CVS update: samba4/source/torture/rpc

2003-11-22 Thread tpot

Date:   Sun Nov 23 06:54:18 2003
Author: tpot

Update of /data/cvs/samba4/source/torture/rpc
In directory dp.samba.org:/tmp/cvs-serv20061

Modified Files:
winreg.c 
Log Message:
Actually call right function name.


Revisions:
winreg.c1.7 => 1.8

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/winreg.c.diff?r1=1.7&r2=1.8


CVS update: samba4/source/torture/rpc

2003-11-22 Thread tpot

Date:   Sun Nov 23 06:38:37 2003
Author: tpot

Update of /data/cvs/samba4/source/torture/rpc
In directory dp.samba.org:/tmp/cvs-serv18493

Modified Files:
winreg.c 
Log Message:
Call enumkey for tridge.


Revisions:
winreg.c1.6 => 1.7

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/winreg.c.diff?r1=1.6&r2=1.7


CVS update: samba4/source/torture/rpc

2003-11-22 Thread tpot

Date:   Sun Nov 23 06:31:10 2003
Author: tpot

Update of /data/cvs/samba4/source/torture/rpc
In directory dp.samba.org:/tmp/cvs-serv17637/torture/rpc

Modified Files:
winreg.c 
Log Message:
String termination fix.

Re-arrange winreg tests - currently it's failing with an input validation
error on tridge's test pull/push test code.


Revisions:
winreg.c1.5 => 1.6

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/winreg.c.diff?r1=1.5&r2=1.6


CVS update: samba4/source/librpc/idl

2003-11-22 Thread tpot

Date:   Sun Nov 23 06:29:11 2003
Author: tpot

Update of /data/cvs/samba4/source/librpc/idl
In directory dp.samba.org:/tmp/cvs-serv17389/librpc/idl

Modified Files:
winreg.idl 
Log Message:
Strings in the winreg pipe are terminated.


Revisions:
winreg.idl  1.5 => 1.6

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/winreg.idl.diff?r1=1.5&r2=1.6


CVS update: samba4/source/librpc/rpc

2003-11-22 Thread tridge

Date:   Sun Nov 23 06:28:13 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/rpc
In directory dp.samba.org:/tmp/cvs-serv17188

Modified Files:
dcerpc.c dcerpc.h 
Log Message:
ooh, this is fun!

I have recoded the core dcerpc packet structures (all the PDUs etc) in
terms of IDL, which means we now use pidl to generate all the code for
handling the most basic dcerpc packets. This is not normally possible
as it isn't completely valid NDR, but pidl has a number of extensions
that make it quite easy.

This also means we get the server side dcerpc
marshalling/unmarshalling code for free.


Revisions:
dcerpc.c1.14 => 1.15

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.c.diff?r1=1.14&r2=1.15
dcerpc.h1.5 => 1.6

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.h.diff?r1=1.5&r2=1.6


CVS update: samba4/source/librpc/ndr

2003-11-22 Thread tridge

Date:   Sun Nov 23 06:28:07 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/ndr
In directory dp.samba.org:/tmp/cvs-serv17143

Modified Files:
libndr.h ndr.c ndr_basic.c 
Log Message:
ooh, this is fun!

I have recoded the core dcerpc packet structures (all the PDUs etc) in
terms of IDL, which means we now use pidl to generate all the code for
handling the most basic dcerpc packets. This is not normally possible
as it isn't completely valid NDR, but pidl has a number of extensions
that make it quite easy.

This also means we get the server side dcerpc
marshalling/unmarshalling code for free.


Revisions:
libndr.h1.27 => 1.28

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/libndr.h.diff?r1=1.27&r2=1.28
ndr.c   1.26 => 1.27

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr.c.diff?r1=1.26&r2=1.27
ndr_basic.c 1.32 => 1.33

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr_basic.c.diff?r1=1.32&r2=1.33


CVS update: samba4/source/librpc/idl

2003-11-22 Thread tridge

Date:   Sun Nov 23 06:28:00 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/idl
In directory dp.samba.org:/tmp/cvs-serv17129

Modified Files:
idl_types.h 
Added Files:
dcerpc.idl 
Log Message:
ooh, this is fun!

I have recoded the core dcerpc packet structures (all the PDUs etc) in
terms of IDL, which means we now use pidl to generate all the code for
handling the most basic dcerpc packets. This is not normally possible
as it isn't completely valid NDR, but pidl has a number of extensions
that make it quite easy.

This also means we get the server side dcerpc
marshalling/unmarshalling code for free.


Revisions:
dcerpc.idl  NONE => 1.1
http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/dcerpc.idl?rev=1.1
idl_types.h 1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/idl_types.h.diff?r1=1.1&r2=1.2


CVS update: samba4/source/build/pidl

2003-11-22 Thread tridge

Date:   Sun Nov 23 06:27:54 2003
Author: tridge

Update of /home/cvs/samba4/source/build/pidl
In directory dp.samba.org:/tmp/cvs-serv17112

Modified Files:
idl.gram parser.pm 
Log Message:
ooh, this is fun!

I have recoded the core dcerpc packet structures (all the PDUs etc) in
terms of IDL, which means we now use pidl to generate all the code for
handling the most basic dcerpc packets. This is not normally possible
as it isn't completely valid NDR, but pidl has a number of extensions
that make it quite easy.

This also means we get the server side dcerpc
marshalling/unmarshalling code for free.


Revisions:
idl.gram1.21 => 1.22

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/idl.gram.diff?r1=1.21&r2=1.22
parser.pm   1.50 => 1.51

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/parser.pm.diff?r1=1.50&r2=1.51


CVS update: samba4/source

2003-11-22 Thread tridge

Date:   Sun Nov 23 06:27:48 2003
Author: tridge

Update of /home/cvs/samba4/source
In directory dp.samba.org:/tmp/cvs-serv17097

Modified Files:
Makefile.in 
Log Message:
ooh, this is fun!

I have recoded the core dcerpc packet structures (all the PDUs etc) in
terms of IDL, which means we now use pidl to generate all the code for
handling the most basic dcerpc packets. This is not normally possible
as it isn't completely valid NDR, but pidl has a number of extensions
that make it quite easy.

This also means we get the server side dcerpc
marshalling/unmarshalling code for free.


Revisions:
Makefile.in 1.33 => 1.34

http://www.samba.org/cgi-bin/cvsweb/samba4/source/Makefile.in.diff?r1=1.33&r2=1.34


CVS update: samba4/source/script

2003-11-22 Thread tridge

Date:   Sun Nov 23 03:42:20 2003
Author: tridge

Update of /home/cvs/samba4/source/script
In directory dp.samba.org:/tmp/cvs-serv25168

Modified Files:
build_idl.sh 
Log Message:
save about 35% of the time for "make idl" by processing multiple IDL
files at once, which means less perl startup time.




Revisions:
build_idl.sh1.6 => 1.7

http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/build_idl.sh.diff?r1=1.6&r2=1.7


CVS update: samba4/source/build/pidl

2003-11-22 Thread tridge

Date:   Sun Nov 23 03:42:15 2003
Author: tridge

Update of /home/cvs/samba4/source/build/pidl
In directory dp.samba.org:/tmp/cvs-serv25151

Modified Files:
pidl.pl 
Log Message:
save about 35% of the time for "make idl" by processing multiple IDL
files at once, which means less perl startup time.




Revisions:
pidl.pl 1.15 => 1.16

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/pidl.pl.diff?r1=1.15&r2=1.16


CVS update: samba4/source

2003-11-22 Thread tridge

Date:   Sun Nov 23 03:42:09 2003
Author: tridge

Update of /home/cvs/samba4/source
In directory dp.samba.org:/tmp/cvs-serv25135

Modified Files:
Makefile.in 
Log Message:
save about 35% of the time for "make idl" by processing multiple IDL
files at once, which means less perl startup time.




