PageRenderTime 59ms CodeModel.GetById 19ms RepoModel.GetById 0ms app.codeStats 0ms

/crypto/heimdal/lib/gssapi/ChangeLog

https://bitbucket.org/freebsd/freebsd-head/
#! | 2970 lines | 1781 code | 1189 blank | 0 comment | 0 complexity | 064e0feaf998d4b0551c28c4ef696f4c MD5 | raw file
Possible License(s): MPL-2.0-no-copyleft-exception, BSD-3-Clause, LGPL-2.0, LGPL-2.1, BSD-2-Clause, 0BSD, JSON, AGPL-1.0, GPL-2.0
  1. 2008-08-14 Love Hornquist Astrand <lha@10a140laptop.local>
  2. * krb5/accept_sec_context.c: If there is a initiator subkey, copy
  3. that to acceptor subkey to match windows behavior. From Metze.
  4. 2008-08-02 Love Hörnquist Åstrand <lha@h5l.org>
  5. * ntlm/init_sec_context.c: Catch error
  6. * krb5/inquire_sec_context_by_oid.c: Catch store failure.
  7. * mech/gss_canonicalize_name.c: Not init m, return never
  8. used (overwritten later).
  9. 2008-07-25 Love Hörnquist Åstrand <lha@kth.se>
  10. * ntlm/init_sec_context.c: Use krb5_cc_get_config.
  11. 2008-07-25 Love Hörnquist Åstrand <lha@kth.se>
  12. * krb5/init_sec_context.c: Match the orignal patch I got from
  13. metze, seems that DCE-STYLE is even more weirer then what I though
  14. when I merged the patch.
  15. 2008-06-02 Love Hörnquist Åstrand <lha@kth.se>
  16. * krb5/init_sec_context.c: Don't add asn1 wrapping to token when
  17. using DCE_STYLE. Patch from Stefan Metzmacher.
  18. 2008-05-27 Love Hörnquist Åstrand <lha@kth.se>
  19. * ntlm/init_sec_context.c: use krb5_get_error_message
  20. 2008-05-05 Love Hörnquist Åstrand <lha@kth.se>
  21. * spnego/spnego_locl.h: Add back "mech/utils.h", its needed for
  22. oid/buffer functions.
  23. 2008-05-02 Love Hörnquist Åstrand <lha@it.su.se>
  24. * spnego: Changes from doug barton to make spnego indepedant of
  25. the heimdal version of the plugin system.
  26. 2008-04-27 Love Hörnquist Åstrand <lha@it.su.se>
  27. * krb5: use DES_set_key_unchecked()
  28. 2008-04-17 Love Hörnquist Åstrand <lha@it.su.se>
  29. * add __declspec() for windows.
  30. 2008-04-15 Love Hörnquist Åstrand <lha@it.su.se>
  31. * krb5/import_sec_context.c: Use tmp to read ac->flags value to
  32. avoid warning.
  33. 2008-04-07 Love Hörnquist Åstrand <lha@it.su.se>
  34. * mech/gss_mech_switch.c: Use unsigned where appropriate.
  35. 2008-03-14 Love Hörnquist Åstrand <lha@it.su.se>
  36. * test_context.c: Add test for gsskrb5_register_acceptor_identity.
  37. 2008-03-09 Love Hörnquist Åstrand <lha@it.su.se>
  38. * krb5/init_sec_context.c (init_auth): use right variable to
  39. detect if we want to free or not.
  40. 2008-02-26 Love Hörnquist Åstrand <lha@it.su.se>
  41. * Makefile.am: add missing \
  42. * Makefile.am: reshuffle depenencies
  43. * Add flag to krb5 to not add GSS-API INT|CONF to the negotiation
  44. 2008-02-21 Love Hörnquist Åstrand <lha@it.su.se>
  45. * make the SPNEGO mech store the error itself instead, works for
  46. everything except other stackable mechs
  47. 2008-02-18 Love Hörnquist Åstrand <lha@it.su.se>
  48. * spnego/init_sec_context.c (spnego_reply): if the reply token was
  49. of length 0, make it the same as no token. Pointed out by Zeqing
  50. Xia.
  51. * krb5/acquire_cred.c (acquire_initiator_cred): handle the
  52. credential cache better, use destroy/close when appriate and for
  53. all cases. Thanks to Michael Allen for point out the memory-leak
  54. that I also fixed.
  55. 2008-02-03 Love Hörnquist Åstrand <lha@it.su.se>
  56. * spnego/accept_sec_context.c: Make error reporting somewhat more
  57. correct for SPNEGO.
  58. 2008-01-27 Love Hörnquist Åstrand <lha@it.su.se>
  59. * test_common.c: Improve the error message.
  60. 2008-01-24 Love Hörnquist Åstrand <lha@it.su.se>
  61. * ntlm/accept_sec_context.c: Avoid free-ing type1 message before
  62. its allocated.
  63. 2008-01-13 Love Hörnquist Åstrand <lha@it.su.se>
  64. * test_ntlm.c: Test source name (and make the acceptor in ntlm gss
  65. mech useful).
  66. 2007-12-30 Love Hörnquist Åstrand <lha@it.su.se>
  67. * ntlm/init_sec_context.c: Don't confuse target name and source
  68. name, make regressiont tests pass again.
  69. 2007-12-29 Love Hörnquist Åstrand <lha@it.su.se>
  70. * ntlm: clean up name handling
  71. 2007-12-04 Love Hörnquist Åstrand <lha@it.su.se>
  72. * ntlm/init_sec_context.c: Use credential if it was passed in.
  73. * ntlm/acquire_cred.c: Check if there is initial creds with
  74. _gss_ntlm_get_user_cred().
  75. * ntlm/init_sec_context.c: Add _gss_ntlm_get_user_info() that
  76. return the user info so it can be used by external modules.
  77. * ntlm/inquire_cred.c: use the right error code.
  78. * ntlm/inquire_cred.c: Return GSS_C_NO_CREDENTIAL if there is no
  79. credential, ntlm have (not yet) a default credential.
  80. * mech/gss_release_oid_set.c: Avoid trying to deref NULL, from
  81. Phil Fisher.
  82. 2007-12-03 Love Hörnquist Åstrand <lha@it.su.se>
  83. * test_acquire_cred.c: Always try to fetch cred (even with
  84. GSS_C_NO_NAME).
  85. 2007-08-09 Love Hörnquist Åstrand <lha@it.su.se>
  86. * mech/gss_krb5.c: Readd gss_krb5_get_tkt_flags.
  87. 2007-08-08 Love Hörnquist Åstrand <lha@it.su.se>
  88. * spnego/compat.c (_gss_spnego_internal_delete_sec_context):
  89. release ctx->target_name too From Rafal Malinowski.
  90. 2007-07-26 Love Hörnquist Åstrand <lha@it.su.se>
  91. * mech/gss_mech_switch.c: Don't try to do dlopen if system doesn't
  92. have dlopen. From Rune of Chalmers.
  93. 2007-07-10 Love Hörnquist Åstrand <lha@it.su.se>
  94. * mech/gss_duplicate_name.c: New signature of _gss_find_mn.
  95. * mech/gss_init_sec_context.c: New signature of _gss_find_mn.
  96. * mech/gss_acquire_cred.c: New signature of _gss_find_mn.
  97. * mech/name.h: New signature of _gss_find_mn.
  98. * mech/gss_canonicalize_name.c: New signature of _gss_find_mn.
  99. * mech/gss_compare_name.c: New signature of _gss_find_mn.
  100. * mech/gss_add_cred.c: New signature of _gss_find_mn.
  101. * mech/gss_names.c (_gss_find_mn): Return an error code for
  102. caller.
  103. * spnego/accept_sec_context.c: remove checks that are done by the
  104. previous function.
  105. * Makefile.am: New library version.
  106. 2007-07-04 Love Hörnquist Åstrand <lha@it.su.se>
  107. * mech/gss_oid_to_str.c: Refuse to print GSS_C_NULL_OID, from
  108. Rafal Malinowski.
  109. * spnego/spnego.asn1: Indent and make NegTokenInit and
  110. NegTokenResp extendable.
  111. 2007-06-21 Love Hörnquist Åstrand <lha@it.su.se>
  112. * ntlm/inquire_cred.c: Implement _gss_ntlm_inquire_cred.
  113. * mech/gss_display_status.c: Provide message for GSS_S_COMPLETE.
  114. * mech/context.c: If the canned string is "", its no use to the
  115. user, make it fall back to the default error string.
  116. 2007-06-20 Love Hörnquist Åstrand <lha@it.su.se>
  117. * mech/gss_display_name.c (gss_display_name): no name ->
  118. fail. From Rafal Malinswski.
  119. * spnego/accept_sec_context.c: Wrap name in a spnego_name instead
  120. of just a copy of the underlaying object. From Rafal Malinswski.
  121. * spnego/accept_sec_context.c: Handle underlaying mech not
  122. returning mn.
  123. * mech/gss_accept_sec_context.c: Handle underlaying mech not
  124. returning mn.
  125. * spnego/accept_sec_context.c: Make sure src_name is always set to
  126. GSS_C_NO_NAME when returning.
  127. * krb5/acquire_cred.c (acquire_acceptor_cred): don't claim
  128. everything is well on failure. From Phil Fisher.
  129. * mech/gss_duplicate_name.c: catch error (and ignore it)
  130. * ntlm/init_sec_context.c: Use heim_ntlm_calculate_ntlm2_sess.
  131. * mech/gss_accept_sec_context.c: Only wrap the delegated cred if
  132. we got a delegated mech cred. From Rafal Malinowski.
  133. * spnego/accept_sec_context.c: Only wrap the delegated cred if we
  134. are going to return it to the consumer. From Rafal Malinowski.
  135. * spnego/accept_sec_context.c: Fixed memory leak pointed out by
  136. Rafal Malinowski, also while here moved to use NegotiationToken
  137. for decoding.
  138. 2007-06-18 Love Hörnquist Åstrand <lha@it.su.se>
  139. * krb5/prf.c (_gsskrb5_pseudo_random): add missing break.
  140. * krb5/release_name.c: Set *minor_status unconditionallty, its
  141. done later anyway.
  142. * spnego/accept_sec_context.c: Init get_mic to 0.
  143. * mech/gss_set_cred_option.c: Free memory in failure case, found
  144. by beam.
  145. * mech/gss_inquire_context.c: Handle mech_type being NULL.
  146. * mech/gss_inquire_cred_by_mech.c: Handle cred_name being NULL.
  147. * mech/gss_krb5.c: Free memory in error case, found by beam.
  148. 2007-06-12 Love Hörnquist Åstrand <lha@it.su.se>
  149. * ntlm/inquire_context.c: Use ctx->gssflags for flags.
  150. * krb5/display_name.c: Use KRB5_PRINCIPAL_UNPARSE_DISPLAY, this is
  151. not ment for machine consumption.
  152. 2007-06-09 Love Hörnquist Åstrand <lha@it.su.se>
  153. * ntlm/digest.c (kdc_alloc): free memory on failure, pointed out
  154. by Rafal Malinowski.
  155. * ntlm/digest.c (kdc_destroy): free context when done, pointed out
  156. by Rafal Malinowski.
  157. * spnego/context_stubs.c (_gss_spnego_display_name): if input_name
  158. is null, fail. From Rafal Malinowski.
  159. 2007-06-04 Love Hörnquist Åstrand <lha@it.su.se>
  160. * ntlm/digest.c: Free memory when done.
  161. 2007-06-02 Love Hörnquist Åstrand <lha@it.su.se>
  162. * test_ntlm.c: Test both with and without keyex.
  163. * ntlm/digest.c: If we didn't set session key, don't expect one
  164. back.
  165. * test_ntlm.c: Set keyex flag and calculate session key.
  166. 2007-05-31 Love Hörnquist Åstrand <lha@it.su.se>
  167. * spnego/accept_sec_context.c: Use the return value before is
  168. overwritten by later calls. From Rafal Malinowski
  169. * krb5/release_cred.c: Give an minor_status argument to
  170. gss_release_oid_set. From Rafal Malinowski
  171. 2007-05-30 Love Hörnquist Åstrand <lha@it.su.se>
  172. * ntlm/accept_sec_context.c: Catch errors and return the up the
  173. stack.
  174. * test_kcred.c: more testing of lifetimes
  175. 2007-05-17 Love Hörnquist Åstrand <lha@it.su.se>
  176. * Makefile.am: Drop the gss oid_set function for the krb5 mech,
  177. use the mech glue versions instead. Pointed out by Rafal
  178. Malinowski.
  179. * krb5: Use gss oid_set functions from mechglue
  180. 2007-05-14 Love Hörnquist Åstrand <lha@it.su.se>
  181. * ntlm/accept_sec_context.c: Set session key only if we are
  182. returned a session key. Found by David Love.
  183. 2007-05-13 Love Hörnquist Åstrand <lha@it.su.se>
  184. * krb5/prf.c: switched MIN to min to make compile on solaris,
  185. pointed out by David Love.
  186. 2007-05-09 Love Hörnquist Åstrand <lha@it.su.se>
  187. * krb5/inquire_cred_by_mech.c: Fill in all of the variables if
  188. they are passed in. Pointed out by Phil Fisher.
  189. 2007-05-08 Love Hörnquist Åstrand <lha@it.su.se>
  190. * krb5/inquire_cred.c: Fix copy and paste error, bug spotted by
  191. from Phil Fisher.
  192. * mech: dont keep track of gc_usage, just figure it out at
  193. gss_inquire_cred() time
  194. * mech/gss_mech_switch.c (add_builtin): ok for
  195. __gss_mech_initialize() to return NULL
  196. * test_kcred.c: more correct tests
  197. * spnego/cred_stubs.c (gss_inquire_cred*): wrap the name with a
  198. spnego_name.
  199. * ntlm/inquire_cred.c: make ntlm gss_inquire_cred fail for now,
  200. need to find default cred and friends.
  201. * krb5/inquire_cred_by_mech.c: reimplement
  202. 2007-05-07 Love Hörnquist Åstrand <lha@it.su.se>
  203. * ntlm/acquire_cred.c: drop unused variable.
  204. * ntlm/acquire_cred.c: Reimplement.
  205. * Makefile.am: add ntlm/digest.c
  206. * ntlm: split out backend ntlm server processing
  207. 2007-04-24 Love Hörnquist Åstrand <lha@it.su.se>
  208. * ntlm/delete_sec_context.c (_gss_ntlm_delete_sec_context): free
  209. credcache when done
  210. 2007-04-22 Love Hörnquist Åstrand <lha@it.su.se>
  211. * ntlm/init_sec_context.c: ntlm-key credential entry is prefix with @
  212. * ntlm/init_sec_context.c (get_user_ccache): pick up the ntlm
  213. creds from the krb5 credential cache.
  214. 2007-04-21 Love Hörnquist Åstrand <lha@it.su.se>
  215. * ntlm/delete_sec_context.c: free the key stored in the context
  216. * ntlm/ntlm.h: switch password for a key
  217. * test_oid.c: Switch oid to one that is exported.
