CVS update: samba4/source/torture/rpc
Date: Sun Nov 23 06:54:18 2003 Author: tpot Update of /data/cvs/samba4/source/torture/rpc In directory dp.samba.org:/tmp/cvs-serv20061 Modified Files: winreg.c Log Message: Actually call right function name. Revisions: winreg.c1.7 => 1.8 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/winreg.c.diff?r1=1.7&r2=1.8
CVS update: samba4/source/torture/rpc
Date: Sun Nov 23 06:38:37 2003 Author: tpot Update of /data/cvs/samba4/source/torture/rpc In directory dp.samba.org:/tmp/cvs-serv18493 Modified Files: winreg.c Log Message: Call enumkey for tridge. Revisions: winreg.c1.6 => 1.7 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/winreg.c.diff?r1=1.6&r2=1.7
CVS update: samba4/source/torture/rpc
Date: Sun Nov 23 06:31:10 2003 Author: tpot Update of /data/cvs/samba4/source/torture/rpc In directory dp.samba.org:/tmp/cvs-serv17637/torture/rpc Modified Files: winreg.c Log Message: String termination fix. Re-arrange winreg tests - currently it's failing with an input validation error on tridge's test pull/push test code. Revisions: winreg.c1.5 => 1.6 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/winreg.c.diff?r1=1.5&r2=1.6
CVS update: samba4/source/librpc/idl
Date: Sun Nov 23 06:29:11 2003 Author: tpot Update of /data/cvs/samba4/source/librpc/idl In directory dp.samba.org:/tmp/cvs-serv17389/librpc/idl Modified Files: winreg.idl Log Message: Strings in the winreg pipe are terminated. Revisions: winreg.idl 1.5 => 1.6 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/winreg.idl.diff?r1=1.5&r2=1.6
CVS update: samba4/source/librpc/rpc
Date: Sun Nov 23 06:28:13 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/rpc In directory dp.samba.org:/tmp/cvs-serv17188 Modified Files: dcerpc.c dcerpc.h Log Message: ooh, this is fun! I have recoded the core dcerpc packet structures (all the PDUs etc) in terms of IDL, which means we now use pidl to generate all the code for handling the most basic dcerpc packets. This is not normally possible as it isn't completely valid NDR, but pidl has a number of extensions that make it quite easy. This also means we get the server side dcerpc marshalling/unmarshalling code for free. Revisions: dcerpc.c1.14 => 1.15 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.c.diff?r1=1.14&r2=1.15 dcerpc.h1.5 => 1.6 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.h.diff?r1=1.5&r2=1.6
CVS update: samba4/source/librpc/ndr
Date: Sun Nov 23 06:28:07 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/ndr In directory dp.samba.org:/tmp/cvs-serv17143 Modified Files: libndr.h ndr.c ndr_basic.c Log Message: ooh, this is fun! I have recoded the core dcerpc packet structures (all the PDUs etc) in terms of IDL, which means we now use pidl to generate all the code for handling the most basic dcerpc packets. This is not normally possible as it isn't completely valid NDR, but pidl has a number of extensions that make it quite easy. This also means we get the server side dcerpc marshalling/unmarshalling code for free. Revisions: libndr.h1.27 => 1.28 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/libndr.h.diff?r1=1.27&r2=1.28 ndr.c 1.26 => 1.27 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr.c.diff?r1=1.26&r2=1.27 ndr_basic.c 1.32 => 1.33 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr_basic.c.diff?r1=1.32&r2=1.33
CVS update: samba4/source/librpc/idl
Date: Sun Nov 23 06:28:00 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/idl In directory dp.samba.org:/tmp/cvs-serv17129 Modified Files: idl_types.h Added Files: dcerpc.idl Log Message: ooh, this is fun! I have recoded the core dcerpc packet structures (all the PDUs etc) in terms of IDL, which means we now use pidl to generate all the code for handling the most basic dcerpc packets. This is not normally possible as it isn't completely valid NDR, but pidl has a number of extensions that make it quite easy. This also means we get the server side dcerpc marshalling/unmarshalling code for free. Revisions: dcerpc.idl NONE => 1.1 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/dcerpc.idl?rev=1.1 idl_types.h 1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/idl_types.h.diff?r1=1.1&r2=1.2
CVS update: samba4/source/build/pidl
Date: Sun Nov 23 06:27:54 2003 Author: tridge Update of /home/cvs/samba4/source/build/pidl In directory dp.samba.org:/tmp/cvs-serv17112 Modified Files: idl.gram parser.pm Log Message: ooh, this is fun! I have recoded the core dcerpc packet structures (all the PDUs etc) in terms of IDL, which means we now use pidl to generate all the code for handling the most basic dcerpc packets. This is not normally possible as it isn't completely valid NDR, but pidl has a number of extensions that make it quite easy. This also means we get the server side dcerpc marshalling/unmarshalling code for free. Revisions: idl.gram1.21 => 1.22 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/idl.gram.diff?r1=1.21&r2=1.22 parser.pm 1.50 => 1.51 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/parser.pm.diff?r1=1.50&r2=1.51
CVS update: samba4/source
Date: Sun Nov 23 06:27:48 2003 Author: tridge Update of /home/cvs/samba4/source In directory dp.samba.org:/tmp/cvs-serv17097 Modified Files: Makefile.in Log Message: ooh, this is fun! I have recoded the core dcerpc packet structures (all the PDUs etc) in terms of IDL, which means we now use pidl to generate all the code for handling the most basic dcerpc packets. This is not normally possible as it isn't completely valid NDR, but pidl has a number of extensions that make it quite easy. This also means we get the server side dcerpc marshalling/unmarshalling code for free. Revisions: Makefile.in 1.33 => 1.34 http://www.samba.org/cgi-bin/cvsweb/samba4/source/Makefile.in.diff?r1=1.33&r2=1.34
CVS update: samba4/source/script
Date: Sun Nov 23 03:42:20 2003 Author: tridge Update of /home/cvs/samba4/source/script In directory dp.samba.org:/tmp/cvs-serv25168 Modified Files: build_idl.sh Log Message: save about 35% of the time for "make idl" by processing multiple IDL files at once, which means less perl startup time. Revisions: build_idl.sh1.6 => 1.7 http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/build_idl.sh.diff?r1=1.6&r2=1.7
CVS update: samba4/source/build/pidl
Date: Sun Nov 23 03:42:15 2003 Author: tridge Update of /home/cvs/samba4/source/build/pidl In directory dp.samba.org:/tmp/cvs-serv25151 Modified Files: pidl.pl Log Message: save about 35% of the time for "make idl" by processing multiple IDL files at once, which means less perl startup time. Revisions: pidl.pl 1.15 => 1.16 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/pidl.pl.diff?r1=1.15&r2=1.16
CVS update: samba4/source
Date: Sun Nov 23 03:42:09 2003 Author: tridge Update of /home/cvs/samba4/source In directory dp.samba.org:/tmp/cvs-serv25135 Modified Files: Makefile.in Log Message: save about 35% of the time for "make idl" by processing multiple IDL files at once, which means less perl startup time. Revisions: Makefile.in 1.32 => 1.33 http://www.samba.org/cgi-bin/cvsweb/samba4/source/Makefile.in.diff?r1=1.32&r2=1.33
CVS update: samba4/source/wrepld
Date: Sun Nov 23 03:10:50 2003 Author: tridge Update of /home/cvs/samba4/source/wrepld In directory dp.samba.org:/tmp/cvs-serv21211 Modified Files: wins_repl.h Log Message: get rid of some more unused headers Revisions: wins_repl.h 1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/wrepld/wins_repl.h.diff?r1=1.1.1.1&r2=1.2
CVS update: samba4/source/web
