summaryrefslogtreecommitdiff
path: root/source3/rpc_client
AgeCommit message (Collapse)AuthorFilesLines
2009-11-08Revert "s3: Do not reference ndr_table_<pipe> in the cli_ routines directly"Volker Lendecke1-18/+3
This reverts commit daa964013bc5d036f4da571ce22c0052ef40943a.
2009-11-08s3: Do not reference ndr_table_<pipe> in the cli_ routines directlyVolker Lendecke1-3/+18
2009-11-08s3: Do not directly reference the ndr_table_* in rpcclientVolker Lendecke1-0/+14
2009-11-07s3: Do the printing for DEBUGLEVEL>=10 centrallyVolker Lendecke1-1/+12
12 insertions(+), 10651 deletions(-) I think that says it all :-)
2009-11-07s3: Register the ndr_interfaces dynamicallyVolker Lendecke1-37/+110
2009-11-07s3: Get rid of a NULL terminatorVolker Lendecke1-2/+1
2009-11-07s3: Get rid of explicit pipe namesVolker Lendecke1-49/+54
2009-11-07s3: get_pipe_name_from_iface -> get_pipe_name_from_syntaxVolker Lendecke2-9/+11
2009-11-06s3-kerberos: modify cli_krb5_get_ticket to take a new impersonate_princ_s arg.Günther Deschner1-1/+1
Guenther
2009-11-03s3: Remove debug_ctx()Volker Lendecke1-17/+17
smbd just crashed on me: In a debug message I called a routine preparing a string that itself used debug_ctx. The outer routine also used it after the inner routine had returned. It was still referencing the talloc context that the outer debug_ctx() had given us, which the inner DEBUG had already freed.
2009-10-16s3-netlogon: fix updating trust accout passwords with downlevel domains.Günther Deschner1-2/+2
When choosing the netlogon password set function, make sure to look at the *negotiated* flags in the cli->dc state, not the ones we start the negotiation with. Guenther
2009-10-13s3: use enum netr_SchannelType all over the place.Günther Deschner2-2/+2
Guenther
2009-10-13s3-netlogon: pass down account name to remote password set functions.Günther Deschner1-1/+2
Guenther
2009-10-08s3/s4 - Adapt the IDL changes on various locationsMatthias Dieter Wallnöfer1-1/+1
2009-10-06s3-netlogon: setup NETLOGON credential chain in ↵Günther Deschner1-13/+14
rpccli_netlogon_set_trust_password() only when needed. Guenther
2009-10-05Revert "s3: Attempt to fix machine password change"Volker Lendecke1-34/+17
This reverts commit 20a8ea91e10af167067cc794a251265aaf489e75. Ooops, this should not have been committed.
2009-10-05s3: Attempt to fix machine password changeVolker Lendecke1-17/+34
2009-10-05s3: Remove a scary error message -- talloc_move can not fail :-)Volker Lendecke1-5/+0
Signed-off-by: Günther Deschner <gd@samba.org>
2009-10-01s3-registry: move rpccli_winreg_Connect to the only file it belongs.Günther Deschner1-62/+0
Guenther
2009-09-25s3:rpc_client: don't randomly fragment rpc pdu's in developer modeStefan Metzmacher1-2/+2
This is really confusing and also breaks against windows, as it doesn't accept fragmented bind requests. metze
2009-09-18s3-rpc_client: fix non initialized structure in rpccli_lsa_lookup_sids_noalloc.Günther Deschner1-0/+2
Guenther
2009-09-17spnego: share spnego_parse.Günther Deschner1-0/+1
Guenther
2009-09-16libcli/auth: rewrite schannel sign/seal code to be more genericStefan Metzmacher1-17/+24
This prepares support for HMAC-SHA256/AES. metze
2009-09-16s3-dcerpc: remove more obsolete or duplicate headers.Günther Deschner1-22/+22
Guenther
2009-09-16s3-schannel: add dump_NL_AUTH_SIGNATURE.Günther Deschner1-20/+3
