summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* s4:passwords.py - proof the most important extended error codesMatthias Dieter Wallnöfer2010-08-151-8/+17
|
* s4:samdb_set_password - implement the extended LDAP error code detectionMatthias Dieter Wallnöfer2010-08-151-9/+17
|
* s4:password_hash LDB module - introduce the extended LDAP error codes on the ↵Matthias Dieter Wallnöfer2010-08-151-43/+72
| | | | important failure cases
* s4:password_hash LDB module - support this new password set syntaxMatthias Dieter Wallnöfer2010-08-151-2/+10
|
* s4:passwords.py - another special password testMatthias Dieter Wallnöfer2010-08-151-3/+23
| | | | This looks like a password change but it's rather a password set operation.
* s4:password_hash LDB module - allow to compare against both NT and LM hashes ↵Matthias Dieter Wallnöfer2010-08-151-10/+1
| | | | | | on password change operations This is to match the SAMR password change behaviour.
* s4:ldap_backend.c - Windows returns WERROR codes in majuscule HEX formatMatthias Dieter Wallnöfer2010-08-151-1/+1
|
* s4:ldap_backend.c - map error codes - add a change which allows custom ↵Matthias Dieter Wallnöfer2010-08-151-0/+13
| | | | | | | | | | WERROR codes This is strictly needed by my recent passwords work, since I want to remove most of the password change stuff in "samr_password.c". Since AD gives us CONSTRAINT_VIOLATION on all change problems I cannot distinguish on the SAMR level which the real cause was about. Therefore I need the extended WERROR codes here.
* s3: Remove some unused codeVolker Lendecke2010-08-152-32/+0
|
* s3-test: Try to fix the build farm subunit parsing.Andreas Schneider2010-08-151-3/+19
|
* s3: Increase debug level for shutdown_other_smbdsVolker Lendecke2010-08-151-3/+3
|
* s3: Add debugs to shutdown_other_smbdsVolker Lendecke2010-08-151-0/+6
|
* s3: Fix a typoVolker Lendecke2010-08-151-1/+1
|
* s4:subtree_rename.c - relax the checks when requestedMatthias Dieter Wallnöfer2010-08-151-0/+5
| | | | (Needed by upgradeprovision for example)
* s4-test: Add drs.rpc.msDSIntId test to knownfail testsKamen Mazdrashki2010-08-151-0/+1
|
* s4-test: Run all DRS-RPC.* tests in ncacn_ip_tcp_tests tests groupKamen Mazdrashki2010-08-151-3/+3
| | | | Andrew, please check.
* s4-drs-test: Make the two DRS test suite a top-level test suitesKamen Mazdrashki2010-08-151-16/+21
| | | | so that test cases gets visible with "smbtorture --list"
* s4:ldap_backend.c - fix a DS error code after WERROR changeMatthias Dieter Wallnöfer2010-08-141-1/+1
|
* werror.h - fix order and duplicate DS error codesMatthias Dieter Wallnöfer2010-08-142-62/+54
|
* s4:libnet - free the "c" context also on error conditionsMatthias Dieter Wallnöfer2010-08-142-1/+3
| | | | (and if it's NULL then "talloc_free" does ignore it)
* talloc:documentation - explain that "talloc_free" works also with "NULL" ↵Matthias Dieter Wallnöfer2010-08-142-14/+26
| | | | | | | | | | | | | | | | | | | pointers (talloc.c) ... > static inline int _talloc_free_internal(void *ptr, const char *location) > { > struct talloc_chunk *tc; > > if (unlikely(ptr == NULL)) { > return -1; > } > > tc = talloc_chunk_from_ptr(ptr); ... Obviously this never had been documented before.
* s4:samdb_set_password - return "NT_STATUS_WRONG_PASSWORD" when a user ↵Matthias Dieter Wallnöfer2010-08-141-0/+2
| | | | | | account doesn't exist This is for the (SAMR) account detection protection mechanism.
* s4:password_hash LDB module - improve an error messageMatthias Dieter Wallnöfer2010-08-141-2/+2
|
* s4:password_hash LDB module - implement the SAMR behaviour when checking old ↵Matthias Dieter Wallnöfer2010-08-141-5/+16
| | | | | | passwords Sooner or later this module should take over all password change actions.
* s4:password_hash LDB module - fix wrong error codesMatthias Dieter Wallnöfer2010-08-141-4/+4
| | | | To match the passwords.py test
* s4:passwords.py - test the error code when there doesn't exist any password yetMatthias Dieter Wallnöfer2010-08-141-4/+24
| | | | After the creation of a user object we don't have any password yet.
