summaryrefslogtreecommitdiffstats
path: root/source3/passdb
Commit message (Collapse)AuthorAgeFilesLines
* s3: Make use of ZERO_STRUCTPVolker Lendecke2010-02-051-1/+2
|
* s3: Remove a pointless if-statementVolker Lendecke2010-02-051-1/+1
|
* s3: Make guest_user_info() staticVolker Lendecke2010-02-051-1/+1
|
* s3: Hide some uses of pdb_get_init_flags (which I would love to remove...)Volker Lendecke2010-02-052-2/+2
|
* s3: Fix some nonempty blank linesVolker Lendecke2010-02-052-35/+34
|
* s3:passdb: fix a type Domain Users has RID -513Stefan Metzmacher2010-02-041-1/+1
| | | | metze
* Second part of fix for bug #7072 - Accounts can't be unlocked from ldap.Jeremy Allison2010-01-271-1/+2
| | | | | | Missed read of entry_timestamp (was entry->entry_timestamp). Jeremy.
* Fix bug #7072 - Accounts can't be unlocked from ldap.Jeremy Allison2010-01-271-7/+15
| | | | | | | | | | | | Fix suggested by Andy Hanton <andyhanton@gmail.com>. The LOGIN_CACHE struct contains two time_t entries, but was being written to and read from via tdb_pack/tdb_unpack functions using explicit 32-bit int specifiers. This would break on machines with a 64-bit time_t. Use correct int sizes for tdb_pack/tdb_unpack. We have to fix this properly before 2037 :-). Jeremy.
* s3: Remove some pointless uses of string_sid_tallocVolker Lendecke2010-01-231-8/+6
|
* s3:pdb_ldap: Fix large paged search.Volker Lendecke2010-01-211-0/+1
| | | | | Fix bug #6981 (Paged Search with DirX LDAP server broken). (cherry picked from commit 0a3b576c0a4298cbe600ad8943e401e3a0639359)
* s3:pdb_ldap: restore Samba 3.0.x behavior and use the first "uid" value.Stefan Metzmacher2010-01-141-1/+1
| | | | | | | | | See bug #6157 for more details. metze Signed-off-by: Stefan Metzmacher <metze@samba.org> (cherry picked from commit 25806f43ddee7e2653e907eea2c6fcc075960fa1)
* s3: Remove a pointless if-statementVolker Lendecke2010-01-121-3/+2
|
* s3: Use sid_check_is_in_our_domain instead of a direct sid_peek_check_ridVolker Lendecke2010-01-101-4/+2
|
* s3: Replace most calls to sid_append_rid() by sid_compose()Volker Lendecke2010-01-107-38/+30
|
* s3:passdb: store the plain nt passwords hashes in history, not salted md5Michael Adam2010-01-071-5/+10
| | | | | | | | | | | | | | This is in order to be able to do challenge response with the history, so that this can be checked when an invalid password was entered: If the given password is wrong but in the history, then the bad password count should not be updated... The "lucky" bit here is that the md5 has and the nt hash (md4) both are 16 bytes long. This is part of the fix for bug #4347 . Michael
* s3: Simplify pdb_set_plaintext_passwd: pwhistory==NULL can not happen anymoreVolker Lendecke2010-01-071-24/+19
|
* s3: Simplify pdb_set_plaintext_passwd: pwHistLen==0 was checked aboveVolker Lendecke2010-01-071-2/+4
|
* s3: Add a paranoia check to pdb_set_plaintext_passwd()Volker Lendecke2010-01-071-0/+5
|
* s3: Simplify pdb_set_plaintext_passwd() by removing a redundant conditionVolker Lendecke2010-01-071-22/+11
| | | | | | | | | if (current_history_len != pwHistLen) { if (current_history_len < pwHistLen) { } } The second "if" is a bit pointless here
* s3: Simplify pdb_set_plaintext_passwd: memcpy deals fine with 0 bytesVolker Lendecke2010-01-071-5/+2
|
* s3: Simplify pdb_set_plaintext_passwd by using talloc_zero_arrayVolker Lendecke2010-01-071-5/+2
|
* s3: Make use of talloc_array in pdb_set_plaintext_passwd()Volker Lendecke2010-01-071-2/+3
|
* s3: Simplify pdb_set_plaintext_passwd() a bitVolker Lendecke2010-01-071-66/+63
| | | | | | | | | | Remove an indentation by the early return in + if (pwHistLen == 0) { + /* Set the history length to zero. */ + pdb_set_pw_history(sampass, NULL, 0, PDB_CHANGED); + return true; + }
* s3: Simplify pdb_set_plaintext_passwd() slightlyVolker Lendecke2010-01-071-56/+83
| | | | | | | | | | | | | | No functional change, this just removes an indentation level by the early "return True;" in + if ((pdb_get_acct_ctrl(sampass) & ACB_NORMAL) == 0) { + /* + * No password history for non-user accounts + */ + return true; + } Volker
* s3:pdb_set_pw_history: free the old history before setting the new.Michael Adam2010-01-071-0/+1
| | | | | | | | This is not strictly necessary, since this only leaks into the struct samu, and this is not so long-lived in the code path that changes the password, but it definitely correct and does not harm. Michael