Guenther
2009-09-16schannel: fully share schannel sign/seal between s3 and 4.Günther Deschner1-41/+64
Guenther
2009-09-16s3-schannel: fix blob length when pulling off a NL_AUTH_SIGNATURE inGünther Deschner1-1/+1
cli_pipe_verify_schannel(). Guenther
2009-09-15s3-dcerpc: fix remaining old auth level constants.Günther Deschner1-6/+6
Guenther
2009-09-15s3-dcerpc: remove unsed auth type defines as seen on the wire.Günther Deschner1-5/+5
Guenther
2009-09-15s3-dcerpc: use dcerpc_AuthLevel and remove duplicate set of flags.Günther Deschner1-35/+35
Guenther
2009-09-14s3-rpc_client: add rpccli_lsa_lookup_sids3 wrapper.Günther Deschner1-17/+74
Guenther
2009-09-14s3-rpc_client: add rpccli_lsa_lookup_names4 wrapper.Günther Deschner1-23/+75
Guenther
2009-09-11s3-rpc_client: add dcerpc_transport_t to cli_rpc_pipe_open_schannel().Günther Deschner1-3/+6
Guenther
2009-09-11s3-rpc_client: add dcerpc_transport_t to cli_rpc_pipe_open_spnego_ntlmssp ↵Günther Deschner1-2/+8
and cli_rpc_pipe_open_ntlmssp. Guenther
2009-09-11s3-rpc_client: add cli_rpc_pipe_open_noauth_transport.Günther Deschner1-14/+26
Guenther
2009-09-11s3-schannel: use NL_AUTH_SIGNATURE for schannel sign & seal (client & server).Günther Deschner1-10/+29
Guenther
2009-09-11s3-rpc_client: add enum dcerpc_transport_t to rpc_cli_transport struct.Günther Deschner1-0/+8
Guenther
2009-09-08s3-rpc_client: use NL_AUTH_MESSAGE in create_schannel_auth_rpc_bind_req().Günther Deschner1-7/+24
Guenther
2009-09-08s3-schannel: Fix Bug #6697. Interdomain trusts with Windows 2008 R2 DCs.Günther Deschner1-1/+1
The Schannel verifier (aka NL_AUTH_SIGNATURE) structure (32 byte) sent from a W2k8r2 DC is passed in a buffer with the size of a NL_AUTH_SHA2_SIGNATURE (56 byte). We should just ignore the remaining 12 zeroed bytes and proceed. Guenther
2009-07-31s3:rpc_client: add dispatch_send/recv() to struct rpc_pipe_clientStefan Metzmacher1-0/+8
metze
2009-07-28Added prefer_ipv4 bool parameter to resolve_name().Jeremy Allison1-1/+1
W2K3 DC's can have IPv6 addresses but won't serve krb5/ldap or cldap on those addresses. Make sure when we're asking for DC's we prefer IPv4. If you have an IPv6-only network this prioritizing code will be a no-op. And if you have a mixed network then you need to prioritize IPv4 due to W2K3 DC's. Jeremy.
2009-07-27Lift the event loop in rpc_api_pipe_req() one level into cli_do_rpc_ndrVolker Lendecke2-64/+115
2009-07-05Remove "typedef struct ndr_syntax_id RPC_IFACE;"Volker Lendecke1-8/+9
2009-07-03s3-spoolss: add rpccli_spoolss_getprinterdriver convenience wrapper.Günther Deschner1-0/+50
Guenther
2009-06-25s3-netlogon: remove remaining netlogon init functions.Günther Deschner2-122/+39
Guenther
2009-06-25s3-netlogon: remove init_netr_SamInfo functions.Günther Deschner1-117/+0
Guenther
2009-05-18Fix broken pipe handlingVolker Lendecke1-2/+2
Metze is right: If we have *any* error at the socket level, we just can not continue. Also, apply some defensive programming: With this async stuff someone else might already have closed the socket.
2009-05-18Fix a type-punned warningVolker Lendecke1-1/+1
2009-05-19s3: tevent_req_poll() loops forever when pipe is brokenBo Yang1-1/+20
Signed-off-by: Bo Yang <boyang@samba.org>
2009-04-30Cause cli_close to return an NTSTATUS.Jeremy Allison1-4/+1
Jeremy.