Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2010-08-15 | s4:passwords.py - proof the most important extended error codes | Matthias Dieter Wallnöfer | 1 | -8/+17 | |
2010-08-15 | s4:samdb_set_password - implement the extended LDAP error code detection | Matthias Dieter Wallnöfer | 1 | -9/+17 | |
2010-08-15 | s4:password_hash LDB module - introduce the extended LDAP error codes on the ↵ | Matthias Dieter Wallnöfer | 1 | -43/+72 | |
important failure cases | |||||
2010-08-15 | s4:password_hash LDB module - support this new password set syntax | Matthias Dieter Wallnöfer | 1 | -2/+10 | |
2010-08-15 | s4:passwords.py - another special password test | Matthias Dieter Wallnöfer | 1 | -3/+23 | |
This looks like a password change but it's rather a password set operation. | |||||
2010-08-15 | s4:password_hash LDB module - allow to compare against both NT and LM hashes ↵ | Matthias Dieter Wallnöfer | 1 | -10/+1 | |
on password change operations This is to match the SAMR password change behaviour. | |||||
2010-08-15 | s4:ldap_backend.c - Windows returns WERROR codes in majuscule HEX format | Matthias Dieter Wallnöfer | 1 | -1/+1 | |
2010-08-15 | s4:ldap_backend.c - map error codes - add a change which allows custom ↵ | Matthias Dieter Wallnöfer | 1 | -0/+13 | |
WERROR codes This is strictly needed by my recent passwords work, since I want to remove most of the password change stuff in "samr_password.c". Since AD gives us CONSTRAINT_VIOLATION on all change problems I cannot distinguish on the SAMR level which the real cause was about. Therefore I need the extended WERROR codes here. | |||||
2010-08-15 | s3: Remove some unused code | Volker Lendecke | 2 | -32/+0 | |
2010-08-15 | s3-test: Try to fix the build farm subunit parsing. | Andreas Schneider | 1 | -3/+19 | |
2010-08-15 | s3: Increase debug level for shutdown_other_smbds | Volker Lendecke | 1 | -3/+3 | |
2010-08-15 | s3: Add debugs to shutdown_other_smbds | Volker Lendecke | 1 | -0/+6 | |
2010-08-15 | s3: Fix a typo | Volker Lendecke | 1 | -1/+1 | |
2010-08-15 | s4:subtree_rename.c - relax the checks when requested | Matthias Dieter Wallnöfer | 1 | -0/+5 | |
(Needed by upgradeprovision for example) | |||||
2010-08-15 | s4-test: Add drs.rpc.msDSIntId test to knownfail tests | Kamen Mazdrashki | 1 | -0/+1 | |
2010-08-15 | s4-test: Run all DRS-RPC.* tests in ncacn_ip_tcp_tests tests group | Kamen Mazdrashki | 1 | -3/+3 | |
Andrew, please check. | |||||
2010-08-15 | s4-drs-test: Make the two DRS test suite a top-level test suites | Kamen Mazdrashki | 1 | -16/+21 | |
so that test cases gets visible with "smbtorture --list" | |||||
2010-08-14 | s4:ldap_backend.c - fix a DS error code after WERROR change | Matthias Dieter Wallnöfer | 1 | -1/+1 | |
2010-08-14 | werror.h - fix order and duplicate DS error codes | Matthias Dieter Wallnöfer | 2 | -62/+54 | |
2010-08-14 | s4:libnet - free the "c" context also on error conditions | Matthias Dieter Wallnöfer | 2 | -1/+3 | |
(and if it's NULL then "talloc_free" does ignore it) | |||||
2010-08-14 | talloc:documentation - explain that "talloc_free" works also with "NULL" ↵ | Matthias Dieter Wallnöfer | 2 | -14/+26 | |
pointers (talloc.c) ... > static inline int _talloc_free_internal(void *ptr, const char *location) > { > struct talloc_chunk *tc; > > if (unlikely(ptr == NULL)) { > return -1; > } > > tc = talloc_chunk_from_ptr(ptr); ... Obviously this never had been documented before. | |||||
2010-08-14 | s4:samdb_set_password - return "NT_STATUS_WRONG_PASSWORD" when a user ↵ | Matthias Dieter Wallnöfer | 1 | -0/+2 | |
account doesn't exist This is for the (SAMR) account detection protection mechanism. | |||||
2010-08-14 | s4:password_hash LDB module - improve an error message | Matthias Dieter Wallnöfer | 1 | -2/+2 | |
2010-08-14 | s4:password_hash LDB module - implement the SAMR behaviour when checking old ↵ | Matthias Dieter Wallnöfer | 1 | -5/+16 | |
passwords Sooner or later this module should take over all password change actions. | |||||
2010-08-14 | s4:password_hash LDB module - fix wrong error codes | Matthias Dieter Wallnöfer | 1 | -4/+4 | |
To match the passwords.py test | |||||
2010-08-14 | s4:passwords.py - test the error code when there doesn't exist any password yet | Matthias Dieter Wallnöfer | 1 | -4/+24 | |
After the creation of a user object we don't have any password yet. | |||||