* s3:pdb_ldap:init_sam_from_ldap: untangle an assignment from the checkMichael Adam2010-01-071-3/+3
| | | | | | to enhance readability and denbuggability. Michael
* s3: "startsmbfilepwent" only looks at the inode -- is that enough?Volker Lendecke2009-11-291-4/+2
|
* s3: Pass the "fake dir create times" parameter to sys_*statVolker Lendecke2009-11-291-2/+4
| | | | Step 0 to restore it as a per-share paramter
* s3:pdb_ldap: fix a comment typoMichael Adam2009-11-191-1/+1
| | | | Michael
* s3: shortcut uid_to_sid when "ldapsam:trusted = yes"Michael Adam2009-11-191-0/+75
| | | | | | | | | | | | | | The normal uid_to_sid behaviour is to call sys_getpwuid() to get the name for the given uid and then call the getsampwnam passdb method for the resulting name. In the ldapsam:trusted case we can reduce the uid_to_sid operation to one simple search for the uidNumber attribute and only get the sambaSID attribute from the correspoinding LDAP object. This reduces the number of ldap roundtrips for this operation. Michael
* s3:passdb: remove the uid_to_rid method - we only need uid_to_sidMichael Adam2009-11-143-39/+1
| | | | Michael
* s3:pdb_default_uid_to_sid: fix some debug statements.Michael Adam2009-11-141-3/+3
| | | | Michael
* s3:smbd: also fill the memcache with sid<->id mappings in ldapsam_sid_to_id()Michael Adam2009-11-131-0/+2
| | | | | | not only the persistent idmap cache. Michael
* s3:smbd: make idmap cache persistent for "ldapsam:trusted".Michael Adam2009-11-131-0/+4
| | | | | | | | | | This stores the mappings found in the idmap cache (which lives inside gencache). This cache is already read in sid_to_Xid() and Xid_to_sid() for ldapsam:trusted, this fills the opposite direction, massively reducing the number of ldap roundtrips across smbd restarts. Michael
* Fix large paged searchVolker Lendecke2009-11-131-0/+1
| | | | Signed-off-by: Michael Adam <obnox@samba.org>
* s3: Remove debug_ctx()Volker Lendecke2009-11-031-28/+28
| | | | | | | | smbd just crashed on me: In a debug message I called a routine preparing a string that itself used debug_ctx. The outer routine also used it after the inner routine had returned. It was still referencing the talloc context that the outer debug_ctx() had given us, which the inner DEBUG had already freed.
* s3:ldap: don't search when no values where foundBjörn Jacke2009-11-021-1/+1
|
* ѕ3:ldap: search for account policies in objectclass sambaDomain, not *Björn Jacke2009-10-311-1/+6
|
* s3-secrets: use autogenerated code for TRUSTED_DOM_PASS struct parsing from ↵Günther Deschner2009-10-291-220/+36
| | | | | | a tdb. Guenther
* s3-passdb: move open_schannel_session_store() to passdb/secrets_schannel.c.Günther Deschner2009-10-282-63/+63
| | | | Guenther
* s3-passdb: add secrets_delete_generic().Günther Deschner2009-10-281-0/+16
| | | | Guenther
* s3-pdb_ldap: fix crash bug in ldapsam_set_trusteddom_pw().Günther Deschner2009-10-201-2/+2
| | | | | | Thanks Volker for the hint. Guenther
* s3-lsa: Allow to lookup 'NT AUTHORITY\Anonymous Logon' as well.Günther Deschner2009-10-201-0/+1
| | | | | | This is to finally pass RPC-LSA-LOOKUPNAMES test. Guenther
* s3-lsa: allow to lookup BUILTIN\ in lsa_LookupNames.Günther Deschner2009-10-201-0/+8
| | | | | | Found by RPC-LSA-LOOKUPNAMES torture test. Guenther
* Fix valgrind memory leak in bug #6814 - Fixes for problems reported by valgrindJeremy Allison2009-10-151-0/+1
| | | | Jeremy.
* s3: Fix some nonempty blank linesVolker Lendecke2009-10-131-5/+5
|
* s3: use enum netr_SchannelType all over the place.Günther Deschner2009-10-132-7/+10
| | | | Guenther
* s3:secrets_schannel: revert to using version 1Stefan Metzmacher2009-09-211-3/+9
| | | | | | | | | | | | | It doesn't really matter if the entries have invalid context in it. Older versions of samba refuse to open the file if the version doesn't match. If we can't parse individual records, we'll fail schannel binds, but the clients are supposed to reestablish the netlogon secure channel by doing ServerReqChallenge/ServerAuthenticate* again. This will just overwrite the old record. metze
* s3-pdb_ldap: Fix bug #4296: Clean up group membership while deleting a user.Günther Deschner2009-09-021-0/+46
| | | | | | Note that this only is tried with editposix=yes. Guenther
* s3-schannel: remove remaining code that was using "struct dcinfo".Günther Deschner2009-08-271-167/+0
| | | | Guenther