KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17
System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64
User : nobody ( 99)
PHP Version : 5.2.17
Disable Function : NONE
Directory :  /usr/share/doc/pkinit-nss-0.7.6/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/doc/pkinit-nss-0.7.6/ChangeLog
commit f346647f10773a4e9a07c4ea0bb1c44f7d72a4b2
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Fri Aug 22 15:56:24 2008 -0400

    - fix distdir
    - add a LINGUAS file
    - update the .pot file

M	Makefile.am
A	po/LINGUAS
M	po/pkinit-nss.pot

commit 88cc292a69b644cb29921850b4b24bec1eddc43c
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Fri Aug 22 15:51:17 2008 -0400

    fix tag name generation

M	Makefile.am

commit c26afaeedde2aa22cf5ef81c7e7a62ecf3be1534
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Fri Aug 22 15:46:44 2008 -0400

    - try to get the tagging/release targets to work right now that we've moved to
      git as the SCM

M	Makefile.am

commit 66227fc86891cebe49e419c0f49fe44492ff10a1
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Fri Aug 22 15:42:09 2008 -0400

    - accept and parse a set of whitespace-separated rules for "pkinit_cert_match"

M	doc/CONFIGURATION
M	src/certs.c

commit 54c3c05bad1ef922956caa279fbd183a2492811a
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Fri Aug 22 15:14:08 2008 -0400

    - warn if no rules match

M	src/certs.c

commit 11585520a307192e01174834f685f2e92405612e
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Fri Aug 22 14:47:24 2008 -0400

    - change the order of things so that we search for matches for all rules in a
      particular slot or bag before moving on to another slot or bag, instead of
      searching all slots and bags for the first rule before searching all slots
      and bags for the second rule

M	src/certs.c

commit 5387a2d103f38eb0f03f2c516f32c204e466437e
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Fri Aug 22 14:38:51 2008 -0400

    - start on support for handling lists of matching rules

M	src/certs.c

commit 908805648540ac2b1fe696334e0ee106c385dd7e
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Fri Aug 22 12:30:15 2008 -0400

    - add more detail about when things match or don't match matching rules

M	src/certs.c

commit bd2560642efc3c6d56e5a22514f4b4f51afd4dea
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Thu Aug 21 20:13:48 2008 -0400

    - free extension values when we finish examining them
    - free rules retrieved from appdefaults when we finish parsing them

M	src/certs.c

commit 81592c1841a372ed93bfcb6a5eb5d2a30f776e2f
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Thu Aug 21 20:10:15 2008 -0400

    - also free the draft PA-PK-AS-REQ, and both when retrying

M	src/pkinit.c

commit abeaf0ae351393a44f8c079cd22869e7b52e5fe4
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Thu Aug 21 20:07:25 2008 -0400

    - free preauth arguments when we're finished with them
    - don't leak our local copies of configuration settings
    - free the PA-PK-AS-REQ after we've copied it into the preauth structure

M	src/pkinit.c

commit d9c3de79c2316a703fc881d6bc85ab9c40ccaf82
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Thu Aug 21 20:06:51 2008 -0400

    - free the keys in the list of keys

M	src/aabag.c

commit c5f4855fdb10b6c90035f09dd41e74edbb267e8e
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Thu Aug 21 20:06:25 2008 -0400

    - move the value of a signature from the heap into a pool so that we don't leak

M	src/bcmst.c

commit eaee97a7d6f34c47f7058d8408187445fb640c3b
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Wed Aug 20 18:11:30 2008 -0400

    - doc updates on fixes and new additions

M	NEWS
M	configure.ac
M	doc/CONFIGURATION
M	doc/README

commit 70665e622f6c55e67898b2faacbd4909821090e2
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Wed Aug 20 18:11:05 2008 -0400

    - stop reversing subject names

M	doc/openssl/make-certs.sh

commit 1f91effea75db74bdcba6e05c69f51cea5ea9b27
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Wed Aug 20 17:37:01 2008 -0400

    - tweak some debugging log messages

M	src/certs.c

commit b7e3dc53ab5cf998aef20ea3a4bc96a4521093c7
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Wed Aug 20 17:27:59 2008 -0400

    - change certificate selection so that we look for acceptable certificates in
      * the preferred slot
      * the bag
      * each logged-in slot
      * each not-logged-in slot
      and if we find exactly one right certificate in any of these places, we use it

M	src/certs.c

commit bc2b033c79d069f6659987cd1568ba730d7c8dc0
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Wed Aug 20 17:27:36 2008 -0400

    - try to avoid holding more than one copy of a given key or certificate

M	src/aabag.c

commit eb294d2d8c9884a775f1762bbd7774ada3fceda8
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Wed Aug 20 17:26:58 2008 -0400

    - heed a request for a minimum DH prime size more than a preferred group number

M	src/oakley.c
M	src/oakley.h
M	src/pkinitt.c

commit 95573e8271763181cdc9855579e181e819731d2b
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Tue Aug 19 18:52:11 2008 -0400

    - add logic for certificate matching using "pkinit_cert_match"

M	src/certs.c

commit 09e6b9e7c5c5e7f66600880769880c5ff8303d74
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Tue Aug 19 18:51:09 2008 -0400

    - provide a flag to change matching behavior to match the configuration (so
      that we don't make the KDC start matching based on client-only preferences)

M	src/certs.h
M	src/pkinit.c

commit 62722299b1ed63f8f166055fdd3d0bedba07ea76
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Tue Aug 19 16:19:21 2008 -0400

    - add cert_eku_matches_text, for checking if a certificate contains any subset
      of
         pkinit
         msScLogin
         clientAuth
         emailProtection
    - add cert_ku_matches_text, for checking if a certificate contains any subset of
         digitalSignature
         keyEncipherment

M	src/certs.c

commit 365cba328277153e9ab90350e6730baeb4a2e9c5
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Tue Aug 19 15:17:38 2008 -0400

    - accept "pkinit_kdc_hostname" as an alias for "trusted_hosts", as a way to
      specify an acceptable DNS name in a KDC's certificate's SAN list or subject
      name
    - support "pkinit_eku_checking" in combination with "pkinit_kdc_hostname"

M	src/certs.c

commit 29bd5a6182c55306671641924981ccebf7a962e6
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Tue Aug 19 15:15:46 2008 -0400

    - accept "pkinit_require_ocsp_checking" as an alias for "ocsp_checking", to
      more closely mimic the "pkinit_require_crl_checking" option
    - accept "pkinit_dh_min_bits" as an alias for "minimum_dh_prime_size"

M	src/pkinit.c

commit 2186f7616938cf938c99bc0224547474ef57b274
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Mon Aug 18 19:28:03 2008 -0400