Revisions:
Makefile.in 1.32 => 1.33

http://www.samba.org/cgi-bin/cvsweb/samba4/source/Makefile.in.diff?r1=1.32&r2=1.33


CVS update: samba4/source/wrepld

2003-11-22 Thread tridge

Date:   Sun Nov 23 03:10:50 2003
Author: tridge

Update of /home/cvs/samba4/source/wrepld
In directory dp.samba.org:/tmp/cvs-serv21211

Modified Files:
wins_repl.h 
Log Message:
get rid of some more unused headers



Revisions:
wins_repl.h 1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/wrepld/wins_repl.h.diff?r1=1.1.1.1&r2=1.2


CVS update: samba4/source/web

2003-11-22 Thread tridge

Date:   Sun Nov 23 03:10:45 2003
Author: tridge

Update of /home/cvs/samba4/source/web
In directory dp.samba.org:/tmp/cvs-serv21186

Modified Files:
cgi.c diagnose.c neg_lang.c startstop.c statuspage.c swat.c 
Log Message:
get rid of some more unused headers



Revisions:
cgi.c   1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/cgi.c.diff?r1=1.1.1.1&r2=1.2
diagnose.c  1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/diagnose.c.diff?r1=1.1.1.1&r2=1.2
neg_lang.c  1.2 => 1.3

http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/neg_lang.c.diff?r1=1.2&r2=1.3
startstop.c 1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/startstop.c.diff?r1=1.1.1.1&r2=1.2
statuspage.c1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/statuspage.c.diff?r1=1.1.1.1&r2=1.2
swat.c  1.2 => 1.3
http://www.samba.org/cgi-bin/cvsweb/samba4/source/web/swat.c.diff?r1=1.2&r2=1.3


CVS update: samba4/source/utils

2003-11-22 Thread tridge

Date:   Sun Nov 23 03:10:37 2003
Author: tridge

Update of /home/cvs/samba4/source/utils
In directory dp.samba.org:/tmp/cvs-serv21080

Modified Files:
net.h 
Log Message:
get rid of some more unused headers



Revisions:
net.h   1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/utils/net.h.diff?r1=1.1.1.1&r2=1.2


CVS update: samba4/source/include

2003-11-22 Thread tridge

Date:   Sun Nov 23 03:10:32 2003
Author: tridge

Update of /home/cvs/samba4/source/include
In directory dp.samba.org:/tmp/cvs-serv21062

Removed Files:
rpc_client.h 
Log Message:
get rid of some more unused headers



Revisions:
rpc_client.h1.1.1.1 => NONE

http://www.samba.org/cgi-bin/cvsweb/samba4/source/include/rpc_client.h?rev=1.1.1.1


CVS update: samba4/source

2003-11-22 Thread tridge

Date:   Sun Nov 23 03:10:27 2003
Author: tridge

Update of /home/cvs/samba4/source
In directory dp.samba.org:/tmp/cvs-serv21030

Modified Files:
Makefile.in 
Log Message:
get rid of some more unused headers



Revisions:
Makefile.in 1.31 => 1.32

http://www.samba.org/cgi-bin/cvsweb/samba4/source/Makefile.in.diff?r1=1.31&r2=1.32


CVS update: samba4/source/script

2003-11-22 Thread tridge

Date:   Sun Nov 23 03:03:27 2003
Author: tridge

Update of /home/cvs/samba4/source/script
In directory dp.samba.org:/tmp/cvs-serv20144

Modified Files:
mkproto.pl 
Log Message:
by using a single proto.h we gain another factor of 4 in the speed of
"make proto"


Revisions:
mkproto.pl  1.6 => 1.7

http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.6&r2=1.7


CVS update: samba4/source/client

2003-11-22 Thread tridge

Date:   Sun Nov 23 03:03:21 2003
Author: tridge

Update of /home/cvs/samba4/source/client
In directory dp.samba.org:/tmp/cvs-serv20111

Modified Files:
client.c clitar.c 
Log Message:
by using a single proto.h we gain another factor of 4 in the speed of
"make proto"


Revisions:
client.c1.7 => 1.8

http://www.samba.org/cgi-bin/cvsweb/samba4/source/client/client.c.diff?r1=1.7&r2=1.8
clitar.c1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/client/clitar.c.diff?r1=1.1.1.1&r2=1.2


CVS update: samba4/source

2003-11-22 Thread tridge

Date:   Sun Nov 23 03:03:12 2003
Author: tridge

Update of /home/cvs/samba4/source
In directory dp.samba.org:/tmp/cvs-serv20091

Modified Files:
Makefile.in 
Log Message:
by using a single proto.h we gain another factor of 4 in the speed of
"make proto"


Revisions:
Makefile.in 1.30 => 1.31

http://www.samba.org/cgi-bin/cvsweb/samba4/source/Makefile.in.diff?r1=1.30&r2=1.31


CVS update: samba4/source/script

2003-11-22 Thread tridge

Date:   Sun Nov 23 02:44:23 2003
Author: tridge

Update of /home/cvs/samba4/source/script
In directory dp.samba.org:/tmp/cvs-serv16960

Modified Files:
mkproto.pl 
Log Message:
final bit of tidyup and speedup




Revisions:
mkproto.pl  1.5 => 1.6

http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.5&r2=1.6


CVS update: samba4/source/script

2003-11-22 Thread tridge

Date:   Sun Nov 23 02:33:46 2003
Author: tridge

Update of /home/cvs/samba4/source/script
In directory dp.samba.org:/tmp/cvs-serv14910

Modified Files:
mkproto.pl 
Log Message:
much faster inner loop and neater code



Revisions:
mkproto.pl  1.4 => 1.5

http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.4&r2=1.5


CVS update: samba4/source/script

2003-11-22 Thread tridge

Date:   Sun Nov 23 02:11:55 2003
Author: tridge

Update of /home/cvs/samba4/source/script
In directory dp.samba.org:/tmp/cvs-serv12415

Modified Files:
mkproto.pl 
Log Message:
fixed loadparm handling properly


Revisions:
mkproto.pl  1.3 => 1.4

http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.3&r2=1.4


CVS update: samba4/source/script

2003-11-22 Thread tridge

Date:   Sun Nov 23 02:00:40 2003
Author: tridge

Update of /home/cvs/samba4/source/script
In directory dp.samba.org:/tmp/cvs-serv10772/script

Modified Files:
mkproto.pl 
Log Message:
nicer base type handling

Revisions:
mkproto.pl  1.2 => 1.3

http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.2&r2=1.3


CVS update: samba4/source/torture/rpc

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:53:54 2003
Author: tridge

Update of /home/cvs/samba4/source/torture/rpc
In directory dp.samba.org:/tmp/cvs-serv10094

Modified Files:
winreg.c 
Log Message:
reduced the number of magic types we need in mkproto.pl

In general I prefer "struct foo" to just "foo" for most
structures. There are exceptions.




Revisions:
winreg.c1.4 => 1.5

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/winreg.c.diff?r1=1.4&r2=1.5


CVS update: samba4/source/smbd

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:53:48 2003
Author: tridge

Update of /home/cvs/samba4/source/smbd
In directory dp.samba.org:/tmp/cvs-serv10046

Modified Files:
password.c rewrite.c 
Log Message:
reduced the number of magic types we need in mkproto.pl

In general I prefer "struct foo" to just "foo" for most
structures. There are exceptions.




Revisions:
password.c  1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/smbd/password.c.diff?r1=1.1.1.1&r2=1.2
rewrite.c   1.2 => 1.3

http://www.samba.org/cgi-bin/cvsweb/samba4/source/smbd/rewrite.c.diff?r1=1.2&r2=1.3


CVS update: samba4/source/script

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:53:42 2003
Author: tridge

Update of /home/cvs/samba4/source/script
In directory dp.samba.org:/tmp/cvs-serv9967

Modified Files:
mkproto.pl 
Log Message:
reduced the number of magic types we need in mkproto.pl

In general I prefer "struct foo" to just "foo" for most
structures. There are exceptions.




Revisions:
mkproto.pl  1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl.diff?r1=1.1&r2=1.2


CVS update: samba4/source/passdb

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:53:37 2003
Author: tridge

Update of /home/cvs/samba4/source/passdb
In directory dp.samba.org:/tmp/cvs-serv9952

Modified Files:
passdb.c 
Log Message:
reduced the number of magic types we need in mkproto.pl

In general I prefer "struct foo" to just "foo" for most
structures. There are exceptions.




Revisions:
passdb.c1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/passdb/passdb.c.diff?r1=1.1.1.1&r2=1.2


CVS update: samba4/source/libcli/util

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:53:30 2003
Author: tridge

Update of /home/cvs/samba4/source/libcli/util
In directory dp.samba.org:/tmp/cvs-serv9937

Modified Files:
cliutil.c 
Log Message:
reduced the number of magic types we need in mkproto.pl

In general I prefer "struct foo" to just "foo" for most
structures. There are exceptions.




Revisions:
cliutil.c   1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/libcli/util/cliutil.c.diff?r1=1.1.1.1&r2=1.2


CVS update: samba4/source/lib

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:53:25 2003
Author: tridge

Update of /home/cvs/samba4/source/lib
In directory dp.samba.org:/tmp/cvs-serv9922

Modified Files:
system.c util_unistr.c 
Log Message:
reduced the number of magic types we need in mkproto.pl

In general I prefer "struct foo" to just "foo" for most
structures. There are exceptions.




Revisions:
system.c1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/lib/system.c.diff?r1=1.1.1.1&r2=1.2
util_unistr.c   1.2 => 1.3

http://www.samba.org/cgi-bin/cvsweb/samba4/source/lib/util_unistr.c.diff?r1=1.2&r2=1.3


CVS update: samba4/source/include

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:53:18 2003
Author: tridge

Update of /home/cvs/samba4/source/include
In directory dp.samba.org:/tmp/cvs-serv9900

Modified Files:
includes.h smb.h 
Log Message:
reduced the number of magic types we need in mkproto.pl

In general I prefer "struct foo" to just "foo" for most
structures. There are exceptions.




