From 06e650a4429a54f7839eeb68c00220ac8b8b58ed Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Wed, 27 Jul 2005 00:25:17 +0000 Subject: r8792: Clarify comments (This used to be commit 6174cf826fac8288b6604d9140b741aab2156cb3) --- source4/torture/auth/pac.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) (limited to 'source4/torture') diff --git a/source4/torture/auth/pac.c b/source4/torture/auth/pac.c index 21c3119e31..59bf008970 100644 --- a/source4/torture/auth/pac.c +++ b/source4/torture/auth/pac.c @@ -215,6 +215,9 @@ static BOOL torture_pac_saved_check(void) return False; } + /* The krbtgt key in use when the above PAC was generated. + * This is an arcfour-hmac-md5 key, extracted with our 'net + * samdump' tool. */ krbtgt_bytes = smbpasswd_gethexpwd(mem_ctx, "B286757148AF7FD252C53603A150B7E7"); if (!krbtgt_bytes) { DEBUG(0, ("Could not interpret krbtgt key")); @@ -296,10 +299,9 @@ static BOOL torture_pac_saved_check(void) dump_data(10,validate_blob.data,validate_blob.length); - /* all we can check is the length of the buffers, - * to check that the alignment and padding is ok, - * we can't compare the bytes, because we use a different algorithm - * to create the pointer values + /* compare both the length and the data bytes after a + * pull/push cycle. This ensures we use the exact same + * pointer, padding etc algorithms as win2k3. */ if (tmp_blob.length != validate_blob.length) { DEBUG(0, ("PAC push failed: orignial buffer length[%u] != created buffer length[%u]\n", -- cgit