Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2012-05-10 | Fix bug 8920, null dereference | Steve Langasek | 1 | -1/+3 | |
Description: Avoid null dereference in initialize_password_db() When initialize_password_db() is called with reload=True, it's assumed that the free_private_data member of pdb_methods is non-null. This is not necessarily the case, as the tdb backend has no private data and therefore no free function. Check to see if we have private data that needs freed before calling. Author: Steve Langasek <steve.langasek@ubuntu.com> Bug-Ubuntu: https://bugs.launchpad.net/bugs/829221 Autobuild-User: Volker Lendecke <vl@samba.org> Autobuild-Date: Thu May 10 11:07:27 CEST 2012 on sn-devel-104 | |||||
2012-05-10 | s3: Fix Coverity ID 242714 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+2 | |
In an error path we are closing domain_handle without opening it | |||||
2012-05-10 | s3: Fix Coverity ID 242715 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+1 | |
In an error path we are closing hive_hnd without opening it | |||||
2012-05-10 | s3: Fix Coverity ID 242716 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+2 | |
In an error path we are closing key_hnd without opening it | |||||
2012-05-10 | s3: Fix Coverity ID 242717 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+2 | |
In an error path we are closing domain_pol without opening it | |||||
2012-05-10 | s3: Fix Coverity ID 242718 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+2 | |
In an error path we are closing user_pol without opening it | |||||
2012-05-10 | s3: Fix Coverity ID 242719 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+2 | |
In an error path we are closing domain_pol without opening it | |||||
2012-05-10 | s3: Fix Coverity ID 242720 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+2 | |
In an error path we are closing domain_pol without opening it | |||||
2012-05-10 | s3: Fix Coverity ID 242721 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+2 | |
In an error path we are closing domain_pol without opening it | |||||
2012-05-10 | s3: Fix Coverity ID 242722 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+1 | |
In an error path we are closing domain_handle without opening it | |||||
2012-05-10 | s3: Fix Coverity ID 242723 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+1 | |
In an error path we are closing hnd without opening it | |||||
2012-05-10 | s3: Fix Coverity ID 241961 Uninitialized scalar variable | Volker Lendecke | 1 | -0/+2 | |
2012-05-10 | s3: Fix Coverity ID 242724 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+1 | |
In an error path we are closing pol without opening it | |||||
2012-05-10 | s3: Fix Coverity ID 242725 Uninitialized scalar variable | Volker Lendecke | 1 | -0/+1 | |
Not a functional bug, but we copy all of the "key" structure inside dcerpc_winreg_CreateKey. | |||||
2012-05-10 | s3: Fix Coverity ID 242726 Uninitialized scalar variable | Volker Lendecke | 1 | -1/+1 | |
Not a functional bug, but we copy all of the "key" structure inside dcerpc_winreg_OpenKey. | |||||
2012-05-10 | s3: Fix Coverity ID 242754 Dereference null return value | Volker Lendecke | 1 | -1/+1 | |
2012-05-10 | s3: Fix Coverity ID 242184 Dereference after null check | Volker Lendecke | 1 | -5/+3 | |
rpc_query_user unconditionally dereferences user_info if successfull | |||||
2012-05-10 | s3: Fix Coverity ID 242691 Dereference before null check | Volker Lendecke | 1 | -10/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242692 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242693 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242694 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242695 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242696 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242697 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242698 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242699 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242700 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242701 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242702 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242703 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242704 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242705 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | s3: Fix Coverity ID 242706 Dereference before null check | Volker Lendecke | 1 | -9/+6 | |