Date: Sun Nov 23 03:10:45 2003 Author: tridge Update of /home/cvs/samba4/source/web In directory dp.samba.org:/tmp/cvs-serv21186 Modified Files: cgi.c diagnose.c neg_lang.c startstop.c statuspage.c swat.c Log Message: get rid of some more unused headers Revisions: cgi.c 1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/cgi.c.diff?r1=1.1.1.1&r2=1.2 diagnose.c 1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/diagnose.c.diff?r1=1.1.1.1&r2=1.2 neg_lang.c 1.2 => 1.3 http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/neg_lang.c.diff?r1=1.2&r2=1.3 startstop.c 1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/startstop.c.diff?r1=1.1.1.1&r2=1.2 statuspage.c1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/statuspage.c.diff?r1=1.1.1.1&r2=1.2 swat.c 1.2 => 1.3 http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/swat.c.diff?r1=1.2&r2=1.3
CVS update: samba4/source/utils
Date: Sun Nov 23 03:10:37 2003 Author: tridge Update of /home/cvs/samba4/source/utils In directory dp.samba.org:/tmp/cvs-serv21080 Modified Files: net.h Log Message: get rid of some more unused headers Revisions: net.h 1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/utils/net.h.diff?r1=1.1.1.1&r2=1.2
CVS update: samba4/source/include
Date: Sun Nov 23 03:10:32 2003 Author: tridge Update of /home/cvs/samba4/source/include In directory dp.samba.org:/tmp/cvs-serv21062 Removed Files: rpc_client.h Log Message: get rid of some more unused headers Revisions: rpc_client.h1.1.1.1 => NONE http://www.samba.org/cgi-bin/cvsweb/samba4/source/include/rpc_client.h?rev=1.1.1.1
CVS update: samba4/source
Date: Sun Nov 23 03:10:27 2003 Author: tridge Update of /home/cvs/samba4/source In directory dp.samba.org:/tmp/cvs-serv21030 Modified Files: Makefile.in Log Message: get rid of some more unused headers Revisions: Makefile.in 1.31 => 1.32 http://www.samba.org/cgi-bin/cvsweb/samba4/source/Makefile.in.diff?r1=1.31&r2=1.32
CVS update: samba4/source/script
Date: Sun Nov 23 03:03:27 2003 Author: tridge Update of /home/cvs/samba4/source/script In directory dp.samba.org:/tmp/cvs-serv20144 Modified Files: mkproto.pl Log Message: by using a single proto.h we gain another factor of 4 in the speed of "make proto" Revisions: mkproto.pl 1.6 => 1.7 http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.6&r2=1.7
CVS update: samba4/source/client
Date: Sun Nov 23 03:03:21 2003 Author: tridge Update of /home/cvs/samba4/source/client In directory dp.samba.org:/tmp/cvs-serv20111 Modified Files: client.c clitar.c Log Message: by using a single proto.h we gain another factor of 4 in the speed of "make proto" Revisions: client.c1.7 => 1.8 http://www.samba.org/cgi-bin/cvsweb/samba4/source/client/client.c.diff?r1=1.7&r2=1.8 clitar.c1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/client/clitar.c.diff?r1=1.1.1.1&r2=1.2
CVS update: samba4/source
Date: Sun Nov 23 03:03:12 2003 Author: tridge Update of /home/cvs/samba4/source In directory dp.samba.org:/tmp/cvs-serv20091 Modified Files: Makefile.in Log Message: by using a single proto.h we gain another factor of 4 in the speed of "make proto" Revisions: Makefile.in 1.30 => 1.31 http://www.samba.org/cgi-bin/cvsweb/samba4/source/Makefile.in.diff?r1=1.30&r2=1.31
CVS update: samba4/source/script
Date: Sun Nov 23 02:44:23 2003 Author: tridge Update of /home/cvs/samba4/source/script In directory dp.samba.org:/tmp/cvs-serv16960 Modified Files: mkproto.pl Log Message: final bit of tidyup and speedup Revisions: mkproto.pl 1.5 => 1.6 http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.5&r2=1.6
CVS update: samba4/source/script
Date: Sun Nov 23 02:33:46 2003 Author: tridge Update of /home/cvs/samba4/source/script In directory dp.samba.org:/tmp/cvs-serv14910 Modified Files: mkproto.pl Log Message: much faster inner loop and neater code Revisions: mkproto.pl 1.4 => 1.5 http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.4&r2=1.5
CVS update: samba4/source/script
Date: Sun Nov 23 02:11:55 2003 Author: tridge Update of /home/cvs/samba4/source/script In directory dp.samba.org:/tmp/cvs-serv12415 Modified Files: mkproto.pl Log Message: fixed loadparm handling properly Revisions: mkproto.pl 1.3 => 1.4 http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.3&r2=1.4
CVS update: samba4/source/script
Date: Sun Nov 23 02:00:40 2003 Author: tridge Update of /home/cvs/samba4/source/script In directory dp.samba.org:/tmp/cvs-serv10772/script Modified Files: mkproto.pl Log Message: nicer base type handling Revisions: mkproto.pl 1.2 => 1.3 http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.2&r2=1.3
CVS update: samba4/source/torture/rpc
Date: Sun Nov 23 01:53:54 2003 Author: tridge Update of /home/cvs/samba4/source/torture/rpc In directory dp.samba.org:/tmp/cvs-serv10094 Modified Files: winreg.c Log Message: reduced the number of magic types we need in mkproto.pl In general I prefer "struct foo" to just "foo" for most structures. There are exceptions. Revisions: winreg.c1.4 => 1.5 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/winreg.c.diff?r1=1.4&r2=1.5
CVS update: samba4/source/smbd
Date: Sun Nov 23 01:53:48 2003 Author: tridge Update of /home/cvs/samba4/source/smbd In directory dp.samba.org:/tmp/cvs-serv10046 Modified Files: password.c rewrite.c Log Message: reduced the number of magic types we need in mkproto.pl In general I prefer "struct foo" to just "foo" for most structures. There are exceptions. Revisions: password.c 1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/smbd/password.c.diff?r1=1.1.1.1&r2=1.2 rewrite.c 1.2 => 1.3 http://www.samba.org/cgi-bin/cvsweb/samba4/source/smbd/rewrite.c.diff?r1=1.2&r2=1.3
CVS update: samba4/source/script
Date: Sun Nov 23 01:53:42 2003 Author: tridge Update of /home/cvs/samba4/source/script In directory dp.samba.org:/tmp/cvs-serv9967 Modified Files: mkproto.pl Log Message: reduced the number of magic types we need in mkproto.pl In general I prefer "struct foo" to just "foo" for most structures. There are exceptions. Revisions: mkproto.pl 1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.1&r2=1.2
CVS update: samba4/source/passdb
Date: Sun Nov 23 01:53:37 2003 Author: tridge Update of /home/cvs/samba4/source/passdb In directory dp.samba.org:/tmp/cvs-serv9952 Modified Files: passdb.c Log Message: reduced the number of magic types we need in mkproto.pl In general I prefer "struct foo" to just "foo" for most structures. There are exceptions. Revisions: passdb.c1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/passdb/passdb.c.diff?r1=1.1.1.1&r2=1.2
CVS update: samba4/source/libcli/util
Date: Sun Nov 23 01:53:30 2003 Author: tridge Update of /home/cvs/samba4/source/libcli/util In directory dp.samba.org:/tmp/cvs-serv9937 Modified Files: cliutil.c Log Message: reduced the number of magic types we need in mkproto.pl In general I prefer "struct foo" to just "foo" for most structures. There are exceptions. Revisions: cliutil.c 1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/libcli/util/cliutil.c.diff?r1=1.1.1.1&r2=1.2
CVS update: samba4/source/lib
Date: Sun Nov 23 01:53:25 2003 Author: tridge Update of /home/cvs/samba4/source/lib In directory dp.samba.org:/tmp/cvs-serv9922 Modified Files: system.c util_unistr.c Log Message: reduced the number of magic types we need in mkproto.pl In general I prefer "struct foo" to just "foo" for most structures. There are exceptions. Revisions: system.c1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/lib/system.c.diff?r1=1.1.1.1&r2=1.2 util_unistr.c 1.2 => 1.3 http://www.samba.org/cgi-bin/cvsweb/samba4/source/lib/util_unistr.c.diff?r1=1.2&r2=1.3
CVS update: samba4/source/include
Date: Sun Nov 23 01:53:18 2003 Author: tridge Update of /home/cvs/samba4/source/include In directory dp.samba.org:/tmp/cvs-serv9900 Modified Files: includes.h smb.h Log Message: reduced the number of magic types we need in mkproto.pl In general I prefer "struct foo" to just "foo" for most structures. There are exceptions. Revisions: includes.h 1.6 => 1.7 http://www.samba.org/cgi-bin/cvsweb/samba4/source/include/includes.h.diff?r1=1.6&r2=1.7 smb.h 1.6 => 1.7 http://www.samba.org/cgi-bin/cvsweb/samba4/source/include/smb.h.diff?r1=1.6&r2=1.7
CVS update: samba4/source/auth
