12004-04-01 Johan Danielsson <joda@pdc.kth.se> 2 3 * Release 0.6.1 4 52004-03-30 Love H�rnquist �strand <lha@it.su.se> 6 7 * kdc/kerberos4.c: 1.46: stop the client from renewing tickets 8 into the future From: Jeffrey Hutzelman <jhutz@cmu.edu> 9 102004-03-10 Love H�rnquist �strand <lha@it.su.se> 11 12 * lib/krb5/fcache.c: 1.43: (fcc_store_cred): NULL terminate 13 krb5_config_get_bool_default' arglist 14 152004-03-09 Love H�rnquist �strand <lha@it.su.se> 16 17 * lib/krb5/krb5.conf.5: 1.44: document 18 [libdefaults]fcc-mit-ticketflags=boolean 1.43: don't use path's in 19 first .Nm, it confuses some locate.updatedb, use FILES section to 20 describe where the file is instead. 21 22 * lib/krb5/fcache.c (fcc_store_cred): default to use old format 23 24 * lib/krb5/fcache.c: 1.42: (fcc_store_cred): use 25 [libdefaults]fcc-mit-ticketflags=boolean to decide what format to 26 write the fcc in. Default to mit format (aka heimdal 0.7 format) 27 1.41: (_krb5_xlock): handle that everything was ok, and don't put 28 an error in the error strings then 29 30 * lib/krb5/store.c: 1.43: add _krb5_store_creds_heimdal_0_7 and 31 _krb5_store_creds_heimdal_pre_0_7 that store the creds in just 32 that format make krb5_store_creds default to mit format 1.42: 33 (krb5_ret_creds): Runtime detect the what is the higher bits of 34 the bitfield 1.41: (krb5_store_creds): add disabled code that 35 store the ticket flags in reverse order (bitswap32): new function 36 1.40: (krb5_ret_creds): if the higher ticket flags are set, its a 37 mit cache, reverse the bits, bug pointed out by Sergio Gelato 38 <Sergio.Gelato@astro.su.se> 39 40 delta modfied to not change the behavior of krb5_store_creds 41 422004-03-07 Love H�rnquist �strand <lha@it.su.se> 43 44 * lib/krb5/mk_safe.c (krb5_mk_safe): fix assignment of usec2 45 462004-03-06 Love H�rnquist �strand <lha@it.su.se> 47 48 * lib/krb5/mcache.c: patch based on 1.17 and 1.18 but with 49 threading code pulled out; 50 51 1.18: (mcc_get_principal): also check for primary_principal == 52 NULL now that that isn't used as dead flag 1.17: don't overload 53 the primary_principal == NULL as dead since that doesn't always 54 work Based on patch from Jeffrey Hutzelman <jhutz@cmu.edu>, but 55 tweek by me 56 57 * lib/krb5/crypto.c: 1.94: (decrypt_internal_special): do not not 58 modify the original data test case from Ronnie Sahlberg 59 <ronnie_sahlberg@ozemail.com.au> 60 612004-02-13 Love H�rnquist �strand <lha@it.su.se> 62 63 * lib/krb5/verify_krb5_conf.c: 1.22->1.23: (check_host): don't 64 check for EAI_NODATA, because its depricated in RFC3493 Pointed 65 out by Hajimu UMEMOTO <ume@mahoroba.org> on heimdal-discuss 66 67 * lib/krb5/eai_to_heim_errno.c: 1.3->1.4: EAI_ADDRFAMILY and 68 EAI_NODATA is deprecated in RFC3493 69 702004-02-09 Love H�rnquist �strand <lha@it.su.se> 71 72 * lib/asn1/der_length.c: 1.16: Fix len_unsigned for certain 73 negative integers, it got the length wrong, fix from Panasas, Inc. 74 75 * lib/asn1/der_locl.h: 1.5: add _heim_len_unsigned, _heim_len_int 76 772004-01-26 Love H�rnquist �strand <lha@it.su.se> 78 79 * lib/asn1/gen_length.c: 1.14: (length_type): TSequenceOf: add up 80 the size of all the elements, don't use just the size of the last 81 element. 82 83 * lib/krb5/fcache.c: 1.40: (_krb5_xlock): catch EINVAL and assume 84 that it means that the filesystem doesn't support locking 1.39: 85 (_krb5_xlock): fix compile error in last commit 1.38: internally 86 export x{,un}lock and thus prefix them with _krb5_ 87 882004-01-13 Love H�rnquist �strand <lha@it.su.se> 89 90 * kuser/kinit.c: 1.106: (renew_validate): if renewable_flag and 91 not time specifed, use "1 month" 92 1.105: make -9 work again 93 942004-01-09 Love H�rnquist �strand <lha@it.su.se> 95 96 * lib/krb5/get_for_creds.c: 1.36: (add_addrs): don't increase 97 addr->len until in contains interesting data, use right iteration 98 counter when clearing the addresses 1.39: krb5_princ_realm -> 99 krb5_principal_get_realm 1.38: (krb5_get_forwarded_creds): use 100 KRB5_AUTH_CONTEXT_DO_TIME if we want timestamp in forwarded 101 krb-cred 1.39: (krb5_get_forwarded_creds): If tickets are 102 address-less, forward address-less tickets. 