summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2010-07-31s4:librpc/rpc: use the correct ndr flags in dcerpc_ndr_validate_in()Stefan Metzmacher1-0/+16
metze
2010-07-31s3-printing: remove unused get_local_printer_publishing_data() call.Günther Deschner1-14/+0
Guenther
2010-07-31s3-build: avoid to globally include printing and spoolss headers.Günther Deschner17-10/+20
This shrinks precompiled headers by 3MB and will slightly speed up any build. Guenther
2010-07-30cleanups: Trailing spaces, line length, etc...Simo Sorce1-111/+163
2010-07-30s3-dcerpc: Use dcerpc_guess_sizes in the server code too.Simo Sorce1-95/+38
2010-07-30s3-dceprc: Improve dcerpc_guess_sizes() interfaceSimo Sorce3-20/+30
Make it possible to pass in the NDR padding size so that theoretically client and server code can decide to use a different alignment. Pass in the header length as a parameter so that this function can be used for different type of packets. Make sure padding size will not make the fragment exceed the maximum length. Calculate padding taking in account the header length.
2010-07-30s3-dcerpc: rationalize packet creation in the server codeSimo Sorce2-86/+86
Move all related functions into create_next_packet, but make it transport neutral (not pass in pipse_struct)
2010-07-30s3-dcerpc: Make function to guess pdu sizes common.Simo Sorce3-112/+130
2010-07-30s3-dceprc: consolidate use of dcerpc_push_dcerpc_auth()Simo Sorce1-76/+31
2010-07-30s3-dcerpc: Remove unused functionsSimo Sorce1-166/+0
2010-07-30s3-dcerpc: use common spengo wrapper code for client SPNEGO/NTLMSSPSimo Sorce5-162/+321
2010-07-30s3-dcerpc: add sign/seal support when using SPNEGO/KRB5Simo Sorce4-87/+235
2010-07-30s3-dcerpc: Add SPNEGO incapsulation for KRB5 authSimo Sorce7-31/+454
2010-07-30rpcclient: Use DCERPC_AUTH_LEVEL_CONNECT if no sign/seal is set for ntlmsspSimo Sorce1-0/+6
2010-07-30s3: Remove "cli" from "struct finfo"Volker Lendecke5-22/+31
2010-07-30s4-smbtorture: remove ifdefed symlink test, this is already skipped internallyGünther Deschner1-2/+0
in the s3 case. Guenther
2010-07-30Revert "s4-torture: Disable setting REG_BINARY printer data with size 0."Günther Deschner1-4/+0
This reverts commit 104c419345a42a9a02ae25df482f449dc41a6380.
2010-07-29We should be using the winbindd separator in this case, not hardcoding a \\ ↵Jeremy Allison1-1/+3
value. Jeremy.
2010-07-29s3: Do the ftruncate write cache optimization in one placeVolker Lendecke1-0/+31
Instead of hand-tuning all the cases that are below this piece of code, this is a general case that we can catch upfront.
2010-07-29Revert "s3: Avoid pwrite calls for the 1-byte writes with zero content"Volker Lendecke1-50/+4
This reverts commit 6763730304627a58139450fd3e03a0ce48e31bb9.
2010-07-29s3: Avoid an unnecessary ftruncate callVolker Lendecke1-1/+1
If we just created the file, it has length 0 by definition. This is still done while holding the share mode lock, so no race around wrt other cifs clients.
2010-07-29Fix bug #7589 - ntlm_auth fails to use cached credentials.Jeremy Allison1-7/+5
In handling the WINBINDD_PAM_AUTH message winbindd canonicalizes a *copy* of the mapped username, but fails to canonicalize the actual username sent to the backend domain process. When "winbind default domain" is set this can lead to credentials being cached with an index of user: user, not DOMAIN\user. All other code paths that use canonicalize_username() (WINBINDD_PAM_CHAUTHTOK, WINBINDD_PAM_LOGOFF) correctly canonicalize the data sent to the backend. All calls the can cause credentials to be looked up (PAM_CHAUTHTOK etc.) correctly call canonicalize_username() to create the credential lookup key. Jeremy.
