12004-09-13 Johan Danielsson <joda@pdc.kth.se> 2 3 * Release 0.6.3 4 52004-09-05 Love H�rnquist �strand <lha@it.su.se> 6 7 * lib/asn1/der_get.c (decode_enumerated): check that the tag 8 length isn't longer the the length 9 102004-08-31 Love H�rnquist �strand <lha@it.su.se> 11 12 * lib/krb5/init_creds_pw.c (krb5_get_init_creds_password): 13 kdc_reply can be set in case of failure too, clean on entry and 14 free the exit unconditionally to avoid memory leak 15 162004-08-20 Love H�rnquist �strand <lha@it.su.se> 17 18 * lib/krb5/context.c: 1.93: (krb5_get_err_text): if neither of 19 com_right nor strerror finds the error-code, return Unknown error. 20 212004-08-13 Love H�rnquist �strand <lha@it.su.se> 22 23 * kdc/kerberos5.c: based on 1.162: (get_pa_etype_info): check for 24 dup enctypes from the client and filter them out. 25 262004-06-21 Love H�rnquist �strand <lha@it.su.se> 27 28 * admin/get.c: 1.23: (kt_get): catch errors from krb5_parse_name 29 302004-06-21 Love H�rnquist �strand <lha@it.su.se> 31 32 * lib/krb5/Makefile.am: man_MANS += krb5_set_password.3 33 34 * lib/krb5/krb5_set_password.3: 1.1-1.3: change password manpage 35 36 * lib/krb5/changepw.c: 1.49: implement 37 krb5_set_password_using_ccache 1.47: add tcp support to the set 38 protocol, should be cleaned up to enable sharing code with 39 krb5_sendto 1.46: (process_reply): log into result_string if 40 something goes bad, return 0 (even on failure), not the KPASSWD 41 protocol error code 1.45: krb5_princ_realm -> 42 krb5_principal_get_realm 1.44: (setpw_send_request): free 43 ap_req_data on failure 1.41: ooops, remove cut and paste error 44 1.40: draft-ietf-cat-kerb-chg-password-02 and rfc3244 share the 45 response packet sure more constants now that they exists 1.39: 46 implement rfc3244, partly from shadow@dementia.org 47 48 * lib/krb5/krb5.h: 1.211: some defines for rfc3244 49 50 * lib/asn1/Makefile.am: 1.71: (gen_files): 51 asn1_ChangePasswdDataMS.x for RFC3244 52 53 * lib/asn1/k5.asn1: 1.30: add ChangePasswdDataMS, for RFC3244 54 55 * kuser/kinit.c: 1.114: move "setpag if (argc < 1)" to common path 56 572004-05-06 Johan Danielsson <joda@pdc.kth.se> 58 59 * Release 0.6.2 60 612004-04-02 Love H�rnquist �strand <lha@it.su.se> 62 63 * kdc/connect.c: case size_t to unsigned long for LP64 platforms 64 652004-04-01 Johan Danielsson <joda@pdc.kth.se> 66 67 * Release 0.6.1 68 692004-03-30 Love H�rnquist �strand <lha@it.su.se> 70 71 * kdc/kerberos4.c: 1.46: stop the client from renewing tickets 72 into the future From: Jeffrey Hutzelman <jhutz@cmu.edu> 73 742004-03-10 Love H�rnquist �strand <lha@it.su.se> 75 76 * lib/krb5/fcache.c: 1.43: (fcc_store_cred): NULL terminate 77 krb5_config_get_bool_default' arglist 78 792004-03-09 Love H�rnquist �strand <lha@it.su.se> 80 81 * lib/krb5/krb5.conf.5: 1.44: document 82 [libdefaults]fcc-mit-ticketflags=boolean 1.43: don't use path's in 83 first .Nm, it confuses some locate.updatedb, use FILES section to 84 describe where the file is instead. 85 86 * lib/krb5/fcache.c (fcc_store_cred): default to use old format 87 88 * lib/krb5/fcache.c: 1.42: (fcc_store_cred): use 89 [libdefaults]fcc-mit-ticketflags=boolean to decide what format to 90 write the fcc in. Default to mit format (aka heimdal 0.7 format) 91 1.41: (_krb5_xlock): handle that everything was ok, and don't put 92 an error in the error strings then 93 94 * lib/krb5/store.c: 1.43: add _krb5_store_creds_heimdal_0_7 and 95 _krb5_store_creds_heimdal_pre_0_7 that store the creds in just 96 that format make krb5_store_creds default to mit format 1.42: 97 (krb5_ret_creds): Runtime detect the what is the higher bits of 98 the bitfield 1.41: (krb5_store_creds): add disabled code that 99 store the ticket flags in reverse order (bitswap32): new function 100 1.40: (krb5_ret_creds): if the higher ticket flags are set, its a 101 mit cache, reverse the bits, bug pointed out by Sergio Gelato 102 <Sergio.Gelato@astro.su.se> 103 104 delta modfied to not change the behavior of krb5_store_creds 105 