mirror of
https://github.com/samba-team/samba.git
synced 2025-03-27 22:50:26 +03:00
s4:torture: the backupkey tests need to use ncacn_np: for LSA calls
Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Günther Deschner <gd@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
parent
0400f301e3
commit
c793b23ddb
@ -1770,8 +1770,10 @@ static bool test_ServerWrap_encrypt_decrypt_manual(struct torture_context *tctx,
|
||||
struct bkrp_server_side_wrapped *server_side_wrapped,
|
||||
enum test_wrong wrong)
|
||||
{
|
||||
struct dcerpc_pipe *lsa_p;
|
||||
struct dcerpc_binding_handle *lsa_b;
|
||||
char *lsa_binding_string = NULL;
|
||||
struct dcerpc_binding *lsa_binding = NULL;
|
||||
struct dcerpc_pipe *lsa_p = NULL;
|
||||
struct dcerpc_binding_handle *lsa_b = NULL;
|
||||
struct lsa_OpenSecret r_secret;
|
||||
struct lsa_QuerySecret r_query_secret;
|
||||
struct policy_handle *handle, sec_handle;
|
||||
@ -1800,8 +1802,19 @@ static bool test_ServerWrap_encrypt_decrypt_manual(struct torture_context *tctx,
|
||||
|
||||
/* Now read BCKUPKEY_P and prove we can do a matching decrypt and encrypt */
|
||||
|
||||
/* lsa_OpenSecret only works with ncacn_np and AUTH_LEVEL_NONE */
|
||||
lsa_binding_string = talloc_asprintf(tctx, "ncacn_np:%s",
|
||||
torture_setting_string(tctx, "host", NULL));
|
||||
torture_assert(tctx, lsa_binding_string != NULL, "lsa_binding_string");
|
||||
|
||||
torture_assert_ntstatus_ok(tctx,
|
||||
torture_rpc_connection(tctx, &lsa_p, &ndr_table_lsarpc),
|
||||
dcerpc_parse_binding(tctx, lsa_binding_string, &lsa_binding),
|
||||
"Failed to parse dcerpc binding");
|
||||
|
||||
torture_assert_ntstatus_ok(tctx,
|
||||
dcerpc_pipe_connect_b(tctx, &lsa_p,
|
||||
lsa_binding, &ndr_table_lsarpc,
|
||||
cmdline_credentials, tctx->ev, tctx->lp_ctx),
|
||||
"Opening LSA pipe");
|
||||
lsa_b = lsa_p->binding_handle;
|
||||
|
||||
|
@ -1548,8 +1548,10 @@ static bool test_ServerWrap_encrypt_decrypt_manual(struct torture_context *tctx,
|
||||
struct bkrp_server_side_wrapped *server_side_wrapped,
|
||||
enum test_wrong wrong)
|
||||
{
|
||||
struct dcerpc_pipe *lsa_p;
|
||||
struct dcerpc_binding_handle *lsa_b;
|
||||
char *lsa_binding_string = NULL;
|
||||
struct dcerpc_binding *lsa_binding = NULL;
|
||||
struct dcerpc_pipe *lsa_p = NULL;
|
||||
struct dcerpc_binding_handle *lsa_b = NULL;
|
||||
struct lsa_OpenSecret r_secret;
|
||||
struct lsa_QuerySecret r_query_secret;
|
||||
struct policy_handle *handle, sec_handle;
|
||||
@ -1575,8 +1577,19 @@ static bool test_ServerWrap_encrypt_decrypt_manual(struct torture_context *tctx,
|
||||
|
||||
/* Now read BCKUPKEY_P and prove we can do a matching decrypt and encrypt */
|
||||
|
||||
/* lsa_OpenSecret only works with ncacn_np and AUTH_LEVEL_NONE */
|
||||
lsa_binding_string = talloc_asprintf(tctx, "ncacn_np:%s",
|
||||
torture_setting_string(tctx, "host", NULL));
|
||||
torture_assert(tctx, lsa_binding_string != NULL, "lsa_binding_string");
|
||||
|
||||
torture_assert_ntstatus_ok(tctx,
|
||||
torture_rpc_connection(tctx, &lsa_p, &ndr_table_lsarpc),
|
||||
dcerpc_parse_binding(tctx, lsa_binding_string, &lsa_binding),
|
||||
"Failed to parse dcerpc binding");
|
||||
|
||||
torture_assert_ntstatus_ok(tctx,
|
||||
dcerpc_pipe_connect_b(tctx, &lsa_p,
|
||||
lsa_binding, &ndr_table_lsarpc,
|
||||
cmdline_credentials, tctx->ev, tctx->lp_ctx),
|
||||
"Opening LSA pipe");
|
||||
lsa_b = lsa_p->binding_handle;
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user