    - update copyright date

M	src/bcmst.c

commit 161fd438aa4f7767ba66784b51f1d44f623281c6
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Mon Aug 18 19:23:16 2008 -0400

    - decode server_dh_nonce correctly
    - add rsa-with-sha256/384/512 signature types to what we advertise being
      able to cope with
    - add rsa as a public encryption type we advertise supporting
    - add aes/des/rc2 as symmetric encryption types we advertise supporting
    - handle encapsulated signed-data wrapped in ANY rather than OctetString

M	src/pkinitt.c

commit 10052c429bb95380f0f76f86910e0abc068b5823
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Mon Aug 18 19:22:47 2008 -0400

    - generate signed-data items with version=3 rather than version=1, which
      WS2008 seems to prefer

M	src/bcmst.c

commit 2d7c3188e16b10ad810e2431f4b7d8d136a52e9f
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Thu Aug 14 17:30:00 2008 -0400

    - up the default key size
    - generate an ocsp signing cert
    - allow keyusage "all"
    - mark keyusage and ca extensions as critical

M	doc/openssl/make-certs.sh

commit 919f4acc7560e5ade3c7a9cf8272ed756ba7f755
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Thu Aug 14 17:28:28 2008 -0400

    - accept either "pkinit-rkey-data" or "data" as signed payload when we're
      expecting reply data data

M	src/pkinitt.c

commit bf391d429ea6033e42f5743d4dc14876f00bddba
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Wed Aug 13 19:03:02 2008 -0400

    - handle cases where the signed data in an enveloped data item is encoded as
      a ANY rather than as an OctetString, which is what we'd expected, by
      rewrapping data ourselves and attempting to parse it as a ContentInfo
      before falling back on our previous behavior

M	src/pkinitt.c

commit 5e2a037b2b1dafcd0a65e7f6ffe3159933e1e595
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Tue Jul 29 17:56:17 2008 -0400

    - add certificate policies

M	doc/openssl/make-certs.sh

commit 256ae33c6afd34fd7b8a058c1ec45ae997c23ff6
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Tue Jul 29 17:35:35 2008 -0400

    - advertise that we know about  sha256/384/512

M	src/pkinitt.c

commit 0e251eb25dc5437f5b065209f274c5df55bc953e
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Tue Jul 29 17:35:15 2008 -0400

    - add the LINGUAS file

M	po/Makefile.in.in

commit 31f2cf0278ceb14077a5a653104fa2fb00aba68f
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Tue Jul 29 17:33:10 2008 -0400

    - build the CA cert after we've parsed arguments for ocsp and crl locations
    - generate an empty crl whenever we run

M	doc/openssl/make-certs.sh

commit ffba4dea43dd901aa9497e27c9d622ff9eede574
Author: Nalin Dahyabhai <nalin.dahyabhai@pobox.com>
Date:   Thu Jul 24 14:42:37 2008 -0400

    - fix an error decoding a kdc request

M	src/pkinitt.c

commit 2f8ffb6a16e9d8d145601ebc2d4fe1aa6eb11f07
Author: Peter Sulyok <peti@sulyok.hu>
Date:   Wed Apr 30 05:15:28 2008 +0000

    2008-04-30  Peter Sulyok <peti@sulyok.hu> (via peti@fedoraproject.org)
    
      * po/hu.po: Initial Hungarian translation

A	po/hu.po

commit a852f5ff42394e3298517f7fce7ae8cee2988acf
Author: Miloš Komarčević <kmilos@gmail.com>
Date:   Fri Apr 4 09:06:00 2008 +0000

    2008-04-04  Miloš Komarčević <kmilos@gmail.com> (via kmilos@fedoraproject.org)
    
      * po/sr@latin.po: Initial commit of Serbian Latin translation

A	po/sr@latin.po

commit 5fd4f24cfd2e35e64671f241bec4dfe7725badcd
Author: Miloš Komarčević <kmilos@gmail.com>
Date:   Fri Apr 4 09:03:58 2008 +0000

    2008-04-04  Miloš Komarčević <kmilos@gmail.com> (via kmilos@fedoraproject.org)
    
      * po/sr.po: Initial commit of Serbian translation

A	po/sr.po

commit a7da3416a361f2ac1794414569a090913746800d
Author: Diego Búrigo Zacarão <diegobz@gmail.com>
Date:   Sat Mar 22 18:30:06 2008 +0000

    2008-03-22  Diego Búrigo Zacarão <diegobz@gmail.com> (via
    diegobz@fedoraproject.org)
    
      * po/pt_BR.po: Added initial pt_BR translation

A	po/pt_BR.po

commit dfa948a997884986f4745d21d84d83595cdae756
Author: Rondeau Matt <rondeau.matthieu.r@gmail.com>
Date:   Fri Mar 21 14:44:02 2008 +0000

    2008-03-21  Rondeau Matt <rondeau.matthieu.r@gmail.com> (via
    mattr@fedoraproject.org)
    
      * po/fr.po: Updated french translation

A	po/fr.po

commit 2a1b6b09807086fd08a3e69713bf9d807761ab59
Author: Francesco Tombolini <tombo@adamantio.net>
Date:   Fri Mar 21 02:05:54 2008 +0000

    2008-03-21  Francesco Tombolini <tombo@adamantio.net> (via
    tombo@fedoraproject.org)
    
      * po/it.po: first it trans

A	po/it.po

commit 9ddda0794efc38c9d05077be25f4423d8dfd51f8
Author: Mostafa Daneshvar <mostafa@daneshvar.org.uk>
Date:   Thu Mar 20 10:42:38 2008 +0000

    2008-03-20  Mostafa Daneshvar <mostafa@daneshvar.org.uk> (via
    lashar@fedoraproject.org)
    
      * po/bal.po: Balochi

A	po/bal.po

commit ab94c971380d746885773323050ff5e6e35a27d0
Author: Alexander Todorov <atodorov@redhat.com>
Date:   Thu Mar 20 09:49:17 2008 +0000

    2008-03-20  Alexander Todorov <atodorov@redhat.com> (via
    atodorov@fedoraproject.org)
    
      * po/bg.po: Added Bulgarian translation

A	po/bg.po

commit e8d4e98b86599c6a92277c8d3efb5bfd0a8901e6
Author: Piotr Drąg <piotrdrag@gmail.com>
Date:   Wed Mar 19 17:51:10 2008 +0000

    2008-03-19  Piotr Drąg <piotrdrag@gmail.com> (via raven@fedoraproject.org)
    
      * po/pl.po: Initial Polish translation

A	po/pl.po

commit 73f25bb51e75f487fa5fdf126faae57ffff10899
Author: Fabian Affolter <fabian@bernewireless.net>
Date:   Tue Mar 18 00:07:23 2008 +0000

    2008-03-18  Fabian Affolter <fabian@bernewireless.net> (via
    fab@fedoraproject.org)
    
      * po/de.po: Initial German version

A	po/de.po

commit cbf8bfa18032e5211605ab5604d10344515f58a4
Author: Miloslav Trmac <mitr@redhat.com>
Date:   Mon Mar 17 21:23:17 2008 +0000

    2008-03-17  Miloslav Trmac <mitr@redhat.com> (via mitr@fedoraproject.org)
    
      * po/cs.po: Add Czech translation.