  218. 2007-04-20 Love Hörnquist Åstrand <lha@it.su.se>
  219. * ntlm/init_sec_context.c: move where hash is calculated to make
  220. it easier to add ccache support.
  221. * Makefile.am: Add version-script.map to EXTRA_DIST.
  222. 2007-04-19 Love Hörnquist Åstrand <lha@it.su.se>
  223. * Makefile.am: Unconfuse newer versions of automake that doesn't
  224. know the diffrence between depenences and setting variables. foo:
  225. vs foo=.
  226. * test_ntlm.c: delete sec context when done.
  227. * version-script.map: export more symbols.
  228. * Makefile.am: add version script if ld supports it
  229. * version-script.map: add version script if ld supports it
  230. 2007-04-18 Love Hörnquist Åstrand <lha@it.su.se>
  231. * Makefile.am: test_acquire_cred need test_common.[ch]
  232. * test_acquire_cred.c: add more test options.
  233. * krb5/external.c: add GSS_KRB5_CCACHE_NAME_X
  234. * gssapi/gssapi_krb5.h: add GSS_KRB5_CCACHE_NAME_X
  235. * krb5/set_sec_context_option.c: refactor code, implement
  236. GSS_KRB5_CCACHE_NAME_X
  237. * mech/gss_krb5.c: reimplement gss_krb5_ccache_name
  238. 2007-04-17 Love Hörnquist Åstrand <lha@it.su.se>
  239. * spnego/cred_stubs.c: Need to import spnego name before we can
  240. use it as a gss_name_t.
  241. * test_acquire_cred.c: use this test as part of the regression
  242. suite.
  243. * mech/gss_acquire_cred.c (gss_acquire_cred): dont init
  244. cred->gc_mc every time in the loop.
  245. 2007-04-15 Love Hörnquist Åstrand <lha@it.su.se>
  246. * Makefile.am: add test_common.h
  247. 2007-02-16 Love Hörnquist Åstrand <lha@it.su.se>
  248. * gss_acquire_cred.3: Add link for
  249. gsskrb5_register_acceptor_identity.
  250. 2007-02-08 Love Hörnquist Åstrand <lha@it.su.se>
  251. * krb5/copy_ccache.c: Try to leak less memory in the failure case.
  252. 2007-01-31 Love Hörnquist Åstrand <lha@it.su.se>
  253. * mech/gss_display_status.c: Use right printf formater.
  254. * test_*.[ch]: split out the error printing function and try to
  255. return better errors
  256. 2007-01-30 Love Hörnquist Åstrand <lha@it.su.se>
  257. * krb5/init_sec_context.c: revert 1.75: (init_auth): only turn on
  258. GSS_C_CONF_FLAG and GSS_C_INT_FLAG if the caller requseted it.
  259. This is because Kerberos always support INT|CONF, matches behavior
  260. with MS and MIT. The creates problems for the GSS-SPNEGO mech.
  261. 2007-01-24 Love Hörnquist Åstrand <lha@it.su.se>
  262. * krb5/prf.c: constrain desired_output_len
  263. * krb5/external.c (krb5_mech): add _gsskrb5_pseudo_random
  264. * mech/gss_pseudo_random.c: Catch error from underlaying mech on
  265. failure.
  266. * Makefile.am: Add krb5/prf.c
  267. * krb5/prf.c: gss_pseudo_random for krb5
  268. * test_context.c: Checks for gss_pseudo_random.
  269. * krb5/gkrb5_err.et: add KG_INPUT_TOO_LONG
  270. * Makefile.am: Add mech/gss_pseudo_random.c
  271. * gssapi/gssapi.h: try to load pseudo_random
  272. * mech/gss_mech_switch.c: try to load pseudo_random
  273. * mech/gss_pseudo_random.c: Add gss_pseudo_random.
  274. * gssapi_mech.h: Add hook for gm_pseudo_random.
  275. 2007-01-17 Love Hörnquist Åstrand <lha@it.su.se>
  276. * test_context.c: Don't assume bufer from gss_display_status is
  277. ok.
  278. * mech/gss_wrap_size_limit.c: Reset out variables.
  279. * mech/gss_wrap.c: Reset out variables.
  280. * mech/gss_verify_mic.c: Reset out variables.
  281. * mech/gss_utils.c: Reset out variables.
  282. * mech/gss_release_oid_set.c: Reset out variables.
  283. * mech/gss_release_cred.c: Reset out variables.
  284. * mech/gss_release_buffer.c: Reset variables.
  285. * mech/gss_oid_to_str.c: Reset out variables.
  286. * mech/gss_inquire_sec_context_by_oid.c: Fix reset out variables.
  287. * mech/gss_mech_switch.c: Reset out variables.
  288. * mech/gss_inquire_sec_context_by_oid.c: Reset out variables.
  289. * mech/gss_inquire_names_for_mech.c: Reset out variables.
  290. * mech/gss_inquire_cred_by_oid.c: Reset out variables.
  291. * mech/gss_inquire_cred_by_oid.c: Reset out variables.
  292. * mech/gss_inquire_cred_by_mech.c: Reset out variables.
  293. * mech/gss_inquire_cred.c: Reset out variables, fix memory leak.
  294. * mech/gss_inquire_context.c: Reset out variables.
  295. * mech/gss_init_sec_context.c: Zero out outbuffer on failure.
  296. * mech/gss_import_name.c: Reset out variables.
  297. * mech/gss_import_name.c: Reset out variables.
  298. * mech/gss_get_mic.c: Reset out variables.
  299. * mech/gss_export_name.c: Reset out variables.
  300. * mech/gss_encapsulate_token.c: Reset out variables.
  301. * mech/gss_duplicate_oid.c: Reset out variables.
  302. * mech/gss_duplicate_oid.c: Reset out variables.
  303. * mech/gss_duplicate_name.c: Reset out variables.
  304. * mech/gss_display_status.c: Reset out variables.
  305. * mech/gss_display_name.c: Reset out variables.
  306. * mech/gss_delete_sec_context.c: Reset out variables using propper
  307. macros.
  308. * mech/gss_decapsulate_token.c: Reset out variables using propper
  309. macros.
  310. * mech/gss_add_cred.c: Reset out variables.
  311. * mech/gss_acquire_cred.c: Reset out variables.
  312. * mech/gss_accept_sec_context.c: Reset out variables using propper
  313. macros.
  314. * mech/gss_init_sec_context.c: Reset out variables.
  315. * mech/mech_locl.h (_mg_buffer_zero): new macro that zaps a
  316. gss_buffer_t
  317. 2007-01-16 Love Hörnquist Åstrand <lha@it.su.se>
  318. * mech: sprinkel _gss_mg_error
  319. * mech/gss_display_status.c (gss_display_status): use
  320. _gss_mg_get_error to fetch the error from underlaying mech, if it
  321. failes, let do the regular dance for GSS-CODE version and a
  322. generic print-the-error code for MECH-CODE.
  323. * mech/gss_oid_to_str.c: Don't include the NUL in the length of
  324. the string.
  325. * mech/context.h: Protoypes for _gss_mg_.
  326. * mech/context.c: Glue to catch the error from the lower gss-api
  327. layer and save that for later so gss_display_status() can show the
  328. error.
  329. * gss.c: Detect NTLM.
  330. 2007-01-11 Love Hörnquist Åstrand <lha@it.su.se>
  331. * mech/gss_accept_sec_context.c: spelling
  332. 2007-01-04 Love Hörnquist Åstrand <lha@it.su.se>
  333. * Makefile.am: Include build (private) prototypes header files.
  334. * Makefile.am (ntlmsrc): add ntlm/ntlm-private.h
  335. 2006-12-28 Love Hörnquist Åstrand <lha@it.su.se>
  336. * ntlm/accept_sec_context.c: Pass signseal argument to
  337. _gss_ntlm_set_key.
  338. * ntlm/init_sec_context.c: Pass signseal argument to
  339. _gss_ntlm_set_key.
  340. * ntlm/crypto.c (_gss_ntlm_set_key): add signseal argument
  341. * test_ntlm.c: add ntlmv2 test
  342. * ntlm/ntlm.h: break out struct ntlmv2_key;
  343. * ntlm/crypto.c (_gss_ntlm_set_key): set ntlm v2 keys.
  344. * ntlm/accept_sec_context.c: Set dummy ntlmv2 keys and Check TI.
  345. * ntlm/ntlm.h: NTLMv2 keys.
  346. * ntlm/crypto.c: NTLMv2 sign and verify.
  347. 2006-12-20 Love Hörnquist Åstrand <lha@it.su.se>
  348. * ntlm/accept_sec_context.c: Don't send targetinfo now.
  349. * ntlm/init_sec_context.c: Build ntlmv2 answer buffer.
  350. * ntlm/init_sec_context.c: Leak less memory.
  351. * ntlm/init_sec_context.c: Announce that we support key exchange.
  352. * ntlm/init_sec_context.c: Add NTLM_NEG_NTLM2_SESSION, NTLMv2
  353. session security (disable because missing sign and seal).
  354. 2006-12-19 Love Hörnquist Åstrand <lha@it.su.se>
  355. * ntlm/accept_sec_context.c: split RC4 send and recv keystreams
  356. * ntlm/init_sec_context.c: split RC4 send and recv keystreams
  357. * ntlm/ntlm.h: split RC4 send and recv keystreams
  358. * ntlm/crypto.c: Implement SEAL.
  359. * ntlm/crypto.c: move gss_wrap/gss_unwrap here
  360. * test_context.c: request INT and CONF from the gss layer, test
  361. get and verify MIC.
  362. * ntlm/ntlm.h: add crypto bits.
  363. * ntlm/accept_sec_context.c: Save session master key.
  364. * Makefile.am: Move get and verify mic to the same file (crypto.c)
  365. since they share code.
  366. * ntlm/crypto.c: Move get and verify mic to the same file since
  367. they share code, implement NTLM v1 and dummy signatures.
  368. * ntlm/init_sec_context.c: pass on GSS_C_CONF_FLAG and
  369. GSS_C_INTEG_FLAG, save the session master key
  370. * spnego/accept_sec_context.c: try using gss_accept_sec_context()
  371. on the opportunistic token instead of guessing the acceptor name
  372. and do gss_acquire_cred, this make SPNEGO work like before.
  373. 2006-12-18 Love Hörnquist Åstrand <lha@it.su.se>
  374. * ntlm/init_sec_context.c: Calculate the NTLM version 1 "master"
  375. key.
  376. * spnego/accept_sec_context.c: Resurect negHints for the acceptor
  377. sends first packet.
  378. * Makefile.am: Add "windows" versions of the NegTokenInitWin and
  379. friends.
  380. * test_context.c: add --wrapunwrap flag
  381. * spnego/compat.c: move _gss_spnego_indicate_mechtypelist() to
  382. compat.c, use the sequence types of MechTypeList, make
  383. add_mech_type() static.
  384. * spnego/accept_sec_context.c: move
  385. _gss_spnego_indicate_mechtypelist() to compat.c
  386. * Makefile.am: Generate sequence code for MechTypeList
  387. * spnego: check that the generated acceptor mechlist is acceptable too
  388. * spnego/init_sec_context.c: Abstract out the initiator filter
  389. function, it will be needed for the acceptor too.
  390. * spnego/accept_sec_context.c: Abstract out the initiator filter
  391. function, it will be needed for the acceptor too. Remove negHints.
  392. * test_context.c: allow asserting return mech
  393. * ntlm/accept_sec_context.c: add _gss_ntlm_allocate_ctx
  394. * ntlm/acquire_cred.c: Check that the KDC seem to there and
  395. answering us, we can't do better then that wen checking if we will
  396. accept the credential.
  397. * ntlm/get_mic.c: return GSS_S_UNAVAILABLE
  398. * mech/utils.h: add _gss_free_oid, reverse of _gss_copy_oid
  399. * mech/gss_utils.c: add _gss_free_oid, reverse of _gss_copy_oid
  400. * spnego/spnego.asn1: Its very sad, but NegHints its are not part
  401. of the NegTokenInit, this makes SPNEGO acceptor life a lot harder.
  402. * spnego: try harder to handle names better. handle missing
  403. acceptor and initator creds better (ie dont propose/accept mech
  404. that there are no credentials for) split NegTokenInit and
  405. NegTokenResp in acceptor
  406. 2006-12-16 Love Hörnquist Åstrand <lha@it.su.se>
  407. * ntlm/import_name.c: Allocate the buffer from the right length.
  408. 2006-12-15 Love Hörnquist Åstrand <lha@it.su.se>
  409. * ntlm/init_sec_context.c (init_sec_context): Tell the other side
  410. what domain we think we are talking to.
  411. * ntlm/delete_sec_context.c: free username and password
  412. * ntlm/release_name.c (_gss_ntlm_release_name): free name.
  413. * ntlm/import_name.c (_gss_ntlm_import_name): add support for
  414. GSS_C_NT_HOSTBASED_SERVICE names
  415. * ntlm/ntlm.h: Add ntlm_name.
  416. * test_context.c: allow testing of ntlm.
  417. * gssapi_mech.h: add __gss_ntlm_initialize
  418. * ntlm/accept_sec_context.c (handle_type3): verify that the kdc
  419. approved of the ntlm exchange too
  420. * mech/gss_mech_switch.c: Add the builtin ntlm mech
  421. * test_ntlm.c: NTLM test app.
  422. * mech/gss_accept_sec_context.c: Add detection of NTLMSSP.
  423. * gssapi/gssapi.h: add ntlm mech oid
  424. * ntlm/external.c: Switch OID to the ms ntlmssp oid
  425. * Makefile.am: Add ntlm gss-api module.
  426. * ntlm/accept_sec_context.c: Catch more error errors.
  427. * ntlm/accept_sec_context.c: Check after a credential to use.
  428. 2006-12-14 Love Hörnquist Åstrand <lha@it.su.se>
  429. * krb5/set_sec_context_option.c (GSS_KRB5_SET_DEFAULT_REALM_X):
  430. don't fail on success. Bug report from Stefan Metzmacher.
  431. 2006-12-13 Love Hörnquist Åstrand <lha@it.su.se>
  432. * krb5/init_sec_context.c (init_auth): only turn on
  433. GSS_C_CONF_FLAG and GSS_C_INT_FLAG if the caller requseted it.
  434. From Stefan Metzmacher.
  435. 2006-12-11 Love Hörnquist Åstrand <lha@it.su.se>
  436. * Makefile.am (libgssapi_la_OBJECTS): depends on gssapi_asn1.h
  437. spnego_asn1.h.
  438. 2006-11-20 Love Hörnquist Åstrand <lha@it.su.se>
  439. * krb5/acquire_cred.c: Make krb5_get_init_creds_opt_free take a
  440. context argument.
  441. 2006-11-16 Love Hörnquist Åstrand <lha@it.su.se>
  442. * test_context.c: Test that token keys are the same, return
  443. actual_mech.
  444. 2006-11-15 Love Hörnquist Åstrand <lha@it.su.se>
  445. * spnego/spnego_locl.h: Make bitfields unsigned, add maybe_open.
