summaryrefslogtreecommitdiffstats
path: root/source3/libsmb
Commit message (Collapse)AuthorAgeFilesLines
...
* Fix a bug in smbclient not sending the correct called nameVolker Lendecke2009-04-121-1/+5
| | | | | | | | | | | | | | Jeremy, I think the ability to say smbclient //foo/bar -I <ip-address> -p 139 making the called name to "foo" got lost with 3d2d0203. Was this removed deliberately? If so, please revert this patch. If not, please merge appropriately. Thanks, Volker
* Convert cli_push to tevent_reqVolker Lendecke2009-04-081-69/+58
| | | | | | | | Metze, please check! Thanks, Volker
* Convert cli_pull to tevent_reqVolker Lendecke2009-04-081-45/+40
|
* s3:kerberos Rework smb_krb5_unparse_name() to take a talloc contextAndrew Bartlett2009-04-071-11/+12
| | | | Signed-off-by: Günther Deschner <gd@samba.org>
* Add a bad hack to enable level 2 oplocks in torture_open_connection_shareVolker Lendecke2009-04-061-0/+4
|
* Make cli_oplock_ack asyncVolker Lendecke2009-04-061-29/+94
|
* Add async oplock waiterVolker Lendecke2009-04-061-1/+101
|
* Never hand out 0xffff as a midVolker Lendecke2009-04-061-1/+1
| | | | This is used for oplock replies
* Remove async_req based async libsmb infrastructureVolker Lendecke2009-04-061-869/+0
|
* Convert cli_open to tevent_reqVolker Lendecke2009-04-061-46/+102
|
* Convert cli_close to tevent_reqVolker Lendecke2009-04-061-20/+66
|
* Streamline cli_push sync wrapperVolker Lendecke2009-04-061-9/+18
|
* Convert cli_write_andx to tevent_reqVolker Lendecke2009-04-061-37/+88
|
* Streamline cli_pull sync wrapperVolker Lendecke2009-04-061-9/+18
|
* Convert cli_read_andx to tevent_reqVolker Lendecke2009-04-061-108/+150
|
* Convert cli_ntcreate to tevent_reqVolker Lendecke2009-04-061-38/+68
|
* Convert cli_tcon_andx to tevent_reqVolker Lendecke2009-04-061-54/+69
|
* Convert cli_negprot to tevent_reqVolker Lendecke2009-04-061-36/+68
|
* Convert cli_session_setup_guest to tevent_reqVolker Lendecke2009-04-061-39/+69
|
* Convert cli_trans to tevent_reqVolker Lendecke2009-04-061-382/+272
|
* Convert cli_echo to tevent_reqVolker Lendecke2009-04-061-79/+66
|
* Add new async libsmb infrastructureVolker Lendecke2009-04-062-0/+777
| | | | | | | | I know this is just yet another iteration, but I like this one much better than the one that exists right now :-) It will do trans and echo requests without a _recv helper and without unnecessary memcpy().
* Remove async_req dependency from cli_pull_transVolker Lendecke2009-04-051-23/+25
|
* Fix an uninitialized variable valgrind errorVolker Lendecke2009-03-311-2/+2
| | | | Signed-off-by: Stefan Metzmacher <metze@samba.org>
* [Bug 6228] SMBC_open_ctx failure due to path resolve failure doesn't set errnoDerrell Lipman2009-03-273-1/+15
| | | | | | | | | | | | Fixed. It turns out there were a number of places where cli_resolve_path() was called and the error path upon that function failing did not set errno. There were a couple of places the failure handling code did set errno to ENOENT, so I made them all consistent, although I think better errno choices for this condition exist, e.g. EHOSTUNREACH. Derrell
* s3: parse_packet can return NULL which is then dereferenced in ↵Tim Prouty2009-03-241-0/+2
| | | | match_mailslot_name
* Fix two memleaks in the encryption codeVolker Lendecke2009-03-241-1/+2
| | | | | | | | | | ntlmssp_seal_packet creates its own signature data blob, which we then have to free. Jeremy, please check and merge appropriately (Yes, I'm asking you to do the janitor work, I want you to *look* at this :-)) Volker
* s3:dsgetdcname: use parentheses in if condition to make negation clearBjörn Jacke2009-03-241-1/+1
| | | | Signed-off-by: Günther Deschner <gd@samba.org>
* s3:libsmb: use new simplified smb_signing code for the client sideStefan Metzmacher2009-03-235-686/+204
| | | | | | | | | | We store the seqnum/mid mapping in the cli_request structure for async requests and in the cli_state structure for sync calls. We skip the signing check for oplock requests while waiting for async requests coming in. metze
* s3:smbd: use new simplified snb_signing code in the serverStefan Metzmacher2009-03-231-333/+0
| | | | | | | | | We keep the seqnum/mid mapping in the smb_request structure. This also moves one global variable into the smbd_server_connection struct. metze
* s3:libsmb: add a much simplified smb_siging infrastructureStefan Metzmacher2009-03-231-0/+370