A	po/cs.po

commit c92d317ba378aeee4b1b95e6c700fabc384479c7
Author: nalin <nalin>
Date:   Tue Oct 23 21:03:02 2007 +0000

    update NEWS

M	NEWS

commit 89f903534f1b518be6a2c1f5542e76ab57e86137
Author: nalin <nalin>
Date:   Tue Oct 23 20:58:56 2007 +0000

    - whoops, add a missing header file to the tarball

M	Makefile.am
M	po/pkinit-nss.pot

2007-10-22 nalin
	* configure.ac: check for 1.6.3.
	* backport-1.6.3: add.

2007-07-11 nalin
	* src/pkinit.c: initialize "name" to avoid displaying a garbage pointer
	when using software certs (#247889)
	* configure.ac: bump version to 0.7.3, tag

2007-06-21 nalin
	* configure.ac: bump version to 0.7.2, tag

2007-06-21 nalin
	* src/pkinit.c: don't leak appdefault strings.

2007-06-21 nalin
	* src/pkinit.c(struct module_context): add locations to store typed
	data which we get back from the KDC during try-again processing.  A
	KDC is only expected to hand back one type of data per error, but in
	case we get multiple errors back (for example, unacceptable DH
	parameters AND unverifiable certificates), we need to keep track of
	things it's told us before.
	* src/pkinit.c(client_gic_opts,client_try_again): note which
	parameters we currently ignore.
	* src/pkinit.c(client_process): let "minimum_dh_prime_size" be
	specified on the command line as well.
	* src/pkinit.c(client_try_again): store typed-data which we get as
	edata for possible use in future iterations.

2007-06-20 nalin
	* src/pkinit.c: learn to spew debug at stdout, and to pick up debug
	settings from the command line

2007-06-20 nalin
	* src/aabag.c: rework caching of encrypted items so that we don't
	spew confusing error messages, and so that we prompt using the
	filename.

2007-06-20 nalin
	* src/aabag.c(aa_item_copy,aa_item_in_list): add, to avoid attempts
	to decrypt any given chunk of encrypted data more than once.

2007-06-08 nalin
	* src/pkinit.c: un-"const" a couple of initialization data lists,
	to quiet some compiler warnings which showed up when they were made
	const.

2007-06-08 nalin
	* src/pkinit.c: add CMS enctypes to our requests to be helpful.

2007-06-08 nalin
	* src/pkinitt.c(pkinit_create_auth_pack): pass a NULL item in as the
	algorithm parameters for the supportedCMStypes algorithmInfo list for
	SEC_OID_CMS_3DES_KEY_WRAP and SEC_OID_MD5, instead of just omitting
	them as we had been doing.

2007-06-08 nalin
	* src/bcmst.c,src/certs.c: move find_key_for_cert to certs and make
	it non-static.
	* src/certs.c(cert_ku_matches_mask): remove; should have just been
	using CERT_CheckCertUsage(), which does the same thing.
	* src/certs.c(cert_validate_kdc_certificate,
	cert_validate_client_certificate): call out
	SEC_ERROR_INADEQUATE_CERT_TYPE as a known error, log a debug message
	when we reject a certificate because it can't be used for signing.
	* src/certs.c(cert_have_key_for_cert): add.
	* src/certs.c(cert_verify_cert_for_encryption): don't leak a ref
	to the cert when the certificate passes the check.

2007-06-08 nalin
	* doc/openssl/make-certs.sh: be able to make DSA certs, even if we
	mightn't support them just yet.

2007-06-05 nalin
	* configure.ac: bump version to 0.7.1, tag

2007-05-31 nalin
	* src/get-pkinit-san.c(pkinit_from_other_names): expand the list of
	returned values correctly.

2007-05-31 nalin
	* src/aabag.c(PKINIT_CA_TRUST_FLAGS): add CERTDB_VALID_PEER to the
	list of flags we add to CA certificates.

2007-05-30 nalin
	* src/certs.c(cert_find_preferred_cert_using_slot_or_bag): don't barf
	on empty certificate lists.

2007-05-30 nalin
	* src/pkinit.c(server_verify): load text certs and keys before
	verifying the client's request, not before generating our response
	when it might be too late for the client.

2007-05-30 nalin
	* src/bcmst.c: handle the should-never-happen list-with-nothing-in-it
	case.

2007-05-30 nalin
	* src/aacat.c: handle the should-never-happen list-with-nothing-in-it
	case.

2007-05-30 nalin
	* src/aabag.c(aa_bag_find_cert_by_subject): don't barf on empty lists.

2007-05-30 nalin
	* configure.ac: bump version to 0.7.0, tag.

2007-05-30 nalin
	* src/pkinit.c(pkinit_init): read locations of cert and key files
	from the configuration.
	* src/pkinit.c(client_gic_opt): add, for scanning options.
	* src/pkinit.c(client_process): override locations of cert and key
	files from options, load up the bag.
	* src/pkinit.c(server_get_edata,server_return): load up the bag.

2007-05-30 nalin
	* src/certs.c(cert_find_cert_issuer): search the bag, too.
	* src/certs.c(cert_find_preferred_cert_using_slot_or_bag): rename
	from cert_find_preferred_cert_using_slot, search the bag if there's
	no slot provided.
	* src/certs.c(cert_find_preferred_cert): search bags, too.

2007-05-30 nalin
	* src/bcmsutil.c: prescreen certificates.  Use the right list of
	directories for loading CA certificates.

2007-05-30 nalin
	* src/bcmst.c: dump trust values when we walk the certifying chain.

2007-05-30 nalin
	* src/aabag.c: don't use glob(), which doesn't pick up symlinks.  Fix
	reference counting of keys and certificates.  Fix trust flags given to
	certificates we read.

2007-05-30 nalin
	* src/get-pkinit-san.c: add.

2007-05-30 nalin
	* doc/openssl/make-certs.sh: add dataEncipherment when encryption
	is requested.

2007-05-30 nalin
	* configure.ac: fix checking for working --as-needed flag, avoid
	pulling in libkrb5 more than once when checking if certain functions
	are provided.

