1
0
mirror of https://github.com/samba-team/samba.git synced 2025-11-21 12:23:50 +03:00
Commit Graph

1138 Commits

Author SHA1 Message Date
Michael Adam
f7db445c82 rpc_client: use endpoint mapper to get the port for rpc_pipe_open_tcp().
Michael
2008-05-22 11:29:57 +02:00
Volker Lendecke
24ac40518f Add client support for NCACN_UNIX_STREAM 2008-05-21 23:35:25 +02:00
Volker Lendecke
be5d54a363 rpccli_schannel_bind_data only needs the schannel key 2008-05-21 23:35:25 +02:00
Tim Prouty
6b189dabc5 Cleanup size_t return values in callers of convert_string_allocate
This patch is the second iteration of an inside-out conversion to cleanup
functions in charcnv.c returning size_t == -1 to indicate failure.
2008-05-20 22:40:13 +02:00
Jeremy Allison
54556df561 Remove conn_find_byname now it's no longer used in
the msdfs.c code.
Jeremy
2008-05-19 17:19:18 -07:00
Michael Adam
ff7f0cad2e build: freeze proto.h
Michael
2008-05-18 22:58:07 +02:00
Andrew Tridgell
8a37df73ec auto-build proto.h if its not there, but don't make it depend
on anything. Delete proto.h from CVS
-
Jeremy Allison
6b4a70cd82 Merging Gerry's spoolss changes.
Jeremy.
-
Andrew Tridgell
674ee2f1d1 next_token() was supposed to be a reentrant replacement for strtok(),
but the code suffered from bitrot and is not now reentrant. That means
we can get bizarre behaviour
i've fixed this by making next_token() reentrant and creating a
next_token_nr() that is a small non-reentrant wrapper for those lumps
of code (mostly smbclient) that have come to rely on the non-reentrant
behaviour
-
Andrew Tridgell
86613493a9 Added STR_NOALIGN flags to clistr and srvstr fns. Yes, NT actually does
send unaligned unicode strings sometimes!
Fixed our handling of the workgroup name tacked on the end of the
NT1 negprot response (a unaligned unicode)
fixed a couple of places where we should be using the message_end fns instead
of pre-calculated buffer lengths
-
Simo Sorce
e1572f85d6 initial support for paramter type P_LIST
it will avoid problems with lists being longer than 1024 bytes
just now only ip list parameters have been converted to the new type
(hosts allow, hosts deny, ssl hosts, ssl hosts resign)
-
Tim Potter
d0b37d1a62 make proto -
Andrew Tridgell
15b17a80db added a close-share smbcontrol message that forcibly closes a share in smbd (to allow unmount) -
Jeremy Allison
0fe11c329f INFO_24 sometimes has a 2 byte length, sometimes doesn't. Safer to not
depend on it...
Jeremy.
-
Jeremy Allison
db5b82e53a Added patches to remove Linux specific XFS ACLs. These are now handled by the
generic Linux ACL code.
rpc_server/srv_samr_nt.c: Don't delete a policy handle before it's created.
Jeremy.
-
Andrew Tridgell
3d4a3bfacd added a oplock break handler hook to the client code, this allows for more complete testing of oplocks from smbtorture and would also be essential if a client app ever really did want to use oplocks properly -
Tim Potter
720fea5360 Removed silly Get_Hostbyname() wrapper as DNS names are case-insensitive
and the use of this function only increased timeouts when Samba queries
a broken DNS server.
-
Jeremy Allison
5690ec77c8 Modified version of Jim's 0x27 and 0x28 Win9x Secdesc patch.
Jeremy.
-
Jeremy Allison
bc366f3153 Jim McDonough's parse patches for Win9x get SD calls.
Jeremy.
-
Tim Potter
402639926f Prototype update. -
Tim Potter
2ad921d126 Oops - proto.h contained junk from another workarea. -
Tim Potter
13df2304b3 Added some msdfs client routines. -
Jeremy Allison
d8807b1922 Make message receive fn static.
Jeremy.
-
Jeremy Allison
a8532b193d Added sys_acl_delete_def_file() - needed as part of NT ACL editing fix.
Will add changes for other supported ACL systems shortly (Herb, I may
need help with the IRIX one).
Jeremy.
-
Jeremy Allison
4338ee78c3 Extra stuff for large readwrite support.
Jeremy.
-
Tim Potter
6dfe98f602 Prototypes update. -
Tim Potter
bdb76938e2 Update prototype file. -
Tim Potter
9e1d9a3a44 Oops. -
Andrew Tridgell
823ba34342 new proto.h -
Simo Sorce
97dbb54a13 4 new functions to retrieve single linked list of group and passwd entries
+ a fix to an infinite loop in srv_samr_nt.c caused by misuse of
setgrent/getgrent/endgrent solved by these new functions
-
Jeremy Allison
cf5015f159 Added tdb_change_int_atomic() to allow atomic updates of a tdb int value.
Jeremy.
-
Tim Potter
0650f87000 Added structures for LOGON_CTRL rpc.
Make proto.
-
Jeremy Allison
d7aa42e459 Defensive brlock and locking database cleaning code.
Jeremy.
-
Gerald Carter
97a88ca86b make proto -
Jeremy Allison
6bbcab5e48 Fix the W2KSP2 joining a Samba domain problem.
Jeremy.
-
Andrew Tridgell
2e605e1275 ran make proto -
Richard Sharpe
7b275b4588 Ran a make proto to fix the problems ... -
Tim Potter
607db8d57d make proto -
Jeremy Allison
e8ab89fbc0 string_hash() should be static. hash_clear() should be void.
Jeremy.
-
Tim Potter
dd0c7a8a02 make proto -
Jeremy Allison
0db8a61d71 Made "security XXX" masks apply to ACL set. By default they have no effect.
Removed "restrict acl with mask" - redundent.
Jeremy.
-
Tim Potter
6d218c3e94 make proto -
Gerald Carter
9aefc86e35 merge from 2.2 removing the 'domain XXX' parameters. -
Gerald Carter
96d0e7c330 Patch from Simo:
o sed 's/pdb_clear_sam/pdb_free_sam/g'
  o add pdb_reset_sam()
  o password changing should be ok now as well.
-
Andrew Tridgell
2e20734474 rebuild proto.h -
Jean-François Micouleau
a4a4c02b12 Big cleanup of passdb and backends.
I did some basic tests but I have probably broken something. Notably the
password changing. So don't cry ;-)

	J.F.
-
Gerald Carter
09b287e178 make proto -
Tim Potter
a56badc206 make proto -
Jeremy Allison
47b4d82536 Had to add a "pam password change" parameter (defaults to "off") and inlined
the pam password change code to ensure that existing and working password
chat scripts don't break with 2.2.1. PAM password changing has to be explicitly
requested.
Allowed wildcards in pam password change matching (matches password chat
script matching). Had to add const (sorry Tim :-) to ms_fnmatch() to
stop warnings. Don't worry - the const changes are isolated and don't
cause any other warnings :-).
Jeremy.
-
Jeremy Allison
acf32f277d Fix noticed by John Trostel - we need to return our account SID for level 5.
Jeremy.
-