summaryrefslogtreecommitdiff
path: root/source4/torture
diff options
context:
space:
mode:
Diffstat (limited to 'source4/torture')
-rw-r--r--source4/torture/rpc/netlogon.c44
1 files changed, 22 insertions, 22 deletions
diff --git a/source4/torture/rpc/netlogon.c b/source4/torture/rpc/netlogon.c
index 55d60871b6..c334651d46 100644
--- a/source4/torture/rpc/netlogon.c
+++ b/source4/torture/rpc/netlogon.c
@@ -377,58 +377,58 @@ static NTSTATUS check_samlogon(struct samlogon_state *samlogon_state,
if (r->in.validation_level == 2) {
static const char zeros[16];
- if (memcmp(r->out.validation.sam2->key.key, zeros,
- sizeof(r->out.validation.sam2->key.key)) != 0) {
+ if (memcmp(r->out.validation.sam2->base.key.key, zeros,
+ sizeof(r->out.validation.sam2->base.key.key)) != 0) {
creds_arcfour_crypt(&samlogon_state->creds,
- r->out.validation.sam2->key.key,
- sizeof(r->out.validation.sam2->key.key));
+ r->out.validation.sam2->base.key.key,
+ sizeof(r->out.validation.sam2->base.key.key));
}
if (user_session_key) {
- memcpy(user_session_key, r->out.validation.sam2->key.key, 16);
+ memcpy(user_session_key, r->out.validation.sam2->base.key.key, 16);
}
- if (memcmp(r->out.validation.sam2->LMSessKey.key, zeros,
- sizeof(r->out.validation.sam2->LMSessKey.key)) != 0) {
+ if (memcmp(r->out.validation.sam2->base.LMSessKey.key, zeros,
+ sizeof(r->out.validation.sam2->base.LMSessKey.key)) != 0) {
creds_arcfour_crypt(&samlogon_state->creds,
- r->out.validation.sam2->LMSessKey.key,
- sizeof(r->out.validation.sam2->LMSessKey.key));
+ r->out.validation.sam2->base.LMSessKey.key,
+ sizeof(r->out.validation.sam2->base.LMSessKey.key));
}
if (lm_key) {
- memcpy(lm_key, r->out.validation.sam2->LMSessKey.key, 8);
+ memcpy(lm_key, r->out.validation.sam2->base.LMSessKey.key, 8);
}
} else if (r->in.validation_level == 3) {
static const char zeros[16];
- if (memcmp(r->out.validation.sam3->key.key, zeros,
- sizeof(r->out.validation.sam3->key.key)) != 0) {
+ if (memcmp(r->out.validation.sam3->base.key.key, zeros,
+ sizeof(r->out.validation.sam3->base.key.key)) != 0) {
creds_arcfour_crypt(&samlogon_state->creds,
- r->out.validation.sam3->key.key,
- sizeof(r->out.validation.sam3->key.key));
+ r->out.validation.sam3->base.key.key,
+ sizeof(r->out.validation.sam3->base.key.key));
}
if (user_session_key) {
- memcpy(user_session_key, r->out.validation.sam3->key.key, 16);
+ memcpy(user_session_key, r->out.validation.sam3->base.key.key, 16);
}
- if (memcmp(r->out.validation.sam3->LMSessKey.key, zeros,
- sizeof(r->out.validation.sam3->LMSessKey.key)) != 0) {
+ if (memcmp(r->out.validation.sam3->base.LMSessKey.key, zeros,
+ sizeof(r->out.validation.sam3->base.LMSessKey.key)) != 0) {
creds_arcfour_crypt(&samlogon_state->creds,
- r->out.validation.sam3->LMSessKey.key,
- sizeof(r->out.validation.sam3->LMSessKey.key));
+ r->out.validation.sam3->base.LMSessKey.key,
+ sizeof(r->out.validation.sam3->base.LMSessKey.key));
}
if (lm_key) {
- memcpy(lm_key, r->out.validation.sam3->LMSessKey.key, 8);
+ memcpy(lm_key, r->out.validation.sam3->base.LMSessKey.key, 8);
}
} else if (r->in.validation_level == 6) {
/* they aren't encrypted! */
if (user_session_key) {
- memcpy(user_session_key, r->out.validation.sam6->key.key, 16);
+ memcpy(user_session_key, r->out.validation.sam6->base.key.key, 16);
}
if (lm_key) {
- memcpy(lm_key, r->out.validation.sam6->LMSessKey.key, 8);
+ memcpy(lm_key, r->out.validation.sam6->base.LMSessKey.key, 8);
}
}
}