2007-05-29 nalin
	* doc/openssl/make-certs.sh: always create a ca.client.crt file,

2007-05-28 nalin
	* doc/openssl/make-certs.sh: move subordinate CAs into subdirectories,
	add nsComment to the top-level CA, create certificate chain files.

2007-05-28 nalin
	* autogen: pick up $CFLAGS from the environment, too

2007-05-28 nalin
	* src/pkinit.c: create bags.

2007-05-28 nalin
	* src/pkinitt.c: update for API changes elsewhere.

2007-05-28 nalin
	* src/bcmsutil.c: use bags.

2007-05-28 nalin
	* src/bcmst.c: update for API changes elsewhere.

2007-05-28 nalin
	* src/certs.c(cert_find_cert_issuer): add, wrapping up the internal
	NSS database with a bag.
	* src/certs.c(cert_find_preferred_cert,cert_validate_client_cert,
	cert_validate_kdc_cert): take a searchable bag.

2007-05-28 nalin
	* src/aabag.c,src/aacat.c: redesign the whole thing so that I don't
	end up having to cart multiple bags around later.

	* src/aacat.c: load non-directories as we would files.

2007-05-30 nalin
	* src/aabag.c: don't use glob(), which doesn't pick up symlinks.  Fix
	reference counting of keys and certificates.  Fix trust flags given to
	certificates we read.

2007-05-30 nalin
	* src/get-pkinit-san.c: add.

2007-05-30 nalin
	* doc/openssl/make-certs.sh: add dataEncipherment when encryption
	is requested.

2007-05-30 nalin
	* configure.ac: fix checking for working --as-needed flag, avoid
	pulling in libkrb5 more than once when checking if certain functions
	are provided.

2007-05-29 nalin
	* doc/openssl/make-certs.sh: always create a ca.client.crt file,

2007-05-28 nalin
	* doc/openssl/make-certs.sh: move subordinate CAs into subdirectories,
	add nsComment to the top-level CA, create certificate chain files.

2007-05-28 nalin
	* autogen: pick up $CFLAGS from the environment, too

2007-05-28 nalin
	* src/pkinit.c: create bags.

2007-05-28 nalin
	* src/pkinitt.c: update for API changes elsewhere.

2007-05-28 nalin
	* src/bcmsutil.c: use bags.

2007-05-28 nalin
	* src/bcmst.c: update for API changes elsewhere.

2007-05-28 nalin
	* src/certs.c(cert_find_cert_issuer): add, wrapping up the internal
	NSS database with a bag.
	* src/certs.c(cert_find_preferred_cert,cert_validate_client_cert,
	cert_validate_kdc_cert): take a searchable bag.

2007-05-28 nalin
	* src/aabag.c,src/aacat.c: redesign the whole thing so that I don't
	end up having to cart multiple bags around later.

2007-05-25 nalin
	* src/aacat.c(main): clean up the certificate and key lists before
	shutting down NSS.

2007-05-23 nalin
	* src/bcmsutil.c(main),src/aacat.c(main): fix "bag" being uninitialized.

2007-05-23 nalin
	* src/fragment/openp12.c,src/fragment/openmod.c: correct a couple of
	compiler warnings.

2007-05-22 nalin
	* src/pkinit.c: update for api changes elsewhere.

2007-05-22 nalin
	* src/bcmsutil.c: open a bag if we're told to open one.

2007-05-22 nalin
	* src/pkinitt.c(pkinit_create_draft_pa_pk_as_req,
	pkinit_create_pa_pk_as_req,pkinit_build_reply_key_pack,
	pkinit_build_dh_key_info,pkinit_create_pa_pk_as_rep,
	pkinit_verify_enc_key_pack_common,pkinit_verify_draft_pa_pk_as_rep,
	pkinit_process_enc_key_pack,pkinit_verify_pa_pk_as_rep): pass in a
	bag and password callback.

2007-05-22 nalin
	* src/bcmst.c(find_key_for_cert): search the usual locations for the
	private key which corresponds to a cert, and then search a passed-in
	bag.
	* src/bcmst.c(bcms_add_signer_to_signed_data,bcms_create_signed_data,
	bcms_recover_enveloped_data_key,bcms_extract_enveloped_data): take a
	certdb, a bag, and a password callback.

2007-05-22 nalin
	* src/certs.c(cert_find_preferred_cert): add a debug message when
	we determine that we need to log into a device.

2007-05-22 nalin
	* src/commont.c: add a comment to the location of the definition of
	an AES IV. Remove unused variables.

2007-05-22 nalin
	* src/certhash.c: read a certificate, and produce a hash of its
	subject.

2007-05-22 nalin
	* src/aacat.c: exercise the aabag APIs.

2007-05-22 nalin
	* src/aabag.c: add a container for holding temporary certs and keys
	read from flat files.

2007-05-22 nalin
	* src/bpk5.c(bpk5_pbkdf1): add pkcs5 password-based key derivation.

2007-05-17 nalin
	* tag 0.6.1

2007-05-17 nalin
	* src/pkinit.c(server_get_flags): if "is_hw" is true, advertise that
	we can do hardware preauthentication to the KDC.

2007-05-04 nalin
	* tag 0.6.0
	* Makefile.am: define %{dist} to %{nil} before querying for the
	release number from the .spec file
	* NEWS: add.

2007-04-25 nalin
	* src/bcmst.c: add definition/template/encoder/decoder for
	EncryptedData.

2007-04-25 nalin
	* src/pkinitt.c: remove a few unused variables, remove an unnecessary
	typecast.

2007-04-25 nalin
	* configure.ac,src/pkinit.c: handle cases where preauth_plugin.h
	requires the krb5_gic_opt_pa_data data type and krb5.h didn't provide
	it, even as a stub, yet.

2007-04-25 nalin
	* src/pkinit.c: fix argument order for the client_process() function,
	from Jacob Berkman.  Fix arguments for client_tryagain().

2007-04-25 nalin
	* backport-1.6.1: actually commit the new files.

2007-04-24 nalin
	* configure.ac: define PKINIT_CLIENT_MISSING_GIC_OPTS instead of
	PKINIT_DONT_USE_GIC_OPTS.
	* src/pkinit.c: key off of PKINIT_CLIENT_MISSING_GIC_OPTS instead
	of PKINIT_DONT_USE_GIC_OPTS.