Date: Sun Nov 23 01:53:10 2003 Author: tridge Update of /home/cvs/samba4/source/auth In directory dp.samba.org:/tmp/cvs-serv9886 Modified Files: auth_util.c Log Message: reduced the number of magic types we need in mkproto.pl In general I prefer "struct foo" to just "foo" for most structures. There are exceptions. Revisions: auth_util.c 1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/auth/auth_util.c.diff?r1=1.1.1.1&r2=1.2
CVS update: samba4/source
Date: Sun Nov 23 01:31:40 2003 Author: tridge Update of /home/cvs/samba4/source In directory dp.samba.org:/tmp/cvs-serv7752 Modified Files: configure.in Log Message: we don't need awk now Revisions: configure.in1.4 => 1.5 http://www.samba.org/cgi-bin/cvsweb/samba4/source/configure.in.diff?r1=1.4&r2=1.5
CVS update: samba4/source/script
Date: Sun Nov 23 01:30:59 2003 Author: tridge Update of /home/cvs/samba4/source/script In directory dp.samba.org:/tmp/cvs-serv7534 Removed Files: makeunicodecasemap.awk mkproto.awk Log Message: get rid of our awk scripts Revisions: makeunicodecasemap.awk 1.1.1.1 => NONE http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/makeunicodecasemap.awk?rev=1.1.1.1 mkproto.awk 1.1.1.1 => NONE http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.awk?rev=1.1.1.1
CVS update: samba4/source/script
Date: Sun Nov 23 01:29:42 2003 Author: tridge Update of /home/cvs/samba4/source/script In directory dp.samba.org:/tmp/cvs-serv7274 Modified Files: mkproto.sh Added Files: mkproto.pl Log Message: changed to perl for mkproto, patch from vance Revisions: mkproto.pl NONE => 1.1 http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl?rev=1.1 mkproto.sh 1.1.1.1 => 1.2 http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.sh.diff?r1=1.1.1.1&r2=1.2
CVS update: samba4/source
Date: Sun Nov 23 01:29:36 2003 Author: tridge Update of /home/cvs/samba4/source In directory dp.samba.org:/tmp/cvs-serv7258 Modified Files: Makefile.in Log Message: changed to perl for mkproto, patch from vance Revisions: Makefile.in 1.29 => 1.30 http://www.samba.org/cgi-bin/cvsweb/samba4/source/Makefile.in.diff?r1=1.29&r2=1.30
CVS update: samba/source/auth
Date: Sun Nov 23 00:23:26 2003 Author: abartlet Update of /data/cvs/samba/source/auth In directory dp.samba.org:/tmp/cvs-serv31932/source/auth Modified Files: auth.c auth_server.c Log Message: (Merge from 3.0) Patch by [EMAIL PROTECTED] to ensure we always always free() each auth method. (We had relied on the use of talloc() only, despite providing the free() callback) Andrew Bartlett Revisions: auth.c 1.59 => 1.60 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth.c.diff?r1=1.59&r2=1.60 auth_server.c 1.35 => 1.36 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_server.c.diff?r1=1.35&r2=1.36
CVS update: samba/source/utils
Date: Sun Nov 23 00:22:17 2003 Author: abartlet Update of /data/cvs/samba/source/utils In directory dp.samba.org:/tmp/cvs-serv31447/source/utils Modified Files: net_rpc.c net_rpc_join.c Log Message: Merge from 3.0: Add support for variable-length session keys in our client code. This means that we now support 'net rpc join' with KRB5 (des based) logins. Now, you need to hack 'net' to do that, but the principal is important... When we add kerberos to 'net rpc', it should be possible to still do user management and the like over RPC. - Add server-side support for variable-length session keys (as used by DES based krb5 logins). Andrew Bartlett Revisions: net_rpc.c 1.59 => 1.60 http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/net_rpc.c.diff?r1=1.59&r2=1.60 net_rpc_join.c 1.27 => 1.28 http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/net_rpc_join.c.diff?r1=1.27&r2=1.28
CVS update: samba/source/rpc_server
Date: Sun Nov 23 00:22:17 2003 Author: abartlet Update of /data/cvs/samba/source/rpc_server In directory dp.samba.org:/tmp/cvs-serv31447/source/rpc_server Modified Files: srv_samr_nt.c Log Message: Merge from 3.0: Add support for variable-length session keys in our client code. This means that we now support 'net rpc join' with KRB5 (des based) logins. Now, you need to hack 'net' to do that, but the principal is important... When we add kerberos to 'net rpc', it should be possible to still do user management and the like over RPC. - Add server-side support for variable-length session keys (as used by DES based krb5 logins). Andrew Bartlett Revisions: srv_samr_nt.c 1.158 => 1.159 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_samr_nt.c.diff?r1=1.158&r2=1.159
CVS update: samba/source/rpc_parse
Date: Sun Nov 23 00:22:17 2003 Author: abartlet Update of /data/cvs/samba/source/rpc_parse In directory dp.samba.org:/tmp/cvs-serv31447/source/rpc_parse Modified Files: parse_samr.c Log Message: Merge from 3.0: Add support for variable-length session keys in our client code. This means that we now support 'net rpc join' with KRB5 (des based) logins. Now, you need to hack 'net' to do that, but the principal is important... When we add kerberos to 'net rpc', it should be possible to still do user management and the like over RPC. - Add server-side support for variable-length session keys (as used by DES based krb5 logins). Andrew Bartlett Revisions: parse_samr.c1.174 => 1.175 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_samr.c.diff?r1=1.174&r2=1.175
CVS update: samba/source/rpc_client
Date: Sun Nov 23 00:22:17 2003 Author: abartlet Update of /data/cvs/samba/source/rpc_client In directory dp.samba.org:/tmp/cvs-serv31447/source/rpc_client Modified Files: cli_samr.c Log Message: Merge from 3.0: Add support for variable-length session keys in our client code. This means that we now support 'net rpc join' with KRB5 (des based) logins. Now, you need to hack 'net' to do that, but the principal is important... When we add kerberos to 'net rpc', it should be possible to still do user management and the like over RPC. - Add server-side support for variable-length session keys (as used by DES based krb5 logins). Andrew Bartlett Revisions: cli_samr.c 1.82 => 1.83 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_samr.c.diff?r1=1.82&r2=1.83
CVS update: samba/source/libsmb
Date: Sun Nov 23 00:22:17 2003 Author: abartlet Update of /data/cvs/samba/source/libsmb In directory dp.samba.org:/tmp/cvs-serv31447/source/libsmb Modified Files: smbdes.c Log Message: Merge from 3.0: Add support for variable-length session keys in our client code. This means that we now support 'net rpc join' with KRB5 (des based) logins. Now, you need to hack 'net' to do that, but the principal is important... When we add kerberos to 'net rpc', it should be possible to still do user management and the like over RPC. - Add server-side support for variable-length session keys (as used by DES based krb5 logins). Andrew Bartlett Revisions: smbdes.c1.37 => 1.38 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smbdes.c.diff?r1=1.37&r2=1.38
CVS update: samba/source/auth
Date: Sun Nov 23 00:16:54 2003 Author: abartlet Update of /home/cvs/samba/source/auth In directory dp.samba.org:/tmp/cvs-serv30766/auth Modified Files: Tag: SAMBA_3_0 auth.c auth_server.c Log Message: Patch by [EMAIL PROTECTED] to ensure we always always free() each auth method. (We had relied on the use of talloc() only, despite providing the free() callback) Andrew Bartlett Revisions: auth.c 1.32.2.25 => 1.32.2.26 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth.c.diff?r1=1.32.2.25&r2=1.32.2.26 auth_server.c 1.21.2.10 => 1.21.2.11 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_server.c.diff?r1=1.21.2.10&r2=1.21.2.11
CVS update: samba/source/rpc_server
Date: Sun Nov 23 00:04:29 2003 Author: abartlet Update of /home/cvs/samba/source/rpc_server In directory dp.samba.org:/tmp/cvs-serv29632/rpc_server Modified Files: Tag: SAMBA_3_0 srv_samr_nt.c Log Message: Add server-side support for variable-length session keys (as used by DES based krb5 logins). Andrew Bartlett Revisions: srv_samr_nt.c 1.86.2.51 => 1.86.2.52 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_samr_nt.c.diff?r1=1.86.2.51&r2=1.86.2.52
