Age | Commit message (Collapse) | Author | Files | Lines |
|
6886774 pam_krb5 PKINIT support
|
|
6724557 Potential for a memory leak in krb5_setcred's krb5_renew_tgt routine
6691206 pam_krb5's store_cred should always store new credentials if a previous auth pass was successful
6752096 krb5_renew_tgt incorrectly tests for the value of char *filepath
|
|
6497698 krb5kdc(1) should also provide password expiration information
6497703 pam_krb5(5) should interpret the key expiration field to display expiration warning information
6514446 pam_dhkeys prompts for secure RPC password when neither LOCAL or DES credentials exist
6515558 Pre-s10 client's keytab file are generated incorrectly when auth princ == target princ
6523684 Memory rcache function doesn't acquire the right locks
|
|
6430941 pam_krb5 pam_sm_setcred can cause /tmp/krb5cc_<PAM_USER> to be owned by euid rather than PAM_USER
6484675 pam_krb5(5) needs some cleanup
6499804 pam_krb5 account management should not return success if user is not defined in kerberos realm
6507080 autofs no longer passing credential information in upcalls
|
|
|