1062004-03-07 Love H�rnquist �strand <lha@it.su.se> 107 108 * lib/krb5/mk_safe.c (krb5_mk_safe): fix assignment of usec2 109 1102004-03-06 Love H�rnquist �strand <lha@it.su.se> 111 112 * lib/krb5/mcache.c: patch based on 1.17 and 1.18 but with 113 threading code pulled out; 114 115 1.18: (mcc_get_principal): also check for primary_principal == 116 NULL now that that isn't used as dead flag 1.17: don't overload 117 the primary_principal == NULL as dead since that doesn't always 118 work Based on patch from Jeffrey Hutzelman <jhutz@cmu.edu>, but 119 tweek by me 120 121 * lib/krb5/crypto.c: 1.94: (decrypt_internal_special): do not not 122 modify the original data test case from Ronnie Sahlberg 123 <ronnie_sahlberg@ozemail.com.au> 124 1252004-02-13 Love H�rnquist �strand <lha@it.su.se> 126 127 * lib/krb5/verify_krb5_conf.c: 1.22->1.23: (check_host): don't 128 check for EAI_NODATA, because its depricated in RFC3493 Pointed 129 out by Hajimu UMEMOTO <ume@mahoroba.org> on heimdal-discuss 130 131 * lib/krb5/eai_to_heim_errno.c: 1.3->1.4: EAI_ADDRFAMILY and 132 EAI_NODATA is deprecated in RFC3493 133 1342004-02-09 Love H�rnquist �strand <lha@it.su.se> 135 136 * lib/asn1/der_length.c: 1.16: Fix len_unsigned for certain 137 negative integers, it got the length wrong, fix from Panasas, Inc. 138 139 * lib/asn1/der_locl.h: 1.5: add _heim_len_unsigned, _heim_len_int 140 1412004-01-26 Love H�rnquist �strand <lha@it.su.se> 142 143 * lib/asn1/gen_length.c: 1.14: (length_type): TSequenceOf: add up 144 the size of all the elements, don't use just the size of the last 145 element. 146 147 * lib/krb5/fcache.c: 1.40: (_krb5_xlock): catch EINVAL and assume 148 that it means that the filesystem doesn't support locking 1.39: 149 (_krb5_xlock): fix compile error in last commit 1.38: internally 150 export x{,un}lock and thus prefix them with _krb5_ 151 1522004-01-13 Love H�rnquist �strand <lha@it.su.se> 153 154 * kuser/kinit.c: 1.106: (renew_validate): if renewable_flag and 155 not time specifed, use "1 month" 156 1.105: make -9 work again 157 1582004-01-09 Love H�rnquist �strand <lha@it.su.se> 159 160 * lib/krb5/get_for_creds.c: 1.36: (add_addrs): don't increase 161 addr->len until in contains interesting data, use right iteration 162 counter when clearing the addresses 1.39: krb5_princ_realm -> 163 krb5_principal_get_realm 1.38: (krb5_get_forwarded_creds): use 164 KRB5_AUTH_CONTEXT_DO_TIME if we want timestamp in forwarded 165 krb-cred 1.39: (krb5_get_forwarded_creds): If tickets are 166 address-less, forward address-less tickets. 1.40: 167 (krb5_get_forwarded_creds): try to handle errors better for 168 previous commit 1.41: (add_addrs): don't add same address multiple 169 times 170 171 * lib/krb5/get_cred.c: 1.96->1.97: rename get_krbtgt to 172 _krb5_get_krbtgt and export it 173 1742003-12-14 Love H�rnquist �strand <lha@it.su.se> 175 176 * kdc/kerberos5.c: part of 1.146->1.147: handle NULL client/server 177 names 178 1792003-12-03 Love H�rnquist �strand <lha@it.su.se> 180 181 * lib/krb5/crypto.c: 1.90->1.91: require cipher-text to be padded 182 to padsize 1.91->1.92: (decrypt_internal_derived): move up padsize 183 check to avoid memory leak 184 1852003-12-01 Love H�rnquist �strand <lha@it.su.se> 186 187 * kuser/kinit.c: 1.103->1.104: (main): return the return value 188 from simple_execvp 189 1902003-10-22 Love H�rnquist �strand <lha@it.su.se> 191 192 * lib/krb5/transited.c: 1.13->1.14: (krb5_domain_x500_encode): 193 always zero out encoding to make sure it have a defined value on 194 failure 195 196 * lib/krb5/transited.c: 1.12->1.13: (krb5_domain_x500_encode): if 197 num_realms == 0, set encoding and return (avoids malloc(0)) check 198 return value from malloc 199 2002003-10-21 Love H�rnquist �strand <lha@it.su.se> 201 202 * doc/setup.texi: 1.35->1.36: spelling 203 204 * kdc/kdc_locl.h: 1.58->1.59: add flag to always check transited 205 policy 206 207 * doc/setup.texi: 1.27->1.35: many changes 208 209 * lib/krb5/get_cred.c: 1.95->1.96: get capath info from [capaths] 