Commit Graph

79 Commits

Author SHA1 Message Date
christos
23dfb0b17f eliminate unused passpromptlen and copy a default password each time we
don't receive one in SRA_CONTINUE.
2005-10-25 23:36:07 +00:00
christos
64fe9d910c XXX: SRA does not have a protocol feature to pass back a password prompt
which is needed for things like S/KEY. We abuse the SRA_CONTINUE message
passing the password prompt there. That is usually NULL, so SRA
implementations usually ignore it. While I am here, if telnet_gets() fails
[user hit <eof> for example], then we exit.
2005-10-25 22:03:34 +00:00
lukem
0d885c3aa4 Don't perform a check for "secure" tty for root logins when using PAM;
that is what we provide pam_securetty(8) for.

Fix the -DNOPAM build option by allowing it to compile
(even though we don't use this source file when USE_PAM=no).
2005-05-05 23:21:58 +00:00
lukem
f4ee085480 PAM may change the user name during the authentication process;
ensure that we deal with this so that SRA authenticated logins
will pass the changed user name to login(1).
2005-05-05 22:43:56 +00:00
lukem
94b84ac8a2 Fix the check for insecure root logins in rootterm():
- It was originally referring to a bogus version of `line'.
  (problem solved by using 'extern char *line' instead of 'extern char line[]')
- It wasn't stripping the leading "/dev/" off `line' before calling getttynam(3)
2005-05-05 02:20:45 +00:00
christos
262b0ba97f check pwd != NULL 2005-04-19 03:19:46 +00:00
christos
382db3eda9 Use getpwnam_r. From john nemeth. 2005-04-09 22:43:51 +00:00
christos
a6d2304b90 constify, whitespace. 2005-02-19 22:55:35 +00:00
christos
9485d63b3e Fix whitespace. 2005-02-19 22:47:51 +00:00
christos
c8127943d0 Fix pk to use BN_ instead of libmp. 2005-02-19 22:47:10 +00:00
christos
185393efaa PAM support from FreeBSD. 2005-02-19 21:55:52 +00:00
agc
f255b51ddc Another fall-out from the de-__Ping round. 2005-02-06 18:00:30 +00:00
perry
4fcf86857c de-__P (really de-P) 2005-02-06 05:53:07 +00:00
perry
0f3d05ee54 remove unneeded definition of "P" macro 2005-02-06 05:52:25 +00:00
perry
252786f3ee de-__P (really de-P), and fix the broken prototype for printsub 2005-02-06 05:48:23 +00:00
dsl
1793b7dd69 Use (unsigned char) cast to sanitise arguments to ctype functions. 2004-10-28 21:14:52 +00:00
dsl
d349cd6749 Fix a load of international alphabet problems with isxxx() and toupper()
Change isspace(*char_ptr) to isspace(*char_ptr & 0xff) so that the correct
piece of memory is looked at for the bit mask.
gcc optimises out the '& 0xff' (on i386 at least).
Fixes problems found by gcc when the splurious (int) cast is removed
from the #defines in ctype.h
2004-10-27 19:59:24 +00:00
lukem
b817247988 Use MKPRIVATELIB=yes instead of providing an empty libinstall:: target and
setting NOLINT, NOPIC, NOPROFILE (etc)
2004-05-23 02:24:50 +00:00
christos
f0f6798596 sprinkle const. 2004-04-23 17:54:02 +00:00
dyoung
4758291178 Fix the checkflist for builds without Kerberos 4 (MKKERBEROS4=no)
and without Kerberos 4 & 5 (MKKERBEROS=no). Previously checkflist
complained of missing files.

* move kerberos- and kerberos 4-only files into new flists,
  distrib/sets/lists/*/krb.*

* make the flist generators grok MKKERBEROS{,4} variables

* fix Makefiles which treat MKKERBEROS=no as MKKERBEROS5=no.
  9 out of 10 experts agree that it is ludicrous to build w/
  KERBEROS4 and w/o KERBEROS5.

* fix header files, also, which treat MKKERBEROS=no as MKKERBEROS5=no.

* omit some Kerberos-only subdirectories from the build as
  MKKERBEROS{,4} indicate

