summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* s3-schannel: use NL_AUTH_SIGNATURE for schannel sign & seal (client & server).Günther Deschner2009-09-115-83/+118
| | | | Guenther
* s3-errors: add NT_STATUS_RPC_NT_PROCNUM_OUT_OF_RANGE.Günther Deschner2009-09-112-0/+2
| | | | Guenther
* s3-schannel: remove unused code.Günther Deschner2009-09-113-75/+0
| | | | Guenther
* s3-schannel: use NL_AUTH_MESSAGE for schannel bind reply.Günther Deschner2009-09-111-10/+17
| | | | Guenther
* schannel: more work on reponse NL_AUTH_MESSAGES.Günther Deschner2009-09-116-1/+96
| | | | Guenther
* s3-nterr: add NT_STATUS_RPC_NT_PROTOCOL_ERROR to nt_errstr().Günther Deschner2009-09-111-0/+1
| | | | Guenther
* s3-util: add get/set_cmdline_auth_info_domain to user_auth_info struct.Günther Deschner2009-09-113-0/+22
| | | | Guenther
* s3-rpcclient: add lookupnames4 command.Günther Deschner2009-09-111-0/+52
| | | | Guenther
* s3-rpcclient: add ncacn transport handling for rpcclient.Günther Deschner2009-09-111-5/+88
| | | | Guenther
* s3-rpc_client: add enum dcerpc_transport_t to rpc_cli_transport struct.Günther Deschner2009-09-112-0/+10
| | | | Guenther
* s4:setup Updated Display Specifiers from Microsoft (with #s)Andrew Bartlett2009-09-115-91/+30
| | | | | | | | This fixes the issue with the original files that they didn't have a leading # in front of the comments, which caused our parsing scripts much pain. The files are now exactly as delivered. Andrew Bartlett
* s4: Pass WINBINDD_SOCKET_DIR var in order to overide the location of the ↵Matthieu Patou2009-09-111-0/+2
| | | | Winbind socket
* s4:ldb_map: Don't free ares too early.Andrew Kroeger2009-09-111-3/+3
| | | | | As found when running "make test" with the MALLOC_CHECK_ and MALLOC_PERTURB_ environment variables set.
* s4/tort: CRACKNAMES tests to use private structure for testing.Kamen Mazdrashki2009-09-111-2/+33
| | | | | DsCrackNamesPrivate structure basically inherits DsPrivate structure while adding few test-specific members.
* s4/tort: Make common setup/teardown drsuapi test funcs really commonKamen Mazdrashki2009-09-111-13/+6
|
* s4/tort: CrackNames test update to work against W2K3.Kamen Mazdrashki2009-09-111-0/+4
| | | | | | DRSUAPI_DS_NAME_FORMAT_UKNOWN added to 'known-to-fail' responses as this actually means to ask AD to resolve a name from FQDN format to Unknown format.
* util_strlist: Add some more "const"s - small correctionMatthias Dieter Wallnöfer2009-09-101-1/+1
|
* util_strlist: Add some more "const"sMatthias Dieter Wallnöfer2009-09-102-22/+27
|
* Fix bug 6707 - 3.4.1 segfault in parsing configs.Marc Aurele La France2009-09-101-4/+4
| | | | Fixes an occasional segfault caused by an out-of-bounds reference in config file parsing.
* s4:srvsvc: Fix logic on error checking.Andrew Kroeger2009-09-101-6/+6
|
* s4:pwsettings: Added blackbox tests.Andrew Kroeger2009-09-102-0/+30
| | | | | | The added tests include basic validation that the script runs and accepts all custom arguments. The tests also verify changes to the password complexity, minimum password length, and minimum password length settings.
* testprogs:subunit.sh: Add function for expected failures.Andrew Kroeger2009-09-101-0/+15
| | | | | | | The testit_expect_failure() function is like the testit() function, with reversed error detection logic. This reversal only affects the pass/fail logic and logging - the original return code from the command is still returned to the calling script.
* s4:pwsettings: Show default values in help messages.Andrew Kroeger2009-09-101-4/+4
|
* s4:pwsettings: Add 'default' option for password complexity.Andrew Kroeger2009-09-101-2/+2
|
* s4:pwsettings: Added validation.Andrew Kroeger2009-09-101-4/+26
| | | | | | | | | | Validate that each field is within its allowed range. Also validate that the maximum password age is greater than the minimum password length (if the maximum password age is set). I could not find these values documented anywhere in the WSPP docs. I used the values shown in the W2K8 GPMC, as it appears that the GPMC actuaally performs the validation of values.
* s4:pwsettings: Don't assume a value for pwdProperties.Andrew Kroeger2009-09-101-2/+2
| | | | | | | If we cannot retrieve the value, do not assume a particular value. The fact that we could not retrieve the value indicates a larger problem that we don't want to make worse bypossibly clearing bit fields in the pwdProperties attribute.
