summaryrefslogtreecommitdiffstats
path: root/source3/smbd
Commit message (Collapse)AuthorAgeFilesLines
* s3:smbd: SMB ReadX with size > 0xffff should only possible for samba clients.Stefan Metzmacher2011-09-141-1/+10
| | | | | | | | | | | | | | | Windows 2008 R2 (and others) ignore the high bits for the read size. Unless we're using the unix extentions and the client uses CIFS_UNIX_LARGE_READ_CAP, we should also ignore the high bits. But we still need to support old "smbclient" binaries and have to check if the client is "Samba". metze Signed-off-by: Jeremy Allison <jra@samba.org>
* s3:smbd: remember the client unix capabilities on the connectionStefan Metzmacher2011-09-142-43/+44
| | | | | | metze Signed-off-by: Jeremy Allison <jra@samba.org>
* s3:smb2_server: SMB2_OP_GETINFO doesn't require at least 1 dyn byteStefan Metzmacher2011-09-141-1/+13
| | | | metze
* s3:smbd: make use of better SMB signing negotiationStefan Metzmacher2011-09-144-4/+31
| | | | | | | metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed Sep 14 09:41:02 CEST 2011 on sn-devel-104
* s3:smb_signing: add support for easier negotiation of SMB signingStefan Metzmacher2011-09-141-3/+7
| | | | | | We don't make use of it yet, but it will follow. metze
* s3:smbd: echo FLAGS2_SMB_SECURITY_SIGNATURES* and the signature field in the ↵Stefan Metzmacher2011-09-141-3/+9
| | | | | | | | reply This matches what windows is doing. metze
* s3: Remove a reference to smbd_server_connVolker Lendecke2011-09-131-1/+1
|
* s3: Remove a reference to smbd_server_connVolker Lendecke2011-09-131-1/+1
|
* s3: Remove a reference to smbd_server_connVolker Lendecke2011-09-131-2/+3
|
* s3: Remove a reference to smbd_server_connVolker Lendecke2011-09-131-1/+2
|
* s3: Remove a reference to smbd_server_connVolker Lendecke2011-09-131-2/+10
|
* s3: Fix some nonempty blank linesVolker Lendecke2011-09-131-3/+3
|
* libcli/smb: s/FLAGS2_UNKNOWN_BIT4/FLAGS2_SMB_SECURITY_SIGNATURES_REQUIREDStefan Metzmacher2011-09-101-1/+1
| | | | | | | metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Sat Sep 10 00:34:50 CEST 2011 on sn-devel-104
* Second part of fix for bug #8443 - Default user entry is set to minimal ↵Jeremy Allison2011-09-091-8/+11
| | | | | | | | | permissions on incoming ACL change with no user specified. Be smarter about setting default permissions when a ACL_USER_OBJ isn't given. Use the principle of least surprises for the user. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Fri Sep 9 00:26:08 CEST 2011 on sn-devel-104
* First part of fix for bug #8443 - Default user entry is set to minimal ↵Jeremy Allison2011-09-081-58/+2
| | | | | | | permissions on incoming ACL change with no user specified. create_default_mode() is not needed - it's taken care of by code inside ensure_canon_entry_valid().
* Revert "Part 4 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid ↵Jeremy Allison2011-09-081-11/+8
| | | | | | | | | | | | | for set (Invalid argument)" This belongs as part of the bugfix for bug #8443 - Default user entry is set to minimal permissions on incoming ACL change with no user specified. Not as part of #7509. This reverts commit 2a1453e2318af77a79180f3137f8a8d3f1240233. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Thu Sep 8 08:50:12 CEST 2011 on sn-devel-104
* s3:smb2_server: return OBJECT_NAME_INVALID if the path is terminated in ↵Stefan Metzmacher2011-09-071-0/+8
| | | | | | | | | SMB2_FIND/QUERY_DIRECTORY metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed Sep 7 12:15:51 CEST 2011 on sn-devel-104
* s3:smb2_server: return OBJECT_NAME_INVALID if the path is terminated in ↵Stefan Metzmacher2011-09-071-0/+8
| | | | | | SMB2_CREATE metze
* s3:smb2_server: return BAD_NETWORK_NAME if the path is terminated in SMB2_TCONStefan Metzmacher2011-09-071-0/+8
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_write.cStefan Metzmacher2011-09-071-12/+6
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_setinfo.cStefan Metzmacher2011-09-071-13/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_read.cStefan Metzmacher2011-09-071-11/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_notify.cStefan Metzmacher2011-09-071-12/+4
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_lock.cStefan Metzmacher2011-09-071-11/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_keepalive.cStefan Metzmacher2011-09-071-13/+4
