| Commit message (Expand) | Author | Age | Files | Lines |
* | VERSION: Disable GIT_SNAPSHOT for the 4.15.13 release.samba-4.15.13v4-15-stable | Jule Anger | 2022-12-15 | 1 | -1/+1 |
* | WHATSNEW: Add release notes for Samba 4.15.13. | Jule Anger | 2022-12-15 | 1 | -2/+150 |
* | kdc: avoid re-encoding KDC-REQ-BODY | Luke Howard | 2022-12-15 | 4 | -38/+5 |
* | tests/krb5: Add test requesting a TGT expiring post-2038 | Joseph Sutton | 2022-12-14 | 1 | -2/+11 |
* | tests/krb5: Add test requesting a service ticket expiring post-2038 | Joseph Sutton | 2022-12-14 | 2 | -0/+16 |
* | CVE-2022-37966 python:/tests/krb5: call sys.path.insert(0, "bin/python") befo... | Stefan Metzmacher | 2022-12-14 | 16 | -48/+55 |
* | CVE-2022-37966 samba-tool: add 'domain trust modify' command | Stefan Metzmacher | 2022-12-14 | 2 | -0/+126 |
* | CVE-2022-37966 s4:kdc: apply restrictions of "kdc supported enctypes" | Stefan Metzmacher | 2022-12-14 | 1 | -2/+10 |
* | CVE-2022-37966 param: Add support for new option "kdc supported enctypes" | Stefan Metzmacher | 2022-12-14 | 2 | -0/+109 |
* | CVE-2022-37966 param: let "kdc default domain supportedenctypes = 0" mean the... | Stefan Metzmacher | 2022-12-14 | 6 | -10/+13 |
* | CVE-2022-37966 param: don't explicitly initialize "kdc force enable rc4 weak ... | Stefan Metzmacher | 2022-12-14 | 2 | -5/+0 |
* | CVE-2022-37966 s4:kdc: announce PA-SUPPORTED-ETYPES like windows. | Stefan Metzmacher | 2022-12-14 | 5 | -3050/+768 |
* | CVE-2022-37966 python:tests/krb5: test much more etype combinations | Stefan Metzmacher | 2022-12-14 | 3 | -515/+4046 |
* | CVE-2022-37966 python:tests/krb5: add better PADATA_SUPPORTED_ETYPES assert m... | Stefan Metzmacher | 2022-12-14 | 1 | -2/+2 |
* | CVE-2022-37966 python:tests/krb5: add 'force_nt4_hash' for account creation o... | Stefan Metzmacher | 2022-12-14 | 1 | -6/+32 |
* | CVE-2022-37966 python:tests/krb5: ignore empty supplementalCredentials attrib... | Stefan Metzmacher | 2022-12-14 | 1 | -0/+2 |
* | CVE-2022-37966 python:tests/krb5: allow ticket/supported_etypes to be passed ... | Stefan Metzmacher | 2022-12-14 | 1 | -3/+8 |
* | CVE-2022-37966 python:tests/krb5: fix some tests running against Windows 2022 | Stefan Metzmacher | 2022-12-14 | 3 | -8/+33 |
* | CVE-2022-37966 s4:libnet: allow python bindings to force setting an nthash vi... | Stefan Metzmacher | 2022-12-14 | 1 | -3/+15 |
* | CVE-2022-37966 s4:libnet: add support LIBNET_SET_PASSWORD_SAMR_HANDLE_18 to s... | Stefan Metzmacher | 2022-12-14 | 2 | -0/+76 |
* | CVE-2022-37966 s4:libnet: initialize libnet_SetPassword() arguments explicitl... | Stefan Metzmacher | 2022-12-14 | 2 | -2/+4 |
* | CVE-2022-37966 drsuapi.idl: add trustedDomain related ATTID values | Stefan Metzmacher | 2022-12-14 | 1 | -0/+9 |
* | CVE-2022-37966 s4:kdc: use the strongest possible keys | Stefan Metzmacher | 2022-12-14 | 1 | -15/+8 |
* | CVE-2022-37966 s4:pydsdb: add ENC_HMAC_SHA1_96_AES256_SK | Stefan Metzmacher | 2022-12-14 | 1 | -0/+1 |
* | CVE-2022-37966 s3:net_ads: let 'net ads enctypes list' pretty print AES256-SK... | Stefan Metzmacher | 2022-12-14 | 1 | -0/+6 |
