binascii.a2b_hex(package.data))
self.check_wdigests(digests)
+ # Check that the Package names are correct.
+ #
+ pb = ndr_unpack(drsblobs.package_PackagesBlob,
+ binascii.a2b_hex(package.data))
+ expected = ["Kerberos", "WDigest"]
+ self.assertEquals(expected, pb.names)
+
def test_userPassword_sha256(self):
self.add_user(options=[("password hash userPassword schemes",
"CryptSHA256")])
binascii.a2b_hex(package.data))
self.check_wdigests(digests)
+ # Check that the Package names are correct.
+ #
+ pb = ndr_unpack(drsblobs.package_PackagesBlob,
+ binascii.a2b_hex(package.data))
+ expected = ["Kerberos-Newer-Keys", "Kerberos", "WDigest"]
+ self.assertEquals(expected, pb.names)
+
def test_userPassword_sha512(self):
self.add_user(options=[("password hash userPassword schemes",
"CryptSHA512")])
self.add_user()
if not self.lp.get("password hash gpg key ids"):
self.skipTest("No password hash gpg key ids, " +
- "Primary:SambaGPG will not be generated");
+ "Primary:SambaGPG will not be generated")
sc = self.get_supplemental_creds()
binascii.a2b_hex(wd_package.data))
self.check_wdigests(digests)
+ # Check that the Package names are correct.
+ #
+ pb = ndr_unpack(drsblobs.package_PackagesBlob,
+ binascii.a2b_hex(package.data))
+ expected = ["Kerberos-Newer-Keys", "Kerberos", "WDigest", "SambaGPG"]
+ self.assertEquals(expected, pb.names)
+
def test_supplementalCredentials_cleartext(self):
self.add_user(clear_text=True)
if not self.lp.get("password hash gpg key ids"):
self.skipTest("No password hash gpg key ids, " +
- "Primary:SambaGPG will not be generated");
+ "Primary:SambaGPG will not be generated")
sc = self.get_supplemental_creds()