mirror of
https://github.com/samba-team/samba.git
synced 2024-12-27 03:21:53 +03:00
c9d929af8b
This uses the very helpful conversion functions written for the s3 lsa server and places these in common. Andrew Bartlett
219 lines
6.1 KiB
C
219 lines
6.1 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
Test conversion form struct lsa_TrustDomainInfoAuthInfo to
|
|
struct trustAuthInOutBlob and back
|
|
Copyright (C) Sumit Bose 2011
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "torture/proto.h"
|
|
#include "librpc/gen_ndr/lsa.h"
|
|
#include "libcli/lsarpc/util_lsarpc.h"
|
|
|
|
static bool cmp_TrustDomainInfoBuffer(struct lsa_TrustDomainInfoBuffer a,
|
|
struct lsa_TrustDomainInfoBuffer b)
|
|
{
|
|
if (a.last_update_time != b. last_update_time ||
|
|
a.AuthType != b.AuthType ||
|
|
a.data.size != b.data.size ||
|
|
memcmp(a.data.data, b.data.data, a.data.size) !=0) {
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static bool cmp_auth_info(struct lsa_TrustDomainInfoAuthInfo *a,
|
|
struct lsa_TrustDomainInfoAuthInfo *b)
|
|
{
|
|
size_t c;
|
|
|
|
if (a->incoming_count != b->incoming_count ||
|
|
a->outgoing_count != b->outgoing_count) {
|
|
return false;
|
|
}
|
|
|
|
for (c = 0; c < a->incoming_count; c++) {
|
|
if (!cmp_TrustDomainInfoBuffer(a->incoming_current_auth_info[c],
|
|
b->incoming_current_auth_info[c])) {
|
|
return false;
|
|
}
|
|
|
|
if (a->incoming_previous_auth_info != NULL &&
|
|
b->incoming_previous_auth_info != NULL) {
|
|
if (!cmp_TrustDomainInfoBuffer(a->incoming_previous_auth_info[c],
|
|
b->incoming_previous_auth_info[c])) {
|
|
return false;
|
|
}
|
|
} else if (a->incoming_previous_auth_info == NULL &&
|
|
b->incoming_previous_auth_info == NULL) {
|
|
continue;
|
|
} else {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
for (c = 0; c < a->outgoing_count; c++) {
|
|
if (!cmp_TrustDomainInfoBuffer(a->outgoing_current_auth_info[c],
|
|
b->outgoing_current_auth_info[c])) {
|
|
return false;
|
|
}
|
|
|
|
if (a->outgoing_previous_auth_info != NULL &&
|
|
b->outgoing_previous_auth_info != NULL) {
|
|
if (!cmp_TrustDomainInfoBuffer(a->outgoing_previous_auth_info[c],
|
|
b->outgoing_previous_auth_info[c])) {
|
|
return false;
|
|
}
|
|
} else if (a->outgoing_previous_auth_info == NULL &&
|
|
b->outgoing_previous_auth_info == NULL) {
|
|
continue;
|
|
} else {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static bool covert_and_compare(struct lsa_TrustDomainInfoAuthInfo *auth_info)
|
|
{
|
|
NTSTATUS status;
|
|
TALLOC_CTX *tmp_ctx;
|
|
DATA_BLOB incoming;
|
|
DATA_BLOB outgoing;
|
|
struct lsa_TrustDomainInfoAuthInfo auth_info_out;
|
|
bool result = false;
|
|
|
|
tmp_ctx = talloc_new(NULL);
|
|
if (tmp_ctx == NULL) {
|
|
return false;
|
|
}
|
|
|
|
status = auth_info_2_auth_blob(tmp_ctx, auth_info, &incoming, &outgoing);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
talloc_free(tmp_ctx);
|
|
return false;
|
|
}
|
|
|
|
status = auth_blob_2_auth_info(tmp_ctx, incoming, outgoing,
|
|
&auth_info_out);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
talloc_free(tmp_ctx);
|
|
return false;
|
|
}
|
|
|
|
result = cmp_auth_info(auth_info, &auth_info_out);