2010-08-14 | s4:passwords.py - perform testing of wrong old passwords on change operations | Matthias Dieter Wallnöfer | 1 | -0/+44 | |
2010-08-14 | s4:torture/rpc/samr.c - fix a wrong torture error message | Matthias Dieter Wallnöfer | 1 | -1/+1 | |
2010-08-14 | s3: Remove a conn NULL check from claim_connection | Volker Lendecke | 1 | -4/+1 | |
We've already dereferenced conn before | |||||
2010-08-14 | s3: Fix an uninitialized variable | Volker Lendecke | 1 | -0/+3 | |
2010-08-14 | s3:auth Add error paths for invalid password_state values | Andrew Bartlett | 3 | -2/+10 | |
Signed-off-by: Andrew Tridgell <tridge@samba.org> | |||||
2010-08-14 | s3:auth Change winbindd -> auth interface to more standard structures | Andrew Bartlett | 3 | -24/+46 | |
This removes conversions to and from the source3 varient of the server_info structure when replaced in s3compat, and presents a tidier interface to winbindd in any case. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org> | |||||
2010-08-14 | s3:auth Change 'make_user_info' to be talloc based | Andrew Bartlett | 1 | -72/+58 | |
This is an ideal candidate, as it already uses a free function. It now uses talloc destructors to clear the passwords if required. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org> | |||||
2010-08-14 | s3:auth Whitespace fixes after auth merge | Andrew Bartlett | 3 | -20/+20 | |
2010-08-14 | s3:auth Make Samba3 use the new common struct auth_usersupplied_info | Andrew Bartlett | 19 | -191/+213 | |
This common structure will make it much easier to produce an auth module for s3compat that calls Samba4's auth subsystem. In order the make the link work properly (and not map twice), we mark both that we did try and map the user, as well as if we changed the user during the mapping. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org> | |||||
2010-08-14 | s4:auth Move struct auth_usersupplied_info to a common location | Andrew Bartlett | 7 | -54/+72 | |
This also changes the calling convention slightly - we should always allocate this with talloc_zero() to allow some elements to be optional. Some elements may only make sense in Samba3, which I hope will use this common structure. Andrew Bartlett | |||||
2010-08-14 | waf: enable gccdeps in developer mode | Andrew Tridgell | 1 | -2/+3 | |
there are some bugs in the waf builtin preproc this that avoids | |||||
2010-08-14 | s4-build: fixed library name in dcerpc_server.pc.in | Andrew Tridgell | 1 | -1/+1 | |
Thanks to Metze for spotting this | |||||
2010-08-14 | ndr: allow ndr_print to print DATA_BLOB | Andrew Tridgell | 3 | -6/+64 | |
this prints DATA_BLOB structures using the ndr->print() calls Signed-off-by: Andrew Bartlett <abartlet@samba.org> | |||||
2010-08-14 | dnsp: dnsp_name is 2 byte aligned | Andrew Tridgell | 1 | -0/+2 | |
Signed-off-by: Andrew Bartlett <abartlet@samba.org> | |||||
2010-08-14 | s3:idmap: fix sid_to_unixid for builtin and own domain. | Michael Adam | 1 | -2/+12 | |
The old idmap code created a new mapping if asking the backends failed. Now with the new layering, if passdb (which is used for our own domain and builtin), then we need to continue and ask the backends, giving tdb or whatever the default backend is a chance to create a mapping. | |||||
2010-08-14 | s3:idmap: fix spacing/indentation | Michael Adam | 1 | -2/+2 | |
2010-08-14 | s3:idmap_ldap: use idmap_rw_new_mapping in idmap_ldap_new_mapping | Michael Adam | 1 | -34/+3 | |
2010-08-14 | s3:idmap_ldap: add idmap_rw_ops to idmap_ldap_context and init in db_init() | Michael Adam | 2 | -2/+13 | |
2010-08-14 | s3:idmap_tdb: use idmap_rw_new_mapping in idmap_tdb_new_mapping | Michael Adam | 1 | -34/+3 | |
2010-08-14 | s3:idmap_tdb: add idmap_rw_ops to idmap_tdb_context and initialize them in ↵ | Michael Adam | 2 | -3/+20 | |
init_db | |||||
2010-08-14 | s3:idmap_tdb2: use idmap_rw_new_mapping in idmap_tdb2_new_mapping | Michael Adam | 1 | -34/+6 | |
2010-08-14 | s3:idmap_tdb2: add rw_ops to idmap_tdb2_context and initialize in ↵ | Michael Adam | 2 | -2/+14 | |
idmap_tdb2_db_init | |||||
2010-08-14 | s3:idmap: add abstract idmap_rw new_mapping mechanism without registering ↵ | Michael Adam | 2 | -0/+135 | |
backends | |||||
2010-08-14 | s3:idmap_ad: untangle two assignments from checks | Michael Adam | 1 | -2/+4 | |