summaryrefslogtreecommitdiff
path: root/source3
AgeCommit message (Collapse)AuthorFilesLines
2009-09-11talloc:mksyms: allow double pointer return value of functions.Michael Adam1-1/+1
Michael
2009-09-11s3:mksyms: fix spelling...Michael Adam2-2/+2
Michael
2009-09-11s3-rpcclient: add lookupsids3 command.Günther Deschner1-0/+70
Guenther
2009-09-11lsa: fill in more unknowns in lsa_LookupSid calls.Günther Deschner1-2/+2
Guenther
2009-09-11s3-rpcclient: make netlogon credential setup also work for interdomain trusts.Günther Deschner1-9/+11
Guenther
2009-09-11s3-rpcclient: avoid using lp_workgroup() unconditionally for crypto.Günther Deschner1-4/+17
Guenther
2009-09-11s3-rpc_client: add dcerpc_transport_t to cli_rpc_pipe_open_schannel().Günther Deschner8-11/+21
Guenther
2009-09-11s3-rpc_client: add dcerpc_transport_t to cli_rpc_pipe_open_spnego_ntlmssp ↵Günther Deschner8-4/+19
and cli_rpc_pipe_open_ntlmssp. Guenther
2009-09-11s3-rpcclient: use cli_rpc_pipe_open_noauth_transport in rpcclient.Günther Deschner1-2/+3
Guenther
2009-09-11s3-rpc_client: add cli_rpc_pipe_open_noauth_transport.Günther Deschner2-14/+30
Guenther
2009-09-11s3-schannel: remove last schannel hand-marshalling function.Günther Deschner2-34/+0
Guenther
2009-09-11s3-schannel: use NL_AUTH_SIGNATURE for schannel sign & seal (client & server).Günther Deschner5-83/+118
Guenther
2009-09-11s3-errors: add NT_STATUS_RPC_NT_PROCNUM_OUT_OF_RANGE.Günther Deschner1-0/+1
Guenther
2009-09-11s3-schannel: remove unused code.Günther Deschner3-75/+0
Guenther
2009-09-11s3-schannel: use NL_AUTH_MESSAGE for schannel bind reply.Günther Deschner1-10/+17
Guenther
2009-09-11s3-nterr: add NT_STATUS_RPC_NT_PROTOCOL_ERROR to nt_errstr().Günther Deschner1-0/+1
Guenther
2009-09-11s3-util: add get/set_cmdline_auth_info_domain to user_auth_info struct.Günther Deschner3-0/+22
Guenther
2009-09-11s3-rpcclient: add lookupnames4 command.Günther Deschner1-0/+52
Guenther
2009-09-11s3-rpcclient: add ncacn transport handling for rpcclient.Günther Deschner1-5/+88
Guenther
2009-09-11s3-rpc_client: add enum dcerpc_transport_t to rpc_cli_transport struct.Günther Deschner2-0/+10
Guenther
2009-09-10Fix bug 6707 - 3.4.1 segfault in parsing configs.Marc Aurele La France1-4/+4
Fixes an occasional segfault caused by an out-of-bounds reference in config file parsing.
2009-09-09Fix compile in a usually non-selected define.Jeremy Allison1-1/+1
Jeremy.
2009-09-09s3:smbd: Add a "hidden" parameter "share:fake_fscaps"Volker Lendecke1-0/+3
This is needed to support some special app I've just come across where I had to set the SPARSE_FILES bit (0x40) to make it work against Samba at all. There might be others to fake. This is definitely a "Don't touch if you don't know what you're doing" thing, so I decided to make this an undocumented parametric parameter. I know this sucks, so feel free to beat me up on this. But I don't think it will hurt.
2009-09-09s3-winbindd: Fix Bug #6700: Use dns domain name when needing to guess server ↵Günther Deschner1-1/+1
principal. Patch from Robert LeBlanc <robert@leblancnet.us>. Thanks! Guenther
2009-09-08s3-nterr: add NT_STATUS_RPC_NT_CALL_FAILED.Günther Deschner1-0/+1
Guenther
2009-09-08s3:smbd: Fix bug 6690, wrong error checkAndrew Klosterman1-1/+1
2009-09-08s3: remove unused RPC_AUTH_SCHANNEL_NEG struct and parsing functions.Günther Deschner3-55/+0
Guenther
2009-09-08s3-rpc_server: use NL_AUTH_MESSAGE in pipe_schannel_auth_bind().Günther Deschner1-6/+23
Guenther
2009-09-08s3-rpc_client: use NL_AUTH_MESSAGE in create_schannel_auth_rpc_bind_req().Günther Deschner1-7/+24
Guenther
2009-09-08schannel: add NL_AUTH_MESSAGE and both NL_AUTH_SIGNATURE structs.Günther Deschner1-0/+1
These actually belong netlogon but we for now want to keep netlogon as a security providor separate. Guenther
2009-09-08s3-schannel: Fix Bug #6697. Interdomain trusts with Windows 2008 R2 DCs.Günther Deschner2-2/+2
The Schannel verifier (aka NL_AUTH_SIGNATURE) structure (32 byte) sent from a W2k8r2 DC is passed in a buffer with the size of a NL_AUTH_SHA2_SIGNATURE (56 byte). We should just ignore the remaining 12 zeroed bytes and proceed. Guenther
2009-09-07Add read() to socketwrapper. Metze please check.Jeremy Allison1-1/+1
Jeremy.
