summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* releasing package heimdal version 1.7~git20150920+dfsg-4debian/1.7_git20150920+dfsg-4Jelmer Vernooij2016-01-24
|
* Re-remove .la files. Closes: #812398Jelmer Vernooij2016-01-24
|
* releasing package heimdal version 1.7~git20150920+dfsg-3debian/1.7_git20150920+dfsg-3Jelmer Vernooij2016-01-21
|
* Disable plugin test to prevent FTBFS. Closes: #809012Jelmer Vernooij2016-01-21
|
* Fix symlinks.Jelmer Vernooij2016-01-21
|
* Add debian gitignore.Jelmer Vernooij2016-01-20
|
* Stop shipping heimdal headers and library symlinks directly in /usr/include ↵Jelmer Vernooij2016-01-20
| | | | in heimdal-dev. Closes: #810990, #812130
* releasing package heimdal version 1.7~git20150920+dfsg-2Jelmer Vernooij2015-10-01
|
* Update gitignore.Jelmer Vernooij2015-10-01
|
* Bump pycompat level to 9. Closes: #800520Jelmer Vernooij2015-10-01
|
* releasing package heimdal version 1.7~git20150920+dfsg-1Jelmer Vernooij2015-09-29
|
* Update symbols.Jelmer Vernooij2015-09-29
|
* Ignore debian branch.Jelmer Vernooij2015-09-28
|
* Remove packages heimdal-clients-x and heimdal-servers-x, as their binaries ↵Jelmer Vernooij2015-09-28
| | | | are no longer shipped upstream.
* Re-add Hurd MAXHOSTNAMELEN patch.Jelmer Vernooij2015-09-28
|
* Drop patch 051_bug746486-memleak: was cherry-picked from upstream.Jelmer Vernooij2015-09-28
|
* Drop patch 050_kadmin_to_usr_bin: applied upstream.Jelmer Vernooij2015-09-28
|
* Drop patch 048_private_libs: applied upstream.Jelmer Vernooij2015-09-28
|
* Drop patch 045_hx509_symbol_names: applied upstream.Jelmer Vernooij2015-09-28
|
* Drop patch 044_hdb_ldap_static: applied upstream.Jelmer Vernooij2015-09-28
|
* Drop 041_hurd_maxhostnamelen patch for now, as it breaks with every upstream ↵Jelmer Vernooij2015-09-28
| | | | update. :-(
* Drop patch 024_rxtelnet: source files removed upstream.Jelmer Vernooij2015-09-20
|
* New upstream snapshot.Jelmer Vernooij2015-09-20
|
* Merge tag 'upstream/1.7_git20150920+dfsg' into experimentalJelmer Vernooij2015-09-20
|\ | | | | | | Upstream version 1.7~git20150920+dfsg
| * Imported Upstream version 1.7~git20150920+dfsgJelmer Vernooij2015-09-20
| |\
| | * Windows: Remove *_PA_ClientCanon* from export listJeffrey Altman2015-09-13
| | | | | | | | | | | | | | | | | | | | | | | | Change 29f6290fe60cebb4ad08860214e324af0c8b23b1 removed the PA_ClientCanon* ASN.1 functionality but failed to remove the generated symbols from the Windows export list. Change-Id: I9a46532ed7d8612fbc597dec9848505d4b440e09
| | * Merge pull request #134 from abartlet/allow-null-authenticatorLove Hörnquist Åstrand2015-08-03
| | |\ | | | | | | | | gssapi: Allow a NULL authenticator
| | | * gssapi: Allow a NULL authenticatorAndrew Bartlett2015-07-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Some non-GSSAPI implementations that instead try to create compatible packets by wrapping krb5_mk_req() can trigger a NULL authenticator here. Assume this to be equvilent to specifying an all-zero channel bindings and some reasonable (fixed) flags. Original patch by Andrew Bartlett, restructured by Douglas Bagnall Signed-off-by: Andrew Bartlett <abartlet@samba.org> Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
| | * | Merge pull request #138 from abartlet/lorikeet-heimdal-for-upstreamAndrew Bartlett2015-07-31
| | |\ \ | | | | | | | | | | | | | | | | | | | | Samba Cross-realm support patches from metze These patches were posted to heimdal-discuss by metze, and there were no objections there.