Revisions:
includes.h  1.6 => 1.7

http://www.samba.org/cgi-bin/cvsweb/samba4/source/include/includes.h.diff?r1=1.6&r2=1.7
smb.h   1.6 => 1.7

http://www.samba.org/cgi-bin/cvsweb/samba4/source/include/smb.h.diff?r1=1.6&r2=1.7


CVS update: samba4/source/auth

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:53:10 2003
Author: tridge

Update of /home/cvs/samba4/source/auth
In directory dp.samba.org:/tmp/cvs-serv9886

Modified Files:
auth_util.c 
Log Message:
reduced the number of magic types we need in mkproto.pl

In general I prefer "struct foo" to just "foo" for most
structures. There are exceptions.




Revisions:
auth_util.c 1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/auth/auth_util.c.diff?r1=1.1.1.1&r2=1.2


CVS update: samba4/source

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:31:40 2003
Author: tridge

Update of /home/cvs/samba4/source
In directory dp.samba.org:/tmp/cvs-serv7752

Modified Files:
configure.in 
Log Message:
we don't need awk now

Revisions:
configure.in1.4 => 1.5

http://www.samba.org/cgi-bin/cvsweb/samba4/source/configure.in.diff?r1=1.4&r2=1.5


CVS update: samba4/source/script

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:30:59 2003
Author: tridge

Update of /home/cvs/samba4/source/script
In directory dp.samba.org:/tmp/cvs-serv7534

Removed Files:
makeunicodecasemap.awk mkproto.awk 
Log Message:
get rid of our awk scripts



Revisions:
makeunicodecasemap.awk  1.1.1.1 => NONE

http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/makeunicodecasemap.awk?rev=1.1.1.1
mkproto.awk 1.1.1.1 => NONE

http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.awk?rev=1.1.1.1


CVS update: samba4/source/script

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:29:42 2003
Author: tridge

Update of /home/cvs/samba4/source/script
In directory dp.samba.org:/tmp/cvs-serv7274

Modified Files:
mkproto.sh 
Added Files:
mkproto.pl 
Log Message:
changed to perl for mkproto, patch from vance


Revisions:
mkproto.pl  NONE => 1.1
http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.pl?rev=1.1
mkproto.sh  1.1.1.1 => 1.2

http://www.samba.org/cgi-bin/cvsweb/samba4/source/script/mkproto.sh.diff?r1=1.1.1.1&r2=1.2


CVS update: samba4/source

2003-11-22 Thread tridge

Date:   Sun Nov 23 01:29:36 2003
Author: tridge

Update of /home/cvs/samba4/source
In directory dp.samba.org:/tmp/cvs-serv7258

Modified Files:
Makefile.in 
Log Message:
changed to perl for mkproto, patch from vance


Revisions:
Makefile.in 1.29 => 1.30

http://www.samba.org/cgi-bin/cvsweb/samba4/source/Makefile.in.diff?r1=1.29&r2=1.30


CVS update: samba/source/auth

2003-11-22 Thread abartlet

Date:   Sun Nov 23 00:23:26 2003
Author: abartlet

Update of /data/cvs/samba/source/auth
In directory dp.samba.org:/tmp/cvs-serv31932/source/auth

Modified Files:
auth.c auth_server.c 
Log Message:
(Merge from 3.0)

Patch by [EMAIL PROTECTED]  to ensure we always always
free() each auth method. (We had relied on the use of talloc() only,
despite providing the free() callback)

Andrew Bartlett




Revisions:
auth.c  1.59 => 1.60

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth.c.diff?r1=1.59&r2=1.60
auth_server.c   1.35 => 1.36

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_server.c.diff?r1=1.35&r2=1.36


CVS update: samba/source/utils

2003-11-22 Thread abartlet

Date:   Sun Nov 23 00:22:17 2003
Author: abartlet

Update of /data/cvs/samba/source/utils
In directory dp.samba.org:/tmp/cvs-serv31447/source/utils

Modified Files:
net_rpc.c net_rpc_join.c 
Log Message:
Merge from 3.0:

Add support for variable-length session keys in our client code.

This means that we now support 'net rpc join' with KRB5 (des based)
logins.  Now, you need to hack 'net' to do that, but the principal is
important...

When we add kerberos to 'net rpc', it should be possible to still do
user management and the like over RPC.

-

Add server-side support for variable-length session keys (as used by
DES based krb5 logins).

Andrew Bartlett



Revisions:
net_rpc.c   1.59 => 1.60

http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/net_rpc.c.diff?r1=1.59&r2=1.60
net_rpc_join.c  1.27 => 1.28

http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/net_rpc_join.c.diff?r1=1.27&r2=1.28


CVS update: samba/source/rpc_server

2003-11-22 Thread abartlet

Date:   Sun Nov 23 00:22:17 2003
Author: abartlet

Update of /data/cvs/samba/source/rpc_server
In directory dp.samba.org:/tmp/cvs-serv31447/source/rpc_server

Modified Files:
srv_samr_nt.c 
Log Message:
Merge from 3.0:

Add support for variable-length session keys in our client code.

This means that we now support 'net rpc join' with KRB5 (des based)
logins.  Now, you need to hack 'net' to do that, but the principal is
important...

When we add kerberos to 'net rpc', it should be possible to still do
user management and the like over RPC.

-

Add server-side support for variable-length session keys (as used by
DES based krb5 logins).

Andrew Bartlett



Revisions:
srv_samr_nt.c   1.158 => 1.159

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_samr_nt.c.diff?r1=1.158&r2=1.159


CVS update: samba/source/rpc_parse

2003-11-22 Thread abartlet

Date:   Sun Nov 23 00:22:17 2003
Author: abartlet

Update of /data/cvs/samba/source/rpc_parse
In directory dp.samba.org:/tmp/cvs-serv31447/source/rpc_parse

Modified Files:
parse_samr.c 
Log Message:
Merge from 3.0:

Add support for variable-length session keys in our client code.

This means that we now support 'net rpc join' with KRB5 (des based)
logins.  Now, you need to hack 'net' to do that, but the principal is
important...

When we add kerberos to 'net rpc', it should be possible to still do
user management and the like over RPC.

-

Add server-side support for variable-length session keys (as used by
DES based krb5 logins).

Andrew Bartlett



Revisions:
parse_samr.c1.174 => 1.175

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_samr.c.diff?r1=1.174&r2=1.175


CVS update: samba/source/rpc_client

2003-11-22 Thread abartlet

Date:   Sun Nov 23 00:22:17 2003
Author: abartlet

Update of /data/cvs/samba/source/rpc_client
In directory dp.samba.org:/tmp/cvs-serv31447/source/rpc_client

Modified Files:
cli_samr.c 
Log Message:
Merge from 3.0:

Add support for variable-length session keys in our client code.

This means that we now support 'net rpc join' with KRB5 (des based)
logins.  Now, you need to hack 'net' to do that, but the principal is
important...

When we add kerberos to 'net rpc', it should be possible to still do
user management and the like over RPC.

-

Add server-side support for variable-length session keys (as used by
DES based krb5 logins).

Andrew Bartlett



Revisions:
cli_samr.c  1.82 => 1.83

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_samr.c.diff?r1=1.82&r2=1.83


CVS update: samba/source/libsmb

2003-11-22 Thread abartlet

Date:   Sun Nov 23 00:22:17 2003
Author: abartlet

Update of /data/cvs/samba/source/libsmb
In directory dp.samba.org:/tmp/cvs-serv31447/source/libsmb

Modified Files:
smbdes.c 
Log Message:
Merge from 3.0:

Add support for variable-length session keys in our client code.

This means that we now support 'net rpc join' with KRB5 (des based)
logins.  Now, you need to hack 'net' to do that, but the principal is
important...

When we add kerberos to 'net rpc', it should be possible to still do
user management and the like over RPC.

-

Add server-side support for variable-length session keys (as used by
DES based krb5 logins).

Andrew Bartlett



Revisions:
smbdes.c1.37 => 1.38

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smbdes.c.diff?r1=1.37&r2=1.38


CVS update: samba/source/auth

2003-11-22 Thread abartlet

Date:   Sun Nov 23 00:16:54 2003
Author: abartlet

Update of /home/cvs/samba/source/auth
In directory dp.samba.org:/tmp/cvs-serv30766/auth

Modified Files:
  Tag: SAMBA_3_0
auth.c auth_server.c 
Log Message:
Patch by [EMAIL PROTECTED]  to ensure we always always
free() each auth method. (We had relied on the use of talloc() only, despite providing 
the free() callback)  

Andrew Bartlett


Revisions:
auth.c  1.32.2.25 => 1.32.2.26

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth.c.diff?r1=1.32.2.25&r2=1.32.2.26
auth_server.c   1.21.2.10 => 1.21.2.11

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_server.c.diff?r1=1.21.2.10&r2=1.21.2.11


CVS update: samba/source/rpc_server

2003-11-22 Thread abartlet

Date:   Sun Nov 23 00:04:29 2003
Author: abartlet

Update of /home/cvs/samba/source/rpc_server
In directory dp.samba.org:/tmp/cvs-serv29632/rpc_server

Modified Files:
  Tag: SAMBA_3_0
srv_samr_nt.c 
Log Message:
Add server-side support for variable-length session keys (as used by
DES based krb5 logins).

