aboutsummaryrefslogtreecommitdiff
path: root/src/lib/krb5/krb/preauth2.c
AgeCommit message (Expand)AuthorFilesLines
2009-12-01Reindent and removed krb5_ prefix from static func nameZhanna Tsitkov1-67/+67
2009-11-01Stop using deprecated krb5_encrypt_data in preauth code. UseGreg Hudson1-2/+2
2009-10-31In lib/krb5/krb, ensure all function definition headers are in ANSIGreg Hudson1-78/+40
2009-10-31make mark-cstyleTom Yu1-1284/+1285
2009-09-13Implement s4u extensionsGreg Hudson1-0/+58
2009-05-07After consultation with kenh, remove a comment and if statement whichGreg Hudson1-7/+0
2009-05-06Fix yet another memory leak in pa_samGreg Hudson1-0/+1
2009-05-06In pa_sam, use the correct function to free sam_challenge in theGreg Hudson1-1/+1
2009-05-06Fix a memory leak in pa_sam_2 where an outer data structure wasn'tGreg Hudson1-0/+1
2009-05-05Fix a memory leak in pa_samGreg Hudson1-2/+5
2009-05-05In pa_sam_2, free sc2 in an error-handling case where it was leakedGreg Hudson1-1/+3
2009-05-05In pa_sam_2, free scratch in a couple of error-handling blocks whereGreg Hudson1-0/+2
2009-05-04Fix an error message memory leak in krb5_preauth_supply_preauth_dataGreg Hudson1-0/+1
2009-04-13In pa_sam, remove a gratuitous null check for etype which wasGreg Hudson1-1/+1
2009-04-10Check return value of krb5int_copy_data_contents in preauth2.c'sGreg Hudson1-1/+4
2009-04-03Merge fast branch at 22166 onto trunkSam Hartman1-0/+35
2009-03-31Implement FAST from draft-ietf-krb-wg-preauth-frameworkSam Hartman1-4/+35
2009-02-09make krb5_free_* functions ignore NULLKen Raeburn1-1/+1
2009-01-28Start to phase out krb5_xfree macro, which just casts its argument toKen Raeburn1-12/+12
2008-11-10In pa_sam(), free the outer krb5_data structure returned byGreg Hudson1-0/+2
2008-11-10Properly free sam_challenge in pa_sam()Greg Hudson1-8/+8
2008-08-27Based on patch from lxs, with some changes:Ken Raeburn1-1/+2
2008-08-07malloc+memset(,0,) -> callocKen Raeburn1-3/+2
2008-06-26Apple PKINIT LKDC supportAlexandra Ellwood1-3/+44
2008-06-25Rolled back patch because tickets 4495 and 5124 fix this bugAlexandra Ellwood1-4/+1
2008-06-25krb5_do_preauth_tryagain should check for NULL padataAlexandra Ellwood1-1/+4
2008-05-30Apple PKINIT patch commitAlexandra Ellwood1-0/+301
2007-08-03Add internal prototype for krb5_preauth_supply_preauth_data(). Clean up Ezra Peisach1-6/+7
2007-08-01Add PKINIT supportKevin Coffman1-21/+36
2007-07-12Avoid use of unchecked sprintf in libraries. Use asprintf if theKen Raeburn1-22/+22
2007-03-25Initialize values to avoid 'possibly uninitialized' compiler warningsKen Raeburn1-2/+2
2007-03-25Convert keyblock or padata types to krb5_data without compiler warnings.Ken Raeburn1-3/+11
2007-01-30get_init_creds_opt extensibilityTom Yu1-6/+62
2006-12-19use KRB5KRB_ERR_GENERIC, not KRB_ERR_GENERIC in preauth2.cTom Yu1-3/+3
2006-12-08build the trunk on Windows (again)Jeffrey Altman1-8/+10
2006-12-01send a new request with the new padata returned by krb5_do_preauth_tryagain()Kevin Coffman1-4/+3
2006-11-22fix debug messagesKevin Coffman1-7/+7
2006-11-17use krb5_c_valid_enctype, not valid_enctypeKen Raeburn1-2/+2
2006-11-13correct client preauth plugin request_contextKevin Coffman1-6/+17
2006-11-09Add "get_data" function to the client preauth plugin interfaceKevin Coffman1-2/+70
2006-11-01Modify the preath plugin interface so that a plugin's context isKevin Coffman1-134/+133
2006-10-23Avoid segfault in krb5_do_preauth_tryagainKevin Coffman1-1/+1
2006-10-15Remove all unused variable warnings from treeEzra Peisach1-2/+1
2006-10-13Patch to split client plugin from server pluginSam Hartman1-20/+16
2006-10-03Preauthentication Plugin FrameworkSam Hartman1-30/+509
2005-01-17subject; krb5_do_preauth could attempt to free NULL pointerEzra Peisach1-1/+2
2003-07-22Send generalstring not octetstring in etype_info2. Accept eitherSam Hartman1-4/+9
2003-05-13Fix minor error in previous commit that broke v4 saltsSam Hartman1-1/+1
2003-05-13Fix memory leaks and double frees in preauth2.cSam Hartman1-42/+49
2003-05-12* IMplement etype_info in KDC. If the request contains any newSam Hartman1-83/+59