summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2012-05-10Fix bug 8920, null dereferenceSteve Langasek1-1/+3
Description: Avoid null dereference in initialize_password_db() When initialize_password_db() is called with reload=True, it's assumed that the free_private_data member of pdb_methods is non-null. This is not necessarily the case, as the tdb backend has no private data and therefore no free function. Check to see if we have private data that needs freed before calling. Author: Steve Langasek <steve.langasek@ubuntu.com> Bug-Ubuntu: https://bugs.launchpad.net/bugs/829221 Autobuild-User: Volker Lendecke <vl@samba.org> Autobuild-Date: Thu May 10 11:07:27 CEST 2012 on sn-devel-104
2012-05-10s3: Fix Coverity ID 242714 Uninitialized scalar variableVolker Lendecke1-1/+2
In an error path we are closing domain_handle without opening it
2012-05-10s3: Fix Coverity ID 242715 Uninitialized scalar variableVolker Lendecke1-1/+1
In an error path we are closing hive_hnd without opening it
2012-05-10s3: Fix Coverity ID 242716 Uninitialized scalar variableVolker Lendecke1-1/+2
In an error path we are closing key_hnd without opening it
2012-05-10s3: Fix Coverity ID 242717 Uninitialized scalar variableVolker Lendecke1-1/+2
In an error path we are closing domain_pol without opening it
2012-05-10s3: Fix Coverity ID 242718 Uninitialized scalar variableVolker Lendecke1-1/+2
In an error path we are closing user_pol without opening it
2012-05-10s3: Fix Coverity ID 242719 Uninitialized scalar variableVolker Lendecke1-1/+2
In an error path we are closing domain_pol without opening it
2012-05-10s3: Fix Coverity ID 242720 Uninitialized scalar variableVolker Lendecke1-1/+2
In an error path we are closing domain_pol without opening it
2012-05-10s3: Fix Coverity ID 242721 Uninitialized scalar variableVolker Lendecke1-1/+2
In an error path we are closing domain_pol without opening it
2012-05-10s3: Fix Coverity ID 242722 Uninitialized scalar variableVolker Lendecke1-1/+1
In an error path we are closing domain_handle without opening it
2012-05-10s3: Fix Coverity ID 242723 Uninitialized scalar variableVolker Lendecke1-1/+1
In an error path we are closing hnd without opening it
2012-05-10s3: Fix Coverity ID 241961 Uninitialized scalar variableVolker Lendecke1-0/+2
2012-05-10s3: Fix Coverity ID 242724 Uninitialized scalar variableVolker Lendecke1-1/+1
In an error path we are closing pol without opening it
2012-05-10s3: Fix Coverity ID 242725 Uninitialized scalar variableVolker Lendecke1-0/+1
Not a functional bug, but we copy all of the "key" structure inside dcerpc_winreg_CreateKey.
2012-05-10s3: Fix Coverity ID 242726 Uninitialized scalar variableVolker Lendecke1-1/+1
Not a functional bug, but we copy all of the "key" structure inside dcerpc_winreg_OpenKey.