  446. * spnego/accept_sec_context.c: Use ASN.1 encoder functions to
  447. encode CHOICE structure now that we can handle it.
  448. * spnego/init_sec_context.c: Use ASN.1 encoder functions to encode
  449. CHOICE structure now that we can handle it.
  450. * spnego/accept_sec_context.c (_gss_spnego_accept_sec_context):
  451. send back ad accept_completed when the security context is ->open,
  452. w/o this the client doesn't know that the server have completed
  453. the transaction.
  454. * test_context.c: Add delegate flag and check that the delegated
  455. cred works.
  456. * spnego/init_sec_context.c: Keep track of the opportunistic token
  457. in the inital message, it might be a complete gss-api context, in
  458. that case we'll get back accept_completed without any token. With
  459. this change, krb5 w/o mutual authentication works.
  460. * spnego/accept_sec_context.c: Use ASN.1 encoder functions to
  461. encode CHOICE structure now that we can handle it.
  462. * spnego/accept_sec_context.c: Filter out SPNEGO from the out
  463. supported mechs list and make sure we don't select that for the
  464. preferred mechamism.
  465. 2006-11-14 Love Hörnquist Åstrand <lha@it.su.se>
  466. * mech/gss_init_sec_context.c (_gss_mech_cred_find): break out the
  467. cred finding to its own function
  468. * krb5/wrap.c: Better error strings, from Andrew Bartlet.
  469. 2006-11-13 Love Hörnquist Åstrand <lha@it.su.se>
  470. * test_context.c: Create our own krb5_context.
  471. * krb5: Switch from using a specific error message context in the
  472. TLS to have a whole krb5_context in TLS. This have some
  473. interestion side-effekts for the configruration setting options
  474. since they operate on per-thread basis now.
  475. * mech/gss_set_cred_option.c: When calling ->gm_set_cred_option
  476. and checking for success, use GSS_S_COMPLETE. From Andrew Bartlet.
  477. 2006-11-12 Love Hörnquist Åstrand <lha@it.su.se>
  478. * Makefile.am: Help solaris make even more.
  479. * Makefile.am: Help solaris make.
  480. 2006-11-09 Love Hörnquist Åstrand <lha@it.su.se>
  481. * Makefile.am: remove include $(srcdir)/Makefile-digest.am for now
  482. * mech/gss_accept_sec_context.c: Try better guessing what is mech
  483. we are going to select by looking harder at the input_token, idea
  484. from Luke Howard's mechglue branch.
  485. * Makefile.am: libgssapi_la_OBJECTS: add depency on gkrb5_err.h
  486. * gssapi/gssapi_krb5.h: add GSS_KRB5_SET_ALLOWABLE_ENCTYPES_X
  487. * mech/gss_krb5.c: implement gss_krb5_set_allowable_enctypes
  488. * gssapi/gssapi.h: GSS_KRB5_S_
  489. * krb5/gsskrb5_locl.h: Include <gkrb5_err.h>.
  490. * gssapi/gssapi_krb5.h: Add gss_krb5_set_allowable_enctypes.
  491. * Makefile.am: Build and install gkrb5_err.h
  492. * krb5/gkrb5_err.et: Move the GSS_KRB5_S error here.
  493. 2006-11-08 Love Hörnquist Åstrand <lha@it.su.se>
  494. * mech/gss_krb5.c: Add gsskrb5_set_default_realm.
  495. * krb5/set_sec_context_option.c: Support
  496. GSS_KRB5_SET_DEFAULT_REALM_X.
  497. * gssapi/gssapi_krb5.h: add GSS_KRB5_SET_DEFAULT_REALM_X
  498. * krb5/external.c: add GSS_KRB5_SET_DEFAULT_REALM_X
  499. 2006-11-07 Love Hörnquist Åstrand <lha@it.su.se>
  500. * test_context.c: rename krb5_[gs]et_time_wrap to
  501. krb5_[gs]et_max_time_skew
  502. * krb5/copy_ccache.c: _gsskrb5_extract_authz_data_from_sec_context
  503. no longer used, bye bye
  504. * mech/gss_krb5.c: No depenency of the krb5 gssapi mech.
  505. * mech/gss_krb5.c (gsskrb5_extract_authtime_from_sec_context): use
  506. _gsskrb5_decode_om_uint32. From Andrew Bartlet.
  507. * mech/gss_krb5.c: Add dummy gss_krb5_set_allowable_enctypes for
  508. now.
  509. * spnego/spnego_locl.h: Include <roken.h> for compatiblity.
  510. * krb5/arcfour.c: Use IS_DCE_STYLE flag. There is no padding in
  511. DCE-STYLE, don't try to use to. From Andrew Bartlett.
  512. * test_context.c: test wrap/unwrap, add flag for dce-style and
  513. mutual auth, also support multi-roundtrip sessions
  514. * krb5/gsskrb5_locl.h: Add IS_DCE_STYLE macro.
  515. * krb5/accept_sec_context.c (gsskrb5_acceptor_start): use
  516. krb5_rd_req_ctx
  517. * mech/gss_krb5.c (gsskrb5_get_subkey): return the per message
  518. token subkey
  519. * krb5/inquire_sec_context_by_oid.c: check if there is any key at
  520. all
  521. 2006-11-06 Love Hörnquist Åstrand <lha@it.su.se>
  522. * krb5/inquire_sec_context_by_oid.c: Set more error strings, use
  523. right enum for acceptor subkey. From Andrew Bartlett.
  524. 2006-11-04 Love Hörnquist Åstrand <lha@it.su.se>
  525. * test_context.c: Test gsskrb5_extract_service_keyblock, needed in
  526. PAC valication. From Andrew Bartlett
  527. * mech/gss_krb5.c: Add gsskrb5_extract_authz_data_from_sec_context
  528. and keyblock extraction functions.
  529. * gssapi/gssapi_krb5.h: Add extraction of keyblock function, from
  530. Andrew Bartlett.
  531. * krb5/external.c: Add GSS_KRB5_GET_SERVICE_KEYBLOCK_X
  532. 2006-11-03 Love Hörnquist Åstrand <lha@it.su.se>
  533. * test_context.c: Rename various routines and constants from
  534. canonize to canonicalize. From Andrew Bartlett
  535. * mech/gss_krb5.c: Rename various routines and constants from
  536. canonize to canonicalize. From Andrew Bartlett
  537. * krb5/set_sec_context_option.c: Rename various routines and
  538. constants from canonize to canonicalize. From Andrew Bartlett
  539. * krb5/external.c: Rename various routines and constants from
  540. canonize to canonicalize. From Andrew Bartlett
  541. * gssapi/gssapi_krb5.h: Rename various routines and constants from
  542. canonize to canonicalize. From Andrew Bartlett
  543. 2006-10-25 Love Hörnquist Åstrand <lha@it.su.se>
  544. * krb5/accept_sec_context.c (gsskrb5_accept_delegated_token): need
  545. to free ccache
  546. 2006-10-24 Love Hörnquist Åstrand <lha@it.su.se>
  547. * test_context.c (loop): free target_name
  548. * mech/gss_accept_sec_context.c: SLIST_INIT the ->gc_mc'
  549. * mech/gss_acquire_cred.c : SLIST_INIT the ->gc_mc'
  550. * krb5/init_sec_context.c: Avoid leaking memory.
  551. * mech/gss_buffer_set.c (gss_release_buffer_set): don't leak the
  552. ->elements memory.
  553. * test_context.c: make compile
  554. * krb5/cfx.c (_gssapi_verify_mic_cfx): always free crypto context.
  555. * krb5/set_cred_option.c (import_cred): free sp
  556. 2006-10-22 Love Hörnquist Åstrand <lha@it.su.se>
  557. * mech/gss_add_oid_set_member.c: Use old implementation of
  558. gss_add_oid_set_member, it leaks less memory.
  559. * krb5/test_cfx.c: free krb5_crypto.
  560. * krb5/test_cfx.c: free krb5_context
  561. * mech/gss_release_name.c (gss_release_name): free input_name
  562. it-self.
  563. 2006-10-21 Love Hörnquist Åstrand <lha@it.su.se>
  564. * test_context.c: Call setprogname.
  565. * mech/gss_krb5.c: Add gsskrb5_extract_authtime_from_sec_context.
  566. * gssapi/gssapi_krb5.h: add
  567. gsskrb5_extract_authtime_from_sec_context
  568. 2006-10-20 Love Hörnquist Åstrand <lha@it.su.se>
  569. * krb5/inquire_sec_context_by_oid.c: Add get_authtime.
  570. * krb5/external.c: add GSS_KRB5_GET_AUTHTIME_X
  571. * gssapi/gssapi_krb5.h: add GSS_KRB5_GET_AUTHTIME_X
  572. * krb5/set_sec_context_option.c: Implement GSS_KRB5_SEND_TO_KDC_X.
  573. * mech/gss_krb5.c: Add gsskrb5_set_send_to_kdc
  574. * gssapi/gssapi_krb5.h: Add GSS_KRB5_SEND_TO_KDC_X and
  575. gsskrb5_set_send_to_kdc
  576. * krb5/external.c: add GSS_KRB5_SEND_TO_KDC_X
  577. * Makefile.am: more files
  578. 2006-10-19 Love Hörnquist Åstrand <lha@it.su.se>
  579. * Makefile.am: remove spnego/gssapi_spnego.h, its now in gssapi/
  580. * test_context.c: Allow specifing mech.
  581. * krb5/external.c: add GSS_SASL_DIGEST_MD5_MECHANISM (for now)
  582. * gssapi/gssapi.h: Rename GSS_DIGEST_MECHANISM to
  583. GSS_SASL_DIGEST_MD5_MECHANISM
  584. 2006-10-18 Love Hörnquist Åstrand <lha@it.su.se>
  585. * mech/gssapi.asn1: Make it into a heim_any_set, its doesn't
  586. except a tag.
  587. * mech/gssapi.asn1: GSSAPIContextToken is IMPLICIT SEQUENCE
  588. * gssapi/gssapi_krb5.h: add GSS_KRB5_GET_ACCEPTOR_SUBKEY_X
  589. * krb5/external.c: Add GSS_KRB5_GET_ACCEPTOR_SUBKEY_X.
  590. * gssapi/gssapi_krb5.h: add GSS_KRB5_GET_INITIATOR_SUBKEY_X and
  591. GSS_KRB5_GET_SUBKEY_X
  592. * krb5/external.c: add GSS_KRB5_GET_INITIATOR_SUBKEY_X,
  593. GSS_KRB5_GET_SUBKEY_X
  594. 2006-10-17 Love Hörnquist Åstrand <lha@it.su.se>
  595. * test_context.c: Support switching on name type oid's
  596. * test_context.c: add test for dns canon flag
  597. * mech/gss_krb5.c: Add gsskrb5_set_dns_canonlize.
  598. * gssapi/gssapi_krb5.h: remove gss_krb5_compat_des3_mic
  599. * gssapi/gssapi_krb5.h: Add gsskrb5_set_dns_canonlize.
  600. * krb5/set_sec_context_option.c: implement
  601. GSS_KRB5_SET_DNS_CANONIZE_X
  602. * gssapi/gssapi_krb5.h: add GSS_KRB5_SET_DNS_CANONIZE_X
  603. * krb5/external.c: add GSS_KRB5_SET_DNS_CANONIZE_X
  604. * mech/gss_krb5.c: add bits to make lucid context work
  605. 2006-10-14 Love Hörnquist Åstrand <lha@it.su.se>
  606. * mech/gss_oid_to_str.c: Prefix der primitives with der_.
  607. * krb5/inquire_sec_context_by_oid.c: Prefix der primitives with
  608. der_.
  609. * krb5/encapsulate.c: Prefix der primitives with der_.
  610. * mech/gss_oid_to_str.c: New der_print_heim_oid signature.
  611. 2006-10-12 Love Hörnquist Åstrand <lha@it.su.se>
  612. * Makefile.am: add test_context
  613. * krb5/inquire_sec_context_by_oid.c: Make it work.
  614. * test_oid.c: Test lucid oid.
  615. * gssapi/gssapi.h: Add OM_uint64_t.
  616. * krb5/inquire_sec_context_by_oid.c: Add lucid interface.
  617. * krb5/external.c: Add lucid interface, renumber oids to my
  618. delegated space.
  619. * mech/gss_krb5.c: Add lucid interface.
  620. * gssapi/gssapi_krb5.h: Add lucid interface.
  621. * spnego/spnego_locl.h: Maybe include <netdb.h>.
  622. 2006-10-09 Love Hörnquist Åstrand <lha@it.su.se>
  623. * mech/gss_mech_switch.c: define RTLD_LOCAL to 0 if not defined.
  624. 2006-10-08 Love Hörnquist Åstrand <lha@it.su.se>
  625. * Makefile.am: install gssapi_krb5.H and gssapi_spnego.h
  626. * gssapi/gssapi_krb5.h: Move krb5 stuff to <gssapi/gssapi_krb5.h>.
  627. * gssapi/gssapi.h: Move krb5 stuff to <gssapi/gssapi_krb5.h>.
  628. * Makefile.am: Drop some -I no longer needed.
  629. * gssapi/gssapi_spnego.h: Move gssapi_spengo.h over here.
  630. * krb5: reference all include files using 'krb5/'
  631. 2006-10-07 Love Hörnquist Åstrand <lha@it.su.se>
  632. * gssapi.h: Add file inclusion protection.
  633. * gssapi/gssapi.h: Correct header file inclusion protection.
  634. * gssapi/gssapi.h: Move the gssapi.h from lib/gssapi/ to
  635. lib/gssapi/gssapi/ to please automake.
  636. * spnego/spnego_locl.h: Maybe include <sys/types.h>.
  637. * mech/mech_locl.h: Include <roken.h>.
  638. * Makefile.am: split build files into dist_ and noinst_ SOURCES
  639. 2006-10-06 Love Hörnquist Åstrand <lha@it.su.se>
  640. * gss.c: #if 0 out unused code.
  641. * mech/gss_mech_switch.c: Cast argument to ctype(3) functions
  642. to (unsigned char).
  643. 2006-10-05 Love Hörnquist Åstrand <lha@it.su.se>
  644. * mech/name.h: remove <sys/queue.h>
  645. * mech/mech_switch.h: remove <sys/queue.h>
  646. * mech/cred.h: remove <sys/queue.h>
  647. 2006-10-02 Love Hörnquist Åstrand <lha@it.su.se>
  648. * krb5/arcfour.c: Thinker more with header lengths.
  649. * krb5/arcfour.c: Improve the calcucation of header
  650. lengths. DCE-STYLE data is also padded so remove if (1 || ...)
  651. code.
  652. * krb5/wrap.c (_gsskrb5_wrap_size_limit): use
  653. _gssapi_wrap_size_arcfour for arcfour
  654. * krb5/arcfour.c: Move _gssapi_wrap_size_arcfour here.
  655. * Makefile.am: Split all mech to diffrent mechsrc variables.
  656. * spnego/context_stubs.c: Make internal function static (and
  657. rename).
