summaryrefslogtreecommitdiff
path: root/source3
AgeCommit message (Collapse)AuthorFilesLines
2009-09-11s3-rpcclient: add ncacn transport handling for rpcclient.Günther Deschner1-5/+88
Guenther
2009-09-11s3-rpc_client: add enum dcerpc_transport_t to rpc_cli_transport struct.Günther Deschner2-0/+10
Guenther
2009-09-10Fix bug 6707 - 3.4.1 segfault in parsing configs.Marc Aurele La France1-4/+4
Fixes an occasional segfault caused by an out-of-bounds reference in config file parsing.
2009-09-09Fix compile in a usually non-selected define.Jeremy Allison1-1/+1
Jeremy.
2009-09-09s3:smbd: Add a "hidden" parameter "share:fake_fscaps"Volker Lendecke1-0/+3
This is needed to support some special app I've just come across where I had to set the SPARSE_FILES bit (0x40) to make it work against Samba at all. There might be others to fake. This is definitely a "Don't touch if you don't know what you're doing" thing, so I decided to make this an undocumented parametric parameter. I know this sucks, so feel free to beat me up on this. But I don't think it will hurt.
2009-09-09s3-winbindd: Fix Bug #6700: Use dns domain name when needing to guess server ↵Günther Deschner1-1/+1
principal. Patch from Robert LeBlanc <robert@leblancnet.us>. Thanks! Guenther
2009-09-08s3-nterr: add NT_STATUS_RPC_NT_CALL_FAILED.Günther Deschner1-0/+1
Guenther
2009-09-08s3:smbd: Fix bug 6690, wrong error checkAndrew Klosterman1-1/+1
2009-09-08s3: remove unused RPC_AUTH_SCHANNEL_NEG struct and parsing functions.Günther Deschner3-55/+0
Guenther
2009-09-08s3-rpc_server: use NL_AUTH_MESSAGE in pipe_schannel_auth_bind().Günther Deschner1-6/+23
Guenther
2009-09-08s3-rpc_client: use NL_AUTH_MESSAGE in create_schannel_auth_rpc_bind_req().Günther Deschner1-7/+24
Guenther
2009-09-08schannel: add NL_AUTH_MESSAGE and both NL_AUTH_SIGNATURE structs.Günther Deschner1-0/+1
These actually belong netlogon but we for now want to keep netlogon as a security providor separate. Guenther
2009-09-08s3-schannel: Fix Bug #6697. Interdomain trusts with Windows 2008 R2 DCs.Günther Deschner2-2/+2
The Schannel verifier (aka NL_AUTH_SIGNATURE) structure (32 byte) sent from a W2k8r2 DC is passed in a buffer with the size of a NL_AUTH_SHA2_SIGNATURE (56 byte). We should just ignore the remaining 12 zeroed bytes and proceed. Guenther
2009-09-07Add read() to socketwrapper. Metze please check.Jeremy Allison1-1/+1
Jeremy.
2009-09-06Fix bug 6673 - smbpasswd does not work with "unix password sync = yes".Jeremy Allison5-22/+30
Revert change from 3.3 -> 3.4 with read_socket_with_timeout changed from sys_read() to sys_recv(). read_socket_with_timeout() is called with non-fd's (with a pty in chgpasswd.c and with a disk file in lib/dbwrap_file.c via read_data()). recv works for the disk file, but not the pty. Change the name of read_socket_with_timeout() to read_fd_with_timeout() to make this clear (and add comments). Jeremy.
2009-09-07s3:winbind: Convert WINBINDD_SET_HWM to the new APIVolker Lendecke15-128/+454
2009-09-07s3:winbind: Convert WINBINDD_REMOVE_MAPPING to the new APIVolker Lendecke15-108/+488
2009-09-07s3:winbind: Convert WINBINDD_SET_MAPPING to the new APIVolker Lendecke15-106/+538
2009-09-07s3:winbind: Convert WINBINDD_CHECK_MACHACC to the new APIVolker Lendecke15-76/+451
2009-09-07s3:smbd: Add the ntstatus to the smb_panic in share_mode_lock_destructorVolker Lendecke1-2/+18
This might help finding why bug 6518 happens
2009-09-06Tell newbie devs about ./configure.developerRusty Russell1-1/+1
Enhances the outputs in autogen.sh for both s3 and s4. Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2009-09-05Check we read off the compelte event from inotifySimo Sorce1-2/+8
The kernel may return a short read, so we must use read_data() to make sure we read off the full buffer. If somethign bad happens we also need to kill the inotify watch because the filedescriptor will return out of sync structures if we read only part of the data.
