summaryrefslogtreecommitdiff
path: root/src/util
AgeCommit message (Collapse)AuthorFilesLines
2012-10-02remove left over principal selectionPavel Březina2-106/+0
https://fedorahosted.org/sssd/ticket/1303 Domain start up was taking too long when there are many principals in a kerberos keytab. We were looking up in the keytab two times. The first time we try to select a proper principal and remember it. The second call happens almost right after the first one and it is just a check if the principal exists in the keytab, without any output information other than success/failure. It is probably a left over from https://fedorahosted.org/sssd/ticket/781. This patch removes the second call.
2012-10-02monitor: create pid file after all responders are startedPavel Březina1-0/+1
https://fedorahosted.org/sssd/ticket/1357
2012-10-01Use flat name for master domain as wellSumit Bose1-1/+2
2012-10-01Add new option default_domain_suffixSumit Bose1-11/+41
2012-09-24sss_cache tool invalidates records in memory cache.Michal Zidek1-0/+2
2012-09-20Add provider specific default regular expressionsSumit Bose1-0/+62
Fixes https://fedorahosted.org/sssd/ticket/1524
2012-09-07Out-of-bounds read fix in hmac-sha-1Ondrej Kos1-1/+3
2012-09-04Check flat names when searching for sub-domains as wellSumit Bose1-1/+3
2012-09-04SSH: Add support for OpenSSH-style public keysJan Cholasta1-13/+37
2012-09-04SSH: Simplify public key formatting functionJan Cholasta2-40/+9
2012-09-04SSH: Return error code in SSH utility functionsJan Cholasta2-17/+40
2012-08-23Fix: IPv6 address with square brackets doesn't work.Michal Zidek2-0/+32
https://fedorahosted.org/sssd/ticket/1365
2012-08-23Consolidation of functions that make realm upper-caseOndrej Kos2-0/+24
2012-08-21Unbreak build on RHEL5: replace ldap_destroy() with ldap_unbind_ext()Pavel Březina1-1/+1
ldap_destroy() is not present in RHEL5
2012-08-21Close LDAP connection when unable to install TLSPavel Březina1-13/+13
We were not closing LDAP connection when using SSL with invalid certificate. https://fedorahosted.org/sssd/ticket/1490
2012-08-16Fix compilation error in Python murmurhash bindingsJakub Hrozek1-0/+2
The compilation produced an error due to missing declaration of uint32_t and a couple of warnings caused by different prototypes of argument parsing functions in older Python releases.
2012-07-23Extend category support in SELinux user mapsJan Zeleny1-6/+24
This patch adds the possibility for user/host category attributes to have more than one value. It also fixes semantically wrong evaluation of SELinux map priority.
2012-07-23Added some DEBUG statements into SELinux related codeJan Zeleny1-4/+24
2012-07-18Modify priority evaluation in SELinux user mapsJan Zeleny2-6/+45
The functionality now is following: When rule is being matched, its priority is determined as a combination of user and host specificity (host taking preference). After the rule is matched in provider, only its host priority is stored in sysdb for later usage. When rules are matched in the responder, their user priority is determined. After that their host priority is retrieved directly from sysdb and sum of both priorities is user to determine whether to use that rule or not. If more rules have the same priority, the order given in IPA config is used. https://fedorahosted.org/sssd/ticket/1360 https://fedorahosted.org/sssd/ticket/1395
2012-07-09Check for errors from krb5_unparse_nameStephen Gallagher1-1/+8
Coverity #12781
2012-07-06Revert commit 4c157ecedd52602f75574605ef48d0c48e9bfbe8Stef Walter2-151/+0
* This broke corner cases when used with default_tkt_types = des-cbc-crc and DES enabled on an AD domain. * This is fixed in kerberos instead, in a more correct way and in a way which we cannot replicate.
2012-06-29DEBUG: Log to syslog if we are unable to open a debug fdStephen Gallagher1-0/+5
2012-06-26libcrypto fully implementedGeorge McCollister4-9/+442
Implemented working versions of the following functions for libcrypto: sss_base64_encode sss_base64_decode sss_hmac_sha1 sss_password_encrypt sss_password_decrypt test_encrypt_decrypt now expects EOK from libcrypto. test_hmac_sha1 now expects EOK from libcrypto. Added test_base64_encode to test base64 encoding implementation. Added test_base64_decode to test base64 decoding implementation. Signed-off-by: George McCollister <George.McCollister@gmail.com>
2012-06-21Fix re_expression matching with subdomainsJan Zeleny1-15/+19
This patch fixes an issue which resulted in a need to initialize responder with data from local domain, otherwise it would not correctly detect requests for subdomains. Similar situation can occur if new subdomain is added at runtime. The solution is to ask for a list of subdomains in case there is a candidate domain identified in the process of matching re_expressions with given name.
