1 2005-05-29 Love Hörnquist Åstrand <lha@it.su.se>
3 * lib/krb5/krb5_principal.3: Spelling, from Björn Sandell
5 * doc/setup.texi: spelling, from Björn Sandell
7 * lib/krb5/name-45-test.c: XXX don't run the test unless the
8 machine is in kth.se or su.se because it depends on local resolver
11 * lib/hdb/hdb.c: provde RTLD_NOW and RTLD_GLOBAL if they don't
14 * kcm/connect.c: fix doors support, fix signedness warnings
16 * kcm/config.c: add --door-path=
18 * configure.in: comment what the "detect doors on solaris"
21 * kcm/acquire.c (generate_random_pw): fix signed-ness warnings
23 * kcm/connect.c (update_client_creds): fix compile error in the
26 * lib/krb5/test_cc.c: change format for expantion variables in
27 default_cc_name to %{variable} to not confuse them with shell
30 * kcm/headers.h: Maybe include <door.h>.
32 * kcm/kcm_locl.h: add extern door_path;
34 * configure.in: detect doors using door_create
36 * kcm/Makefile.am: add dependcy on kcm_protos.h add lib depency on
39 * lib/krb5/kcm.h: add _PATH_KCM_DOOR, default path to kcm door
41 * lib/krb5/kcm.c: use [libdefaults]kcm_door to find the door to
44 * lib/krb5/Makefile.am: libkrb5_la_LIBADD += LIB_door_create
46 * lib/krb5/krb5_locl.h: Maybe include <sys/mman.h>, maybe include
49 * lib/krb5/kcm.c (kcm_send_request): add support for doing a door
52 * lib/asn1: prefix Der_class with ASN1_C_ to avoid problems with
53 system headerfiles that pollute the name space
55 * kcm/kcm.8: change format for expantion variables in
56 default_cc_name to %{variable} to not confuse them with shell
59 * lib/krb5/krb5.conf.5: change format for expantion variables in
60 default_cc_name to %{variable} to not confuse them with shell
63 * lib/krb5/cache.c (_krb5_expand_default_cc_name): change format
64 for expantion variables to %{variable} to not confuse them with
67 * kcm/connect.c: add LOCAL_PEERCRED and experimental doors support
69 2005-05-27 Love Hörnquist Åstrand <lha@it.su.se>
71 * appl/kf/kfd.c: case uid_t to unsigned long in printf format
73 2005-05-25 Love Hörnquist Åstrand <lha@it.su.se>
75 * lib/krb5/krb5_auth_context.3: remove trailing space
77 2005-05-24 Love Hörnquist Åstrand <lha@it.su.se>
79 * kcm/connect.c (do_request): use sendmsg to send the reply
81 * fix-export: add make_proto for kcm/kcm_protos.h
83 * kcm/kcm_locl.h: remove prototypes and add <kcm_protos.h>
85 * kcm/Makefile.am (kcm_SOURCES): add headerfiles
86 (kcm_protos.h): generate prototypes
88 * kcm/protocol.c: fix error in last commit, use right function
90 * kcm/headers.h: include <ucred.h> if we have getpeerucred
92 * configure.in: check for functions getpeerucred and getpeereid
94 * kcm/connect.c (update_client_creds): add support for
95 getpeerucred and getpeereid
97 * lib/krb5/kcm.c (kcm_alloc): allow kcm socket to be configured by
98 [libdefaults]kcm_socket=/path
100 2005-05-24 David Love <fx@gnu.org>
102 * kcm/kcm.8: KRB5CCNAME needs an literal uid, not ${uid}, spelling
104 2005-05-23 Love Hörnquist Åstrand <lha@it.su.se>
106 * kcm/protocol.c: Merge the description and function jumptables
107 into one structure. Use the length of the array when checking if
108 opcode is value, not a constant.
110 * kcm/kcm_locl.h: struct kcm_op: jumptable structure
112 * kcm/main.c: move declaration of detach_from_console away from
113 here to kcm_locl.h, Don't test HAVE_DAEMON since roken supplies it.
115 * kcm/kcm_locl.h: move declaration of detach_from_console here
117 * kdc/config.c: Don't test HAVE_DAEMON since roken supplies it.
119 2005-05-23 Dave Love <fx@gnu.org>
121 * kcm/config.c: Don't test HAVE_DAEMON since roken supplies it.
123 * kdc/main.c: Don't test HAVE_DAEMON since roken supplies it.