|
|
talloc_free(tmp_ctx);
|
|
|
|
return result;
|
|
}
|
|
|
|
bool run_local_conv_auth_info(int dummy)
|
|
{
|
|
struct lsa_TrustDomainInfoAuthInfo auth_info;
|
|
struct lsa_TrustDomainInfoBuffer ic[1];
|
|
struct lsa_TrustDomainInfoBuffer ip[1];
|
|
struct lsa_TrustDomainInfoBuffer oc[2];
|
|
struct lsa_TrustDomainInfoBuffer op[2];
|
|
uint32_t version = 3;
|
|
|
|
ic[0].last_update_time = 12345;
|
|
ic[0].AuthType = TRUST_AUTH_TYPE_CLEAR;
|
|
ic[0].data.size = strlen("iPaSsWoRd");
|
|
ic[0].data.data = discard_const_p(uint8_t, "iPaSsWoRd");
|
|
|
|
ip[0].last_update_time = 67890;
|
|
ip[0].AuthType = TRUST_AUTH_TYPE_CLEAR;
|
|
ip[0].data.size = strlen("OlDiPaSsWoRd");
|
|
ip[0].data.data = discard_const_p(uint8_t, "OlDiPaSsWoRd");
|
|
|
|
oc[0].last_update_time = 24580;
|
|
oc[0].AuthType = TRUST_AUTH_TYPE_CLEAR;
|
|
oc[0].data.size = strlen("oPaSsWoRd");
|
|
oc[0].data.data = discard_const_p(uint8_t, "oPaSsWoRd");
|
|
oc[1].last_update_time = 24580;
|
|
oc[1].AuthType = TRUST_AUTH_TYPE_VERSION;
|
|
oc[1].data.size = 4;
|
|
oc[1].data.data = (uint8_t *) &version;
|
|
|
|
op[0].last_update_time = 13579;
|
|
op[0].AuthType = TRUST_AUTH_TYPE_CLEAR;
|
|
op[0].data.size = strlen("OlDoPaSsWoRd");
|
|
op[0].data.data = discard_const_p(uint8_t, "OlDoPaSsWoRd");
|
|
op[1].last_update_time = 24580;
|
|
op[1].AuthType = TRUST_AUTH_TYPE_VERSION;
|
|
op[1].data.size = 4;
|
|
op[1].data.data = (uint8_t *) &version;
|
|
|
|
auth_info.incoming_count = 0;
|
|
auth_info.incoming_current_auth_info = NULL;
|
|
auth_info.incoming_previous_auth_info = NULL;
|
|
auth_info.outgoing_count = 0;
|
|
auth_info.outgoing_current_auth_info = NULL;
|
|
auth_info.outgoing_previous_auth_info = NULL;
|
|
|
|
if (!covert_and_compare(&auth_info)) {
|
|
return false;
|
|
}
|
|
|
|
auth_info.incoming_count = 1;
|
|
auth_info.incoming_current_auth_info = ic;
|
|
auth_info.incoming_previous_auth_info = NULL;
|
|
auth_info.outgoing_count = 0;
|
|
auth_info.outgoing_current_auth_info = NULL;
|
|
auth_info.outgoing_previous_auth_info = NULL;
|
|
|
|
if (!covert_and_compare(&auth_info)) {
|
|
return false;
|
|
}
|
|
|
|
auth_info.incoming_count = 0;
|
|
auth_info.incoming_current_auth_info = NULL;
|
|
auth_info.incoming_previous_auth_info = NULL;
|
|
auth_info.outgoing_count = 2;
|
|
auth_info.outgoing_current_auth_info = oc;
|
|
auth_info.outgoing_previous_auth_info = NULL;
|
|
|
|
if (!covert_and_compare(&auth_info)) {
|
|
return false;
|
|
}
|
|
|
|
auth_info.incoming_count = 1;
|
|
auth_info.incoming_current_auth_info = ic;
|
|
auth_info.incoming_previous_auth_info = NULL;
|
|
auth_info.outgoing_count = 2;
|
|
auth_info.outgoing_current_auth_info = oc;
|
|
auth_info.outgoing_previous_auth_info = NULL;
|
|
|
|
if (!covert_and_compare(&auth_info)) {
|
|
return false;
|
|
}
|
|
|
|
auth_info.incoming_count = 1;
|
|
auth_info.incoming_current_auth_info = ic;
|
|
auth_info.incoming_previous_auth_info = ip;
|
|
auth_info.outgoing_count = 2;
|
|
auth_info.outgoing_current_auth_info = oc;
|
|
auth_info.outgoing_previous_auth_info = op;
|
|
|
|
if (!covert_and_compare(&auth_info)) {
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|