  658. 2006-10-01 Love Hörnquist Åstrand <lha@it.su.se>
  659. * krb5/inquire_cred.c: Fix "if (x) lock(y)" bug. From Harald
  660. Barth.
  661. * spnego/spnego_locl.h: Include <sys/param.h> for MAXHOSTNAMELEN.
  662. 2006-09-25 Love Hörnquist Åstrand <lha@it.su.se>
  663. * krb5/arcfour.c: Add wrap support, interrop with itself but not
  664. w2k3s-sp1
  665. * krb5/gsskrb5_locl.h: move the arcfour specific stuff to the
  666. arcfour header.
  667. * krb5/arcfour.c: Support DCE-style unwrap, tested with
  668. w2k3server-sp1.
  669. * mech/gss_accept_sec_context.c (gss_accept_sec_context): if the
  670. token doesn't start with [APPLICATION 0] SEQUENCE, lets assume its
  671. a DCE-style kerberos 5 connection. XXX this needs to be made
  672. better in cause we get another GSS-API protocol violating
  673. protocol. It should be possible to detach the Kerberos DCE-style
  674. since it starts with a AP-REQ PDU, but that have to wait for now.
  675. 2006-09-22 Love Hörnquist Åstrand <lha@it.su.se>
  676. * gssapi.h: Add GSS_C flags from
  677. draft-brezak-win2k-krb-rc4-hmac-04.txt.
  678. * krb5/delete_sec_context.c: Free service_keyblock and fwd_data,
  679. indent.
  680. * krb5/accept_sec_context.c: Merge of the acceptor part from the
  681. samba patch by Stefan Metzmacher and Andrew Bartlet.
  682. * krb5/init_sec_context.c: Add GSS_C_DCE_STYLE.
  683. * krb5/{init_sec_context.c,gsskrb5_locl.h}: merge most of the
  684. initiator part from the samba patch by Stefan Metzmacher and
  685. Andrew Bartlet (still missing DCE/RPC support)
  686. 2006-08-28 Love Hörnquist Åstrand <lha@it.su.se>
  687. * gss.c (help): use sl_slc_help().
  688. 2006-07-22 Love Hörnquist Åstrand <lha@it.su.se>
  689. * gss-commands.in: rename command to supported-mechanisms
  690. * Makefile.am: Make gss objects depend on the slc built
  691. gss-commands.h
  692. 2006-07-20 Love Hörnquist Åstrand <lha@it.su.se>
  693. * gss-commands.in: add slc commands for gss
  694. * krb5/gsskrb5_locl.h: Remove dup prototype of _gsskrb5_init()
  695. * Makefile.am: Add test_cfx
  696. * krb5/external.c: add GSS_KRB5_REGISTER_ACCEPTOR_IDENTITY_X
  697. * krb5/set_sec_context_option.c: catch
  698. GSS_KRB5_REGISTER_ACCEPTOR_IDENTITY_X
  699. * krb5/accept_sec_context.c: reimplement
  700. gsskrb5_register_acceptor_identity
  701. * mech/gss_krb5.c: implement gsskrb5_register_acceptor_identity
  702. * mech/gss_inquire_mechs_for_name.c: call _gss_load_mech
  703. * mech/gss_inquire_cred.c (gss_inquire_cred): call _gss_load_mech
  704. * mech/gss_mech_switch.c: Make _gss_load_mech() atomic and run
  705. only once, this have the side effect that _gss_mechs and
  706. _gss_mech_oids is only initialized once, so if just the users of
  707. these two global variables calls _gss_load_mech() first, it will
  708. act as a barrier and make sure the variables are never changed and
  709. we don't need to lock them.
  710. * mech/utils.h: no need to mark functions extern.
  711. * mech/name.h: no need to mark _gss_find_mn extern.
  712. 2006-07-19 Love Hörnquist Åstrand <lha@it.su.se>
  713. * krb5/cfx.c: Redo the wrap length calculations.
  714. * krb5/test_cfx.c: test max_wrap_size in cfx.c
  715. * mech/gss_display_status.c: Handle more error codes.
  716. 2006-07-07 Love Hörnquist Åstrand <lha@it.su.se>
  717. * mech/mech_locl.h: Include <krb5-types.h> and "mechqueue.h"
  718. * mech/mechqueue.h: Add SLIST macros.
  719. * krb5/inquire_context.c: Don't free return values on success.
  720. * krb5/inquire_cred.c (_gsskrb5_inquire_cred): When cred provided
  721. is the default cred, acquire the acceptor cred and initator cred
  722. in two diffrent steps and then query them for the information,
  723. this way, the code wont fail if there are no keytab, but there is
  724. a credential cache.
  725. * mech/gss_inquire_cred.c: move the check if we found any cred
  726. where it matter for both cases
  727. (default cred and provided cred)
  728. * mech/gss_init_sec_context.c: If the desired mechanism can't
  729. convert the name to a MN, fail with GSS_S_BAD_NAME rather then a
  730. NULL de-reference.
  731. 2006-07-06 Love Hörnquist Åstrand <lha@it.su.se>
  732. * spnego/external.c: readd gss_spnego_inquire_names_for_mech
  733. * spnego/spnego_locl.h: reimplement
  734. gss_spnego_inquire_names_for_mech add support function
  735. _gss_spnego_supported_mechs
  736. * spnego/context_stubs.h: reimplement
  737. gss_spnego_inquire_names_for_mech add support function
  738. _gss_spnego_supported_mechs
  739. * spnego/context_stubs.c: drop gss_spnego_indicate_mechs
  740. * mech/gss_indicate_mechs.c: if the underlaying mech doesn't
  741. support gss_indicate_mechs, use the oid in the mechswitch
  742. structure
  743. * spnego/external.c: let the mech glue layer implement
  744. gss_indicate_mechs
  745. * spnego/cred_stubs.c (gss_spnego_acquire_cred): don't care about
  746. desired_mechs, get our own list with indicate_mechs and remove
  747. ourself.
  748. 2006-07-05 Love Hörnquist Åstrand <lha@it.su.se>
  749. * spnego/external.c: remove gss_spnego_inquire_names_for_mech, let
  750. the mechglue layer implement it
  751. * spnego/context_stubs.c: remove gss_spnego_inquire_names_for_mech, let
  752. the mechglue layer implement it
  753. * spnego/spnego_locl.c: remove gss_spnego_inquire_names_for_mech, let
  754. the mechglue layer implement it
  755. 2006-07-01 Love Hörnquist Åstrand <lha@it.su.se>
  756. * mech/gss_set_cred_option.c: fix argument to gss_release_cred
  757. 2006-06-30 Love Hörnquist Åstrand <lha@it.su.se>
  758. * krb5/init_sec_context.c: Make work on compilers that are
  759. somewhat more picky then gcc4 (like gcc2.95)
  760. * krb5/init_sec_context.c (do_delegation): use KDCOptions2int to
  761. convert fwd_flags to an integer, since otherwise int2KDCOptions in
  762. krb5_get_forwarded_creds wont do the right thing.
  763. * mech/gss_set_cred_option.c (gss_set_cred_option): free memory on
  764. failure
  765. * krb5/set_sec_context_option.c (_gsskrb5_set_sec_context_option):
  766. init global kerberos context
  767. * krb5/set_cred_option.c (_gsskrb5_set_cred_option): init global
  768. kerberos context
  769. * mech/gss_accept_sec_context.c: Insert the delegated sub cred on
  770. the delegated cred handle, not cred handle
  771. * mech/gss_accept_sec_context.c (gss_accept_sec_context): handle
  772. the case where ret_flags == NULL
  773. * mech/gss_mech_switch.c (add_builtin): set
  774. _gss_mech_switch->gm_mech_oid
  775. * mech/gss_set_cred_option.c (gss_set_cred_option): laod mechs
  776. * test_cred.c (gss_print_errors): don't try to print error when
  777. gss_display_status failed
  778. * Makefile.am: Add mech/gss_release_oid.c
  779. * mech/gss_release_oid.c: Add gss_release_oid, reverse of
  780. gss_duplicate_oid
  781. * spnego/compat.c: preferred_mech_type was allocated with
  782. gss_duplicate_oid in one place and assigned static varianbles a
  783. the second place. change that static assignement to
  784. gss_duplicate_oid and bring back gss_release_oid.
  785. * spnego/compat.c (_gss_spnego_delete_sec_context): don't release
  786. preferred_mech_type and negotiated_mech_type, they where never
  787. allocated from the begining.
  788. 2006-06-29 Love Hörnquist Åstrand <lha@it.su.se>
  789. * mech/gss_import_name.c (gss_import_name): avoid
  790. type-punned/strict aliasing rules
  791. * mech/gss_add_cred.c: avoid type-punned/strict aliasing rules
  792. * gssapi.h: Make gss_name_t an opaque type.
  793. * krb5: make gss_name_t an opaque type
  794. * krb5/set_cred_option.c: Add
  795. * mech/gss_set_cred_option.c (gss_set_cred_option): support the
  796. case where *cred_handle == NULL
  797. * mech/gss_krb5.c (gss_krb5_import_cred): make sure cred is
  798. GSS_C_NO_CREDENTIAL on failure.
  799. * mech/gss_acquire_cred.c (gss_acquire_cred): if desired_mechs is
  800. NO_OID_SET, there is a need to load the mechs, so always do that.
  801. 2006-06-28 Love Hörnquist Åstrand <lha@it.su.se>
  802. * krb5/inquire_cred_by_oid.c: Reimplement GSS_KRB5_COPY_CCACHE_X
  803. to instead pass a fullname to the credential, then resolve and
  804. copy out the content, and then close the cred.
  805. * mech/gss_krb5.c: Reimplement GSS_KRB5_COPY_CCACHE_X to instead
  806. pass a fullname to the credential, then resolve and copy out the
  807. content, and then close the cred.
  808. * krb5/inquire_cred_by_oid.c: make "work", GSS_KRB5_COPY_CCACHE_X
  809. interface needs to be re-done, currently its utterly broken.
  810. * mech/gss_set_cred_option.c: Make work.
  811. * krb5/external.c: Add _gsskrb5_set_{sec_context,cred}_option
  812. * mech/gss_krb5.c (gss_krb5_import_cred): implement
  813. * Makefile.am: Add gss_set_{sec_context,cred}_option and sort
  814. * mech/gss_set_{sec_context,cred}_option.c: add
  815. * gssapi.h: Add GSS_KRB5_IMPORT_CRED_X
  816. * test_*.c: make compile again
  817. * Makefile.am: Add lib dependencies and test programs
  818. * spnego: remove dependency on libkrb5
  819. * mech: Bug fixes, cleanup, compiler warnings, restructure code.
  820. * spnego: Rename gss_context_id_t and gss_cred_id_t to local names
  821. * krb5: repro copy the krb5 files here
  822. * mech: import Doug Rabson mechglue from freebsd
  823. * spnego: Import Luke Howard's SPNEGO from the mechglue branch
  824. 2006-06-22 Love Hörnquist Åstrand <lha@it.su.se>
  825. * gssapi.h: Add oid_to_str.
  826. * Makefile.am: add oid_to_str and test_oid
  827. * oid_to_str.c: Add gss_oid_to_str
  828. * test_oid.c: Add test for gss_oid_to_str()
  829. 2006-05-13 Love Hörnquist Åstrand <lha@it.su.se>
  830. * verify_mic.c: Less pointer signedness warnings.
  831. * unwrap.c: Less pointer signedness warnings.
  832. * arcfour.c: Less pointer signedness warnings.
  833. * gssapi_locl.h: Use const void * to instead of unsigned char * to
  834. avoid pointer signedness warnings.
  835. * encapsulate.c: Use const void * to instead of unsigned char * to
  836. avoid pointer signedness warnings.
  837. * decapsulate.c: Use const void * to instead of unsigned char * to
  838. avoid pointer signedness warnings.
  839. * decapsulate.c: Less pointer signedness warnings.
  840. * cfx.c: Less pointer signedness warnings.
  841. * init_sec_context.c: Less pointer signedness warnings (partly by
  842. using the new asn.1 CHOICE decoder)
  843. * import_sec_context.c: Less pointer signedness warnings.
  844. 2006-05-09 Love Hörnquist Åstrand <lha@it.su.se>
  845. * accept_sec_context.c (gsskrb5_is_cfx): always set is_cfx. From
  846. Andrew Abartlet.
  847. 2006-05-08 Love Hörnquist Åstrand <lha@it.su.se>
  848. * get_mic.c (mic_des3): make sure message_buffer doesn't point to
  849. free()ed memory on failure. Pointed out by IBM checker.
  850. 2006-05-05 Love Hörnquist Åstrand <lha@it.su.se>
  851. * Rename u_intXX_t to uintXX_t
  852. 2006-05-04 Love Hörnquist Åstrand <lha@it.su.se>
  853. * cfx.c: Less pointer signedness warnings.
  854. * arcfour.c: Avoid pointer signedness warnings.
  855. * gssapi_locl.h (gssapi_decode_*): make data argument const void *
  856. * 8003.c (gssapi_decode_*): make data argument const void *
  857. 2006-04-12 Love Hörnquist Åstrand <lha@it.su.se>
  858. * export_sec_context.c: Export sequence order element. From Wynn
  859. Wilkes <wynn.wilkes@quest.com>.
  860. * import_sec_context.c: Import sequence order element. From Wynn
  861. Wilkes <wynn.wilkes@quest.com>.
  862. * sequence.c (_gssapi_msg_order_import,_gssapi_msg_order_export):
  863. New functions, used by {import,export}_sec_context. From Wynn
  864. Wilkes <wynn.wilkes@quest.com>.
  865. * test_sequence.c: Add test for import/export sequence.
  866. 2006-04-09 Love Hörnquist Åstrand <lha@it.su.se>
  867. * add_cred.c: Check that cred != GSS_C_NO_CREDENTIAL, this is a
  868. standard conformance failure, but much better then a crash.
  869. 2006-04-02 Love Hörnquist Åstrand <lha@it.su.se>
  870. * get_mic.c (get_mic*)_: make sure message_token is cleaned on
  871. error, found by IBM checker.
  872. * wrap.c (wrap*): Reset output_buffer on error, found by IBM
  873. checker.
  874. 2006-02-15 Love Hörnquist Åstrand <lha@it.su.se>
  875. * import_name.c: Accept both GSS_C_NT_HOSTBASED_SERVICE and
  876. GSS_C_NT_HOSTBASED_SERVICE_X as nametype for hostbased names.
  877. 2006-01-16 Love Hörnquist Åstrand <lha@it.su.se>
  878. * delete_sec_context.c (gss_delete_sec_context): if the context
  879. handle is GSS_C_NO_CONTEXT, don't fall over.
  880. 2005-12-12 Love Hörnquist Åstrand <lha@it.su.se>
  881. * gss_acquire_cred.3: Replace gss_krb5_import_ccache with
  882. gss_krb5_import_cred and add more references
  883. 2005-12-05 Love Hörnquist Åstrand <lha@it.su.se>
  884. * gssapi.h: Change gss_krb5_import_ccache to gss_krb5_import_cred,
  885. it can handle keytabs too.
