summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* VERSION: Disable GIT_SNAPSHOT for the Samba 4.15.0rc1 release.samba-4.15.0rc1Karolin Seeger2021-07-151-3/+3
* WHATSNEW: Up to Samba 4.15.0rc1.Karolin Seeger2021-07-151-1/+1
* WHATSNEW: Fix typos.Karolin Seeger2021-07-151-4/+5
* s3: VFS: default. In vfswrap_getxattrat_do_async() always use the pathref fsp.Jeremy Allison2021-07-151-11/+10
* s3: VFS: default. In vfswrap_getxattrat_do_sync() always use the pathref fsp.Jeremy Allison2021-07-151-21/+9
* s3: VFS: default: Add 'handle' member to struct vfswrap_getxattrat_stateJeremy Allison2021-07-151-0/+2
* s3: VFS: default: Move vfswrap_fgetxattr() before the async versions.Jeremy Allison2021-07-151-30/+30
* s3: smbd: Allow "smbd async dosmode = yes" to return valid DOS attributes again.Jeremy Allison2021-07-152-13/+16
* s3: tests: Add "SMB2-LIST-DIR-ASYNC" test.Jeremy Allison2021-07-155-0/+106
* s3: tests: Our tests for "smbd async dosmode = yes" haven't been working corr...Jeremy Allison2021-07-152-11/+11
* WHATSNEW: add client/server smb3 signing/encryption algorithmsStefan Metzmacher2021-07-151-0/+4
* s3:smbd: improve the error returns for invalid session binding requestsStefan Metzmacher2021-07-152-40/+31
* s4:torture: more smb2.session.bind_negative_smb3* combinationsStefan Metzmacher2021-07-152-2/+1800
* docs-xml: offer aes-128-gmac by defaultStefan Metzmacher2021-07-153-5/+5
* libcli/smb: add support for SMB2_SIGNING_AES128_GMACStefan Metzmacher2021-07-153-1/+142
* s4:torture: force AES_CMAC or HMAC_SHA256 for some SMB 3.1.1 testsStefan Metzmacher2021-07-151-0/+48
* libcli/smb: actually make use of "client/server smb3 signing algorithms"Stefan Metzmacher2021-07-156-1/+39
* docs-xml: add "client/server smb3 signing algorithms" optionsStefan Metzmacher2021-07-155-0/+57
* s3:smbd: prepare support for SMB2_SIGNING_CAPABILITIESStefan Metzmacher2021-07-151-0/+80
* libcli/smb: prepare support for SMB2_SIGNING_CAPABILITIES negotiationStefan Metzmacher2021-07-153-0/+159
* libcli/smb: make sure smb2_signing_calc_signature() never generates a signatu...Stefan Metzmacher2021-07-151-0/+32
* libcli/smb: make sure we always send a valid MID in cancel PDUsStefan Metzmacher2021-07-151-3/+21
* libcli/smb: skip session setup signing for REQUEST_OUT_OF_SEQUENCE, NOT_SUPPO...Stefan Metzmacher2021-07-151-0/+40
* libcli/smb: add smb2cli_conn_server_{signing,encryption}_algo()Stefan Metzmacher2021-07-152-0/+12
* s3:smbd: make sure we don't try to sign CANCEL response PDUsStefan Metzmacher2021-07-151-2/+4
* s3:smbd: make sure STATUS_PENDING responses are never signedStefan Metzmacher2021-07-151-13/+9
* s3:smbstatus: pretty print the use of new signing/encryption algorithmsStefan Metzmacher2021-07-155-15/+66
* s3:smbd: only allow cancel with the same sessionStefan Metzmacher2021-07-151-0/+4
* libcli/smb: add SMB2_SIGNING_CAPABILITIES related defines to smb2_constants.hStefan Metzmacher2021-07-151-0/+3
* libcli/smb: add SMB2_RDMA_TRANSFORM_CAPABILITIES related defines to smb2_cons...Stefan Metzmacher2021-07-151-0/+6
* libcli/smb: add SMB2_TRANSPORT_CAPABILITIES related defines to smb2_constants.hStefan Metzmacher2021-07-151-0/+4
* lib/param: offer aes-256-{gcm,ccm} encryption by defaultStefan Metzmacher2021-07-153-7/+7
* libcli/smb: add aes-256-{gcm,ccm} support to smb2_signing_[en|de]crypt_pdu()Stefan Metzmacher2021-07-155-3/+42
* s3:smbd: let 'server smb3 encryption algorithms' disable aes-128-ccm for SMB3_0*Stefan Metzmacher2021-07-151-0/+11
* libcli/smb: add smb311_capabilities_check() helperStefan Metzmacher2021-07-152-0/+59
* libcli/smb: let 'client smb3 encryption algorithms' disable aes-128-ccm for S...Stefan Metzmacher2021-07-151-0/+29
* s3:smbd: make use of 'server smb3 encryption algorithms'Stefan Metzmacher2021-07-151-9/+3
* s4:param: make use of 'client smb3 encryption algorithms'Stefan Metzmacher2021-07-151-9/+2
* s3:libsmb: make use of 'client smb3 encryption algorithms'Stefan Metzmacher2021-07-151-9/+3
* libcli/smb: add helpers to parse client/server smb3 encryption algorithms int...Stefan Metzmacher2021-07-152-0/+105
* docs-xml: add "client/server smb3 encryption algorithms" optionsStefan Metzmacher2021-07-155-0/+56
* smb2_negprot: make use of struct smb311_capabilities.encryptionStefan Metzmacher2021-07-151-12/+29
* WHATNEW: document "server multi channel support" changeStefan Metzmacher2021-07-151-0/+8
* lib/param: enable "server multi channel support" by default on Linux and FreeBSDStefan Metzmacher2021-07-154-5/+16
* lib/param: add lpcfg_parm_is_unspecified() helperStefan Metzmacher2021-07-152-0/+11
* s3:smbd: fallback to smb2srv_session_lookup_global() for session setups with ...Stefan Metzmacher2021-07-152-14/+43
* s3:smbd: remove dead code from smbd_smb2_request_dispatch()Stefan Metzmacher2021-07-151-12/+0
* s3:smbd: make sure smbXsrv_session_update() doesn't segfault with table == NULLStefan Metzmacher2021-07-151-0/+7
* s3:smbd: fix a NULL pointer deference caused by smb2srv_update_crypto_flags()Stefan Metzmacher2021-07-152-22/+14
* s3:smbd: let smb2srv_session_lookup_global() clear the signing/encryption_flagsStefan Metzmacher2021-07-152-0/+13