diff options
author | Andrew Bartlett <abartlet@samba.org> | 2005-04-25 12:13:38 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 13:11:40 -0500 |
commit | e7b92b10aab662f0475679387d6e0f3438973318 (patch) | |
tree | 3f73892d6823a9ea66541e7262f229b0d0cd6806 /source4 | |
parent | 4e29d24b4cc63ae243c420284ac68fb8356b8d93 (diff) | |
download | samba-e7b92b10aab662f0475679387d6e0f3438973318.tar.gz samba-e7b92b10aab662f0475679387d6e0f3438973318.tar.bz2 samba-e7b92b10aab662f0475679387d6e0f3438973318.zip |
r6468: Fix LOCAL-NTLMSSP test with new NTLMSSP structure.
Andrew Bartlett
(This used to be commit 8d503fb153c25580c06dd13ca83df47f9e434c7a)
Diffstat (limited to 'source4')
-rw-r--r-- | source4/torture/auth/ntlmssp.c | 27 |
1 files changed, 12 insertions, 15 deletions
diff --git a/source4/torture/auth/ntlmssp.c b/source4/torture/auth/ntlmssp.c index a29f99757c..644d502d99 100644 --- a/source4/torture/auth/ntlmssp.c +++ b/source4/torture/auth/ntlmssp.c @@ -26,7 +26,6 @@ BOOL torture_ntlmssp_self_check(void) { struct gensec_security *gensec_security; - struct ntlmssp_state *ntlmssp_state; struct gensec_ntlmssp_state *gensec_ntlmssp_state; DATA_BLOB data; DATA_BLOB sig, expected_sig; @@ -47,17 +46,16 @@ BOOL torture_ntlmssp_self_check(void) } gensec_ntlmssp_state = gensec_security->private_data; - ntlmssp_state = gensec_ntlmssp_state->ntlmssp_state; - ntlmssp_state->session_key = strhex_to_data_blob("0102030405060708090a0b0c0d0e0f00"); + gensec_ntlmssp_state->session_key = strhex_to_data_blob("0102030405060708090a0b0c0d0e0f00"); dump_data_pw("NTLMSSP session key: \n", - ntlmssp_state->session_key.data, - ntlmssp_state->session_key.length); + gensec_ntlmssp_state->session_key.data, + gensec_ntlmssp_state->session_key.length); - ntlmssp_state->server_use_session_keys = True; - ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_KEY_EXCH | NTLMSSP_NEGOTIATE_NTLM2; + gensec_ntlmssp_state->server_use_session_keys = True; + gensec_ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_KEY_EXCH | NTLMSSP_NEGOTIATE_NTLM2; - if (!NT_STATUS_IS_OK(status = ntlmssp_sign_init(ntlmssp_state))) { + if (!NT_STATUS_IS_OK(status = ntlmssp_sign_init(gensec_ntlmssp_state))) { printf("Failed to sign_init: %s\n", nt_errstr(status)); return False; } @@ -97,17 +95,16 @@ BOOL torture_ntlmssp_self_check(void) } gensec_ntlmssp_state = gensec_security->private_data; - ntlmssp_state = gensec_ntlmssp_state->ntlmssp_state; - ntlmssp_state->session_key = strhex_to_data_blob("0102030405e538b0"); + gensec_ntlmssp_state->session_key = strhex_to_data_blob("0102030405e538b0"); dump_data_pw("NTLMSSP session key: \n", - ntlmssp_state->session_key.data, - ntlmssp_state->session_key.length); + gensec_ntlmssp_state->session_key.data, + gensec_ntlmssp_state->session_key.length); - ntlmssp_state->server_use_session_keys = True; - ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_KEY_EXCH; + gensec_ntlmssp_state->server_use_session_keys = True; + gensec_ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_KEY_EXCH; - if (!NT_STATUS_IS_OK(status = ntlmssp_sign_init(ntlmssp_state))) { + if (!NT_STATUS_IS_OK(status = ntlmssp_sign_init(gensec_ntlmssp_state))) { printf("Failed to sign_init: %s\n", nt_errstr(status)); return False; } |