  886. * add_cred.c (gss_add_cred): avoid deadlock
  887. * context_time.c (gssapi_lifetime_left): define the 0 lifetime as
  888. GSS_C_INDEFINITE.
  889. 2005-12-01 Love Hörnquist Åstrand <lha@it.su.se>
  890. * acquire_cred.c (acquire_acceptor_cred): only check if principal
  891. exists if we got called with principal as an argument.
  892. * acquire_cred.c (acquire_acceptor_cred): check that the acceptor
  893. exists in the keytab before returning ok.
  894. 2005-11-29 Love Hörnquist Åstrand <lha@it.su.se>
  895. * copy_ccache.c (gss_krb5_import_cred): fix buglet, from Andrew
  896. Bartlett.
  897. 2005-11-25 Love Hörnquist Åstrand <lha@it.su.se>
  898. * test_kcred.c: Rename gss_krb5_import_ccache to
  899. gss_krb5_import_cred.
  900. * copy_ccache.c: Rename gss_krb5_import_ccache to
  901. gss_krb5_import_cred and let it grow code to handle keytabs too.
  902. 2005-11-02 Love Hörnquist Åstrand <lha@it.su.se>
  903. * init_sec_context.c: Change sematics of ok-as-delegate to match
  904. windows if
  905. [gssapi]realm/ok-as-delegate=true is set, otherwise keep old
  906. sematics.
  907. * release_cred.c (gss_release_cred): use
  908. GSS_CF_DESTROY_CRED_ON_RELEASE to decide if the cache should be
  909. krb5_cc_destroy-ed
  910. * acquire_cred.c (acquire_initiator_cred):
  911. GSS_CF_DESTROY_CRED_ON_RELEASE on created credentials.
  912. * accept_sec_context.c (gsskrb5_accept_delegated_token): rewrite
  913. to use gss_krb5_import_ccache
  914. 2005-11-01 Love Hörnquist Åstrand <lha@it.su.se>
  915. * arcfour.c: Remove signedness warnings.
  916. 2005-10-31 Love Hörnquist Åstrand <lha@it.su.se>
  917. * gss_acquire_cred.3: Document that gss_krb5_import_ccache is copy
  918. by reference.
  919. * copy_ccache.c (gss_krb5_import_ccache): Instead of making a copy
  920. of the ccache, make a reference by getting the name and resolving
  921. the name. This way the cache is shared, this flipp side is of
  922. course that if someone calls krb5_cc_destroy the cache is lost for
  923. everyone.
  924. * test_kcred.c: Remove memory leaks.
  925. 2005-10-26 Love Hörnquist Åstrand <lha@it.su.se>
  926. * Makefile.am: build test_kcred
  927. * gss_acquire_cred.3: Document gss_krb5_import_ccache
  928. * gssapi.3: Sort and add gss_krb5_import_ccache.
  929. * acquire_cred.c (_gssapi_krb5_ccache_lifetime): break out code
  930. used to extract lifetime from a credential cache
  931. * gssapi_locl.h: Add _gssapi_krb5_ccache_lifetime, used to extract
  932. lifetime from a credential cache.
  933. * gssapi.h: add gss_krb5_import_ccache, reverse of
  934. gss_krb5_copy_ccache
  935. * copy_ccache.c: add gss_krb5_import_ccache, reverse of
  936. gss_krb5_copy_ccache
  937. * test_kcred.c: test gss_krb5_import_ccache
  938. 2005-10-21 Love Hörnquist Åstrand <lha@it.su.se>
  939. * acquire_cred.c (acquire_initiator_cred): use krb5_cc_cache_match
  940. to find a matching creditial cache, if that failes, fallback to
  941. the default cache.
  942. 2005-10-12 Love Hörnquist Åstrand <lha@it.su.se>
  943. * gssapi_locl.h: Add gssapi_krb5_set_status and
  944. gssapi_krb5_clear_status
  945. * init_sec_context.c (spnego_reply): Don't pass back raw Kerberos
  946. errors, use GSS-API errors instead. From Michael B Allen.
  947. * display_status.c: Add gssapi_krb5_clear_status,
  948. gssapi_krb5_set_status for handling error messages.
  949. 2005-08-23 Love Hörnquist Åstrand <lha@it.su.se>
  950. * external.c: Use rk_UNCONST to avoid const warning.
  951. * display_status.c: Constify strings to avoid warnings.
  952. 2005-08-11 Love Hörnquist Åstrand <lha@it.su.se>
  953. * init_sec_context.c: avoid warnings, update (c)
  954. 2005-07-13 Love Hörnquist Åstrand <lha@it.su.se>
  955. * init_sec_context.c (spnego_initial): use NegotiationToken
  956. encoder now that we have one with the new asn1. compiler.
  957. * Makefile.am: the new asn.1 compiler includes the modules name in
  958. the depend file
  959. 2005-06-16 Love Hörnquist Åstrand <lha@it.su.se>
  960. * decapsulate.c: use rk_UNCONST
  961. * ccache_name.c: rename to avoid shadowing
  962. * gssapi_locl.h: give kret in GSSAPI_KRB5_INIT a more unique name
  963. * process_context_token.c: use rk_UNCONST to unconstify
  964. * test_cred.c: rename optind to optidx
  965. 2005-05-30 Love Hörnquist Åstrand <lha@it.su.se>
  966. * init_sec_context.c (init_auth): honor ok-as-delegate if local
  967. configuration approves
  968. * gssapi_locl.h: prototype for _gss_check_compat
  969. * compat.c: export check_compat as _gss_check_compat
  970. 2005-05-29 Love Hörnquist Åstrand <lha@it.su.se>
  971. * init_sec_context.c: Prefix Der_class with ASN1_C_ to avoid
  972. problems with system headerfiles that pollute the name space.
  973. * accept_sec_context.c: Prefix Der_class with ASN1_C_ to avoid
  974. problems with system headerfiles that pollute the name space.
  975. 2005-05-17 Love Hörnquist Åstrand <lha@it.su.se>
  976. * init_sec_context.c (init_auth): set
  977. KRB5_AUTH_CONTEXT_CLEAR_FORWARDED_CRED (for java compatibility),
  978. also while here, use krb5_auth_con_addflags
  979. 2005-05-06 Love Hörnquist Åstrand <lha@it.su.se>
  980. * arcfour.c (_gssapi_wrap_arcfour): fix calculating the encap
  981. length. From: Tom Maher <tmaher@eecs.berkeley.edu>
  982. 2005-05-02 Dave Love <fx@gnu.org>
  983. * test_cred.c (main): Call setprogname.
  984. 2005-04-27 Love Hörnquist Åstrand <lha@it.su.se>
  985. * prefix all sequence symbols with _, they are not part of the
  986. GSS-API api. By comment from Wynn Wilkes <wynnw@vintela.com>
  987. 2005-04-10 Love Hörnquist Åstrand <lha@it.su.se>
  988. * accept_sec_context.c: break out the processing of the delegated
  989. credential to a separate function to make error handling easier,
  990. move the credential handling to after other setup is done
  991. * test_sequence.c: make less verbose in case of success
  992. * Makefile.am: add test_sequence to TESTS
  993. 2005-04-01 Love Hörnquist Åstrand <lha@it.su.se>
  994. * 8003.c (gssapi_krb5_verify_8003_checksum): check that cksum
  995. isn't NULL From: Nicolas Pouvesle <npouvesle@tenablesecurity.com>
  996. 2005-03-21 Love Hörnquist Åstrand <lha@it.su.se>
  997. * Makefile.am: use $(LIB_roken)
  998. 2005-03-16 Love Hörnquist Åstrand <lha@it.su.se>
  999. * display_status.c (gssapi_krb5_set_error_string): pass in the
  1000. krb5_context to krb5_free_error_string
  1001. 2005-03-15 Love Hörnquist Åstrand <lha@it.su.se>
  1002. * display_status.c (gssapi_krb5_set_error_string): don't misuse
  1003. the krb5_get_error_string api
  1004. 2005-03-01 Love Hörnquist Åstrand <lha@it.su.se>
  1005. * compat.c (_gss_DES3_get_mic_compat): don't unlock mutex
  1006. here. Bug reported by Stefan Metzmacher <metze@samba.org>
  1007. 2005-02-21 Luke Howard <lukeh@padl.com>
  1008. * init_sec_context.c: don't call krb5_get_credentials() with
  1009. KRB5_TC_MATCH_KEYTYPE, it can lead to the credentials cache
  1010. growing indefinitely as no key is found with KEYTYPE_NULL
  1011. * compat.c: remove GSS_C_EXPECTING_MECH_LIST_MIC_FLAG, it is
  1012. no longer used (however the mechListMIC behaviour is broken,
  1013. rfc2478bis support requires the code in the mechglue branch)
  1014. * init_sec_context.c: remove GSS_C_EXPECTING_MECH_LIST_MIC_FLAG
  1015. * gssapi.h: remove GSS_C_EXPECTING_MECH_LIST_MIC_FLAG
  1016. 2005-01-05 Luke Howard <lukeh@padl.com>
  1017. * 8003.c: use symbolic name for checksum type
  1018. * accept_sec_context.c: allow client to indicate
  1019. that subkey should be used
  1020. * acquire_cred.c: plug leak
  1021. * get_mic.c: use gss_krb5_get_subkey() instead
  1022. of gss_krb5_get_{local,remote}key(), support
  1023. KEYTYPE_ARCFOUR_56
  1024. * gssapi_local.c: use gss_krb5_get_subkey(),
  1025. support KEYTYPE_ARCFOUR_56
  1026. * import_sec_context.c: plug leak
  1027. * unwrap.c: use gss_krb5_get_subkey(),
  1028. support KEYTYPE_ARCFOUR_56
  1029. * verify_mic.c: use gss_krb5_get_subkey(),
  1030. support KEYTYPE_ARCFOUR_56
  1031. * wrap.c: use gss_krb5_get_subkey(),
  1032. support KEYTYPE_ARCFOUR_56
  1033. 2004-11-30 Love Hörnquist Åstrand <lha@it.su.se>
  1034. * inquire_cred.c: Reverse order of HEIMDAL_MUTEX_unlock and
  1035. gss_release_cred to avoid deadlock, from Luke Howard
  1036. <lukeh@padl.com>.
  1037. 2004-09-06 Love Hörnquist Åstrand <lha@it.su.se>
  1038. * gss_acquire_cred.3: gss_krb5_extract_authz_data_from_sec_context
  1039. was renamed to gsskrb5_extract_authz_data_from_sec_context
  1040. 2004-08-07 Love Hörnquist Åstrand <lha@it.su.se>
  1041. * unwrap.c: mutex buglet, From: Luke Howard <lukeh@PADL.COM>
  1042. * arcfour.c: mutex buglet, From: Luke Howard <lukeh@PADL.COM>
  1043. 2004-05-06 Love Hörnquist Åstrand <lha@it.su.se>
  1044. * gssapi.3: spelling from Josef El-Rayes <josef@FreeBSD.org> while
  1045. here, write some text about the SPNEGO situation
  1046. 2004-04-08 Love Hörnquist Åstrand <lha@it.su.se>
  1047. * cfx.c: s/CTXAcceptorSubkey/CFXAcceptorSubkey/
  1048. 2004-04-07 Love Hörnquist Åstrand <lha@it.su.se>
  1049. * gssapi.h: add GSS_C_EXPECTING_MECH_LIST_MIC_FLAG From: Luke
  1050. Howard <lukeh@padl.com>
  1051. * init_sec_context.c (spnego_reply): use
  1052. _gss_spnego_require_mechlist_mic to figure out if we need to check
  1053. MechListMIC; From: Luke Howard <lukeh@padl.com>
  1054. * accept_sec_context.c (send_accept): use
  1055. _gss_spnego_require_mechlist_mic to figure out if we need to send
  1056. MechListMIC; From: Luke Howard <lukeh@padl.com>
  1057. * gssapi_locl.h: add _gss_spnego_require_mechlist_mic
  1058. From: Luke Howard <lukeh@padl.com>
  1059. * compat.c: add _gss_spnego_require_mechlist_mic for compatibility
  1060. with MS SPNEGO, From: Luke Howard <lukeh@padl.com>
  1061. 2004-04-05 Love Hörnquist Åstrand <lha@it.su.se>
  1062. * accept_sec_context.c (gsskrb5_is_cfx): krb5_keyblock->keytype is
  1063. an enctype, not keytype
  1064. * accept_sec_context.c: use ASN1_MALLOC_ENCODE
  1065. * init_sec_context.c: avoid the malloc loop and just allocate the
  1066. propper amount of data
  1067. * init_sec_context.c (spnego_initial): handle mech_token better
  1068. 2004-03-19 Love Hörnquist Åstrand <lha@it.su.se>
  1069. * gssapi.h: add gss_krb5_get_tkt_flags
  1070. * Makefile.am: add ticket_flags.c
  1071. * ticket_flags.c: Get ticket-flags from acceptor ticket From: Luke
  1072. Howard <lukeh@PADL.COM>
  1073. * gss_acquire_cred.3: document gss_krb5_get_tkt_flags
  1074. 2004-03-14 Love Hörnquist Åstrand <lha@it.su.se>
  1075. * acquire_cred.c (gss_acquire_cred): check usage before even
  1076. bothering to process it, add both keytab and initial tgt if
  1077. requested
  1078. * wrap.c: support cfx, try to handle acceptor asserted subkey
  1079. * unwrap.c: support cfx, try to handle acceptor asserted subkey
  1080. * verify_mic.c: support cfx
  1081. * get_mic.c: support cfx
  1082. * test_sequence.c: handle changed signature of
  1083. gssapi_msg_order_create
  1084. * import_sec_context.c: handle acceptor asserted subkey
  1085. * init_sec_context.c: handle acceptor asserted subkey
  1086. * accept_sec_context.c: handle acceptor asserted subkey
  1087. * sequence.c: add dummy use_64 argument to gssapi_msg_order_create
  1088. * gssapi_locl.h: add partial support for CFX
  1089. * Makefile.am (noinst_PROGRAMS) += test_cred
  1090. * test_cred.c: gssapi credential testing
  1091. * test_acquire_cred.c: fix comment
  1092. 2004-03-07 Love Hörnquist Åstrand <lha@it.su.se>
  1093. * arcfour.h: drop structures for message formats, no longer used
  1094. * arcfour.c: comment describing message formats
  1095. * accept_sec_context.c (spnego_accept_sec_context): make sure the
  1096. length of the choice element doesn't overrun us
  1097. * init_sec_context.c (spnego_reply): make sure the length of the
  1098. choice element doesn't overrun us
  1099. * spnego.asn1: move NegotiationToken to avoid warning
  1100. * spnego.asn1: uncomment NegotiationToken
  1101. * Makefile.am: spnego_files += asn1_NegotiationToken.x
  1102. 2004-01-25 Love Hörnquist Åstrand <lha@it.su.se>
  1103. * gssapi.h: add gss_krb5_ccache_name
  1104. * Makefile.am (libgssapi_la_SOURCES): += ccache_name.c
  1105. * ccache_name.c (gss_krb5_ccache_name): help function enable to
  1106. set krb5 name, using out_name argument makes function no longer
  1107. thread-safe
  1108. * gssapi.3: add missing gss_krb5_ references
  1109. * gss_acquire_cred.3: document gss_krb5_ccache_name
  1110. 2003-12-12 Love Hörnquist Åstrand <lha@it.su.se>
  1111. * cfx.c: make rrc a modulus operation if its longer then the
  1112. length of the message, noticed by Sam Hartman
  1113. 2003-12-07 Love Hörnquist Åstrand <lha@it.su.se>
  1114. * accept_sec_context.c: use krb5_auth_con_addflags
  1115. 2003-12-05 Love Hörnquist Åstrand <lha@it.su.se>
  1116. * cfx.c: Wrap token id was in wrong order, found by Sam Hartman
  1117. 2003-12-04 Love Hörnquist Åstrand <lha@it.su.se>
  1118. * cfx.c: add AcceptorSubkey (but no code understand it yet) ignore
  1119. unknown token flags
  1120. 2003-11-22 Love Hörnquist Åstrand <lha@it.su.se>
  1121. * accept_sec_context.c: Don't require timestamp to be set on
  1122. delegated token, its already protected by the outer token (and
  1123. windows doesn't alway send it) Pointed out by Zi-Bin Yang
  1124. <zbyang@decru.com> on heimdal-discuss
  1125. 2003-11-14 Love Hörnquist Åstrand <lha@it.su.se>
  1126. * cfx.c: fix {} error, pointed out by Liqiang Zhu
  1127. 2003-11-10 Love Hörnquist Åstrand <lha@it.su.se>
  1128. * cfx.c: Sequence number should be stored in bigendian order From:
  1129. Luke Howard <lukeh@padl.com>
  1130. 2003-11-09 Love Hörnquist Åstrand <lha@it.su.se>
  1131. * delete_sec_context.c (gss_delete_sec_context): don't free
  1132. ticket, krb5_free_ticket does that now
  1133. 2003-11-06 Love Hörnquist Åstrand <lha@it.su.se>
  1134. * cfx.c: checksum the header last in MIC token, update to -03
  1135. From: Luke Howard <lukeh@padl.com>
  1136. 2003-10-07 Love Hörnquist Åstrand <lha@it.su.se>
  1137. * add_cred.c: If its a MEMORY cc, make a copy. We need to do this
  1138. since now gss_release_cred will destroy the cred. This should be
  1139. really be solved a better way.
