summaryrefslogtreecommitdiff
path: root/source3/libsmb/cliconnect.c
AgeCommit message (Collapse)AuthorFilesLines
2009-06-01Fix bug #6419 - smbclient -L 127.0.0.1" displays "netbios name" instead of ↵Jeremy Allison1-3/+26
"workgroup" Unify the handling of the sessionsetup parsing so we don't get different results when parsing a guest reply than an ntlmssp reply. Jeremy.
2009-05-13s3: return proper error code in cli_smb_req_sendBo Yang1-4/+15
Signed-off-by: Bo Yang <boyang@samba.org>
2009-05-12Clean up assignments to iov_base, ensure it's always cast to void *. This ↵Jeremy Allison1-2/+2
should quieten some warnings with picky compilers on the buildfarm. Jeremy.
2009-05-07Make cli_tcon_andx chainableVolker Lendecke1-15/+42
2009-05-07Make cli_session_setup_guest chainableVolker Lendecke1-9/+31
2009-04-20Merge commit 'origin/master' into libcli-auth-merge-without-netlogondAndrew Bartlett1-1/+1
2009-04-16When doing a cli_ulogoff don't invalidate the cnum, invalidate the vuid.Jeremy Allison1-1/+1
Jeremy.
2009-04-14More work to adapt to merged libcli/auth function prototypesAndrew Bartlett1-4/+5
2009-04-06Add a bad hack to enable level 2 oplocks in torture_open_connection_shareVolker Lendecke1-0/+4
2009-04-06Convert cli_tcon_andx to tevent_reqVolker Lendecke1-54/+69
2009-04-06Convert cli_negprot to tevent_reqVolker Lendecke1-36/+68
2009-04-06Convert cli_session_setup_guest to tevent_reqVolker Lendecke1-39/+69
2009-03-23s3:libsmb: use new simplified smb_signing code for the client sideStefan Metzmacher1-23/+16
We store the seqnum/mid mapping in the cli_request structure for async requests and in the cli_state structure for sync calls. We skip the signing check for oplock requests while waiting for async requests coming in. metze
2009-03-23Fix connect to port 139 only -- thanks gd for bugging me :-)Volker Lendecke1-4/+3
2009-03-16Convert open_socket_out_defer to tevent_reqVolker Lendecke1-22/+37
2009-03-13Remove pwd_cache.c, it was doing nothing. Make user_name, domain, andJeremy Allison1-7/+28
password talloc'ed strings within the cli_struct. Jeremy.
2009-03-07Fix a smbclient segfault against security=share serversVolker Lendecke1-3/+10
2009-03-06s3:libsmb: remove cli_setup_signing_state() and add struct cli_state ↵Stefan Metzmacher1-3/+1
*cli_initialise_ex() This prepares the next changes. metze
2009-03-06s3:libsmb: smb signing works the same for extented and non-extended securityStefan Metzmacher1-5/+18
This is only cosmetic, but it makes it easier to understand. metze
2009-02-24Convert name_mangle() to use tallocVolker Lendecke1-4/+21
2009-02-10Do not use strlen if not necessary... :-)Volker Lendecke1-4/+2
2009-02-03Fix Coverity ID 870Volker Lendecke1-0/+4
2009-02-01Split up async_req into a generic and a NTSTATUS specific partVolker Lendecke1-4/+4
2009-01-30Make cli_tcon_andx asyncVolker Lendecke1-50/+147
2009-01-30Make cli_session_setup_guest asyncVolker Lendecke1-37/+103
2009-01-29Add the strlen to push to smb_bytes_push_str, return the converted sizeVolker Lendecke1-1/+4
The pushed strlen replaces the STR_TERMINATE flag which I personally always find very confusing.
