summaryrefslogtreecommitdiff
path: root/source3/librpc
AgeCommit message (Collapse)AuthorFilesLines
2013-04-26smbd: Obsolete MSG_SMB_OPEN_RETRYVolker Lendecke1-1/+1
Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
2013-04-26smbd: Obsolete MSG_SMB_BREAK_RESPONSEVolker Lendecke1-1/+1
Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
2013-04-18s3:smbd: add a scavenger process for disconnected durable handlesGregor Beck1-0/+1
Pair-Programmed-With: Stefan Metzmacher <metze@samba.org> Signed-off-by: Gregor Beck <gbeck@sernet.de> Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Michael Adam <obnox@samba.org>
2012-12-03s3:winbindd: remove wbint_Sid2Gid from the wbint.idlMichael Adam1-6/+0
Signed-off-by: Michael Adam <obnox@samba.org> Reviewed-by: Stefan Metzmacher <metze@samba.org>
2012-12-03s3:winbindd: remove wbint_Sid2Uid() from the wbint.idlMichael Adam1-6/+0
Signed-off-by: Michael Adam <obnox@samba.org> Reviewed-by: Stefan Metzmacher <metze@samba.org>
2012-12-03s3:winbindd: use struct unixid instead of uint64 in Sids2Xids parent<->childMichael Adam1-1/+1
This implicitly also hands the type of the resulting unix-id that the idmap backend has created back to the caller. This is important for backends that would set a broader type than the requested one, e.g. rid backend returning BOTH instead of UID or GID. Signed-off-by: Michael Adam <obnox@samba.org> Reviewed-by: Stefan Metzmacher <metze@samba.org>
2012-11-20s3:librpc: add support for PFC_FLAG_OBJECT_UUID when parsing packets (bug #9382)Stefan Metzmacher1-0/+4
Now the logic matches the one in dcerpc_read_ncacn_packet_done(). Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Michael Adam <obnox@samba.org>
2012-10-19s3:open_files.idl: add stat-info to vfs_default_durable_cookie.Michael Adam1-0/+23
Pair-programmed-with: Stefan Metzmacher <metze@samba.org> Signed-off-by: Michael Adam <obnox@samba.org> Signed-off-by: Stefan Metzmacher <metze@samba.org>
2012-10-19s3:open_files.idl: add write_time specific stuff to vfs_default_durable_cookieStefan Metzmacher1-0/+4
metze Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Michael Adam <obnox@samba.org>
2012-10-19s3:smbXsrv.idl: add session_global_id to smbXsrv_tcon_globalStefan Metzmacher1-0/+4
This is required for some debugging tools like smbstatus. metze Signed-off-by: Michael Adam <obnox@samba.org>
2012-09-08s3:vfs_default: add basic support for durable handle request and reconnectMichael Adam1-0/+16
We only grant durable handles for CIFS/SMB2 only access, that means "kernel oplocks", "kernel share modes" and "posix locking" need to be set to "no". For now we also don't grant durable handles if delete on close is active on the handle. Pair-Programmed-With: Stefan Metzmacher <metze@samba.org> Pair-Programmed-With: Volker Lendecke <vl@samba.org>
2012-09-08s3:smbXsrv.idl: add properties for durable handles to smbXsrv_open_global0Stefan Metzmacher1-0/+8
Pair-Programmed-With: Michael Adam <obnox@samba.org> metze
2012-08-23smbXsrv.idl: add nonce_* to smbsrv_sessionStefan Metzmacher1-0/+2
metze
2012-08-15s3-winbind: Return the DC name from DC_PINGChristof Schmitt1-0/+1
The DC that was attempted to ping is useful for troubleshooting. Return the DC name in the response to the wbclient. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2012-08-10s3:smbXsrv.idl: remove smbXsrv_*0 definesStefan Metzmacher1-42/+42
This makes ctags more usable. metze
2012-08-09Correctly check for errors in strlower_m() returns.Jeremy Allison1-1/+4
2012-08-09s3:smbXsrv.idl: add encryption_required to smbXsrv_tcon_global0Stefan Metzmacher1-0/+1
metze
2012-08-01s3:rpc_client: rename pipe_auth_data->user_session_key to transport_session_keyStefan Metzmacher1-1/+1
metze