210 section 211 212 * lib/krb5/rd_req.c: 1.50->1.51: (krb5_decrypt_ticket): try to 213 verify transited realms, unless the transited-policy-checked flag 214 is set 215 216 * lib/krb5/transited.c: 217 1.12: (krb5_domain_x500_decode): set *num_realms to zero not num_realms 218 1.11: (krb5_domain_x500_decode): handle zero length tr data; 219 (krb5_check_transited): new function that does more useful stuff 220 221 * kdc/kdc.8: 1.23->1.24: document enforce-transited-policy 222 223 * kdc/config.c: 1.47->1.48: add flag to always check transited 224 policy 225 226 * kdc/kerberos5.c: 227 1.150: (fix_transited_encoding): also verify with policy, 228 unless asked not to 229 1.151: always check transited policy if flag set either globally 230 (on principal part of patch not pulled up) 231 1.152: (fix_transited_encoding): set transited type 232 1.153: (fix_transited_encoding): always print cross-realm information 233 2342003-10-06 Love H�rnquist �strand <lha@it.su.se> 235 236 * lib/krb5/config_file.c: 1.48->1.49: 237 (krb5_config_parse_file_debug): punt if there is binding before a 238 section declaration. 239 Bug found by Arkadiusz Miskiewicz <arekm@pld-linux.org> 240 241 * kdc/kaserver.c: 1.21->1.23: 242 (do_getticket): if times data is shorter then 8 bytes, request is 243 malformed. 244 (do_authenticate): if request length is less then 8 bytes, its a 245 bad request and fail. Pointed out by Marco Foglia <marco@foglia.org> 246 2472003-09-22 Love H�rnquist �strand <lha@it.su.se> 248 249 * lib/krb5/verify_krb5_conf.c: 1.17->1.18: add missing " within 250 #if 0 From: stefan sokoll <stefansokoll@yahoo.de> 251 2522003-09-19 Love H�rnquist �strand <lha@it.su.se> 253 254 * lib/krb5/rd_req.c: 255 1.47->1.48: (krb5_rd_req): allow caller to pass in a key 256 in the auth_context, they way processes that doesn't use the 257 keytab can still pass in the key of the service (matches behavior 258 of MIT Kerberos). 259 2602003-09-18 Love H�rnquist �strand <lha@it.su.se> 261 262 * lib/krb5/crypto.c: 263 1.87->1.88: (usage2arcfour): simplify, only 264 include special cases From: Luke Howard <lukeh@PADL.COM> 265 1.86->1.87: (arcfour_checksum_p): return true when is arcfour, 266 not when its not pointed out by Luke Howard 267 1.82->1.83: Do the arcfour checksum mapping for 268 krb5_create_checksum and krb5_verify_checksum, From: Luke Howard 269 <lukeh@PADL.COM> 270 1.81->1.82: (hmac): make it return an error 271 when out of memory, update callsites to either return error or use 272 krb5_abortx 273 (krb5_hmac): expose hmac 274 * lib/krb5/mk_req_ext.c: 1.26->1.27: (krb5_mk_req_internal): 275 when using arcfour-hmac-md5, use an unkeyed checksum 276 (rsa-md5), since Microsoft calculates the keyed checksum with 277 the subkey of the authenticator. 278 279 * lib/krb5/get_cred.c: 280 1.93->1.94 (init_tgs_req): make generation of subkey 281 optional on configuration parameter 282 [realms]realm={tgs_require_subkey=bool} 283 defaults to off. The RFC1510 weakly defines the correct behavior, 284 so old DCE secd apparently required the subkey to be there, and MS 285 will use it when its there. But the request isn't encrypted in the 286 subkey, so you get to choose if you want to talk to a MS mdc or a 287 old DCE secd. 288 289 partly 1.91->1.92: (init_tgs_req): in case of error, don't 290 free in the req_body addresses since they where pass in by caller 291 292 lib/krb5/get_in_tkt.c: 293 1.108->1.1.09: (krb5_get_in_tkt): for compatibility with with 294 the mit implemtation, don't free `creds' argument when done, its up 295 the the caller to do that, also allow a NULL ccache. 