2009-01-26Decouple clistr_pull from struct cli_state->inbufVolker Lendecke1-13/+25
2009-01-15s3: make better use of ccache by not including version.h in every C-file.Michael Adam1-1/+1
version.h changes rather frequently. Since it is included via includes.h, this means each C file will be a cache miss. This applies to the following situations: * When building a new package with a new Samba version * building in a git branch after calling mkversion.sh after a new commit (i.e. virtually always) This patch improves the situation in the following way: * remove inlude "version.h" from includes.h * Use samba_version_string() instead of SAMBA_VERSION_STRING in files that use no other macro from version.h instead of SAMBA_VERSION_STRING. * explicitly include "version.h" in those files that use more macros from "version.h" than just SAMBA_VERSION_STRING. Michael
2009-01-14Remove smbclient globals that bled into clidfs.c. Now we only haveJeremy Allison1-5/+1
the connections list and authentication structures to worry about. Jeremy
2009-01-12s3:libsmb: handle the smb signing states the same in the krb5 and ntlmssp casesStefan Metzmacher1-16/+35
SMB signing works the same regardless of the used auth mech. We need to start with the temp signing ("BSRSPYL ") and the session setup response with NT_STATUS_OK is the first signed packet. Now we set the krb5 session key if we got the NT_STATUS_OK from the server and then recheck the packet. All this is needed to make the fallback from krb5 to ntlmssp possible. This commit also resets the cli->vuid value to 0, if the krb5 auth didn't succeed. Otherwise the server handles NTLMSSP packets as krb5 packets. The restructuring of the SMB signing code is needed to make sure the krb5 code only starts the signing engine on success. Otherwise the NTLMSSP fallback could not initialize the signing engine (again). metze
2009-01-04Simulate the Windows behaviour to fire 445 and after a timeout 139Volker Lendecke1-14/+76
2009-01-04Async wrapper for open_socket_out_send/recvVolker Lendecke1-8/+15
2009-01-03open_socket_out is always used with SOCK_STREAM, remove argument "type"Volker Lendecke1-7/+5
2008-12-19Pass "bytes_alignment" up through cli_request_sendVolker Lendecke1-1/+1
This parameter makes smb_spice_chain add padding before the bytes field
2008-12-19Make cli_negprot asyncVolker Lendecke1-50/+97
2008-12-19Make cli_negprot return NTSTATUS instead of boolVolker Lendecke1-16/+17
2008-12-19cli_negprot_send -> cli_negprot_sendsyncVolker Lendecke1-1/+1
2008-12-13Remove a pointless static variableVolker Lendecke1-7/+7
Every sane compiler will only allocate "*SMBSERVER" once
2008-12-13Micro-Optimize cliconnect.cVolker Lendecke1-22/+27
In this form, the prots array is fully read-only in the text segment and thus can be shared between processes. Probably pointless, but I had fun doing it :-)
2008-12-07Slightly simplify cli_session_setup_ntlmsspVolker Lendecke1-10/+2
Remove three pointless variables
2008-12-03s3: Change sockaddr util function names for consistencyTim Prouty1-1/+1
Also eliminates name conflicts with OneFS system libraries
2008-11-30Do not build the session request if it si not used anywayVolker Lendecke1-4/+4
2008-11-30fix nonempty blank linesVolker Lendecke1-19/+19
2008-11-01Make use of smb_bufrem()Volker Lendecke1-1/+1
2008-10-23Use sockaddr_storage only where we rely on the size, use sockaddrJelmer Vernooij1-1/+1
otherwise (to clarify we can also pass in structs smaller than sockaddr_storage, such as sockaddr_in).
2008-10-22s3: use shared asn1 code.Günther Deschner1-7/+8
Guenther
2008-08-07Fix bug #5675 with a varient of Tim Waugh's patch,Jeremy Allison1-3/+2
as proposed by James Peach. Jeremy. (This used to be commit 5c27ad75836136c39774c9456d63f46fa62e281f)
2008-06-02Fix bug reported by David Eisner <deisner@gmail.com>. When allocating cliJeremy Allison1-3/+3
buffers for large read/write - make sure we take account of the large read/write SMB headers as well as the buffer space. Jeremy. (This used to be commit 19519bca9b64b736d2fe0447b7cd495f00dba60a)
2008-05-23Manually merge Steven Danneman's patch for SPNEGO auth to a trustedGerald W. Carter1-20/+21
Win2008 domain (merged from v3-0-test). commit 8dc4e979776aae0ecaa74b51dc1eac78a7631405 Author: Steven Danneman <sdanneman@isilon.com> Date: Wed May 7 13:34:26 2008 -0700 spnego SPN fix when contacting trusted domains cli_session_setup_spnego() was not taking into consideration the situation where we're connecting to a trusted domain, specifically one (like W2K8) which doesn't return a SPN in the NegTokenInit. This caused two problems: 1) When guessing the SPN using kerberos_get_default_realm_from_ccache() we were always using our default realm, not the realm of the domain we're connecting to. 2) When falling back on NTLMSSP for authentication we were passing the name of the domain we're connecting to for use in our credentials when we should be passing our own workgroup name. The fix for both was to split the single "domain" parameter into "user_domain" and "dest_realm" parameters. We use the "user_domain" parameter to pass into the NTLM call, and we used "dest_realm" to create an SPN if none was returned in the NegTokenInit2 packet. If no "dest_realm" is provided we assume we're connecting to our own domain and use the credentials cache to build the SPN. Since we have a reasonable guess at the SPN, I removed the check that defaults us directly to NTLM when negHint is empty. (This used to be commit b78b14c88e8354aadf9ba7644bdb1c29245fe419)
2008-05-06build: fix the build w/o ldap.Günther Deschner1-1/+3
Guenther (This used to be commit a159ec5f1f3ec8e9232b8f3230a996a3f9986bc1)