125 2005-05-23 Love Hörnquist Åstrand <lha@it.su.se>
127 * lib/krb5/krb5_keytab.3: document WRFILE and JAVA14
129 2005-05-20 Love Hörnquist Åstrand <lha@it.su.se>
131 * lib/krb5/krbhst.c (srv_get_hosts): if srv_get_hosts failes,
132 return and ignore the error
134 * lib/krb5/krbhst.c (srv_find_realm): make sure `res' and `count'
137 * lib/krb5/test_keytab.c: tests all keytab format
139 2005-05-19 Love Hörnquist Åstrand <lha@it.su.se>
141 * lib/krb5/pkinit.c (_krb5_pk_rd_pa_reply): non non asn1 decoding
142 errors, fail. Make sure we free memory on error.
143 (pk_verify_chain_standard): make sure we provide good errors.
145 * lib/krb5/verify_krb5_conf.c: add missing options, prompted by
146 James F. Hranicky mail to heimdal-discuss
148 * lib/krb5/verify_krb5_conf.c: add pkinit and password quailty
151 * lib/krb5/pkinit.c (pk_verify_chain_standard): store better error
152 message in the context for certificate errors.
154 * lib/krb5/keytab.c (krb5_kt_free_entry): zero out content of all
155 krb5_free_x_content like functions to make sure data doesnt get
156 reused, idea from Wynn Wilkes <wwilkes@vintela.com>
158 * configure.in: depend on automake 1.8, we don't test anything
161 * lib/krb5/init_creds_pw.c (process_pa_data_to_md): add comment
162 that the caller always free out_md; remove comment about memory,
164 (init_cred_loop): free ctx->as_req.padata when its reset (From Wynn
165 Wilkes <wwilkes@vintela.com>), move a comment close the the code
167 * lib/krb5/keytab_krb4.c (fkt_remove_entry): need to call
168 krb5_kt_free_entry after each krb5_kt_next_entry.
170 * lib/krb5/keytab_file.c (fkt_remove_entry): need to call
171 krb5_kt_free_entry after each fkt_next_entry_int. From: Wynn
172 Wilkes <wwilkes@vintela.com>
174 2005-05-18 Love Hörnquist Åstrand <lha@it.su.se>
176 * lib/krb5/Makefile.am: TESTS += test_keytab
178 * lib/krb5/keytab_krb4.c (krb4_kt_remove_entry): plug memory leaks,
179 avoid crashing on empty keytab
181 * lib/krb5/krb5_keytab.3: document behavior of
184 * lib/krb5/keytab_memory.c (mkt_remove_entry): check if there
185 isn't any entries in the keytab before removing any since that
186 leads to bad pointer arithmetic and crashing. From: Wynn Wilkes
187 <wwilkes@vintela.com>. Make the function return KRB5_KT_NOTFOUND
188 if the entry wasn't in the keytab (just like the filebased
191 * lib/krb5/test_keytab.c: test memory corruption in MEMORY keytab
193 * lib/krb5{addr_families,context,creds,free,keyblock,
194 mit_glue,rd_error}.c:zero out content of all krb5_free_x_content
195 like functions to make sure data doesnt get reused, idea from
196 Wynn Wilkes <wwilkes@vintela.com>
198 * lib/krb5/krb5_get_credentials.3: document KRB5_GC_EXPIRED_OK
200 * lib/krb5/krb5.3: add krb5_cc_new_unique
202 2005-05-17 Love Hörnquist Åstrand <lha@it.su.se>
204 * lib/krb5/fcache.c (fcc_get_first): check return value from
205 malloc, memset the structure, make sure cursor doesn't point to
206 freed memory on failure. From: Wynn Wilkes <wwilkes@vintela.com>
208 * lib/krb5/krb5_auth_context.3: document
209 KRB5_AUTH_CONTEXT_CLEAR_FORWARDED_CRED
211 * lib/krb5/get_cred.c: Remove expired credentials, based on
212 patches and comments from Anders Magnusson <ragge@ltu.se> and Wynn
213 Wilkes <wwilkes@vintela.com>
215 * lib/krb5/get_for_creds.c (krb5_get_forwarded_creds): honor
216 KRB5_AUTH_CONTEXT_CLEAR_FORWARDED_CRED and create unencrypted
217 (ENCTYPE_NULL) credentials. for use with old mit server and java based
218 ones as they can't handle encrypted KRB-CRED. Note that the option
219 needs to turned on because if the consumer sends the KRB-CRED in
220 clear bad things will happen.
222 * lib/krb5/context.c (krb5_init_context): register krb5_javakt_ops
224 * lib/krb5/krb5.h: KRB5_GC_EXPIRED_OK: expired credentials is ok
225 to return from krb5_get_credentials.