296 297 * doc/ack.texi 298 1.16->1.17: update Luke Howard email address 299 300 * lib/hdb/hdb-ldap.c: 301 1.13->1.14: code rewrite from Luke Howard <lukeh@PADL.COM> 302 1.12->1.13: (LDAP_store): log what principal/dn failed 303 1.11->1.12: use int2HDBFlags/HDBFlags2int 304 From: Alberto Patino <jalbertop@aranea.com.mx>, 305 Luke Howard <lukeh@PADL.COM> 306 Pointed out by Andrew Bartlett of Samba 307 1.10->1.11: (LDAP__connect): bind sasl "EXTERNAL" to ldap connection 308 (LDAP_store): remove superfluous argument to asprintf 309 From Alberto Patino <jalbertop@aranea.com.mx> 310 311 * lib/krb5/krb5.h: 312 1.214->1.2015: add KEYTYPE_ARCFOUR_56 313 3142003-09-12 Love H�rnquist �strand <lha@it.su.se> 315 316 * lib/krb5/config_file.c: fix prototypes Fredrik Ljungberg 317 <flag@pobox.se> 318 3192003-09-11 Love H�rnquist �strand <lha@it.su.se> 320 321 * lib/hdb/hdb_locl.h: 1.18->1.19: include <limits.h> for ULONG_MAX 322 noted by Wissler Magnus <M.Wissler@abalon.se> on heimdal-discuss 323 3242003-08-29 Love H�rnquist �strand <lha@it.su.se> 325 326 * lib/hdb/db3.c: 1.8->1.9: patch for working with DB4 on 327 heimdal-discuss From: Luke Howard <lukeh@PADL.COM> 1.9->1.10: try 328 to include more db headers 329 3302003-08-25 Love H�rnquist �strand <lha@it.su.se> 331 332 * kdc/connect.c: 1.92->1.93 (handle_tcp): handle recvfrom 333 returning 0 (connection closed) 1.91->1.92: (grow_descr): 334 increment the size after we succeed to allocate the space 335 3362003-08-15 Love H�rnquist �strand <lha@it.su.se> 337 338 * lib/krb5/principal.c: 1.83->1.85: (unparse_name): len can't be 339 zero, so, don't check for that 340 (unparse_name): make sure there are space for a NUL, set *name to NULL 341 when there is a failure (so caller can't get hold of a freed 342 pointer) 343 3442003-05-08 Johan Danielsson <joda@ratatosk.pdc.kth.se> 345 346 * Release 0.6 347 3482003-05-08 Love H�rnquist �strand <lha@it.su.se> 349 350 * kuser/klist.c: 1.68->1.69: print tokens even if there isn't v4 351 support 352 353 * kuser/kdestroy.c: 1.14->1.15: destroy tokens even if there isn't 354 v4 support 355 356 * kuser/kinit.c: 1.90->1.91: print tokens even if there isn't v4 357 support 358 3592003-05-06 Johan Danielsson <joda@pdc.kth.se> 360 361 * lib/krb5/name-45-test.c: need to use empty krb5.conf for some 362 tests 363 364 * lib/asn1/check-gen.c: there is no \e escape sequence; replace 365 everything with hex-codes, and cast to unsigned char* to make some 366 compilers happy 367 3682003-05-06 Love H�rnquist �strand <lha@it.su.se> 369 370 * lib/krb5/get_in_tkt.c (make_pa_enc_timestamp): make sure first 371 argument to krb5_us_timeofday have correct type 372 3732003-05-05 Assar Westerlund <assar@kth.se> 374 375 * include/make_crypto.c (main): include aes.h if ENABLE_AES 376 3772003-05-05 Love H�rnquist �strand <lha@it.su.se> 378 379 * NEWS: 1.108->1.110: fix text about gssapi compat 380 3812003-04-28 Love H�rnquist �strand <lha@it.su.se> 382 383 * kdc/v4_dump.c: 1.4->1.5: (v4_prop_dump): limit strings length, 384 from openbsd 385 3862003-04-24 Love H�rnquist �strand <lha@it.su.se> 387 388 * doc/programming.texi: 1.2-1.3: s/managment/management/, from jmc 389 <jmc@prioris.mini.pw.edu.pl> 390 3912003-04-22 Love H�rnquist �strand <lha@it.su.se> 392 393 * lib/krb5/krbhst.c: 1.43->1.44: copy NUL too, from janj@wenf.org 394 via openbsd 395 3962003-04-17 Love H�rnquist �strand <lha@it.su.se> 397 398 * lib/asn1/der_copy.c (copy_general_string): use strdup 399 * lib/asn1/der_put.c: remove sprintf 400 * lib/asn1/gen.c: remove strcpy/sprintf 401 402 * lib/krb5/name-45-test.c: use a more unique name then ratatosk so 403 that other (me) have such hosts in the local domain and the tests 404 fails, to take hokkigai.pdc.kth.se instead 405 406 * lib/krb5/test_alname.c: add --version and --help 407 4082003-04-16 Love H�rnquist �strand <lha@it.su.se> 409 410 * lib/krb5/krb5_warn.3: add krb5_get_err_text 411 412 * lib/krb5/transited.c: use strlcat/strlcpy, from openbsd 413 * lib/krb5/krbhst.c (srv_find_realm): use strlcpy, from openbsd 414 * lib/krb5/aname_to_localname.c (krb5_aname_to_localname): use 415 strlcpy, from openbsd 416 * kdc/hpropd.c: s/strcat/strlcat/, inspired from openbsd 417 * appl/kf/kfd.c: use strlcpy, from openbsd 418 4192003-04-16 Johan Danielsson <joda@pdc.kth.se> 420 421 * configure.in: fix for large file support in AIX, _LARGE_FILES 422 needs to be defined on the command line, since