summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2009-11-13util: str_list_unique_2() test implementationKamen Mazdrashki1-0/+33
Difference with previous test for str_list_unique() is that this test allows number of elements and number of duplicates to be supplied on command line using --option="list_unique:count=47" --option="list_unique:dups=7"
2009-11-13s4:heimdal Import generated files from heimdal treeAndrew Bartlett9-827/+1185
We should be able to rebuild these, but a cp is easier :-)
2009-11-13s4:heimdal: import lorikeet-heimdal-200911122202 (commit ↵Andrew Bartlett59-646/+1168
9291fd2d101f3eecec550178634faa94ead3e9a1)
2009-11-13s4:heimdal: import lorikeet-heimdal-200909210500 (commit ↵Andrew Bartlett139-2179/+4119
290db8d23647a27c39b97c189a0b2ef6ec21ca69)
2009-11-13Fix large paged searchVolker Lendecke1-0/+1
Signed-off-by: Michael Adam <obnox@samba.org>
2009-11-13fix bogus "out of memory" winbind msgVolker Lendecke1-1/+2
Signed-off-by: Michael Adam <obnox@samba.org>
2009-11-13s4-ldb: changed the DN checks for \n to warningsAndrew Tridgell2-6/+11
a \n is sometimes allowed in AD (eg in deleted DNs). Until we know when is really is allowed, treat it as a warning only.
2009-11-13s4-ldb: make DN escaping/unescaping consistentAndrew Tridgell1-20/+54
The DN escape function was using the form \c where c is any character. The unescape function was using \XX where XX is a 2 digit hex number. The asymmetry led to quite a few problems when we start to deal with DNs containing escape chars, such as CN=foo\0ADEL:XXX. The result was a DN that was not accessible. This patch changes the escaping to follow RFC2253 much more closely. We accept either type of escape, and produce the two types of escape, depending on the character being escaped
2009-11-13s3: Convert cli_unix_extensions_version to asyncVolker Lendecke5-55/+159
2009-11-13s3-rpcclient: use the parsed binding string flags for auth choice.Günther Deschner1-0/+18
This allows rpcclient to be called like this: rpcclient ncacn_ip_tcp:w2k8r2[sign,seal] -U administrator%secret -c "dscracknames gd" Guenther
2009-11-12Remove unused variable warning.Jeremy Allison1-1/+0
Jeremy.
2009-11-12Remove erroneous 'presult = NULL' changes. Now presult only gets setJeremy Allison1-9/+2
if NTSTATUS == OK. Jeremy.
2009-11-12Revert "Ensure every return path initializes presult as NULL."Jeremy Allison1-40/+0
Vl is correct, this is the wrong way to fix this. This reverts commit 83c2c177a5e86d04da37384f1f04230c8274e1e6.
2009-11-12Ensure all callers to the rpc_client/cli_pipe functions correctlyJeremy Allison13-34/+21
initialize return variables. Jeremy.
2009-11-12Fix bug 6891 - using windows explorer to change ownership on a folder fails ↵Jeremy Allison1-1/+11
with Bad File Descriptor. Jeremy.
2009-11-12Ensure every return path initializes presult as NULL.Jeremy Allison1-0/+40
Ensures no crashes in calling code that forgets to init return as null. Jeremy.
2009-11-12s4:heimdal_build: allow flex-2.5.35 with bison-2.3Stefan Metzmacher1-0/+1
metze
2009-11-12s3-kerberos: remove smb_krb5_get_tkt_from_creds().Günther Deschner1-60/+4
Now that cli_krb5_get_ticket() already handles S4U2SELF impersonation, remove smb_krb5_get_tkt_from_creds() which is not required anymore. Guenther
2009-11-12s3-kerberos: avoid using ERROR_TABLE_BASE_krb5 without checking.Günther Deschner1-0/+4
Guenther
2009-11-12s4:dsdb Make callbacks in extended_dn_out clearer to followAndrew Bartlett1-1/+6
2009-11-12s4:selftest Mark the RPC-DSSYNC test as knownfail for nowAndrew Bartlett1-0/+1
We need to work on the provision or LDB modules to avoid DN attributes without GUIDs (caused because the target does not exist at creation time). Andrew Bartlett
2009-11-12s4:libcli/ldap Add 'relax' OID to known network representationsAndrew Bartlett1-0/+2
This patch, inspired by a patche by Endi S. Dewata <edewata@redhat.com>, allows this control to be passed to the LDAP backend. Andrew Bartlett
2009-11-12s4:provision - Added LDBBackend and ExistingBackend.Endi S. Dewata2-32/+62
2009-11-12s4:provision - Added constructors for FDSBackend and OpenLDAPBackend.Endi S. Dewata2-43/+95
2009-11-12s4:provision - Added setup() method in LDAPBackend.Endi S. Dewata2-26/+32
2009-11-12s4:provision - Moved provision_xxx_backend() into backend-specific ↵Endi S. Dewata2-318/+287
provision() method.