  1140. * acquire_cred.c (gss_release_cred): if its a mcc, destroy it
  1141. rather the just release it Found by: "Zi-Bin Yang"
  1142. <zbyang@decru.com>
  1143. * acquire_cred.c (acquire_initiator_cred): use kret instead of ret
  1144. where appropriate
  1145. 2003-09-30 Love Hörnquist Åstrand <lha@it.su.se>
  1146. * gss_acquire_cred.3: spelling
  1147. From: jmc <jmc@prioris.mini.pw.edu.pl>
  1148. 2003-09-23 Love Hörnquist Åstrand <lha@it.su.se>
  1149. * cfx.c: - EC and RRC are big-endian, not little-endian - The
  1150. default is now to rotate regardless of GSS_C_DCE_STYLE. There are
  1151. no longer any references to GSS_C_DCE_STYLE. - rrc_rotate()
  1152. avoids allocating memory on the heap if rrc <= 256
  1153. From: Luke Howard <lukeh@padl.com>
  1154. 2003-09-22 Love Hörnquist Åstrand <lha@it.su.se>
  1155. * cfx.[ch]: rrc_rotate() was untested and broken, fix it.
  1156. Set and verify wrap Token->Filler.
  1157. Correct token ID for wrap tokens,
  1158. were accidentally swapped with delete tokens.
  1159. From: Luke Howard <lukeh@PADL.COM>
  1160. 2003-09-21 Love Hörnquist Åstrand <lha@it.su.se>
  1161. * cfx.[ch]: no ASN.1-ish header on per-message tokens
  1162. From: Luke Howard <lukeh@PADL.COM>
  1163. 2003-09-19 Love Hörnquist Åstrand <lha@it.su.se>
  1164. * arcfour.h: remove depenency on gss_arcfour_mic_token and
  1165. gss_arcfour_warp_token
  1166. * arcfour.c: remove depenency on gss_arcfour_mic_token and
  1167. gss_arcfour_warp_token
  1168. 2003-09-18 Love Hörnquist Åstrand <lha@it.su.se>
  1169. * 8003.c: remove #if 0'ed code
  1170. 2003-09-17 Love Hörnquist Åstrand <lha@it.su.se>
  1171. * accept_sec_context.c (gsskrb5_accept_sec_context): set sequence
  1172. number when not requesting mutual auth From: Luke Howard
  1173. <lukeh@PADL.COM>
  1174. * init_sec_context.c (init_auth): set sequence number when not
  1175. requesting mutual auth From: Luke Howard <lukeh@PADL.COM>
  1176. 2003-09-16 Love Hörnquist Åstrand <lha@it.su.se>
  1177. * arcfour.c (*): set minor_status
  1178. (gss_wrap): set conf_state to conf_req_flags on success
  1179. From: Luke Howard <lukeh@PADL.COM>
  1180. * wrap.c (gss_wrap_size_limit): use existing function From: Luke
  1181. Howard <lukeh@PADL.COM>
  1182. 2003-09-12 Love Hörnquist Åstrand <lha@it.su.se>
  1183. * indicate_mechs.c (gss_indicate_mechs): in case of error, free
  1184. mech_set
  1185. * indicate_mechs.c (gss_indicate_mechs): add SPNEGO
  1186. 2003-09-10 Love Hörnquist Åstrand <lha@it.su.se>
  1187. * init_sec_context.c (spnego_initial): catch errors and return
  1188. them
  1189. * init_sec_context.c (spnego_initial): add #if 0 out version of
  1190. the CHOICE branch encoding, also where here, free no longer used
  1191. memory
  1192. 2003-09-09 Love Hörnquist Åstrand <lha@it.su.se>
  1193. * gss_acquire_cred.3: support GSS_SPNEGO_MECHANISM
  1194. * accept_sec_context.c: SPNEGO doesn't include gss wrapping on
  1195. SubsequentContextToken like the Kerberos 5 mech does.
  1196. * init_sec_context.c (spnego_reply): SPNEGO doesn't include gss
  1197. wrapping on SubsequentContextToken like the Kerberos 5 mech
  1198. does. Lets check for it anyway.
  1199. * accept_sec_context.c: Add support for SPNEGO on the initator
  1200. side. Implementation initially from Assar Westerlund, passes
  1201. though quite a lot of hands before I commited it.
  1202. * init_sec_context.c: Add support for SPNEGO on the initator side.
  1203. Tested with ldap server on a Windows 2000 DC. Implementation
  1204. initially from Assar Westerlund, passes though quite a lot of
  1205. hands before I commited it.
  1206. * gssapi.h: export GSS_SPNEGO_MECHANISM
  1207. * gssapi_locl.h: include spnego_as.h add prototype for
  1208. gssapi_krb5_get_mech
  1209. * decapsulate.c (gssapi_krb5_get_mech): make non static
  1210. * Makefile.am: build SPNEGO file
  1211. 2003-09-08 Love Hörnquist Åstrand <lha@it.su.se>
  1212. * external.c: SPENGO and IAKERB oids
  1213. * spnego.asn1: SPENGO ASN1
  1214. 2003-09-05 Love Hörnquist Åstrand <lha@it.su.se>
  1215. * cfx.c: RRC also need to be zero before wraping them
  1216. From: Luke Howard <lukeh@PADL.COM>
  1217. 2003-09-04 Love Hörnquist Åstrand <lha@it.su.se>
  1218. * encapsulate.c (gssapi_krb5_encap_length): don't return void
  1219. 2003-09-03 Love Hörnquist Åstrand <lha@it.su.se>
  1220. * verify_mic.c: switch from the des_ to the DES_ api
  1221. * get_mic.c: switch from the des_ to the DES_ api
  1222. * unwrap.c: switch from the des_ to the DES_ api
  1223. * wrap.c: switch from the des_ to the DES_ api
  1224. * cfx.c: EC is not included in the checksum since the length might
  1225. change depending on the data. From: Luke Howard <lukeh@PADL.COM>
  1226. * acquire_cred.c: use
  1227. krb5_get_init_creds_opt_alloc/krb5_get_init_creds_opt_free
  1228. 2003-09-01 Love Hörnquist Åstrand <lha@it.su.se>
  1229. * copy_ccache.c: rename
  1230. gss_krb5_extract_authz_data_from_sec_context to
  1231. gsskrb5_extract_authz_data_from_sec_context
  1232. * gssapi.h: rename gss_krb5_extract_authz_data_from_sec_context to
  1233. gsskrb5_extract_authz_data_from_sec_context
  1234. 2003-08-31 Love Hörnquist Åstrand <lha@it.su.se>
  1235. * copy_ccache.c (gss_krb5_extract_authz_data_from_sec_context):
  1236. check that we have a ticket before we start to use it
  1237. * gss_acquire_cred.3: document
  1238. gss_krb5_extract_authz_data_from_sec_context
  1239. * gssapi.h (gss_krb5_extract_authz_data_from_sec_context):
  1240. return the kerberos authorizationdata, from idea of Luke Howard
  1241. * copy_ccache.c (gss_krb5_extract_authz_data_from_sec_context):
  1242. return the kerberos authorizationdata, from idea of Luke Howard
  1243. * verify_mic.c (gss_verify_mic_internal): switch type and key
  1244. argument
  1245. 2003-08-30 Love Hörnquist Åstrand <lha@it.su.se>
  1246. * cfx.[ch]: draft-ietf-krb-wg-gssapi-cfx-01.txt implemetation
  1247. From: Luke Howard <lukeh@PADL.COM>
  1248. 2003-08-28 Love Hörnquist Åstrand <lha@it.su.se>
  1249. * arcfour.c (arcfour_mic_cksum): use free_Checksum to free the
  1250. checksum
  1251. * arcfour.h: swap two last arguments to verify_mic for consistency
  1252. with des3
  1253. * wrap.c,unwrap.c,get_mic.c,verify_mic.c,cfx.c,cfx.h:
  1254. prefix cfx symbols with _gssapi_
  1255. * arcfour.c: release the right buffer
  1256. * arcfour.c: rename token structure in consistency with rest of
  1257. GSS-API From: Luke Howard <lukeh@PADL.COM>
  1258. * unwrap.c (unwrap_des3): use _gssapi_verify_pad
  1259. (unwrap_des): use _gssapi_verify_pad
  1260. * arcfour.c (_gssapi_wrap_arcfour): set the correct padding
  1261. (_gssapi_unwrap_arcfour): verify and strip padding
  1262. * gssapi_locl.h: added _gssapi_verify_pad
  1263. * decapsulate.c (_gssapi_verify_pad): verify padding of a gss
  1264. wrapped message and return its length
  1265. * arcfour.c: support KEYTYPE_ARCFOUR_56 keys, from Luke Howard
  1266. <lukeh@PADL.COM>
  1267. * arcfour.c: use right seal alg, inherit keytype from parent key
  1268. * arcfour.c: include the confounder in the checksum use the right
  1269. key usage number for warped/unwraped tokens
  1270. * gssapi.h: add gss_krb5_nt_general_name as an mit compat glue
  1271. (same as GSS_KRB5_NT_PRINCIPAL_NAME)
  1272. * unwrap.c: hook in arcfour unwrap
  1273. * wrap.c: hook in arcfour wrap
  1274. * verify_mic.c: hook in arcfour verify_mic
  1275. * get_mic.c: hook in arcfour get_mic
  1276. * arcfour.c: implement wrap/unwarp
  1277. * gssapi_locl.h: add gssapi_{en,de}code_be_om_uint32
  1278. * 8003.c: add gssapi_{en,de}code_be_om_uint32
  1279. 2003-08-27 Love Hörnquist Åstrand <lha@it.su.se>
  1280. * arcfour.c (_gssapi_verify_mic_arcfour): Do the checksum on right
  1281. area. Swap filler check, it was reversed.
  1282. * Makefile.am (libgssapi_la_SOURCES): += arcfour.c
  1283. * gssapi_locl.h: include "arcfour.h"
  1284. * arcfour.c: arcfour gss-api mech, get_mic/verify_mic working
  1285. * arcfour.h: arcfour gss-api mech, get_mic/verify_mic working
  1286. 2003-08-26 Love Hörnquist Åstrand <lha@it.su.se>
  1287. * gssapi_locl.h: always include cfx.h add prototype for
  1288. _gssapi_decapsulate
  1289. * cfx.[ch]: Implementation of draft-ietf-krb-wg-gssapi-cfx-00.txt
  1290. from Luke Howard <lukeh@PADL.COM>
  1291. * decapsulate.c: add _gssapi_decapsulate, from Luke Howard
  1292. <lukeh@PADL.COM>
  1293. 2003-08-25 Love Hörnquist Åstrand <lha@it.su.se>
  1294. * unwrap.c: encap/decap now takes a oid if the enctype/keytype is
  1295. arcfour, return error add hook for cfx
  1296. * verify_mic.c: encap/decap now takes a oid if the enctype/keytype
  1297. is arcfour, return error add hook for cfx
  1298. * get_mic.c: encap/decap now takes a oid if the enctype/keytype is
  1299. arcfour, return error add hook for cfx
  1300. * accept_sec_context.c: encap/decap now takes a oid
  1301. * init_sec_context.c: encap/decap now takes a oid
  1302. * gssapi_locl.h: include cfx.h if we need it lifetime is a
  1303. OM_uint32, depend on gssapi interface add all new encap/decap
  1304. functions
  1305. * decapsulate.c: add decap functions that doesn't take the token
  1306. type also make all decap function take the oid mech that they
  1307. should use
  1308. * encapsulate.c: add encap functions that doesn't take the token
  1309. type also make all encap function take the oid mech that they
  1310. should use
  1311. * sequence.c (elem_insert): fix a off by one index counter
  1312. * inquire_cred.c (gss_inquire_cred): handle cred_handle being
  1313. GSS_C_NO_CREDENTIAL and use the default cred then.
  1314. 2003-08-19 Love Hörnquist Åstrand <lha@it.su.se>
  1315. * gss_acquire_cred.3: break out extensions and document
  1316. gsskrb5_register_acceptor_identity
  1317. 2003-08-18 Love Hörnquist Åstrand <lha@it.su.se>
  1318. * test_acquire_cred.c (print_time): time is returned in seconds
  1319. from now, not unix time
  1320. 2003-08-17 Love Hörnquist Åstrand <lha@it.su.se>
  1321. * compat.c (check_compat): avoid leaking principal when finding a
  1322. match
  1323. * address_to_krb5addr.c: sa_size argument to krb5_addr2sockaddr is
  1324. a krb5_socklen_t
  1325. * acquire_cred.c (gss_acquire_cred): 4th argument to
  1326. gss_test_oid_set_member is a int
  1327. 2003-07-22 Love Hörnquist Åstrand <lha@it.su.se>
  1328. * init_sec_context.c (repl_mutual): don't set kerberos error where
  1329. there was no kerberos error
  1330. * gssapi_locl.h: Add destruction/creation prototypes and structure
  1331. for the thread specific storage.
