summaryrefslogtreecommitdiff
path: root/source3
AgeCommit message (Collapse)AuthorFilesLines
2010-06-07s3:rpc fix potential out of bound memory accessSimo Sorce1-1/+1
memcpy copies memory unconditionally, we are passing "" in some cases here. Use strncpy which will stop reading from src if the null byte is found and will fill with nulls the destination.
2010-06-07s3: fix build on platforms without st_blocks and st_blksize stat struct membersBjörn Jacke1-0/+9
This fixes bug 7474.
2010-06-07s3:auth add hooks to indicate if signing or sealing is desired with NTLMSSPAndrew Bartlett3-0/+33
This allows the right hooks to be called in GENSEC when s3compat implements the auth_ntlmssp interface. Otherwise, we can't do the signing or sealing as we have not negoitated it's use. Andrew Bartlett
2010-06-07s3:auth Change auth_ntlmssp_server_info API to return NTSTATUSAndrew Bartlett5-13/+18
It's nicer to have an NTSTATUS return, and in s3compat there may be a reason other than 'no memory' why this can fail. Andrew Bartlett
2010-06-07s3:named pipe proxy Improve error messages when named pipes fail to forwardAndrew Bartlett1-3/+6
I hope this helps the next person who needs to debug this. Andrew Bartlett
2010-06-07s3:smbd Give the kerberos session key a parentAndrew Bartlett1-0/+2
I can't see what would free this, so this should prevent a memory leak. Andrew Bartlett
2010-06-07s3:smbd Fix segfault if register_existing_vuid() failsAndrew Bartlett1-4/+12
The register_existing_vuid() call will handle both the ntlmssp_end and vuid invalidation internally, so we don't want to do it again. Andrew Bartlett
2010-06-07s3:auth Rename user_info->domain -> user_info->mapped.domain_nameAndrew Bartlett10-38/+37
This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
2010-06-07s3:auth Rename user_info->client_domain -> user_info->client.domain_nameAndrew Bartlett6-9/+9
This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
2010-06-07s3:auth fix header comment for internal_username -> mapped.account_nameAndrew Bartlett1-1/+1
2010-06-07s3:auth Rename user_info->internal_username -> user_info->mapped.account_nameAndrew Bartlett12-31/+31
This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
2010-06-07s3:auth Rename user_info->smb_name -> user_info->client.account_nameAndrew Bartlett11-30/+32
This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
2010-06-07s3:auth make sure the primary group sid is usableSimo Sorce1-13/+30
This function was previously performed under the cover by converting back and forth from info3 to samu and then later from samu to info3. Since we now shortcircuit that in some cases, check explicitly using get_primary_group_sid() Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-06-07s3:auth return the full passwd struct from check_accountSimo Sorce1-12/+6
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-06-07s3:passdb Export function to calculate the proper primary group sidSimo Sorce3-86/+136
Don't keep it buried in passdb, this function need to be available for use in places where we do not want to construct an artificial samu struct just to play tricks. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-06-07s3:auth remove unused structure memberSimo Sorce3-110/+2
sids are now completely handled using info3, remove dead code that fills server info sids and the structure members themselves Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-06-07s3:auth create nt token from info3 directlySimo Sorce3-38/+167
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-06-07s3:auth handle unix domain sids in samuSimo Sorce5-39/+143
When we generate a user out of thin air we may end up adding sids that are not part of the sam domain (unix domain sids). Handle the case and preserve these sids as extra sids. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-06-07s3:auth set the resolved user sid in the fake sam accountSimo Sorce1-0/+3
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-06-07s3:auth check the user is valid firstSimo Sorce1-43/+39
It makes no sense to go through all the hoops to build samu and convert it to info3, just to discard them later if the user was not valid. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-06-07s3:auth make sure we set the right usernameSimo Sorce1-0/+5
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-06-07s3-waf: Build rpc_server/srv_spoolss_util.c too.Andreas Schneider1-0/+1
Signed-off-by: Günther Deschner <gd@samba.org>
2010-06-07s3-lsa: Fix static list of luids in our privileges implementation.Günther Deschner1-9/+9
The high/low order changed while moving to LSA defines. Found by torture test. Guenther
2010-06-07s3-privileges: use LUID defines from lsa IDL.Günther Deschner5-36/+26
Guenther
2010-06-07Fix bug with incorrect flag values for inherited ace in some cases.Matthew McGillis1-0/+5
2010-06-04Fix a long-standing bug with async io that would only be triggered by SMB2.Jeremy Allison2-5/+129
On normal or shutdown close, ensure we wait for any pending IO to complete before returning. Implement a blocking aio_suspend inside vfs_aio_fork.c. These changes pass make test when the aio_fork module is used by default on the test shares. Jeremy.