CVS update: samba/source/rpc_client
Date: Sat Nov 22 23:38:41 2003 Author: abartlet Update of /home/cvs/samba/source/rpc_client In directory dp.samba.org:/tmp/cvs-serv27209/rpc_client Modified Files: Tag: SAMBA_3_0 cli_samr.c Log Message: Add support for variable-length session keys in our client code. This means that we now support 'net rpc join' with KRB5 (des based) logins. Now, you need to hack 'net' to do that, but the principal is important... When we add kerberos to 'net rpc', it should be possible to still do user management and the like over RPC. (server-side support to follow shortly) Andrew Bartlett Revisions: cli_samr.c 1.68.2.14 => 1.68.2.15 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_samr.c.diff?r1=1.68.2.14&r2=1.68.2.15
CVS update: samba/source/utils
Date: Sat Nov 22 23:38:42 2003 Author: abartlet Update of /home/cvs/samba/source/utils In directory dp.samba.org:/tmp/cvs-serv27209/utils Modified Files: Tag: SAMBA_3_0 net_rpc.c net_rpc_join.c Log Message: Add support for variable-length session keys in our client code. This means that we now support 'net rpc join' with KRB5 (des based) logins. Now, you need to hack 'net' to do that, but the principal is important... When we add kerberos to 'net rpc', it should be possible to still do user management and the like over RPC. (server-side support to follow shortly) Andrew Bartlett Revisions: net_rpc.c 1.14.2.36 => 1.14.2.37 http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/net_rpc.c.diff?r1=1.14.2.36&r2=1.14.2.37 net_rpc_join.c 1.13.2.15 => 1.13.2.16 http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/net_rpc_join.c.diff?r1=1.13.2.15&r2=1.13.2.16
CVS update: samba/source/rpc_parse
Date: Sat Nov 22 23:38:41 2003 Author: abartlet Update of /home/cvs/samba/source/rpc_parse In directory dp.samba.org:/tmp/cvs-serv27209/rpc_parse Modified Files: Tag: SAMBA_3_0 parse_samr.c Log Message: Add support for variable-length session keys in our client code. This means that we now support 'net rpc join' with KRB5 (des based) logins. Now, you need to hack 'net' to do that, but the principal is important... When we add kerberos to 'net rpc', it should be possible to still do user management and the like over RPC. (server-side support to follow shortly) Andrew Bartlett Revisions: parse_samr.c1.143.2.22 => 1.143.2.23 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_samr.c.diff?r1=1.143.2.22&r2=1.143.2.23
CVS update: samba/source/libsmb
Date: Sat Nov 22 23:38:41 2003 Author: abartlet Update of /home/cvs/samba/source/libsmb In directory dp.samba.org:/tmp/cvs-serv27209/libsmb Modified Files: Tag: SAMBA_3_0 smbdes.c Log Message: Add support for variable-length session keys in our client code. This means that we now support 'net rpc join' with KRB5 (des based) logins. Now, you need to hack 'net' to do that, but the principal is important... When we add kerberos to 'net rpc', it should be possible to still do user management and the like over RPC. (server-side support to follow shortly) Andrew Bartlett Revisions: smbdes.c1.37 => 1.37.2.1 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smbdes.c.diff?r1=1.37&r2=1.37.2.1
CVS update: samba4/source/librpc/idl
Date: Sat Nov 22 22:53:08 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/idl In directory dp.samba.org:/tmp/cvs-serv20382 Modified Files: samr.idl Log Message: added support for enumerated types in IDL files. This makes unions easier to work with. Revisions: samr.idl1.32 => 1.33 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/samr.idl.diff?r1=1.32&r2=1.33
CVS update: samba4/source/build/pidl
Date: Sat Nov 22 22:53:02 2003 Author: tridge Update of /home/cvs/samba4/source/build/pidl In directory dp.samba.org:/tmp/cvs-serv20363 Modified Files: header.pm idl.gram Log Message: added support for enumerated types in IDL files. This makes unions easier to work with. Revisions: header.pm 1.19 => 1.20 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/header.pm.diff?r1=1.19&r2=1.20 idl.gram1.20 => 1.21 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/idl.gram.diff?r1=1.20&r2=1.21
CVS update: samba4/source/librpc/idl
Date: Sat Nov 22 22:09:10 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/idl In directory dp.samba.org:/tmp/cvs-serv15860 Modified Files: samr.idl Log Message: added support for 'const' in IDL files. This makes it easy to define symbolic names for bitfields etc. Revisions: samr.idl1.31 => 1.32 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/samr.idl.diff?r1=1.31&r2=1.32
CVS update: samba4/source/build/pidl
Date: Sat Nov 22 22:09:04 2003 Author: tridge Update of /home/cvs/samba4/source/build/pidl In directory dp.samba.org:/tmp/cvs-serv15844 Modified Files: header.pm idl.gram Log Message: added support for 'const' in IDL files. This makes it easy to define symbolic names for bitfields etc. Revisions: header.pm 1.18 => 1.19 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/header.pm.diff?r1=1.18&r2=1.19 idl.gram1.19 => 1.20 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/idl.gram.diff?r1=1.19&r2=1.20
CVS update: samba/source/utils
Date: Sat Nov 22 13:29:02 2003 Author: abartlet Update of /data/cvs/samba/source/utils In directory dp.samba.org:/tmp/cvs-serv23686/utils Modified Files: ntlm_auth.c Log Message: (merge from 3.0) Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Andrew Bartlett Revisions: ntlm_auth.c 1.21 => 1.22 http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/ntlm_auth.c.diff?r1=1.21&r2=1.22
CVS update: samba/source/rpc_client
Date: Sat Nov 22 13:29:02 2003 Author: abartlet Update of /data/cvs/samba/source/rpc_client In directory dp.samba.org:/tmp/cvs-serv23686/rpc_client Modified Files: cli_netlogon.c cli_pipe.c cli_samr.c Log Message: (merge from 3.0) Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Andrew Bartlett Revisions: cli_netlogon.c 1.83 => 1.84 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_netlogon.c.diff?r1=1.83&r2=1.84 cli_pipe.c 1.105 => 1.106 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_pipe.c.diff?r1=1.105&r2=1.106 cli_samr.c 1.81 => 1.82 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_samr.c.diff?r1=1.81&r2=1.82
CVS update: samba/source/smbd
Date: Sat Nov 22 13:29:02 2003 Author: abartlet Update of /data/cvs/samba/source/smbd In directory dp.samba.org:/tmp/cvs-serv23686/smbd Modified Files: password.c sesssetup.c Log Message: (merge from 3.0) Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Andrew Bartlett Revisions: password.c 1.274 => 1.275 http://www.samba.org/cgi-bin/cvsweb/samba/source/smbd/password.c.diff?r1=1.274&r2=1.275 sesssetup.c 1.109 => 1.110 http://www.samba.org/cgi-bin/cvsweb/samba/source/smbd/sesssetup.c.diff?r1=1.109&r2=1.110
CVS update: samba/source/rpc_server
Date: Sat Nov 22 13:29:02 2003 Author: abartlet Update of /data/cvs/samba/source/rpc_server In directory dp.samba.org:/tmp/cvs-serv23686/rpc_server Modified Files: srv_netlog_nt.c srv_pipe.c srv_pipe_hnd.c srv_samr_nt.c Log Message: (merge from 3.0) Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Andrew Bartlett Revisions: srv_netlog_nt.c 1.76 => 1.77 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_netlog_nt.c.diff?r1=1.76&r2=1.77 srv_pipe.c 1.120 => 1.121 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_pipe.c.diff?r1=1.120&r2=1.121 srv_pipe_hnd.c 1.88 => 1.89 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_pipe_hnd.c.diff?r1=1.88&r2=1.89 srv_samr_nt.c 1.157 => 1.158 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_samr_nt.c.diff?r1=1.157&r2=1.158
CVS update: samba/source/rpc_parse