2012-06-21UTILS: Fix segfault due to sss_parse_name_for_domainsStephen Gallagher1-7/+10
The recent fixes for per-domain parsing can cause a segfault in the netgroup processing if the domain isn't set to NULL when it's parsed as "any domain". https://fedorahosted.org/sssd/ticket/1383
2012-06-20Move some debug lines to new debug log levelsStef Walter2-5/+5
* These are common lines of debug output when starting up sssd https://bugzilla.redhat.com/show_bug.cgi?id=811113
2012-06-18Fix typo breaking DIR cache detectionStephen Gallagher1-2/+0
2012-06-15KRB5: Auto-detect DIR cache support in configureStephen Gallagher2-2/+18
We can't support the DIR cache features in systems with kerberos libraries older than 1.10. Make sure we don't build it on those systems.
2012-06-15Fix compilation on older little-endian systemsStephen Gallagher1-1/+2
2012-06-14Use Kerberos context in KRB5_DEBUGJakub Hrozek1-0/+8
Passing Kerberos context to sss_krb5_get_error_message will allow us to get better error messages.
2012-06-14Add support for storing credential caches in the DIR: back endJakub Hrozek2-20/+4
https://fedorahosted.org/sssd/ticket/974
2012-06-14Residual util functionsJakub Hrozek2-0/+102
Kerberos credential caches can be specified by TYPE:RESIDUAL. This patch adds a couple of utilities to support parsing if ccache locations, checking types etc.
2012-06-13sss_names_init: Report correct error code if allocation failedJakub Hrozek1-1/+4
2012-06-12Make re_expression and full_name_format per domain optionsStef Walter3-7/+140
* Allows different user/domain qualified names for different domains. For example Domain\User or user@domain. * The global re_expression and full_name_format options remain as defaults for the domains. * Subdomains get the re_expression and full_name_format of their parent domain. https://bugzilla.redhat.com/show_bug.cgi?id=811663
2012-05-22KRB5: Avoid NULL-dereference with empty keytabStephen Gallagher1-7/+13
https://fedorahosted.org/sssd/ticket/1330
2012-05-22Simple implementation of Netscape password warning expiration controlJoshua Roys1-0/+8
2012-05-07Limit krb5_get_init_creds_keytab() to etypes in keytabStef Walter2-0/+145
* Load the enctypes for the keys in the keytab and pass them to krb5_get_init_creds_keytab(). * This fixes the problem where the server offers a enctype that krb5 supports, but we don't have a key for in the keytab. https://bugzilla.redhat.com/show_bug.cgi?id=811375
2012-05-07Remove erroneous failure message in find_principal_in_keytabStef Walter1-1/+1
* When it's actually a failure, then the callers will print a message. Fine tune this.
2012-05-04Modify behavior of pam_pwd_expiration_warningJan Zeleny2-0/+6
New option pwd_expiration_warning is introduced which can be set per domain and can override the value specified by the original pam_pwd_expiration_warning. If the value of expiration warning is set to zero, the filter isn't apllied at all - if backend server returns the warning, it will be automatically displayed. Default value for Kerberos: 7 days Default value for LDAP: don't apply the filter Technical note: default value when creating the domain is -1. This is important so we can distinguish between "no value set" and 0. Without this possibility it would be impossible to set different values for LDAP and Kerberos provider.
2012-05-04Fix endian issue in SID conversionSumit Bose1-0/+2
Since the byte-order is only important when dealing with the binary SID the sub-auth values are stored in host order and are only converted while reading or writing the binary SID.
2012-05-02Handle endianness issues on older systemsStephen Gallagher1-0/+17
Older versions of glibc (like that on RHEL 5) do not have the le32toh() function exposed. We need this for handling the Active Directory ID-mapping, so we'll copy these macros from endian.h on a newer glibc.
2012-05-02SERVER: use the correct return code of sss_atomic_write_sJakub Hrozek1-1/+1
2012-05-01execv, excvp and exec_child never return EOKStef Walter2-8/+5
* So don't need to handle that case
2012-04-24murmurhash: Relax inline requirementStephen Gallagher1-2/+2
2012-04-24Two fixes in responder subdomain codeJan Zeleny1-1/+1
2012-04-24SSH: Add support for hashed known_hostsJan Cholasta2-3/+9
https://fedorahosted.org/sssd/ticket/1203
2012-04-24UTIL: Add HMAC-SHA-1 functionJan Cholasta3-0/+127
2012-04-24Moved expand_homedir_template() from NSS responder to utility codeJan Zeleny2-0/+167
2012-04-24New config option for subdomainsJan Zeleny1-0/+2
subdomain_homedir - if set, it contains default value, can be overriden in further processing
2012-04-24Add conn_name to allow different names for domains and connectionsJan Zeleny1-2/+2