summaryrefslogtreecommitdiff
path: root/source4/torture/rpc/schannel.c
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2013-08-02 10:08:54 +0200
committerStefan Metzmacher <metze@samba.org>2013-08-10 09:18:59 +0200
commit2ea3a24dced0814100e352bbbca124011be73602 (patch)
tree8a1c34c43a72d296d20676b36bc0854489377683 /source4/torture/rpc/schannel.c
parentc0144273af8f0956a05d102113c40cec77069f7a (diff)
downloadsamba-2ea3a24dced0814100e352bbbca124011be73602.tar.gz
samba-2ea3a24dced0814100e352bbbca124011be73602.tar.bz2
samba-2ea3a24dced0814100e352bbbca124011be73602.zip
s4:torture: avoid usage of dcerpc_schannel_creds()
We use cli_credentials_get_netlogon_creds() which returns the same value. dcerpc_schannel_creds() is a layer violation. Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
Diffstat (limited to 'source4/torture/rpc/schannel.c')
-rw-r--r--source4/torture/rpc/schannel.c6
1 files changed, 2 insertions, 4 deletions
diff --git a/source4/torture/rpc/schannel.c b/source4/torture/rpc/schannel.c
index 8203749edb..0098dcf648 100644
--- a/source4/torture/rpc/schannel.c
+++ b/source4/torture/rpc/schannel.c
@@ -26,14 +26,12 @@
#include "auth/credentials/credentials.h"
#include "torture/rpc/torture_rpc.h"
#include "lib/cmdline/popt_common.h"
-#include "auth/gensec/schannel.h"
#include "../libcli/auth/schannel.h"
#include "libcli/auth/libcli_auth.h"
#include "libcli/security/security.h"
#include "system/filesys.h"
#include "param/param.h"
#include "librpc/rpc/dcerpc_proto.h"
-#include "auth/gensec/gensec.h"
#include "libcli/composite/composite.h"
#include "lib/events/events.h"
@@ -413,8 +411,8 @@ static bool test_schannel(struct torture_context *tctx,
torture_assert_ntstatus_ok(tctx, status, "bind auth");
- status = dcerpc_schannel_creds(p_netlogon->conn->security_state.generic_state, tctx, &creds);
- torture_assert_ntstatus_ok(tctx, status, "schannel creds");
+ creds = cli_credentials_get_netlogon_creds(credentials);
+ torture_assert(tctx, (creds != NULL), "schannel creds");
/* checks the capabilities */
torture_assert(tctx, test_netlogon_capabilities(p_netlogon, tctx, credentials, creds),