2007-04-24 nalin
	* Makefile.am,backport-1.6.1: add headers from 1.6.1.
	* configure.ac: check for 1.5/1.6/1.6.1.  Provide a --with-krb5-version
	option to override autodetection.  Define PKINIT_USE_PAL_BACKPORT
	and PKINIT_DONT_USE_GIC_OPTS instead of the more not namespaced
	USE_PAL_BACKPORT and DONT_USE_GIC_OPTS defines.
	* src/pkinit.c(client_gic_opts): add a stub.
	* src/pkinit.c(client_process): expect an "opts" argument if
	PKINIT_CLIENT_PROCESS_MISSING_OPT isn't defined.
	* src/pkinit.c(preauthentication_client_0): point to client_gic_opts
	if PKINIT_DONT_USE_GIC_OPTS isn't defined.

2007-04-24 nalin
	* autogen: drop --enable-debugging -- we're always debuggable now.

2007-04-24 nalin
	* src/bcmst.c(compare_issuer_and_sn,find_cert_by_issuer_and_sn): add.
	From Jacob Berkman.
	* src/bcmst.c(find_cert_from_rid): use find_cert_by_issuer_and_sn()
	instead of CERT_FindCertByIssuerAndSN().  From Jacob Berkman.

2007-04-23 nalin
	* ChangeLog: er, 2007, not 2006.
	* src/pkinitt.c: add routines specifically for decoding typed_data.

2007-04-23 nalin
	* src/pkinit.c(client_process): accept host names in various places.
	Rename authorization_data variables to indicate that they're really
	typed_data.

2007-04-23 nalin
	* src/certs.c(cert_get_oid_pkinit_rkey_data_oid,
	cert_get_oid_pkinit_auth_data_oid): add.
	* src/certs.c(check_item_in_list): factor out a routine for checking
	for a value in a list.
	* src/certs.c(cert_san_matches_dns_for_realm): add a check to see if
	the certificate in question contains a commonName in its subject or a
	dnsName subjectAltName with a value which matches the realm's
	"trusted_servers" setting.
	* src/certs.c(cert_is_preferred): check for a matching DNS name.
	* src/certs.c(cert_validate_kdc_certificate): check for a matching
	DNS name for the KDC in combination with SSL ServerAuth or KDC key
	EKU values.
	* doc/CONFIGURATION: note "trusted_servers"

2007-02-06 nalin
	* src/bcmst.c(external_principal_identifier_template): mark the
	subject_key_identifier as explicit, even though it's not, so that
	NSS will add and strip the octet-string wrapper for us, making it
	easier to use and compare values in CERTCertificate structures.

2007-02-06 nalin
	* src/commont.c(common_generate_content_encryption_key_aes): Add.
	* src/bcmst.c(bcms_extract_enveloped_data): Learn to parse AES
	parameters (an IV).
	* src/bcmsutil.c(main): add options for specifying use of
	AES128/AES256 keys for bulk encrypting the enveloped data.
	* src/bcmsutil.c(usage): document the new AES options, plus the old
	DES and RC2 options.
	* src/certs.c(cert_is_preferred): debug log when we find a banned cert
	or one which chains up to a trusted certifiers.
	* src/pkinit.c(client_try_again): debug log how many trusted
	certifiers or invalid certificates the KDC told us about.
	* src/pkinitt.c,src/bcmst.c: debug log key sizes when handling
	enveloped data.

2007-02-06 nalin
	* src/certs.c(bcms_extract_enveloped_data): note what the unsupported
	encryption algorithm is, for troubleshooting.
	* src/pkinitt.c(pkinit_create_trusted_certifiers_edata): fix encoding
	of trusted-certifiers.

2007-02-06 nalin
	* src/bcmst.c(bcms_add_signer_to_signed_data): insert the signing time
	into the list so that the encoding comes out with the items sorted, as
	required by CMS.
	* src/certs.c(cert_validate_{client,kdc}_certificate): add a specific
	log for unknown-issuer errors.
	* src/certs.c(cert_validate_client_certificate): catch and add e-data
	for revoked-certificate errors.  Return KDC_ERR_CLIENT_NAME_MISMATCH
	instead of KDC_ERR_CERTIFICATE_MISMATCH in the event of name a mismatch.

2007-02-05 nalin
	* src/certs.c,src/pkinit.c: certificate nicknames can be NULL; guard
	against that.
	* src/pkinitt.c(pkinit_encode_authorization_data): use the right
	template, correctly pass the array to the encoder.
	* src/pkinitt.c(pkinit_create_typed_datum): return a datum structure,
	which the caller will have an easier time processing.
	* src/pkinitt.c(pkinit_create_invalid_certificates_edata,
	pkinit_create_trusted_certifiers_edata,
	pkinit_create_dh_parameters_edata): encode the error data correctly.
	* src/pkinitt.c(pkinit_verify_pa_pk_as_req): fix checking of the DH
	prime length.
	* src/pkinit.c(client_try_again): fix parsing of error data from the
	KDC: it's a sequence of typed-data, not just one.
	* src/certs.c(cert_validate_kdc_certificate): directly interpret some
	of the more expected errors for the log.
	* src/certs.c(cert_validate_client_certificate): directly interpret
	some of the more expected errors for the log.  Report invalid cert
	with e_data for revoked certificates.
	* src/bcmst.c: use the subjectName, not the possibly-NULL nickname, in
	a debug message.
	* src/commont.c: take care that integers are encoded so that they come
	out unsigned.

2007-02-05 nalin
	* src/pkinit.c: make the location of the client and server
	key/cert/token database configurable.

2007-02-05 nalin
	* configure.ac: check for 1.7-specific gic_opts callback functions.
	* configure.ac: bump version to 0.5.0.

2007-02-05 nalin
	* configure.ac: fixup logic so that we can tell the difference between
	1.5 without preauth_plugin.h (where the backport forces changes in the
	symbol names for safety's sake) and 1.6 without preauth_plugin.h.
	* src/bcmst.c: fix naming of sequence_of_algorithm_identifier.
	* src/bcmst.c(bcms_decode_sequence_of_algorithm_identifier): Add.
	* src/bcmst.c(bcms_get_trusted_{client_,kdc_,}certifier_list): Add.
	* src/certs.c(cert_matches_epi): factor this out, because it's getting
	too large for repeated code.
	* src/certs.c(cert_is_preferred): also provide an option to specify a
	list of banned external_principal_identifier structures, for cases
	where the KDC sends back info that one had an invalid signature.
	* src/certs.c(cert_validate_{client,kdc}_certificate): use the verify
	function which gives us a log, and log the failure entries.  Also
	return the SEC_ERROR_BAD_SIGNATURE certs if we're returning a
	KDC_ERR_INVALID_CERTIFICATE error.
	* src/commont.c(common_decode_sequence_of_algorithm_identifier): Add.
	* src/map-file.c: log when we encounter errors opening/reading the file.
	* src/oakley.c(oakley_parse_group): factor this out.
	* src/oakley.c(oakley_get_groups): Add, for retrieving all parameters
	with prime at least a certain size.
	* src/oakley.c: return a domain_parameters structure instead of the
	NSS DHParamaters and an extra q, because it's less work.
	* src/pkinit.c: add a "minimum_dh_prime_size" option.  Set the
	prompt callback before we attempt to open the database.
	* src/pkinit.c(client_try_again): add, decoding the error data and
	using it to guide attempts to find another certificate and generate
	an auth_pack.
	* src/pkinitt.c(pkinit_get_trusted_{client,kdc}_certifier_list): Retire.
	* src/pkinitt.c(pkinit_create_dh_parameters_edata): Add, for sending
	along with KDC_ERR_DH_KEY_PARAMETERS_NOT_ACCEPTED errors.
	* src/pkinitt.c(pkinit_create_client_public_value): Allow a prescribed
	list of acceptable parameters from the KDC and a locally-specified
	minimum size.
	* src/pkinitt.c(pkinit_create_{draft_,}auth_pack): handle cases where
	pkinit_create_client_public_value() can't give us anything.
	* src/pkinitt.c(pkinit_verify_pa_pk_as_req): set e_data for
	KDC_ERR_CANT_VERIFY_CERTIFICATE, KDC_ERR_INVALID_CERTIFICATE, and
	KDC_ERR_DH_KEY_PARAMETERS_NOT_ACCEPTED.

