summaryrefslogtreecommitdiffstats
path: root/ssl/kssl.c
AgeCommit message (Collapse)Author
2011-05-11make kerberos work with OPENSSL_NO_SSL_INTERNDr. Stephen Henson
2010-03-03Submitted by: Tomas Hoger <thoger@redhat.com>Dr. Stephen Henson
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL could be crashed if the relevant tables were not present (e.g. chrooted).
2010-03-01make USE_CRYPTODEV_DIGESTS workDr. Stephen Henson
2009-04-22Fix WIN32 warnings.Dr. Stephen Henson
2009-04-21Some fixes for kerberos builds.Dr. Stephen Henson
2009-04-16PR: 1900Dr. Stephen Henson
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de> Approved by: steve@openssl.org Remove unnecessary included header file.
2009-02-14PR: 1835Dr. Stephen Henson
Submitted by: Damien Miller <djm@mindrot.org> Approved by: steve@openssl.org Fix various typos.
2007-02-10use user-supplied malloc functions for persistent kssl objectsNils Larsch
PR: 1467 Submitted by: Andrei Pelinescu-Onciul <andrei@iptel.org>
2005-07-26Fix PEDANTIC compilation, using the same trick as elsewhere.Geoff Thorpe
2005-06-27Eliminate dependency on UNICODE macro.Andy Polyakov
2005-06-16Do not undefine _XOPEN_SOURCE. This is currently experimental, andRichard Levitte
will be firmed up as soon as it's been verified not to break anything.
2005-05-21When _XOPEN_SOURCE is defined, make sure it's defined to 500. Required inRichard Levitte
http://www.opengroup.org/onlinepubs/007908799/xsh/compilation.html. Notified by David Wolfe <dwolfe5272@yahoo.com>
2005-04-20Make kerberos ciphersuite code compile again.Dr. Stephen Henson
Avoid more shadow warnings.
2005-04-09Make kerberos ciphersuite code work with newer header filesDr. Stephen Henson
2004-03-16Avoid warnings.Dr. Stephen Henson
2003-09-27Include the instance in the Kerberos ticket information.Richard Levitte
In s_server, print the received Kerberos information. PR: 693
2003-03-25Let's limit the extent of the definition of _XOPEN_SOURCE.Richard Levitte
2002-12-24Some more adjustmentsLutz Jänicke
Submitted by: Jeffrey Altman <jaltman@columbia.edu>, "Kenneth R. Robinette" <support@securenetterm.com>
2002-12-20Fix Kerberos5/SSL interactionLutz Jänicke
Submitted by: "Kenneth R. Robinette" <support@securenetterm.com> Reviewed by: PR:
2002-11-28Cleanse memory using the new OPENSSL_cleanse() function.Richard Levitte
I've covered all the memset()s I felt safe modifying, but may have missed some.
2002-11-13Security fixes brought forward from 0.9.7.Ben Laurie
2002-03-19Initialize ciph_ctx in kssl.cDr. Stephen Henson
2002-03-13Undo previous patch: avoid warnings by #undef'ingDr. Stephen Henson
duplicate definitions. Suggested by "Kenneth R. Robinette" <support@securenetterm.com>
2002-03-12Fix Kerberos warnings with VC++.Dr. Stephen Henson
2002-03-12Fix various warnings when compiling with KRB5 code.Dr. Stephen Henson
2002-02-28Increase internal security when using strncpy, by making sure the resulting ↵Richard Levitte
string is NUL-terminated
2001-11-23For future portability reasons MIT is moving all macros to functionBodo Möller
calls. This patch allows compilation either way. Submitted by: Jeffrey Altman <jaltman@columbia.edu>
2001-10-17Modify EVP cipher behaviour in a similar wayDr. Stephen Henson
to digests to retain compatibility.
2001-10-10To avoid commit wars over dependencies, let's make it so things thatRichard Levitte
depend on the environment, like the presence of the OpenBSD crypto device or of Kerberos, do not change the dependencies within OpenSSL.
2001-07-31Correct most of the unsigned vs. signed warnings (or int vs. size_t),Richard Levitte
and rename some local variables to avoid name shadowing.