lex likes to 423 include stdio.h before we get to config.h 424 4252003-04-16 Love H�rnquist �strand <lha@it.su.se> 426 427 * lib/krb5/*.3: Change .Fd #include <header.h> to .In header.h, 428 from Thomas Klausner <wiz@netbsd.org> 429 430 * lib/krb5/krb5.conf.5: spelling, from Thomas Klausner 431 <wiz@netbsd.org> 432 4332003-04-15 Love H�rnquist �strand <lha@it.su.se> 434 435 * kdc/kerberos5.c: fix some more memory leaks 436 4372003-04-11 Love H�rnquist �strand <lha@it.su.se> 438 439 * appl/kf/kf.1: spelling, from jmc <jmc@prioris.mini.pw.edu.pl> 440 4412003-04-08 Love H�rnquist �strand <lha@it.su.se> 442 443 * admin/ktutil.8: typos, from jmc <jmc@acn.waw.pl> 444 4452003-04-06 Love H�rnquist �strand <lha@it.su.se> 446 447 * lib/krb5/krb5.3: s/kerberos/Kerberos/ 448 * lib/krb5/krb5_data.3: s/kerberos/Kerberos/ 449 * lib/krb5/krb5_address.3: s/kerberos/Kerberos/ 450 * lib/krb5/krb5_ccache.3: s/kerberos/Kerberos/ 451 * lib/krb5/krb5.conf.5: s/kerberos/Kerberos/ 452 * kuser/kinit.1: s/kerberos/Kerberos/ 453 * kdc/kdc.8: s/kerberos/Kerberos/ 454 4552003-04-01 Love H�rnquist �strand <lha@it.su.se> 456 457 * lib/krb5/test_alname.c: more krb5_aname_to_localname tests 458 459 * lib/krb5/aname_to_localname.c (krb5_aname_to_localname): when 460 converting too root, make sure user is ok according to 461 krb5_kuserok before allowing it. 462 463 * lib/krb5/Makefile.am (noinst_PROGRAMS): += test_alname 464 465 * lib/krb5/test_alname.c: add test for krb5_aname_to_localname 466 467 * lib/krb5/crypto.c (krb5_DES_AFS3_CMU_string_to_key): used p1 468 instead of the "illegal" salt #~, same change as kth-krb did 469 1999. Problems occur with crypt() that behaves like AT&T crypt 470 (openssl does this). Pointed out by Marcus Watts. 471 472 * admin/change.c (kt_change): collect all principals we are going 473 to change, and pick the highest kvno and use that to guess what 474 kvno the resulting kvno is going to be. Now two ktutil change in a 475 row works. XXX fix the protocol to pass the kvno back. 476 4772003-03-31 Love H�rnquist �strand <lha@it.su.se> 478 479 * appl/kf/kf.1: afs->AFS, from jmc <jmc@acn.waw.pl> 480 4812003-03-30 Love H�rnquist �strand <lha@it.su.se> 482 483 * doc/setup.texi: add description on how to turn on v4, 524 and 484 kaserver support 485 4862003-03-29 Love H�rnquist �strand <lha@it.su.se> 487 488 * lib/krb5/verify_krb5_conf.c (appdefaults_entries): add afslog 489 and afs-use-524 490 4912003-03-28 Love H�rnquist �strand <lha@it.su.se> 492 493 * kdc/kerberos5.c (as_rep): when the second enctype_to_string 494 failes, remember to free memory from the first enctype_to_string 495 496 * lib/krb5/crypto.c (usage2arcfour): map KRB5_KU_TICKET to 2, 497 from Harald Joerg <harald.joerg@fujitsu-siemens.com> 498 (enctype_arcfour_hmac_md5): disable checksum_hmac_md5_enc 499 500 * lib/hdb/mkey.c (hdb_unseal_keys_mkey): truncate key to the key 501 length when key is longer then expected length, its probably 502 longer since the encrypted data was padded, reported by Aidan 503 Cully <aidan@kublai.com> 504 505 * lib/krb5/crypto.c (krb5_enctype_keysize): return key size of 506 encyption type, inspired by Aidan Cully <aidan@kublai.com> 507 5082003-03-27 Love H�rnquist �strand <lha@it.su.se> 509 510 * lib/krb5/keytab.c (krb5_kt_get_entry): avoid printing 0 511 (wildcard kvno) after principal when the keytab entry isn't found, 512 reported by Chris Chiappa <chris@chiappa.net> 513 5142003-03-26 Love H�rnquist �strand <lha@it.su.se> 515 516 * doc/misc.texi: update 2b example to match reality (from 517 mattiasa@e.kth.se) 518 519 * doc/misc.texi: spelling and add `Configuring AFS clients' 520 subsection 521 5222003-03-25 Love H�rnquist �strand <lha@it.su.se> 523 524 * lib/krb5/krb5.3: add krb5_free_data_contents.3 525 526 * lib/krb5/data.c: add krb5_free_data_contents for compat with MIT 527 API 528 529 * lib/krb5/krb5_data.3: add krb5_free_data_contents for compat 530 with MIT API 531 532 * lib/krb5/krb5_verify_user.3: write more about how the ccache 533 