226 KRB5_AUTH_CONTEXT_CLEAR_FORWARDED_CRED: make forward credentials
227 be unencrypted, for compatibility with mit kerberos and java
228 kerberos. krb5_javakt_ops: export
230 2005-05-16 Love Hörnquist Åstrand <lha@it.su.se>
232 * lib/krb5/keytab_file.c: Add new keytab file format JAVA14 that
233 doesn't the use extended kvnos, as hinted, this is needed for
234 Java's Kerberos implementation.
236 2005-05-10 Love Hörnquist Åstrand <lha@it.su.se>
238 * lib/krb5/pkinit.c: handle pkinit-9, pkinit-19, and pkinit-25
241 * kdc/pkinit.c: handle pkinit-9, pkinit-19, and pkinit-25 enckey,
244 * kdc/kerberos5.c (as_rep): search for pkinit-9, pkinit-19, and
245 pkinit-25 pa-data, return empty pkinit pa-data in the
246 PREAUTH_REQUIRED krb-error
248 * doc/ack.texi: add pkinit people
250 * lib/krb5/krb5_storage.3: document krb5_storage_is_flags
252 * lib/krb5/{krb5_compare_creds.3,krb5_get_init_creds.3,
253 krb5_krbhst_init.3,krb5_storage.3}:
254 make more pretty, from Björn Sandell
256 2005-05-09 Dave Love <fx@gnu.org>
258 * doc/setup.texi: Fix and clarify password quality check examples.
260 2005-05-09 Love Hörnquist Åstrand <lha@it.su.se>
262 * lib/krb5/kuserok.c (krb5_kuserok): use POSIX_GETPWNAM_R instead
263 of HAVE_GETPWNAM_R From: Dave Love <d.love@dl.ac.uk>
265 2005-05-07 Love Hörnquist Åstrand <lha@it.su.se>
267 * lib/krb5/addr_families.c (krb5_print_address): catch when the
268 unknown adress don't fit. From Björn Sandell <biorn@dce.chalmers.se>
270 2005-05-05 Dave Love <d.love@dl.ac.uk>
272 * configure.in: fix type right test, include <termios.h> for
273 sys/strtty.h, not sys/ptyvar.h
275 2005-05-05 Love Hörnquist Åstrand <lha@it.su.se>
277 * lib/krb5/krb5.conf.5: spelling
279 2005-05-04 Love Hörnquist Åstrand <lha@it.su.se>
281 * lib/krb5/krb5.conf.5: expand on what "trailing component" means
283 2005-05-04 Johan Danielsson <joda@pdc.kth.se>
285 * lib/krb5/rd_cred.c: put address comparison in separate function
287 * lib/krb5/krb5_kuserok.3: check the user's ~/.k5login.d directory
288 for access files, all of which is handled like the regular
291 * lib/krb5/kuserok.c: check the user's ~/.k5login.d directory for
292 access files, all of which is handled like the regular ~/.k5login
294 2005-05-03 Love Hörnquist Åstrand <lha@it.su.se>
296 * doc/ack.texi: Clearify what version of libdes we are using and
297 who's code in it we are using.
299 * kcm/kcm.8: more text about usage
301 * kcm/Makefile.am: man_MANS += kcm.8
303 * kcm/kcm.8: initial manpage
305 * configure.in: if we have a $srcdir/lib/asn1/pkcs12.asn1, define
308 2005-05-02 Dave Love <fx@gnu.org>
310 * configure.in: sys/tty.h (for sys/ptyvar.h) might need termios.h.
312 2005-05-02 Love Hörnquist Åstrand <lha@it.su.se>
314 * tools/krb5-config.in: add com_err to required libs
316 * lib/krb5/pkinit.c (krb5_ui_method_read_string): use the fill in
319 * lib/krb5/init_creds_pw.c: Now that we fixed the signed-ness of
320 nonce for windows, remove the code that removed the signed
321 bit. Instead add comment that they still need to be the same
322 (Kerberos protocol nonce and pk-init nonce) for Windows.
324 2005-05-02 David Love <fx@gnu.org>
326 * lib/krb5/crypto.c: Don't declare des_salt &c as static with
327 incomplete type (invalid in c89, at least).
329 2005-05-02 Love Hörnquist Åstrand <lha@it.su.se>
331 * lib/krb5/krb5_locl.h: include <crypt.h>
333 2005-05-02 David Love <fx@gnu.org>
335 * kcm/connect.c (init_socket): rename variable sun to un to avoid
337 (handle_stream): Cast arg of krb5_warnx.
