diff options
author | Andrew Bartlett <abartlet@samba.org> | 2005-03-24 06:30:38 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 13:11:16 -0500 |
commit | a19d002ceea84b0b7350b1b3ebf181a03ac5b494 (patch) | |
tree | 3d300530d2c61c0f13202781530d0f575fed636f /source4/torture/rpc | |
parent | 21d9419b1e4d6ef113a26382315ad96b3509d156 (diff) | |
download | samba-a19d002ceea84b0b7350b1b3ebf181a03ac5b494.tar.gz samba-a19d002ceea84b0b7350b1b3ebf181a03ac5b494.tar.bz2 samba-a19d002ceea84b0b7350b1b3ebf181a03ac5b494.zip |
r6032: Fix up SetServerPassword2 on NETLOGON for [bigendian]. Clearly nobody
has the patience to run test_w2k3.sh to completion :-)
It looks to me that the Windows server runs the RC4 over the C struct,
not the NDR data.
Andrew Bartlett
(This used to be commit c324d974134c35b4c50c91d5a932a63c78b67046)
Diffstat (limited to 'source4/torture/rpc')
-rw-r--r-- | source4/torture/rpc/netlogon.c | 58 |
1 files changed, 17 insertions, 41 deletions
diff --git a/source4/torture/rpc/netlogon.c b/source4/torture/rpc/netlogon.c index c12560ad53..72d039fc42 100644 --- a/source4/torture/rpc/netlogon.c +++ b/source4/torture/rpc/netlogon.c @@ -294,37 +294,6 @@ static BOOL test_SetPassword(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) r.in.secure_channel_type = SEC_CHAN_BDC; r.in.computer_name = TEST_MACHINE_NAME; - password = ""; - E_md4hash(password, r.in.new_password.hash); - - creds_des_encrypt(creds, &r.in.new_password); - /* by changing the machine password to "" - * we check if the server uses password restrictions - * for ServerPasswordSet2 - * (win2k3 accepts "") - */ - printf("Testing a second ServerPasswordSet on machine account\n"); - printf("Changing machine account password to '%s'\n", password); - - creds_client_authenticator(creds, &r.in.credential); - - status = dcerpc_netr_ServerPasswordSet(p, mem_ctx, &r); - if (!NT_STATUS_IS_OK(status)) { - printf("ServerPasswordSet (2) - %s\n", nt_errstr(status)); - return False; - } - - if (!creds_client_check(creds, &r.out.return_authenticator.cred)) { - printf("Credential chaining failed\n"); - } - - machine_password = password; - - if (!test_SetupCredentials(p, mem_ctx, TEST_MACHINE_NAME, machine_password, &creds)) { - printf("ServerPasswordSet failed to actually change the password\n"); - return False; - } - password = generate_random_str(mem_ctx, 8); E_md4hash(password, r.in.new_password.hash); @@ -383,6 +352,7 @@ static BOOL test_SetPassword2(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) struct netr_ServerPasswordSet2 r; const char *password; struct creds_CredentialState *creds; + struct samr_CryptPassword password_buf; if (!test_SetupCredentials(p, mem_ctx, TEST_MACHINE_NAME, machine_password, &creds)) { @@ -394,23 +364,26 @@ static BOOL test_SetPassword2(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) r.in.secure_channel_type = SEC_CHAN_BDC; r.in.computer_name = TEST_MACHINE_NAME; - password = ""; - encode_pw_buffer(r.in.new_password.data, password, STR_UNICODE); - creds_arcfour_crypt(creds, r.in.new_password.data, 516); + password = generate_random_str(mem_ctx, 8); + encode_pw_buffer(password_buf.data, password, STR_UNICODE); + creds_arcfour_crypt(creds, password_buf.data, 516); + + memcpy(r.in.new_password.data, password_buf.data, 512); + r.in.new_password.length = IVAL(password_buf.data, 512); /* by changing the machine password to "" * we check if the server uses password restrictions * for ServerPasswordSet2 * (win2k3 accepts "") */ - printf("Testing a second ServerPasswordSet2 on machine account\n"); + printf("Testing ServerPasswordSet2 on machine account\n"); printf("Changing machine account password to '%s'\n", password); creds_client_authenticator(creds, &r.in.credential); status = dcerpc_netr_ServerPasswordSet2(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { - printf("ServerPasswordSet (2) - %s\n", nt_errstr(status)); + printf("ServerPasswordSet2 - %s\n", nt_errstr(status)); return False; } @@ -427,17 +400,20 @@ static BOOL test_SetPassword2(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) /* now try a random password */ password = generate_random_str(mem_ctx, 8); - encode_pw_buffer(r.in.new_password.data, password, STR_UNICODE); - creds_arcfour_crypt(creds, r.in.new_password.data, 516); + encode_pw_buffer(password_buf.data, password, STR_UNICODE); + creds_arcfour_crypt(creds, password_buf.data, 516); - printf("Testing ServerPasswordSet2 on machine account\n"); + memcpy(r.in.new_password.data, password_buf.data, 512); + r.in.new_password.length = IVAL(password_buf.data, 512); + + printf("Testing second ServerPasswordSet2 on machine account\n"); printf("Changing machine account password to '%s'\n", password); creds_client_authenticator(creds, &r.in.credential); status = dcerpc_netr_ServerPasswordSet2(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { - printf("ServerPasswordSet2 - %s\n", nt_errstr(status)); + printf("ServerPasswordSet2 (2) - %s\n", nt_errstr(status)); return False; } @@ -456,7 +432,7 @@ static BOOL test_SetPassword2(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) status = dcerpc_netr_ServerPasswordSet2(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { - printf("ServerPasswordSet (2) - %s\n", nt_errstr(status)); + printf("ServerPasswordSet (3) - %s\n", nt_errstr(status)); return False; } |