* s4:pwsettings: Run all updates as a single modify() operation.Andrew Kroeger2009-09-101-31/+19
| | | | | | This ensures that all changes are made, or none are made. It also makes it possible to do validation as we go and abort in case of an error, while always leaving things in a consistent state.
* s4:pwsettings: Added --quiet option.Andrew Kroeger2009-09-101-16/+17
| | | | | Also changed all non-error status output to use the message() function, which respects the --quiet option.
* s4:netlogon - Put the "supported encryption types" more back in the ↵Matthias Dieter Wallnöfer2009-09-101-6/+8
| | | | | | "LogonGetDomainInfo" call They're needed only at the end.
* Revert "s4: Let the "setpassword" script finally use the ↵Matthias Dieter Wallnöfer2009-09-102-70/+9
| | | | | | | | | "samdb_set_password" routine" This reverts commit fdd62e9699b181a140292689fcd88a559bc26211. abartlet and I agreed that this isn't the right way to enforce the password policies. Sooner or later we've to control them anyway on the directory level.
* s4/torture: fixed lots of crash bugs in the DRS testsAndrew Tridgell2009-09-101-17/+19
|
* s4:provision Only delete SASL mappings with Fedora DS, not OpenLDAPAndrew Bartlett2009-09-101-31/+30
| | | | | | | | We need to be more careful to do the cleanup functions for the right backend. In future, these perhaps should be provided by the ProvisionBackend class. Andrew Bartlett
* s4/drs: enable attribute encryptionAndrew Tridgell2009-09-101-6/+41
| | | | | This means we now get passwords vampired correctly for s4<->s4 replication.
* s4: kludge_acl needs to be above repl_meta_dataAndrew Tridgell2009-09-101-2/+2
| | | | | We have to bypass kludge_acl in replication as otherwise we aren't allowed access to the password entries
* s4/repl: give a useful error message if we can't decode an objectAndrew Tridgell2009-09-101-1/+4
|
* libcli: added a drsuapi attribute encryption functionAndrew Tridgell2009-09-102-11/+78
|
* libcli:drsuapi Add function to encrypt data for transport over DRSUAPIAndrew Bartlett2009-09-101-0/+102
| | | | | | This is for the server side of the GetNCChanges call. Andrew Bartlett
* s4/drs: changed the UpdateRefs server to use the dn instead of the GUIDAndrew Tridgell2009-09-101-27/+18
| | | | | | | | | Our vampire code sends a zero GUID in the updaterefs calls. Windows seems to ignore the GUID and use the DN in the naming context instead, so I have changed our UpdateRefs server implementation to do the same. With this change we can now vampire from s4<->s4 successfully! Now to see if all the attributes came across correctly.
* OPC oota editsJohn H Terpstra2009-09-091-6/+6
|
* s4/drs: correctly fill in the GUID of DRS objectsAndrew Tridgell2009-09-101-1/+1
|
* s4: fix spellingAndrew Tridgell2009-09-101-1/+1
|
* s4/provision: another fix for breakage from b1dabb1133Andrew Tridgell2009-09-101-6/+8
|
* s4:provision Don't reference provision_backend when using LDBAndrew Bartlett2009-09-101-1/+3
| | | | | | This broke in Endi's patch for Fedora DS support Andrew Bartlett
* s4/torture: don't mix declarations and codeAndrew Tridgell2009-09-101-22/+22
|
* s4: regenerate drsuapi IDLAndrew Tridgell2009-09-102-0/+24
|
* s4/schema: teach the schema_syntax code how to encode/decode more attributesAndrew Tridgell2009-09-101-0/+104
| | | | | | | We were trying to encode strings like 'top' as integers, without first looking them up in our schema. We need special handling for all the attributes that contain attributeID_id or governsID_id fields that should be translated first before encoding.
* s4/schema: don't crash if we don't have subClassOfAndrew Tridgell2009-09-101-2/+7
|
* s4/drsuapi: tech the IDL about some more key attribute namesAndrew Tridgell2009-09-101-0/+8
|
* s4: Use SASL authentication against Fedora DS.Endi Sukma Dewata2009-09-106-23/+103
| | | | | | | | | | | | | | | | | | | | | | | | | | | 1. During instance creation the provisioning script will import the SASL mapping for samba-admin. It's done here due to missing config schema preventing adding the mapping via ldapi. 2. After that it will use ldif2db to import the cn=samba-admin user as the target of SASL mapping. 3. Then it will start FDS and continue to do provisioning using the Directory Manager with simple bind. 4. The SASL credentials will be stored in secrets.ldb, so when Samba server runs later it will use the SASL credentials. 5. After the provisioning is done (just before stopping the slapd) it will use the DM over direct ldapi to delete the default SASL mappings included automatically by FDS, leaving just the new samba-admin mapping. 6. Also before stopping slapd it will use the DM over direct ldapi to set the ACL on the root entries of the user, configuration, and schema partitions. The ACL will give samba-admin the full access to these partitions. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:docs: Add info about how to obtain cifs module in cifs mount helper manpageVolker Lendecke2009-09-091-0/+8
|