summaryrefslogtreecommitdiffstats
path: root/source3/smbd
Commit message (Collapse)AuthorAgeFilesLines
...
* s3: Remove the smbd_server_conn ref from dfs_redirectVolker Lendecke2011-09-261-1/+3
|
* s3: Remove the smbd_server_conn ref from create_conn_structVolker Lendecke2011-09-262-8/+10
|
* s3: Remove the smbd_server_conn ref from parse_dfs_pathVolker Lendecke2011-09-261-5/+8
|
* s3:smbd: disconnect the socket if we got an unexpected requestStefan Metzmacher2011-09-232-1/+20
| | | | | | | | | | | If we got a SMB2_OP_NEGPROT after the protocol is already negotiated or if we got a non SMB2_OP_NEGPROT before the protocol was negotiated we should close the connection (as windows does). metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Fri Sep 23 12:30:50 CEST 2011 on sn-devel-104
* s3:smbd: don't call smbd_terminate_connection in smb2_validate_message_id() ↵Stefan Metzmacher2011-09-231-2/+3
| | | | | | | | (bug #8476) Only return false and the caller will terminate the connection. metze
* Fix bug #8477 - Map to guest can return uninitialized blob of data.Jeremy Allison2011-09-231-1/+3
| | | | | | | Found by Codenomicon at SNIA SDC. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Fri Sep 23 03:19:46 CEST 2011 on sn-devel-104
* s3:smb2_server: fix a logic error, we should sign non guest sessionsStefan Metzmacher2011-09-221-1/+1
| | | | metze
* Fix bug #8476 - Samba asserts when SMB2 client breaks the crediting rules.Jeremy Allison2011-09-221-1/+6
| | | | | | | Just drop the connection, not SMB_ASSERT. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Thu Sep 22 19:41:31 CEST 2011 on sn-devel-104
* Fix bug #8458] - IE9 on Windows 7 cannot download files to samba 3.5.11 shareJeremy Allison2011-09-211-0/+25
| | | | Handle the SECINFO_LABEL flag in the same was as Win2k3.
* Fix bug #8473 - smb2_find uses a hard coded max reply size of 0x10000 ↵Jeremy Allison2011-09-211-1/+1
| | | | | | instead of smb2_max_trans. Use lp_smb2_max_trans() instead of 0x10000.
* s3:smb2-server: session setup replies should always be signed (except for ↵Michael Adam2011-09-211-2/+7
| | | | | | | | | | | guest sessions) not only if the session should be signed Signed-off-by: Stefan Metzmacher <metze@samba.org> Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed Sep 21 11:00:09 CEST 2011 on sn-devel-104
* s3: Trim a debug to 80 charsVolker Lendecke2011-09-181-6/+11
| | | | | Autobuild-User: Volker Lendecke <vlendec@samba.org> Autobuild-Date: Sun Sep 18 01:15:02 CEST 2011 on sn-devel-104
* s3: Fix a cut&paste errorVolker Lendecke2011-09-171-1/+1
|
* s3:smbd: SMB ReadX with size > 0xffff should only possible for samba clients.Stefan Metzmacher2011-09-141-1/+10
| | | | | | | | | | | | | | | Windows 2008 R2 (and others) ignore the high bits for the read size. Unless we're using the unix extentions and the client uses CIFS_UNIX_LARGE_READ_CAP, we should also ignore the high bits. But we still need to support old "smbclient" binaries and have to check if the client is "Samba". metze Signed-off-by: Jeremy Allison <jra@samba.org>
* s3:smbd: remember the client unix capabilities on the connectionStefan Metzmacher2011-09-142-43/+44
| | | | | | metze Signed-off-by: Jeremy Allison <jra@samba.org>
* s3:smb2_server: SMB2_OP_GETINFO doesn't require at least 1 dyn byteStefan Metzmacher2011-09-141-1/+13
| | | | metze
* s3:smbd: make use of better SMB signing negotiationStefan Metzmacher2011-09-144-4/+31
| | | | | | | metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed Sep 14 09:41:02 CEST 2011 on sn-devel-104
* s3:smb_signing: add support for easier negotiation of SMB signingStefan Metzmacher2011-09-141-3/+7
| | | | | | We don't make use of it yet, but it will follow. metze
* s3:smbd: echo FLAGS2_SMB_SECURITY_SIGNATURES* and the signature field in the ↵Stefan Metzmacher2011-09-141-3/+9
| | | | | | | | reply This matches what windows is doing. metze
* s3: Remove a reference to smbd_server_connVolker Lendecke2011-09-131-1/+1
|
* s3: Remove a reference to smbd_server_connVolker Lendecke2011-09-131-1/+1
|
* s3: Remove a reference to smbd_server_connVolker Lendecke2011-09-131-2/+3
|
* s3: Remove a reference to smbd_server_connVolker Lendecke2011-09-131-1/+2