2010-07-29s3-spoolss: Increased debug level for trace output.Andreas Schneider1-1/+2
2010-07-29s3-spoolss: Fixed debug statements and increased level.Andreas Schneider1-4/+4
2010-07-29Fix tdb_check() to work with read-only tdb databases. The function ↵Jeremy Allison1-3/+3
tdb_lockall() uses F_WRLCK internally, which doesn't work on a fd opened with O_RDONLY. Use tdb_lockall_read() instead. Jeremy.
2010-07-29s4-test: Expand DSSYNC test to be executed against all partitionsKamen Mazdrashki1-17/+49
It is still possible to supply specific partition to test with on command line using --option="dssync:partition={PARTITION_DN}"
2010-07-29s4-test-dssync: Issue warning in case we have diffrences in link attributesKamen Mazdrashki1-4/+33
In case differences in messages are: 1. Attributes with different values, i.e. 'replace' 2. Those attributes are back-link attributes then we just warn about those differences. It turns out windows doesn't send all values for back-link attributes in replicated_object but in linked_attributes. I consider this as workaround for the problem. A better solution might be to merge linked_attribute values into replacted_objects before comparing those with LDB result (although this will work for Win2k8 and latter)
2010-07-29s4-test: Simplify test_GetInfo() - we have what we need through LDB connectionKamen Mazdrashki1-79/+12
we have already opened. Added 'config_dn' and 'schema_dn' members which are to be used later for extending the test_FetchData() to be executed against every partition in case partition is not specified explicitly. DsSyncText.site_name was removed also as it is not used anymore
2010-07-29s4-ldb: use TALLOC_CTX type instead of 'void'Kamen Mazdrashki9-49/+49
2010-07-28s3-dcerpc: Try to fix build when gssapi_ext.h is not availableSimo Sorce1-43/+39
2010-07-28Do not refernece pipe_auth_data directly in dcerpc_gssapi.cSimo Sorce3-45/+55
2010-07-28s3-dcerpc: Avoid ifdef, it is handled within dcerpc_gssapi.c alreadySimo Sorce1-7/+2
2010-07-28s3: Fix cli_qpathinfo2Volker Lendecke1-1/+1
Does not fix the DIR_CREATETIME test, but it is definitely an error.
2010-07-28smbd: Fix build warningSimo Sorce1-1/+1
2010-07-28s3-dcerpc: Add sign/seal with gssapiSimo Sorce5-7/+332
2010-07-28s3-dcerpc: Add next authentication step with gssapiSimo Sorce3-6/+102
2010-07-28s3-decrpc: Introduce gssapi support for dcerpc krb5 authSimo Sorce5-129/+487
2010-07-28rpcclient: Use DCERPC_AUTH_LEVEL_CONNECT if no sign/seal is set for krb5 authSimo Sorce1-0/+6
2010-07-28s3-dcerpc: Refactor calculate_data_len_tosend()Simo Sorce1-25/+31
2010-07-28s3-dcerpc: Add auth trailer only when appropriate.Simo Sorce1-4/+16
2010-07-28s3-dcerpc: consolidate unmarshalling of dcerpc_authSimo Sorce1-72/+72
2010-07-28s3-dcerpc: revive cli_rpc_pipe_open_krb5()Simo Sorce3-1/+12
2010-07-28misc: Remove unused structure elementsSimo Sorce1-6/+0
2010-07-28s3-rpcclient: Allow choosing spnego mech: (ntlm/krb5)Simo Sorce1-3/+10
2010-07-28s3-dcerpc: Use dcerpc_AuthType in pipe_auth_dataSimo Sorce11-215/+262
2010-07-28s3-dcerpc: Cleanup and refactor create_rpc_bind_req()Simo Sorce1-34/+40
2010-07-28s3-auth: Remove unimplemented functionsSimo Sorce2-12/+0
2010-07-28s3-dcerpc: Set flags directly instead of calling unimplemented functions.Simo Sorce1-4/+19
2010-07-28s3-dcerpc: Use dcerpc_check_auth in client code tooSimo Sorce1-343/+18
2010-07-28s3-dcerpc: Make dcerpc_check_auth() common codeSimo Sorce3-160/+178