argument should be inited when used 534 5352003-03-25 Johan Danielsson <joda@pdc.kth.se> 536 537 * lib/krb5/addr_families.c (krb5_print_address): make sure 538 print_addr is defined for the given address type; make addrports 539 printable 540 541 * kdc/string2key.c: print the used enctype for kerberos 5 keys 542 5432003-03-25 Love H�rnquist �strand <lha@it.su.se> 544 545 * lib/krb5/aes-test.c: add another arcfour test 546 5472003-03-22 Love H�rnquist �strand <lha@it.su.se> 548 549 * lib/krb5/aes-test.c: sneek in a test for arcfour-hmac-md5 550 5512003-03-20 Love H�rnquist �strand <lha@it.su.se> 552 553 * lib/krb5/krb5_ccache.3: update .Dd 554 555 * lib/krb5/krb5.3: sort in krb5_data functions 556 557 * lib/krb5/Makefile.am (man_MANS): += krb5_data.3 558 559 * lib/krb5/krb5_data.3: document krb5_data 560 561 * lib/krb5/init_creds_pw.c (krb5_get_init_creds_password): if 562 prompter is NULL, don't try to ask for a password to 563 change. reported by Iain Moffat @ ufl.edu via Howard Chu 564 <hyc@highlandsun.com> 565 5662003-03-19 Love H�rnquist �strand <lha@it.su.se> 567 568 * lib/krb5/krb5_keytab.3: spelling, from 569 <jmc@prioris.mini.pw.edu.pl> 570 571 * lib/krb5/krb5.conf.5: . means new line 572 573 * lib/krb5/krb5.conf.5: spelling, from 574 <jmc@prioris.mini.pw.edu.pl> 575 576 * lib/krb5/krb5_auth_context.3: spelling, from 577 <jmc@prioris.mini.pw.edu.pl> 578 5792003-03-18 Love H�rnquist �strand <lha@it.su.se> 580 581 * kuser/Makefile.am: INCLUDES: -I$(srcdir)/../lib/krb5 582 583 * lib/krb5/convert_creds.c: add _krb5_krb_life_to_time 584 585 * lib/krb5/krb5-v4compat.h: add _krb5_krb_life_to_time 586 587 * kdc/kdc_locl.h: 524 is independent of kerberos 4, so move out 588 #ifdef KRB4 from enable_v4_cross_realm since 524 needs it 589 590 * kdc/config.c: 524 is independent of kerberos 4, so move out 591 enable_v4_cross_realm from #ifdef KRB4 since 524 needs it 592 5932003-03-17 Assar Westerlund <assar@kth.se> 594 595 * kdc/kdc.8: document --kerberos4-cross-realm 596 * kdc/kerberos4.c: pay attention to enable_v4_cross_realm 597 * kdc/kdc_locl.h (enable_v4_cross_realm): add 598 * kdc/524.c (encode_524_response): check the enable_v4_cross_realm 599 flag before giving out v4 tickets for foreign v5 principals 600 * kdc/config.c: add --enable-kerberos4-cross-realm option (default 601 to off) 602 6032003-03-17 Love H�rnquist �strand <lha@it.su.se> 604 605 * lib/krb5/Makefile.am (man_MANS) += krb5_aname_to_localname.3 606 607 * lib/krb5/krb5_aname_to_localname.3: manpage for 608 krb5_aname_to_localname 609 610 * lib/krb5/krb5_kuserok.3: s/KRB5_USEROK/KRB5_KUSEROK/ 611 6122003-03-16 Love H�rnquist �strand <lha@it.su.se> 613 614 * lib/krb5/Makefile.am (man_MANS): add krb5_set_default_realm.3 615 616 * lib/krb5/krb5.3: add manpages from krb5_set_default_realm.3 617 618 * lib/krb5/krb5_set_default_realm.3: Manpage for 619 krb5_free_host_realm, krb5_get_default_realm, 620 krb5_get_default_realms, krb5_get_host_realm, and 621 krb5_set_default_realm. 622 623 * admin/ktutil.8: s/entype/enctype/, from Igor Sobrado 624 <sobrado@acm.org> via NetBSD 625 626 * lib/krb5/krb5_keytab.3: add documention for krb5_kt_get_type 627 628 * lib/krb5/keytab.c (krb5_kt_get_type): get prefix/type of keytab 629 630 * lib/krb5/krb5.h (KRB5_KT_PREFIX_MAX_LEN): max length of prefix 631 632 * lib/krb5/krb5_ccache.3: document krb5_cc_get_ops, add more 633 types, add krb5_fcc_ops and krb5_mcc_ops 634 635 * lib/krb5/cache.c (krb5_cc_get_ops): new function, return ops for 636 a id 637 6382003-03-15 Love H�rnquist �strand <lha@it.su.se> 639 640 * doc/intro.texi: add reference to source code, binaries and the 641 manual 642 643 * lib/krb5/krb5.3: krb5.h isn't in krb5 directory in heimdal 644 6452003-03-14 Love H�rnquist �strand <lha@it.su.se> 646 647 * kdc/kdc.8: better/difrent english 648 649 * kdc/kdc.8: . -> .