summaryrefslogtreecommitdiff
path: root/source4
Commit message (Expand)AuthorAgeFilesLines
...
* selftest: Prepare for "old Samba" mode regarding getncchanges GET_ANC/GET_TGTAndrew Bartlett2022-10-071-5/+9
* pytest/samba_tool_drs_no_dns: use TestCaseInTempDir.rm_files/.rm_dirsDouglas Bagnall2022-10-071-11/+3
* pytest/samba_tool_drs: use TestCaseInTempDir.rm_files/.rm_dirsDouglas Bagnall2022-10-071-10/+3
* CVE-2021-20251 dsdb/common: Remove transaction logic from samdb_set_password()Joseph Sutton2022-09-191-1/+4
* CVE-2021-20251 s4-rpc_server: Extend scope of transaction for ChangePasswordU...Joseph Sutton2022-09-191-9/+33
* CVE-2021-20251 s4-rpc_server: Use user privileges for SAMR password changeJoseph Sutton2022-09-192-6/+31
* CVE-2021-20251 s4-rpc_server: Use authsam_search_account() to find the userJoseph Sutton2022-09-191-32/+15
* CVE-2021-20251 s4:auth_winbind: Check return status of authsam_logon_success_...Joseph Sutton2022-09-191-1/+4
* CVE-2021-20251 s4-rpc_server: Check badPwdCount update return statusJoseph Sutton2022-09-191-1/+5
* CVE-2021-20251 s4:kdc: Check badPwdCount update return statusJoseph Sutton2022-09-191-2/+7
* CVE-2021-20251 s4:kdc: Check return status of authsam_logon_success_accounting()Joseph Sutton2022-09-191-4/+11
* CVE-2021-20251 s4:kdc: Move logon success accounting code into existing branchJoseph Sutton2022-09-191-20/+13
* CVE-2021-20251 s4:dsdb: Make badPwdCount update atomicJoseph Sutton2022-09-191-3/+24
* CVE-2021-20251 s4:dsdb: Update bad password count inside transactionJoseph Sutton2022-09-191-18/+19
* CVE-2021-20251 s4-auth: Pass through error code from badPwdCount updateJoseph Sutton2022-09-191-1/+5
* CVE-2021-20251 auth4: Avoid reading the database twice by precaculating some ...Andrew Bartlett2022-09-191-19/+36
* CVE-2021-20251 auth4: Inline samdb_result_effective_badPwdCount() in authsam_...Andrew Bartlett2022-09-191-5/+8
* CVE-2021-20251 auth4: Split authsam_calculate_lastlogon_sync_interval() outAndrew Bartlett2022-09-191-42/+73
* CVE-2021-20251 auth4: Return only the result message and free the surrounding...Gary Lockyer2022-09-191-1/+2
* CVE-2021-20251 auth4: Add missing newline to debug message on PSO read failureAndrew Bartlett2022-09-191-1/+1
* CVE-2021-20251 s4 auth: make bad password count increment atomicAndrew Bartlett2022-09-191-50/+246
* CVE-2021-20251 auth4: Detect ACCOUNT_LOCKED_OUT error for password changeJoseph Sutton2022-09-191-1/+6
* CVE-2021-20251 s4 auth test: Unit tests for source4/auth/sam.cGary Lockyer2022-09-192-0/+2757
* CVE-2021-20251 auth4: Reread the user record if a bad password is noticed.Andrew Bartlett2022-09-191-0/+82
* CVE-2021-20251 s4 auth: Prepare to make bad password count increment atomicGary Lockyer2022-09-191-0/+187
* CVE-2021-20251 auth4: split samdb_result_msds_LockoutObservationWindow() outGary Lockyer2022-09-191-13/+32
* CVE-2021-20251 s4-rpc_server: Use authsam_search_account() to find the userAndrew Bartlett2022-09-191-23/+17
* CVE-2021-20251 tests/krb5: Add tests for password lockout raceJoseph Sutton2022-09-191-0/+7
* s4:torture: Zero samr_UserInfo union in password set testJoseph Sutton2022-09-191-0/+2
* smbtorture: add a test trying to create a stream on share without streams sup...Ralph Boehme2022-09-063-0/+50
* smbtorture: check required access for SMB2-GETINFORalph Boehme2022-09-061-0/+147
* s4/libcli/smb2: avoid using smb2_composite_setpathinfo() in smb2_util_setatr()Ralph Boehme2022-09-062-15/+32
* smbtorture: add test smb2.stream.attributes2Ralph Boehme2022-08-231-0/+355
* smbtorture: rename smb2.streams.attributes to smb2.streams.attributes1Ralph Boehme2022-08-231-3/+3
* s4:torture/smb2: add smb2.lease.v[1,2]_bug_15148Stefan Metzmacher2022-08-231-0/+208
* s4:torture/smb2: add smb2.bench.echoStefan Metzmacher2022-08-161-0/+329
* s4:torture/smb2: teach smb2.bench.path-contention-shared about --option="tort...Stefan Metzmacher2022-08-161-105/+157
* s4:param: add --option="libsmb:client_guid=6112f7d3-9528-4a2a-8861-0ca129aae6...Stefan Metzmacher2022-08-161-1/+10
* pyparam: expose lpcfg_dump_globals()Douglas Bagnall2022-08-061-0/+33
* CVE-2022-32743 s4:rpc_server/netlogon: Reconnect to samdb as workstation accountJoseph Sutton2022-07-281-0/+28
* CVE-2022-32743 s4:rpc_server/common: Add dcesrv_samdb_connect_session_info()Joseph Sutton2022-07-282-26/+40
* CVE-2022-32743 dsdb/modules/acl: Allow simultaneous sAMAccountName, dNSHostNa...Joseph Sutton2022-07-281-20/+65
* CVE-2022-32743 dsdb/modules/acl: Account for sAMAccountName without $Joseph Sutton2022-07-281-2/+10
* CVE-2022-32743 s4:rpc_server/netlogon: Connect to samdb as a user, rather tha...Joseph Sutton2022-07-281-2/+3
* CVE-2022-32743 s4:rpc_server/netlogon: Always observe NETR_WS_FLAG_HANDLES_SP...Joseph Sutton2022-07-281-5/+2
* CVE-2022-32743 s4:rpc_server/netlogon: Remove dNSHostName prefix checkJoseph Sutton2022-07-281-19/+2
* CVE-2022-32743 dsdb/modules/acl: Handle FORCE_ALLOW_VALIDATED_DNS_HOSTNAME_SP...Joseph Sutton2022-07-281-57/+91
* CVE-2022-32743 dsdb/common: Add FORCE_ALLOW_VALIDATED_DNS_HOSTNAME_SPN_WRITE ...Joseph Sutton2022-07-283-0/+14
* CVE-2022-32743 dsdb: Implement validated dNSHostName writeJoseph Sutton2022-07-281-0/+283
* CVE-2022-32743 s4/dsdb/util: Add function to check for a subclass relationshipJoseph Sutton2022-07-281-0/+38