summaryrefslogtreecommitdiff
path: root/source4/libcli
AgeCommit message (Collapse)AuthorFilesLines
2009-05-30libwbclient: Add async call framework.Kai Blin1-2/+2
2009-05-29s4: Add additional 2-letter SID/RID mappings.Andrew Kroeger1-0/+23
Information from http://msdn.microsoft.com/en-us/library/aa379602(VS.85).aspx
2009-05-26s4:libcli/smb2: remove old dialect revision constantsStefan Metzmacher1-4/+0
metze
2009-05-26s4:libcli/smb2: use new SMB2_DIVELECT_REVISION constantsStefan Metzmacher1-2/+5
Also send them in the order a windows client would send them (the lowest first). metze
2009-05-26s4:libcli/smb2: add some more SMB2 constantsStefan Metzmacher1-4/+14
metze
2009-05-20s4:libcli/smb2: fix session setup with raw NTLMSSPStefan Metzmacher1-13/+17
metze
2009-05-20s4:libcli/smb2: use raw ntlmssp if the server didn't provide a sec blobStefan Metzmacher1-1/+8
metze
2009-05-20s4:libcli/smb2: fill in transport->negotiate.secblob with the correct dataStefan Metzmacher1-0/+2
metze
2009-05-20s4: try to fix privileges implementation in order to pass the ↵Günther Deschner1-1/+5
RPC-SAMR-USERS-PRIVILEGES test. Guenther
2009-05-20s4:libcli/raw: initialy read the first 4 bytes onlyStefan Metzmacher1-0/+1
metze
2009-05-15errormap: Remove wbc -> NTSTATUS error map for now. It is not used.Jelmer Vernooij1-37/+0
This was breaking the Samba 4 installation since it added dependencies on header files we weren't installing. Confirmed with Kai.
2009-05-11Move SMB2 constants to a separate fileVolker Lendecke2-114/+140
2009-05-11Fix SMB2_CAP_DFSVolker Lendecke1-1/+1
2009-05-01s4:libcli: remember operating system and lan manager strings from session setupStefan Metzmacher2-0/+24
metze
2009-05-01s4:libcli/raw: write can return STATUS_BUFFER_OVERFLOW as a real errorStefan Metzmacher1-1/+1
We should not try to parse the result if the status is not NT_STATUS_OK. metze
2009-04-23Fix of a bug in the security.descriptor.as_sddl() methodnadezhda ivanova1-0/+6
security.descriptor.as_sddl() method did not work correctly when invoked without supplying the domain sid. Returned the same value as when the sid was provided. Test added for this case in libcli/security/tests/bindings.py Signed-off-by: Jelmer Vernooij <jelmer@samba.org>
2009-04-23errormap: Change the WBC_ERR_UNKNOWN_ERROR to map to NT_STATUS_UNSUCCESSFULKai Blin1-1/+1
This allows us to distinguish on NTSTATUS level if we got a WBC_ERR_UNKNOWN_ERROR or WBC_ERR_NSS_ERROR.
2009-04-22errormap: Add wbcErr to NTSTATUS mappingsKai Blin1-0/+37
2009-04-22libcli: fix a "not handled in switch" compile warningBjörn Jacke1-0/+1
return NULL also for RAW_CLOSE_GENERIC
2009-04-22ѕ4: fix a "not handled in switch" compile warningBjörn Jacke1-0/+2
2009-04-21Move the security_descriptor utility code to the top-level.Jelmer Vernooij3-535/+2
2009-04-20Merge commit 'origin/master' into libcli-auth-merge-without-netlogondAndrew Bartlett1-0/+10
2009-04-20Add a unit test for security_descriptor.as_sddl() without arguments.Jelmer Vernooij1-0/+10
2009-04-14Move libcli/auth to the top levelAndrew Bartlett8-1657/+0
2009-04-01s/NT_STATUS_WIN7_INVALID_RANGE/NT_STATUS_INVALID_LOCK_RANGE/gZach Loafman1-1/+1
2009-04-01s4:smb2: Add lease break support for SMB2.1Zach Loafman6-12/+167
Add the structures and marshalling for the lease break variants of the oplock break / oplock break ack messages.