Andrew Bartlett


Revisions:
srv_samr_nt.c   1.86.2.51 => 1.86.2.52

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_samr_nt.c.diff?r1=1.86.2.51&r2=1.86.2.52


CVS update: samba/source/rpc_client

2003-11-22 Thread abartlet

Date:   Sat Nov 22 23:38:41 2003
Author: abartlet

Update of /home/cvs/samba/source/rpc_client
In directory dp.samba.org:/tmp/cvs-serv27209/rpc_client

Modified Files:
  Tag: SAMBA_3_0
cli_samr.c 
Log Message:
Add support for variable-length session keys in our client code.

This means that we now support 'net rpc join' with KRB5 (des based)
logins.  Now, you need to hack 'net' to do that, but the principal is
important...

When we add kerberos to 'net rpc', it should be possible to still do
user management and the like over RPC.

(server-side support to follow shortly)

Andrew Bartlett

Revisions:
cli_samr.c  1.68.2.14 => 1.68.2.15

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_samr.c.diff?r1=1.68.2.14&r2=1.68.2.15


CVS update: samba/source/utils

2003-11-22 Thread abartlet

Date:   Sat Nov 22 23:38:42 2003
Author: abartlet

Update of /home/cvs/samba/source/utils
In directory dp.samba.org:/tmp/cvs-serv27209/utils

Modified Files:
  Tag: SAMBA_3_0
net_rpc.c net_rpc_join.c 
Log Message:
Add support for variable-length session keys in our client code.

This means that we now support 'net rpc join' with KRB5 (des based)
logins.  Now, you need to hack 'net' to do that, but the principal is
important...

When we add kerberos to 'net rpc', it should be possible to still do
user management and the like over RPC.

(server-side support to follow shortly)

Andrew Bartlett

Revisions:
net_rpc.c   1.14.2.36 => 1.14.2.37

http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/net_rpc.c.diff?r1=1.14.2.36&r2=1.14.2.37
net_rpc_join.c  1.13.2.15 => 1.13.2.16

http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/net_rpc_join.c.diff?r1=1.13.2.15&r2=1.13.2.16


CVS update: samba/source/rpc_parse

2003-11-22 Thread abartlet

Date:   Sat Nov 22 23:38:41 2003
Author: abartlet

Update of /home/cvs/samba/source/rpc_parse
In directory dp.samba.org:/tmp/cvs-serv27209/rpc_parse

Modified Files:
  Tag: SAMBA_3_0
parse_samr.c 
Log Message:
Add support for variable-length session keys in our client code.

This means that we now support 'net rpc join' with KRB5 (des based)
logins.  Now, you need to hack 'net' to do that, but the principal is
important...

When we add kerberos to 'net rpc', it should be possible to still do
user management and the like over RPC.

(server-side support to follow shortly)

Andrew Bartlett

Revisions:
parse_samr.c1.143.2.22 => 1.143.2.23

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_samr.c.diff?r1=1.143.2.22&r2=1.143.2.23


CVS update: samba/source/libsmb

2003-11-22 Thread abartlet

Date:   Sat Nov 22 23:38:41 2003
Author: abartlet

Update of /home/cvs/samba/source/libsmb
In directory dp.samba.org:/tmp/cvs-serv27209/libsmb

Modified Files:
  Tag: SAMBA_3_0
smbdes.c 
Log Message:
Add support for variable-length session keys in our client code.

This means that we now support 'net rpc join' with KRB5 (des based)
logins.  Now, you need to hack 'net' to do that, but the principal is
important...

When we add kerberos to 'net rpc', it should be possible to still do
user management and the like over RPC.

(server-side support to follow shortly)

Andrew Bartlett

Revisions:
smbdes.c1.37 => 1.37.2.1

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smbdes.c.diff?r1=1.37&r2=1.37.2.1


CVS update: samba4/source/librpc/idl

2003-11-22 Thread tridge

Date:   Sat Nov 22 22:53:08 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/idl
In directory dp.samba.org:/tmp/cvs-serv20382

Modified Files:
samr.idl 
Log Message:
added support for enumerated types in IDL files. This makes unions
easier to work with.



Revisions:
samr.idl1.32 => 1.33

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/samr.idl.diff?r1=1.32&r2=1.33


CVS update: samba4/source/build/pidl

2003-11-22 Thread tridge

Date:   Sat Nov 22 22:53:02 2003
Author: tridge

Update of /home/cvs/samba4/source/build/pidl
In directory dp.samba.org:/tmp/cvs-serv20363

Modified Files:
header.pm idl.gram 
Log Message:
added support for enumerated types in IDL files. This makes unions
easier to work with.



Revisions:
header.pm   1.19 => 1.20

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/header.pm.diff?r1=1.19&r2=1.20
idl.gram1.20 => 1.21

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/idl.gram.diff?r1=1.20&r2=1.21


CVS update: samba4/source/librpc/idl

2003-11-22 Thread tridge

Date:   Sat Nov 22 22:09:10 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/idl
In directory dp.samba.org:/tmp/cvs-serv15860

Modified Files:
samr.idl 
Log Message:
added support for 'const' in IDL files. This makes it easy to define
symbolic names for bitfields etc.


Revisions:
samr.idl1.31 => 1.32

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/samr.idl.diff?r1=1.31&r2=1.32


CVS update: samba4/source/build/pidl

2003-11-22 Thread tridge

Date:   Sat Nov 22 22:09:04 2003
Author: tridge

Update of /home/cvs/samba4/source/build/pidl
In directory dp.samba.org:/tmp/cvs-serv15844

Modified Files:
header.pm idl.gram 
Log Message:
added support for 'const' in IDL files. This makes it easy to define
symbolic names for bitfields etc.


Revisions:
header.pm   1.18 => 1.19

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/header.pm.diff?r1=1.18&r2=1.19
idl.gram1.19 => 1.20

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/idl.gram.diff?r1=1.19&r2=1.20


CVS update: samba/source/utils

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:29:02 2003
Author: abartlet

Update of /data/cvs/samba/source/utils
In directory dp.samba.org:/tmp/cvs-serv23686/utils

Modified Files:
ntlm_auth.c 
Log Message:
(merge from 3.0)

Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to
merge the 'client' and 'server' functions, so they both operate on a
single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of
data structures...  

Andrew Bartlett



Revisions:
ntlm_auth.c 1.21 => 1.22

http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/ntlm_auth.c.diff?r1=1.21&r2=1.22


CVS update: samba/source/rpc_client

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:29:02 2003
Author: abartlet

Update of /data/cvs/samba/source/rpc_client
In directory dp.samba.org:/tmp/cvs-serv23686/rpc_client

Modified Files:
cli_netlogon.c cli_pipe.c cli_samr.c 
Log Message:
(merge from 3.0)

Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to
merge the 'client' and 'server' functions, so they both operate on a
single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of
data structures...  

Andrew Bartlett



Revisions:
cli_netlogon.c  1.83 => 1.84

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_netlogon.c.diff?r1=1.83&r2=1.84
cli_pipe.c  1.105 => 1.106

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_pipe.c.diff?r1=1.105&r2=1.106
cli_samr.c  1.81 => 1.82

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_samr.c.diff?r1=1.81&r2=1.82


CVS update: samba/source/smbd

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:29:02 2003
Author: abartlet

Update of /data/cvs/samba/source/smbd
In directory dp.samba.org:/tmp/cvs-serv23686/smbd

Modified Files:
password.c sesssetup.c 
Log Message:
(merge from 3.0)

Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to
merge the 'client' and 'server' functions, so they both operate on a
single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of
data structures...  

Andrew Bartlett



Revisions:
password.c  1.274 => 1.275

http://www.samba.org/cgi-bin/cvsweb/samba/source/smbd/password.c.diff?r1=1.274&r2=1.275
sesssetup.c 1.109 => 1.110

http://www.samba.org/cgi-bin/cvsweb/samba/source/smbd/sesssetup.c.diff?r1=1.109&r2=1.110


CVS update: samba/source/rpc_server

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:29:02 2003
Author: abartlet

Update of /data/cvs/samba/source/rpc_server
In directory dp.samba.org:/tmp/cvs-serv23686/rpc_server

Modified Files:
srv_netlog_nt.c srv_pipe.c srv_pipe_hnd.c srv_samr_nt.c 
Log Message:
(merge from 3.0)

Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to
merge the 'client' and 'server' functions, so they both operate on a
single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of
data structures...  