2009-09-05Save and report the correct errno value.Simo Sorce1-8/+12
2009-09-05s3:winbind: Use fstr_sprintf, it is simpler than talloc_asprintf->fstrcpyVolker Lendecke1-8/+5
2009-09-05s3:winbind: Remove pointless <cond> ? true : false;Volker Lendecke1-4/+4
2009-09-05s3:winbind: Make the pam_auth subfunctions staticVolker Lendecke2-18/+9
2009-09-05s3:libsmb: Convert (state->received) to (state->received != 0)Volker Lendecke1-1/+1
This confused me for a second, this should not happen a second time :-)
2009-09-04s3:winbind: Fix Coverity ID 933: FORWARD_NULLVolker Lendecke1-0/+1
2009-09-04s3:smbd: Fix Coverity ID 937, REVERSE_INULLVolker Lendecke1-2/+2
2009-09-04s3:winbind: Fix Coverity ID 940: Resource LeakVolker Lendecke1-0/+1
2009-09-04s3-ntlm_auth: fix two segfaults in diagnostics mode.Günther Deschner1-2/+2
Guenther
2009-09-03Hopefully last part of the fix for bug 6651 - smbd SIGSEGV when breaking ↵Jeremy Allison1-2/+2
oplocks. This one is subtle. There is a race condition where a signal can be queued for oplock break, and then the file can be closed by the client before the signal can be processed. Currently if this occurs we panic (we can't match an incoming signal fd with a fsp pointer). Simply log the error (at debug level 10 right now, might be too much) and then return without processing the break request. It looks like there is another race condition with this fix, but here's why it won't happen. If the signal was pending (caused by a kernel oplock break from a local file open), and the client closed the file and then re-opened another file which happened to use the same file descriptor as the file just closed, then theoretically the oplock break requests could be processed on the wrong fd. Here's why this should be very rare.. Processing a pending signal always take precedence over an incoming network request, so as long as the client close request is non-chained then the break signal should always be harmlessly processed *before* the open can be called. If the open is chained onto the close, and the fd on the new open is the same as the old closed fd, then it's possible this race will occur. However, all that will happen is that we'll lose the oplock on this file. A shame, but not a fatal event. Jeremy.
2009-09-03s3:libsmb: Attempt to fix bug 6665Volker Lendecke1-0/+6
Before the async libsmb rewrites, we sent tid==0 on negprot. With the rewrite, we send 0xffff. This *should* not matter, but this is one difference in the sniffs I see.
2009-09-02s3-net: allow to exit "net rpc sh" with "q" as well.Günther Deschner1-1/+3
Guenther
2009-09-02s3-netlogon: use WERRORs in NETLOGON_INFO structures.Günther Deschner1-60/+20
Guenther
2009-09-02Do not redefine struprMatt Kraai2-0/+3
Signed-off-by: Günther Deschner <gd@samba.org>
2009-09-02s3-pdb_ldap: Fix bug #4296: Clean up group membership while deleting a user.Günther Deschner1-0/+46
Note that this only is tried with editposix=yes. Guenther
2009-09-02s3-netlogon: implement _netr_ServerPasswordSet2.Günther Deschner1-11/+55
Guenther
2009-09-02s3-netlogon: rework _netr_ServerPasswordSet.Günther Deschner1-62/+123
Guenther
2009-09-02s3-netlogon: implement _netr_LogonSamLogonWithFlags().Günther Deschner1-18/+40
Guenther
2009-09-02s3-smbpasswd: Fix Bug #6584: allow DOM\user when changing passwords remotely.Simo Sorce1-3/+16
Signed-off-by: Günther Deschner <gd@samba.org>
2009-08-30s3: Fix libtalloc so versionSimo Sorce1-1/+1
2009-08-30s3:winbind: Fix bug 5626Volker Lendecke3-29/+23
Apparently the AIX compiler can't deal with sizeless array declarations
2009-08-30w3:winbind: Convert WINBINDD_ALLOCATE_GID to the new APIVolker Lendecke16-40/+474
2009-08-30w3:winbind: Convert WINBINDD_ALLOCATE_UID to the new APIVolker Lendecke16-40/+488
2009-08-29s3:winbind: Convert WINBINDD_LIST_GROUPS to the new APIVolker Lendecke8-317/+215
2009-08-29s3:winbind: Convert WINBINDD_LIST_USERS to the new APIVolker Lendecke5-7/+214
2009-08-29s3:nsstest: Fix a very confusing behaviour in nsstestVolker Lendecke1-2/+2
Testing getgrent I thought I get the offset calculations wrong whereas it was only nsstest printing stuff with spaces...
2009-08-29s3:winbind: add a fake NDR winbind cache validatorVolker Lendecke1-0/+11
2009-08-29s3:winbind: Convert the getgrent functions to the new APIVolker Lendecke7-1038/+335