2009-09-06Fix bug 6673 - smbpasswd does not work with "unix password sync = yes".Jeremy Allison5-22/+30
Revert change from 3.3 -> 3.4 with read_socket_with_timeout changed from sys_read() to sys_recv(). read_socket_with_timeout() is called with non-fd's (with a pty in chgpasswd.c and with a disk file in lib/dbwrap_file.c via read_data()). recv works for the disk file, but not the pty. Change the name of read_socket_with_timeout() to read_fd_with_timeout() to make this clear (and add comments). Jeremy.
2009-09-07s3:winbind: Convert WINBINDD_SET_HWM to the new APIVolker Lendecke15-128/+454
2009-09-07s3:winbind: Convert WINBINDD_REMOVE_MAPPING to the new APIVolker Lendecke15-108/+488
2009-09-07s3:winbind: Convert WINBINDD_SET_MAPPING to the new APIVolker Lendecke15-106/+538
2009-09-07s3:winbind: Convert WINBINDD_CHECK_MACHACC to the new APIVolker Lendecke15-76/+451
2009-09-07s3:smbd: Add the ntstatus to the smb_panic in share_mode_lock_destructorVolker Lendecke1-2/+18
This might help finding why bug 6518 happens
2009-09-06Tell newbie devs about ./configure.developerRusty Russell1-1/+1
Enhances the outputs in autogen.sh for both s3 and s4. Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2009-09-05Check we read off the compelte event from inotifySimo Sorce1-2/+8
The kernel may return a short read, so we must use read_data() to make sure we read off the full buffer. If somethign bad happens we also need to kill the inotify watch because the filedescriptor will return out of sync structures if we read only part of the data.
2009-09-05Save and report the correct errno value.Simo Sorce1-8/+12
2009-09-05s3:winbind: Use fstr_sprintf, it is simpler than talloc_asprintf->fstrcpyVolker Lendecke1-8/+5
2009-09-05s3:winbind: Remove pointless <cond> ? true : false;Volker Lendecke1-4/+4
2009-09-05s3:winbind: Make the pam_auth subfunctions staticVolker Lendecke2-18/+9
2009-09-05s3:libsmb: Convert (state->received) to (state->received != 0)Volker Lendecke1-1/+1
This confused me for a second, this should not happen a second time :-)
2009-09-04s3:winbind: Fix Coverity ID 933: FORWARD_NULLVolker Lendecke1-0/+1
2009-09-04s3:smbd: Fix Coverity ID 937, REVERSE_INULLVolker Lendecke1-2/+2
2009-09-04s3:winbind: Fix Coverity ID 940: Resource LeakVolker Lendecke1-0/+1
2009-09-04s3-ntlm_auth: fix two segfaults in diagnostics mode.Günther Deschner1-2/+2
Guenther
2009-09-03Hopefully last part of the fix for bug 6651 - smbd SIGSEGV when breaking ↵Jeremy Allison1-2/+2
oplocks. This one is subtle. There is a race condition where a signal can be queued for oplock break, and then the file can be closed by the client before the signal can be processed. Currently if this occurs we panic (we can't match an incoming signal fd with a fsp pointer). Simply log the error (at debug level 10 right now, might be too much) and then return without processing the break request. It looks like there is another race condition with this fix, but here's why it won't happen. If the signal was pending (caused by a kernel oplock break from a local file open), and the client closed the file and then re-opened another file which happened to use the same file descriptor as the file just closed, then theoretically the oplock break requests could be processed on the wrong fd. Here's why this should be very rare.. Processing a pending signal always take precedence over an incoming network request, so as long as the client close request is non-chained then the break signal should always be harmlessly processed *before* the open can be called. If the open is chained onto the close, and the fd on the new open is the same as the old closed fd, then it's possible this race will occur. However, all that will happen is that we'll lose the oplock on this file. A shame, but not a fatal event. Jeremy.