1.40: 103 (krb5_get_forwarded_creds): try to handle errors better for 104 previous commit 1.41: (add_addrs): don't add same address multiple 105 times 106 107 * lib/krb5/get_cred.c: 1.96->1.97: rename get_krbtgt to 108 _krb5_get_krbtgt and export it 109 1102003-12-14 Love H�rnquist �strand <lha@it.su.se> 111 112 * kdc/kerberos5.c: part of 1.146->1.147: handle NULL client/server 113 names 114 1152003-12-03 Love H�rnquist �strand <lha@it.su.se> 116 117 * lib/krb5/crypto.c: 1.90->1.91: require cipher-text to be padded 118 to padsize 1.91->1.92: (decrypt_internal_derived): move up padsize 119 check to avoid memory leak 120 1212003-12-01 Love H�rnquist �strand <lha@it.su.se> 122 123 * kuser/kinit.c: 1.103->1.104: (main): return the return value 124 from simple_execvp 125 1262003-10-22 Love H�rnquist �strand <lha@it.su.se> 127 128 * lib/krb5/transited.c: 1.13->1.14: (krb5_domain_x500_encode): 129 always zero out encoding to make sure it have a defined value on 130 failure 131 132 * lib/krb5/transited.c: 1.12->1.13: (krb5_domain_x500_encode): if 133 num_realms == 0, set encoding and return (avoids malloc(0)) check 134 return value from malloc 135 1362003-10-21 Love H�rnquist �strand <lha@it.su.se> 137 138 * doc/setup.texi: 1.35->1.36: spelling 139 140 * kdc/kdc_locl.h: 1.58->1.59: add flag to always check transited 141 policy 142 143 * doc/setup.texi: 1.27->1.35: many changes 144 145 * lib/krb5/get_cred.c: 1.95->1.96: get capath info from [capaths] 146 section 147 148 * lib/krb5/rd_req.c: 1.50->1.51: (krb5_decrypt_ticket): try to 149 verify transited realms, unless the transited-policy-checked flag 150 is set 151 152 * lib/krb5/transited.c: 153 1.12: (krb5_domain_x500_decode): set *num_realms to zero not num_realms 154 1.11: (krb5_domain_x500_decode): handle zero length tr data; 155 (krb5_check_transited): new function that does more useful stuff 156 157 * kdc/kdc.8: 1.23->1.24: document enforce-transited-policy 158 159 * kdc/config.c: 1.47->1.48: add flag to always check transited 160 policy 161 162 * kdc/kerberos5.c: 163 1.150: (fix_transited_encoding): also verify with policy, 164 unless asked not to 165 1.151: always check transited policy if flag set either globally 166 (on principal part of patch not pulled up) 167 1.152: (fix_transited_encoding): set transited type 168 1.153: (fix_transited_encoding): always print cross-realm information 169 1702003-10-06 Love H�rnquist �strand <lha@it.su.se> 171 172 * lib/krb5/config_file.c: 1.48->1.49: 173 (krb5_config_parse_file_debug): punt if there is binding before a 174 section declaration. 175 Bug found by Arkadiusz Miskiewicz <arekm@pld-linux.org> 176 177 * kdc/kaserver.c: 1.21->1.23: 178 (do_getticket): if times data is shorter then 8 bytes, request is 179 malformed. 180 (do_authenticate): if request length is less then 8 bytes, its a 181 bad request and fail. Pointed out by Marco Foglia <marco@foglia.org> 182 1832003-09-22 Love H�rnquist �strand <lha@it.su.se> 184 185 * lib/krb5/verify_krb5_conf.c: 1.17->1.18: add missing " within 186 #if 0 From: stefan sokoll <stefansokoll@yahoo.de> 187 1882003-09-19 Love H�rnquist �strand <lha@it.su.se> 189 190 * lib/krb5/rd_req.c: 191 1.47->1.48: (krb5_rd_req): allow caller to pass in a key 192 in the auth_context, they way processes that doesn't use the 193 keytab can still pass in the key of the service (matches behavior 194 of MIT Kerberos). 