Andrew Bartlett



Revisions:
srv_netlog_nt.c 1.76 => 1.77

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_netlog_nt.c.diff?r1=1.76&r2=1.77
srv_pipe.c  1.120 => 1.121

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_pipe.c.diff?r1=1.120&r2=1.121
srv_pipe_hnd.c  1.88 => 1.89

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_pipe_hnd.c.diff?r1=1.88&r2=1.89
srv_samr_nt.c   1.157 => 1.158

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_samr_nt.c.diff?r1=1.157&r2=1.158


CVS update: samba/source/rpc_parse

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:29:02 2003
Author: abartlet

Update of /data/cvs/samba/source/rpc_parse
In directory dp.samba.org:/tmp/cvs-serv23686/rpc_parse

Modified Files:
parse_net.c parse_samr.c 
Log Message:
(merge from 3.0)

Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to
merge the 'client' and 'server' functions, so they both operate on a
single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of
data structures...  

Andrew Bartlett



Revisions:
parse_net.c 1.109 => 1.110

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_net.c.diff?r1=1.109&r2=1.110
parse_samr.c1.173 => 1.174

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_samr.c.diff?r1=1.173&r2=1.174


CVS update: samba/source/libsmb

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:29:02 2003
Author: abartlet

Update of /data/cvs/samba/source/libsmb
In directory dp.samba.org:/tmp/cvs-serv23686/libsmb

Modified Files:
cliconnect.c clientgen.c clikrb5.c clispnego.c ntlmssp.c 
ntlmssp_parse.c ntlmssp_sign.c smb_signing.c smbencrypt.c 
Log Message:
(merge from 3.0)

Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to
merge the 'client' and 'server' functions, so they both operate on a
single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of
data structures...  

Andrew Bartlett



Revisions:
cliconnect.c1.141 => 1.142

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/cliconnect.c.diff?r1=1.141&r2=1.142
clientgen.c 1.225 => 1.226

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clientgen.c.diff?r1=1.225&r2=1.226
clikrb5.c   1.39 => 1.40

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clikrb5.c.diff?r1=1.39&r2=1.40
clispnego.c 1.33 => 1.34

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clispnego.c.diff?r1=1.33&r2=1.34
ntlmssp.c   1.18 => 1.19

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp.c.diff?r1=1.18&r2=1.19
ntlmssp_parse.c 1.7 => 1.8

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp_parse.c.diff?r1=1.7&r2=1.8
ntlmssp_sign.c  1.8 => 1.9

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp_sign.c.diff?r1=1.8&r2=1.9
smb_signing.c   1.13 => 1.14

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smb_signing.c.diff?r1=1.13&r2=1.14
smbencrypt.c1.90 => 1.91

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smbencrypt.c.diff?r1=1.90&r2=1.91


CVS update: samba/source/nsswitch

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:29:02 2003
Author: abartlet

Update of /data/cvs/samba/source/nsswitch
In directory dp.samba.org:/tmp/cvs-serv23686/nsswitch

Modified Files:
winbindd_cm.c winbindd_pam.c 
Log Message:
(merge from 3.0)

Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to
merge the 'client' and 'server' functions, so they both operate on a
single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of
data structures...  

Andrew Bartlett



Revisions:
winbindd_cm.c   1.67 => 1.68

http://www.samba.org/cgi-bin/cvsweb/samba/source/nsswitch/winbindd_cm.c.diff?r1=1.67&r2=1.68
winbindd_pam.c  1.68 => 1.69

http://www.samba.org/cgi-bin/cvsweb/samba/source/nsswitch/winbindd_pam.c.diff?r1=1.68&r2=1.69


CVS update: samba/source/lib

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:29:01 2003
Author: abartlet

Update of /data/cvs/samba/source/lib
In directory dp.samba.org:/tmp/cvs-serv23686/lib

Modified Files:
data_blob.c 
Log Message:
(merge from 3.0)

Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to
merge the 'client' and 'server' functions, so they both operate on a
single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of
data structures...  

Andrew Bartlett



Revisions:
data_blob.c 1.4 => 1.5

http://www.samba.org/cgi-bin/cvsweb/samba/source/lib/data_blob.c.diff?r1=1.4&r2=1.5


CVS update: samba/source/libads

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:29:01 2003
Author: abartlet

Update of /data/cvs/samba/source/libads
In directory dp.samba.org:/tmp/cvs-serv23686/libads

Modified Files:
kerberos_verify.c 
Log Message:
(merge from 3.0)

Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to
merge the 'client' and 'server' functions, so they both operate on a
single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of
data structures...  

Andrew Bartlett



Revisions:
kerberos_verify.c   1.14 => 1.15

http://www.samba.org/cgi-bin/cvsweb/samba/source/libads/kerberos_verify.c.diff?r1=1.14&r2=1.15


CVS update: samba/source/include

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:29:01 2003
Author: abartlet

Update of /data/cvs/samba/source/include
In directory dp.samba.org:/tmp/cvs-serv23686/include

Modified Files:
auth.h client.h includes.h ntdomain.h ntlmssp.h smb.h 
Log Message:
(merge from 3.0)

Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to
merge the 'client' and 'server' functions, so they both operate on a
single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of
data structures...  

Andrew Bartlett



Revisions:
auth.h  1.20 => 1.21

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/auth.h.diff?r1=1.20&r2=1.21
client.h1.64 => 1.65

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/client.h.diff?r1=1.64&r2=1.65
includes.h  1.328 => 1.329

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/includes.h.diff?r1=1.328&r2=1.329
ntdomain.h  1.89 => 1.90

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/ntdomain.h.diff?r1=1.89&r2=1.90
ntlmssp.h   1.9 => 1.10

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/ntlmssp.h.diff?r1=1.9&r2=1.10
smb.h   1.496 => 1.497

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/smb.h.diff?r1=1.496&r2=1.497


CVS update: samba/source/auth

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:29:01 2003
Author: abartlet

Update of /data/cvs/samba/source/auth
In directory dp.samba.org:/tmp/cvs-serv23686/auth

Modified Files:
auth.c auth_ntlmssp.c auth_sam.c auth_util.c 
Log Message:
(merge from 3.0)

Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to
merge the 'client' and 'server' functions, so they both operate on a
single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of
data structures...  

Andrew Bartlett



Revisions:
auth.c  1.58 => 1.59

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth.c.diff?r1=1.58&r2=1.59
auth_ntlmssp.c  1.8 => 1.9

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_ntlmssp.c.diff?r1=1.8&r2=1.9
auth_sam.c  1.59 => 1.60

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_sam.c.diff?r1=1.59&r2=1.60
auth_util.c 1.79 => 1.80

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_util.c.diff?r1=1.79&r2=1.80


CVS update: samba/source/smbd

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:19:38 2003
Author: abartlet

Update of /home/cvs/samba/source/smbd
In directory dp.samba.org:/tmp/cvs-serv21668/smbd

Modified Files:
  Tag: SAMBA_3_0
password.c sesssetup.c 
Log Message:
Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' 
and 'server' functions, so they both operate on a single structure.  This should help 
the SPNEGO implementation. 

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...




Revisions:
password.c  1.248.2.17 => 1.248.2.18

http://www.samba.org/cgi-bin/cvsweb/samba/source/smbd/password.c.diff?r1=1.248.2.17&r2=1.248.2.18
sesssetup.c 1.50.2.38 => 1.50.2.39

http://www.samba.org/cgi-bin/cvsweb/samba/source/smbd/sesssetup.c.diff?r1=1.50.2.38&r2=1.50.2.39


CVS update: samba/source/utils

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:19:38 2003
Author: abartlet

Update of /home/cvs/samba/source/utils
In directory dp.samba.org:/tmp/cvs-serv21668/utils

Modified Files:
  Tag: SAMBA_3_0
ntlm_auth.c 
Log Message:
Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' 
and 'server' functions, so they both operate on a single structure.  This should help 
the SPNEGO implementation. 

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...




Revisions:
ntlm_auth.c 1.6.2.32 => 1.6.2.33

http://www.samba.org/cgi-bin/cvsweb/samba/source/utils/ntlm_auth.c.diff?r1=1.6.2.32&r2=1.6.2.33


CVS update: samba/source/rpc_server

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:19:38 2003
Author: abartlet

Update of /home/cvs/samba/source/rpc_server
In directory dp.samba.org:/tmp/cvs-serv21668/rpc_server

Modified Files:
  Tag: SAMBA_3_0
srv_netlog_nt.c srv_pipe.c srv_pipe_hnd.c srv_samr_nt.c 
Log Message:
Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' 
and 'server' functions, so they both operate on a single structure.  This should help 
the SPNEGO implementation. 

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...