Date: Sat Nov 22 13:29:02 2003 Author: abartlet Update of /data/cvs/samba/source/rpc_parse In directory dp.samba.org:/tmp/cvs-serv23686/rpc_parse Modified Files: parse_net.c parse_samr.c Log Message: (merge from 3.0) Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Andrew Bartlett Revisions: parse_net.c 1.109 => 1.110 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_net.c.diff?r1=1.109&r2=1.110 parse_samr.c1.173 => 1.174 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_samr.c.diff?r1=1.173&r2=1.174
CVS update: samba/source/libsmb
Date: Sat Nov 22 13:29:02 2003 Author: abartlet Update of /data/cvs/samba/source/libsmb In directory dp.samba.org:/tmp/cvs-serv23686/libsmb Modified Files: cliconnect.c clientgen.c clikrb5.c clispnego.c ntlmssp.c ntlmssp_parse.c ntlmssp_sign.c smb_signing.c smbencrypt.c Log Message: (merge from 3.0) Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Andrew Bartlett Revisions: cliconnect.c1.141 => 1.142 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/cliconnect.c.diff?r1=1.141&r2=1.142 clientgen.c 1.225 => 1.226 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clientgen.c.diff?r1=1.225&r2=1.226 clikrb5.c 1.39 => 1.40 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clikrb5.c.diff?r1=1.39&r2=1.40 clispnego.c 1.33 => 1.34 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clispnego.c.diff?r1=1.33&r2=1.34 ntlmssp.c 1.18 => 1.19 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp.c.diff?r1=1.18&r2=1.19 ntlmssp_parse.c 1.7 => 1.8 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp_parse.c.diff?r1=1.7&r2=1.8 ntlmssp_sign.c 1.8 => 1.9 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp_sign.c.diff?r1=1.8&r2=1.9 smb_signing.c 1.13 => 1.14 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smb_signing.c.diff?r1=1.13&r2=1.14 smbencrypt.c1.90 => 1.91 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smbencrypt.c.diff?r1=1.90&r2=1.91
CVS update: samba/source/nsswitch
Date: Sat Nov 22 13:29:02 2003 Author: abartlet Update of /data/cvs/samba/source/nsswitch In directory dp.samba.org:/tmp/cvs-serv23686/nsswitch Modified Files: winbindd_cm.c winbindd_pam.c Log Message: (merge from 3.0) Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Andrew Bartlett Revisions: winbindd_cm.c 1.67 => 1.68 http://www.samba.org/cgi-bin/cvsweb/samba/source/nsswitch/winbindd_cm.c.diff?r1=1.67&r2=1.68 winbindd_pam.c 1.68 => 1.69 http://www.samba.org/cgi-bin/cvsweb/samba/source/nsswitch/winbindd_pam.c.diff?r1=1.68&r2=1.69
CVS update: samba/source/lib
Date: Sat Nov 22 13:29:01 2003 Author: abartlet Update of /data/cvs/samba/source/lib In directory dp.samba.org:/tmp/cvs-serv23686/lib Modified Files: data_blob.c Log Message: (merge from 3.0) Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Andrew Bartlett Revisions: data_blob.c 1.4 => 1.5 http://www.samba.org/cgi-bin/cvsweb/samba/source/lib/data_blob.c.diff?r1=1.4&r2=1.5
CVS update: samba/source/libads
Date: Sat Nov 22 13:29:01 2003 Author: abartlet Update of /data/cvs/samba/source/libads In directory dp.samba.org:/tmp/cvs-serv23686/libads Modified Files: kerberos_verify.c Log Message: (merge from 3.0) Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Andrew Bartlett Revisions: kerberos_verify.c 1.14 => 1.15 http://www.samba.org/cgi-bin/cvsweb/samba/source/libads/kerberos_verify.c.diff?r1=1.14&r2=1.15
CVS update: samba/source/include
Date: Sat Nov 22 13:29:01 2003 Author: abartlet Update of /data/cvs/samba/source/include In directory dp.samba.org:/tmp/cvs-serv23686/include Modified Files: auth.h client.h includes.h ntdomain.h ntlmssp.h smb.h Log Message: (merge from 3.0) Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Andrew Bartlett Revisions: auth.h 1.20 => 1.21 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/auth.h.diff?r1=1.20&r2=1.21 client.h1.64 => 1.65 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/client.h.diff?r1=1.64&r2=1.65 includes.h 1.328 => 1.329 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/includes.h.diff?r1=1.328&r2=1.329 ntdomain.h 1.89 => 1.90 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/ntdomain.h.diff?r1=1.89&r2=1.90 ntlmssp.h 1.9 => 1.10 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/ntlmssp.h.diff?r1=1.9&r2=1.10 smb.h 1.496 => 1.497 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/smb.h.diff?r1=1.496&r2=1.497
CVS update: samba/source/auth
Date: Sat Nov 22 13:29:01 2003 Author: abartlet Update of /data/cvs/samba/source/auth In directory dp.samba.org:/tmp/cvs-serv23686/auth Modified Files: auth.c auth_ntlmssp.c auth_sam.c auth_util.c Log Message: (merge from 3.0) Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Andrew Bartlett Revisions: auth.c 1.58 => 1.59 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth.c.diff?r1=1.58&r2=1.59 auth_ntlmssp.c 1.8 => 1.9 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_ntlmssp.c.diff?r1=1.8&r2=1.9 auth_sam.c 1.59 => 1.60 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_sam.c.diff?r1=1.59&r2=1.60 auth_util.c 1.79 => 1.80 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_util.c.diff?r1=1.79&r2=1.80
CVS update: samba/source/smbd
Date: Sat Nov 22 13:19:38 2003 Author: abartlet Update of /home/cvs/samba/source/smbd In directory dp.samba.org:/tmp/cvs-serv21668/smbd Modified Files: Tag: SAMBA_3_0 password.c sesssetup.c Log Message: Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Revisions: password.c 1.248.2.17 => 1.248.2.18 http://www.samba.org/cgi-bin/cvsweb/samba/source/smbd/password.c.diff?r1=1.248.2.17&r2=1.248.2.18 sesssetup.c 1.50.2.38 => 1.50.2.39 http://www.samba.org/cgi-bin/cvsweb/samba/source/smbd/sesssetup.c.diff?r1=1.50.2.38&r2=1.50.2.39
CVS update: samba/source/utils
Date: Sat Nov 22 13:19:38 2003 Author: abartlet Update of /home/cvs/samba/source/utils In directory dp.samba.org:/tmp/cvs-serv21668/utils Modified Files: Tag: SAMBA_3_0 ntlm_auth.c Log Message: Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Revisions: ntlm_auth.c 1.6.2.32 => 1.6.2.33 http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/ntlm_auth.c.diff?r1=1.6.2.32&r2=1.6.2.33
CVS update: samba/source/rpc_server
Date: Sat Nov 22 13:19:38 2003 Author: abartlet Update of /home/cvs/samba/source/rpc_server In directory dp.samba.org:/tmp/cvs-serv21668/rpc_server Modified Files: Tag: SAMBA_3_0 srv_netlog_nt.c srv_pipe.c srv_pipe_hnd.c srv_samr_nt.c Log Message: Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Revisions: srv_netlog_nt.c 1.57.2.19 => 1.57.2.20 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_netlog_nt.c.diff?r1=1.57.2.19&r2=1.57.2.20 srv_pipe.c 1.93.2.25 => 1.93.2.26 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_pipe.c.diff?r1=1.93.2.25&r2=1.93.2.26 srv_pipe_hnd.c 1.77.2.8 => 1.77.2.9 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_pipe_hnd.c.diff?r1=1.77.2.8&r2=1.77.2.9 srv_samr_nt.c 1.86.2.50 => 1.86.2.51 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_samr_nt.c.diff?r1=1.86.2.50&r2=1.86.2.51
CVS update: samba/source/rpc_parse
Date: Sat Nov 22 13:19:38 2003 Author: abartlet Update of /home/cvs/samba/source/rpc_parse In directory dp.samba.org:/tmp/cvs-serv21668/rpc_parse Modified Files: Tag: SAMBA_3_0 parse_net.c parse_samr.c Log Message: Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Revisions: parse_net.c 1.85.2.17 => 1.85.2.18 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_net.c.diff?r1=1.85.2.17&r2=1.85.2.18 parse_samr.c1.143.2.21 => 1.143.2.22 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_samr.c.diff?r1=1.143.2.21&r2=1.143.2.22
CVS update: samba/source/rpc_client
Date: Sat Nov 22 13:19:37 2003 Author: abartlet Update of /home/cvs/samba/source/rpc_client In directory dp.samba.org:/tmp/cvs-serv21668/rpc_client Modified Files: Tag: SAMBA_3_0 cli_netlogon.c cli_pipe.c cli_samr.c Log Message: Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Revisions: cli_netlogon.c 1.69.2.13 => 1.69.2.14 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_netlogon.c.diff?r1=1.69.2.13&r2=1.69.2.14 cli_pipe.c 1.79.2.39 => 1.79.2.40 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_pipe.c.diff?r1=1.79.2.39&r2=1.79.2.40 cli_samr.c 1.68.2.13 => 1.68.2.14 http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_samr.c.diff?r1=1.68.2.13&r2=1.68.2.14