195 1962003-09-18 Love H�rnquist �strand <lha@it.su.se> 197 198 * lib/krb5/crypto.c: 199 1.87->1.88: (usage2arcfour): simplify, only 200 include special cases From: Luke Howard <lukeh@PADL.COM> 201 1.86->1.87: (arcfour_checksum_p): return true when is arcfour, 202 not when its not pointed out by Luke Howard 203 1.82->1.83: Do the arcfour checksum mapping for 204 krb5_create_checksum and krb5_verify_checksum, From: Luke Howard 205 <lukeh@PADL.COM> 206 1.81->1.82: (hmac): make it return an error 207 when out of memory, update callsites to either return error or use 208 krb5_abortx 209 (krb5_hmac): expose hmac 210 * lib/krb5/mk_req_ext.c: 1.26->1.27: (krb5_mk_req_internal): 211 when using arcfour-hmac-md5, use an unkeyed checksum 212 (rsa-md5), since Microsoft calculates the keyed checksum with 213 the subkey of the authenticator. 214 215 * lib/krb5/get_cred.c: 216 1.93->1.94 (init_tgs_req): make generation of subkey 217 optional on configuration parameter 218 [realms]realm={tgs_require_subkey=bool} 219 defaults to off. The RFC1510 weakly defines the correct behavior, 220 so old DCE secd apparently required the subkey to be there, and MS 221 will use it when its there. But the request isn't encrypted in the 222 subkey, so you get to choose if you want to talk to a MS mdc or a 223 old DCE secd. 224 225 partly 1.91->1.92: (init_tgs_req): in case of error, don't 226 free in the req_body addresses since they where pass in by caller 227 228 lib/krb5/get_in_tkt.c: 229 1.108->1.1.09: (krb5_get_in_tkt): for compatibility with with 230 the mit implemtation, don't free `creds' argument when done, its up 231 the the caller to do that, also allow a NULL ccache. 232 233 * doc/ack.texi 234 1.16->1.17: update Luke Howard email address 235 236 * lib/hdb/hdb-ldap.c: 237 1.13->1.14: code rewrite from Luke Howard <lukeh@PADL.COM> 238 1.12->1.13: (LDAP_store): log what principal/dn failed 239 1.11->1.12: use int2HDBFlags/HDBFlags2int 240 From: Alberto Patino <jalbertop@aranea.com.mx>, 241 Luke Howard <lukeh@PADL.COM> 242 Pointed out by Andrew Bartlett of Samba 243 1.10->1.11: (LDAP__connect): bind sasl "EXTERNAL" to ldap connection 244 (LDAP_store): remove superfluous argument to asprintf 245 From Alberto Patino <jalbertop@aranea.com.mx> 246 247 * lib/krb5/krb5.h: 248 1.214->1.2015: add KEYTYPE_ARCFOUR_56 249 2502003-09-12 Love H�rnquist �strand <lha@it.su.se> 251 252 * lib/krb5/config_file.c: fix prototypes Fredrik Ljungberg 253 <flag@pobox.se> 254 2552003-09-11 Love H�rnquist �strand <lha@it.su.se> 256 257 * lib/hdb/hdb_locl.h: 1.18->1.19: include <limits.h> for ULONG_MAX 258 noted by Wissler Magnus <M.Wissler@abalon.se> on heimdal-discuss 259 2602003-08-29 Love H�rnquist �strand <lha@it.su.se> 261 262 * lib/hdb/db3.c: 1.8->1.9: patch for working with DB4 on 263 heimdal-discuss From: Luke Howard <lukeh@PADL.COM> 1.9->1.10: try 264 to include more db headers 265 2662003-08-25 Love H�rnquist �strand <lha@it.su.se> 267 268 * kdc/connect.c: 1.92->1.93 (handle_tcp): handle recvfrom 269 returning 0 (connection closed) 1.91->1.92: (grow_descr): 270 increment the size after we succeed to allocate the space 271 2722003-08-15 Love H�rnquist �strand <lha@it.su.se> 273 274 * lib/krb5/principal.c: 1.83->1.85: (unparse_name): len can't be 275 zero, so, don't check for that 276 (unparse_name): make sure there are space for a NUL, set *name to NULL 277 when there is a failure (so caller can't get hold of a freed 278 pointer) 279 2802003-05-08 Johan Danielsson <joda@ratatosk.pdc.kth.se> 281 282 * Release 0.6 283 2842003-05-08 Love H�rnquist �strand <lha@it.su.se> 285 286 * kuser/klist.c: 1.68->1.69: print tokens even if there isn't v4 287 support 288 289 * kuser/kdestroy.c: 1.14->1.15: destroy tokens even if there isn't 290 v4 support 291 292 * kuser/kinit.c: 1.90->1.91: print tokens even if there isn't v4 293 support 294 2952003-05-06 Johan Danielsson <joda@pdc.kth.se> 296 297 * lib/krb5/name-45-test.c: need to use empty krb5.conf for some 298 tests 299 300 * lib/asn1/check-gen.c: there is no \e escape sequence; replace 301 everything with hex-codes, and cast to unsigned char* to make some 302 compilers happy 303 3042003-05-06 Love H�rnquist �strand <lha@it.su.se> 305 306 * lib/krb5/get_in_tkt.c (make_pa_enc_timestamp): make sure first 307 argument to krb5_us_timeofday have correct type 308 3092003-05-05 Assar Westerlund <assar@kth.se> 310 311 * include/make_crypto.c (main): include aes.h if ENABLE_AES 312 3132003-05-05 Love H�rnquist �strand <lha@it.su.se> 314 315 * NEWS: 1.108->1.110: fix text about gssapi compat 316 3172003-04-28 Love H�rnquist �strand <lha@it.su.se> 318 319 * kdc/v4_dump.c: 1.4->1.5: (v4_prop_dump): limit strings length, 320 from openbsd 321 3222003-04-24 Love H�rnquist �strand <lha@it.su.se> 323 324 * doc/programming.texi: 1.2-1.3: s/managment/management/, from jmc 325 <jmc@prioris.mini.pw.edu.pl> 326 3272003-04-22 Love H�rnquist �strand <lha@it.su.se> 328 329 * lib/krb5/krbhst.c: 1.43->1.44: copy NUL too, from janj@wenf.org 330 via openbsd 331 3322003-04-17 Love H�rnquist �strand <lha@it.su.se> 333 334 * lib/asn1/der_copy.c (copy_general_string): use strdup 335 * lib/asn1/der_put.c: remove sprintf 336 * lib/asn1/gen.c: remove strcpy/sprintf 337 338 * lib/krb5/name-45-test.c: use a more unique name then ratatosk so 339 that other (me) have such hosts in the local domain and the tests 340 fails, to take hokkigai.pdc.kth.se instead 341 342 * lib/krb5/test_alname.c: add --version and --help 343 3442003-04-16 Love H�rnquist �strand <lha@it.su.se> 345 346 * lib/krb5/krb5_warn.3: add krb5_get_err_text 347 348 * lib/krb5/transited.c: use strlcat/strlcpy, from openbsd 349 * lib/krb5/krbhst.c (srv_find_realm): use strlcpy, from openbsd 350 * lib/krb5/aname_to_localname.c (krb5_aname_to_localname): use 351 strlcpy, from openbsd 352 * kdc/hpropd.c: s/strcat/strlcat/, inspired from openbsd 353 * appl/kf/kfd.c: use strlcpy, from openbsd 354 3552003-04-16 Johan Danielsson <joda@pdc.kth.se> 356 357 * configure.in: fix for large file support in AIX, _LARGE_FILES 358 needs to be defined on the command line, since lex likes to 359 include stdio.h before we get to config.h 360 3612003-04-16 Love H�rnquist �strand <lha@it.su.se> 362 363 * lib/krb5/*.3: Change .Fd #include <header.h> to .In header.h, 364 from Thomas Klausner <wiz@netbsd.org> 365 366 * lib/krb5/krb5.conf.5: spelling, from Thomas Klausner 367 <wiz@netbsd.org> 368 3692003-04-15 Love H�rnquist �strand <lha@it.su.se> 370 371 * kdc/kerberos5.c: fix some more memory leaks 372 3732003-04-11 Love H�rnquist �strand <lha@it.su.se> 374 375 * appl/kf/kf.1: spelling, from jmc <jmc@prioris.mini.pw.edu.pl> 376 3772003-04-08 Love H�rnquist �strand <lha@it.su.se> 378 379 * admin/ktutil.8: typos, from jmc <jmc@acn.waw.pl> 380 3812003-04-06 Love H�rnquist �strand <lha@it.su.se> 382 383 * lib/krb5/krb5.3: s/kerberos/Kerberos/ 384 * lib/krb5/krb5_data.3: s/kerberos/Kerberos/ 385 * lib/krb5/krb5_address.3: s/kerberos/Kerberos/ 386 * lib/krb5/krb5_ccache.3: s/kerberos/Kerberos/ 387 * lib/krb5/krb5.conf.5: s/kerberos/Kerberos/ 388 * kuser/kinit.1: s/kerberos/Kerberos/ 389 * kdc/kdc.8: s/kerberos/Kerberos/ 390 3912003-04-01 Love H�rnquist �strand <lha@it.su.se> 392 393 * lib/krb5/test_alname.c: more krb5_aname_to_localname tests 394 395 * lib/krb5/aname_to_localname.c (krb5_aname_to_localname): when 396 converting too root, make sure user is ok according to 397 krb5_kuserok before allowing it. 398 399 * lib/krb5/Makefile.am (noinst_PROGRAMS): += test_alname 400 401 * lib/krb5/test_alname.c: add test for krb5_aname_to_localname 402 403 * lib/krb5/crypto.c (krb5_DES_AFS3_CMU_string_to_key): used p1 404 instead of the "illegal" salt #~, same change as kth-krb did 405 1999. Problems occur with crypt() that behaves like AT&T crypt 406 (openssl does this). Pointed out by Marcus Watts. 