  1332. * display_status.c: use thread specific storage to set/get the
  1333. kerberos error message
  1334. * init.c: Provide locking around the creation of the global
  1335. krb5_context. Add destruction/creation functions for the thread
  1336. specific storage that the error string handling is using.
  1337. 2003-07-20 Love Hörnquist Åstrand <lha@it.su.se>
  1338. * gss_acquire_cred.3: add missing prototype and missing .Ft
  1339. arguments
  1340. 2003-06-17 Love Hörnquist Åstrand <lha@it.su.se>
  1341. * verify_mic.c: reorder code so sequence numbers can can be used
  1342. * unwrap.c: reorder code so sequence numbers can can be used
  1343. * sequence.c: remove unused function, indent, add
  1344. gssapi_msg_order_f that filter gss flags to gss_msg_order flags
  1345. * gssapi_locl.h: prototypes for
  1346. gssapi_{encode_om_uint32,decode_om_uint32} add sequence number
  1347. verifier prototypes
  1348. * delete_sec_context.c: destroy sequence number verifier
  1349. * init_sec_context.c: remember to free data use sequence number
  1350. verifier
  1351. * accept_sec_context.c: don't clear output_token twice remember to
  1352. free data use sequence number verifier
  1353. * 8003.c: export and rename encode_om_uint32/decode_om_uint32 and
  1354. start to use them
  1355. 2003-06-09 Johan Danielsson <joda@pdc.kth.se>
  1356. * Makefile.am: can't have sequence.c in two different places
  1357. 2003-06-06 Love Hörnquist Åstrand <lha@it.su.se>
  1358. * test_sequence.c: check rollover, print summery
  1359. * wrap.c (sub_wrap_size): gss_wrap_size_limit() has
  1360. req_output_size and max_input_size around the wrong way -- it
  1361. returns the output token size for a given input size, rather than
  1362. the maximum input size for a given output token size.
  1363. From: Luke Howard <lukeh@PADL.COM>
  1364. 2003-06-05 Love Hörnquist Åstrand <lha@it.su.se>
  1365. * gssapi_locl.h: add prototypes for sequence.c
  1366. * Makefile.am (libgssapi_la_SOURCES): add sequence.c
  1367. (test_sequence): build
  1368. * sequence.c: sequence number checks, order and replay
  1369. * test_sequence.c: sequence number checks, order and replay
  1370. 2003-06-03 Love Hörnquist Åstrand <lha@it.su.se>
  1371. * accept_sec_context.c (gss_accept_sec_context): make sure time is
  1372. returned in seconds from now, not in kerberos time
  1373. * acquire_cred.c (gss_aquire_cred): make sure time is returned in
  1374. seconds from now, not in kerberos time
  1375. * init_sec_context.c (init_auth): if the cred is expired before we
  1376. tries to create a token, fail so the peer doesn't need reject us
  1377. (*): make sure time is returned in seconds from now,
  1378. not in kerberos time
  1379. (repl_mutual): remember to unlock the context mutex
  1380. * context_time.c (gss_context_time): remove unused variable
  1381. * verify_mic.c: make sure minor_status is always set, pointed out
  1382. by Luke Howard <lukeh@PADL.COM>
  1383. 2003-05-21 Love Hörnquist Åstrand <lha@it.su.se>
  1384. * *.[ch]: do some basic locking (no reference counting so contexts
  1385. can be removed while still used)
  1386. - don't export gss_ctx_id_t_desc_struct and gss_cred_id_t_desc_struct
  1387. - make sure all lifetime are returned in seconds left until expired,
  1388. not in unix epoch
  1389. * gss_acquire_cred.3: document argument lifetime_rec to function
  1390. gss_inquire_context
  1391. 2003-05-17 Love Hörnquist Åstrand <lha@it.su.se>
  1392. * test_acquire_cred.c: test gss_add_cred more then once
  1393. 2003-05-06 Love Hörnquist Åstrand <lha@it.su.se>
  1394. * gssapi.h: if __cplusplus, wrap the extern variable (just to be
  1395. safe) and functions in extern "C" { }
  1396. 2003-04-30 Love Hörnquist Åstrand <lha@it.su.se>
  1397. * gssapi.3: more about the des3 mic mess
  1398. * verify_mic.c (verify_mic_des3): always check if the mic is the
  1399. correct mic or the mic that old heimdal would have generated
  1400. 2003-04-28 Jacques Vidrine <nectar@kth.se>
  1401. * verify_mic.c (verify_mic_des3): If MIC verification fails,
  1402. retry using the `old' MIC computation (with zero IV).
  1403. 2003-04-26 Love Hörnquist Åstrand <lha@it.su.se>
  1404. * gss_acquire_cred.3: more about difference between comparing IN
  1405. and MN
  1406. * gss_acquire_cred.3: more about name type and access control
  1407. 2003-04-25 Love Hörnquist Åstrand <lha@it.su.se>
  1408. * gss_acquire_cred.3: document gss_context_time
  1409. * context_time.c: if lifetime of context have expired, set
  1410. time_rec to 0 and return GSS_S_CONTEXT_EXPIRED
  1411. * gssapi.3: document [gssapi]correct_des3_mic
  1412. [gssapi]broken_des3_mic
  1413. * gss_acquire_cred.3: document gss_krb5_compat_des3_mic
  1414. * compat.c (gss_krb5_compat_des3_mic): enable turning on/off des3
  1415. mic compat
  1416. (_gss_DES3_get_mic_compat): handle [gssapi]correct_des3_mic too
  1417. * gssapi.h (gss_krb5_compat_des3_mic): new function, turn on/off
  1418. des3 mic compat
  1419. (GSS_C_KRB5_COMPAT_DES3_MIC): cpp symbol that exists if
  1420. gss_krb5_compat_des3_mic exists
  1421. 2003-04-24 Love Hörnquist Åstrand <lha@it.su.se>
  1422. * Makefile.am: (libgssapi_la_LDFLAGS): update major
  1423. version of gssapi for incompatiblity in 3des getmic support
  1424. 2003-04-23 Love Hörnquist Åstrand <lha@it.su.se>
  1425. * Makefile.am: test_acquire_cred_LDADD: use libgssapi.la not
  1426. ./libgssapi.la (make make -jN work)
  1427. 2003-04-16 Love Hörnquist Åstrand <lha@it.su.se>
  1428. * gssapi.3: spelling
  1429. * gss_acquire_cred.3: Change .Fd #include <header.h> to .In
  1430. header.h, from Thomas Klausner <wiz@netbsd.org>
  1431. 2003-04-06 Love Hörnquist Åstrand <lha@it.su.se>
  1432. * gss_acquire_cred.3: spelling
  1433. * Makefile.am: remove stuff that sneaked in with last commit
  1434. * acquire_cred.c (acquire_initiator_cred): if the requested name
  1435. isn't in the ccache, also check keytab. Extact the krbtgt for the
  1436. default realm to check how long the credentials will last.
  1437. * add_cred.c (gss_add_cred): don't create a new ccache, just open
  1438. the old one; better check if output handle is compatible with new
  1439. (copied) handle
  1440. * test_acquire_cred.c: test gss_add_cred too
  1441. 2003-04-03 Love Hörnquist Åstrand <lha@it.su.se>
  1442. * Makefile.am: build test_acquire_cred
  1443. * test_acquire_cred.c: simple gss_acquire_cred test
  1444. 2003-04-02 Love Hörnquist Åstrand <lha@it.su.se>
  1445. * gss_acquire_cred.3: s/gssapi/GSS-API/
  1446. 2003-03-19 Love Hörnquist Åstrand <lha@it.su.se>
  1447. * gss_acquire_cred.3: document v1 interface (and that they are
  1448. obsolete)
  1449. 2003-03-18 Love Hörnquist Åstrand <lha@it.su.se>
  1450. * gss_acquire_cred.3: list supported mechanism and nametypes
  1451. 2003-03-16 Love Hörnquist Åstrand <lha@it.su.se>
  1452. * gss_acquire_cred.3: text about gss_display_name
  1453. * Makefile.am (libgssapi_la_LDFLAGS): bump to 3:6:2
  1454. (libgssapi_la_SOURCES): add all new functions
  1455. * gssapi.3: now that we have a functions, uncomment the missing
  1456. ones
  1457. * gss_acquire_cred.3: now that we have a functions, uncomment the
  1458. missing ones
  1459. * process_context_token.c: implement gss_process_context_token
  1460. * inquire_names_for_mech.c: implement gss_inquire_names_for_mech
  1461. * inquire_mechs_for_name.c: implement gss_inquire_mechs_for_name
  1462. * inquire_cred_by_mech.c: implement gss_inquire_cred_by_mech
  1463. * add_cred.c: implement gss_add_cred
  1464. * acquire_cred.c (gss_acquire_cred): more testing of input
  1465. argument, make sure output arguments are ok, since we don't know
  1466. the time_rec (for now), set it to time_req
  1467. * export_sec_context.c: send lifetime, also set minor_status
  1468. * get_mic.c: set minor_status
  1469. * import_sec_context.c (gss_import_sec_context): add error
  1470. checking, pick up lifetime (if there is no lifetime, use
  1471. GSS_C_INDEFINITE)
  1472. * init_sec_context.c: take care to set export value to something
  1473. sane before we start so caller will have harmless values in them
  1474. if then function fails
  1475. * release_buffer.c (gss_release_buffer): set minor_status
  1476. * wrap.c: make sure minor_status get set
  1477. * verify_mic.c (gss_verify_mic_internal): rename verify_mic to
  1478. gss_verify_mic_internal and let it take the type as an argument,
  1479. (gss_verify_mic): call gss_verify_mic_internal
  1480. set minor_status
  1481. * unwrap.c: set minor_status
  1482. * test_oid_set_member.c (gss_test_oid_set_member): use
  1483. gss_oid_equal
  1484. * release_oid_set.c (gss_release_oid_set): set minor_status
  1485. * release_name.c (gss_release_name): set minor_status
  1486. * release_cred.c (gss_release_cred): set minor_status
  1487. * add_oid_set_member.c (gss_add_oid_set_member): set minor_status
  1488. * compare_name.c (gss_compare_name): set minor_status
  1489. * compat.c (check_compat): make sure ret have a defined value
  1490. * context_time.c (gss_context_time): set minor_status
  1491. * copy_ccache.c (gss_krb5_copy_ccache): set minor_status
  1492. * create_emtpy_oid_set.c (gss_create_empty_oid_set): set
  1493. minor_status
  1494. * delete_sec_context.c (gss_delete_sec_context): set minor_status
  1495. * display_name.c (gss_display_name): set minor_status
  1496. * display_status.c (gss_display_status): use gss_oid_equal, handle
  1497. supplementary errors
  1498. * duplicate_name.c (gss_duplicate_name): set minor_status
  1499. * inquire_context.c (gss_inquire_context): set lifetime_rec now
  1500. when we know it, set minor_status
  1501. * inquire_cred.c (gss_inquire_cred): take care to set export value
  1502. to something sane before we start so caller will have harmless
  1503. values in them if the function fails
  1504. * accept_sec_context.c (gss_accept_sec_context): take care to set
  1505. export value to something sane before we start so caller will have
  1506. harmless values in them if then function fails, set lifetime from
  1507. ticket expiration date
  1508. * indicate_mechs.c (gss_indicate_mechs): use
  1509. gss_create_empty_oid_set and gss_add_oid_set_member
  1510. * gssapi.h (gss_ctx_id_t_desc): store the lifetime in the cred,
  1511. since there is no ticket transfered in the exported context
  1512. * export_name.c (gss_export_name): export name with
  1513. GSS_C_NT_EXPORT_NAME wrapping, not just the principal
  1514. * import_name.c (import_export_name): new function, parses a
  1515. GSS_C_NT_EXPORT_NAME
  1516. (import_krb5_name): factor out common code of parsing krb5 name
  1517. (gss_oid_equal): rename from oid_equal
  1518. * gssapi_locl.h: add prototypes for gss_oid_equal and
  1519. gss_verify_mic_internal
  1520. * gssapi.h: comment out the argument names
  1521. 2003-03-15 Love Hörnquist Åstrand <lha@it.su.se>
  1522. * gssapi.3: add LIST OF FUNCTIONS and copyright/license
  1523. * Makefile.am: s/gss_aquire_cred.3/gss_acquire_cred.3/
  1524. * Makefile.am: man_MANS += gss_aquire_cred.3
  1525. 2003-03-14 Love Hörnquist Åstrand <lha@it.su.se>
  1526. * gss_aquire_cred.3: the gssapi api manpage
  1527. 2003-03-03 Love Hörnquist Åstrand <lha@it.su.se>
  1528. * inquire_context.c: (gss_inquire_context): rename argument open
  1529. to open_context
  1530. * gssapi.h (gss_inquire_context): rename argument open to open_context
  1531. 2003-02-27 Love Hörnquist Åstrand <lha@it.su.se>
  1532. * init_sec_context.c (do_delegation): remove unused variable
  1533. subkey
  1534. * gssapi.3: all 0.5.x version had broken token delegation
  1535. 2003-02-21 Love Hörnquist Åstrand <lha@it.su.se>
  1536. * (init_auth): only generate one subkey
  1537. 2003-01-27 Love Hörnquist Åstrand <lha@it.su.se>
  1538. * verify_mic.c (verify_mic_des3): fix 3des verify_mic to conform
  1539. to rfc (and mit kerberos), provide backward compat hook
  1540. * get_mic.c (mic_des3): fix 3des get_mic to conform to rfc (and
  1541. mit kerberos), provide backward compat hook
  1542. * init_sec_context.c (init_auth): check if we need compat for
  1543. older get_mic/verify_mic
  1544. * gssapi_locl.h: add prototype for _gss_DES3_get_mic_compat
  1545. * gssapi.h (more_flags): add COMPAT_OLD_DES3
  1546. * Makefile.am: add gssapi.3 and compat.c
  1547. * gssapi.3: add gssapi COMPATIBILITY documentation
  1548. * accept_sec_context.c (gss_accept_sec_context): check if we need
  1549. compat for older get_mic/verify_mic
  1550. * compat.c: check for compatiblity with other heimdal's 3des
  1551. get_mic/verify_mic
  1552. 2002-10-31 Johan Danielsson <joda@pdc.kth.se>
  1553. * check return value from gssapi_krb5_init
  1554. * 8003.c (gssapi_krb5_verify_8003_checksum): check size of input
  1555. 2002-09-03 Johan Danielsson <joda@pdc.kth.se>
  1556. * wrap.c (wrap_des3): use ETYPE_DES3_CBC_NONE
  1557. * unwrap.c (unwrap_des3): use ETYPE_DES3_CBC_NONE
  1558. 2002-09-02 Johan Danielsson <joda@pdc.kth.se>
  1559. * init_sec_context.c: we need to generate a local subkey here
  1560. 2002-08-20 Jacques Vidrine <n@nectar.com>
  1561. * acquire_cred.c, inquire_cred.c, release_cred.c: Use default
  1562. credential resolution if gss_acquire_cred is called with
  1563. GSS_C_NO_NAME.
  1564. 2002-06-20 Jacques Vidrine <n@nectar.com>
  1565. * import_name.c: Compare name types by value if pointers do
  1566. not match. Reported by: "Douglas E. Engert" <deengert@anl.gov>
  1567. 2002-05-20 Jacques Vidrine <n@nectar.com>
  1568. * verify_mic.c (gss_verify_mic), unwrap.c (gss_unwrap): initialize
  1569. the qop_state parameter. from Doug Rabson <dfr@nlsystems.com>
  1570. 2002-05-09 Jacques Vidrine <n@nectar.com>
  1571. * acquire_cred.c: handle GSS_C_INITIATE/GSS_C_ACCEPT/GSS_C_BOTH
  1572. 2002-05-08 Jacques Vidrine <n@nectar.com>
  1573. * acquire_cred.c: initialize gssapi; handle null desired_name
  1574. 2002-03-22 Johan Danielsson <joda@pdc.kth.se>
  1575. * Makefile.am: remove non-functional stuff accidentally committed
  1576. 2002-03-11 Assar Westerlund <assar@sics.se>
  1577. * Makefile.am (libgssapi_la_LDFLAGS): bump version to 3:5:2
  1578. * 8003.c (gssapi_krb5_verify_8003_checksum): handle zero channel
  1579. bindings
  1580. 2001-10-31 Jacques Vidrine <n@nectar.com>
  1581. * get_mic.c (mic_des3): MIC computation using DES3/SHA1
  1582. was bogusly appending the message buffer to the result,
  1583. overwriting a heap buffer in the process.