winreg_printer_openkey above already dereferences winreg_handle | |||||
2012-05-10 | build: Avoid printing the ABI signature normalisation during the default build | Andrew Bartlett | 1 | -1/+1 | |
This appears to have been accidentily left in acd63fdb86769ff4328ccb6a4096181e65e4d30f Andrew Bartlett Autobuild-User: Andrew Bartlett <abartlet@samba.org> Autobuild-Date: Thu May 10 09:00:20 CEST 2012 on sn-devel-104 | |||||
2012-05-10 | When listing group members allow fallback to cn attribute when ↵ | Lukasz Zalewski | 1 | -2/+5 | |
samAccountName is not available | |||||
2012-05-10 | build:ignore solaris _GLOBAL_OFFSET_TABLE_ in duplicate symbol checker | Andrew Bartlett | 1 | -0/+2 | |
2012-05-09 | s3:auth/server_info: the primary rid should be in the groups rid array (bug ↵ | Alejandro Escanero Blanco | 1 | -5/+0 | |
#8798) Signed-off-by: Stefan Metzmacher <metze@samba.org> Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed May 9 19:36:01 CEST 2012 on sn-devel-104 | |||||
2012-05-09 | allow to use system iniparser library. | Günther Deschner | 7 | -10/+31 | |
Guenther Autobuild-User: Günther Deschner <gd@samba.org> Autobuild-Date: Wed May 9 17:38:33 CEST 2012 on sn-devel-104 | |||||
2012-05-09 | waf: remove pointless WINBIND_KRB5_LOCATOR env. | Günther Deschner | 1 | -3/+0 | |
Guenther Autobuild-User: Günther Deschner <gd@samba.org> Autobuild-Date: Wed May 9 15:16:34 CEST 2012 on sn-devel-104 | |||||
2012-05-09 | s3-smbd: Fix the creation of duplicate SMB_ACL_GROUP entries | Andrew Bartlett | 1 | -2/+2 | |
The issue was a simple copy and paste bug, which casued a duplicate SMB_ACL_GROUP to be added when we already had one. Andrew Bartlett Signed-off-by: Jeremy Allison <jra@samba.org> Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Wed May 9 13:17:29 CEST 2012 on sn-devel-104 | |||||
2012-05-09 | s3-spoolss: Set DWORD values correctly. | Andreas Schneider | 1 | -9/+9 | |
Autobuild-User: Andreas Schneider <asn@cryptomilk.org> Autobuild-Date: Wed May 9 11:13:00 CEST 2012 on sn-devel-104 | |||||
2012-05-09 | s3-lib/sysacls: Do not include an embedded \0 between ACL entries in ↵ | Andrew Bartlett | 1 | -2/+3 | |
sys_acl_to_text() This makes it possible to print the entire string again. Andrew Bartlett Autobuild-User: Andrew Bartlett <abartlet@samba.org> Autobuild-Date: Wed May 9 06:07:06 CEST 2012 on sn-devel-104 | |||||
2012-05-09 | s3-lib: Add const to sys_acl_to_text | Andrew Bartlett | 2 | -2/+2 | |
2012-05-09 | s3-vfs: Show the invalid ACL when we say it is invalid for set | Andrew Bartlett | 1 | -2/+4 | |
2012-05-09 | s3-lib: Fix indentation in sys_acl_to_text() | Andrew Bartlett | 1 | -2/+2 | |
2012-05-09 | Revert "selftest: mark ^samba4.raw.context.session1 as flapping, the test ↵ | Stefan Metzmacher | 1 | -1/+0 | |
was wrong" This reverts commit 794a9da38fbd88eb3d358d453cc5d21998604caa. The test is fixed now. metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed May 9 02:53:24 CEST 2012 on sn-devel-104 | |||||
2012-05-09 | s4:smb_server/smb: only create a new session with vuid == 0 | Stefan Metzmacher | 3 | -9/+17 | |
metze | |||||
2012-05-09 | s4:torture/raw/context: test a session setup with a given invalid vuid | Stefan Metzmacher | 1 | -17/+29 | |
On a session setup with EXTENDED_SECURITY we'll get ERRSRV:ERRbaduid, while a session setup without EXTENDED_SECURITY ignores the given vuid. Before this test was doing a reauth of a given vuid, which works for newer Windows versions, but Windows 2000 gives INVALID_PARAMETER. metze | |||||
2012-05-09 | selftest: mark ^samba4.raw.context.session1 as flapping, the test was wrong | Stefan Metzmacher | 1 | -0/+1 | |
metze | |||||
2012-05-09 | s3:libsmb: remove unused var in smb2cli_set_info_done | Stefan Metzmacher | 1 | -3/+0 | |