407 408 * admin/change.c (kt_change): collect all principals we are going 409 to change, and pick the highest kvno and use that to guess what 410 kvno the resulting kvno is going to be. Now two ktutil change in a 411 row works. XXX fix the protocol to pass the kvno back. 412 4132003-03-31 Love H�rnquist �strand <lha@it.su.se> 414 415 * appl/kf/kf.1: afs->AFS, from jmc <jmc@acn.waw.pl> 416 4172003-03-30 Love H�rnquist �strand <lha@it.su.se> 418 419 * doc/setup.texi: add description on how to turn on v4, 524 and 420 kaserver support 421 4222003-03-29 Love H�rnquist �strand <lha@it.su.se> 423 424 * lib/krb5/verify_krb5_conf.c (appdefaults_entries): add afslog 425 and afs-use-524 426 4272003-03-28 Love H�rnquist �strand <lha@it.su.se> 428 429 * kdc/kerberos5.c (as_rep): when the second enctype_to_string 430 failes, remember to free memory from the first enctype_to_string 431 432 * lib/krb5/crypto.c (usage2arcfour): map KRB5_KU_TICKET to 2, 433 from Harald Joerg <harald.joerg@fujitsu-siemens.com> 434 (enctype_arcfour_hmac_md5): disable checksum_hmac_md5_enc 435 436 * lib/hdb/mkey.c (hdb_unseal_keys_mkey): truncate key to the key 437 length when key is longer then expected length, its probably 438 longer since the encrypted data was padded, reported by Aidan 439 Cully <aidan@kublai.com> 440 441 * lib/krb5/crypto.c (krb5_enctype_keysize): return key size of 442 encyption type, inspired by Aidan Cully <aidan@kublai.com> 443 4442003-03-27 Love H�rnquist �strand <lha@it.su.se> 445 446 * lib/krb5/keytab.c (krb5_kt_get_entry): avoid printing 0 447 (wildcard kvno) after principal when the keytab entry isn't found, 448 reported by Chris Chiappa <chris@chiappa.net> 449 4502003-03-26 Love H�rnquist �strand <lha@it.su.se> 451 452 * doc/misc.texi: update 2b example to match reality (from 453 mattiasa@e.kth.se) 454 455 * doc/misc.texi: spelling and add `Configuring AFS clients' 456 subsection 457 4582003-03-25 Love H�rnquist �strand <lha@it.su.se> 459 460 * lib/krb5/krb5.3: add krb5_free_data_contents.3 461 462 * lib/krb5/data.c: add krb5_free_data_contents for compat with MIT 463 API 464 465 * lib/krb5/krb5_data.3: add krb5_free_data_contents for compat 466 with MIT API 467 468 * lib/krb5/krb5_verify_user.3: write more about how the ccache 469 argument should be inited when used 470 4712003-03-25 Johan Danielsson <joda@pdc.kth.se> 472 473 * lib/krb5/addr_families.c (krb5_print_address): make sure 474 print_addr is defined for the given address type; make addrports 475 printable 476 477 * kdc/string2key.c: print the used enctype for kerberos 5 keys 478 4792003-03-25 Love H�rnquist �strand <lha@it.su.se> 480 481 * lib/krb5/aes-test.c: add another arcfour test 482 4832003-03-22 Love H�rnquist �strand <lha@it.su.se> 484 485 * lib/krb5/aes-test.c: sneek in a test for arcfour-hmac-md5 486 4872003-03-20 Love H�rnquist �strand <lha@it.su.se> 488 489 * lib/krb5/krb5_ccache.3: update .Dd 490 491 * lib/krb5/krb5.3: sort in krb5_data functions 492 493 * lib/krb5/Makefile.am (man_MANS): += krb5_data.3 494 495 * lib/krb5/krb5_data.3: document krb5_data 496 497 * lib/krb5/init_creds_pw.c (krb5_get_init_creds_password): if 498 prompter