* s4:passwords.py - perform testing of wrong old passwords on change operationsMatthias Dieter Wallnöfer2010-08-141-0/+44
|
* s4:torture/rpc/samr.c - fix a wrong torture error messageMatthias Dieter Wallnöfer2010-08-141-1/+1
|
* s3: Remove a conn NULL check from claim_connectionVolker Lendecke2010-08-141-4/+1
| | | | We've already dereferenced conn before
* s3: Fix an uninitialized variableVolker Lendecke2010-08-141-0/+3
|
* s3:auth Add error paths for invalid password_state valuesAndrew Bartlett2010-08-143-2/+10
| | | | Signed-off-by: Andrew Tridgell <tridge@samba.org>
* s3:auth Change winbindd -> auth interface to more standard structuresAndrew Bartlett2010-08-143-24/+46
| | | | | | | | | | This removes conversions to and from the source3 varient of the server_info structure when replaced in s3compat, and presents a tidier interface to winbindd in any case. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org>
* s3:auth Change 'make_user_info' to be talloc basedAndrew Bartlett2010-08-141-72/+58
| | | | | | | | | This is an ideal candidate, as it already uses a free function. It now uses talloc destructors to clear the passwords if required. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org>
* s3:auth Whitespace fixes after auth mergeAndrew Bartlett2010-08-143-20/+20
|
* s3:auth Make Samba3 use the new common struct auth_usersupplied_infoAndrew Bartlett2010-08-1419-191/+213
| | | | | | | | | | | | | This common structure will make it much easier to produce an auth module for s3compat that calls Samba4's auth subsystem. In order the make the link work properly (and not map twice), we mark both that we did try and map the user, as well as if we changed the user during the mapping. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org>
* s4:auth Move struct auth_usersupplied_info to a common locationAndrew Bartlett2010-08-147-54/+72
| | | | | | | | | This also changes the calling convention slightly - we should always allocate this with talloc_zero() to allow some elements to be optional. Some elements may only make sense in Samba3, which I hope will use this common structure. Andrew Bartlett
* waf: enable gccdeps in developer modeAndrew Tridgell2010-08-141-2/+3
| | | | there are some bugs in the waf builtin preproc this that avoids
* s4-build: fixed library name in dcerpc_server.pc.inAndrew Tridgell2010-08-141-1/+1
| | | | Thanks to Metze for spotting this
* ndr: allow ndr_print to print DATA_BLOBAndrew Tridgell2010-08-143-6/+64
| | | | | | this prints DATA_BLOB structures using the ndr->print() calls Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* dnsp: dnsp_name is 2 byte alignedAndrew Tridgell2010-08-141-0/+2
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:idmap: fix sid_to_unixid for builtin and own domain.Michael Adam2010-08-141-2/+12
| | | | | | | The old idmap code created a new mapping if asking the backends failed. Now with the new layering, if passdb (which is used for our own domain and builtin), then we need to continue and ask the backends, giving tdb or whatever the default backend is a chance to create a mapping.
* s3:idmap: fix spacing/indentationMichael Adam2010-08-141-2/+2
|
* s3:idmap_ldap: use idmap_rw_new_mapping in idmap_ldap_new_mappingMichael Adam2010-08-141-34/+3
|
* s3:idmap_ldap: add idmap_rw_ops to idmap_ldap_context and init in db_init()Michael Adam2010-08-142-2/+13
|
* s3:idmap_tdb: use idmap_rw_new_mapping in idmap_tdb_new_mappingMichael Adam2010-08-141-34/+3
|
* s3:idmap_tdb: add idmap_rw_ops to idmap_tdb_context and initialize them in ↵Michael Adam2010-08-142-3/+20
| | | | init_db
* s3:idmap_tdb2: use idmap_rw_new_mapping in idmap_tdb2_new_mappingMichael Adam2010-08-141-34/+6
|
* s3:idmap_tdb2: add rw_ops to idmap_tdb2_context and initialize in ↵Michael Adam2010-08-142-2/+14
| | | | idmap_tdb2_db_init
* s3:idmap: add abstract idmap_rw new_mapping mechanism without registering ↵Michael Adam2010-08-142-0/+135
| | | | backends
* s3:idmap_ad: untangle two assignments from checksMichael Adam2010-08-141-2/+4
|