Revisions:
srv_netlog_nt.c 1.57.2.19 => 1.57.2.20

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_netlog_nt.c.diff?r1=1.57.2.19&r2=1.57.2.20
srv_pipe.c  1.93.2.25 => 1.93.2.26

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_pipe.c.diff?r1=1.93.2.25&r2=1.93.2.26
srv_pipe_hnd.c  1.77.2.8 => 1.77.2.9

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_pipe_hnd.c.diff?r1=1.77.2.8&r2=1.77.2.9
srv_samr_nt.c   1.86.2.50 => 1.86.2.51

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_server/srv_samr_nt.c.diff?r1=1.86.2.50&r2=1.86.2.51


CVS update: samba/source/rpc_parse

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:19:38 2003
Author: abartlet

Update of /home/cvs/samba/source/rpc_parse
In directory dp.samba.org:/tmp/cvs-serv21668/rpc_parse

Modified Files:
  Tag: SAMBA_3_0
parse_net.c parse_samr.c 
Log Message:
Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' 
and 'server' functions, so they both operate on a single structure.  This should help 
the SPNEGO implementation. 

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...




Revisions:
parse_net.c 1.85.2.17 => 1.85.2.18

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_net.c.diff?r1=1.85.2.17&r2=1.85.2.18
parse_samr.c1.143.2.21 => 1.143.2.22

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_parse/parse_samr.c.diff?r1=1.143.2.21&r2=1.143.2.22


CVS update: samba/source/rpc_client

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:19:37 2003
Author: abartlet

Update of /home/cvs/samba/source/rpc_client
In directory dp.samba.org:/tmp/cvs-serv21668/rpc_client

Modified Files:
  Tag: SAMBA_3_0
cli_netlogon.c cli_pipe.c cli_samr.c 
Log Message:
Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' 
and 'server' functions, so they both operate on a single structure.  This should help 
the SPNEGO implementation. 

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...




Revisions:
cli_netlogon.c  1.69.2.13 => 1.69.2.14

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_netlogon.c.diff?r1=1.69.2.13&r2=1.69.2.14
cli_pipe.c  1.79.2.39 => 1.79.2.40

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_pipe.c.diff?r1=1.79.2.39&r2=1.79.2.40
cli_samr.c  1.68.2.13 => 1.68.2.14

http://www.samba.org/cgi-bin/cvsweb/samba/source/rpc_client/cli_samr.c.diff?r1=1.68.2.13&r2=1.68.2.14


CVS update: samba/source/nsswitch

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:19:37 2003
Author: abartlet

Update of /home/cvs/samba/source/nsswitch
In directory dp.samba.org:/tmp/cvs-serv21668/nsswitch

Modified Files:
  Tag: SAMBA_3_0
winbindd_cm.c winbindd_pam.c 
Log Message:
Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' 
and 'server' functions, so they both operate on a single structure.  This should help 
the SPNEGO implementation. 

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...




Revisions:
winbindd_cm.c   1.31.2.43 => 1.31.2.44

http://www.samba.org/cgi-bin/cvsweb/samba/source/nsswitch/winbindd_cm.c.diff?r1=1.31.2.43&r2=1.31.2.44
winbindd_pam.c  1.44.2.29 => 1.44.2.30

http://www.samba.org/cgi-bin/cvsweb/samba/source/nsswitch/winbindd_pam.c.diff?r1=1.44.2.29&r2=1.44.2.30


CVS update: samba/source/libsmb

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:19:37 2003
Author: abartlet

Update of /home/cvs/samba/source/libsmb
In directory dp.samba.org:/tmp/cvs-serv21668/libsmb

Modified Files:
  Tag: SAMBA_3_0
cliconnect.c clientgen.c clikrb5.c clispnego.c ntlmssp.c 
ntlmssp_parse.c ntlmssp_sign.c smb_signing.c smbencrypt.c 
Log Message:
Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' 
and 'server' functions, so they both operate on a single structure.  This should help 
the SPNEGO implementation. 

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...




Revisions:
cliconnect.c1.71.2.45 => 1.71.2.46

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/cliconnect.c.diff?r1=1.71.2.45&r2=1.71.2.46
clientgen.c 1.190.2.22 => 1.190.2.23

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clientgen.c.diff?r1=1.190.2.22&r2=1.190.2.23
clikrb5.c   1.15.2.27 => 1.15.2.28

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clikrb5.c.diff?r1=1.15.2.27&r2=1.15.2.28
clispnego.c 1.11.2.11 => 1.11.2.12

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/clispnego.c.diff?r1=1.11.2.11&r2=1.11.2.12
ntlmssp.c   1.4.2.23 => 1.4.2.24

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp.c.diff?r1=1.4.2.23&r2=1.4.2.24
ntlmssp_parse.c 1.3.2.5 => 1.3.2.6

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp_parse.c.diff?r1=1.3.2.5&r2=1.3.2.6
ntlmssp_sign.c  1.1.2.7 => 1.1.2.8

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/ntlmssp_sign.c.diff?r1=1.1.2.7&r2=1.1.2.8
smb_signing.c   1.4.2.38 => 1.4.2.39

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smb_signing.c.diff?r1=1.4.2.38&r2=1.4.2.39
smbencrypt.c1.68.2.12 => 1.68.2.13

http://www.samba.org/cgi-bin/cvsweb/samba/source/libsmb/smbencrypt.c.diff?r1=1.68.2.12&r2=1.68.2.13


CVS update: samba/source/lib

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:19:37 2003
Author: abartlet

Update of /home/cvs/samba/source/lib
In directory dp.samba.org:/tmp/cvs-serv21668/lib

Modified Files:
  Tag: SAMBA_3_0
data_blob.c 
Log Message:
Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' 
and 'server' functions, so they both operate on a single structure.  This should help 
the SPNEGO implementation. 

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...




Revisions:
data_blob.c 1.2.2.3 => 1.2.2.4

http://www.samba.org/cgi-bin/cvsweb/samba/source/lib/data_blob.c.diff?r1=1.2.2.3&r2=1.2.2.4


CVS update: samba/source/libads

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:19:37 2003
Author: abartlet

Update of /home/cvs/samba/source/libads
In directory dp.samba.org:/tmp/cvs-serv21668/libads

Modified Files:
  Tag: SAMBA_3_0
kerberos_verify.c 
Log Message:
Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' 
and 'server' functions, so they both operate on a single structure.  This should help 
the SPNEGO implementation. 

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...




Revisions:
kerberos_verify.c   1.1.2.29 => 1.1.2.30

http://www.samba.org/cgi-bin/cvsweb/samba/source/libads/kerberos_verify.c.diff?r1=1.1.2.29&r2=1.1.2.30


CVS update: samba/source/include

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:19:37 2003
Author: abartlet

Update of /home/cvs/samba/source/include
In directory dp.samba.org:/tmp/cvs-serv21668/include

Modified Files:
  Tag: SAMBA_3_0
auth.h client.h includes.h ntdomain.h ntlmssp.h smb.h 
Log Message:
Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' 
and 'server' functions, so they both operate on a single structure.  This should help 
the SPNEGO implementation. 

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...




Revisions:
auth.h  1.14.2.6 => 1.14.2.7

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/auth.h.diff?r1=1.14.2.6&r2=1.14.2.7
client.h1.46.2.13 => 1.46.2.14

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/client.h.diff?r1=1.46.2.13&r2=1.46.2.14
includes.h  1.262.2.54 => 1.262.2.55

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/includes.h.diff?r1=1.262.2.54&r2=1.262.2.55
ntdomain.h  1.79.2.8 => 1.79.2.9

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/ntdomain.h.diff?r1=1.79.2.8&r2=1.79.2.9
ntlmssp.h   1.2.2.9 => 1.2.2.10

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/ntlmssp.h.diff?r1=1.2.2.9&r2=1.2.2.10
smb.h   1.424.2.56 => 1.424.2.57

http://www.samba.org/cgi-bin/cvsweb/samba/source/include/smb.h.diff?r1=1.424.2.56&r2=1.424.2.57


CVS update: samba/source/auth

2003-11-22 Thread abartlet

Date:   Sat Nov 22 13:19:36 2003
Author: abartlet

Update of /home/cvs/samba/source/auth
In directory dp.samba.org:/tmp/cvs-serv21668/auth

Modified Files:
  Tag: SAMBA_3_0
auth.c auth_ntlmssp.c auth_sam.c auth_util.c 
Log Message:
Changes all over the shop, but all towards:
 - NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' 
and 'server' functions, so they both operate on a single structure.  This should help 
the SPNEGO implementation. 

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...