2009-03-28s4:smb2: Add rudimentary SMB2.1 lease support to libcliZach Loafman3-0/+50
Add the structures, constants, and marshalling for SMB2.1 leases.
2009-03-25display_sec: Move to common libcli/security directory.Jelmer Vernooij1-2/+0
2009-03-19move source4/libcli/cldap => libcli/cldapStefan Metzmacher3-1263/+0
metze
2009-03-19s4:cldap: rewrite the cldap library based on tsocketStefan Metzmacher3-476/+812
metze
2009-03-18s4 libcli: Add back Longhorn beta dialect as a constantZach Loafman2-4/+4
Also tweak how the dialect array and count is initialized.
2009-03-17s4 torture: Add a string version for NT_STATUS_WIN7_INVALID_RANGEZach Loafman1-0/+1
Also submitted a request to cifs-protocol for a real name for this thing. Use win7 target logic in smb2 lock test, SMB2-LOCK now passes against Win7.
2009-03-17s4 libcli: Add SMB2.1 dialect to libcliZach Loafman2-2/+5
Negotiate 2.1 if possible, leave negotiate results in transport->negotiate.dialect_revision.
2009-03-06s4:errormap: map ECANCELED to NT_STATUS_CANCELLEDStefan Metzmacher1-0/+4
metze
2009-03-01Merge branch 'master' of git://git.samba.org/samba into convenienceJelmer Vernooij2-2/+5
2009-03-01Use common header file for character set handling in Samba 3 and Samba 4.Jelmer Vernooij1-15/+17
2009-03-01Add header files for secace and secacl.Jelmer Vernooij1-1/+2
2009-03-01s4: Use same function signature for convert_* as s3.Jelmer Vernooij3-27/+31
2009-03-01Move secacl to top-level.Jelmer Vernooij1-1/+2
2009-03-01Move secace.c to top-level.Jelmer Vernooij1-1/+2
2009-03-01Add allow_badcharcnv argument to all conversion function, forJelmer Vernooij3-7/+7
consistency with Samba 3.
2009-02-24libcli/ldap: move generic ldap control encoding code to ldap_message.cStefan Metzmacher3-135/+12
As they can we static there, we pass the specific handlers as parameter where we need to support controls. metze
2009-02-24s4:libcli/ldap: don't use 'void **out' as arguments as the behavior is not ↵Stefan Metzmacher1-17/+32
defined in C. metze
2009-02-24libcli/ldap: move ldap_ndr from source4/ to toplevelStefan Metzmacher3-114/+1
metze
2009-02-24libcli/ldap: move ldap_errors.h to the toplevel and install itStefan Metzmacher2-67/+1
metze
2009-02-24libcli/ldap: move ldap_message.[ch] from source4/ to the toplevelStefan Metzmacher4-1701/+1
metze
2009-02-24s4:libcli/ldap: remove reference to DEBUG()Stefan Metzmacher1-1/+0
This prepares using ldap_message.c in source3/ later metze
2009-02-24s4:libcli: split out LIBCLI_LDAP_MESSAGE subsystemStefan Metzmacher5-287/+300
metze
2009-02-18Worked around a problem with select/poll/epoll and gnutls Andrew Tridgell1-0/+4
Our packet layer relies on the event system reliably telling us when a packet is available. When we are using a socket layer like TLS then things get a bit trickier, as there may be bytes in the encryption buffer which could be read even if there are no bytes at the socket level. The GNUTLS library is supposed to prevent this happening by always leaving some data at the socket level when there is data to be processed in its buffers, but it seems that this is not always reliable. To work around this I have added a new packet option packet_set_unreliable_select() which tells the packet layer to not assume that the socket layer has a reliable select, and to instead keep trying to read from the socket until it gets back no data. This option is set for the ldap client and server when TLS is negotiated. This seems to fix the problems with the ldaps tests.
2009-02-13s4:libcli/ldap: use const char * const *attributes as in all other placesStefan Metzmacher2-2/+2
metze