summaryrefslogtreecommitdiff
path: root/source4/librpc/rpc
AgeCommit message (Collapse)AuthorFilesLines
2010-08-22pidl: give the varible name for bad type in python callsAndrew Tridgell1-1/+1
This makes it much clearer which argument to a function had the wrong type
2010-08-20librpc/rpc: move dcerpc_read_ncacn_packet_send/recv() to dcerpc_util.cStefan Metzmacher1-0/+9
metze
2010-08-12s4:librpc/rpc: make struct dcerpc_binding_handle privateStefan Metzmacher1-10/+0
metze
2010-08-12s4:librpc/rpc: add dcerpc_binding_handle dcerpc_pipe backendStefan Metzmacher3-4/+411
metze
2010-08-12librpc/rpc: add dcerpc_binding_handle abstrationStefan Metzmacher1-2/+113
metze
2010-08-12s4:librpc/rpc: fix dcerpc_log_packet() prototypeStefan Metzmacher2-6/+6
metze
2010-08-12s4:librpc/rpc: autodetect the need of async call logicStefan Metzmacher2-8/+6
metze
2010-08-02s4:librpc/rpc: avoid using DCERPC_NDR_REF_ALLOC for epm_Map()Stefan Metzmacher1-2/+2
metze
2010-07-31s4:librpc/rpc: use the correct ndr flags in dcerpc_ndr_validate_in()Stefan Metzmacher1-0/+16
metze
2010-07-16s4-loadparm: 2nd half of lp_ to lpcfg_ conversionAndrew Tridgell4-20/+20
this converts all callers that use the Samba4 loadparm lp_ calling convention to use the lpcfg_ prefix. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-07-13dcerpc: move dcerpc_pull_auth_trailer into a the common dcerpc_util.c fileSimo Sorce1-67/+0
Signed-off-by: Günther Deschner <gd@samba.org>
2010-07-13s4-dcerpc: move some util functions up to main librpc directory.Günther Deschner1-30/+0
Guenther Signed-off-by: Simo Sorce <idra@samba.org> Signed-off-by: Günther Deschner <gd@samba.org>
2010-06-24s4-python: python is not always in /usr/binAndrew Tridgell1-1/+1
Using "#!/usr/bin/env python" is more portable. It still isn't ideal though, as we should really use the python path found at configure time. We do that in many places already, but some don't. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-06-19pyrpc: Fix reference counting when using secondary connections.Jelmer Vernooij2-18/+43
2010-05-18Finish removal of iconv_convenience in public API's.Jelmer Vernooij5-29/+20
2010-04-15s4:librpc/rpc/pyrpc.c: map NT_STATUS_NET_WRITE_FAULT to the matching ↵Stefan Metzmacher1-7/+3
NT_STATUS_RPC_* code metze
2010-04-15librpc/rpc: add dcerpc_fault_to_nt_status()Stefan Metzmacher1-0/+1
For now this only handles fault codes with we've seen yet and for which we have explicit torture checks. metze
2010-04-13s4:librpc/rpc: the python bindings should use !NT_STATUS_IS_OK instead of ↵Stefan Metzmacher1-4/+4
NT_STATUS_IS_ERR Everything but NT_STATUS_OK is an error here. metze
2010-04-13s4:librpc/rpc: make PyErr_SetDCERPCStatus() staticStefan Metzmacher2-3/+3
metze
2010-04-09s4:librpc/rpc: correctly initialize last_fault_code for bind and ↵Stefan Metzmacher1-0/+9
alter_context requests metze
2010-04-08pynet: Create a net class.Jelmer Vernooij1-2/+2
2010-04-02s4-rpc: fixed a talloc loop in continue_ntlmssp_connection()Andrew Tridgell1-0/+24
We were creating a memory loop which caused havoc when the connection was torn down.
2010-04-02pyrpc: do the pipe connect on a real memory contextAndrew Tridgell1-1/+1
2010-03-23s4:librpc/rpc/pyrpc.h: librpc/rpc/dcerpc.h isn't needed anymoreStefan Metzmacher1-1/+0
metze
2010-03-19s4:librpc/rpc: add NCACN_INTERNAL from s3Stefan Metzmacher1-1/+1
metze
2010-03-18s4:librpc/rpc: let pyrpc make use of dcerpc_binding_handle stubsStefan Metzmacher3-4/+7
metze
2010-03-17s4:librpc/rpc: initialize p->binding_handle in dcerpc_secondary_context()Stefan Metzmacher1-0/+7
metze
2010-03-12s4:librpc/rpc/dcerpc_util.c: make use of use tevent_req based ↵Stefan Metzmacher1-10/+12
dcerpc_binding_handle stubs metze
2010-03-12s4:librpc/rpc/dcerpc_schannel.c: make use of use tevent_req based ↵Stefan Metzmacher1-16/+22
dcerpc_binding_handle stubs metze
2010-03-12s4:librpc/rpc: add very basic dcerpc_binding_handle infrastructureStefan Metzmacher2-0/+19
metze
2010-03-05s4-rpc: don't use s->credentials after it is freedAndrew Tridgell1-2/+1
2010-03-01s4:librpc/rpc: make use of explicit dcerpc_*_recv functionsStefan Metzmacher2-3/+3
metze
2010-02-17Revert "Got back to 16-byte padding on auth RPC. S3 clients and servers now ↵Jeremy Allison1-6/+4
cope with this. Jeremy" This reverts commit 38c50c7027d2a2a9a3df060b74b2a2efce4d9e6f. As tridge requested, we need this to work with older S3 servers, not just for smbtorture4. Jeremy.
