summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Revert "s3:smbd Give the kerberos session key a parent"Volker Lendecke2010-06-081-2/+0
| | | | This reverts commit 4a7f45b7e1cef13bc28d7ee50dd4b5519bdec397.
* Revert "s3:auth Change auth_ntlmssp_server_info API to return NTSTATUS"Volker Lendecke2010-06-085-18/+13
| | | | | | | | This reverts commit edba46ce94c335411ab337eeb4ef6f88fb3aae80. Conflicts: source3/auth/auth_ntlmssp.c
* s3-waf: fix the the waf build.Günther Deschner2010-06-081-2/+3
| | | | Guenther
* Make aio_ex owned by a talloc context, not neccessarily on the null context.Jeremy Allison2010-06-071-8/+12
|
* Move "write_though" into aio_ex struct.Jeremy Allison2010-06-071-5/+5
|
* s3:smbd add utility function to check if there are open pipesSimo Sorce2010-06-073-8/+16
|
* s3:rpc make num_pipe_handles get an actual pipe as argumentSimo Sorce2010-06-073-6/+6
| | | | Let the function abstract out how handles are counted
* s3:rpc handles are used by all pipes, use better nameSimo Sorce2010-06-072-1/+1
|
* s3:rpc fix potential out of bound memory accessSimo Sorce2010-06-071-1/+1
| | | | | | memcpy copies memory unconditionally, we are passing "" in some cases here. Use strncpy which will stop reading from src if the null byte is found and will fill with nulls the destination.
* s3: fix build on platforms without st_blocks and st_blksize stat struct membersBjörn Jacke2010-06-071-0/+9
| | | | This fixes bug 7474.
* ldb:pyldb.c - we cannot use "ldb_dn_compare" if both message DNs are NULL in ↵Matthias Dieter Wallnöfer2010-06-071-3/+5
| | | | | | "py_ldb_msg_compare" Discovered by the testcase.
* s4 python: add more unit tests to verify the compare testsMatthieu Patou2010-06-071-0/+19
|
* s4:objectclass_attrs LDB module - move the single-valued attribute check ↵Matthias Dieter Wallnöfer2010-06-072-45/+13
| | | | | | | | | | into this module It seems to me more consistent (and also to keep the same behaviour on all backends). Also the DRS hack should therefore not be needed anymore since the "repl_meta_data" module launches requests behind "objectclass_attrs".
* s4:rdn_name LDB module - move the "distinguishedName" write prevent check hereMatthias Dieter Wallnöfer2010-06-072-7/+6
| | | | In my eyes it fits better here than in the TDB backend code.
* s3:auth add hooks to indicate if signing or sealing is desired with NTLMSSPAndrew Bartlett2010-06-073-0/+33
| | | | | | | | This allows the right hooks to be called in GENSEC when s3compat implements the auth_ntlmssp interface. Otherwise, we can't do the signing or sealing as we have not negoitated it's use. Andrew Bartlett
* s3:auth Change auth_ntlmssp_server_info API to return NTSTATUSAndrew Bartlett2010-06-075-13/+18
| | | | | | | It's nicer to have an NTSTATUS return, and in s3compat there may be a reason other than 'no memory' why this can fail. Andrew Bartlett
* s3:named pipe proxy Improve error messages when named pipes fail to forwardAndrew Bartlett2010-06-071-3/+6
| | | | | | I hope this helps the next person who needs to debug this. Andrew Bartlett
* s3:smbd Give the kerberos session key a parentAndrew Bartlett2010-06-071-0/+2
| | | | | | I can't see what would free this, so this should prevent a memory leak. Andrew Bartlett
* named_pipe_auth Always lower case the incoming pipe nameAndrew Bartlett2010-06-071-1/+7
| | | | | | | Windows connects to an upper case NETLOGON pipe, and we can't find the socket to connect to until we lower case the name. Andrew Bartlett
* s3:smbd Fix segfault if register_existing_vuid() failsAndrew Bartlett2010-06-071-4/+12
| | | | | | | The register_existing_vuid() call will handle both the ntlmssp_end and vuid invalidation internally, so we don't want to do it again. Andrew Bartlett
* s3:auth Rename user_info->domain -> user_info->mapped.domain_nameAndrew Bartlett2010-06-0710-38/+37
| | | | | | | This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
* s3:auth Rename user_info->client_domain -> user_info->client.domain_nameAndrew Bartlett2010-06-076-9/+9
| | | | | | | This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
* s3:auth fix header comment for internal_username -> mapped.account_nameAndrew Bartlett2010-06-071-1/+1
|
* s3:auth Rename user_info->internal_username -> user_info->mapped.account_nameAndrew Bartlett2010-06-0712-31/+31
| | | | | | | This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
* s3:auth Rename user_info->smb_name -> user_info->client.account_nameAndrew Bartlett2010-06-0711-30/+32
| | | | | | | This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
* s4:samba_dsdb LDB module - fix typosMatthias Dieter Wallnöfer2010-06-071-2/+2
|
* s4:samba_dsdb LDB module - enhance/fix module rule commentsMatthias Dieter Wallnöfer2010-06-071-3/+5
|
* s3:auth make sure the primary group sid is usableSimo Sorce2010-06-071-13/+30
