
checking [appdefault]no-addresses.
* lib/krb5/get_cred.c (get_cred_from_kdc_flags): Use
KRB5_ADDRESSLESS_DEFAULT when checking
[appdefault]no-addresses.
* lib/krb5/get_for_creds.c (krb5_get_forwarded_creds):
Use [appdefault]no-addresses before checking if the krbtgt is
address-less, use KRB5_ADDRESSLESS_DEFAULT.
* lib/krb5/krb5_locl.h: Introduce KRB5_ADDRESSLESS_DEFAULT that
controlls all address-less behavior. Defaults to false.
2006-02-01 Love Hörnquist Åstrand <lha@it.su.se>
* lib/krb5/n-fold-test.c: main is not a KRB5_LIB_FUNCTION
* lib/krb5/mk_priv.c (krb5_mk_priv): abort if ASN1_MALLOC_ENCODE
failes to produce the matching lenghts.
2006-01-27 Love Hörnquist Åstrand <lha@it.su.se>
* kcm/protocol.c (kcm_op_retrieve): remove unused variable
2006-01-15 Love Hörnquist Åstrand <lha@it.su.se>
* tools/krb5-config.in: Move depenency on @LIB_dbopen@ to
kadm-server, kerberos library doesn't depend on db-library.
2006-01-13 Love Hörnquist Åstrand <lha@it.su.se>
* include/Makefile.am: Don't clean crypto headers, they now live
in hcrypto/. Add hcrypto to SUBDIRS.
* include/hcrypto/Makefile.am: clean installed headers
* include/make_crypto.c: include crypto headers from hcrypto/
* include/make_crypto.c: Include more crypto headerfiles. Remove
support for old hash names.
2006-01-02 Love Hörnquist Åstrand <lha@it.su.se>
* kdc/misc.c (_kdc_db_fetch): use calloc to allocate the entry,
from Andrew Bartlet.
* Happy New Year.