summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2010-08-12s3:rpc_server: add rpc_pipe_open_internal dcerpc_binding_handle backendStefan Metzmacher1-0/+272
metze
2010-08-12s3:rpc_client: add dcerpc_binding_handle backendStefan Metzmacher4-0/+376
metze
2010-08-12s4:librpc/rpc: make struct dcerpc_binding_handle privateStefan Metzmacher2-10/+9
metze
2010-08-12pidl:Samba4/NDR/Client: add sync dcerpc_pipe based stubs as compat for ↵Stefan Metzmacher1-0/+60
OpenChange This will activate the compat wrappers for all functions of an interface: #define DCERPC_IFACE_MYPROTO_COMPAT 1 #include <ndr_myproto_c.h> This will activates the compat wrappers just for specific functions: #define DCERPC_CALL_MYFN1_COMPAT 1 #define DCERPC_CALL_MYFN2_COMPAT 1 #include <ndr_myproto_c.h> metze
2010-08-12pidl:Samba4/NDR/Client: add non struct base dcerpc_binding_handle client stubsStefan Metzmacher1-2/+460
metze
2010-08-12pidl:Samba4/NDR/Client: convert code to $self->pidl()Stefan Metzmacher2-163/+192
metze
2010-08-12pidl:Samba4/NDR/Client: s/interface/if/Stefan Metzmacher1-22/+22
metze
2010-08-12pidl:Samba4/NDR/Client: make use of the new dcerpc_binding_handle_call() ↵Stefan Metzmacher1-94/+15
infrastructure metze
2010-08-12pidl:Samba4/NDR/Client: remove old dcerpc_pipe based sync stubsStefan Metzmacher1-42/+0
They're unused in Samba and only used by OpenChange. I'll add a compat functions for OpenChange later. metze
2010-08-12s4:librpc/rpc: add dcerpc_binding_handle dcerpc_pipe backendStefan Metzmacher3-4/+411
metze
2010-08-12librpc/rpc: add dcerpc_binding_handle abstrationStefan Metzmacher3-3/+588
metze
2010-08-12s4:librpc/rpc: fix dcerpc_log_packet() prototypeStefan Metzmacher2-6/+6
metze
2010-08-12s4:librpc/rpc: autodetect the need of async call logicStefan Metzmacher2-8/+6
metze
2010-08-12pidl:Samba3/ClientNDR: ignore "todo" functionsStefan Metzmacher1-3/+4
metze
2010-08-12testprogs/midltests: add some example IDL files and there midltests.exe outputStefan Metzmacher11-1/+221
metze
2010-08-12s3: Reduce the load on the echo handlerVolker Lendecke1-0/+2
If the parent is fast enough, the echo handler should not step in. When the socket becomes readable, the echo handler goes to sleep for a second. If within that second, the parent has picked up the SMB request from the net, the echo handler will just go back to select().
2010-08-12s3: Slightly simplify the logic in smbd_server_echo_handlerVolker Lendecke1-1/+4
2010-08-12s3: Slightly simplify the logic in smbd_server_connection_handlerVolker Lendecke1-1/+4
2010-08-12s3: ?true:false is a *bit* pointless :-)Volker Lendecke1-1/+1
2010-08-12Fix a typoVolker Lendecke1-1/+1
2010-08-11smbtorture: Don't crash RAW-QFILEINFO if there's no alternate name.James Peach1-0/+5
2010-08-11smbtorture: Make BASE-OPENATTR report a failure if it fails.James Peach1-2/+4
2010-08-11s3-waf: fix the waf build with more recent MIT krb5 libs.Günther Deschner2-1/+4
(such as MIT krb5 1.7.1 on fedora 13). This whole area needs more work and love later, for now it builds at least. Kai, please check. Guenther
2010-08-11s4-test: Implement DRS-RPC-msDSIntId test caseKamen Mazdrashki4-1/+647
2010-08-11s4-dsdb: fix attributes_by_msDS_IntId index sortingKamen Mazdrashki1-1/+5
2010-08-11s4-test: Move dsdb_schema loading into public functionKamen Mazdrashki2-60/+96
I will use this function for tests implementation later
2010-08-11s4-test: Move RPC-DSSYNC test in DRS-RPC test suiteKamen Mazdrashki5-4/+5
2010-08-11s4-test: Move dssync.c to torture/drs/rpcKamen Mazdrashki1-0/+0
2010-08-11s4-test: strip trailing white-spacesKamen Mazdrashki1-21/+21
2010-08-10s4:objectclass LDB module - weak the check for the "rIDSet" delete constraintMatthias Dieter Wallnöfer1-8/+10
Perform it only when a "rIDSet" does exist. Requested by ekacnet for "upgradeprovision".