CVS update: samba/source/nsswitch
Date: Sat Nov 22 13:19:37 2003 Author: abartlet Update of /home/cvs/samba/source/nsswitch In directory dp.samba.org:/tmp/cvs-serv21668/nsswitch Modified Files: Tag: SAMBA_3_0 winbindd_cm.c winbindd_pam.c Log Message: Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Revisions: winbindd_cm.c 1.31.2.43 => 1.31.2.44 http://www.samba.org/cgi-bin/cvsweb/samba/source/nsswitch/winbindd_cm.c.diff?r1=1.31.2.43&r2=1.31.2.44 winbindd_pam.c 1.44.2.29 => 1.44.2.30 http://www.samba.org/cgi-bin/cvsweb/samba/source/nsswitch/winbindd_pam.c.diff?r1=1.44.2.29&r2=1.44.2.30
CVS update: samba/source/libsmb
Date: Sat Nov 22 13:19:37 2003 Author: abartlet Update of /home/cvs/samba/source/libsmb In directory dp.samba.org:/tmp/cvs-serv21668/libsmb Modified Files: Tag: SAMBA_3_0 cliconnect.c clientgen.c clikrb5.c clispnego.c ntlmssp.c ntlmssp_parse.c ntlmssp_sign.c smb_signing.c smbencrypt.c Log Message: Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Revisions: cliconnect.c1.71.2.45 => 1.71.2.46 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/cliconnect.c.diff?r1=1.71.2.45&r2=1.71.2.46 clientgen.c 1.190.2.22 => 1.190.2.23 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clientgen.c.diff?r1=1.190.2.22&r2=1.190.2.23 clikrb5.c 1.15.2.27 => 1.15.2.28 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clikrb5.c.diff?r1=1.15.2.27&r2=1.15.2.28 clispnego.c 1.11.2.11 => 1.11.2.12 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clispnego.c.diff?r1=1.11.2.11&r2=1.11.2.12 ntlmssp.c 1.4.2.23 => 1.4.2.24 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp.c.diff?r1=1.4.2.23&r2=1.4.2.24 ntlmssp_parse.c 1.3.2.5 => 1.3.2.6 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp_parse.c.diff?r1=1.3.2.5&r2=1.3.2.6 ntlmssp_sign.c 1.1.2.7 => 1.1.2.8 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp_sign.c.diff?r1=1.1.2.7&r2=1.1.2.8 smb_signing.c 1.4.2.38 => 1.4.2.39 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smb_signing.c.diff?r1=1.4.2.38&r2=1.4.2.39 smbencrypt.c1.68.2.12 => 1.68.2.13 http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smbencrypt.c.diff?r1=1.68.2.12&r2=1.68.2.13
CVS update: samba/source/lib
Date: Sat Nov 22 13:19:37 2003 Author: abartlet Update of /home/cvs/samba/source/lib In directory dp.samba.org:/tmp/cvs-serv21668/lib Modified Files: Tag: SAMBA_3_0 data_blob.c Log Message: Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Revisions: data_blob.c 1.2.2.3 => 1.2.2.4 http://www.samba.org/cgi-bin/cvsweb/samba/source/lib/data_blob.c.diff?r1=1.2.2.3&r2=1.2.2.4
CVS update: samba/source/libads
Date: Sat Nov 22 13:19:37 2003 Author: abartlet Update of /home/cvs/samba/source/libads In directory dp.samba.org:/tmp/cvs-serv21668/libads Modified Files: Tag: SAMBA_3_0 kerberos_verify.c Log Message: Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Revisions: kerberos_verify.c 1.1.2.29 => 1.1.2.30 http://www.samba.org/cgi-bin/cvsweb/samba/source/libads/kerberos_verify.c.diff?r1=1.1.2.29&r2=1.1.2.30
CVS update: samba/source/include
Date: Sat Nov 22 13:19:37 2003 Author: abartlet Update of /home/cvs/samba/source/include In directory dp.samba.org:/tmp/cvs-serv21668/include Modified Files: Tag: SAMBA_3_0 auth.h client.h includes.h ntdomain.h ntlmssp.h smb.h Log Message: Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Revisions: auth.h 1.14.2.6 => 1.14.2.7 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/auth.h.diff?r1=1.14.2.6&r2=1.14.2.7 client.h1.46.2.13 => 1.46.2.14 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/client.h.diff?r1=1.46.2.13&r2=1.46.2.14 includes.h 1.262.2.54 => 1.262.2.55 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/includes.h.diff?r1=1.262.2.54&r2=1.262.2.55 ntdomain.h 1.79.2.8 => 1.79.2.9 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/ntdomain.h.diff?r1=1.79.2.8&r2=1.79.2.9 ntlmssp.h 1.2.2.9 => 1.2.2.10 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/ntlmssp.h.diff?r1=1.2.2.9&r2=1.2.2.10 smb.h 1.424.2.56 => 1.424.2.57 http://www.samba.org/cgi-bin/cvsweb/samba/source/include/smb.h.diff?r1=1.424.2.56&r2=1.424.2.57
CVS update: samba/source/auth
Date: Sat Nov 22 13:19:36 2003 Author: abartlet Update of /home/cvs/samba/source/auth In directory dp.samba.org:/tmp/cvs-serv21668/auth Modified Files: Tag: SAMBA_3_0 auth.c auth_ntlmssp.c auth_sam.c auth_util.c Log Message: Changes all over the shop, but all towards: - NTLM2 support in the server - KEY_EXCH support in the server - variable length session keys. In detail: - NTLM2 is an extension of NTLMv1, that is compatible with existing domain controllers (unlike NTLMv2, which requires a DC upgrade). * This is known as 'NTLMv2 session security' * (This is not yet implemented on the RPC pipes however, so there may well still be issues for PDC setups, particuarly around password changes. We do not fully understand the sign/seal implications of NTLM2 on RPC pipes.) This requires modifications to our authentication subsystem, as we must handle the 'challege' input into the challenge-response algorithm being changed. This also needs to be turned off for 'security=server', which does not support this. - KEY_EXCH is another 'security' mechanism, whereby the session key actually used by the server is sent by the client, rather than being the shared-secret directly or indirectly. - As both these methods change the session key, the auth subsystem needed to be changed, to 'override' session keys provided by the backend. - There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation. - The 'names blob' in NTLMSSP is always in unicode - never in ascii. Don't make an ascii version ever. - The other big change is to allow variable length session keys. We have always assumed that session keys are 16 bytes long - and padded to this length if shorter. However, Kerberos session keys are 8 bytes long, when the krb5 login uses DES. * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. * - Add better DEBUG() messages to ntlm_auth, warning administrators of misconfigurations that prevent access to the privileged pipe. This should help reduce some of the 'it just doesn't work' issues. - Fix data_blob_talloc() to behave the same way data_blob() does when passed a NULL data pointer. (just allocate) REMEMBER to make clean after this commit - I have changed plenty of data structures... Revisions: auth.c 1.32.2.24 => 1.32.2.25 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth.c.diff?r1=1.32.2.24&r2=1.32.2.25 auth_ntlmssp.c 1.4.2.5 => 1.4.2.6 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_ntlmssp.c.diff?r1=1.4.2.5&r2=1.4.2.6 auth_sam.c 1.36.2.24 => 1.36.2.25 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_sam.c.diff?r1=1.36.2.24&r2=1.36.2.25 auth_util.c 1.39.2.48 => 1.39.2.49 http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_util.c.diff?r1=1.39.2.48&r2=1.39.2.49
CVS update: samba4/source/build/pidl
Date: Sat Nov 22 12:25:20 2003 Author: tridge Update of /home/cvs/samba4/source/build/pidl In directory dp.samba.org:/tmp/cvs-serv17251 Modified Files: pidl.pl Added Files: validator.pm Log Message: added the beginnings of an IDL validator, to give clearer errors when IDL is not valid Revisions: validator.pmNONE => 1.1 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/validator.pm?rev=1.1 pidl.pl 1.14 => 1.15 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/pidl.pl.diff?r1=1.14&r2=1.15
CVS update: samba4/source/torture/rpc