2012-05-10s3: Fix Coverity ID 242754 Dereference null return valueVolker Lendecke1-1/+1
2012-05-10s3: Fix Coverity ID 242184 Dereference after null checkVolker Lendecke1-5/+3
rpc_query_user unconditionally dereferences user_info if successfull
2012-05-10s3: Fix Coverity ID 242691 Dereference before null checkVolker Lendecke1-10/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242692 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242693 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242694 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242695 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242696 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242697 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242698 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242699 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242700 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242701 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242702 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242703 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242704 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242705 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10s3: Fix Coverity ID 242706 Dereference before null checkVolker Lendecke1-9/+6
winreg_printer_openkey above already dereferences winreg_handle
2012-05-10build: Avoid printing the ABI signature normalisation during the default buildAndrew Bartlett1-1/+1
This appears to have been accidentily left in acd63fdb86769ff4328ccb6a4096181e65e4d30f Andrew Bartlett Autobuild-User: Andrew Bartlett <abartlet@samba.org> Autobuild-Date: Thu May 10 09:00:20 CEST 2012 on sn-devel-104
2012-05-10When listing group members allow fallback to cn attribute when ↵Lukasz Zalewski1-2/+5
samAccountName is not available
2012-05-10build:ignore solaris _GLOBAL_OFFSET_TABLE_ in duplicate symbol checkerAndrew Bartlett1-0/+2
2012-05-09s3:auth/server_info: the primary rid should be in the groups rid array (bug ↵Alejandro Escanero Blanco1-5/+0
#8798) Signed-off-by: Stefan Metzmacher <metze@samba.org> Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed May 9 19:36:01 CEST 2012 on sn-devel-104
2012-05-09allow to use system iniparser library.Günther Deschner7-10/+31
Guenther Autobuild-User: Günther Deschner <gd@samba.org> Autobuild-Date: Wed May 9 17:38:33 CEST 2012 on sn-devel-104
2012-05-09waf: remove pointless WINBIND_KRB5_LOCATOR env.Günther Deschner1-3/+0
Guenther Autobuild-User: Günther Deschner <gd@samba.org> Autobuild-Date: Wed May 9 15:16:34 CEST 2012 on sn-devel-104
2012-05-09s3-smbd: Fix the creation of duplicate SMB_ACL_GROUP entriesAndrew Bartlett1-2/+2
The issue was a simple copy and paste bug, which casued a duplicate SMB_ACL_GROUP to be added when we already had one. Andrew Bartlett Signed-off-by: Jeremy Allison <jra@samba.org> Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Wed May 9 13:17:29 CEST 2012 on sn-devel-104
2012-05-09s3-spoolss: Set DWORD values correctly.Andreas Schneider1-9/+9
Autobuild-User: Andreas Schneider <asn@cryptomilk.org> Autobuild-Date: Wed May 9 11:13:00 CEST 2012 on sn-devel-104
2012-05-09s3-lib/sysacls: Do not include an embedded \0 between ACL entries in ↵Andrew Bartlett1-2/+3
sys_acl_to_text() This makes it possible to print the entire string again. Andrew Bartlett Autobuild-User: Andrew Bartlett <abartlet@samba.org> Autobuild-Date: Wed May 9 06:07:06 CEST 2012 on sn-devel-104
2012-05-09s3-lib: Add const to sys_acl_to_textAndrew Bartlett2-2/+2
2012-05-09s3-vfs: Show the invalid ACL when we say it is invalid for setAndrew Bartlett1-2/+4
2012-05-09s3-lib: Fix indentation in sys_acl_to_text()Andrew Bartlett1-2/+2
2012-05-09Revert "selftest: mark ^samba4.raw.context.session1 as flapping, the test ↵Stefan Metzmacher1-1/+0
was wrong" This reverts commit 794a9da38fbd88eb3d358d453cc5d21998604caa. The test is fixed now. metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed May 9 02:53:24 CEST 2012 on sn-devel-104
2012-05-09s4:smb_server/smb: only create a new session with vuid == 0Stefan Metzmacher3-9/+17
metze
2012-05-09s4:torture/raw/context: test a session setup with a given invalid vuidStefan Metzmacher1-17/+29
On a session setup with EXTENDED_SECURITY we'll get ERRSRV:ERRbaduid, while a session setup without EXTENDED_SECURITY ignores the given vuid. Before this test was doing a reauth of a given vuid, which works for newer Windows versions, but Windows 2000 gives INVALID_PARAMETER. metze
2012-05-09selftest: mark ^samba4.raw.context.session1 as flapping, the test was wrongStefan Metzmacher1-0/+1
metze
2012-05-09s3:libsmb: remove unused var in smb2cli_set_info_doneStefan Metzmacher1-3/+0