head	1.2;
access;
symbols
	RELENG_4_11_0_RELEASE:1.1.1.2.2.2
	RELENG_4_11:1.1.1.2.2.2.0.12
	RELENG_4_11_BP:1.1.1.2.2.2
	RELENG_4_10_0_RELEASE:1.1.1.2.2.2
	RELENG_4_10:1.1.1.2.2.2.0.10
	RELENG_4_10_BP:1.1.1.2.2.2
	RELENG_5_2_1_RELEASE:1.1.1.4
	RELENG_5_2_0_RELEASE:1.1.1.4
	RELENG_5_2:1.1.1.4.0.6
	RELENG_5_2_BP:1.1.1.4
	RELENG_4_9_0_RELEASE:1.1.1.2.2.2
	RELENG_4_9:1.1.1.2.2.2.0.8
	RELENG_4_9_BP:1.1.1.2.2.2
	RELENG_5_1_0_RELEASE:1.1.1.4
	RELENG_5_1:1.1.1.4.0.4
	RELENG_5_1_BP:1.1.1.4
	RELENG_4_8_0_RELEASE:1.1.1.2.2.2
	RELENG_4_8:1.1.1.2.2.2.0.6
	RELENG_4_8_BP:1.1.1.2.2.2
	RELENG_5_0_0_RELEASE:1.1.1.4
	RELENG_5_0:1.1.1.4.0.2
	RELENG_5_0_BP:1.1.1.4
	v_0_5_1:1.1.1.4
	RELENG_4_7_0_RELEASE:1.1.1.2.2.2
	RELENG_4_7:1.1.1.2.2.2.0.4
	RELENG_4_7_BP:1.1.1.2.2.2
	cvs_20020916:1.1.1.4
	cvs_20020829:1.1.1.4
	RELENG_4_6_2_RELEASE:1.1.1.2.2.2
	RELENG_4_6_1_RELEASE:1.1.1.2.2.2
	RELENG_4_6_0_RELEASE:1.1.1.2.2.2
	RELENG_4_6:1.1.1.2.2.2.0.2
	RELENG_4_6_BP:1.1.1.2.2.2
	cvs_20020217:1.1.1.4
	RELENG_4_5_0_RELEASE:1.1.1.2.2.1
	RELENG_4_5:1.1.1.2.2.1.0.6
	RELENG_4_5_BP:1.1.1.2.2.1
	RELENG_4_4_0_RELEASE:1.1.1.2.2.1
	RELENG_4_4:1.1.1.2.2.1.0.4
	RELENG_4_4_BP:1.1.1.2.2.1
	v_0_3_f:1.1.1.3
	RELENG_4_3_0_RELEASE:1.1.1.2.2.1
	RELENG_4_3:1.1.1.2.2.1.0.2
	RELENG_4_3_BP:1.1.1.2.2.1
	v_0_3_e:1.1.1.3
	RELENG_4_2_0_RELEASE:1.1.1.2
	RELENG_4_1_1_RELEASE:1.1.1.2
	PRE_SMPNG:1.1.1.2
	RELENG_4_1_0_RELEASE:1.1.1.2
	RELENG_4_0_0_RELEASE:1.1.1.2
	RELENG_4:1.1.1.2.0.2
	RELENG_4_BP:1.1.1.2
	v_0_2_p:1.1.1.2
	v_0_2_o:1.1.1.2
	v_0_2_n:1.1.1.2
	v_0_2_m:1.1.1.1
	KTH:1.1.1;
locks; strict;
comment	@# @;


1.2
date	2004.04.03.21.31.06;	author nectar;	state dead;
branches;
next	1.1;

1.1
date	2000.01.09.20.57.24;	author markm;	state Exp;
branches
	1.1.1.1;
next	;

1.1.1.1
date	2000.01.09.20.57.24;	author markm;	state Exp;
branches;
next	1.1.1.2;

1.1.1.2
date	2000.02.24.11.00.15;	author markm;	state Exp;
branches
	1.1.1.2.2.1;
next	1.1.1.3;

1.1.1.3
date	2001.02.13.16.44.01;	author assar;	state Exp;
branches;
next	1.1.1.4;

1.1.1.4
date	2002.02.19.15.45.48;	author nectar;	state Exp;
branches;
next	1.1.1.5;

1.1.1.5
date	2005.02.24.22.13.45;	author nectar;	state dead;
branches;
next	;

1.1.1.2.2.1
date	2001.03.04.13.28.57;	author markm;	state Exp;
branches;
next	1.1.1.2.2.2;

1.1.1.2.2.2
date	2002.04.30.14.48.03;	author nectar;	state Exp;
branches;
next	;


desc
@@


1.2
log
@Resolve conflicts after import of Heimdal 0.6.1.
@
text
@-*- indented-text -*-

$Id: TODO,v 1.39 1999/12/05 01:08:19 assar Exp $

* configure

use more careful checking before starting to use berkeley db.  it only
makes sense to do so if we have the appropriate library and the header
file.

* appl

more programs here

** appl/login

/etc/environment etc.

** appl/popper

Implement RFC1731 and 1734, pop over GSS-API

** appl/test

should test more stuff

** appl/rsh

add rcp program

** appl/ftp

* doc

there's some room for improvement here.

