diff options
author | Stefan Metzmacher <metze@samba.org> | 2012-02-27 11:19:22 +0100 |
---|---|---|
committer | Stefan Metzmacher <metze@samba.org> | 2012-02-29 05:49:11 +0100 |
commit | 2fced53cfe768b15791208331dea5a9e91ac9567 (patch) | |
tree | 11b13540da7a5259482d0e105e83a2e604ea5467 /source3/torture/test_smb2.c | |
parent | 670ea3e3a35e97ce34f60b6a1f0aff8bfede5353 (diff) | |
download | samba-2fced53cfe768b15791208331dea5a9e91ac9567.tar.gz samba-2fced53cfe768b15791208331dea5a9e91ac9567.tar.bz2 samba-2fced53cfe768b15791208331dea5a9e91ac9567.zip |
s3:torture/test_smb2: do a reauth over multiple channels in SMB2-MULTI-CHANNEL
metze
Diffstat (limited to 'source3/torture/test_smb2.c')
-rw-r--r-- | source3/torture/test_smb2.c | 100 |
1 files changed, 100 insertions, 0 deletions
diff --git a/source3/torture/test_smb2.c b/source3/torture/test_smb2.c index 017bc92644..96fc9cfe8b 100644 --- a/source3/torture/test_smb2.c +++ b/source3/torture/test_smb2.c @@ -1158,6 +1158,106 @@ bool run_smb2_multi_channel(int dummy) return false; } + status = auth_generic_client_prepare(talloc_tos(), &auth_generic_state); + if (!NT_STATUS_IS_OK(status)) { + printf("auth_generic_client_prepare returned %s\n", nt_errstr(status)); + return false; + } + + gensec_want_feature(auth_generic_state->gensec_security, + GENSEC_FEATURE_SESSION_KEY); + status = auth_generic_set_username(auth_generic_state, username); + if (!NT_STATUS_IS_OK(status)) { + printf("auth_generic_set_username returned %s\n", nt_errstr(status)); + return false; + } + + status = auth_generic_set_domain(auth_generic_state, workgroup); + if (!NT_STATUS_IS_OK(status)) { + printf("auth_generic_set_domain returned %s\n", nt_errstr(status)); + return false; + } + + status = auth_generic_set_password(auth_generic_state, password); + if (!NT_STATUS_IS_OK(status)) { + printf("auth_generic_set_password returned %s\n", nt_errstr(status)); + return false; + } + + status = auth_generic_client_start(auth_generic_state, GENSEC_OID_NTLMSSP); + if (!NT_STATUS_IS_OK(status)) { + printf("auth_generic_client_start returned %s\n", nt_errstr(status)); + return false; + } + + status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, data_blob_null, &in_blob); + if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { + printf("gensec_update returned %s\n", nt_errstr(status)); + return false; + } + + subreq = smb2cli_session_setup_send(talloc_tos(), ev, + cli3->conn, + cli3->timeout, + cli3->smb2.session, + 0x0, /* in_flags */ + SMB2_CAP_DFS, /* in_capabilities */ + 0, /* in_channel */ + 0, /* in_previous_session_id */ + &in_blob); /* in_security_buffer */ + if (subreq == NULL) { + printf("smb2cli_session_setup_send() returned NULL\n"); + return false; + } + + ok = tevent_req_poll(subreq, ev); + if (!ok) { + printf("tevent_req_poll() returned false\n"); + return false; + } + + status = smb2cli_session_setup_recv(subreq, talloc_tos(), + NULL, &out_blob); + if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { + printf("smb2cli_session_setup_recv returned %s\n", + nt_errstr(status)); + return false; + } + + status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, out_blob, &in_blob); + if (!NT_STATUS_IS_OK(status)) { + printf("auth_generic_update returned %s\n", nt_errstr(status)); + return false; + } + + subreq = smb2cli_session_setup_send(talloc_tos(), ev, + cli2->conn, + cli2->timeout, + cli2->smb2.session, + 0x0, /* in_flags */ + SMB2_CAP_DFS, /* in_capabilities */ + 0, /* in_channel */ + 0, /* in_previous_session_id */ + &in_blob); /* in_security_buffer */ + if (subreq == NULL) { + printf("smb2cli_session_setup_send() returned NULL\n"); + return false; + } + + ok = tevent_req_poll(subreq, ev); + if (!ok) { + printf("tevent_req_poll() returned false\n"); + return false; + } + + status = smb2cli_session_setup_recv(subreq, talloc_tos(), + &recv_iov, &out_blob); + if (!NT_STATUS_IS_OK(status)) { + printf("smb2cli_session_setup_recv returned %s\n", + nt_errstr(status)); + return false; + } + status = smb2cli_close(cli3, 0, fid_persistent, fid_volatile); if (!NT_STATUS_IS_OK(status)) { printf("smb2cli_close returned %s\n", nt_errstr(status)); |