is NULL, don't try to ask for a password to 499 change. reported by Iain Moffat @ ufl.edu via Howard Chu 500 <hyc@highlandsun.com> 501 5022003-03-19 Love H�rnquist �strand <lha@it.su.se> 503 504 * lib/krb5/krb5_keytab.3: spelling, from 505 <jmc@prioris.mini.pw.edu.pl> 506 507 * lib/krb5/krb5.conf.5: . means new line 508 509 * lib/krb5/krb5.conf.5: spelling, from 510 <jmc@prioris.mini.pw.edu.pl> 511 512 * lib/krb5/krb5_auth_context.3: spelling, from 513 <jmc@prioris.mini.pw.edu.pl> 514 5152003-03-18 Love H�rnquist �strand <lha@it.su.se> 516 517 * kuser/Makefile.am: INCLUDES: -I$(srcdir)/../lib/krb5 518 519 * lib/krb5/convert_creds.c: add _krb5_krb_life_to_time 520 521 * lib/krb5/krb5-v4compat.h: add _krb5_krb_life_to_time 522 523 * kdc/kdc_locl.h: 524 is independent of kerberos 4, so move out 524 #ifdef KRB4 from enable_v4_cross_realm since 524 needs it 525 526 * kdc/config.c: 524 is independent of kerberos 4, so move out 527 enable_v4_cross_realm from #ifdef KRB4 since 524 needs it 528 5292003-03-17 Assar Westerlund <assar@kth.se> 530 531 * kdc/kdc.8: document --kerberos4-cross-realm 532 * kdc/kerberos4.c: pay attention to enable_v4_cross_realm 533 * kdc/kdc_locl.h (enable_v4_cross_realm): add 534 * kdc/524.c (encode_524_response): check the enable_v4_cross_realm 535 flag before giving out v4 tickets for foreign v5 principals 536 * kdc/config.c: add --enable-kerberos4-cross-realm option (default 537 to off) 538 5392003-03-17 Love H�rnquist �strand <lha@it.su.se> 540 541 * lib/krb5/Makefile.am (man_MANS) += krb5_aname_to_localname.3 542 543 * lib/krb5/krb5_aname_to_localname.3: manpage for 544 krb5_aname_to_localname 545 546 * lib/krb5/krb5_kuserok.3: s/KRB5_USEROK/KRB5_KUSEROK/ 547 5482003-03-16 Love H�rnquist �strand <lha@it.su.se> 549 550 * lib/krb5/Makefile.am (man_MANS): add krb5_set_default_realm.3 551 552 * lib/krb5/krb5.3: add manpages from krb5_set_default_realm.3 553 554 * lib/krb5/krb5_set_default_realm.3: Manpage for 555 krb5_free_host_realm, krb5_get_default_realm, 556 krb5_get_default_realms, krb5_get_host_realm, and 557 krb5_set_default_realm. 558 559 * admin/ktutil.8: s/entype/enctype/, from Igor Sobrado 560 <sobrado@acm.org> via NetBSD 561 562 * lib/krb5/krb5_keytab.3: add documention for krb5_kt_get_type 563 564 * lib/krb5/keytab.c (krb5_kt_get_type): get prefix/type of keytab 565 566 * lib/krb5/krb5.h (KRB5_KT_PREFIX_MAX_LEN): max length of prefix 567 568 * lib/krb5/krb5_ccache.3: document krb5_cc_get_ops, add more 569 types, add krb5_fcc_ops and krb5_mcc_ops 570 571 * lib/krb5/cache.c (krb5_cc_get_ops): new function, return ops for 572 a id 573 5742003-03-15 Love H�rnquist �strand <lha@it.su.se> 575 576 * doc/intro.texi: add reference to source code, binaries and the 577 manual 578 579 * lib/krb5/krb5.3: krb5.h isn't in krb5 directory in heimdal 580 5812003-03-14 Love H�rnquist �strand <lha@it.su.se> 582 583 * kdc/kdc.8: better/difrent english 584 585 * kdc/kdc.8: . -> .\n, copyright/license 586 587 * kdc/kdc.8: changed configuration file -> restart kdc 588 589 * kdc/kerberos4.c: add krb4 into the most error messages written 590 to the logfile 591 592 * lib/krb5/krb5_ccache.3: add missing name of argument 593 (krb5_context) to most functions 594 5952003-03-13 Love H�rnquist �strand <lha@it.su.se> 596 597 * lib/krb5/kuserok.c (krb5_kuserok): preserve old behviour of 598 function and return FALSE when there isn't a local account for 599 `luser'. 