s4-smbtorture: Make test names lowercase and dot-separated.
[metze/samba/wip.git] / source4 / torture / auth / ntlmssp.c
index 6fb07914dd049dc38f2080cae004e51db0172b84..db8651c0a508c700dd4863115a7437c728279142 100644 (file)
@@ -5,7 +5,7 @@
    
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
-   the Free Software Foundation; either version 2 of the License, or
+   the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
    
    This program is distributed in the hope that it will be useful,
    GNU General Public License for more details.
    
    You should have received a copy of the GNU General Public License
-   along with this program; if not, write to the Free Software
-   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */
 
 #include "includes.h"
-#include "auth/auth.h"
+#include "auth/gensec/gensec.h"
+#include "auth/ntlmssp/ntlmssp.h"
 #include "lib/cmdline/popt_common.h"
+#include "torture/torture.h"
+#include "param/param.h"
 
-BOOL torture_ntlmssp_self_check(void) 
+static bool torture_ntlmssp_self_check(struct torture_context *tctx)
 {
        struct gensec_security *gensec_security;
+       struct gensec_ntlmssp_context *gensec_ntlmssp;
        struct ntlmssp_state *ntlmssp_state;
-       struct gensec_ntlmssp_state *gensec_ntlmssp_state;
        DATA_BLOB data;
        DATA_BLOB sig, expected_sig;
-       NTSTATUS status;
+       TALLOC_CTX *mem_ctx = tctx;
 
-       status = gensec_client_start(NULL, &gensec_security);
-
-       if (!NT_STATUS_IS_OK(status)) {
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx, 
+               gensec_client_start(mem_ctx, &gensec_security,
+                                   tctx->ev, lpcfg_gensec_settings(tctx, tctx->lp_ctx)),
+               "gensec client start");
 
        gensec_set_credentials(gensec_security, cmdline_credentials);
 
-       status = gensec_start_mech_by_oid(gensec_security, GENSEC_OID_NTLMSSP);
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SIGN);
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SEAL);
 
-       if (!NT_STATUS_IS_OK(status)) {
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx, 
+                       gensec_start_mech_by_oid(gensec_security, GENSEC_OID_NTLMSSP),
+                       "Failed to start GENSEC for NTLMSSP");
 
-       gensec_ntlmssp_state = gensec_security->private_data;
-       ntlmssp_state = gensec_ntlmssp_state->ntlmssp_state;
+       gensec_ntlmssp = talloc_get_type_abort(gensec_security->private_data,
+                                              struct gensec_ntlmssp_context);
+       ntlmssp_state = gensec_ntlmssp->ntlmssp_state;
 
-       ntlmssp_state->session_key = strhex_to_data_blob("0102030405060708090a0b0c0d0e0f00");
+       ntlmssp_state->session_key = strhex_to_data_blob(tctx, "0102030405060708090a0b0c0d0e0f00");
        dump_data_pw("NTLMSSP session key: \n", 
-                    ntlmssp_state->session_key.data,  
+                    ntlmssp_state->session_key.data,
                     ntlmssp_state->session_key.length);
 
-       ntlmssp_state->server_use_session_keys = True;
-       ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_KEY_EXCH | NTLMSSP_NEGOTIATE_NTLM2;
+       ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_SIGN | NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_KEY_EXCH | NTLMSSP_NEGOTIATE_NTLM2;
 
-       if (!NT_STATUS_IS_OK(status = ntlmssp_sign_init(ntlmssp_state))) {
-               printf("Failed to sign_init: %s\n", nt_errstr(status));
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx,  
+               ntlmssp_sign_init(ntlmssp_state),
+               "Failed to sign_init");
 
-       data = strhex_to_data_blob("6a43494653");
+       data = strhex_to_data_blob(tctx, "6a43494653");
        gensec_ntlmssp_sign_packet(gensec_security, gensec_security,
                                   data.data, data.length, data.data, data.length, &sig);
 
-       expected_sig = strhex_to_data_blob("01000000e37f97f2544f4d7e00000000");
+       expected_sig = strhex_to_data_blob(tctx, "01000000e37f97f2544f4d7e00000000");
 
        dump_data_pw("NTLMSSP calc sig:     ", sig.data, sig.length);
        dump_data_pw("NTLMSSP expected sig: ", expected_sig.data, expected_sig.length);
 
-       if (sig.length != expected_sig.length) {
-               printf("Wrong sig length: %d != %d\n", sig.length, expected_sig.length);
-               return False;
-       }
+       torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
 
