summaryrefslogtreecommitdiff
path: root/source3/libsmb
AgeCommit message (Collapse)AuthorFilesLines
2009-04-06Remove async_req based async libsmb infrastructureVolker Lendecke1-869/+0
2009-04-06Convert cli_open to tevent_reqVolker Lendecke1-46/+102
2009-04-06Convert cli_close to tevent_reqVolker Lendecke1-20/+66
2009-04-06Streamline cli_push sync wrapperVolker Lendecke1-9/+18
2009-04-06Convert cli_write_andx to tevent_reqVolker Lendecke1-37/+88
2009-04-06Streamline cli_pull sync wrapperVolker Lendecke1-9/+18
2009-04-06Convert cli_read_andx to tevent_reqVolker Lendecke1-108/+150
2009-04-06Convert cli_ntcreate to tevent_reqVolker Lendecke1-38/+68
2009-04-06Convert cli_tcon_andx to tevent_reqVolker Lendecke1-54/+69
2009-04-06Convert cli_negprot to tevent_reqVolker Lendecke1-36/+68
2009-04-06Convert cli_session_setup_guest to tevent_reqVolker Lendecke1-39/+69
2009-04-06Convert cli_trans to tevent_reqVolker Lendecke1-382/+272
2009-04-06Convert cli_echo to tevent_reqVolker Lendecke1-79/+66
2009-04-06Add new async libsmb infrastructureVolker Lendecke2-0/+777
I know this is just yet another iteration, but I like this one much better than the one that exists right now :-) It will do trans and echo requests without a _recv helper and without unnecessary memcpy().
2009-04-05Remove async_req dependency from cli_pull_transVolker Lendecke1-23/+25
2009-03-31Fix an uninitialized variable valgrind errorVolker Lendecke1-2/+2
Signed-off-by: Stefan Metzmacher <metze@samba.org>
2009-03-27[Bug 6228] SMBC_open_ctx failure due to path resolve failure doesn't set errnoDerrell Lipman3-1/+15
Fixed. It turns out there were a number of places where cli_resolve_path() was called and the error path upon that function failing did not set errno. There were a couple of places the failure handling code did set errno to ENOENT, so I made them all consistent, although I think better errno choices for this condition exist, e.g. EHOSTUNREACH. Derrell
2009-03-24s3: parse_packet can return NULL which is then dereferenced in ↵Tim Prouty1-0/+2
match_mailslot_name
2009-03-24Fix two memleaks in the encryption codeVolker Lendecke1-1/+2
ntlmssp_seal_packet creates its own signature data blob, which we then have to free. Jeremy, please check and merge appropriately (Yes, I'm asking you to do the janitor work, I want you to *look* at this :-)) Volker
2009-03-24s3:dsgetdcname: use parentheses in if condition to make negation clearBjörn Jacke1-1/+1
Signed-off-by: Günther Deschner <gd@samba.org>
2009-03-23s3:libsmb: use new simplified smb_signing code for the client sideStefan Metzmacher5-686/+204
We store the seqnum/mid mapping in the cli_request structure for async requests and in the cli_state structure for sync calls. We skip the signing check for oplock requests while waiting for async requests coming in. metze
2009-03-23s3:smbd: use new simplified snb_signing code in the serverStefan Metzmacher1-333/+0
We keep the seqnum/mid mapping in the smb_request structure. This also moves one global variable into the smbd_server_connection struct. metze
2009-03-23s3:libsmb: add a much simplified smb_siging infrastructureStefan Metzmacher1-0/+370
It's the job of the caller to maintain the seqnum/mid mapping. Hopefully we can use this code in s4 later too. metze
2009-03-23s3:libsmb: rename smb_signing.c => clisigning.cStefan Metzmacher1-0/+0
This prepares a large simplification of the smb_signing code metze
2009-03-23Fix connect to port 139 only -- thanks gd for bugging me :-)Volker Lendecke1-4/+3
2009-03-20s3-krb5: Fix Coverity #722 (RESOURCE_LEAK).Günther Deschner1-12/+18
Guenther
2009-03-20Fix crash in async_smb.cBo Yang1-3/+6
2009-03-19s3:libsmb: always create bytes array in cli_trans codeStefan Metzmacher1-5/+14
Otherwise we return NO_MEMORY without a reason for fragmented trans requests, as talloc_append_blob() returns buf if we append a 0 length blob. When we pass buf = NULL we'll get back NULL and then assume NO_MEMORY... metze
2009-03-19s3:libsmb: fix smb signing for fragmented trans/trans2/nttrans requestsStefan Metzmacher1-23/+7
Before we send the secondary requests we need to remove the old mid=>seqnum mapping and reset cli->mid and make the new mid=>seqnum mapping "persistent". The bug we had in cli_send_trans was this: The first cli_send_smb() incremented cli->mid and the secondary requests used the incremented mid, but as cli->outbuf still had the correct mid, we send the correct mid to the server. The real problem was that the cli_send_smb() function stored the seqnum under the wrong mid. cli_send_nttrans() was totally broken and now follows the same logic as cli_send_trans(). The good thing is that in practice the problem is unlikely to happen, because max_xmit is large enough to avoid secondary requests. metze
2009-03-18Allow DFS client paths to work when POSIX pathnames have beenJeremy Allison1-2/+12
selected (we need to path in pathname /that/look/like/this). Jeremy.