2012-07-24lib/param: Move all enum declarations to lib/paramAndrew Bartlett1-0/+1
This is in preperation for the parameter table being made common. Andrew Bartlett Pair-Programmed-With: Andrew Tridgell <tridge@samba.org>
2012-06-29s3:smbXsrv.idl: add smbXsrv_open* structuresStefan Metzmacher1-0/+71
struct smbXsrv_open will represent a SMB 1 or SMB 2 open file handle, while 'files_struct' will be changed to handle just the protocol independent glue for the SMB_VFS layer. Note: the format is not stable yet, we need to add more things when we start to support durable handles. metze
2012-06-25s3:smbXsrv.idl: add smbXsrv_session_close*Stefan Metzmacher1-0/+26
metze
2012-06-25s3:messaging.idl: define MSG_SMBXSRV_SESSION_CLOSEStefan Metzmacher1-0/+3
metze
2012-06-25s3:smbd: make use of smbXsrv_tcon and smbXsrv_session for smb2Stefan Metzmacher1-1/+0
The removes the protocol specific smbd_smb2_session and smbd_smb2_tcon. Pair-Programmed-With: Michael Adam <obnox@samba.org> metze
2012-06-25s3:smbXsrv.idl: add smbXsrv_tcon* structuresStefan Metzmacher1-0/+63
struct smbXsrv_tcon will represent a SMB 1 or SMB 2 tree connect. It will replace 'struct smbd_smb2_tcon' and 'connection_struct' will be changed to handle just the protocol independent glue for the SMB_VFS layer. metze
2012-06-25s3:smbXsrv.idl: add smbXsrv_session* structuresStefan Metzmacher1-0/+92
struct smbXsrv_session will represent a SMB 1 or SMB 2 session. It will replace 'struct smbd_smb2_session' and 'user_struct' will be changed to handle just the protocol independent glue for the SMB_VFS layer. metze
2012-06-25s3:librpc/idl/smbXsrv.idl: add smbXsrv_version_* structuresStefan Metzmacher1-1/+65
metze
2012-06-25s3:librpc: add smbXsrv.idlStefan Metzmacher3-1/+20
metze
2012-06-08s3-rpcclient: add fsrvp commandsDavid Disseldorp1-0/+4
fss_create_expose connects to an FSRVP server and negotiates the creation and exposure of a share shadow-copy. shadow-copies of multiple shares can be requested with a single fss_create_expose request. ddiss@plati:~> bin/rpcclient -k -U 'LURCH\administrator%password' \ ncacn_np:lutze[sign] rpcclient $> fss_create_expose backup ro hyper 381884f2-b578-45ea-b8d2-cf82491f4011: shadow-copy set created ... share hyper@{B6137E21-9CBB-4547-A21D-E7AD40D0874B} exposed as a snapshot of \\lutze\hyper fss_delete removes the shadow-copy share: rpcclient $> fss_delete hyper 381884f2-b578-45ea-b8d2-cf82491f4011 \ b6137e21-9cbb-4547-a21d-e7ad40d0874 Shadow-copies can be created read-write or read-only. Experimenting with Windows Server "8" beta, a recovery complete call is required after creating a read-write (ATTR_AUTO_RECOVERY) shadow copy. Otherwise subsequent creation requests fail with FSRVP_E_SHADOW_COPY_SET_IN_PROGRESS.
2012-05-23gse: Use the smb_gss_oid_equal wrapper.Andreas Schneider1-20/+3
Signed-off-by: Andreas Schneider <asn@samba.org>
2012-05-23Introduce system MIT krb5 build with --with-system-mitkrb5 option.Alexander Bokovoy1-1/+1
System MIT krb5 build also enabled by specifying --without-ad-dc When --with-system-mitkrb5 (or --withou-ad-dc) option is passed to top level configure in WAF build we are trying to detect and use system-wide MIT krb5 libraries. As result, Samba 4 DC functionality will be disabled due to the fact that it is currently impossible to implement embedded KDC server with MIT krb5. Thus, --with-system-mitkrb5/--without-ad-dc build will only produce * Samba 4 client libraries and their Python bindings * Samba 3 server (smbd, nmbd, winbindd from source3/) * Samba 3 client libraries In addition, Samba 4 DC server-specific tests will not be compiled into smbtorture. This in particular affects spoolss_win, spoolss_notify, and remote_pac rpc tests.