2010-06-05s3:build: add shared lib flag for HP-UX compilerBjörn Jacke1-1/+3
2010-06-05s3: fix build on Heimdal based systems like NetBSD5Björn Jacke1-3/+3
2010-06-05s3-rpcclient: allow to add access_mask in cmd_spoolss_open_printer_ex().Günther Deschner1-5/+7
Guenther
2010-06-04Oops. Forgot to re-initialize the aio_ex pointer from sival_ptr.Jeremy Allison1-0/+1
2010-06-04wait_for_aio_completion() should return 0 on non-aio compiled case.Jeremy Allison1-1/+1
2010-06-04Rename req -> smbreq.Jeremy Allison1-26/+26
2010-06-04Change smbd_aio_complete_mid() -> smbd_aio_complete_aio_ex(). SimplifiesJeremy Allison4-40/+10
the code and eliminates find_aio_ex(). Jeremy.
2010-06-04s3-rpc: Create a file with all functions for a internal named pipe.Andreas Schneider5-205/+256
This makes it possible to use the samr rpc server in winbind without linking in smbd. Reviewed-by: Simo Sorce <idra@samba.org>
2010-06-04s3-rpc: Seperate rpc_srv_register for plain connection.Andreas Schneider5-129/+276
This will make it possible to create plain rpc named pipe connnections. Reviewed-by: Simo Sorce <idra@samba.org>
2010-06-04s3-auth: Moved smbd user functions to a generic place.Andreas Schneider4-139/+140
Reviewed-by: Simo Sorce <idra@samba.org>
2010-06-04s3-smbd: Remove unneeded dependency of map_username to globals.c.Andreas Schneider3-7/+3
Reviewed-by: Simo Sorce <idra@samba.org>
2010-06-04s3-selftest: do not call main RPC-SPOOLSS testsuite.Günther Deschner1-1/+1
The tests formerly available in there can now be accessed via RPC-SPOOLSS-PRINTSERVER. Guenther
2010-06-04ѕ3:Makefile: use PIC instead of PIE flags for shared libsBjörn Jacke1-4/+4
otherwise shared lib builds are broken on some platforms
2010-06-03Allow us to cope correctly with NT_STATUS_MORE_PROCESSING_REQUIRED when ↵Jeremy Allison1-1/+7
downgrading from krb5 to NTLMSSP over SMB2. Jeremy.
2010-06-03Found by Guenther - fix up our fallback paths from krb5 to NTLMSSP when ↵Jeremy Allison1-8/+29
using SMB2. Jeremy.
2010-06-03s3-spoolss: add and use spoolss_printerinfo2_to_setprinterinfo2().Günther Deschner4-67/+45
This fixes some invalid typecasts. Guenther
2010-06-03s3: Fix the build of the nfsv4 acl codeVolker Lendecke1-1/+2
2010-06-03s3: remove authdata.hGünther Deschner3-38/+8
Guenther
2010-06-03s3-build: pure cosmetics, use better names for gen_ndr code pieces.Günther Deschner2-15/+11
Guenther
2010-06-03s3-build: only include generated spoolss headers (not ndr headers).Günther Deschner5-2/+4
Guenther
2010-06-03s3: remove rpc_secdes.h completely.Günther Deschner3-28/+3
Guenther
2010-06-03s3-security: use shared "Standard access rights.".Günther Deschner10-31/+21
Guenther
2010-06-03security: move generic_mapping and standard_mapping to security.idl.Günther Deschner1-17/+0
Guenther
2010-06-03s3-security: use shared "File Object specific access rights".Günther Deschner3-56/+3
Guenther