339 2005-04-30 Love Hörnquist Åstrand <lha@it.su.se>
341 * lib/krb5/init_creds_pw.c: if we are using PKINIT, strip of the
342 highest bit to make windows PK-INIT happy. Also make the nonces
343 the same, again for windows, they are using pk-init-9.
345 XXX check if it isn't the that nonce is an unsigned variable so
346 its just a asn1 mismatch.
348 * kdc/pkinit.c: pass a NULL prompter data to _krb5_pk_load_openssl_id
350 * kuser/kinit.c: krb5_get_init_creds_opt_set_pkinit
352 * lib/krb5/pkinit.c: Pass prompter data to the prompter function,
353 implement a UI prompter function wrapping the kerberos prompter
354 function so that the the OpenSSL ENGINE can ask for a password
355 when loading the private key. From: Douglas E. Engert
357 * lib/krb5: add <err.h> in test programs
359 * configure.in: sys/ptyvar.h might need <sys/tty.h>
361 * lib/krb5/Makefile.am: use LIB_com_err for libkrb5.la
363 2005-04-29 Love Hörnquist Åstrand <lha@it.su.se>
365 * lib/asn1/Makefile.am: use $(LIB_com_err)
367 2005-04-28 Love Hörnquist Åstrand <lha@it.su.se>
369 * lib/krb5/context.c (krb5_set_config_files): ignore permission
370 denied on configuration files, user might not be allowed to read
371 /var/heimdal/kdc.conf
373 2005-04-26 Dave Love <fx@gnu.org>
375 * lib/krb5/krb5_locl.h: define _POSIX_PTHREAD_SEMANTICS so we get
378 2005-04-25 Love Hörnquist Åstrand <lha@it.su.se>
380 * lib/asn1/gen_glue.c: switch the units variable to a
381 function. gcc-4.1 needs the size of the structure if its defined
382 as extern struct units foo_units[] an we don't want to include
383 <parse_units.h> in the generate headerfile
385 2005-04-25 Love Hörnquist Åstrand <lha@it.su.se>
387 * lib/hdb/hdb.schema: add EQUALITY rule for krb5ValidStart,
388 krb5ValidEnd, krb5PasswordEnd From Howard Chu
390 2005-04-24 Love Hörnquist Åstrand <lha@it.su.se>
392 * doc/whatis.texi: comment out docbook stuff for now
394 * kuser/klist.c: use strlcpy
396 * doc/ack.texi: we no longer use eay libdes, make acknowledgment
397 still be there, but claim that we no longer use it. Mark editline
398 to be a modified version as required by the license.
400 * lib/krb5/pkinit.c: use the unexported oid_to_enctype function
402 * lib/krb5/crypto.c: unexport the oid_to_enctype function, not for
405 * kdc/Makefile.am: always add kaserver
407 * lib/krb5/krb5_ccache.3: document krb5_cc_new_unique
409 * lib/krb5/cache.c (krb5_cc_new_unique): new function to create a
412 * kdc/headers.h: don't include kerberos 4 headers here
414 * kdc/hpropd.c: include kerberos 4 headers here
416 * kdc/connect.c: add kaserver support independ of having krb4
419 * kdc/config.c: add kaserver support unconditionally, make kdc
420 only fail to start when there are no v4 realm configured and
421 krb4/kaserver is turned on
423 * kdc/kaserver.c: Use the new Kerberos 4 functions in libkrb5 and
424 so kaserver support is always compiled in (still default disabled)
426 * lib/krb5/v4_glue.c: simplify error handling
428 * doc/whatis.texi: add docbook version macro of @sub
430 * doc/heimdal.texi: change the wrapping around the Top node to
431 ifnottex, make html generation work
433 * lib/krb5/krb5_krbhst_init.3: spelling, from Björn Sandell
434 <biorn@dce.chalmers.se>
436 * lib/krb5/krb5_get_krbhst.3: spelling, from Björn Sandell
437 <biorn@dce.chalmers.se>
439 * lib/krb5/krb5_data.3: spelling, from Björn Sandell
440 <biorn@dce.chalmers.se>
442 * lib/krb5/krb5_aname_to_localname.3: spelling, from Björn Sandell
443 <biorn@dce.chalmers.se>
445 * lib/krb5/krb5_address.3: spelling, from Björn Sandell
446 <biorn@dce.chalmers.se>
448 2005-04-23 Love Hörnquist Åstrand <lha@it.su.se>
450 * kdc/config.c: Use the new Kerberos 4 functions in libkrb5 and so
451 kerberos 4 is always compiled in (still default disabled)
453 * kdc/kerberos4.c: Use the new Kerberos 4 functions in libkrb5 and
454 so kerberos 4 is always compiled in (still default disabled)
456 * lib/krb5/krb5_locl.h: forward declaration of _krb5_krb_auth_data
458 * lib/krb5/convert_creds.c: Move the kerberos v4 replacement
459 functions to v4_glue.c
461 * lib/krb5/v4_glue.c: Implement enough of kerberos 4 protocol to
462 be a KDC, move the v4 bits over here
464 * lib/krb5/krb5-v4compat.h: add more v4 defines
466 2005-04-22 Love Hörnquist Åstrand <lha@it.su.se>
468 * kpasswd/kpasswdd.c: Support multi-realms databases, requires
469 that all the realms are configured on the KDC in krb5.conf with
470 [libdefaults]default_realm stanzas.