-       if (memcmp(sig.data, expected_sig.data, sig.length)) {
-               return False;
-       }
+       torture_assert_mem_equal(tctx, sig.data, expected_sig.data, sig.length,
+                                  "data mismatch");
 
-       talloc_free(gensec_security);
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_ACCESS_DENIED, "Check of just signed packet (should fail, wrong end)");
+
+       ntlmssp_state->session_key = data_blob(NULL, 0);
 
-       status = gensec_client_start(NULL, &gensec_security);
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_NO_USER_SESSION_KEY, "Check of just signed packet without a session key should fail");
 
-       if (!NT_STATUS_IS_OK(status)) {
-               return False;
-       }
+       talloc_free(gensec_security);
+
+       torture_assert_ntstatus_ok(tctx, 
+               gensec_client_start(mem_ctx, &gensec_security,
+                                   tctx->ev, lpcfg_gensec_settings(tctx, tctx->lp_ctx)),
+               "Failed to start GENSEC for NTLMSSP");
 
        gensec_set_credentials(gensec_security, cmdline_credentials);
 
-       status = gensec_start_mech_by_oid(gensec_security, GENSEC_OID_NTLMSSP);
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SIGN);
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SEAL);
 
-       if (!NT_STATUS_IS_OK(status)) {
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx, 
+               gensec_start_mech_by_oid(gensec_security, GENSEC_OID_NTLMSSP),
+               "GENSEC start mech by oid");
 
-       gensec_ntlmssp_state = gensec_security->private_data;
-       ntlmssp_state = gensec_ntlmssp_state->ntlmssp_state;
+       gensec_ntlmssp = talloc_get_type_abort(gensec_security->private_data,
+                                              struct gensec_ntlmssp_context);
+       ntlmssp_state = gensec_ntlmssp->ntlmssp_state;
 
-       ntlmssp_state->session_key = strhex_to_data_blob("0102030405e538b0");
+       ntlmssp_state->session_key = strhex_to_data_blob(tctx, "0102030405e538b0");
        dump_data_pw("NTLMSSP session key: \n", 
-                    ntlmssp_state->session_key.data,  
+                    ntlmssp_state->session_key.data,
                     ntlmssp_state->session_key.length);
 
-       ntlmssp_state->server_use_session_keys = True;
-       ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_KEY_EXCH;
+       ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_SIGN | NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_KEY_EXCH;
 
-       if (!NT_STATUS_IS_OK(status = ntlmssp_sign_init(ntlmssp_state))) {
-               printf("Failed to sign_init: %s\n", nt_errstr(status));
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx,  
+               ntlmssp_sign_init(ntlmssp_state),
+               "Failed to sign_init");
 
-       data = strhex_to_data_blob("6a43494653");
+       data = strhex_to_data_blob(tctx, "6a43494653");
        gensec_ntlmssp_sign_packet(gensec_security, gensec_security,
                            data.data, data.length, data.data, data.length, &sig);
 
-       expected_sig = strhex_to_data_blob("0100000078010900397420fe0e5a0f89");
+       expected_sig = strhex_to_data_blob(tctx, "0100000078010900397420fe0e5a0f89");
 
        dump_data_pw("NTLMSSP calc sig:     ", sig.data, sig.length);
        dump_data_pw("NTLMSSP expected sig: ", expected_sig.data, expected_sig.length);
 
-       if (sig.length != expected_sig.length) {
-               printf("Wrong sig length: %d != %d\n", sig.length, expected_sig.length);
-               return False;
-       }
+       torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
+
+       torture_assert_mem_equal(tctx, sig.data+8, expected_sig.data+8, sig.length-8,
+                                  "data mismatch");
 
-       if (memcmp(sig.data+8, expected_sig.data+8, sig.length-8)) {
-               return False;
-       }
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_ACCESS_DENIED, "Check of just signed packet (should fail, wrong end)");
+
+       sig.length /= 2;
+
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_ACCESS_DENIED, "Check of just signed packet with short sig");
 
        talloc_free(gensec_security);
+       return true;
+}
+
+struct torture_suite *torture_ntlmssp(TALLOC_CTX *mem_ctx)
+{
+       struct torture_suite *suite = torture_suite_create(mem_ctx, "ntlmssp");
+
+       torture_suite_add_simple_test(suite, "NTLMSSP self check",
+                                                                  torture_ntlmssp_self_check);
 
-       return True;
+       return suite;
 }