| | | * | lib/gssapi/krb5: implement gss_[un]wrap_iov[_length] with arcfour-hmac-md5Stefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Pair-Programmed-With: Andreas Schneider <asn@samba.org> Signed-off-by: Stefan Metzmacher <metze@samba.org> Signed-off-by: Andreas Schneider <asn@samba.org>
| | | * | lib/gssapi/krb5: split out a arcfour_mic_cksum_iov() functionStefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | | * | lib/gssapi/krb5: add const to arcfour_mic_key()Stefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | | * | lib/gssapi/krb5: clear temporary buffer with cleartext data.Stefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | | * | lib/gssapi/krb5: fix indentation in _gk_wrap_iov()Stefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Now it matches _gk_unwrap_iov() and _gk_wrap_iov_length(). Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | | * | lib/gssapi/krb5: make _gssapi_verify_pad() more robustStefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | | * | kdc: add support for HDB_ERR_WRONG_REALMStefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | A backend can return this if asked with HDB_F_GET_CLIENT|HDB_F_FOR_AS_REQ for a KRB5_NT_ENTERPRISE_PRINCIPAL record or for HDB_F_GET_SERVER | HDB_F_FOR_TGS_REQ. entry_ex->entry.principal->realm needs to return the real realm of the principal (or at least a the realm of the next cross-realm trust hop). This is needed to route enterprise principals between AD domain trusts. Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | | * | kdc: generic support for 3part servicePrincipalNamesStefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is not DRSUAPI specific, it works for all 3 part principals. Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | | * | kdc: base _kdc_fast_mk_error() on krb5_mk_error_ext()Stefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | | * | lib/krb5: add krb5_mk_error_ext() helper functionStefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This gives the caller the ability to skip the client_name and only provide client_realm. This is required for KDC_ERR_WRONG_REALM messages. Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | | * | lib/krb5: correctly follow KRB5_KDC_ERR_WRONG_REALM client referralsStefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | An AS-REQ with an enterprise principal will always directed to a kdc of the local (default) realm. The KDC directs the client into the direction of the final realm. See rfc6806.txt. Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | | * | lib/krb5: verify_logonname() to handle multi component principalStefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | FreeIPA can generate tickets with a client principal of 'host/hostname.example.com'. verify_logonname() should just verify the principal name in the PAC_LOGON_NAME is the same as the principal of the client principal (without realm) of the ticket. Samba commit b7cc8c1187ff967e44587cd0d09185330378f366 break this. We try to compare ['host']['hostname.example.com'] with ['host/hostname.example.com]' (as we interpret it as enterprise principal) this fail if we don't compare them as strings. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11142 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
| | | * | doc/standardisation: add rfc6806.txtStefan Metzmacher2015-07-31
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | | * | lib/ntlm: add missing dependency to libwind.laStefan Metzmacher2015-07-31
| | |/ / | | | | | | | | | | | | Signed-off-by: Stefan Metzmacher <metze@samba.org>
| | * | Merge pull request #137 from douglasbagnall/oid-regenerateAndrew Bartlett2015-07-31
| | |\ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Oid regenerate The GSSAPI oid C files were originally generated by a perl 4 script that no longer runs on a modern system. Subsequently the C has been manually modified. These patches update the script to perl 5 and alter its output to reflect the manually changed C. Because modern perl uses hash randomisation, the order of the oids in the C file is sorted -- otherwise they will be ordered differently every time, making changes hard to review.
| | | * | GSSAPI: regenerate lib/gssapi/mech/gss_oid.c with consistent sortDouglas Bagnall2015-07-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is generated from lib/gssapi/oid.txt using lib/gssapi/gen-oid.pl, which sorts the entries to ensure minimal diff churn when an oid is added or changed. The lack of effective changes can be seen by sorting both versions, a bit like this: $ git show HEAD~~:lib/gssapi/mech/gss_oid.c | sort > /tmp/gss_oid.c-OLD $ cat lib/gssapi/mech/gss_oid.c | sort > /tmp/gss_oid.c-NEW $ diff -u /tmp/gss_oid.c* $ #Nothing to see! This is of course not a reliable check in general, but works for this simple file in concert with ordinary inspection. Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
| | | * | GSSAPI: generate full NULL structure initializers in gen-oid.plDouglas Bagnall2015-07-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As seen in commit cc47c8fa7 (Roland C. Dowdeswell <elric@imrryr.org>, "Turn on -Wextra -Wno-sign-compare -Wno-unused-paramter and fix issues"), compilers can be persuaded to dislike a single {NULL} and prefer {NULL, NULL, NULL, NULL}. That patch altered the C code directly; here we change the generating file to match. Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
| | | * | GSSAPI: keep consistent sort order in lib/gssapi/gen-oid.plDouglas Bagnall2015-07-31
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
| | | * | GSSAPI: use rk_UNCONST() on password and cert oidDouglas Bagnall2015-07-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | These missed out on the rk_UNCONST()ification by virtue of being added in a parallel branch. In the diagram below, they got added in 02cf28e, while the rk_UNCONSTs were added in f5f9014. * cc47c8f Turn on -Wextra -Wno-sign-compare -Wno-unused-paramter and fix issues. * 3069d80 Merge branch 'master' into lukeh/acquire-cred-ex |\ | * f5f9014 Warning fixes from Christos Zoulas * | 02cf28e implement gss_acquire_cred_ex with password support |/ * 2170219 add more oids rk_UNCONST amounts to a cast to (void *), removing const. Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
| | | * | GSSAPI: update lib/gssapi/gen-oid.pl to work with Perl 5Douglas Bagnall2015-07-31
| | |/ / | | | | | | | | | | | | | | | | | | | | | | | | The invocation `require "getopts.pl"; Getopts(...)` works in Perl 4, but not in recent Perl 5. Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
| | * | Merge pull request #136 from HenryJacques/pkinit_improvementsLove Hörnquist Åstrand2015-07-24
| | |\ \ | | | |/ | | |/| PK-INIT improvements