\n, copyright/license 650 651 * kdc/kdc.8: changed configuration file -> restart kdc 652 653 * kdc/kerberos4.c: add krb4 into the most error messages written 654 to the logfile 655 656 * lib/krb5/krb5_ccache.3: add missing name of argument 657 (krb5_context) to most functions 658 6592003-03-13 Love H�rnquist �strand <lha@it.su.se> 660 661 * lib/krb5/kuserok.c (krb5_kuserok): preserve old behviour of 662 function and return FALSE when there isn't a local account for 663 `luser'. 664 665 * lib/krb5/krb5_kuserok.3: fix prototype, spelling and more text 666 describing the function 667 6682003-03-12 Love H�rnquist �strand <lha@it.su.se> 669 670 * lib/krb5/cache.c (krb5_cc_default): if krb5_cc_default_name 671 returned memory, don't return ENOMEM 672 6732003-03-11 Love H�rnquist �strand <lha@it.su.se> 674 675 * lib/krb5/krb5.3: add krb5_address stuff and sort 676 677 * lib/krb5/krb5_address.3: fix krb5_addr2sockaddr description 678 679 * lib/krb5/Makefile.am (man_MANS): += krb5_address.3 680 681 * lib/krb5/krb5_address.3: document types krb5_address and 682 krb5_addresses and their helper functions 683 6842003-03-10 Love H�rnquist �strand <lha@it.su.se> 685 686 * lib/krb5/Makefile.am (man_MANS): += krb5_kuserok.3 687 688 * lib/krb5/krb5_kuserok.3: spelling, from cizzi@it.su.se 689 690 * lib/krb5/Makefile.am (man_MANS): += krb5_ccache.3 691 692 * lib/krb5/krb5_ccache.3: spelling, from cizzi@it.su.se 693 694 * lib/krb5/krb5.3: add more functions 695 696 * lib/krb5/krb5_ccache.3: document krb5_ccache and krb5_cc 697 functions 698 699 * lib/krb5/krb5_kuserok.3: document krb5_kuserok 700 701 * lib/krb5/krb5_verify_user.3: document 702 krb5_verify_opt_set_flags(opt, KRB5_VERIFY_LREALMS) behavior 703 704 * lib/krb5/krb5_verify_user.3: document krb5_verify_opt* and 705 krb5_verify_user_opt 706 707 * lib/krb5/*.[0-9]: add copyright/licenses on more manpages 708 709 * kuser/kdestroy.c (main): handle that krb5_cc_default_name can 710 return NULL 711 712 * lib/krb5/Makefile.am (libkrb5_la_LDFLAGS): bump minor 713 (TESTS): add test_cc 714 715 * lib/krb5/test_cc.c: test some 716 krb5_cc_default_name/krb5_cc_set_default_name combinations 717 718 * lib/krb5/context.c (init_context_from_config_file): set 719 default_cc_name to NULL 720 (krb5_free_context): free default_cc_name if set 721 722 * lib/krb5/cache.c (krb5_cc_set_default_name): new function 723 (krb5_cc_default_name): use krb5_cc_set_default_name 724 725 * lib/krb5/krb5.h (krb5_context_data): add default_cc_name 726 7272003-02-25 Love H�rnquist �strand <lha@it.su.se> 728 729 * appl/kf/kf.1: s/securly/securely/ from NetBSD 730 7312003-02-18 Love H�rnquist �strand <lha@it.su.se> 732 733 * kdc/connect.c: s/intialize/initialize, from 734 <jmc@prioris.mini.pw.edu.pl> 735 7362003-02-17 Love H�rnquist �strand <lha@it.su.se> 737 738 * configure.in: add AM_MAINTAINER_MODE 739 7402003-02-16 Love H�rnquist �strand <lha@it.su.se> 741 742 * **/*.[0-9]: add copyright/licenses on all manpages 743 7442003-14-16 Jacques Vidrine <nectar@kth.se> 745 746 * lib/krb5/get_in_tkt.c (init_as_req): Send only a single 747 PA-ENC-TIMESTAMP in the AS-REQ, using the first encryption 748 type specified by the KDC. 749 7502003-02-15 Love H�rnquist �strand <lha@it.su.se> 751 752 * fix-export: some autoconf put their version number in 753 autom4te.cache, so remove autom4te*.cache 754 755 * fix-export: make sure $1 is a directory 756 7572003-02-04 Love H�rnquist �strand <lha@it.su.se> 758 759 * kpasswd/kpasswdd.8: spelling, from jmc <jmc@prioris.mini.pw.edu.pl> 760 761 * kdc/kdc.8: spelling, from jmc <jmc@prioris.mini.pw.edu.pl> 762 7632003-01-31 Love H�rnquist �strand <lha@it.su.se> 764 765 * kdc/hpropd.8: s/databases/a database/ s/Not/not/ 766 767 * kdc/hprop.8: add missing . 768 7692003-01-30 Love H�rnquist �strand <lha@it.su.se> 770 771 * lib/krb5/krb5.conf.5: documentation for of boolean, etypes, 772 address, write out encryption type in sentences, s/Host/host 773 7742003-01-26 Love H�rnquist �strand <lha@it.su.se> 775 776 * lib/asn1/check-gen.c: add checks for Authenticator too 777 7782003-01-25 Love H�rnquist �strand <lha@it.su.se> 779 780 * doc/setup.texi: in the hprop example, use hprop and the first 781 component, not host 782 783 * lib/krb5/get_addrs.c (find_all_addresses): address-less 784 point-to-point might not have an address, just ignore 785 those. Reported by Harald Barth. 