472 2005-04-21 Love Hörnquist Åstrand <lha@it.su.se>
474 * kdc/kerberos5.c: spell succeeded correctly, From Sean Chittenden
476 * lib/krb5/addr_families.c: catch two more snprintf problems
478 2005-04-20 Love Hörnquist Åstrand <lha@it.su.se>
480 * lib/hdb/Makefile.am: this lib include com_err, add -com_err to
483 * appl/test/http_client.c: cast ssize_t to unsigned long, fix
486 2005-04-19 Love Hörnquist Åstrand <lha@it.su.se>
488 * lib/krb5/kuserok.c: use asprintf to avoid truncating pathnames
490 * lib/krb5/get_host_realm.c: check return value of snprintf
492 * lib/krb5/test_addr.c: check address truncation
494 * lib/krb5/addr_families.c: check return values from snprintf and
495 clean up semantics of ret_len
497 * lib/krb5/krb5_address.3: clarify what ret_len is in
500 * lib/krb5/test_kuserok.c: add --version and --help
502 * lib/krb5/kuserok.c: use getpwnamn_r if it exists
504 * lib/krb5/Makefile.am: noinst_PROGRAMS += test_kuserok
506 * lib/krb5/test_kuserok.c: test program for krb5_kuserok
508 2005-04-18 Love Hörnquist Åstrand <lha@it.su.se>
510 * lib/krb5/acache.c (acc_resolve): if open_default_ccache failed
511 with ccErrCCacheNotFound try again with create_default_ccache,
512 this fixes the problem where the security server apperenly haven't
513 started yet on Mac OS X
515 * lib/krb5/get_default_principal.c
516 (_krb5_get_default_principal_local): add, for use of functions
517 that in ccache layer to avoid recursive calls.
519 * lib/hdb/hdb-ldap.c: drop <ctype.h>, no longer use any of the is*
522 * include/make_crypto.c: cast to unsigned char to make sure its
523 not negative when passing it to is* functions
525 2005-04-15 Love Hörnquist Åstrand <lha@it.su.se>
527 * doc/programming.texi: remove manpage macro, add some more
528 references to manpages
530 * doc/heimdal.texi: define manpage macro
532 * doc/setup.texi: document new password policy code
534 * kpasswd/kpasswdd.c: add verifier libraries with
535 kadm5_add_passwd_quality_verifier
537 * lib/krb5/krb5_keyblock.3: document krb5_keyblock_init
539 2005-04-14 Love Hörnquist Åstrand <lha@it.su.se>
541 * kdc/kaserver.c: AUTHENTICATE and AUTHENTICATE_V2 is almost the
543 (klog) can deal with that the kaserver returns the same thing for
546 * lib/krb5/keyblock.c: Add krb5_keyblock_init to allocate an fill
547 in a keyblock from key data.