2012-05-17s3:gse: implement gensec_gse_expire_time()Stefan Metzmacher1-0/+12
metze
2012-05-17s3:gse: remember the expire timeStefan Metzmacher1-2/+15
metze
2012-04-24s3: Attempt to fix the build without kerberosVolker Lendecke1-1/+1
Autobuild-User: Volker Lendecke <vl@samba.org> Autobuild-Date: Tue Apr 24 15:04:14 CEST 2012 on sn-devel-104
2012-04-23Make krb5 wrapper library common so they can be used all overSimo Sorce1-3/+3
2012-04-20s3:id_cache: do not use the in-memory idmap cache (it is going to be removed)Michael Adam1-1/+1
This also removes the ID_CACHE_FLUSH message.
2012-04-19s3-dbwrap: Add dbwrap_record_watch_send/recvVolker Lendecke1-1/+2
With this API you can asynchronously wait for a record to be modified
2012-04-17s3: New notify implementationVolker Lendecke1-0/+3
From notify_internal.c: /* * The notify database is split up into two databases: One * relatively static index db and the real notify db with the * volatile entries. */ This change is necessary to make notify scale better in a cluster
2012-04-12gse: Remove unnecessary header.Simo Sorce1-1/+0
Signed-off-by: Andreas Schneider <asn@samba.org>
2012-04-12auth-krb: Nove oid packet check to gensec_util.Simo Sorce1-21/+1
This is clearly a utiliy function generic to gensec. Also the 3 callers had identical implementations. Provide a generic implementation for all of them and avoid duplicating the code everywhere. Signed-off-by: Andreas Schneider <asn@samba.org>
2012-04-04Second part of bugfix for bug #8837 - smbd crashes when deleting directory ↵Jeremy Allison1-0/+1
and veto files are enabled. Store the 'struct security_token' as well as the 'struct security_unix_token' inside the locking db when setting a delete on close.
2012-03-17s3:gse: fix debug message in gse_get_server_auth_token()Stefan Metzmacher1-1/+1
metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Sat Mar 17 03:21:06 CET 2012 on sn-devel-104
2012-03-15s3-krb5: Remove GSS_WRAP_IOV conditionalAndrew Bartlett1-2/+2
We already confirm that we have this functionality before we set HAVE_KRB5 at configure time. Andrew Bartlett
2012-02-18Fix a bunch of "unused variable" warnings.Jeremy Allison1-6/+6
Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Sat Feb 18 06:22:40 CET 2012 on sn-devel-104
2012-02-17auth/kerberos: Move gse_get_session_key() to common code and use in ↵Andrew Bartlett1-113/+3
gensec_gssapi Thie ensures that both code bases use the same logic to determine the use of NEW_SPNEGO. Andrew Bartlett
2012-02-17s3-gse: Allow kerberos key type OID to be optionalAndrew Bartlett1-4/+11
2012-02-17s3-gse: Fix OID to read for kerberos key typeAndrew Bartlett1-2/+2
2012-02-17s3-librpc: Remove backup declaration of GSS_C_DCE_STYLEAndrew Bartlett1-4/+0
All our supported krb5 libs provide this. Andrew Bartlett
2012-02-17s3-gse: Remove unused OID declarationAndrew Bartlett1-9/+0
2012-02-16s3-librpc: Remove gse_verify_server_auth_flagsAndrew Bartlett1-50/+0
gensec_update() ensures that DCE-style and sign/seal are negotiated correctly for DCE/RPC pipes. Also, the smb sealing client/server already check for the gensec_have_feature(). This additional check just keeps causing trouble, and is 'protecting' an already secure negoitated exchange. Andrew Bartlett Signed-off-by: Stefan Metzmacher <metze@samba.org> Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Thu Feb 16 21:19:44 CET 2012 on sn-devel-104
2012-02-16s3-librpc: Use gensec_spnego for DCE/RPC authenticationAndrew Bartlett3-468/+0
This ensures that we use the same SPNEGO code on session setup and on DCE/RPC binds, and simplfies the calling code as spnego is no longer a special case in cli_pipe.c A special case wrapper function remains to avoid changing the application layer callers in this patch. Andrew Bartlett Signed-off-by: Stefan Metzmacher <metze@samba.org>