786 7872003-01-23 Love H�rnquist �strand <lha@it.su.se> 788 789 * lib/krb5/verify_krb5_conf.c (check_section): when key isn't 790 found, don't print out all known keys 791 792 * lib/krb5/verify_krb5_conf.c (syslogvals): mark up where severity 793 and facility start resp 794 (check_log): find_value() returns -1 when key isn't found 795 796 * lib/krb5/crypto.c (_krb5_aes_cts_encrypt): make key argument a 797 'const void *' to avoid AES_KEY being exposed in krb5-private.h 798 799 * lib/krb5/krb5.conf.5: add [kdc]use_2b 800 801 * kdc/524.c (encode_524_response): its 2b not b2 802 803 * doc/misc.texi: quote @ where missing 804 805 * lib/asn1/Makefile.am: add check-gen 806 807 * lib/asn1/check-gen.c: add Principal check 808 809 * lib/asn1/check-common.h: move generic asn1/der functions from 810 check-der.c to here 811 812 * lib/asn1/check-common.c: move generic asn1/der functions from 813 check-der.c to here 814 815 * lib/asn1/check-der.c: move out the generic asn1/der functions to 816 a common file 817 8182003-01-22 Love H�rnquist �strand <lha@it.su.se> 819 820 * doc/misc.texi: more text about afs, how to get get your KeyFile, 821 and how to start use 2b tokens 822 823 * lib/krb5/krb5.conf.5: spelling, from Jason McIntyre 824 <jmc@cvs.openbsd.org> 825 8262003-01-21 Jacques Vidrine <nectar@kth.se> 827 828 * kuser/kuser_locl.h: include crypto-headers.h for 829 des_read_pw_string prototype 830 8312003-01-16 Love H�rnquist �strand <lha@it.su.se> 832 833 * admin/ktutil.8: document -v, --verbose 834 835 * admin/get.c (kt_get): make getarg usage consistent with other 836 other parts of ktutil 837 838 * admin/copy.c (kt_copy): remove adding verbose_flag to args 839 struct, since it will overrun the args array (from Sumit Bose) 840 8412003-01-15 Love H�rnquist �strand <lha@it.su.se> 842 843 * lib/krb5/krb5.conf.5: write more about [realms] REALM = { kdc = 844 ... } 845 846 * lib/krb5/aes-test.c: test vectors in aes-draft 847 848 * lib/krb5/Makefile.am: add aes-test.c 849 850 * lib/krb5/crypto.c: Add support for AES 851 (draft-raeburn-krb-rijndael-krb-02), not enabled by default. 852 (HMAC_SHA1_DES3_checksum): rename to SP_HMAC_SHA1_checksum and modify 853 to support checksumtype that are have a shorter wireformat then 854 their output block size. 855 856 * lib/krb5/crypto.c (struct encryption_type): split the blocksize 857 into blocksize and padsize, padsize is the minimum padding 858 size. they are the same for now 859 (enctype_*): add padsize 860 (encrypt_internal): use padsize 861 (encrypt_internal_derived): use padsize 862 (wrapped_length): use padsize 863 (wrapped_length_dervied): use padsize 864 865 * lib/krb5/crypto.c: add extra `opaque' argument to string_to_key 866 function for each enctype in preparation enctypes that uses 867 `Encryption and Checksum Specifications for Kerberos 5' draft 868 869 * lib/asn1/k5.asn1: add checksum and enctype for AES from 870 draft-raeburn-krb-rijndael-krb-02.txt 871 872 * lib/krb5/krb5.h (krb5_keytype): add KEYTYPE_AES128, 873 KEYTYPE_AES256 874 8752003-01-14 Love H�rnquist �strand <lha@it.su.se> 876 877 * lib/hdb/common.c (_hdb_fetch): handle error code from 878 hdb_value2entry 879 880 * kdc/Makefile.am: always include kerberos4.c and 524.c in 881 kdc_SOURCES to support 524 882 883 * kdc/524.c: always compile in support for 524 884 885 * kdc/kdc_locl.h: move out krb/524 protos from under #ifdef KRB4 886 887 * kdc/config.c: always compile in support for 524 888 889 * kdc/connect.c: always compile in support for 524 890 891 * kdc/kerberos4.c: export encode_v4_ticket() and get_des_key() 892 even when we build without kerberos 4, 524 needs them 893 894 * lib/krb5/convert_creds.c, lib/krb5/krb5-v4compat.h: Split out 895 Kerberos 4 help functions/structures so other parts of the source 896 tree can use it (like the KDC) 897 898