| | | | | | | | | | This function was previously performed under the cover by converting back and forth from info3 to samu and then later from samu to info3. Since we now shortcircuit that in some cases, check explicitly using get_primary_group_sid() Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth return the full passwd struct from check_accountSimo Sorce2010-06-071-12/+6
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:passdb Export function to calculate the proper primary group sidSimo Sorce2010-06-073-86/+136
| | | | | | | | Don't keep it buried in passdb, this function need to be available for use in places where we do not want to construct an artificial samu struct just to play tricks. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth remove unused structure memberSimo Sorce2010-06-073-110/+2
| | | | | | | sids are now completely handled using info3, remove dead code that fills server info sids and the structure members themselves Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth create nt token from info3 directlySimo Sorce2010-06-073-38/+167
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth handle unix domain sids in samuSimo Sorce2010-06-075-39/+143
| | | | | | | | When we generate a user out of thin air we may end up adding sids that are not part of the sam domain (unix domain sids). Handle the case and preserve these sids as extra sids. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth set the resolved user sid in the fake sam accountSimo Sorce2010-06-071-0/+3
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth check the user is valid firstSimo Sorce2010-06-071-43/+39
| | | | | | | | It makes no sense to go through all the hoops to build samu and convert it to info3, just to discard them later if the user was not valid. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth make sure we set the right usernameSimo Sorce2010-06-071-0/+5
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s4:ldap.py - add some "objectclass" behaviour testsMatthias Dieter Wallnöfer2010-06-071-0/+190
|
* s4:objectclass LDB module - rework the code which handles the objectclasses ↵Matthias Dieter Wallnöfer2010-06-071-149/+191
| | | | | | | modification Before it has been very incomplete. We try now to match the Windows Server behaviour as close as possible.
* s4:ldap.py - enhance the attributes testcase to demonstrate how the ↵Matthias Dieter Wallnöfer2010-06-071-2/+75
| | | | | | attributes are checked against the schema and the specified objectclasses This demonstrates the bew "objectclass_attrs" LDB module behaviour.
* s4:acl LDB module - LDB attribute names should be compared using ↵Matthias Dieter Wallnöfer2010-06-071-2/+2
| | | | "ldb_attr_cmp" or "strcasecmp"
* s4:acl LDB module - adaption for "objectclass_attrs" moduleMatthias Dieter Wallnöfer2010-06-071-5/+15
| | | | | Since the attribute schema checking code moved back we need to give here the "LDB_ERR_NO_SUCH_ATTRIBUTE" error.
* s4:objectclass LDB module - remove "fix_check_attributes"Matthias Dieter Wallnöfer2010-06-071-62/+0
| | | | Also this task is now performed by the "objectclass_attrs" LDB module.
* s4:samldb LDB module - adjust the module to set always a ↵Matthias Dieter Wallnöfer2010-06-071-35/+45
| | | | | | | "defaultObjectCategory" on objectclass add operations This is needed to make the "objectclass_attrs" LDB module happy. The search check and case adjustment are done as it was using a second modify operation.
* s4:remove the "validate_update" LDB module - the task is now handled by the ↵Matthias Dieter Wallnöfer2010-06-074-141/+0
| | | | far more complete "objectclass_attrs" LDB module
* s4:dsdb - introduce a new "objectclass_attrs" LDB module which performs the ↵Matthias Dieter Wallnöfer2010-06-073-0/+401
| | | | | | | objectclass attributes checking Until now we had no real consistent mechanism which allowed us to check if attributes belong to the specified objectclasses.
* s4:objectclass LDB module - instanciate the schema variable centrally on the ↵Matthias Dieter Wallnöfer2010-06-071-28/+28
| | | | | | | "ac" context creation This unifies the position when the schema is read and prevents multiple instanciations (eg on a modification operation).
* s4:samldb LDB module - finally we can remove the RDN checkMatthias Dieter Wallnöfer2010-06-071-53/+0
| | | | This is now dynamically always done by the objectclass LDB module
* s4:ldap.py - enhance the rename tests to demonstrate the functionalityMatthias Dieter Wallnöfer2010-06-071-0/+37
|
* s4:objectclass LDB module - finally implement the correct entry rename ↵Matthias Dieter Wallnöfer2010-06-071-25/+130
| | | | | | protections Only the "systemFlags" check is still missing.
* s4:objectclass LDB module - cosmetic changeMatthias Dieter Wallnöfer2010-06-071-2/+3
|