  1584. 2001-08-29 Assar Westerlund <assar@sics.se>
  1585. * 8003.c (gssapi_krb5_verify_8003_checksum,
  1586. gssapi_krb5_create_8003_checksum): make more consistent by always
  1587. returning an gssapi error and setting minor status. update
  1588. callers
  1589. 2001-08-28 Jacques Vidrine <n@nectar.com>
  1590. * accept_sec_context.c: Create a cache for delegated credentials
  1591. when needed.
  1592. 2001-08-28 Assar Westerlund <assar@sics.se>
  1593. * Makefile.am (libgssapi_la_LDFLAGS): set version to 3:4:2
  1594. 2001-08-23 Assar Westerlund <assar@sics.se>
  1595. * *.c: handle minor_status more consistently
  1596. * display_status.c (gss_display_status): handle krb5_get_err_text
  1597. failing
  1598. 2001-08-15 Johan Danielsson <joda@pdc.kth.se>
  1599. * gssapi_locl.h: fix prototype for gssapi_krb5_init
  1600. 2001-08-13 Johan Danielsson <joda@pdc.kth.se>
  1601. * accept_sec_context.c (gsskrb5_register_acceptor_identity): init
  1602. context and check return value from kt_resolve
  1603. * init.c: return error code
  1604. 2001-07-19 Assar Westerlund <assar@sics.se>
  1605. * Makefile.am (libgssapi_la_LDFLAGS): update to 3:3:2
  1606. 2001-07-12 Assar Westerlund <assar@sics.se>
  1607. * Makefile.am (libgssapi_la_LIBADD): add required library
  1608. dependencies
  1609. 2001-07-06 Assar Westerlund <assar@sics.se>
  1610. * accept_sec_context.c (gsskrb5_register_acceptor_identity): set
  1611. the keytab to be used for gss_acquire_cred too'
  1612. 2001-07-03 Assar Westerlund <assar@sics.se>
  1613. * Makefile.am (libgssapi_la_LDFLAGS): set version to 3:2:2
  1614. 2001-06-18 Assar Westerlund <assar@sics.se>
  1615. * wrap.c: replace gss_krb5_getsomekey with gss_krb5_get_localkey
  1616. and gss_krb5_get_remotekey
  1617. * verify_mic.c: update krb5_auth_con function names use
  1618. gss_krb5_get_remotekey
  1619. * unwrap.c: replace gss_krb5_getsomekey with gss_krb5_get_localkey
  1620. and gss_krb5_get_remotekey
  1621. * gssapi_locl.h (gss_krb5_get_remotekey, gss_krb5_get_localkey):
  1622. add prototypes
  1623. * get_mic.c: update krb5_auth_con function names. use
  1624. gss_krb5_get_localkey
  1625. * accept_sec_context.c: update krb5_auth_con function names
  1626. 2001-05-17 Assar Westerlund <assar@sics.se>
  1627. * Makefile.am: bump version to 3:1:2
  1628. 2001-05-14 Assar Westerlund <assar@sics.se>
  1629. * address_to_krb5addr.c: adapt to new address functions
  1630. 2001-05-11 Assar Westerlund <assar@sics.se>
  1631. * try to return the error string from libkrb5 where applicable
  1632. 2001-05-08 Assar Westerlund <assar@sics.se>
  1633. * delete_sec_context.c (gss_delete_sec_context): remember to free
  1634. the memory used by the ticket itself. from <tmartin@mirapoint.com>
  1635. 2001-05-04 Assar Westerlund <assar@sics.se>
  1636. * gssapi_locl.h: add config.h for completeness
  1637. * gssapi.h: remove config.h, this is an installed header file
  1638. sys/types.h is not needed either
  1639. 2001-03-12 Assar Westerlund <assar@sics.se>
  1640. * acquire_cred.c (gss_acquire_cred): remove memory leaks. from
  1641. Jason R Thorpe <thorpej@zembu.com>
  1642. 2001-02-18 Assar Westerlund <assar@sics.se>
  1643. * accept_sec_context.c (gss_accept_sec_context): either return
  1644. gss_name NULL-ed or set
  1645. * import_name.c: set minor_status in some cases where it was not
  1646. done
  1647. 2001-02-15 Assar Westerlund <assar@sics.se>
  1648. * wrap.c: use krb5_generate_random_block for the confounders
  1649. 2001-01-30 Assar Westerlund <assar@sics.se>
  1650. * Makefile.am (libgssapi_la_LDFLAGS): bump version to 3:0:2
  1651. * acquire_cred.c, init_sec_context.c, release_cred.c: add support
  1652. for getting creds from a keytab, from fvdl@netbsd.org
  1653. * copy_ccache.c: add gss_krb5_copy_ccache
  1654. 2001-01-27 Assar Westerlund <assar@sics.se>
  1655. * get_mic.c: cast parameters to des function to non-const pointers
  1656. to handle the case where these functions actually take non-const
  1657. des_cblock *
  1658. 2001-01-09 Assar Westerlund <assar@sics.se>
  1659. * accept_sec_context.c (gss_accept_sec_context): use krb5_rd_cred2
  1660. instead of krb5_rd_cred
  1661. 2000-12-11 Assar Westerlund <assar@sics.se>
  1662. * Makefile.am (libgssapi_la_LDFLAGS): bump to 2:3:1
  1663. 2000-12-08 Assar Westerlund <assar@sics.se>
  1664. * wrap.c (wrap_des3): use the checksum as ivec when encrypting the
  1665. sequence number
  1666. * unwrap.c (unwrap_des3): use the checksum as ivec when encrypting
  1667. the sequence number
  1668. * init_sec_context.c (init_auth): always zero fwd_data
  1669. 2000-12-06 Johan Danielsson <joda@pdc.kth.se>
  1670. * accept_sec_context.c: de-pointerise auth_context parameter to
  1671. krb5_mk_rep
  1672. 2000-11-15 Assar Westerlund <assar@sics.se>
  1673. * init_sec_context.c (init_auth): update to new
  1674. krb5_build_authenticator
  1675. 2000-09-19 Assar Westerlund <assar@sics.se>
  1676. * Makefile.am (libgssapi_la_LDFLAGS): bump to 2:2:1
  1677. 2000-08-27 Assar Westerlund <assar@sics.se>
  1678. * init_sec_context.c: actually pay attention to `time_req'
  1679. * init_sec_context.c: re-organize. leak less memory.
  1680. * gssapi_locl.h (gssapi_krb5_encapsulate, gss_krb5_getsomekey):
  1681. update prototypes add assert.h
  1682. * gssapi.h (GSS_KRB5_CONF_C_QOP_DES, GSS_KRB5_CONF_C_QOP_DES3_KD):
  1683. add
  1684. * verify_mic.c: re-organize and add 3DES code
  1685. * wrap.c: re-organize and add 3DES code
  1686. * unwrap.c: re-organize and add 3DES code
  1687. * get_mic.c: re-organize and add 3DES code
  1688. * encapsulate.c (gssapi_krb5_encapsulate): do not free `in_data',
  1689. let the caller do that. fix the callers.
  1690. 2000-08-16 Assar Westerlund <assar@sics.se>
  1691. * Makefile.am: bump version to 2:1:1
  1692. 2000-07-29 Assar Westerlund <assar@sics.se>
  1693. * decapsulate.c (gssapi_krb5_verify_header): sanity-check length
  1694. 2000-07-25 Johan Danielsson <joda@pdc.kth.se>
  1695. * Makefile.am: bump version to 2:0:1
  1696. 2000-07-22 Assar Westerlund <assar@sics.se>
  1697. * gssapi.h: update OID for GSS_C_NT_HOSTBASED_SERVICE and other
  1698. details from rfc2744
  1699. 2000-06-29 Assar Westerlund <assar@sics.se>
  1700. * address_to_krb5addr.c (gss_address_to_krb5addr): actually use
  1701. `int' instead of `sa_family_t' for the address family.
  1702. 2000-06-21 Assar Westerlund <assar@sics.se>
  1703. * add support for token delegation. From Daniel Kouril
  1704. <kouril@ics.muni.cz> and Miroslav Ruda <ruda@ics.muni.cz>
  1705. 2000-05-15 Assar Westerlund <assar@sics.se>
  1706. * Makefile.am (libgssapi_la_LDFLAGS): set version to 1:1:1
  1707. 2000-04-12 Assar Westerlund <assar@sics.se>
  1708. * release_oid_set.c (gss_release_oid_set): clear set for
  1709. robustness. From GOMBAS Gabor <gombasg@inf.elte.hu>
  1710. * release_name.c (gss_release_name): reset input_name for
  1711. robustness. From GOMBAS Gabor <gombasg@inf.elte.hu>
  1712. * release_buffer.c (gss_release_buffer): set value to NULL to be
  1713. more robust. From GOMBAS Gabor <gombasg@inf.elte.hu>
  1714. * add_oid_set_member.c (gss_add_oid_set_member): actually check if
  1715. the oid is a member first. leave the oid_set unchanged if realloc
  1716. fails.
  1717. 2000-02-13 Assar Westerlund <assar@sics.se>
  1718. * Makefile.am: set version to 1:0:1
  1719. 2000-02-12 Assar Westerlund <assar@sics.se>
  1720. * gssapi_locl.h: add flags for import/export
  1721. * import_sec_context.c (import_sec_context: add flags for what
  1722. fields are included. do not include the authenticator for now.
  1723. * export_sec_context.c (export_sec_context: add flags for what
  1724. fields are included. do not include the authenticator for now.
  1725. * accept_sec_context.c (gss_accept_sec_context): set target in
  1726. context_handle
  1727. 2000-02-11 Assar Westerlund <assar@sics.se>
  1728. * delete_sec_context.c (gss_delete_sec_context): set context to
  1729. GSS_C_NO_CONTEXT
  1730. * Makefile.am: add {export,import}_sec_context.c
  1731. * export_sec_context.c: new file
  1732. * import_sec_context.c: new file
  1733. * accept_sec_context.c (gss_accept_sec_context): set trans flag
  1734. 2000-02-07 Assar Westerlund <assar@sics.se>
  1735. * Makefile.am: set version to 0:5:0
  1736. 2000-01-26 Assar Westerlund <assar@sics.se>
  1737. * delete_sec_context.c (gss_delete_sec_context): handle a NULL
  1738. output_token
  1739. * wrap.c: update to pseudo-standard APIs for md4,md5,sha. some
  1740. changes to libdes calls to make them more portable.
  1741. * verify_mic.c: update to pseudo-standard APIs for md4,md5,sha.
  1742. some changes to libdes calls to make them more portable.
  1743. * unwrap.c: update to pseudo-standard APIs for md4,md5,sha. some
  1744. changes to libdes calls to make them more portable.
  1745. * get_mic.c: update to pseudo-standard APIs for md4,md5,sha. some
  1746. changes to libdes calls to make them more portable.
  1747. * 8003.c: update to pseudo-standard APIs for md4,md5,sha.
  1748. 2000-01-06 Assar Westerlund <assar@sics.se>
  1749. * Makefile.am: set version to 0:4:0
  1750. 1999-12-26 Assar Westerlund <assar@sics.se>
  1751. * accept_sec_context.c (gss_accept_sec_context): always set
  1752. `output_token'
  1753. * init_sec_context.c (init_auth): always initialize `output_token'
  1754. * delete_sec_context.c (gss_delete_sec_context): always set
  1755. `output_token'
  1756. 1999-12-06 Assar Westerlund <assar@sics.se>
  1757. * Makefile.am: bump version to 0:3:0
  1758. 1999-10-20 Assar Westerlund <assar@sics.se>
  1759. * Makefile.am: set version to 0:2:0
  1760. 1999-09-21 Assar Westerlund <assar@sics.se>
  1761. * init_sec_context.c (gss_init_sec_context): initialize `ticket'
  1762. * gssapi.h (gss_ctx_id_t_desc): add ticket in here. ick.
  1763. * delete_sec_context.c (gss_delete_sec_context): free ticket
  1764. * accept_sec_context.c (gss_accept_sec_context): stove away
  1765. `krb5_ticket' in context so that ugly programs such as
  1766. gss_nt_server can get at it. uck.
  1767. 1999-09-20 Johan Danielsson <joda@pdc.kth.se>
  1768. * accept_sec_context.c: set minor_status
  1769. 1999-08-04 Assar Westerlund <assar@sics.se>
  1770. * display_status.c (calling_error, routine_error): right shift the
  1771. code to make it possible to index into the arrays
  1772. 1999-07-28 Assar Westerlund <assar@sics.se>
  1773. * gssapi.h (GSS_C_AF_INET6): add
  1774. * import_name.c (import_hostbased_name): set minor_status
  1775. 1999-07-26 Assar Westerlund <assar@sics.se>
  1776. * Makefile.am: set version to 0:1:0
  1777. Wed Apr 7 14:05:15 1999 Johan Danielsson <joda@hella.pdc.kth.se>
  1778. * display_status.c: set minor_status
  1779. * init_sec_context.c: set minor_status
  1780. * lib/gssapi/init.c: remove donep (check gssapi_krb5_context
  1781. directly)