2007-01-26 nalin
	* src/pkinitt.c(pkinit_time_from_signing_time): try to parse the raw
	timestamp (without the type and length) as a timestamp.
	* src/pkinitt.c(pkinit_time_from_utc_time): fix scanning of the time.
	* src/pkinitt.c(pkinit_create_trusted_certifiers_edata): add.
	* src/pkinitt.c(pkinit_create_invalid_certificates_edata): add.
	* src/pkinitt.c(pkinit_verify_pa_pk_as_req): reuse code to build the
	list of trusted CAs to clean this area up a bit.
	* src/certs.c(cert_find_preferred_cert): take the list of restricted
	CAs as an external_principal_identifier list instead of an array of
	DER-encoded certificates.

2007-01-26 nalin
	* src/pkinitt.c(pkinit_signing_time_from_time): add function to
	convert to encoded signing time to time_t, using UTC time or
	generalized time, as appropriate.
	* src/pkinitt.c(pkinit_utctime_from_time): add function to
	convert to raw UTC time to time_t.
	* src/pkinitt.c(pkinit_generalizedtime_from_time): rename, make public
	function to convert to raw generalized time to time_t.
	* src/pkinitt.c(pkinit_time_from_signing_time): add function to
	convert from encoded signing time to time_t.
	* src/pkinitt.c(pkinit_from_utctime_time): add function to
	convert from raw UTC time to time_t.
	* src/pkinitt.c(pkinit_from_generalizedtime_time): rename, make public
	function to convert from raw generalized time to time_t.
	* src/pkinitt.c(pkinit_verify_pa_pk_as_req): if the client included a
	signing time attribute as part of its request, check that date for
	clock skew as well.
	* src/commont.c: add encoder/decoder pairs for UTCTime and
	GeneralizedTime items.
	* src/bcmst.c(bcms_verify_signed_data): provide a way to stash the
	signing time as a time_t for the caller.
	* src/bcmst.c(bcms_make_external_principal_identifier_list): add.
	* src/bcmsutil.c: add a -v (verbosity) option to crank up debug
	logging.

2007-01-25 nalin
	- make pkinit_debug() take a module_context and a debug priority level
	- thread module_context pointers through many, many functions

2007-01-22 nalin
	* src/bcmst.c(bcms_make_certificate_list): take a deep copy of the
	certificate, in case the current origin gets pulled out from under
	us before we go to encode this list.
	* src/commont.c(common_make_algorithm_identifier_list): take a deep
	copy of the parameters field, in case the one we're using gets pulled
	out from under us before we go to encode this list.

2007-01-19 nalin
	* src/bcmst.c, src/certs.c: use CERT_DestroyCertArray() instead of
	a home-grown function which actually leaks the array pointer (oops).
	* src/certs.c(cert_validate_kdc_certificate,
	cert_validate_client_certificate): provide a way to pass in a
	certificate pool when we're verifying certificates, and import that
	pool into the temporary database to help us fill in the gaps in
	certificate chains.
	* src/pkinitt.c(pkinit_validate_kdc_certificate): provide a way to
	pass in the pool of certs which may include intermediate CAs.

2007-01-12 nalin
	* src/bcmst.c, src/certs.c: give destroy_array_of_certs() an
	upper-bound on the array size.

2007-01-12 nalin
	* backport: update to base off of the final 1.6 sources.

2007-01-12 nalin
	* src/pkinit.c: release slots and certificates when they're no longer
	going to be used. Note if NSS shutdown fails.

2007-01-12 nalin
	* doc/CONFIGURATION: note which Oakley groups we know about already.

2007-01-12 nalin
	* src/show-cert-guid.c: note if NSS shutdown fails.

2007-01-12 nalin
	* src/pkinitt.c: release keys, certificates, contexts, and slots.

2007-01-12 nalin
	* src/certs.c: release certificates when they're no longer going to be
	used.

2007-01-12 nalin
	* src/bcmsutil.c: add a -t option to allow forcing a token login.
	* src/bcmst.c: release keys, certificates, contexts, and slots.

2007-01-12 nalin
	* src/oakley.c, src/prime2sub: add q values for the rest of the DH
	parameter sets.

2007-01-08 nalin
	* src/bcmst.c(bcms_add_cert_chain_to_signed_data): walk the chain
	correctly (#221917).

2006-12-21 nalin
	* src/map-file.c: add a mapping-file module.  Hopefully at some point
	we'll be able to just call out to something smarter, but for now this
	may have to do.
	* src/show-cert-guid.c: rename an unused parameter so that it is easy
	to tell that we knew it would be unused.
	* src/bcmst.c: rename an unused parameter so that it is easy
	to tell that we knew it would be unused.
	* src/pkinitt.c: take a flag indicating whether or not we should trust
	SAN values for cases where we have to find the cert by ourselves.
	Change create_rep to take the cert instead of searching directly.
	* src/certs.c: support the passing-in of additional acceptible
	subject DN values when we need to find a certificate.
	* src/pkinit.c: support mappings files, and being told to not trust
	SAN values.

2006-12-20 nalin
	* src/pkinit.c: add an "is_hw" flag to control whether or not we
	consider ourselves hardware preauth.
	* src/certs.c: make cert_certificate_is_preferred() module-local.
	Provide a way to require that the cert being checked is issued (at
	some point) by one of some provided DER certs.