Revisions:
auth.c  1.32.2.24 => 1.32.2.25

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth.c.diff?r1=1.32.2.24&r2=1.32.2.25
auth_ntlmssp.c  1.4.2.5 => 1.4.2.6

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_ntlmssp.c.diff?r1=1.4.2.5&r2=1.4.2.6
auth_sam.c  1.36.2.24 => 1.36.2.25

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_sam.c.diff?r1=1.36.2.24&r2=1.36.2.25
auth_util.c 1.39.2.48 => 1.39.2.49

http://www.samba.org/cgi-bin/cvsweb/samba/source/auth/auth_util.c.diff?r1=1.39.2.48&r2=1.39.2.49


CVS update: samba4/source/build/pidl

2003-11-22 Thread tridge

Date:   Sat Nov 22 12:25:20 2003
Author: tridge

Update of /home/cvs/samba4/source/build/pidl
In directory dp.samba.org:/tmp/cvs-serv17251

Modified Files:
pidl.pl 
Added Files:
validator.pm 
Log Message:
added the beginnings of an IDL validator, to give clearer errors when
IDL is not valid


Revisions:
validator.pmNONE => 1.1

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/validator.pm?rev=1.1
pidl.pl 1.14 => 1.15

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/pidl.pl.diff?r1=1.14&r2=1.15


CVS update: samba4/source/torture/rpc

2003-11-22 Thread tridge

Date:   Sat Nov 22 11:49:22 2003
Author: tridge

Update of /home/cvs/samba4/source/torture/rpc
In directory dp.samba.org:/tmp/cvs-serv12669

Modified Files:
spoolss.c 
Log Message:
 * fixed null terminated string handling

 * fixed nested relative offsets in push functions

the spoolss torture test now passes!


Revisions:
spoolss.c   1.18 => 1.19

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/spoolss.c.diff?r1=1.18&r2=1.19


CVS update: samba4/source/librpc/rpc

2003-11-22 Thread tridge

Date:   Sat Nov 22 11:49:17 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/rpc
In directory dp.samba.org:/tmp/cvs-serv12655

Modified Files:
dcerpc.c 
Log Message:
 * fixed null terminated string handling

 * fixed nested relative offsets in push functions

the spoolss torture test now passes!


Revisions:
dcerpc.c1.13 => 1.14

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.c.diff?r1=1.13&r2=1.14


CVS update: samba4/source/librpc/ndr

2003-11-22 Thread tridge

Date:   Sat Nov 22 11:49:11 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/ndr
In directory dp.samba.org:/tmp/cvs-serv12641

Modified Files:
ndr.c ndr_basic.c 
Log Message:
 * fixed null terminated string handling

 * fixed nested relative offsets in push functions

the spoolss torture test now passes!


Revisions:
ndr.c   1.25 => 1.26

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr.c.diff?r1=1.25&r2=1.26
ndr_basic.c 1.31 => 1.32

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr_basic.c.diff?r1=1.31&r2=1.32


CVS update: samba4/source/torture/rpc

2003-11-22 Thread tridge

Date:   Sat Nov 22 10:37:00 2003
Author: tridge

Update of /home/cvs/samba4/source/torture/rpc
In directory dp.samba.org:/tmp/cvs-serv3824

Modified Files:
spoolss.c 
Log Message:
 * fixed handling of relative subcontext unions

 * fixed GetPrinter in spoolss after OpenPrinter



Revisions:
spoolss.c   1.17 => 1.18

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/spoolss.c.diff?r1=1.17&r2=1.18


CVS update: samba4/source/librpc/idl

2003-11-22 Thread tridge

Date:   Sat Nov 22 10:36:55 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/idl
In directory dp.samba.org:/tmp/cvs-serv3809

Modified Files:
spoolss.idl 
Log Message:
 * fixed handling of relative subcontext unions

 * fixed GetPrinter in spoolss after OpenPrinter



Revisions:
spoolss.idl 1.17 => 1.18

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/spoolss.idl.diff?r1=1.17&r2=1.18


CVS update: samba4/source/build/pidl

2003-11-22 Thread tridge

Date:   Sat Nov 22 10:36:49 2003
Author: tridge

Update of /home/cvs/samba4/source/build/pidl
In directory dp.samba.org:/tmp/cvs-serv3790

Modified Files:
parser.pm 
Log Message:
 * fixed handling of relative subcontext unions

 * fixed GetPrinter in spoolss after OpenPrinter



Revisions:
parser.pm   1.49 => 1.50

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/parser.pm.diff?r1=1.49&r2=1.50


CVS update: samba4/source/librpc/idl

2003-11-22 Thread tridge

Date:   Sat Nov 22 09:45:40 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/idl
In directory dp.samba.org:/tmp/cvs-serv31013

Modified Files:
dfs.idl 
Log Message:
dfs torture test now passes


Revisions:
dfs.idl 1.9 => 1.10

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/dfs.idl.diff?r1=1.9&r2=1.10


CVS update: samba4/source/librpc/ndr

2003-11-22 Thread tridge

Date:   Sat Nov 22 09:32:23 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/ndr
In directory dp.samba.org:/tmp/cvs-serv29646

Modified Files:
ndr.c 
Log Message:
 * fixed NDR flag inheritance across push subcontexts

 * don't consider not doing lsa_QueryInfoPolicy level 11 a failure
   (w2k3 doesn't have this level, w2k does)

 * on a NDR validation failure dump the failed data at level 3


Revisions:
ndr.c   1.24 => 1.25

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr.c.diff?r1=1.24&r2=1.25


CVS update: samba4/source/torture/rpc

2003-11-22 Thread tridge

Date:   Sat Nov 22 09:32:35 2003
Author: tridge

Update of /home/cvs/samba4/source/torture/rpc
In directory dp.samba.org:/tmp/cvs-serv29674

Modified Files:
lsa.c 
Log Message:
 * fixed NDR flag inheritance across push subcontexts

 * don't consider not doing lsa_QueryInfoPolicy level 11 a failure
   (w2k3 doesn't have this level, w2k does)

 * on a NDR validation failure dump the failed data at level 3


Revisions:
lsa.c   1.35 => 1.36

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/lsa.c.diff?r1=1.35&r2=1.36


CVS update: samba4/source/librpc/rpc

2003-11-22 Thread tridge

Date:   Sat Nov 22 09:32:29 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/rpc
In directory dp.samba.org:/tmp/cvs-serv29660

Modified Files:
dcerpc.c 
Log Message:
 * fixed NDR flag inheritance across push subcontexts

 * don't consider not doing lsa_QueryInfoPolicy level 11 a failure
   (w2k3 doesn't have this level, w2k does)

 * on a NDR validation failure dump the failed data at level 3


Revisions:
dcerpc.c1.12 => 1.13

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.c.diff?r1=1.12&r2=1.13


CVS update: samba4/source/torture/rpc

2003-11-22 Thread tridge

Date:   Sat Nov 22 08:41:40 2003
Author: tridge

Update of /home/cvs/samba4/source/torture/rpc
In directory dp.samba.org:/tmp/cvs-serv23851

Modified Files:
lsa.c samr.c 
Log Message:
 * enable RPC/NDR validation in all smbtorture code

 * allow us to distinguish between null arrays and zero length arrays,
   by making the allocation size a minimum of 1 on array pull



Revisions:
lsa.c   1.34 => 1.35

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/lsa.c.diff?r1=1.34&r2=1.35
samr.c  1.30 => 1.31

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/samr.c.diff?r1=1.30&r2=1.31


CVS update: samba4/source/torture

2003-11-22 Thread tridge

Date:   Sat Nov 22 08:41:34 2003
Author: tridge

Update of /home/cvs/samba4/source/torture
In directory dp.samba.org:/tmp/cvs-serv23836

Modified Files:
torture.c 
Log Message:
 * enable RPC/NDR validation in all smbtorture code

 * allow us to distinguish between null arrays and zero length arrays,
   by making the allocation size a minimum of 1 on array pull



Revisions:
torture.c   1.24 => 1.25

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/torture.c.diff?r1=1.24&r2=1.25


CVS update: samba4/source/build/pidl

2003-11-22 Thread tridge

Date:   Sat Nov 22 08:41:26 2003
Author: tridge

Update of /home/cvs/samba4/source/build/pidl
In directory dp.samba.org:/tmp/cvs-serv23821

Modified Files:
parser.pm 
Log Message:
 * enable RPC/NDR validation in all smbtorture code

 * allow us to distinguish between null arrays and zero length arrays,
   by making the allocation size a minimum of 1 on array pull



Revisions:
parser.pm   1.48 => 1.49

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/parser.pm.diff?r1=1.48&r2=1.49


CVS update: samba4/source/torture/rpc

2003-11-22 Thread tridge

Date:   Sat Nov 22 08:11:32 2003
Author: tridge

Update of /home/cvs/samba4/source/torture/rpc
In directory dp.samba.org:/tmp/cvs-serv20558

Modified Files:
atsvc.c dfs.c echo.c epmapper.c eventlog.c lsa.c samr.c 
spoolss.c srvsvc.c winreg.c wkssvc.c 
Log Message:
a fairly major upgrade to the dcerpc system

 * added a NDR validator. The way it works is that when the
   DCERPC_DEBUG_VALIDATE_* flags are set the dcerpc system will
   perform NDR buffer validation. On sending a request the packet is
   first marshalled, then unmarahslled, then marshalled again, and it is
   confirmed that the two marshalling results are idential. This
   ensures that our pull and push routines are absolutely in sync, so
   that we can be very confident that if a routine works in the client
   then the corresponding routine must work on the server side. A
   similar validation is performed on all replies.