2009-03-18s3: remove POLICY_HND.Günther Deschner2-7/+7
Guenther
2009-03-17Remove the global "struct cm_cred_struct" and associated calls, makeJeremy Allison6-168/+148
callers pass in a struct user_auth_info * instead. This commit causes smbc_set_credentials() to print out a message telling callers to use smbc_set_credentials_with_fallback() instead, as smbc_set_credentials() has a broken API (no SMBCCTX * pointer). No more global variables used in the connection manager API for client dfs calls. Jeremy.
2009-03-16Convert open_socket_out_defer to tevent_reqVolker Lendecke1-22/+37
2009-03-15Fix a malloc/talloc mismatch when cli_initialise() failsVolker Lendecke1-3/+2
2009-03-13Remove pwd_cache.c, it was doing nothing. Make user_name, domain, andJeremy Allison4-78/+95
password talloc'ed strings within the cli_struct. Jeremy.
2009-03-12Remove the static "struct client_connection" mess which is part ofJeremy Allison3-113/+82
the problem that stops libsmbclient being thread safe. Subsidiary DFS connections are now hung off a list inside the cli_state struct. Much more to do in order to get libsmbclient to thread safety, but this is a good start. Jeremy.
2009-03-12Revert "s3:libsmb: add an option to cli_push to let the caller provide the ↵Stefan Metzmacher1-25/+8
buffers" This reverts commit 9579a6f193f570e4ce2af80f4aac7c2f25ae5b22. It's confusing to have a boolean to alter the behavior of cli_push and as the new feature isn't used yet I revert it. We can readd a extra function later. metze
2009-03-10s3:libsmb: add an option to cli_push to let the caller provide the buffersStefan Metzmacher1-8/+25
metze
2009-03-10s3:libsmb: only treat a return 0 as end of fileStefan Metzmacher1-4/+1
metze
2009-03-10s3:libsmb: fix a lot of cli_push() bugsStefan Metzmacher1-95/+107
There were the following problems: 1.) if window_size was a multiple of the chunk_size, we silently dropped the last truncated chunk. 2.) if window_size was 0 pushed only the first chunk to the server and silently dropped the rest. 3.) we had only transferred state->num_reqs writes, even if there would be more data to send. metze
2009-03-07Fix a smbclient segfault against security=share serversVolker Lendecke1-3/+10
2009-03-07Fix some nonempty blank linesVolker Lendecke1-22/+22
2009-03-06s3:libsmb: merge cli_setup_signing_state() into cli_initialise_ex()Stefan Metzmacher1-27/+25
metze
2009-03-06s3:libsmb: remove cli_setup_signing_state() and add struct cli_state ↵Stefan Metzmacher3-7/+10
*cli_initialise_ex() This prepares the next changes. metze
2009-03-06s3:signing: the seqnum should only be decremented by 1 for ntcancel requestsStefan Metzmacher1-2/+4
[MS-SMB] 3.3.5.1 Receiving Any Message says that the seqnum is incremented by only for ntcancel requests for any other request it's by incremented by 2, even if it doesn't expect a response. metze
2009-03-06s3:libsmb: smb signing works the same for extented and non-extended securityStefan Metzmacher1-5/+18
This is only cosmetic, but it makes it easier to understand. metze
2009-02-24Convert name_mangle() to use tallocVolker Lendecke2-8/+32
2009-02-23More warning fixes for Solaris.Jeremy Allison1-1/+1
Jeremy.
2009-02-23Make char* parameters constDerrell Lipman1-16/+6
- Use const in function signatures whenever appropriate, to help prevent errant scribbling on users' buffers. smbc_set_credentials() always acted as if its formal parameters were const char *, and changing the formal declaration to specify that should not cause any change to the ABI. It is still allowable to pass a writable buffer to a function which specifies that it will not write to the buffer. I'm making this change only in master. Derrell
2009-02-21Remove the static "chal" from ntlmssp.c:get_challenge()Volker Lendecke1-7/+5