2006-12-20 nalin
	* src/certs.c(cert_verify_cert_for_encryption): add, to check if the
	client's key is allowed to be used to encrypt enc-key-pack replies.
	* src/pkinit.c(server_return): ensure that we either have DH params or
	a client cert which can be used for encryption before building the
	reply.

2006-12-20 nalin
	* src/certs.c(cert_validate_kdc_certificate,
	cert_validate_client_certificate,cert_is_preferred): don't barf if we
	can't find the certificate's issuer.
	* src/certs.c(cert_certificate_get_is_ca): make the message about not
	having basicConstraints less emphatic.
	* src/pkinit.c,backport/: update backport to 1.6 branch, rev. 18998

2006-12-19 nalin
	* src/bcmst.c(bcms_add_cert_chain_to_signed_data): use
	CERT_FindCertIssuer() to walk the certifying chain because it's
	simpler and seems to work better.
	* src/pkinit.c(server_verify): initialize some pointers we didn't
	used to clear.
	* src/pkinitt.c(pkinit_kdc_dh_key_info_template): the nonce isn't
	optional.  Set it correctly, too.

2006-12-18 nalin
	* src/pkinit.c: don't use the non-existent appdefault_integer() call,
	use our own.
	* src/commont.c: provide an alternate integer decoder.

2006-12-18 nalin
	* po: refresh
	* src/pkinitt.c: remove redundant validation calls, since we do the
	same in the cert...() functions we call
	* src/bcmst.c: change things so that we expect constructed data as
	the content in content-info structures, but continue to decode both.
	Generate signed-attributes by default; handle signed-attributes when
	verifying signed messages.
	* src/bcmsutil.c: update for bcmst changes.
	* src/commont.c: update for bcmst changes.  Encode the
	private_value_length field of DH parameters, if it's there, likewise
	for the validation_parms field of domain parameters.
	* src/pkinit.c: rework module init/cleanup to use the hooks provided
	by newer versions of the plugin layer, properly shut down NSS when
	we were the ones who initialized it.  Pick up "try_dh" and
	"preferred_group" options to affect how the client tries to get creds
	from the KDC.  (Note: the default modulus file distributed with Heimdal
	is group 2.)
	* src/certs.c: fail validation of either client or server certs if we
	can't build a chain from the cert to a "root" certificate.  Assume that
	such a certificate is unsuitable for our use, too.
	* src/oakley.c: track subprime values for groups for which they are
	defined, and provide a way for the caller to get them, too.
	* src/pkinitt.c: encode the parts of a PA-PK-AS-REQ as octet strings,
	not structures, per the spec.

2006-11-01 nalin
	* src/pkinit.c: don't try to free that duplicate cert
	* tag 0.2.1

2006-11-01 nalin
	* tag 0.2.0

2006-11-01 nalin
	* src/certs.c: remove no-longer-used certdb parameter from
	find_preferred_cert.  Clean up use of SAN matching flags.  Use
	CERT_DupCertificate instead of malloc to save the certificate.

2006-10-31  Jeff Moyer  <jmoyer@redhat.com>
	* src/certs.c, src/pkinit.c: It turns out that using
	CERT_FindCertByNickname is not a reliable method for listing
	certificates.  Instead, get a list of slots, and a list of
	certificates for each slot.  This fixes a problem with pkinit not
	allowing one to renew credentials after a kdestroy or expiry.

2006-10-30 nalin
	* src/certs.c: if the certificate we get back from
	CERT_FindCertByNickname() isn't the one we wanted, log a debug message.
	From Jeff Moyer.
	* backport/krb5-1.5.1-pal-18695.patch: remove
	* backport/krb5-1.5.1-pal-18750.patch: add updated
	* backport/krb5-trunk-edata.patch: add proposal for e-data changes
	* backport/krb5-trunk-free_plugin_dir_data.patch: add to fix a memleak
	* backport/krb5-trunk-module-global.patch: add to make module contexts
	shared across preauth systems.  Placeholder until Kevin's rework is
	ready.
	* backport/krb5-trunk-preauth-sort.patch: add to fix a crasher.
	* doc/openssl/make-certs.sh: add, for generating test certs without
	a full-blown CA installation.
	* src/certs.c: don't bail if we don't match the Kerberos name if we're
	also going to try to match a UPN.
	* src/pkinit.c: use a single call to find the KDC's certificate.

2006-10-30 nalin
	* src/certs.c: use the principal name templates from pkinitt, and not
	the local out-of-date-and-wrong ones, so that we properly recognize
	the value in a certificate.
	* src/pkinit.c: disable ocsp in the client by default, leaving it
	enabled by default in the KDC.  Only search for a certificate once.
	This means that we'll prefer a UPN cert over a KPN(?) cert if we
	see it first, but it cuts down on the number of prompts.
	* src/pkinitt.c: export only the one ASN.1 template.

2006-10-26 jmoyer
	* src/pkinit.c: report the error when NSS_Init() fails.

2006-10-26 nalin
	* doc/TODO: updates
	* src/bcmst.c: make the members of external_principal_identifier
	real OctetStrings and not pointers to Any.  Provide a way for
	code which creates enveloped_data to specify which bulk encryption
	algorithm we should use.
	* src/bcmsutil.c: provide -D and -R, to select the enveloped-data
	cipher.
	* src/commont.c: learn to generate/encode/use 3DES parameters (the IV).
	* src/pkinit.c: learn how to add auth_data to the list in the ticket
	provided by the KDC.
	* src/pkinitt.c: learn to encode the initial-verified authorization
	data.  Encode the authorization data when we verify a client's request,
	passing in items between the client and the end of its chain.  Get the
	bit- vs. byte-length stuff sorted out for DH keys.
	* src/oakley.c: add Oakley groups 1, 2, 5, 14, 15, 16.
	* src/pkinitt.c: default to using Oakley group 14.

2006-10-23 nalin
	* src/pkinit.c: track the client DH public key and nonce in the
	request context as well.
	* src/pkinitt.c: save the client DH public key and nonce from
	create_client_public_value.  Break KDC certificate validation into
	a shared subroutine.  Move enc-key-pack processing into a single
	function, and call it from the AS-REP verification function.  Try
	to get the client processing of a DH AS reply going.
	* src/certs.c: add OID information for dhPublicNumber and dhKeyAgreement
	* src/commont.c: add encoders/decoders for dhParameters, which might
	be what Windows expects.
	* src/pkinitt.c: follow examples more closely in calling the secret
	derivation functions.  Interpret the results of SECITEM_ItemsAreEqual
	properly, because it looks like yes, I am that dumb.
	* src/pkinit.c: be more careful about the request context pointer.
	* src/pkinitt.c: be more careful about assuming that we have access
	to the right client state.
	* src/pkinit.c: assume the module context is truly global, and use
	that so that we can access DH keying information for non-draft requests.
	* src/commont.c: add dump functions.  Add encoders/decoders for
	bit strings and integers.
	* src/pkinit.c: print the error message which goes with the return code.
	Encode the client's public value as an integer before passing it in
	for encoding as a bit string.  Catch errors decoding DH parameters
	sent by the client.  Encode the server's public value as an integer
	before passing it in for encoding as a bit string.  Return the server
	nonce iff we have a client nonce, not the other way around.  Decode
	the server's reply before using it as a public value.