* | CVE-2022-37966 s3:net_ads: no longer reference des encryption types | Stefan Metzmacher | 2022-12-14 | 1 | -1/+2 |
* | CVE-2022-37966 s3:libnet: no longer reference des encryption types | Stefan Metzmacher | 2022-12-14 | 1 | -3/+2 |
* | CVE-2022-37966 s3:libads: no longer reference des encryption types | Stefan Metzmacher | 2022-12-14 | 1 | -1/+1 |
* | CVE-2022-37966 lib/krb5_wrap: no longer reference des encryption types | Stefan Metzmacher | 2022-12-14 | 1 | -2/+0 |
* | CVE-2022-37966 s3:net_ads: remove unused ifdef HAVE_ENCTYPE_AES* | Stefan Metzmacher | 2022-12-14 | 1 | -4/+0 |
* | CVE-2022-37966 s3:libnet: remove unused ifdef HAVE_ENCTYPE_AES* | Stefan Metzmacher | 2022-12-14 | 1 | -4/+0 |
* | CVE-2022-37966 s3:libads: remove unused ifdef HAVE_ENCTYPE_AES* | Stefan Metzmacher | 2022-12-14 | 2 | -8/+0 |
* | CVE-2022-37966 lib/krb5_wrap: remove unused ifdef HAVE_ENCTYPE_AES* | Stefan Metzmacher | 2022-12-14 | 1 | -4/+0 |
* | CVE-2022-37966 system_mitkrb5: require support for aes enctypes | Stefan Metzmacher | 2022-12-14 | 1 | -2/+2 |
* | CVE-2022-37966 wafsamba: add support for CHECK_VARIABLE(mandatory=True) | Stefan Metzmacher | 2022-12-14 | 1 | -1/+3 |
* | CVE-2022-37966 kdc: Assume trust objects support AES by default | Joseph Sutton | 2022-12-14 | 2 | -7/+2 |
* | CVE-2022-37966 kdc: Implement new Kerberos session key behaviour since ENC_HM... | Andrew Bartlett | 2022-12-14 | 11 | -622/+289 |
* | CVE-2022-37966 s4:torture: Expect referral ticket enc-part encrypted with AES... | Joseph Sutton | 2022-12-14 | 2 | -19/+37 |
* | CVE-2022-37966 auth/credentials: Allow specifying password to cli_credentials... | Joseph Sutton | 2022-12-14 | 2 | -6/+2 |
* | CVE-2022-37966 auth/credentials: Add cli_credentials_get_aes256_key() | Joseph Sutton | 2022-12-14 | 2 | -0/+70 |
* | CVE-2022-37966 Fix enctype selection issues for PAC and other authz-data sign... | Nicolas Williams | 2022-12-14 | 1 | -24/+33 |
* | CVE-2022-37966 selftest: Run S4U tests against FL2003 DC | Joseph Sutton | 2022-12-14 | 3 | -6/+71 |
* | CVE-2022-37966 selftest: Add tests for Kerberos session key behaviour since E... | Joseph Sutton | 2022-12-14 | 10 | -141/+1549 |
* | CVE-2022-37966 samba-tool: Declare explicitly RC4 support of trust objects | Joseph Sutton | 2022-12-14 | 1 | -2/+5 |
* | CVE-2022-37966 samba-tool: Fix 'domain trust create' documentation | Joseph Sutton | 2022-12-14 | 1 | -1/+1 |
* | CVE-2022-37966 third_party/heimdal: Fix error message typo | Joseph Sutton | 2022-12-14 | 1 | -1/+1 |
* | CVE-2022-37966 param: Add support for new option "kdc force enable rc4 weak s... | Andrew Bartlett | 2022-12-14 | 3 | -0/+29 |
* | CVE-2022-37966 param: Add support for new option "kdc default domain supporte... | Joseph Sutton | 2022-12-14 | 4 | -0/+125 |
* | CVE-2022-37967 Add new PAC checksum | Joseph Sutton | 2022-12-14 | 14 | -54/+413 |
* | CVE-2022-37966 HEIMDAL: Look up the server keys to combine with clients etype... | Andrew Bartlett | 2022-12-14 | 2 | -6/+1 |