Date: Sat Nov 22 11:49:22 2003 Author: tridge Update of /home/cvs/samba4/source/torture/rpc In directory dp.samba.org:/tmp/cvs-serv12669 Modified Files: spoolss.c Log Message: * fixed null terminated string handling * fixed nested relative offsets in push functions the spoolss torture test now passes! Revisions: spoolss.c 1.18 => 1.19 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/spoolss.c.diff?r1=1.18&r2=1.19
CVS update: samba4/source/librpc/rpc
Date: Sat Nov 22 11:49:17 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/rpc In directory dp.samba.org:/tmp/cvs-serv12655 Modified Files: dcerpc.c Log Message: * fixed null terminated string handling * fixed nested relative offsets in push functions the spoolss torture test now passes! Revisions: dcerpc.c1.13 => 1.14 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.c.diff?r1=1.13&r2=1.14
CVS update: samba4/source/librpc/ndr
Date: Sat Nov 22 11:49:11 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/ndr In directory dp.samba.org:/tmp/cvs-serv12641 Modified Files: ndr.c ndr_basic.c Log Message: * fixed null terminated string handling * fixed nested relative offsets in push functions the spoolss torture test now passes! Revisions: ndr.c 1.25 => 1.26 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr.c.diff?r1=1.25&r2=1.26 ndr_basic.c 1.31 => 1.32 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr_basic.c.diff?r1=1.31&r2=1.32
CVS update: samba4/source/torture/rpc
Date: Sat Nov 22 10:37:00 2003 Author: tridge Update of /home/cvs/samba4/source/torture/rpc In directory dp.samba.org:/tmp/cvs-serv3824 Modified Files: spoolss.c Log Message: * fixed handling of relative subcontext unions * fixed GetPrinter in spoolss after OpenPrinter Revisions: spoolss.c 1.17 => 1.18 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/spoolss.c.diff?r1=1.17&r2=1.18
CVS update: samba4/source/librpc/idl
Date: Sat Nov 22 10:36:55 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/idl In directory dp.samba.org:/tmp/cvs-serv3809 Modified Files: spoolss.idl Log Message: * fixed handling of relative subcontext unions * fixed GetPrinter in spoolss after OpenPrinter Revisions: spoolss.idl 1.17 => 1.18 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/spoolss.idl.diff?r1=1.17&r2=1.18
CVS update: samba4/source/build/pidl
Date: Sat Nov 22 10:36:49 2003 Author: tridge Update of /home/cvs/samba4/source/build/pidl In directory dp.samba.org:/tmp/cvs-serv3790 Modified Files: parser.pm Log Message: * fixed handling of relative subcontext unions * fixed GetPrinter in spoolss after OpenPrinter Revisions: parser.pm 1.49 => 1.50 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/parser.pm.diff?r1=1.49&r2=1.50
CVS update: samba4/source/librpc/idl
Date: Sat Nov 22 09:45:40 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/idl In directory dp.samba.org:/tmp/cvs-serv31013 Modified Files: dfs.idl Log Message: dfs torture test now passes Revisions: dfs.idl 1.9 => 1.10 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/dfs.idl.diff?r1=1.9&r2=1.10
CVS update: samba4/source/librpc/ndr
Date: Sat Nov 22 09:32:23 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/ndr In directory dp.samba.org:/tmp/cvs-serv29646 Modified Files: ndr.c Log Message: * fixed NDR flag inheritance across push subcontexts * don't consider not doing lsa_QueryInfoPolicy level 11 a failure (w2k3 doesn't have this level, w2k does) * on a NDR validation failure dump the failed data at level 3 Revisions: ndr.c 1.24 => 1.25 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr.c.diff?r1=1.24&r2=1.25
CVS update: samba4/source/torture/rpc
Date: Sat Nov 22 09:32:35 2003 Author: tridge Update of /home/cvs/samba4/source/torture/rpc In directory dp.samba.org:/tmp/cvs-serv29674 Modified Files: lsa.c Log Message: * fixed NDR flag inheritance across push subcontexts * don't consider not doing lsa_QueryInfoPolicy level 11 a failure (w2k3 doesn't have this level, w2k does) * on a NDR validation failure dump the failed data at level 3 Revisions: lsa.c 1.35 => 1.36 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/lsa.c.diff?r1=1.35&r2=1.36
CVS update: samba4/source/librpc/rpc
Date: Sat Nov 22 09:32:29 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/rpc In directory dp.samba.org:/tmp/cvs-serv29660 Modified Files: dcerpc.c Log Message: * fixed NDR flag inheritance across push subcontexts * don't consider not doing lsa_QueryInfoPolicy level 11 a failure (w2k3 doesn't have this level, w2k does) * on a NDR validation failure dump the failed data at level 3 Revisions: dcerpc.c1.12 => 1.13 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.c.diff?r1=1.12&r2=1.13
CVS update: samba4/source/torture/rpc
Date: Sat Nov 22 08:41:40 2003 Author: tridge Update of /home/cvs/samba4/source/torture/rpc In directory dp.samba.org:/tmp/cvs-serv23851 Modified Files: lsa.c samr.c Log Message: * enable RPC/NDR validation in all smbtorture code * allow us to distinguish between null arrays and zero length arrays, by making the allocation size a minimum of 1 on array pull Revisions: lsa.c 1.34 => 1.35 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/lsa.c.diff?r1=1.34&r2=1.35 samr.c 1.30 => 1.31 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/samr.c.diff?r1=1.30&r2=1.31
CVS update: samba4/source/torture
Date: Sat Nov 22 08:41:34 2003 Author: tridge Update of /home/cvs/samba4/source/torture In directory dp.samba.org:/tmp/cvs-serv23836 Modified Files: torture.c Log Message: * enable RPC/NDR validation in all smbtorture code * allow us to distinguish between null arrays and zero length arrays, by making the allocation size a minimum of 1 on array pull Revisions: torture.c 1.24 => 1.25 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/torture.c.diff?r1=1.24&r2=1.25
CVS update: samba4/source/build/pidl
Date: Sat Nov 22 08:41:26 2003 Author: tridge Update of /home/cvs/samba4/source/build/pidl In directory dp.samba.org:/tmp/cvs-serv23821 Modified Files: parser.pm Log Message: * enable RPC/NDR validation in all smbtorture code * allow us to distinguish between null arrays and zero length arrays, by making the allocation size a minimum of 1 on array pull Revisions: parser.pm 1.48 => 1.49 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/parser.pm.diff?r1=1.48&r2=1.49
CVS update: samba4/source/torture/rpc
Date: Sat Nov 22 08:11:32 2003 Author: tridge Update of /home/cvs/samba4/source/torture/rpc In directory dp.samba.org:/tmp/cvs-serv20558 Modified Files: atsvc.c dfs.c echo.c epmapper.c eventlog.c lsa.c samr.c spoolss.c srvsvc.c winreg.c wkssvc.c Log Message: a fairly major upgrade to the dcerpc system * added a NDR validator. The way it works is that when the DCERPC_DEBUG_VALIDATE_* flags are set the dcerpc system will perform NDR buffer validation. On sending a request the packet is first marshalled, then unmarahslled, then marshalled again, and it is confirmed that the two marshalling results are idential. This ensures that our pull and push routines are absolutely in sync, so that we can be very confident that if a routine works in the client then the corresponding routine must work on the server side. A similar validation is performed on all replies. * a result of this change is that pidl is fussier about the [ref] tag. You can only use it on pointers (which is the only place it makes sense) * fixed a basic alignment bug in the push side of the NDR code * added server side pull/push support. Our dcerpc system is now fully ready to be used on the server side. * fixed the relative offset pointer list. It must be traversed in reverse order on push * added automatic value setting for the size parameter in outgoing SdBuf structures. * expanded the ndr debugging code to always give a message on any failure * fixed the subcontext push code * fixed some memory leaks in smbtorture RPC tests Revisions: atsvc.c 1.2 => 1.3 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/atsvc.c.diff?r1=1.2&r2=1.3 dfs.c 1.8 => 1.9 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/dfs.c.diff?r1=1.8&r2=1.9 echo.c 1.17 => 1.18 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/echo.c.diff?r1=1.17&r2=1.18 epmapper.c 1.2 => 1.3 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/epmapper.c.diff?r1=1.2&r2=1.3 eventlog.c 1.2 => 1.3 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/eventlog.c.diff?r1=1.2&r2=1.3 lsa.c 1.33 => 1.34 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/lsa.c.diff?r1=1.33&r2=1.34 samr.c 1.29 => 1.30 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/samr.c.diff?r1=1.29&r2=1.30 spoolss.c 1.16 => 1.17 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/spoolss.c.diff?r1=1.16&r2=1.17 srvsvc.c1.4 => 1.5 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/srvsvc.c.diff?r1=1.4&r2=1.5 winreg.c1.3 => 1.4 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/winreg.c.diff?r1=1.3&r2=1.4 wkssvc.c1.9 => 1.10 http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/wkssvc.c.diff?r1=1.9&r2=1.10