| | | | | | | | It's the job of the caller to maintain the seqnum/mid mapping. Hopefully we can use this code in s4 later too. metze
* s3:libsmb: rename smb_signing.c => clisigning.cStefan Metzmacher2009-03-231-0/+0
| | | | | | This prepares a large simplification of the smb_signing code metze
* Fix connect to port 139 only -- thanks gd for bugging me :-)Volker Lendecke2009-03-231-4/+3
|
* s3-krb5: Fix Coverity #722 (RESOURCE_LEAK).Günther Deschner2009-03-201-12/+18
| | | | Guenther
* Fix crash in async_smb.cBo Yang2009-03-201-3/+6
|
* s3:libsmb: always create bytes array in cli_trans codeStefan Metzmacher2009-03-191-5/+14
| | | | | | | | | Otherwise we return NO_MEMORY without a reason for fragmented trans requests, as talloc_append_blob() returns buf if we append a 0 length blob. When we pass buf = NULL we'll get back NULL and then assume NO_MEMORY... metze
* s3:libsmb: fix smb signing for fragmented trans/trans2/nttrans requestsStefan Metzmacher2009-03-191-23/+7
| | | | | | | | | | | | | | | | | | | | | | Before we send the secondary requests we need to remove the old mid=>seqnum mapping and reset cli->mid and make the new mid=>seqnum mapping "persistent". The bug we had in cli_send_trans was this: The first cli_send_smb() incremented cli->mid and the secondary requests used the incremented mid, but as cli->outbuf still had the correct mid, we send the correct mid to the server. The real problem was that the cli_send_smb() function stored the seqnum under the wrong mid. cli_send_nttrans() was totally broken and now follows the same logic as cli_send_trans(). The good thing is that in practice the problem is unlikely to happen, because max_xmit is large enough to avoid secondary requests. metze
* Allow DFS client paths to work when POSIX pathnames have beenJeremy Allison2009-03-181-2/+12
| | | | | selected (we need to path in pathname /that/look/like/this). Jeremy.
* s3: remove POLICY_HND.Günther Deschner2009-03-182-7/+7
| | | | Guenther
* Remove the global "struct cm_cred_struct" and associated calls, makeJeremy Allison2009-03-176-168/+148
| | | | | | | | | callers pass in a struct user_auth_info * instead. This commit causes smbc_set_credentials() to print out a message telling callers to use smbc_set_credentials_with_fallback() instead, as smbc_set_credentials() has a broken API (no SMBCCTX * pointer). No more global variables used in the connection manager API for client dfs calls. Jeremy.
* Convert open_socket_out_defer to tevent_reqVolker Lendecke2009-03-161-22/+37
|
* Fix a malloc/talloc mismatch when cli_initialise() failsVolker Lendecke2009-03-151-3/+2
|
* Remove pwd_cache.c, it was doing nothing. Make user_name, domain, andJeremy Allison2009-03-134-78/+95
| | | | | password talloc'ed strings within the cli_struct. Jeremy.
* Remove the static "struct client_connection" mess which is part ofJeremy Allison2009-03-123-113/+82
| | | | | | | | the problem that stops libsmbclient being thread safe. Subsidiary DFS connections are now hung off a list inside the cli_state struct. Much more to do in order to get libsmbclient to thread safety, but this is a good start. Jeremy.
* Revert "s3:libsmb: add an option to cli_push to let the caller provide the ↵Stefan Metzmacher2009-03-121-25/+8
| | | | | | | | | | | | | buffers" This reverts commit 9579a6f193f570e4ce2af80f4aac7c2f25ae5b22. It's confusing to have a boolean to alter the behavior of cli_push and as the new feature isn't used yet I revert it. We can readd a extra function later. metze
* s3:libsmb: add an option to cli_push to let the caller provide the buffersStefan Metzmacher2009-03-101-8/+25
| | | | metze
* s3:libsmb: only treat a return 0 as end of fileStefan Metzmacher2009-03-101-4/+1
| | | | metze
* s3:libsmb: fix a lot of cli_push() bugsStefan Metzmacher2009-03-101-95/+107
| | | | | | | | | | | | There were the following problems: 1.) if window_size was a multiple of the chunk_size, we silently dropped the last truncated chunk. 2.) if window_size was 0 pushed only the first chunk to the server and silently dropped the rest. 3.) we had only transferred state->num_reqs writes, even if there would be more data to send. metze
* Fix a smbclient segfault against security=share serversVolker Lendecke2009-03-071-3/+10
|
* Fix some nonempty blank linesVolker Lendecke2009-03-071-22/+22
|