From ba864b83fa43062a684204cbaf9bf1b0c2074533 Mon Sep 17 00:00:00 2001 From: Stefan Metzmacher Date: Thu, 2 Aug 2012 08:51:13 +0200 Subject: s4:torture: add support for SMB_EXTENDED_SIGNATURES during SMBtconX metze --- source4/torture/rpc/samba3rpc.c | 7 +++++++ 1 file changed, 7 insertions(+) (limited to 'source4/torture/rpc') diff --git a/source4/torture/rpc/samba3rpc.c b/source4/torture/rpc/samba3rpc.c index a71ae52aca..e2c8b66182 100644 --- a/source4/torture/rpc/samba3rpc.c +++ b/source4/torture/rpc/samba3rpc.c @@ -47,6 +47,7 @@ #include "librpc/rpc/dcerpc.h" #include "librpc/rpc/dcerpc_proto.h" #include "../source3/libsmb/smb2cli.h" +#include "libcli/smb/smbXcli_base.h" /* * This tests a RPC call using an invalid vuid @@ -1728,6 +1729,7 @@ static NTSTATUS secondary_tcon(struct torture_context *tctx, tcon.generic.level = RAW_TCON_TCONX; tcon.tconx.in.flags = TCONX_FLAG_EXTENDED_RESPONSE; + tcon.tconx.in.flags |= TCONX_FLAG_EXTENDED_SIGNATURES; tcon.tconx.in.password = data_blob(NULL, 0); tcon.tconx.in.path = sharename; tcon.tconx.in.device = "?????"; @@ -1741,6 +1743,11 @@ static NTSTATUS secondary_tcon(struct torture_context *tctx, } result->tid = tcon.tconx.out.tid; + + if (tcon.tconx.out.options & SMB_EXTENDED_SIGNATURES) { + smb1cli_session_protect_session_key(result->session->smbXcli); + } + result = talloc_steal(mem_ctx, result); talloc_set_destructor(result, destroy_tree); talloc_free(tmp_ctx); -- cgit