We use cli_credentials_get_netlogon_creds() which returns the same value.
dcerpc_schannel_creds() is a layer violation.
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
#include "lib/cmdline/popt_common.h"
#include "torture/rpc/torture_rpc.h"
#include "auth/gensec/gensec.h"
-#include "auth/gensec/schannel.h"
#include "libcli/auth/libcli_auth.h"
#include "param/param.h"
torture_assert_ntstatus_ok_goto(torture, status, ret, failed,
talloc_asprintf(torture, "RPC pipe connect as domain member failed: %s\n", nt_errstr(status)));
- status = dcerpc_schannel_creds(p->conn->security_state.generic_state, mem_ctx, &creds);
- if (!NT_STATUS_IS_OK(status)) {
+ creds = cli_credentials_get_netlogon_creds(machine_credentials);
+ if (creds == NULL) {
ret = false;
goto failed;
}
#include "torture/rpc/torture_rpc.h"
#include "param/param.h"
#include "auth/gensec/gensec.h"
-#include "auth/gensec/schannel.h"
#include "auth/gensec/gensec_proto.h"
#include "../libcli/auth/schannel.h"
static bool test_SamLogon(struct torture_context *tctx,
struct dcerpc_pipe *p,
+ struct cli_credentials *machine_credentials,
struct cli_credentials *test_credentials,
NTSTATUS expected_result,
bool interactive)
struct netr_Authenticator a;
struct dcerpc_binding_handle *b = p->binding_handle;
- torture_assert_ntstatus_ok(tctx, dcerpc_schannel_creds(p->conn->security_state.generic_state, tctx, &creds), "");
+ torture_assert(tctx, (creds = cli_credentials_get_netlogon_creds(machine_credentials)), "");
if (lpcfg_client_lanman_auth(tctx->lp_ctx)) {
flags |= CLI_CRED_LANMAN_AUTH;
torture_comment(tctx, "Testing samlogon (%s) as %s password: %s\n",
interactive ? "interactive" : "network", acct_name, password);
- if (!test_SamLogon(tctx, p, test_credentials,
+ if (!test_SamLogon(tctx, p, machine_creds, test_credentials,
expected_samlogon_result, interactive)) {
torture_warning(tctx, "new password did not work\n");
ret = false;
#include "system/time.h"
#include "torture/rpc/torture_rpc.h"
#include "auth/gensec/gensec.h"
-#include "auth/gensec/schannel.h"
#include "libcli/auth/libcli_auth.h"
#include "libcli/samsync/samsync.h"
#include "libcli/security/security.h"
}
samsync_state->b = samsync_state->p->binding_handle;
- status = dcerpc_schannel_creds(samsync_state->p->conn->security_state.generic_state,
- samsync_state, &samsync_state->creds);
- if (!NT_STATUS_IS_OK(status)) {
+ samsync_state->creds = cli_credentials_get_netlogon_creds(credentials);
+ if (samsync_state->creds == NULL) {
ret = false;
}
goto failed;
}
- status = dcerpc_schannel_creds(samsync_state->p_netlogon_wksta->conn->security_state.generic_state,
- samsync_state, &samsync_state->creds_netlogon_wksta);
- if (!NT_STATUS_IS_OK(status)) {
+ samsync_state->creds_netlogon_wksta = cli_credentials_get_netlogon_creds(credentials_wksta);
+ if (samsync_state->creds_netlogon_wksta == NULL) {
torture_comment(torture, "Failed to obtail schanel creds!\n");
ret = false;
}
#include "auth/credentials/credentials.h"
#include "torture/rpc/torture_rpc.h"
#include "lib/cmdline/popt_common.h"
-#include "auth/gensec/schannel.h"
#include "../libcli/auth/schannel.h"
#include "libcli/auth/libcli_auth.h"
#include "libcli/security/security.h"
#include "system/filesys.h"
#include "param/param.h"
#include "librpc/rpc/dcerpc_proto.h"
-#include "auth/gensec/gensec.h"
#include "libcli/composite/composite.h"
#include "lib/events/events.h"
torture_assert_ntstatus_ok(tctx, status, "bind auth");
- status = dcerpc_schannel_creds(p_netlogon->conn->security_state.generic_state, tctx, &creds);
- torture_assert_ntstatus_ok(tctx, status, "schannel creds");
+ creds = cli_credentials_get_netlogon_creds(credentials);
+ torture_assert(tctx, (creds != NULL), "schannel creds");
/* checks the capabilities */
torture_assert(tctx, test_netlogon_capabilities(p_netlogon, tctx, credentials, creds),