Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2009-09-11 | talloc:mksyms: allow double pointer return value of functions. | Michael Adam | 1 | -1/+1 | |
Michael | |||||
2009-09-11 | s3:mksyms: fix spelling... | Michael Adam | 2 | -2/+2 | |
Michael | |||||
2009-09-11 | s3-rpcclient: add lookupsids3 command. | Günther Deschner | 1 | -0/+70 | |
Guenther | |||||
2009-09-11 | lsa: fill in more unknowns in lsa_LookupSid calls. | Günther Deschner | 1 | -2/+2 | |
Guenther | |||||
2009-09-11 | s3-rpcclient: make netlogon credential setup also work for interdomain trusts. | Günther Deschner | 1 | -9/+11 | |
Guenther | |||||
2009-09-11 | s3-rpcclient: avoid using lp_workgroup() unconditionally for crypto. | Günther Deschner | 1 | -4/+17 | |
Guenther | |||||
2009-09-11 | s3-rpc_client: add dcerpc_transport_t to cli_rpc_pipe_open_schannel(). | Günther Deschner | 8 | -11/+21 | |
Guenther | |||||
2009-09-11 | s3-rpc_client: add dcerpc_transport_t to cli_rpc_pipe_open_spnego_ntlmssp ↵ | Günther Deschner | 8 | -4/+19 | |
and cli_rpc_pipe_open_ntlmssp. Guenther | |||||
2009-09-11 | s3-rpcclient: use cli_rpc_pipe_open_noauth_transport in rpcclient. | Günther Deschner | 1 | -2/+3 | |
Guenther | |||||
2009-09-11 | s3-rpc_client: add cli_rpc_pipe_open_noauth_transport. | Günther Deschner | 2 | -14/+30 | |
Guenther | |||||
2009-09-11 | s3-schannel: remove last schannel hand-marshalling function. | Günther Deschner | 2 | -34/+0 | |
Guenther | |||||
2009-09-11 | s3-schannel: use NL_AUTH_SIGNATURE for schannel sign & seal (client & server). | Günther Deschner | 5 | -83/+118 | |
Guenther | |||||
2009-09-11 | s3-errors: add NT_STATUS_RPC_NT_PROCNUM_OUT_OF_RANGE. | Günther Deschner | 1 | -0/+1 | |
Guenther | |||||
2009-09-11 | s3-schannel: remove unused code. | Günther Deschner | 3 | -75/+0 | |
Guenther | |||||
2009-09-11 | s3-schannel: use NL_AUTH_MESSAGE for schannel bind reply. | Günther Deschner | 1 | -10/+17 | |
Guenther | |||||
2009-09-11 | s3-nterr: add NT_STATUS_RPC_NT_PROTOCOL_ERROR to nt_errstr(). | Günther Deschner | 1 | -0/+1 | |
Guenther | |||||
2009-09-11 | s3-util: add get/set_cmdline_auth_info_domain to user_auth_info struct. | Günther Deschner | 3 | -0/+22 | |
Guenther | |||||
2009-09-11 | s3-rpcclient: add lookupnames4 command. | Günther Deschner | 1 | -0/+52 | |
Guenther | |||||
2009-09-11 | s3-rpcclient: add ncacn transport handling for rpcclient. | Günther Deschner | 1 | -5/+88 | |
Guenther | |||||
2009-09-11 | s3-rpc_client: add enum dcerpc_transport_t to rpc_cli_transport struct. | Günther Deschner | 2 | -0/+10 | |
Guenther | |||||
2009-09-10 | Fix bug 6707 - 3.4.1 segfault in parsing configs. | Marc Aurele La France | 1 | -4/+4 | |
Fixes an occasional segfault caused by an out-of-bounds reference in config file parsing. | |||||
2009-09-09 | Fix compile in a usually non-selected define. | Jeremy Allison | 1 | -1/+1 | |
Jeremy. | |||||
2009-09-09 | s3:smbd: Add a "hidden" parameter "share:fake_fscaps" | Volker Lendecke | 1 | -0/+3 | |
This is needed to support some special app I've just come across where I had to set the SPARSE_FILES bit (0x40) to make it work against Samba at all. There might be others to fake. This is definitely a "Don't touch if you don't know what you're doing" thing, so I decided to make this an undocumented parametric parameter. I know this sucks, so feel free to beat me up on this. But I don't think it will hurt. | |||||
2009-09-09 | s3-winbindd: Fix Bug #6700: Use dns domain name when needing to guess server ↵ | Günther Deschner | 1 | -1/+1 | |
principal. Patch from Robert LeBlanc <robert@leblancnet.us>. Thanks! Guenther | |||||
2009-09-08 | s3-nterr: add NT_STATUS_RPC_NT_CALL_FAILED. | Günther Deschner | 1 | -0/+1 | |
Guenther | |||||
2009-09-08 | s3:smbd: Fix bug 6690, wrong error check | Andrew Klosterman | 1 | -1/+1 | |
2009-09-08 | s3: remove unused RPC_AUTH_SCHANNEL_NEG struct and parsing functions. | Günther Deschner | 3 | -55/+0 | |
Guenther | |||||
2009-09-08 | s3-rpc_server: use NL_AUTH_MESSAGE in pipe_schannel_auth_bind(). | Günther Deschner | 1 | -6/+23 | |
Guenther | |||||
2009-09-08 | s3-rpc_client: use NL_AUTH_MESSAGE in create_schannel_auth_rpc_bind_req(). | Günther Deschner | 1 | -7/+24 | |
Guenther | |||||
2009-09-08 | schannel: add NL_AUTH_MESSAGE and both NL_AUTH_SIGNATURE structs. | Günther Deschner | 1 | -0/+1 | |
These actually belong netlogon but we for now want to keep netlogon as a security providor separate. Guenther | |||||
2009-09-08 | s3-schannel: Fix Bug #6697. Interdomain trusts with Windows 2008 R2 DCs. | Günther Deschner | 2 | -2/+2 | |