2010-08-10s4:dsdb/common/util.c - provide a call which returns the forest function levelMatthias Dieter Wallnöfer1-2/+15
Sooner or later we'll need this too since not all operations depend only on the current's domain function level (see the MS-ADTS docs).
2010-08-10libds/common/flags.h - fix a comment's typoMatthias Dieter Wallnöfer1-1/+1
2010-08-10s4:dsdb/common/util.c - use LDB constants whenever possibleMatthias Dieter Wallnöfer1-8/+8
2010-08-10libcli/auth Make the source3/ implementation of the NTLMSSP server commonAndrew Bartlett4-1047/+531
This means that the core logic (but not the initialisation) of the NTLMSSP server is in common, but uses different authentication backends. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Split the NTLMSSP server into before and after authenticationAndrew Bartlett1-62/+148
This allows for a future where the auth subsystem is async, and the session key generation needs to happen in a callback. This code is originally reworked into this style by metze for the source4/ implementation. The other change here is to introduce an 'out_mem_ctx', which makes the API match that used in source4. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Always call ntlmssp_sign_init()Andrew Bartlett1-3/+1
There is no code path that sets nt_status before this point, without a return. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't use talloc_tos() for NTLMSSP blobs for nowAndrew Bartlett1-2/+2
This code will, I hope, soon be merged in common, and the Samba4 use case does not currently support talloc_tos() properly. Use another context for now. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't permit LM_KEY in combination with NTLMv2Andrew Bartlett1-1/+4
This is another 'belts and braces' check to avoid the use of the weak 'LM_KEY' encryption when the client has chosen NTLMv2. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't reply with the LM_KEY negotiation flag when not availableAndrew Bartlett1-0/+15
This ensures the client isn't confused and we don't enter this weaker authentication scheme when we don't really, really need to. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't use the lm key if the user didn't supply one.Andrew Bartlett1-3/+3
This may help to avoid a number of possible MITM attacks where LM_KEY is spoofed into the session. If the login wasn't with lanman (and so the user chose to disclose their lanman response), don't disclose back anything based on their lanman password. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Add extra DEBUG() message for auth system failuresAndrew Bartlett1-0/+2
Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Redirect lp_lanman_auth() via 'allow_lm_key'Andrew Bartlett1-2/+4
This will allow this to be handled via common code in the future Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10libcli/auth/ntlmssp: remove outdated comment. The version flag is well ↵Günther Deschner1-2/+0
understood now. Guenther
2010-08-10s3: fix the waf build.Günther Deschner1-1/+2
Guenther
2010-08-10libcli/auth Move some source3/ NTLMSSP functions to the common code.Andrew Bartlett8-229/+128
libcli/auth Use true and false rather than True and False in common code Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-09Fix bug #7608 - Win7 SMB2 authentication causes smbd panicJeremy Allison1-2/+4
We need to call setup_ntlmssp_server_info() if status==NT_STATUS_OK, or if status is anything except NT_STATUS_MORE_PROCESSING_REQUIRED, as this can trigger map to guest. Jeremy.
2010-08-10s4 upgradeprovision, fix a typo preventing the ridset to be correctly identifiedMatthieu Patou1-1/+1
2010-08-09pidl:NDR: correctly handle no pointer bracket arrays with 'string'Stefan Metzmacher1-1/+1
metze
2010-08-09s3-winbind: Fix Bug #7568: Make sure cm_connect_lsa_tcp does not reset the ↵Günther Deschner1-7/+13
secure channel. This is an important fix as the following could and is happening: * winbind authenticates a user via schannel secured netlogon samlogonex call, current secure channel cred state is stored in winbind state, winbind sucessfully decrypts session key from the info3 * winbind sets up a new schannel ncacn_ip_tcp lsa pipe (and thereby resets the secure channel on the dc) * subsequent samlogonex calls use the new secure channel creds on the dc to encrypt info3 session key, while winbind tries to use old schannel creds for decryption Guenther
2010-08-09s4-rpc_server: Fixed the build of the dcerpc_server library.Andreas Schneider1-1/+1
Brad please check!