Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2009-04-06 | Add a bad hack to enable level 2 oplocks in torture_open_connection_share | Volker Lendecke | 1 | -0/+4 | |
2009-04-06 | Make cli_oplock_ack async | Volker Lendecke | 1 | -29/+94 | |
2009-04-06 | Add async oplock waiter | Volker Lendecke | 1 | -1/+101 | |
2009-04-06 | Never hand out 0xffff as a mid | Volker Lendecke | 1 | -1/+1 | |
This is used for oplock replies | |||||
2009-04-06 | Remove async_req based async libsmb infrastructure | Volker Lendecke | 1 | -869/+0 | |
2009-04-06 | Convert cli_open to tevent_req | Volker Lendecke | 1 | -46/+102 | |
2009-04-06 | Convert cli_close to tevent_req | Volker Lendecke | 1 | -20/+66 | |
2009-04-06 | Streamline cli_push sync wrapper | Volker Lendecke | 1 | -9/+18 | |
2009-04-06 | Convert cli_write_andx to tevent_req | Volker Lendecke | 1 | -37/+88 | |
2009-04-06 | Streamline cli_pull sync wrapper | Volker Lendecke | 1 | -9/+18 | |
2009-04-06 | Convert cli_read_andx to tevent_req | Volker Lendecke | 1 | -108/+150 | |
2009-04-06 | Convert cli_ntcreate to tevent_req | Volker Lendecke | 1 | -38/+68 | |
2009-04-06 | Convert cli_tcon_andx to tevent_req | Volker Lendecke | 1 | -54/+69 | |
2009-04-06 | Convert cli_negprot to tevent_req | Volker Lendecke | 1 | -36/+68 | |
2009-04-06 | Convert cli_session_setup_guest to tevent_req | Volker Lendecke | 1 | -39/+69 | |
2009-04-06 | Convert cli_trans to tevent_req | Volker Lendecke | 1 | -382/+272 | |
2009-04-06 | Convert cli_echo to tevent_req | Volker Lendecke | 1 | -79/+66 | |
2009-04-06 | Add new async libsmb infrastructure | Volker Lendecke | 2 | -0/+777 | |
I know this is just yet another iteration, but I like this one much better than the one that exists right now :-) It will do trans and echo requests without a _recv helper and without unnecessary memcpy(). | |||||
2009-04-05 | Remove async_req dependency from cli_pull_trans | Volker Lendecke | 1 | -23/+25 | |
2009-03-31 | Fix an uninitialized variable valgrind error | Volker Lendecke | 1 | -2/+2 | |
Signed-off-by: Stefan Metzmacher <metze@samba.org> | |||||
2009-03-27 | [Bug 6228] SMBC_open_ctx failure due to path resolve failure doesn't set errno | Derrell Lipman | 3 | -1/+15 | |
Fixed. It turns out there were a number of places where cli_resolve_path() was called and the error path upon that function failing did not set errno. There were a couple of places the failure handling code did set errno to ENOENT, so I made them all consistent, although I think better errno choices for this condition exist, e.g. EHOSTUNREACH. Derrell | |||||
2009-03-24 | s3: parse_packet can return NULL which is then dereferenced in ↵ | Tim Prouty | 1 | -0/+2 | |
match_mailslot_name | |||||
2009-03-24 | Fix two memleaks in the encryption code | Volker Lendecke | 1 | -1/+2 | |
ntlmssp_seal_packet creates its own signature data blob, which we then have to free. Jeremy, please check and merge appropriately (Yes, I'm asking you to do the janitor work, I want you to *look* at this :-)) Volker | |||||
2009-03-24 | s3:dsgetdcname: use parentheses in if condition to make negation clear | Björn Jacke | 1 | -1/+1 | |
Signed-off-by: Günther Deschner <gd@samba.org> | |||||
2009-03-23 | s3:libsmb: use new simplified smb_signing code for the client side | Stefan Metzmacher | 5 | -686/+204 | |
We store the seqnum/mid mapping in the cli_request structure for async requests and in the cli_state structure for sync calls. We skip the signing check for oplock requests while waiting for async requests coming in. metze | |||||
2009-03-23 | s3:smbd: use new simplified snb_signing code in the server | Stefan Metzmacher | 1 | -333/+0 | |
We keep the seqnum/mid mapping in the smb_request structure. This also moves one global variable into the smbd_server_connection struct. metze | |||||
2009-03-23 | s3:libsmb: add a much simplified smb_siging infrastructure | Stefan Metzmacher | 1 | -0/+370 | |
It's the job of the caller to maintain the seqnum/mid mapping. Hopefully we can use this code in s4 later too. metze | |||||
2009-03-23 | s3:libsmb: rename smb_signing.c => clisigning.c | Stefan Metzmacher | 1 | -0/+0 | |
This prepares a large simplification of the smb_signing code metze | |||||
2009-03-23 | Fix connect to port 139 only -- thanks gd for bugging me :-) | Volker Lendecke | 1 | -4/+3 | |
2009-03-20 | s3-krb5: Fix Coverity #722 (RESOURCE_LEAK). | Günther Deschner | 1 | -12/+18 | |
Guenther | |||||
2009-03-20 | Fix crash in async_smb.c | Bo Yang | 1 | -3/+6 | |
2009-03-19 | s3:libsmb: always create bytes array in cli_trans code | Stefan Metzmacher | 1 | -5/+14 | |