The Schannel verifier (aka NL_AUTH_SIGNATURE) structure (32 byte) sent from a W2k8r2 DC is passed in a buffer with the size of a NL_AUTH_SHA2_SIGNATURE (56 byte). We should just ignore the remaining 12 zeroed bytes and proceed. Guenther | |||||
2009-09-07 | Add read() to socketwrapper. Metze please check. | Jeremy Allison | 1 | -1/+1 | |
Jeremy. | |||||
2009-09-06 | Fix bug 6673 - smbpasswd does not work with "unix password sync = yes". | Jeremy Allison | 5 | -22/+30 | |
Revert change from 3.3 -> 3.4 with read_socket_with_timeout changed from sys_read() to sys_recv(). read_socket_with_timeout() is called with non-fd's (with a pty in chgpasswd.c and with a disk file in lib/dbwrap_file.c via read_data()). recv works for the disk file, but not the pty. Change the name of read_socket_with_timeout() to read_fd_with_timeout() to make this clear (and add comments). Jeremy. | |||||
2009-09-07 | s3:winbind: Convert WINBINDD_SET_HWM to the new API | Volker Lendecke | 15 | -128/+454 | |
2009-09-07 | s3:winbind: Convert WINBINDD_REMOVE_MAPPING to the new API | Volker Lendecke | 15 | -108/+488 | |
2009-09-07 | s3:winbind: Convert WINBINDD_SET_MAPPING to the new API | Volker Lendecke | 15 | -106/+538 | |
2009-09-07 | s3:winbind: Convert WINBINDD_CHECK_MACHACC to the new API | Volker Lendecke | 15 | -76/+451 | |
2009-09-07 | s3:smbd: Add the ntstatus to the smb_panic in share_mode_lock_destructor | Volker Lendecke | 1 | -2/+18 | |
This might help finding why bug 6518 happens | |||||
2009-09-06 | Tell newbie devs about ./configure.developer | Rusty Russell | 1 | -1/+1 | |
Enhances the outputs in autogen.sh for both s3 and s4. Signed-off-by: Rusty Russell <rusty@rustcorp.com.au> | |||||
2009-09-05 | Check we read off the compelte event from inotify | Simo Sorce | 1 | -2/+8 | |
The kernel may return a short read, so we must use read_data() to make sure we read off the full buffer. If somethign bad happens we also need to kill the inotify watch because the filedescriptor will return out of sync structures if we read only part of the data. | |||||
2009-09-05 | Save and report the correct errno value. | Simo Sorce | 1 | -8/+12 | |
2009-09-05 | s3:winbind: Use fstr_sprintf, it is simpler than talloc_asprintf->fstrcpy | Volker Lendecke | 1 | -8/+5 | |
2009-09-05 | s3:winbind: Remove pointless <cond> ? true : false; | Volker Lendecke | 1 | -4/+4 | |
2009-09-05 | s3:winbind: Make the pam_auth subfunctions static | Volker Lendecke | 2 | -18/+9 | |
2009-09-05 | s3:libsmb: Convert (state->received) to (state->received != 0) | Volker Lendecke | 1 | -1/+1 | |
This confused me for a second, this should not happen a second time :-) | |||||
2009-09-04 | s3:winbind: Fix Coverity ID 933: FORWARD_NULL | Volker Lendecke | 1 | -0/+1 | |
2009-09-04 | s3:smbd: Fix Coverity ID 937, REVERSE_INULL | Volker Lendecke | 1 | -2/+2 | |
2009-09-04 | s3:winbind: Fix Coverity ID 940: Resource Leak | Volker Lendecke | 1 | -0/+1 | |
2009-09-04 | s3-ntlm_auth: fix two segfaults in diagnostics mode. | Günther Deschner | 1 | -2/+2 | |
Guenther | |||||
2009-09-03 | Hopefully last part of the fix for bug 6651 - smbd SIGSEGV when breaking ↵ | Jeremy Allison | 1 | -2/+2 | |
oplocks. This one is subtle. There is a race condition where a signal can be queued for oplock break, and then the file can be closed by the client before the signal can be processed. Currently if this occurs we panic (we can't match an incoming signal fd with a fsp pointer). Simply log the error (at debug level 10 right now, might be too much) and then return without processing the break request. It looks like there is another race condition with this fix, but here's why it won't happen. If the signal was pending (caused by a kernel oplock break from a local file open), and the client closed the file and then re-opened another file which happened to use the same file descriptor as the file just closed, then theoretically the oplock break requests could be processed on the wrong fd. Here's why this should be very rare.. Processing a pending signal always take precedence over an incoming network request, so as long as the client close request is non-chained then the break signal should always be harmlessly processed *before* the open can be called. If the open is chained onto the close, and the fd on the new open is the same as the old closed fd, then it's possible this race will occur. However, all that will happen is that we'll lose the oplock on this file. A shame, but not a fatal event. Jeremy. |