2006-10-19 nalin
	* src/pkinit.c: track the client's private DH keying info in the client
	context.
	* src/pkinitt.c: add first pass at having the client supply DH
	parameters and keying data to the KDC.
	* src/commont.c: fix the template for the subject_public_key so that
	we encode it correctly.
	* src/pkinit.c: debug log when we save DH-related information in the
	server verify callback.
	* src/pkinitt.c: make the client's public key info in the auth_pack
	structures opaque at this level.  Forcibly disable DH in the draft
	version -- Windows either doesn't like it at all, or just this
	implementation.  Use CKM_DH_PKCS_KEY_PAIR_GEN instead of
	CKM_X9_42_DH_KEY_PAIR_GEN for generating DH keying data.  Call
	PK11_ExtractKeyValue before PK11_GetKeyData so that we actually
	get the keying data back.
	* src/pkinitt.c: catch a problem in my implementation.

2006-10-18 nalin
	* backport/backport-errors.h: wrap definitions of errors in #ifndef
	* src/commont.c: remove duplicate "j" reference in the template for
	domain parameters.  Add encode/decode function for domain_parameter
	structures.  Add common_make_random_item() for generating DH nonces.
	* src/pkinitt.c: correct the offset of client_public_value in the
	template for auth_pack.  Change client_dh_nonce in auth_pack to a
	pointer.  Change server_dh_nonce in dh_rep_info to a pointer.  Move
	create_auth_pack and create_draft_auth_pack to the right namespace.
	Teach pkinit_octet_string_to_aeskey() about the client and server
	nonces.  Flesh out pkinit_build_dh_key_info() implementation.

2006-10-16 nalin
	* src/pkinit.c(server_return): don't crash if the client didn't provide
	subject_public_key_info.

2006-10-16 nalin
	* src/pkinitt.c(kerberos_time_from_time): factor this out.

2006-10-16 nalin
	* src/bcmst.c(bcms_create_signed_data): the encapsulated content OID
	can be const.
	* src/commont.c: add encode/decode functions for subject_public_key_info
	* src/pkinit.c: store the pkauthenticator nonce, a re-encoded copy of
	the client's DH subject_public_key_info, and the DH nonce in the server-
	side context.
	* src/pkinitt.c: add encode/decode functions for kdc_dh_key_info.  Save
	the nonces and DH info when verifying a client AS_REQ, and if we have
	them when we go to create an AS_REQ, try to use DH first, failing
	miserably (for now).

2006-10-16 nalin
	* configure.ac: adjust status output to note that support != 1 header.
	* doc/README: don't use me as an example
	* src/certs.c(oid_pkinit_dhkey_data,oid_pkinit_dhkey,
	cert_get_oid_pkinit_dhkey_data): add.
	* commont.c: add templates and definitions for validation_parms and
	domain_parameters
	* pkinitt.c: add templates and definitions for kdc_dh_key_info.  The
	server_dh_nonce isn't ANY, it's an OctetString.  Add an AES-specific
	pkinit_octet_string_to_aeskey() for converting a DH key to an AES key.

2006-10-13 nalin
	* backport/krb5-1.5.1-pal-18687.patch: remove.
	* backport/krb5-1.5.1-pal-18695.patch: add.
	* src/pkinit.c: update for changes in trunk version of module interface.
	* backport/krb5/preauth_plugin.h: update to latest from trunk.
	* Makefile.am: add backport/backport-errors.h to dist files.
	* src/pkinit.c: use the right symbol names for backports.

2006-10-12 nalin
	* backport/backport-errors.h: add.
	* src/certs.c(cert_ku_matches_mask): add.
	* src/certs.c(cert_validate_kdc_certificate): return a Kerberos error
	code.
	* src/certs.c(cert_validate_client_certificate): return a Kerberos
	error code.
	* src/pkinitt.c(pkinit_verify_pa_pk_as_rep_shared): use routines in
	certs for validating the response again.

2006-09-26 nalin
	* src/pkinit.c: flag that we replace the key on reply

2006-09-21 nalin
	* src/pkinit.c: turn on OCSP checking everywhere.

2006-09-20 nalin
	* src/bcms.c, src/pkinit.c: prototype updates for current rev of the
	pal patch, which is hopefully stable now

2006-09-15 nalin
	* configure.ac,Makefile.am,po/: add the beginnings of translation
	support for our one user-visible string.
	* src/pkinit.c: pull up the maximum allowed time skew by abusing the
	get-entry-data interface.
	* doc/krb5-1.5.1-pal.patch: add a means of querying for the maximum
	clock skew -- it's not per-entry, but the get-entry-data interface
	will do fine.  Unload plugins at KDC shutdown.  Skip over client
	modules which provide a NULL client_process() callback.

2006-09-14 nalin
	* doc/README.CVS: add
	* doc/Makefile.am: add README.CVS
	* doc/krb5-1.5.1-pal.patch: remove PA_VIRTUAL -- it's way more invasive
	to get it working right in the KDC.
	Client: skip preauth modules we've used more than once, and add sorting
	of the options the server presents, subject to the
	"preferred_preauth_types" setting.  Document "preferred_preauth_types"
	in the krb5.conf man page.  Fixup definitions of PADATA_PK_AS_REP_OLD,
	PADATA_PK_AS_REQ_OLD, and their not-old counterparts to match RFC 4120.
	Add a bunch of other preauth type definitions to krb5.h.
	* configure.ac: bump to 0.0.4
	* src/pkinit.c: use symbolic names for the preauth types.  Advertise
	PADATA_PK_AS_REQ from the server, not PADATA_PK_AS_REP.  In the client,
	treat PADATA_PK_AS_REQ as an invitation to do PKINIT, and
	PADATA_PK_AS_REP as the server response.  Now that we can sort out
	the preauth type order, don't rely on claiming to be both a PA_INFO
	and a PA_REAL module to get to run first.

2006-09-13 nalin
	* src/certs.c: don't leak the user's unparsed name
	* src/pkinit.c: debug-log whether or not we got a cert value from the
	realm database

2006-09-13 nalin
	* (all files) initial check-in

Anon7 - 2021