* kdc

* kadmin

is in need of a major cleanup

* lib

** lib/asn1

prepend a prefix on all generated symbols

make asn1_compile use enum types where applicable

** lib/auth

PAM

** lib/des

** lib/gssapi

process_context_token, display_status, add_cred, inquire_cred_by_mech,
export_sec_context, import_sec_context, inquire_names_for_mech, and
inquire_mechs_for_name not implemented.

only DES MAC MD5 and DES implemented.

set minor_status in all functions

init_sec_context: `initiator_cred_handle' and `time_req' ignored.

input channel bindings are not supported

delegation not implemented

anonymous credentials not implemented

** lib/hdb

** lib/kadm5

add policies?

fix to use rpc?

** lib/krb5

the replay cache is, in its current state, not very useful

the following encryption types have been implemented: DES-CBC-CRC,
DES-CBC-MD4, DES-CBC-MD5, DES3-CBC-MD5, DES3-CBC-SHA1

supports the following checksums: CRC32, RSA-MD4, RSA-MD5,
RSA-MD4-DES, RSA-MD5-DES, RSA-MD5-DES3, SHA1, HMAC-SHA1-DES3

always generates a new subkey in an authenticator

should the sequence numbers be XORed?

fix pre-authentication with pa-afs3-salt

OTP?

** lib/roken

** lib/sl
@


1.1
log
@Initial revision
@
text
@@


1.1.1.1
log
@Import KTH Heimdal, which will be the core of our Kerberos5.
Userland to follow.
@
text
@@


1.1.1.2
log
@Vendor import of Heimdal 0.2n
@
text
@d3 1
a3 1
$Id: TODO,v 1.40 2000/01/28 04:10:56 assar Exp $
a83 4

rewrite the lookup of KDCs to handle kerberos-<n> and not do any DNS
requests if the information can be found locally.  this requires stop
using krb5_get_krbhst.
@


1.1.1.2.2.1
log
@MFC: Heimdal 0.3e (MIT mucho-compatible) upgrade.
@
text
@d3 1
a3 1
$Id: TODO,v 1.55 2001/01/30 22:51:32 assar Exp $
d11 3
a13 1
handle readline hiding in readline/readline.h
d15 3
a17 1
* appl
d23 10
d35 2
a40 2
make it happy with reading and parsing kdc.conf

a42 4
* kpasswdd

figure out what's the deal with do_sequence and the MIT client

d49 2
a54 4
** lib/com_err

write a man-page

a56 2
make everything work with openssl and make prototypes compatible

d59 2
a60 2
process_context_token, add_cred, inquire_cred_by_mech,
inquire_names_for_mech, and
d63 2
d67 6
a74 2
add rc4

d91 6
d101 2
d105 1
a105 4
make checksum/encryption type configuration more realm-specific.  make
some simple way of handling the w2k situtation

crypto: allow scather/gather creation of checksums
d107 1
a107 1
** lib/roken
@


1.1.1.2.2.2
log
@MFC: Update Heimdal Kerberos to 0.4e around 2002/02/17.
@
text
@d3 1
a3 1
$Id: TODO,v 1.66 2001/08/09 08:43:42 assar Exp $
d7 4
a40 2
** lib/auth/sia

d73 4
d79 4
d88 1
a88 6
crypto: allow scatter/gather creation of checksums

verify_user: handle non-secure verification failing because of
host->realm mapping

config_file: do it in case-sensitive and/or insensitive
@


1.1.1.3
log
@import of heimdal 0.3e
@
text
@d3 1
a3 1
$Id: TODO,v 1.55 2001/01/30 22:51:32 assar Exp $
d11 3
a13 1
handle readline hiding in readline/readline.h
d15 3
a17 1
* appl
d23 10
d35 2
a40 2
make it happy with reading and parsing kdc.conf

a42 4
* kpasswdd

figure out what's the deal with do_sequence and the MIT client

d49 2
a54 4
** lib/com_err

write a man-page

a56 2
make everything work with openssl and make prototypes compatible

d59 2
a60 2
process_context_token, add_cred, inquire_cred_by_mech,
inquire_names_for_mech, and
d63 2
d67 6
a74 2
add rc4

d91 6
d101 2
d105 1
a105 4
make checksum/encryption type configuration more realm-specific.  make
some simple way of handling the w2k situtation

crypto: allow scather/gather creation of checksums
d107 1
a107 1
** lib/roken
@


1.1.1.4
log
@Import of Heimdal Kerberos from KTH repository circa 2002/02/17.
@
text
@d3 1
a3 1
$Id: TODO,v 1.66 2001/08/09 08:43:42 assar Exp $
d7 4
a40 2
** lib/auth/sia

d73 4
d79 4
d88 1
a88 6
crypto: allow scatter/gather creation of checksums

verify_user: handle non-secure verification failing because of
host->realm mapping

config_file: do it in case-sensitive and/or insensitive
@


1.1.1.5
log
@Clean up the Heimdal vendor branch by removing files not included in
any import for several years.

If memory serves, this was
Suggested by:	ru
an awfully long time ago-- sorry for the delay!
@
text
@@