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_ioctl.cStefan Metzmacher2011-09-071-13/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_getinfo.cStefan Metzmacher2011-09-071-13/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_flush.cStefan Metzmacher2011-09-071-12/+4
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_find.cStefan Metzmacher2011-09-071-13/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_create.cStefan Metzmacher2011-09-071-11/+4
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_close.cStefan Metzmacher2011-09-071-12/+3
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_break.cStefan Metzmacher2011-09-071-12/+4
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_tcon.cStefan Metzmacher2011-09-071-24/+8
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_sesssetup.cStefan Metzmacher2011-09-071-26/+9
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_negprot.cStefan Metzmacher2011-09-071-10/+4
| | | | metze
* s3:smb2_server: add smbd_smb2_request_verify_sizes()Stefan Metzmacher2011-09-072-0/+45
| | | | metze
* Revert "Part 5 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid ↵Jeremy Allison2011-09-071-21/+4
| | | | | | | | | | | | for set (Invalid argument)" This reverts commit 17f6e0272370f764d4a0053c8e74f20b0444c721. Using the existing default permissions for group access is incorrect when no such permissions are given in the incoming ACL. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Wed Sep 7 03:50:21 CEST 2011 on sn-devel-104
* s3:smb2_server: make use of SMB2_WRITEFLAG_WRITE_THROUGHStefan Metzmacher2011-09-061-1/+1
| | | | | | | metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Tue Sep 6 16:59:50 CEST 2011 on sn-devel-104
* s3:smb2_server: add basic support for SMB 2.1Stefan Metzmacher2011-09-053-4/+65
| | | | | | | | | | | | | | This adds support for the 2 stage negprot, from SMB 1 to SMB 2.1. Support for this of for now and "max protocol = SMB2" still maps to "max protocol = SMB2_02" PROTOCOL_SMB2_02. In order to activate smb2.1, you need to use "max protocol = SMB2_10". metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Mon Sep 5 19:30:58 CEST 2011 on sn-devel-104
* s3:smb2_server: return NOT_SUPPORTED if we don't find a common dialect with ↵Stefan Metzmacher2011-09-051-6/+8
| | | | | | the client metze
* s3:smb2_server: max_trans, max_read and max_write are limited to 64 kilobytesStefan Metzmacher2011-09-051-3/+17
| | | | | | Only if SMB2_CAP_LARGE_MTU is supported we should announce larger limits. metze
* s3-smbd: Rename reload_printers() and add documentation.Andreas Schneider2011-09-053-8/+19
| | | | | Autobuild-User: Andreas Schneider <asn@cryptomilk.org> Autobuild-Date: Mon Sep 5 17:59:47 CEST 2011 on sn-devel-104
* s3: Fix smbcontrol smbd idmap kill S-1-5-21-...Volker Lendecke2011-09-051-6/+20
| | | | | | | | | The calls to sid_to_gid and sid_to_uid create id mapping entries themselves, which makes it pretty difficult to reliably delete id mapping entries everywhere just using a SID. Autobuild-User: Volker Lendecke <vlendec@samba.org> Autobuild-Date: Mon Sep 5 16:30:41 CEST 2011 on sn-devel-104
* s3: Reformat msg_idmap.c to match Samba codingVolker Lendecke2011-09-051-13/+19
|
* s3:smbd: make use of PROTOCOL_SMB2_02Stefan Metzmacher2011-09-051-1/+1
| | | | metze
* libcli/smb: move smb2_signing.c to the toplevelStefan Metzmacher2011-09-052-143/+0
| | | | metze
* Part 5 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid for set ↵Jeremy Allison2011-09-031-4/+21
| | | | | | | | | | (Invalid argument) Be smarter about setting default permissions when a ACL_GROUP_OBJ isn't given. Use the principle of least surprises for the user. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Sat Sep 3 00:16:05 CEST 2011 on sn-devel-104
* Part 4 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid for set ↵Jeremy Allison2011-09-021-8/+11
| | | | | | | (Invalid argument) Be smarter about setting default permissions when a ACL_USER_OBJ isn't given. Use the principle of least surprises for the user.
* Part 3 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid for set ↵Jeremy Allison2011-09-021-7/+6
| | | | | | | | (Invalid argument) Don't call check_owning_objs() to convert ACL_USER->ACL_USER_OBJ and AC_GROUP->ACL_GROUP_OBJ for default (directory) ACLs, we do this separately inside ensure_canon_entry_valid().
* Part 2 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid for set ↵Jeremy Allison2011-09-021-0/+38
| | | | | | | (Invalid argument) Only map CREATOR_OWNER/CREATOR_GROUP to ACL_USER_OBJ/ACL_GROUP_OBJ in a default(directory) ACL set.