2009-11-12s4:provision - Added start() method in LDAPBackend.Endi S. Dewata2-13/+20
2009-11-12s4:provision - Added initial implementation of FDSBackend and OpenLDAPBackend.Endi S. Dewata2-37/+68
2009-11-12s3: Fix debug messages in check_reduced_nameVolker Lendecke1-13/+24
2009-11-12cifs.upcall: Fix Bug #6868: support building with Heimdal we well as with MIT.Günther Deschner1-18/+16
Guenther
2009-11-12s3-kerberos: add smb_krb5_principal_get_realm().Günther Deschner2-0/+27
Guenther
2009-11-12s4:repl_meta_data Parse linked attributes with schema syntaxesAndrew Bartlett1-39/+44
The bug here was that by assuming all linked attributes were 'normal DNs', we would miss the binary portion of DN+Binary. This patch then has us reparse the string to determine it's GUID, for the GUID lookup, but maintains the binary porition into the on-disk format. Andrew Bartlett
2009-11-12s4:dsdb/schema Add more unit tests for DN+Binary syntaxesAndrew Bartlett1-4/+9
2009-11-12s4:torture Use (some) torture_assert() calls in RPC-DSSYNC testAndrew Bartlett1-5/+4
2009-11-12s4:dsdb Improve debug message in extended_dn_outAndrew Bartlett1-1/+3
2009-11-12s4:torture Remove _drs_util_verify_attids() from RPC-DSSYNCAndrew Bartlett2-87/+0
I'm satisfied that the task this test does is already done by the time we map the incoming schema, and process the objects. If we have the OID mapping wrong or incomplete, we will get any errors this test found errors there. (And this dramaticly reduces the test time, so we can now add RPC-DSSYNC to 'make test'). Andrew Bartlett
2009-11-12s4:torture/dsdb Add verification of the push-to-LDB functions in RPC-DSSYNCAndrew Bartlett1-23/+260
This is done by comparing the values against the remote host's LDAP server. Andrew Bartlett
2009-11-12s4:torture Add constAndrew Bartlett1-1/+1
2009-11-12s4:ldb Allow ldb_msg_canonicalize to handle empty elementsAndrew Bartlett1-1/+1
(These are deliberately there in DRS replication). Andrew Bartlett
2009-11-12s4:dsdb/schema Allow a schema set when bound against a remote LDAP serverAndrew Bartlett1-3/+3
2009-11-12s4:ldb Don't segfault if we somehow get an unknown extended dn elementAndrew Bartlett1-0/+8
2009-11-12s4:ldb Change ldb_request_add_control to the normal 'for loop' patternAndrew Bartlett1-2/+1
2009-11-12s4:torture Convert RPC-DSSYNC test to use LDB rather than raw LDAPAndrew Bartlett1-49/+28
(This should make it easier to do more 'compare DRS with LDAP' operations, as LDB is an easier interface to program.) Andrew Bartlett
2009-11-12NET-API-BECOME-DC: resolve the host name to an address before callingStefan Metzmacher1-2/+16
libnet_BecomeDC and libnet_UnbecomeDC() We're supposed to pass in source_dsa_address... metze
2009-11-12s4:dsdb Add expected value tests for most DRS syntax conversionsAndrew Bartlett4-8/+159
I've left out those for which I could not find an expected value in my default Windows 2003 server's database, and the values that rely on the current prefix map at the time. Andrew Bartlett
2009-11-12s4:Fix regression in dsdb_dn code - all parses of the DN would be rejectedAndrew Bartlett1-2/+6
This is most likely the cause of the DRS replication failures I observed with my changes. Andrew Bartlett
2009-11-12s4:provision Add C binding to get at the generate schemaAndrew Bartlett3-0/+86
This will allow us to do local tests against that schema
2009-11-12s4:provision Remove unused 'sambadn' parameterAndrew Bartlett2-10/+4
2009-11-12s4:dsdb/repl Split the 'convert' or 'commit' stages in the DRS importAndrew Bartlett4-95/+125
This will allow us in future to do tests on the LDB values we generate from the DRS replication. Andrew Bartlett
2009-11-12s4:dsdb/schema Simplify schema loading from ldb messagesAndrew Bartlett3-115/+83
It turns out that we always add the class/attribute to the schema.