| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
| |
If the test setup fails, we still need to format the test result for the
UI. At leas in the subunit case, the format doesn't specify what to do
here, so we fail every test manually with the setup failure message.
|
| |
|
|
|
|
|
|
| |
Both the session_info and the ldb can have references.
Andrew Bartlett
|
|
|
|
|
|
|
| |
This also changes the primary group for anonymous to be the anonymous
SID, and adds code to detect and ignore this when constructing the token.
Andrew Bartlett
|
| |
|
| |
|
|
|
|
| |
This isn't needed any more, and just introduces complexity.
|
|
|
|
|
|
| |
There isn't a good reason why this code is duplicated.
Andrew Bartlett
|
|
|
|
| |
This makes the structure more like Samba3's NT_USER_TOKEN
|
|
|
|
|
|
|
| |
This simply askes IDMAP about all the user SIDs, rather than the user
and group sid, followed by all but the first two sids from the token.
Andrew Bartlett
|
|
|
|
|
|
|
|
| |
This will allow us to stop duplicating the user and primary group SID in the
struct security_token, and therefore make it more like the NT_USER_TOKEN
in Samba3.
Andrew Bartlett
|
| |
|
| |
|
| |
|
|
|
|
| |
This is only called from client code
|
| |
|
| |
|
|
|
|
| |
All callers have appropriate debug messages themselves
|
| |
|
|
|
|
| |
here the new password change syntax
|
|
|
|
|
|
|
|
| |
Now it's finally possible that the user can change his password with a DSDB
connection using his credentials.
NOTICE: I had to extract the old password from the SAMDB since I was unable to
find it somewhere else (authinfo for example).
|
|
|
|
|
| |
Now it's finally possible that the user can change his password with a DSDB
connection using his credentials.
|
|
|
|
| |
password sets
|
| |
|
|
|
|
|
|
| |
the password change control
And introduce parameters to pass the old password hashes.
|
|
|
|
| |
password change control
|
|
|
|
|
|
|
| |
DSDB_CONTROL_PASSWORD_CHANGE_OID control
This control is used from the SAMR and "kpasswd" password changes. It is
strictly private and means "this is a password change and not a password set".
|
|
|
|
|
|
| |
control
This contains the NT and/or LM hash of the password specified by the user.
|
|
|
|
|
| |
Rename it to "DSDB_CONTROL_PASSWORD_CHANGE_OID". This control will afterwards
contain a record with the specified old password as NT and/or LM hash.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This reverts commit 61930f50cbace4741500d8b53fc11a4ef3e0d4f8.
This breaks the build with older gcc versions
gcc --version
gcc (SUSE Linux) 4.3.2 [gcc-4_3-branch revision 141291]
(This is SLES 11)
Please only enable it if thet compiler supports it.
metze
|
|
|
|
|
|
| |
Otherwise just fill the disks of the build-farm hosts.
metze
|
|
|
|
| |
metze
|
| |
|
| |
|
| |
|
|
|
|
|
| |
What type an enum is depends on the implementation, the compiler and
probably the compiler options. sizeof(enum) is normally not sizeof(int)!
|
|
|
|
| |
the distinguishedName element was getting an uninitialised flags value
|
|
|
|
|
|
|
| |
A DRS DsBind handle can be re-used in a later connection. This implies
reuse of the session_info for the connection. If the first connection
is shutdown then the session_info in the sam context on the 2nd
connection must remain valid.
|
|
|
|
|
| |
This was added as we are occasionally getting an encrypted unknown
netlogon call, and I'm having trouble looking at it in wireshark
|
|
|
|
| |
This seems to be equivalent to SEC_CHAN_BDC, but for RODCs
|
|
|
|
|
|
|
| |
this allows for "net setpassword -H ldap://server -Uusername%password USERNAME"
to set a password remotely on a windows DC
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
|
|
|
| |
we saw a crash with a bad pointer here, and this may help track it
down
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
|
|
|
|
| |
w2k8r2 is setting this bit as a RODC. Instead of refusing the
replication, we now remove the bit from req8, which means other places
in the code that check this bit can stay the same
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
|
|
|
| |
we need the domain_sid to determine if the account is a RODC for our
domain
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
|
|
| |
check more than the user_sid, and also check for the right rid value
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
|
|
|
| |
when this is in user_account_control the account is a RODC, and we
need to set the primaryGroupID to be DOMAIN_RID_READONLY_DCS
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
|
|
| |
this is used by w2k8r2 when doing a RODC dcpromo
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
|
|
|
|
|
| |
msDS-SecondaryKrbTgtNumber is setup with a value that is outside the
range allowed by the schema (the schema has
rangeLower==rangeUpper==65536). We need to mark this element as being
internally generated to avoid the range checks
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
|
|
|
|
| |
When this flag is set on an element in an add/modify request then the
normal validate_ldb() call that checks the element against schema
constraints is disabled
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
|
|
|
| |
This ensures that internal bits for the element flags in add/modify
requests are not set via the ldb API
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|