549 2005-04-12 Love Hörnquist Åstrand <lha@it.su.se>
551 * configure.in: rk_WIN32_EXPORT for roken
553 2005-04-10 Love Hörnquist Åstrand <lha@it.su.se>
555 * appl/test/gssapi_server.c: print out client principla of
558 2005-04-07 Love Hörnquist Åstrand <lha@it.su.se>
560 * lib/krb5/init_creds_pw.c (process_pa_data_to_key): also check
561 for KRB5_PADATA_PK_AS_REP_19, From: Douglas Engert
563 2005-04-07 Love Hörnquist Åstrand <lha@it.su.se>
565 * .cvsignore: ignore more generate files
567 2005-04-04 Love Hörnquist Åstrand <lha@it.su.se>
569 * lib/asn1/check-der.c: use size_t, print size_t by casting to
572 * lib/krb5/test_crypto.c: print size_t by casting to unsigned long
574 * lib/krb5/acache.c: Argument to create_new_ccache is a principal,
575 not a credential cache name. Clean up lossage related to this
578 * lib/hdb/Makefile.am: CHECK_SYMBOLS += HDBFlags2int
580 * lib/krb5/addr_families.c
581 (krb5_address_prefixlen_boundary,krb5_free_address):
582 use find_atype when we are dealing with a kerberos address type
584 * lib/krb5/aes-test.c: size_t vs int + fix printf
586 * lib/krb5/pkinit.c: Since the decode can't make out the diffrence
587 between PA-PK-AS-REP-19 and PA-PK-AS-REQ-Win2k, try harder to
590 2005-04-03 Love Hörnquist Åstrand <lha@it.su.se>
592 * appl/test/uu_client.c: print size_t by casting to unsigned long
594 2005-04-01 Johan Danielsson <joda@pdc.kth.se>
596 * kdc/kerberos4.c (do_version4): check client and server max_life
598 * kdc/kaserver.c (do_getticket): check client max_life
600 2005-03-31 Love <lha@kth.se>
602 * lib/krb5/verify_krb5_conf.c: const poison
604 * lib/krb5/test_alname.c: const poison
606 * lib/asn1/main.c: const poison
608 * lib/krb5/test_addr.c: test parse IPv6 RANGE addresses
610 * lib/krb5/addr_families.c: implement mask boundary for IPv6
612 * lib/asn1/gen.c: avoid const string warnings steming from
615 2005-03-28 Love Hörnquist Åstrand <lha@it.su.se>
617 * lib/krb5/Makefile.am: TESTS += test_addr
619 * lib/krb5/test_addr.c: simple test for addresses
621 * lib/krb5/addr_families.c: make RANGE parse prefixlen style
622 addresses too, fix printing of RANGE addresses, add
623 krb5_address_prefixlen_boundary
625 * lib/krb5/krb5_keytab.3: stop memory leak in example, expand on
628 2005-03-26 Love Hörnquist Åstrand <lha@it.su.se>
630 * lib/krb5/krb5_principal.3: spelling, from Tomas Olsson
632 * lib/krb5/krb5_warn.3: spelling, from Tomas Olsson
634 2005-03-19 Love Hörnquist Åstrand <lha@it.su.se>
636 * lib/krb5/acache.c: add mutex for global variables, clean up
637 returned error codes, implement storing addresses into the ccapi
639 * appl/test/gssapi_server.c: free memory, make error strings match
641 * appl/test/gssapi_server.c: use print_gss_name, print server name
644 * appl/test/gss_common.h (print_gss_name): common code for
647 * appl/test/gss_common.c (print_gss_name): common code for
650 * appl/test/http_client.c: Make constent with rest of the gssapi
653 2005-03-17 Love Hörnquist Åstrand <lha@it.su.se>
655 * lib/hdb/keys.c: AES is enabled by default, remove ifdefs
657 * lib/krb5/crypto.c: AES is enabled by default, remove ifdefs
659 * lib/krb5/aes-test.c: use hex encoder from roken AES is enabled
660 by default, remove ifdefs
662 * kdc/kerberos5.c: AES is enabled by default, remove ifdefs
664 2005-03-16 Love Hörnquist Åstrand <lha@it.su.se>
666 * doc/setup.texi: Add some text about modifying the database
668 2005-03-15 Love Hörnquist Åstrand <lha@it.su.se>
670 * kuser/kinit.c: widen lifetime/renewal warning text field, also
671 make use of unparse_time_approx, no need to be specific to the
672 second when ticket needs to be renewed or their lifetime.
