summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2010-08-15s4:password_hash LDB module - introduce the extended LDAP error codes on the ↵Matthias Dieter Wallnöfer1-43/+72
important failure cases
2010-08-15s4:password_hash LDB module - support this new password set syntaxMatthias Dieter Wallnöfer1-2/+10
2010-08-15s4:passwords.py - another special password testMatthias Dieter Wallnöfer1-3/+23
This looks like a password change but it's rather a password set operation.
2010-08-15s4:password_hash LDB module - allow to compare against both NT and LM hashes ↵Matthias Dieter Wallnöfer1-10/+1
on password change operations This is to match the SAMR password change behaviour.
2010-08-15s4:ldap_backend.c - Windows returns WERROR codes in majuscule HEX formatMatthias Dieter Wallnöfer1-1/+1
2010-08-15s4:ldap_backend.c - map error codes - add a change which allows custom ↵Matthias Dieter Wallnöfer1-0/+13
WERROR codes This is strictly needed by my recent passwords work, since I want to remove most of the password change stuff in "samr_password.c". Since AD gives us CONSTRAINT_VIOLATION on all change problems I cannot distinguish on the SAMR level which the real cause was about. Therefore I need the extended WERROR codes here.
2010-08-15s3: Remove some unused codeVolker Lendecke2-32/+0
2010-08-15s3-test: Try to fix the build farm subunit parsing.Andreas Schneider1-3/+19
2010-08-15s3: Increase debug level for shutdown_other_smbdsVolker Lendecke1-3/+3
2010-08-15s3: Add debugs to shutdown_other_smbdsVolker Lendecke1-0/+6
2010-08-15s3: Fix a typoVolker Lendecke1-1/+1
2010-08-15s4:subtree_rename.c - relax the checks when requestedMatthias Dieter Wallnöfer1-0/+5
(Needed by upgradeprovision for example)
2010-08-15s4-test: Add drs.rpc.msDSIntId test to knownfail testsKamen Mazdrashki1-0/+1
2010-08-15s4-test: Run all DRS-RPC.* tests in ncacn_ip_tcp_tests tests groupKamen Mazdrashki1-3/+3
Andrew, please check.
2010-08-15s4-drs-test: Make the two DRS test suite a top-level test suitesKamen Mazdrashki1-16/+21
so that test cases gets visible with "smbtorture --list"
2010-08-14s4:ldap_backend.c - fix a DS error code after WERROR changeMatthias Dieter Wallnöfer1-1/+1
2010-08-14werror.h - fix order and duplicate DS error codesMatthias Dieter Wallnöfer2-62/+54
2010-08-14s4:libnet - free the "c" context also on error conditionsMatthias Dieter Wallnöfer2-1/+3
(and if it's NULL then "talloc_free" does ignore it)
2010-08-14talloc:documentation - explain that "talloc_free" works also with "NULL" ↵Matthias Dieter Wallnöfer2-14/+26
pointers (talloc.c) ... > static inline int _talloc_free_internal(void *ptr, const char *location) > { > struct talloc_chunk *tc; > > if (unlikely(ptr == NULL)) { > return -1; > } > > tc = talloc_chunk_from_ptr(ptr); ... Obviously this never had been documented before.
2010-08-14s4:samdb_set_password - return "NT_STATUS_WRONG_PASSWORD" when a user ↵Matthias Dieter Wallnöfer1-0/+2
account doesn't exist This is for the (SAMR) account detection protection mechanism.
2010-08-14s4:password_hash LDB module - improve an error messageMatthias Dieter Wallnöfer1-2/+2
2010-08-14s4:password_hash LDB module - implement the SAMR behaviour when checking old ↵Matthias Dieter Wallnöfer1-5/+16
passwords Sooner or later this module should take over all password change actions.
2010-08-14s4:password_hash LDB module - fix wrong error codesMatthias Dieter Wallnöfer1-4/+4
To match the passwords.py test
2010-08-14s4:passwords.py - test the error code when there doesn't exist any password yetMatthias Dieter Wallnöfer1-4/+24
After the creation of a user object we don't have any password yet.