2010-02-17Got back to 16-byte padding on auth RPC. S3 clients and servers now cope ↵Jeremy Allison1-4/+6
with this. Jeremy
2010-02-17s4-rpc: paranoid check for auth_lengthAndrew Tridgell1-0/+11
This is not strictly needed as the ndr_pull_advance() checks it a few lines further down, but I want to save Jeremy getting more grey hairs :-)
2010-02-16s4-rpc: don't use auth padding in rpc bind requests as it breaks s3Andrew Tridgell1-0/+7
The s3 RPC server returns a bind_nak if it gets a rpc bind with auth padding. This change forces a padding length of zero to maximimise compatibility with s3 servers. I've left the padding code in as a #if 0 to make it easier for us to test/fix the s3 server code, which should be changed to correctly handle arbitrary auth padding in all rpc requests with auth trailers.
2010-02-16s4-dcerpc: fixed auth padding to be relative to the stub, not packetAndrew Tridgell1-5/+7
The recent dcerpc padding changes made our padding relative to the packet header, instead of the start of the stub. Surprisingly, this broke w2k8r2 doing a dcpromo join to a s4 server. It seems that w2k8r2 is very fussy about the padding it gets in some circumstances.
2010-02-14a4-dcerpc: another attempt at dcerpc auth paddingAndrew Tridgell2-11/+16
The last change broke net vampire against w2k8r2
2010-02-13s4-rpc: be more careful about DCERPC auth paddingAndrew Tridgell2-52/+83
Cope with a wider range of auth padding in dcerpc bind_ack and alter_context packets. We now use a helper function that calculates the right auth padding.
2010-02-09s4:Remove "Py_RETURN_NONE" compatibility codeMatthias Dieter Wallnöfer1-4/+0
This was needed only by Python 2.3 which we no longer support.
2010-02-02Change uint_t to unsigned int in source4Matt Kraai1-2/+2
Signed-off-by: Stefan Metzmacher <metze@samba.org>
2009-11-06s4:dcerpc - fix DEBUG output warningMatthias Dieter Wallnöfer1-3/+4
2009-10-23s4-python: we need to include Python.h firstAndrew Tridgell1-1/+1
If we don't include Python.h first then we get a pile of warnings due to broken redefines of XOPEN_SOURCE in the Python includes.
2009-10-15s4-smb: declare root_fid as a file handleAndrew Tridgell1-1/+1
In order to implement root_fid in the s4 SMB server we need to declare it as a handle type, just as for other fnum values in SMB. This required some extensive (but simple) changes in many bits of code.
2009-10-02s4: fix various warnings (not "const" related ones)Matthias Dieter Wallnöfer1-1/+1
2009-09-19s4-resolve: fixed a crash bug on timeoutAndrew Tridgell1-1/+1
We were creating the name resolution context as a child of lp_ctx, which meant when we gave up on a connection the timer on name resolution kept running, and when it timed out the callback crashed as the socket was already removed.
2009-09-17s4-rpc: added NDR64 supportAndrew Tridgell5-7/+31
This adds support for the nd464 binding string option
2009-08-18s4:librpc/rpc: fix DEBUG() messageStefan Metzmacher1-1/+1
metze
2009-08-07fixed several places that unnecessarily take a reference to the event contextAndrew Tridgell1-1/+1
These references were triggering the ambiguous talloc_free errors from the recent talloc changes when the server is run using the 'standard' process model instead of the 'single' process model. I am aiming to move the build farm to use the 'standard' process model soon, as part of an effort to make our test environment better match the real deployment of Samba4. The references are not needed as the way that the event context is used is as the 'top parent', so when the event context is freed then all of the structures that were taking a reference to the event context were actually freed as well, thus making the references redundent.
2009-07-01A rather strange varient of talloc_unlinkAndrew Tridgell1-1/+1
A dcerpc request may have a reference from a still completing async callback, but we now consider the request to be complete. We want to lose the main parent, leaving just the reference, if any.