600 601 * lib/krb5/krb5_kuserok.3: fix prototype, spelling and more text 602 describing the function 603 6042003-03-12 Love H�rnquist �strand <lha@it.su.se> 605 606 * lib/krb5/cache.c (krb5_cc_default): if krb5_cc_default_name 607 returned memory, don't return ENOMEM 608 6092003-03-11 Love H�rnquist �strand <lha@it.su.se> 610 611 * lib/krb5/krb5.3: add krb5_address stuff and sort 612 613 * lib/krb5/krb5_address.3: fix krb5_addr2sockaddr description 614 615 * lib/krb5/Makefile.am (man_MANS): += krb5_address.3 616 617 * lib/krb5/krb5_address.3: document types krb5_address and 618 krb5_addresses and their helper functions 619 6202003-03-10 Love H�rnquist �strand <lha@it.su.se> 621 622 * lib/krb5/Makefile.am (man_MANS): += krb5_kuserok.3 623 624 * lib/krb5/krb5_kuserok.3: spelling, from cizzi@it.su.se 625 626 * lib/krb5/Makefile.am (man_MANS): += krb5_ccache.3 627 628 * lib/krb5/krb5_ccache.3: spelling, from cizzi@it.su.se 629 630 * lib/krb5/krb5.3: add more functions 631 632 * lib/krb5/krb5_ccache.3: document krb5_ccache and krb5_cc 633 functions 634 635 * lib/krb5/krb5_kuserok.3: document krb5_kuserok 636 637 * lib/krb5/krb5_verify_user.3: document 638 krb5_verify_opt_set_flags(opt, KRB5_VERIFY_LREALMS) behavior 639 640 * lib/krb5/krb5_verify_user.3: document krb5_verify_opt* and 641 krb5_verify_user_opt 642 643 * lib/krb5/*.[0-9]: add copyright/licenses on more manpages 644 645 * kuser/kdestroy.c (main): handle that krb5_cc_default_name can 646 return NULL 647 648 * lib/krb5/Makefile.am (libkrb5_la_LDFLAGS): bump minor 649 (TESTS): add test_cc 650 651 * lib/krb5/test_cc.c: test some 652 krb5_cc_default_name/krb5_cc_set_default_name combinations 653 654 * lib/krb5/context.c (init_context_from_config_file): set 655 default_cc_name to NULL 656 (krb5_free_context): free default_cc_name if set 657 658 * lib/krb5/cache.c (krb5_cc_set_default_name): new function 659 (krb5_cc_default_name): use krb5_cc_set_default_name 660 661 * lib/krb5/krb5.h (krb5_context_data): add default_cc_name 662 6632003-02-25 Love H�rnquist �strand <lha@it.su.se> 664 665 * appl/kf/kf.1: s/securly/securely/ from NetBSD 666 6672003-02-18 Love H�rnquist �strand <lha@it.su.se> 668 669 * kdc/connect.c: s/intialize/initialize, from 670 <jmc@prioris.mini.pw.edu.pl> 671 6722003-02-17 Love H�rnquist �strand <lha@it.su.se> 673 674 * configure.in: add AM_MAINTAINER_MODE 675 6762003-02-16 Love H�rnquist �strand <lha@it.su.se> 677 678 * **/*.[0-9]: add copyright/licenses on all manpages 679 6802003-14-16 Jacques Vidrine <nectar@kth.se> 681 682 * lib/krb5/get_in_tkt.c (init_as_req): Send only a single 683 PA-ENC-TIMESTAMP in the AS-REQ, using the first encryption 684 type specified by the KDC. 685 6862003-02-15 Love H�rnquist �strand <lha@it.su.se> 687 688 * fix-export: some autoconf put their version number in 689 autom4te.cache, so remove autom4te*.cache 690 691 * fix-export: make sure $1 is a directory 692 6932003-02-04 Love H�rnquist �strand <lha@it.su.se> 694 695 * kpasswd/kpasswdd.8: spelling, from jmc <jmc@prioris.mini.pw.edu.pl> 696 697 * kdc/kdc.8: spelling, from jmc <jmc@prioris.mini.pw.edu.pl> 698 6992003-01-31 Love H�rnquist �strand <lha@it.su.se> 700 701 * kdc/hpropd.8: s/databases/a database/ s/Not/not/ 702 703 * kdc/hprop.8: add missing . 704 7052003-01-30 Love H�rnquist �strand <lha@it.su.se> 706 707 * lib/krb5/krb5.conf.5: documentation for of boolean, etypes, 708 address, write out encryption type in sentences, s/Host/host 709 7102003-01-26 Love H�rnquist �strand <lha@it.su.se> 711 712 * lib/asn1/check-gen.c: add checks for Authenticator too 713 7142003-01-25 Love H�rnquist �strand <lha@it.su.se> 715 716 * doc/setup.texi: in the hprop example, use hprop and the first 717 component, not host 718 719 * lib/krb5/get_addrs.c (find_all_addresses): address-less 720 point-to-point might not have an address, just ignore 721 those. Reported by Harald Barth. 