CVS update: samba4/source/librpc/rpc
Date: Sat Nov 22 08:11:25 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/rpc In directory dp.samba.org:/tmp/cvs-serv20542 Modified Files: dcerpc.c dcerpc.h Log Message: a fairly major upgrade to the dcerpc system * added a NDR validator. The way it works is that when the DCERPC_DEBUG_VALIDATE_* flags are set the dcerpc system will perform NDR buffer validation. On sending a request the packet is first marshalled, then unmarahslled, then marshalled again, and it is confirmed that the two marshalling results are idential. This ensures that our pull and push routines are absolutely in sync, so that we can be very confident that if a routine works in the client then the corresponding routine must work on the server side. A similar validation is performed on all replies. * a result of this change is that pidl is fussier about the [ref] tag. You can only use it on pointers (which is the only place it makes sense) * fixed a basic alignment bug in the push side of the NDR code * added server side pull/push support. Our dcerpc system is now fully ready to be used on the server side. * fixed the relative offset pointer list. It must be traversed in reverse order on push * added automatic value setting for the size parameter in outgoing SdBuf structures. * expanded the ndr debugging code to always give a message on any failure * fixed the subcontext push code * fixed some memory leaks in smbtorture RPC tests Revisions: dcerpc.c1.11 => 1.12 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.c.diff?r1=1.11&r2=1.12 dcerpc.h1.4 => 1.5 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.h.diff?r1=1.4&r2=1.5
CVS update: samba4/source/librpc/ndr
Date: Sat Nov 22 08:11:18 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/ndr In directory dp.samba.org:/tmp/cvs-serv20524 Modified Files: libndr.h ndr.c ndr_basic.c ndr_sec.c Log Message: a fairly major upgrade to the dcerpc system * added a NDR validator. The way it works is that when the DCERPC_DEBUG_VALIDATE_* flags are set the dcerpc system will perform NDR buffer validation. On sending a request the packet is first marshalled, then unmarahslled, then marshalled again, and it is confirmed that the two marshalling results are idential. This ensures that our pull and push routines are absolutely in sync, so that we can be very confident that if a routine works in the client then the corresponding routine must work on the server side. A similar validation is performed on all replies. * a result of this change is that pidl is fussier about the [ref] tag. You can only use it on pointers (which is the only place it makes sense) * fixed a basic alignment bug in the push side of the NDR code * added server side pull/push support. Our dcerpc system is now fully ready to be used on the server side. * fixed the relative offset pointer list. It must be traversed in reverse order on push * added automatic value setting for the size parameter in outgoing SdBuf structures. * expanded the ndr debugging code to always give a message on any failure * fixed the subcontext push code * fixed some memory leaks in smbtorture RPC tests Revisions: libndr.h1.26 => 1.27 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/libndr.h.diff?r1=1.26&r2=1.27 ndr.c 1.23 => 1.24 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr.c.diff?r1=1.23&r2=1.24 ndr_basic.c 1.30 => 1.31 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr_basic.c.diff?r1=1.30&r2=1.31 ndr_sec.c 1.8 => 1.9 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr_sec.c.diff?r1=1.8&r2=1.9
CVS update: samba4/source/librpc/idl
Date: Sat Nov 22 08:11:12 2003 Author: tridge Update of /home/cvs/samba4/source/librpc/idl In directory dp.samba.org:/tmp/cvs-serv20509 Modified Files: samr.idl Log Message: a fairly major upgrade to the dcerpc system * added a NDR validator. The way it works is that when the DCERPC_DEBUG_VALIDATE_* flags are set the dcerpc system will perform NDR buffer validation. On sending a request the packet is first marshalled, then unmarahslled, then marshalled again, and it is confirmed that the two marshalling results are idential. This ensures that our pull and push routines are absolutely in sync, so that we can be very confident that if a routine works in the client then the corresponding routine must work on the server side. A similar validation is performed on all replies. * a result of this change is that pidl is fussier about the [ref] tag. You can only use it on pointers (which is the only place it makes sense) * fixed a basic alignment bug in the push side of the NDR code * added server side pull/push support. Our dcerpc system is now fully ready to be used on the server side. * fixed the relative offset pointer list. It must be traversed in reverse order on push * added automatic value setting for the size parameter in outgoing SdBuf structures. * expanded the ndr debugging code to always give a message on any failure * fixed the subcontext push code * fixed some memory leaks in smbtorture RPC tests Revisions: samr.idl1.30 => 1.31 http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/samr.idl.diff?r1=1.30&r2=1.31
CVS update: samba4/source/build/pidl
Date: Sat Nov 22 08:11:06 2003 Author: tridge Update of /home/cvs/samba4/source/build/pidl In directory dp.samba.org:/tmp/cvs-serv20495 Modified Files: client.pm parser.pm Log Message: a fairly major upgrade to the dcerpc system * added a NDR validator. The way it works is that when the DCERPC_DEBUG_VALIDATE_* flags are set the dcerpc system will perform NDR buffer validation. On sending a request the packet is first marshalled, then unmarahslled, then marshalled again, and it is confirmed that the two marshalling results are idential. This ensures that our pull and push routines are absolutely in sync, so that we can be very confident that if a routine works in the client then the corresponding routine must work on the server side. A similar validation is performed on all replies. * a result of this change is that pidl is fussier about the [ref] tag. You can only use it on pointers (which is the only place it makes sense) * fixed a basic alignment bug in the push side of the NDR code * added server side pull/push support. Our dcerpc system is now fully ready to be used on the server side. * fixed the relative offset pointer list. It must be traversed in reverse order on push * added automatic value setting for the size parameter in outgoing SdBuf structures. * expanded the ndr debugging code to always give a message on any failure * fixed the subcontext push code * fixed some memory leaks in smbtorture RPC tests Revisions: client.pm 1.4 => 1.5 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/client.pm.diff?r1=1.4&r2=1.5 parser.pm 1.47 => 1.48 http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/parser.pm.diff?r1=1.47&r2=1.48