674 * doc/heimdal.texi: copyright maintenance, drop eay, use updated
677 * lib/krb5/crypto.c: more static and unsigned issues
679 * lib/krb5/crypto.c: fix signedness issues, prompted by report of
682 2005-03-13 Love Hörnquist Åstrand <lha@it.su.se>
684 * lib/krb5/krb5_keytab.3: more text about how to free returned
687 2005-03-10 Love Hörnquist Åstrand <lha@it.su.se>
689 * lib/krb5/pkinit.c: handle the -25 generation path
691 * lib/krb5/pkinit.c: use KRB5_PADATA_PK_AS_REQ_19
693 * lib/krb5/pkinit.c: fold in pk-init-25 asn1 changes
695 2005-03-09 Love Hörnquist Åstrand <lha@it.su.se>
697 * kdc/pkinit.c: use generated oid's
699 * lib/krb5/pkinit.c: use generated oid's
701 2005-03-08 Love Hörnquist Åstrand <lha@it.su.se>
703 * kdc/pkinit.c: update to the asn1 structures used in -25's
705 * lib/krb5/pkinit.c: update to the asn1 structures used in -25's
707 2005-03-04 Love Hörnquist Åstrand <lha@it.su.se>
709 * lib/hdb/hdb-ldap.c: use the newly written hex function from
710 roken and remove the old implementation
712 2005-03-01 Love Hörnquist Åstrand <lha@it.su.se>
714 * appl/test/http_client.c: allow specifing port to connect to
716 2005-02-24 Love Hörnquist Åstrand <lha@it.su.se>
718 * lib/krb5/Makefile.am: bump version to 21:0:4
720 * lib/hdb/Makefile.am: bump version to 8:0:1
722 * lib/asn1/Makefile.am: bump version to 7:0:1
724 2005-02-23 Love Hörnquist Åstrand <lha@it.su.se>
726 * lib/krb5/crypto.c (DES_string_to_key_int): must check for weak
727 keys after doing the DES_cbc_cksum
729 2005-02-19 Luke Howard <lukeh@padl.com>
731 * lib/krb5/krbhst.c: set KD_CONFIG after calling
732 config_get_hosts() in kpasswd_get_next()
733 From: Wynn Wilkes <wynnw@vintela.com>
735 2005-02-15 Love Hörnquist Åstrand <lha@it.su.se>
737 * lib/hdb/db3.c (DB_open): correct the check for O_RDONLY
738 From: Chaskiel M Grundman <cg2v@andrew.cmu.edu>
740 2005-02-09 Love Hörnquist Åstrand <lha@it.su.se>
742 * lib/krb5/crypto.c (krb5_random_to_key): cast size_t to int to
745 2005-02-08 Love Hörnquist Åstrand <lha@it.su.se>
747 * lib/krb5/keytab.c (krb5_kt_get_entry): tell what enctype the
748 caller requested to provide the user with a glue what the caller
751 2005-02-05 Luke Howard <lukeh@padl.com>
753 * lib/krb5/kcm.c: add _krb5_kcm_is_running, _krb5_kcm_noop
755 * kcm/acquire.c: don't leak salt if keyproc called multiple
758 * kcm/config.c: allow KCM system ccache to be configured from
759 krb5.conf, in the system_ccache stanza of [kcm]
761 2005-02-03 Love Hörnquist Åstrand <lha@it.su.se>
763 * kcm/protocol.c: use -1 as the invalid pid number
765 * kcm/connect.c: support SCM_CREDS (for NetBSD)
767 * kcm/Makefile.am: LDADD += LIB_pidfile
769 * kcm/connect.c: make it possible to build on systems without
770 SO_PEERCRED (still doesn't work)
772 * kcm/config.c: cast argument to isdigit to unsigned char
774 * lib/krb5/krb5.conf.5: document large_msg_size
776 * lib/krb5/context.c (init_context_from_config_file): init
777 large_msg_size to 6000
779 * lib/krb5/krb5.h (krb5_context_data): add large_msg_size,
780 threshold where we start to use transport protocols without tiny
781 max data transport sizes.
783 * lib/krb5/kcm.h: drop prototypes, they all live in krb5-private.h
786 2005-02-02 Luke Howard <lukeh@padl.com>
788 * configure.in: generate kcm/Makefile
790 * Makefile.am: recurse into kcm/ if KCM defined
792 * kcm: add KCM daemon
794 2005-02-02 Love Hörnquist Åstrand <lha@it.su.se>
796 * lib/krb5/send_to_kdc.c (send_and_recv_udp): make private again
798 * lib/krb5/kcm.c: use AF_UNIX like the rest of the codebase, add
799 some more error strings
801 2005-02-02 Luke Howard <lukeh@padl.com>
803 * configure.in: add --enable-kcm option for Kerberos
804 Credentials Manager (KCM)
806 * lib/krb5/Makefile.am: add kcm.c
808 * lib/krb5/cache.c: use cc_retrieve_cred if present rather
809 than enumerating ccache
811 * lib/krb5/context.c: register KCM cc_ops
813 * lib/krb5/get_cred.c: pass all options to cc_retrieve_cred
815 * lib/krb5/init_creds_pw.c: add krb5_get_init_creds_keyblock
817 * lib/krb5/kcm.[ch]: add initial implementation of KCM
