s4-loadparm: 2nd half of lp_ to lpcfg_ conversion
[gd/samba-autobuild/.git] / source4 / torture / auth / ntlmssp.c
index 02b7ad80b2d98d8dcab2a405ad36601b01febcdf..d7639ac9cff22ef3cc117088078c01813263ffcd 100644 (file)
@@ -1,11 +1,11 @@
 /* 
    Unix SMB/CIFS implementation.
-   basic raw test suite for change notify
+   Small self-tests for the NTLMSSP code
    Copyright (C) Andrew Bartlett <abartlet@samba.org> 2004
    
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
-   the Free Software Foundation; either version 2 of the License, or
+   the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
    
    This program is distributed in the hope that it will be useful,
    GNU General Public License for more details.
    
    You should have received a copy of the GNU General Public License
-   along with this program; if not, write to the Free Software
-   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */
 
 #include "includes.h"
+#include "auth/gensec/gensec.h"
+#include "auth/ntlmssp/ntlmssp.h"
+#include "lib/cmdline/popt_common.h"
+#include "torture/torture.h"
+#include "param/param.h"
 
-BOOL torture_ntlmssp_self_check(int dummy) 
+static bool torture_ntlmssp_self_check(struct torture_context *tctx)
 {
+       struct gensec_security *gensec_security;
+       struct gensec_ntlmssp_context *gensec_ntlmssp;
        struct ntlmssp_state *ntlmssp_state;
        DATA_BLOB data;
        DATA_BLOB sig, expected_sig;
-       NTSTATUS status;
+       TALLOC_CTX *mem_ctx = tctx;
 
-       if (!NT_STATUS_IS_OK(ntlmssp_client_start(&ntlmssp_state))) {
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx, 
+               gensec_client_start(mem_ctx, &gensec_security,
+                                   tctx->ev, lpcfg_gensec_settings(tctx, tctx->lp_ctx)),
+               "gensec client start");
 
-       ntlmssp_state->session_key = strhex_to_data_blob("0102030405060708090a0b0c0d0e0f00");
+       gensec_set_credentials(gensec_security, cmdline_credentials);
+
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SIGN);
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SEAL);
+
+       torture_assert_ntstatus_ok(tctx, 
+                       gensec_start_mech_by_oid(gensec_security, GENSEC_OID_NTLMSSP),
+                       "Failed to start GENSEC for NTLMSSP");
+
+       gensec_ntlmssp = talloc_get_type_abort(gensec_security->private_data,
+                                              struct gensec_ntlmssp_context);
+       ntlmssp_state = gensec_ntlmssp->ntlmssp_state;
+
+       ntlmssp_state->session_key = strhex_to_data_blob(tctx, "0102030405060708090a0b0c0d0e0f00");
        dump_data_pw("NTLMSSP session key: \n", 
-                    ntlmssp_state->session_key.data,  
+                    ntlmssp_state->session_key.data,
                     ntlmssp_state->session_key.length);
 
-       ntlmssp_state->server_use_session_keys = True;
-       ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_KEY_EXCH | NTLMSSP_NEGOTIATE_NTLM2;
+       ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_SIGN | NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_KEY_EXCH | NTLMSSP_NEGOTIATE_NTLM2;
 
-       if (!NT_STATUS_IS_OK(status = ntlmssp_sign_init(ntlmssp_state))) {
-               printf("Failed to sign_init: %s\n", nt_errstr(status));
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx,  
+               ntlmssp_sign_init(ntlmssp_state),
+               "Failed to sign_init");
 
-       data = strhex_to_data_blob("6a43494653");
-       ntlmssp_sign_packet(ntlmssp_state, ntlmssp_state->mem_ctx, 
-                           data.data, data.length, &sig);
+       data = strhex_to_data_blob(tctx, "6a43494653");
+       gensec_ntlmssp_sign_packet(gensec_security, gensec_security,
+                                  data.data, data.length, data.data, data.length, &sig);
 
-       expected_sig = strhex_to_data_blob("01000000e37f97f2544f4d7e00000000");
+       expected_sig = strhex_to_data_blob(tctx, "01000000e37f97f2544f4d7e00000000");
 
        dump_data_pw("NTLMSSP calc sig:     ", sig.data, sig.length);
        dump_data_pw("NTLMSSP expected sig: ", expected_sig.data, expected_sig.length);
 
