ChangeLog revision 55682
12000-01-02  Assar Westerlund  <assar@sics.se>
2
3	* server.c: check initial flag in ticket and allow users to change
4	their own password if it's set
5	* ext.c (do_ext_keytab): set timestamp
6
71999-12-14  Assar Westerlund  <assar@sics.se>
8
9	* del_enctype.c (usage): don't use arg_printusage
10
111999-11-25  Assar Westerlund  <assar@sics.se>
12
13	* del_enctype.c (del_enctype): try not to leak memory
14
15	* version4.c (kadm_ser_mod): use kadm5_s_modify_principal (no
16 	_with_key)
17
18	* kadmin.c: add `del_enctype'
19
20	* del_enctype.c (del_enctype): new function for deleting enctypes
21	from a principal
22
23	* Makefile.am (kadmin_SOURCES): add del_enctype.c
24
251999-11-09  Johan Danielsson  <joda@pdc.kth.se>
26
27	* server.c: cope with old clients
28
29	* kadmin_locl.h: remove version string
30
311999-10-17  Assar Westerlund  <assar@sics.se>
32
33	* Makefile.am (kadmin_LDADD): add LIB_dlopen
34
351999-10-01  Assar Westerlund  <assar@sics.se>
36
37	* ank.c (add_one_principal): `password' can cactually be NULL in
38 	the overwrite code, check for it.
39
401999-09-20  Assar Westerlund  <assar@sics.se>
41
42	* mod.c (mod_entry): print the correct principal name in error
43 	messages.  From Love <lha@e.kth.se>
44
451999-09-10  Assar Westerlund  <assar@sics.se>
46
47	* init.c (init): also create `changepw/kerberos'
48
49	* version4.c: only create you loose packets when we fail decoding
50 	and not when an operation is not performed for some reason
51	(decode_packet): read the service key from the hdb
52	(dispatch, decode_packet): return proper error messages
53
54	* version4.c (kadm_ser_cpw): add password quality functions
55
561999-08-27  Johan Danielsson  <joda@pdc.kth.se>
57
58	* server.c (handle_v5): give more informative message if
59	KRB5_KT_NOTFOUND
60
611999-08-26  Johan Danielsson  <joda@pdc.kth.se>
62
63	* kadmind.c: use HDB keytabs
64
651999-08-25  Assar Westerlund  <assar@sics.se>
66
67	* cpw.c (set_password): use correct variable.  From Love
68 	<lha@e.kth.se>
69
70	* server.c (v5_loop): use correct error code
71
72	* ank.c (add_one_principal): initialize `default_ent'
73
741999-08-21  Assar Westerlund  <assar@sics.se>
75
76	* random_password.c: new file, stolen from krb4
77
78	* kadmin_locl.h: add prototype for random_password
79
80	* cpw.c: add support for --random-password
81
82	* ank.c: add support for --random-password
83
84	* Makefile.am (kadmin_SOURCES): add random_password.c
85
861999-08-19  Assar Westerlund  <assar@sics.se>
87
88	* util.c (edit_timet): break when we manage to parse the time not
89 	the inverse.
90
91	* mod.c: add parsing of lots of options.  From Love
92 	<lha@stacken.kth.se>
93
94	* ank.c: add setting of expiration and password expiration
95
96	* kadmin_locl.h: update util.c prototypes
97
98	* util.c: move-around.  clean-up, rename, make consistent (and
99 	some other weird stuff).  based on patches from Love
100 	<lha@stacken.kth.se>
101
102	* version4.c (kadm_ser_cpw): initialize password
103	(handle_v4): remove unused variable `ret'
104
1051999-08-16  Assar Westerlund  <assar@sics.se>
106
107	* version4.c (handle_v4): more error checking and more correct
108 	error messages
109
110	* server.c (v5_loop, kadmind_loop): more error checking and more
111 	correct error messages
112
1131999-07-24  Assar Westerlund  <assar@sics.se>
114
115	* util.c (str2timeval, edit_time): functions for parsing and
116 	editing times.  Based on patches from Love <lha@stacken.kth.se>.
117	(edit_entry): call new functions
118
119	* mod.c (mod_entry): allow modifying expiration times
120
121	* kadmin_locl.h (str2timeval): add prototype
122
123	* ank.c (add_one_principal): allow setting expiration times
124
1251999-07-03  Assar Westerlund  <assar@sics.se>
126
127	* server.c (v5_loop): handle data allocation with krb5_data_alloc
128 	and check return value
129
1301999-06-23  Assar Westerlund  <assar@sics.se>
131
132	* version4.c (kadm_ser_cpw): read the key in the strange order
133 	it's sent
134
135	* util.c (edit_entry): look at default
136	(edit_time): always set mask even if value == 0
137
138	* kadmin_locl.h (edit_entry): update
139
140	* ank.c: make ank use the values of the default principal for
141 	prompting
142
143	* version4.c (values_to_ent): convert key data correctly
144
1451999-05-23  Assar Westerlund  <assar@sics.se>
146
147	* init.c (create_random_entry): more correct setting of mask
148
1491999-05-21  Assar Westerlund  <assar@sics.se>
150
151	* server.c (handle_v5): read sendauth version correctly.
152
1531999-05-14  Assar Westerlund  <assar@sics.se>
154
155	* version4.c (error_code): try to handle really old krb4
156 	distributions
157
1581999-05-11  Assar Westerlund  <assar@sics.se>
159
160	* init.c (init): initialize realm_max_life and realm_max_rlife
161
1621999-05-07  Assar Westerlund  <assar@sics.se>
163
164	* ank.c (add_new_key): initialize more variables
165
1661999-05-04  Assar Westerlund  <assar@sics.se>
167
168	* version4.c (kadm_ser_cpw): always allow a user to change her
169 	password
170	(kadm_ser_*): make logging work
171	clean-up and restructure
172	
173	* kadmin_locl.h (set_entry): add prototype
174
175	* kadmin.c (usage): update usage string
176
177	* init.c (init): new arguments realm-max-ticket-life and
178 	realm-max-renewable-life
179
180	* util.c (edit_time, edit_attributes): don't do anything if it's
181 	already set
182	(set_entry): new function
183
184	* ank.c (add_new_key): new options for setting max-ticket-life,
185 	max-renewable-life, and attributes
186
187	* server.c (v5_loop): remove unused variable
188
189	* kadmin_locl.h: add prototypes
190
191	* version4.c: re-insert krb_err.h and other miss
192
193	* server.c (kadmind_loop): break-up and restructure
194
195	* version4.c: add ACL checks more error code checks restructure
196	
1971999-05-03  Johan Danielsson  <joda@pdc.kth.se>
198
199	* load.c: check for (un-)encrypted keys
200
201	* dump.c: use hdb_print_entry
202	
203	* version4.c: version 4 support
204
205	* Makefile.am: link with krb4
206
207	* kadmin_locl.h: include <sys/un.h>
208
209	* server.c: move from lib/kadm5, and add basic support for krb4
210	kadmin protocol
211
212	* kadmind.c: move recvauth to kadmind_loop()
213