2010-08-14s4:passwords.py - perform testing of wrong old passwords on change operationsMatthias Dieter Wallnöfer1-0/+44
2010-08-14s4:torture/rpc/samr.c - fix a wrong torture error messageMatthias Dieter Wallnöfer1-1/+1
2010-08-14s3: Remove a conn NULL check from claim_connectionVolker Lendecke1-4/+1
We've already dereferenced conn before
2010-08-14s3: Fix an uninitialized variableVolker Lendecke1-0/+3
2010-08-14s3:auth Add error paths for invalid password_state valuesAndrew Bartlett3-2/+10
Signed-off-by: Andrew Tridgell <tridge@samba.org>
2010-08-14s3:auth Change winbindd -> auth interface to more standard structuresAndrew Bartlett3-24/+46
This removes conversions to and from the source3 varient of the server_info structure when replaced in s3compat, and presents a tidier interface to winbindd in any case. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org>
2010-08-14s3:auth Change 'make_user_info' to be talloc basedAndrew Bartlett1-72/+58
This is an ideal candidate, as it already uses a free function. It now uses talloc destructors to clear the passwords if required. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org>
2010-08-14s3:auth Whitespace fixes after auth mergeAndrew Bartlett3-20/+20
2010-08-14s3:auth Make Samba3 use the new common struct auth_usersupplied_infoAndrew Bartlett19-191/+213
This common structure will make it much easier to produce an auth module for s3compat that calls Samba4's auth subsystem. In order the make the link work properly (and not map twice), we mark both that we did try and map the user, as well as if we changed the user during the mapping. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org>
2010-08-14s4:auth Move struct auth_usersupplied_info to a common locationAndrew Bartlett7-54/+72
This also changes the calling convention slightly - we should always allocate this with talloc_zero() to allow some elements to be optional. Some elements may only make sense in Samba3, which I hope will use this common structure. Andrew Bartlett
2010-08-14waf: enable gccdeps in developer modeAndrew Tridgell1-2/+3
there are some bugs in the waf builtin preproc this that avoids
2010-08-14s4-build: fixed library name in dcerpc_server.pc.inAndrew Tridgell1-1/+1
Thanks to Metze for spotting this
2010-08-14ndr: allow ndr_print to print DATA_BLOBAndrew Tridgell3-6/+64
this prints DATA_BLOB structures using the ndr->print() calls Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-08-14dnsp: dnsp_name is 2 byte alignedAndrew Tridgell1-0/+2
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-08-14s3:idmap: fix sid_to_unixid for builtin and own domain.Michael Adam1-2/+12
The old idmap code created a new mapping if asking the backends failed. Now with the new layering, if passdb (which is used for our own domain and builtin), then we need to continue and ask the backends, giving tdb or whatever the default backend is a chance to create a mapping.
2010-08-14s3:idmap: fix spacing/indentationMichael Adam1-2/+2
2010-08-14s3:idmap_ldap: use idmap_rw_new_mapping in idmap_ldap_new_mappingMichael Adam1-34/+3
2010-08-14s3:idmap_ldap: add idmap_rw_ops to idmap_ldap_context and init in db_init()Michael Adam2-2/+13
2010-08-14s3:idmap_tdb: use idmap_rw_new_mapping in idmap_tdb_new_mappingMichael Adam1-34/+3
2010-08-14s3:idmap_tdb: add idmap_rw_ops to idmap_tdb_context and initialize them in ↵Michael Adam2-3/+20
init_db
2010-08-14s3:idmap_tdb2: use idmap_rw_new_mapping in idmap_tdb2_new_mappingMichael Adam1-34/+6
2010-08-14s3:idmap_tdb2: add rw_ops to idmap_tdb2_context and initialize in ↵Michael Adam2-2/+14
idmap_tdb2_db_init
2010-08-14s3:idmap: add abstract idmap_rw new_mapping mechanism without registering ↵Michael Adam2-0/+135
backends
2010-08-14s3:idmap_ad: untangle two assignments from checksMichael Adam1-2/+4
2010-08-14s3:idmap_ad: remove unused filter_low_id and filter_high_id from ↵Michael Adam1-14/+0
idmap_ad_context The filter range from the idmap_domain is used now.
2010-08-14s3:idmap_ad: use range from idmap_domain in idmap_ad_sids_to_unixids()Michael Adam1-4/+2