Otherwise we return NO_MEMORY without a reason for fragmented trans requests, as talloc_append_blob() returns buf if we append a 0 length blob. When we pass buf = NULL we'll get back NULL and then assume NO_MEMORY... metze | |||||
2009-03-19 | s3:libsmb: fix smb signing for fragmented trans/trans2/nttrans requests | Stefan Metzmacher | 1 | -23/+7 | |
Before we send the secondary requests we need to remove the old mid=>seqnum mapping and reset cli->mid and make the new mid=>seqnum mapping "persistent". The bug we had in cli_send_trans was this: The first cli_send_smb() incremented cli->mid and the secondary requests used the incremented mid, but as cli->outbuf still had the correct mid, we send the correct mid to the server. The real problem was that the cli_send_smb() function stored the seqnum under the wrong mid. cli_send_nttrans() was totally broken and now follows the same logic as cli_send_trans(). The good thing is that in practice the problem is unlikely to happen, because max_xmit is large enough to avoid secondary requests. metze | |||||
2009-03-18 | Allow DFS client paths to work when POSIX pathnames have been | Jeremy Allison | 1 | -2/+12 | |
selected (we need to path in pathname /that/look/like/this). Jeremy. | |||||
2009-03-18 | s3: remove POLICY_HND. | Günther Deschner | 2 | -7/+7 | |
Guenther | |||||
2009-03-17 | Remove the global "struct cm_cred_struct" and associated calls, make | Jeremy Allison | 6 | -168/+148 | |
callers pass in a struct user_auth_info * instead. This commit causes smbc_set_credentials() to print out a message telling callers to use smbc_set_credentials_with_fallback() instead, as smbc_set_credentials() has a broken API (no SMBCCTX * pointer). No more global variables used in the connection manager API for client dfs calls. Jeremy. | |||||
2009-03-16 | Convert open_socket_out_defer to tevent_req | Volker Lendecke | 1 | -22/+37 | |
2009-03-15 | Fix a malloc/talloc mismatch when cli_initialise() fails | Volker Lendecke | 1 | -3/+2 | |
2009-03-13 | Remove pwd_cache.c, it was doing nothing. Make user_name, domain, and | Jeremy Allison | 4 | -78/+95 | |
password talloc'ed strings within the cli_struct. Jeremy. | |||||
2009-03-12 | Remove the static "struct client_connection" mess which is part of | Jeremy Allison | 3 | -113/+82 | |
the problem that stops libsmbclient being thread safe. Subsidiary DFS connections are now hung off a list inside the cli_state struct. Much more to do in order to get libsmbclient to thread safety, but this is a good start. Jeremy. | |||||
2009-03-12 | Revert "s3:libsmb: add an option to cli_push to let the caller provide the ↵ | Stefan Metzmacher | 1 | -25/+8 | |
buffers" This reverts commit 9579a6f193f570e4ce2af80f4aac7c2f25ae5b22. It's confusing to have a boolean to alter the behavior of cli_push and as the new feature isn't used yet I revert it. We can readd a extra function later. metze | |||||
2009-03-10 | s3:libsmb: add an option to cli_push to let the caller provide the buffers | Stefan Metzmacher | 1 | -8/+25 | |
metze | |||||
2009-03-10 | s3:libsmb: only treat a return 0 as end of file | Stefan Metzmacher | 1 | -4/+1 | |
metze | |||||
2009-03-10 | s3:libsmb: fix a lot of cli_push() bugs | Stefan Metzmacher | 1 | -95/+107 | |
There were the following problems: 1.) if window_size was a multiple of the chunk_size, we silently dropped the last truncated chunk. 2.) if window_size was 0 pushed only the first chunk to the server and silently dropped the rest. 3.) we had only transferred state->num_reqs writes, even if there would be more data to send. metze | |||||
2009-03-07 | Fix a smbclient segfault against security=share servers | Volker Lendecke | 1 | -3/+10 | |
2009-03-07 | Fix some nonempty blank lines | Volker Lendecke | 1 | -22/+22 | |
2009-03-06 | s3:libsmb: merge cli_setup_signing_state() into cli_initialise_ex() | Stefan Metzmacher | 1 | -27/+25 | |
metze | |||||
2009-03-06 | s3:libsmb: remove cli_setup_signing_state() and add struct cli_state ↵ | Stefan Metzmacher | 3 | -7/+10 | |
*cli_initialise_ex() This prepares the next changes. metze | |||||
2009-03-06 | s3:signing: the seqnum should only be decremented by 1 for ntcancel requests | Stefan Metzmacher | 1 | -2/+4 | |
[MS-SMB] 3.3.5.1 Receiving Any Message says that the seqnum is incremented by only for ntcancel requests for any other request it's by incremented by 2, even if it doesn't expect a response. metze | |||||
2009-03-06 | s3:libsmb: smb signing works the same for extented and non-extended security | Stefan Metzmacher | 1 | -5/+18 | |
This is only cosmetic, but it makes it easier to understand. metze |