1
0
mirror of https://github.com/samba-team/samba.git synced 2025-03-27 22:50:26 +03:00

s4:torture: the backupkey tests need to use ncacn_np: for LSA calls

Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Günther Deschner <gd@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
Stefan Metzmacher 2016-02-29 07:47:39 +01:00
parent 0400f301e3
commit c793b23ddb
2 changed files with 32 additions and 6 deletions

View File

@ -1770,8 +1770,10 @@ static bool test_ServerWrap_encrypt_decrypt_manual(struct torture_context *tctx,
struct bkrp_server_side_wrapped *server_side_wrapped,
enum test_wrong wrong)
{
struct dcerpc_pipe *lsa_p;
struct dcerpc_binding_handle *lsa_b;
char *lsa_binding_string = NULL;
struct dcerpc_binding *lsa_binding = NULL;
struct dcerpc_pipe *lsa_p = NULL;
struct dcerpc_binding_handle *lsa_b = NULL;
struct lsa_OpenSecret r_secret;
struct lsa_QuerySecret r_query_secret;
struct policy_handle *handle, sec_handle;
@ -1800,8 +1802,19 @@ static bool test_ServerWrap_encrypt_decrypt_manual(struct torture_context *tctx,
/* Now read BCKUPKEY_P and prove we can do a matching decrypt and encrypt */
/* lsa_OpenSecret only works with ncacn_np and AUTH_LEVEL_NONE */
lsa_binding_string = talloc_asprintf(tctx, "ncacn_np:%s",
torture_setting_string(tctx, "host", NULL));
torture_assert(tctx, lsa_binding_string != NULL, "lsa_binding_string");
torture_assert_ntstatus_ok(tctx,
torture_rpc_connection(tctx, &lsa_p, &ndr_table_lsarpc),
dcerpc_parse_binding(tctx, lsa_binding_string, &lsa_binding),
"Failed to parse dcerpc binding");
torture_assert_ntstatus_ok(tctx,
dcerpc_pipe_connect_b(tctx, &lsa_p,
lsa_binding, &ndr_table_lsarpc,
cmdline_credentials, tctx->ev, tctx->lp_ctx),
"Opening LSA pipe");
lsa_b = lsa_p->binding_handle;

View File

@ -1548,8 +1548,10 @@ static bool test_ServerWrap_encrypt_decrypt_manual(struct torture_context *tctx,
struct bkrp_server_side_wrapped *server_side_wrapped,
enum test_wrong wrong)
{
struct dcerpc_pipe *lsa_p;
struct dcerpc_binding_handle *lsa_b;
char *lsa_binding_string = NULL;
struct dcerpc_binding *lsa_binding = NULL;
struct dcerpc_pipe *lsa_p = NULL;
struct dcerpc_binding_handle *lsa_b = NULL;
struct lsa_OpenSecret r_secret;
struct lsa_QuerySecret r_query_secret;
struct policy_handle *handle, sec_handle;
@ -1575,8 +1577,19 @@ static bool test_ServerWrap_encrypt_decrypt_manual(struct torture_context *tctx,
/* Now read BCKUPKEY_P and prove we can do a matching decrypt and encrypt */
/* lsa_OpenSecret only works with ncacn_np and AUTH_LEVEL_NONE */
lsa_binding_string = talloc_asprintf(tctx, "ncacn_np:%s",
torture_setting_string(tctx, "host", NULL));
torture_assert(tctx, lsa_binding_string != NULL, "lsa_binding_string");
torture_assert_ntstatus_ok(tctx,
torture_rpc_connection(tctx, &lsa_p, &ndr_table_lsarpc),
dcerpc_parse_binding(tctx, lsa_binding_string, &lsa_binding),
"Failed to parse dcerpc binding");
torture_assert_ntstatus_ok(tctx,
dcerpc_pipe_connect_b(tctx, &lsa_p,
lsa_binding, &ndr_table_lsarpc,
cmdline_credentials, tctx->ev, tctx->lp_ctx),
"Opening LSA pipe");
lsa_b = lsa_p->binding_handle;