|
* s3: Remove a reference to smbd_server_connVolker Lendecke2011-09-131-2/+10
|
* s3: Fix some nonempty blank linesVolker Lendecke2011-09-131-3/+3
|
* libcli/smb: s/FLAGS2_UNKNOWN_BIT4/FLAGS2_SMB_SECURITY_SIGNATURES_REQUIREDStefan Metzmacher2011-09-101-1/+1
| | | | | | | metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Sat Sep 10 00:34:50 CEST 2011 on sn-devel-104
* Second part of fix for bug #8443 - Default user entry is set to minimal ↵Jeremy Allison2011-09-091-8/+11
| | | | | | | | | permissions on incoming ACL change with no user specified. Be smarter about setting default permissions when a ACL_USER_OBJ isn't given. Use the principle of least surprises for the user. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Fri Sep 9 00:26:08 CEST 2011 on sn-devel-104
* First part of fix for bug #8443 - Default user entry is set to minimal ↵Jeremy Allison2011-09-081-58/+2
| | | | | | | permissions on incoming ACL change with no user specified. create_default_mode() is not needed - it's taken care of by code inside ensure_canon_entry_valid().
* Revert "Part 4 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid ↵Jeremy Allison2011-09-081-11/+8
| | | | | | | | | | | | | for set (Invalid argument)" This belongs as part of the bugfix for bug #8443 - Default user entry is set to minimal permissions on incoming ACL change with no user specified. Not as part of #7509. This reverts commit 2a1453e2318af77a79180f3137f8a8d3f1240233. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Thu Sep 8 08:50:12 CEST 2011 on sn-devel-104
* s3:smb2_server: return OBJECT_NAME_INVALID if the path is terminated in ↵Stefan Metzmacher2011-09-071-0/+8
| | | | | | | | | SMB2_FIND/QUERY_DIRECTORY metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed Sep 7 12:15:51 CEST 2011 on sn-devel-104
* s3:smb2_server: return OBJECT_NAME_INVALID if the path is terminated in ↵Stefan Metzmacher2011-09-071-0/+8
| | | | | | SMB2_CREATE metze
* s3:smb2_server: return BAD_NETWORK_NAME if the path is terminated in SMB2_TCONStefan Metzmacher2011-09-071-0/+8
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_write.cStefan Metzmacher2011-09-071-12/+6
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_setinfo.cStefan Metzmacher2011-09-071-13/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_read.cStefan Metzmacher2011-09-071-11/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_notify.cStefan Metzmacher2011-09-071-12/+4
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_lock.cStefan Metzmacher2011-09-071-11/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_keepalive.cStefan Metzmacher2011-09-071-13/+4
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_ioctl.cStefan Metzmacher2011-09-071-13/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_getinfo.cStefan Metzmacher2011-09-071-13/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_flush.cStefan Metzmacher2011-09-071-12/+4
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_find.cStefan Metzmacher2011-09-071-13/+5
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_create.cStefan Metzmacher2011-09-071-11/+4
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_close.cStefan Metzmacher2011-09-071-12/+3
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_break.cStefan Metzmacher2011-09-071-12/+4
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_tcon.cStefan Metzmacher2011-09-071-24/+8
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_sesssetup.cStefan Metzmacher2011-09-071-26/+9
| | | | metze
* s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_negprot.cStefan Metzmacher2011-09-071-10/+4
| | | | metze
* s3:smb2_server: add smbd_smb2_request_verify_sizes()Stefan Metzmacher2011-09-072-0/+45
| | | | metze
* Revert "Part 5 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid ↵Jeremy Allison2011-09-071-21/+4
| | | | | | | | | | | | for set (Invalid argument)" This reverts commit 17f6e0272370f764d4a0053c8e74f20b0444c721. Using the existing default permissions for group access is incorrect when no such permissions are given in the incoming ACL. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Wed Sep 7 03:50:21 CEST 2011 on sn-devel-104