820 * lib/krb5/krb5.h: fix cc_retrieve prototype, add KCM cc_ops
822 * lib/krb5/send_to_kdc.c: add _krb5_send_and_recv_tcp
824 * lib/krb5/store.c: add krb5_store_creds_tag, krb5_ret_creds_tag
826 2005-01-24 Luke Howard <lukeh@padl.com>
828 * lib/krb5/init_creds_pw.c: allow NULL in_options to be passed
829 krb5_get_init_creds_password()
831 * kdc/kerberos5.c: don't crash when logging no server etype
832 support if client == NULL
834 2005-01-17 Love Hörnquist Åstrand <lha@it.su.se>
836 * kdc/kstash.c: s/random_key/random_key_flag/, From Dave Love
839 2005-01-12 Love Hörnquist Åstrand <lha@it.su.se>
841 * doc/apps.texi: Texinfo fixes. Text about irix 6.5 using
842 PAM. From: Dave Love <d.love@dl.ac.uk>
844 2005-01-08 Love Hörnquist Åstrand <lha@it.su.se>
846 * lib/krb5/verify_krb5_conf.c: cast argument to isdigit to
849 * lib/krb5/keytab_keyfile.c: cast argument to toupper to unsigned
852 * lib/asn1/hash.c (hashcaseadd): cast argument to toupper to
855 * appl/kf/kfd.c (kfd_match_version): cast argument to islower to
858 * lib/krb5/krb5.3: drop krb5_{checksum,enctype}_is_disabled
860 * lib/krb5/krb5_encrypt.3: drop krb5_enctype_is_disabled, more
861 text about krb5_enctype_valid
863 * lib/krb5/krb5_create_checksum.3: drop
864 krb5_checksum_is_disabled
866 * lib/krb5/crypto.c: drop krb5_{checksum,enctype}_isdisabled
868 * lib/krb5/context.c: krb5_enctype_is_disabled is the same thing
869 as krb5_enctype_valid, so use the later since its older and the
870 api doesn't really need another entry point
872 * lib/krb5/rd_req.c: krb5_enctype_is_disabled is the same thing as
873 krb5_enctype_valid, so use the later since its older and the api
874 doesn't really need another entry point
876 * kdc/kerberos5.c: krb5_enctype_is_disabled is the same thing as
877 krb5_enctype_valid, so use the later since its older and the api
878 doesn't really need another entry point
880 2005-01-05 Love Hörnquist Åstrand <lha@it.su.se>
882 * kpasswd/kpasswdd.8: document --addresses, controls what
883 addresses kpasswd should listen too
885 * kpasswd/kpasswdd.c: add --addresses, controls what addresses
886 kpasswd should listen too
888 * lib/krb5/addr_families.c (krb5_parse_address): filter out dup
889 addresses from getaddrinfo
891 * kpasswd/kpasswd.1: document -c
893 * kpasswd/kpasswd.c: allow specifying a credential cache to use
894 for the admin principal
896 * include/bits.c: constify to avoid warning with -Wwrite-string
898 * NEWS: add 0.6.2 and 0.6.3 items
900 * lib/krb5/krb5_keyblock.3: document krb5_generate_subkey_extended
902 * lib/krb5/krb5_is_thread_safe.3: document function
904 * lib/krb5/Makefile.am (man_MANS) += krb5_is_thread_safe.3
906 * lib/krb5/context.c (krb5_is_thread_safe): return TRUE is the
907 library was compiled with multithreading support. If not,
908 application must global lock the library, it it uses threads that
909 call kerberos functions at the same time.
911 2005-01-05 Luke Howard <lukeh@padl.com>
913 * lib/krb5/auth_context.c: use krb5_generate_subkey_extended()
915 * lib/krb5/appdefault.c: remove redundant KRB5_LIB_FUNCTION
917 * lib/krb5/build_auth.c: support for enctype negotiation
918 (client sends EtypeList in Authenticator authz data)
920 * lib/krb5/context.c: mutex should be destroyed last in
923 * lib/krb5/generate_subkey.c: add krb5_generate_subkey_extended(),
924 set *subkey to NULL if key geneartion fails
926 * lib/krb5/krb5.h: add KRB5_KU_PA_SERVER_REFERRAL_DATA
928 * lib/krb5/mk_req_ext.c: support ETYPE_ARCFOUR_HMAC_MD5_56
930 * lib/krb5/rd_req.c: support for enctype negotiation
931 (client sends EtypeList in Authenticator authz data)
933 2005-01-04 Luke Howard <lukeh@padl.com>
935 * lib/asn1/k5.asn1: add authorization data types for enctype
936 negotiation implementation
938 2005-01-04 Love Hörnquist Åstrand <lha@it.su.se>
940 * lib/krb5/changepw.c (change_password_loop): on failing to find a
941 kdc, set result_code to KRB5_KPASSWD_HARDERROR
943 2005-01-01 Love Hörnquist Åstrand <lha@it.su.se>
945 * doc/heimdal.texi: Happy New Year