2001-07-31More Kerberos SSL changes from Jeffrey Altman <jaltman@columbia.edu>Richard Levitte
His comments are: First, it corrects a problem introduced in the last patch where the kssl_map_enc() would intentionally return NULL for valid ENCTYPE values. This was done to prevent verification of the kerberos 5 authenticator from being performed when Derived Key ciphers were in use. Unfortunately, the authenticator verification routine was not the only place that function was used. And it caused core dumps. Second, it attempt to add to SSL_SESSION the Kerberos 5 Client Principal Name.
2001-07-21More Kerberos SSL patches from Vern Staats <staatsvr@asc.hpc.mil>.Richard Levitte
His comments are: This patch fixes the problem of modern Kerberos using "derived keys" to encrypt the authenticator by disabling the authenticator check for all derived keys enctypes. I think I've got all the bugfixes that Jeffrey and I discussed rolled into this. There were some problems with Jeffrey's code to convert the authenticator's Kerberos timestring into struct tm (e.g. Z, -1900; it helps to have an actual decryptable authenticator to play with). So I've shamelessly pushed in my code, while stealing some bits from Jeffrey.
2001-07-12Prevent KSSL server from requesting a client certificate.Richard Levitte
Submitted by Jeffrey Altman <jaltman@columbia.edu>
2001-07-12paddr may be NULL. Do not crash if it is.Richard Levitte
2001-07-11Changes to the Kerberos SSL code by Jeffrey Altman <jaltman@columbia.edu>Richard Levitte
His comments are: . adds use of replay cache to protect against replay attacks . adds functions kssl_tgt_is_available() and kssl_keytab_is_available() which are used within s3_lib.c and ssl_lib.c to determine at runtime whether or not KRB5 ciphers can be supported during the current session.
2001-07-11Code to avoid the use of non-standard strptime(). ByRichard Levitte
Jeffrey Altman <jaltman@columbia.edu> (Really, the time that's being parsed is a GeneralizedTime, so if ASN1_GENERALIZEDTIME_get() ever gets implemented, it should be used instead)
2001-07-11Changes to the Kerberos SSL code by Jeffrey Altman <jaltman@columbia.edu>Richard Levitte
His comments are: . Fixed all of the Windows dynamic loading functions, prototypes, etc. . Corrected all of the unsigned/signed comparison warnings . Replaced the references to krb5_cksumarray[] for two reasons. First, it was an internal variable that should not have been referenced outside the library; nor could it have been with a shared library with restricted exports. Second, the variable is no longer used in current Kerberos implementations. I replaced the code with equivalent functionality using functions that are exported from the library.
2001-07-09If I define _XOPEN_SOURCE before including *any* system header file,Richard Levitte
things will work much more smoothly.
2001-07-09Patches from Vern Staats <staatsvr@asc.hpc.mil> to get Kerberos 5 inRichard Levitte
SSL according to RFC 2712. His comment is: This is a patch to openssl-SNAP-20010702 to support Kerberized SSL authentication. I'm expecting to have the full kssl-0.5 kit up on sourceforge by the end of the week. The full kit includes patches for mod-ssl, apache, and a few text clients. The sourceforge URL is http://sourceforge.net/projects/kssl/ . Thanks to a note from Simon Wilkinson I've replaced my KRB5 AP_REQ message with a real KerberosWrapper struct. I think this is fully RFC 2712 compliant now, including support for the optional authenticator field. I also added openssl-style ASN.1 macros for a few Kerberos structs; see crypto/krb5/ if you're interested.
2001-02-20DEC C on VMS is pedantic by definition.Richard Levitte
2001-02-20Use new-style system-id macros everywhere possible. I hope I haven'tRichard Levitte
missed any. This compiles and runs on Linux, and external applications have no problems with it. The definite test will be to build this on VMS.
2001-02-19Temporary fix for build break.Ulf Möller
It's still inconsistent - probably better to undo the whole OPENSSL_NO_* thing.
2000-12-03Fix warnings.Ben Laurie
2000-12-01Typo corrected.Richard Levitte
2000-11-30First tentative impementation of Kerberos 5 cryptos and keys for SSL/TLS. ↵Richard Levitte
Implemented by Vern Staats <staatsvr@asc.hpc.mil>, further hacked and distributed by Jeffrey Altman <jaltnab@columbia.edu>
2000-11-16I've checked again and again. There really is no need to expand a toRichard Levitte
4 times it's size when bn_sqr_recursive() won't look farther than the original length. Thereby, constification is no longer a problem.