(I acknowledge the sentiment that flists are the wrong way to go,
and that the makefiles should produce the metalog directly.  That
sounds to me like the right way to go, but I am not prepared to do
revamp all the makefiles.  While my approach is expedient, it fits
painlessly within the current build architecture until we are
delivered from flist purgatory, and it does not postpone our
delivery. Fair enough?)
2003-12-11 09:46:26 +00:00
fvdl
4e8e6f8ceb Don't compare an int to NULL. 2003-10-21 01:10:47 +00:00
agc
eb7c1594f1 Move UCB-licensed code from 4-clause to 3-clause licence.
Patches provided by Joel Baker in PR 22280, verified by myself.
2003-08-07 16:42:00 +00:00
itojun
bf8555f163 no longer need to -I/usr/include first (yes, it's still confusing, i admit) 2003-07-23 13:35:13 +00:00
tron
c04353144d Fix build problem caused by recent "Makefile" changes. 2003-07-23 13:19:43 +00:00
itojun
e63468d8cc split MKKERBEROS4 from MKKERBEROS. based on work by lha at stacken.kth.se
(build confirmed with both MKKERBEROS4=yes and MKKERBEROS4=no)
2003-07-23 08:01:24 +00:00
itojun
24fbe10c93 do not build/install shlib 2003-07-16 19:35:34 +00:00
itojun
427af575fe use bounded string op. bump shlib major for libtelnet due to API change. 2003-07-15 10:14:54 +00:00
itojun
fabed9f775 use bounded string op 2003-07-15 05:09:34 +00:00
itojun
7b8c272d80 be friendly to unifdef(1) 2003-07-14 08:36:27 +00:00
thorpej
715b5daad8 Remove GCC 3.3 hack; the libtelnet code has been changed to avoid the
warning.
2003-03-28 21:03:48 +00:00
simonb
276fd1665c The Double-Semi-Colon Police. 2003-01-20 05:29:53 +00:00
thorpej
baaf41b59f Restructure the Duff's device in kerberos4_cksum() to avoid
a bogus unreachable-code warning from GCC 3.x.
2002-11-05 22:34:50 +00:00
thorpej
6801f50792 context -> telnet_context in two places. 2002-09-20 22:25:49 +00:00
joda
a9b4e358d7 make sure the client creates a subkey; also make the server check that
it actually got a subkey, and if not use the session key
2002-09-20 14:45:29 +00:00
itojun
9ee65722f3 backout previous, <des.h> is part of kerberos 4 API 2002-08-29 14:53:21 +00:00
itojun
8f5dda1c53 openssl/des.h, not des.h 2002-08-29 14:40:52 +00:00
wiz
aa30599e06 __STDC__ is always defined on NetBSD. 2002-05-26 22:01:47 +00:00
thorpej
9c33b55e7c Split the notion of building Hesiod, Kerberos, S/key, and YP
infrastructure and using that infrastructure in programs.

	* MKHESIOD, MKKERBEROS, MKSKEY, and MKYP control building
	  of the infratsructure (libraries, support programs, etc.)

	* USE_HESIOD, USE_KERBEROS, USE_SKEY, and USE_YP control
	  building of support for using the corresponding API
	  in various libraries/programs that can use it.

As discussed on tech-toolchain.
2002-03-22 18:10:19 +00:00
thorpej
7be0879164 Hack around GCC PR optmization/5230 if HAVE_GCC3 is set. (GCC 3.x
issues spurious warning when compiling a Duff's device with optimization.)
2002-01-29 17:58:36 +00:00
lukem
0878e1d37d fix WARNS=2 warnings 2001-11-30 04:44:24 +00:00
lukem
c1b95c0073 explicitly set to WARNS?=1 2001-11-05 15:22:23 +00:00
assar
2a2aa85a8d update infrastructure for krb4 1.1 and heimdal 0.4e 2001-09-17 12:34:40 +00:00
itojun
35a07da1df use openssl 0.9.6a. shlib major # is bumped for libcrypto, libssl and
all kerberos libraries.
2001-04-12 07:48:03 +00:00
assar
8454735dc5 update for new libkrb5 2001-02-11 18:28:50 +00:00
christos
b58d5c5218 eliminate redundant decls. 2001-01-06 23:36:36 +00:00
christos
c0d0aa9ecf protect against multiple inclusions, and remove redundant decls. 2001-01-06 23:36:07 +00:00
thorpej
2dbbadab05 Handle krb5_init_context() failure, rather than dumping core. 2000-07-17 02:25:02 +00:00
thorpej
df83a2a3cd Add MK... variables to enable/disable various aspects of building
crypto support into the system.  See share/mk/bsd.README for more
a full description.
2000-06-23 06:01:10 +00:00
thorpej
5c099b14c1 Bring the telnet situation back into better shape. Specifically,
pull in just about all of the differences from the crypto-us telnet
suite (which includes Kerberos 4 and connection encryption support).
Also bring in the Kerberos 5 support from the Heimdal telnet, and
frob a little so that it can work with the non-Heimdal telnet suite.

There is still some work left to do, specifically:
- Add Heimdal's ticket forwarding support to the Berkeley Kerberos 4
  module.
- Add connection encryption support to the Heimdal Kerberos 5
  module.  Hints on this can be taken from the MIT Kerberos 5
  module which still exists in crypto-us.

However, even with the shortcomings listed above, this is a
better situation than using the stock Heimdal telnet suite,
which does not understand the IPSec policy stuff, and is also
based on much older code which contains bugs that we have already
fixed in the NetBSD sources.
2000-06-22 06:47:42 +00:00
thorpej
e7d6b96938 Merge a bunch of things from crypto-us and crypto-intl into basesrc,
adding support for Heimdal/KTH Kerberos where easy to do so.  Eliminate
bsd.crypto.mk.

There is still a bunch more work to do, but crypto is now more-or-less
fully merged into the base NetBSD distribution.
2000-06-20 06:00:24 +00:00