-       if (sig.length != expected_sig.length) {
-               printf("Wrong sig length: %d != %d\n", sig.length, expected_sig.length);
-               return False;
-       }
+       torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
+
+       torture_assert_mem_equal(tctx, sig.data, expected_sig.data, sig.length,
+                                  "data mismatch");
+
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_ACCESS_DENIED, "Check of just signed packet (should fail, wrong end)");
+
+       ntlmssp_state->session_key = data_blob(NULL, 0);
+
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_NO_USER_SESSION_KEY, "Check of just signed packet without a session key should fail");
+
+       talloc_free(gensec_security);
+
+       torture_assert_ntstatus_ok(tctx, 
+               gensec_client_start(mem_ctx, &gensec_security,
+                                   tctx->ev, lpcfg_gensec_settings(tctx, tctx->lp_ctx)),
+               "Failed to start GENSEC for NTLMSSP");
 
-       if (memcmp(sig.data, expected_sig.data, sig.length)) {
-               return False;
-       }
+       gensec_set_credentials(gensec_security, cmdline_credentials);
 
-       ntlmssp_end(&ntlmssp_state);
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SIGN);
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SEAL);
 
-       if (!NT_STATUS_IS_OK(ntlmssp_client_start(&ntlmssp_state))) {
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx, 
+               gensec_start_mech_by_oid(gensec_security, GENSEC_OID_NTLMSSP),
+               "GENSEC start mech by oid");
 
-       ntlmssp_state->session_key = strhex_to_data_blob("0102030405e538b0");
+       gensec_ntlmssp = talloc_get_type_abort(gensec_security->private_data,
+                                              struct gensec_ntlmssp_context);
+       ntlmssp_state = gensec_ntlmssp->ntlmssp_state;
+
+       ntlmssp_state->session_key = strhex_to_data_blob(tctx, "0102030405e538b0");
        dump_data_pw("NTLMSSP session key: \n", 
-                    ntlmssp_state->session_key.data,  
+                    ntlmssp_state->session_key.data,
                     ntlmssp_state->session_key.length);
 
-       ntlmssp_state->server_use_session_keys = True;
-       ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_KEY_EXCH;
+       ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_SIGN | NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_KEY_EXCH;
 
-       if (!NT_STATUS_IS_OK(status = ntlmssp_sign_init(ntlmssp_state))) {
-               printf("Failed to sign_init: %s\n", nt_errstr(status));
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx,  
+               ntlmssp_sign_init(ntlmssp_state),
+               "Failed to sign_init");
 
-       data = strhex_to_data_blob("6a43494653");
-       ntlmssp_sign_packet(ntlmssp_state, ntlmssp_state->mem_ctx, 
-                           data.data, data.length, &sig);
+       data = strhex_to_data_blob(tctx, "6a43494653");
+       gensec_ntlmssp_sign_packet(gensec_security, gensec_security,
+                           data.data, data.length, data.data, data.length, &sig);
 
-       expected_sig = strhex_to_data_blob("0100000078010900397420fe0e5a0f89");
+       expected_sig = strhex_to_data_blob(tctx, "0100000078010900397420fe0e5a0f89");
 
        dump_data_pw("NTLMSSP calc sig:     ", sig.data, sig.length);
        dump_data_pw("NTLMSSP expected sig: ", expected_sig.data, expected_sig.length);
 
-       if (sig.length != expected_sig.length) {
-               printf("Wrong sig length: %d != %d\n", sig.length, expected_sig.length);
-               return False;
-       }
+       torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
+
+       torture_assert_mem_equal(tctx, sig.data+8, expected_sig.data+8, sig.length-8,
+                                  "data mismatch");
+
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_ACCESS_DENIED, "Check of just signed packet (should fail, wrong end)");
+
+       sig.length /= 2;
+
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_ACCESS_DENIED, "Check of just signed packet with short sig");
+
+       talloc_free(gensec_security);
+       return true;
+}
+
+struct torture_suite *torture_ntlmssp(TALLOC_CTX *mem_ctx)
+{
+       struct torture_suite *suite = torture_suite_create(mem_ctx, 
+                                                                                                          "NTLMSSP");
 
-       if (memcmp(sig.data, expected_sig.data, sig.length)) {
-               return False;
-       }
+       torture_suite_add_simple_test(suite, "NTLMSSP self check",
+                                                                  torture_ntlmssp_self_check);
 
-       return True;
+       return suite;
 }