722 7232003-01-23 Love H�rnquist �strand <lha@it.su.se> 724 725 * lib/krb5/verify_krb5_conf.c (check_section): when key isn't 726 found, don't print out all known keys 727 728 * lib/krb5/verify_krb5_conf.c (syslogvals): mark up where severity 729 and facility start resp 730 (check_log): find_value() returns -1 when key isn't found 731 732 * lib/krb5/crypto.c (_krb5_aes_cts_encrypt): make key argument a 733 'const void *' to avoid AES_KEY being exposed in krb5-private.h 734 735 * lib/krb5/krb5.conf.5: add [kdc]use_2b 736 737 * kdc/524.c (encode_524_response): its 2b not b2 738 739 * doc/misc.texi: quote @ where missing 740 741 * lib/asn1/Makefile.am: add check-gen 742 743 * lib/asn1/check-gen.c: add Principal check 744 745 * lib/asn1/check-common.h: move generic asn1/der functions from 746 check-der.c to here 747 748 * lib/asn1/check-common.c: move generic asn1/der functions from 749 check-der.c to here 750 751 * lib/asn1/check-der.c: move out the generic asn1/der functions to 752 a common file 753 7542003-01-22 Love H�rnquist �strand <lha@it.su.se> 755 756 * doc/misc.texi: more text about afs, how to get get your KeyFile, 757 and how to start use 2b tokens 758 759 * lib/krb5/krb5.conf.5: spelling, from Jason McIntyre 760 <jmc@cvs.openbsd.org> 761 7622003-01-21 Jacques Vidrine <nectar@kth.se> 763 764 * kuser/kuser_locl.h: include crypto-headers.h for 765 des_read_pw_string prototype 766 7672003-01-16 Love H�rnquist �strand <lha@it.su.se> 768 769 * admin/ktutil.8: document -v, --verbose 770 771 * admin/get.c (kt_get): make getarg usage consistent with other 772 other parts of ktutil 773 774 * admin/copy.c (kt_copy): remove adding verbose_flag to args 775 struct, since it will overrun the args array (from Sumit Bose) 776 7772003-01-15 Love H�rnquist �strand <lha@it.su.se> 778 779 * lib/krb5/krb5.conf.5: write more about [realms] REALM = { kdc = 780 ... } 781 782 * lib/krb5/aes-test.c: test vectors in aes-draft 783 784 * lib/krb5/Makefile.am: add aes-test.c 785 786 * lib/krb5/crypto.c: Add support for AES 787 (draft-raeburn-krb-rijndael-krb-02), not enabled by default. 788 (HMAC_SHA1_DES3_checksum): rename to SP_HMAC_SHA1_checksum and modify 789 to support checksumtype that are have a shorter wireformat then 790 their output block size. 791 792 * lib/krb5/crypto.c (struct encryption_type): split the blocksize 793 into blocksize and padsize, padsize is the minimum padding 794 size. they are the same for now 795 (enctype_*): add padsize 796 (encrypt_internal): use padsize 797 (encrypt_internal_derived): use padsize 798 (wrapped_length): use padsize 799 (wrapped_length_dervied): use padsize 800 801 * lib/krb5/crypto.c: add extra `opaque' argument to string_to_key 802 function for each enctype in preparation enctypes that uses 803 `Encryption and Checksum Specifications for Kerberos 5' draft 804 805 * lib/asn1/k5.asn1: add checksum and enctype for AES from 806 draft-raeburn-krb-rijndael-krb-02.txt 807 808 * lib/krb5/krb5.h (krb5_keytype): add KEYTYPE_AES128, 809 KEYTYPE_AES256 810 8112003-01-14 Love H�rnquist �strand <lha@it.su.se> 812 813 * lib/hdb/common.c (_hdb_fetch): handle error code from 814 hdb_value2entry 815 816 * kdc/Makefile.am: always include kerberos4.c and 524.c in 817 kdc_SOURCES to support 524 818 819 * kdc/524.c: always compile in support for 524 820 821 * kdc/kdc_locl.h: move out krb/524 protos from under #ifdef KRB4 822 823 * kdc/config.c: always compile in support for 524 824 825 * kdc/connect.c: always compile in support for 524 826 827 * kdc/kerberos4.c: export encode_v4_ticket() and get_des_key() 828 even when we build without kerberos 4, 524 needs them 829 830 * lib/krb5/convert_creds.c, lib/krb5/krb5-v4compat.h: Split out 831 Kerberos 4 help functions/structures so other parts of the source 832 tree can use it (like the KDC) 833 834