From 59c8f48f0dfc0e4d42623fe1595cd9773ac5d15f Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Sun, 9 May 2004 13:07:23 +0000 Subject: r611: Fix breakage from my last commit: Now that all session keys are DATA_BLOBs, fix the callers. This assumes some things about the behaviour of certain crypto algorithms, without the ability to test it on session keys != 16 bytes in length. We will just need to retest when we get the KRB5 support in (DES keys are 8 bytes). Andrew Bartlett (This used to be commit e4355a7ec1eba92bdecef8cc478272897276dbae) --- source4/torture/rpc/lsa.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'source4/torture') diff --git a/source4/torture/rpc/lsa.c b/source4/torture/rpc/lsa.c index 0b5f825ac2..679e1dbac8 100644 --- a/source4/torture/rpc/lsa.c +++ b/source4/torture/rpc/lsa.c @@ -334,7 +334,7 @@ static BOOL test_CreateSecret(struct dcerpc_pipe *p, struct lsa_DATA_BUF_PTR bufp1; DATA_BLOB enc_key; BOOL ret = True; - uint8 session_key[16]; + DATA_BLOB session_key; NTTIME old_mtime, new_mtime; DATA_BLOB blob1, blob2; const char *secret1 = "abcdef12345699qwerty"; @@ -370,13 +370,13 @@ static BOOL test_CreateSecret(struct dcerpc_pipe *p, ret = False; } - status = dcerpc_fetch_session_key(p, session_key); + status = dcerpc_fetch_session_key(p, &session_key); if (!NT_STATUS_IS_OK(status)) { printf("dcerpc_fetch_session_key failed - %s\n", nt_errstr(status)); ret = False; } - enc_key = sess_encrypt_string(secret1, session_key); + enc_key = sess_encrypt_string(secret1, &session_key); r3.in.handle = &sec_handle; r3.in.new_val = &buf1; @@ -418,7 +418,7 @@ static BOOL test_CreateSecret(struct dcerpc_pipe *p, blob2 = data_blob(NULL, blob1.length); - secret2 = sess_decrypt_string(&blob1, session_key); + secret2 = sess_decrypt_string(&blob1, &session_key); printf("returned secret '%s'\n", secret2); -- cgit