 * a result of this change is that pidl is fussier about the [ref]
   tag. You can only use it on pointers (which is the only place it
   makes sense)

 * fixed a basic alignment bug in the push side of the NDR code

 * added server side pull/push support. Our dcerpc system is now fully
   ready to be used on the server side.

 * fixed the relative offset pointer list. It must be traversed in
   reverse order on push

 * added automatic value setting for the size parameter in outgoing
   SdBuf structures. 

 * expanded the ndr debugging code to always give a message on any
   failure

 * fixed the subcontext push code

 * fixed some memory leaks in smbtorture RPC tests





Revisions:
atsvc.c 1.2 => 1.3

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/atsvc.c.diff?r1=1.2&r2=1.3
dfs.c   1.8 => 1.9

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/dfs.c.diff?r1=1.8&r2=1.9
echo.c  1.17 => 1.18

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/echo.c.diff?r1=1.17&r2=1.18
epmapper.c  1.2 => 1.3

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/epmapper.c.diff?r1=1.2&r2=1.3
eventlog.c  1.2 => 1.3

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/eventlog.c.diff?r1=1.2&r2=1.3
lsa.c   1.33 => 1.34

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/lsa.c.diff?r1=1.33&r2=1.34
samr.c  1.29 => 1.30

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/samr.c.diff?r1=1.29&r2=1.30
spoolss.c   1.16 => 1.17

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/spoolss.c.diff?r1=1.16&r2=1.17
srvsvc.c1.4 => 1.5

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/srvsvc.c.diff?r1=1.4&r2=1.5
winreg.c1.3 => 1.4

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/winreg.c.diff?r1=1.3&r2=1.4
wkssvc.c1.9 => 1.10

http://www.samba.org/cgi-bin/cvsweb/samba4/source/torture/rpc/wkssvc.c.diff?r1=1.9&r2=1.10


CVS update: samba4/source/librpc/rpc

2003-11-22 Thread tridge

Date:   Sat Nov 22 08:11:25 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/rpc
In directory dp.samba.org:/tmp/cvs-serv20542

Modified Files:
dcerpc.c dcerpc.h 
Log Message:
a fairly major upgrade to the dcerpc system

 * added a NDR validator. The way it works is that when the
   DCERPC_DEBUG_VALIDATE_* flags are set the dcerpc system will
   perform NDR buffer validation. On sending a request the packet is
   first marshalled, then unmarahslled, then marshalled again, and it is
   confirmed that the two marshalling results are idential. This
   ensures that our pull and push routines are absolutely in sync, so
   that we can be very confident that if a routine works in the client
   then the corresponding routine must work on the server side. A
   similar validation is performed on all replies.

 * a result of this change is that pidl is fussier about the [ref]
   tag. You can only use it on pointers (which is the only place it
   makes sense)

 * fixed a basic alignment bug in the push side of the NDR code

 * added server side pull/push support. Our dcerpc system is now fully
   ready to be used on the server side.

 * fixed the relative offset pointer list. It must be traversed in
   reverse order on push

 * added automatic value setting for the size parameter in outgoing
   SdBuf structures. 

 * expanded the ndr debugging code to always give a message on any
   failure

 * fixed the subcontext push code

 * fixed some memory leaks in smbtorture RPC tests





Revisions:
dcerpc.c1.11 => 1.12

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.c.diff?r1=1.11&r2=1.12
dcerpc.h1.4 => 1.5

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/rpc/dcerpc.h.diff?r1=1.4&r2=1.5


CVS update: samba4/source/librpc/ndr

2003-11-22 Thread tridge

Date:   Sat Nov 22 08:11:18 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/ndr
In directory dp.samba.org:/tmp/cvs-serv20524

Modified Files:
libndr.h ndr.c ndr_basic.c ndr_sec.c 
Log Message:
a fairly major upgrade to the dcerpc system

 * added a NDR validator. The way it works is that when the
   DCERPC_DEBUG_VALIDATE_* flags are set the dcerpc system will
   perform NDR buffer validation. On sending a request the packet is
   first marshalled, then unmarahslled, then marshalled again, and it is
   confirmed that the two marshalling results are idential. This
   ensures that our pull and push routines are absolutely in sync, so
   that we can be very confident that if a routine works in the client
   then the corresponding routine must work on the server side. A
   similar validation is performed on all replies.

 * a result of this change is that pidl is fussier about the [ref]
   tag. You can only use it on pointers (which is the only place it
   makes sense)

 * fixed a basic alignment bug in the push side of the NDR code

 * added server side pull/push support. Our dcerpc system is now fully
   ready to be used on the server side.

 * fixed the relative offset pointer list. It must be traversed in
   reverse order on push

 * added automatic value setting for the size parameter in outgoing
   SdBuf structures. 

 * expanded the ndr debugging code to always give a message on any
   failure

 * fixed the subcontext push code

 * fixed some memory leaks in smbtorture RPC tests





Revisions:
libndr.h1.26 => 1.27

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/libndr.h.diff?r1=1.26&r2=1.27
ndr.c   1.23 => 1.24

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr.c.diff?r1=1.23&r2=1.24
ndr_basic.c 1.30 => 1.31

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr_basic.c.diff?r1=1.30&r2=1.31
ndr_sec.c   1.8 => 1.9

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/ndr/ndr_sec.c.diff?r1=1.8&r2=1.9


CVS update: samba4/source/librpc/idl

2003-11-22 Thread tridge

Date:   Sat Nov 22 08:11:12 2003
Author: tridge

Update of /home/cvs/samba4/source/librpc/idl
In directory dp.samba.org:/tmp/cvs-serv20509

Modified Files:
samr.idl 
Log Message:
a fairly major upgrade to the dcerpc system

 * added a NDR validator. The way it works is that when the
   DCERPC_DEBUG_VALIDATE_* flags are set the dcerpc system will
   perform NDR buffer validation. On sending a request the packet is
   first marshalled, then unmarahslled, then marshalled again, and it is
   confirmed that the two marshalling results are idential. This
   ensures that our pull and push routines are absolutely in sync, so
   that we can be very confident that if a routine works in the client
   then the corresponding routine must work on the server side. A
   similar validation is performed on all replies.

 * a result of this change is that pidl is fussier about the [ref]
   tag. You can only use it on pointers (which is the only place it
   makes sense)

 * fixed a basic alignment bug in the push side of the NDR code

 * added server side pull/push support. Our dcerpc system is now fully
   ready to be used on the server side.

 * fixed the relative offset pointer list. It must be traversed in
   reverse order on push

 * added automatic value setting for the size parameter in outgoing
   SdBuf structures. 

 * expanded the ndr debugging code to always give a message on any
   failure

 * fixed the subcontext push code

 * fixed some memory leaks in smbtorture RPC tests





Revisions:
samr.idl1.30 => 1.31

http://www.samba.org/cgi-bin/cvsweb/samba4/source/librpc/idl/samr.idl.diff?r1=1.30&r2=1.31


CVS update: samba4/source/build/pidl

2003-11-22 Thread tridge

Date:   Sat Nov 22 08:11:06 2003
Author: tridge

Update of /home/cvs/samba4/source/build/pidl
In directory dp.samba.org:/tmp/cvs-serv20495

Modified Files:
client.pm parser.pm 
Log Message:
a fairly major upgrade to the dcerpc system

 * added a NDR validator. The way it works is that when the
   DCERPC_DEBUG_VALIDATE_* flags are set the dcerpc system will
   perform NDR buffer validation. On sending a request the packet is
   first marshalled, then unmarahslled, then marshalled again, and it is
   confirmed that the two marshalling results are idential. This
   ensures that our pull and push routines are absolutely in sync, so
   that we can be very confident that if a routine works in the client
   then the corresponding routine must work on the server side. A
   similar validation is performed on all replies.

 * a result of this change is that pidl is fussier about the [ref]
   tag. You can only use it on pointers (which is the only place it
   makes sense)

 * fixed a basic alignment bug in the push side of the NDR code

 * added server side pull/push support. Our dcerpc system is now fully
   ready to be used on the server side.

 * fixed the relative offset pointer list. It must be traversed in
   reverse order on push

 * added automatic value setting for the size parameter in outgoing
   SdBuf structures. 

 * expanded the ndr debugging code to always give a message on any
   failure

 * fixed the subcontext push code

 * fixed some memory leaks in smbtorture RPC tests





Revisions:
client.pm   1.4 => 1.5

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/client.pm.diff?r1=1.4&r2=1.5
parser.pm   1.47 => 1.48

http://www.samba.org/cgi-bin/cvsweb/samba4/source/build/pidl/parser.pm.diff?r1=1.47&r2=1.48