r1992: Make the NTLMSSP torture test show more detail, and return failure etc.
authorAndrew Bartlett <abartlet@samba.org>
Sun, 22 Aug 2004 05:37:39 +0000 (05:37 +0000)
committerGerald (Jerry) Carter <jerry@samba.org>
Wed, 10 Oct 2007 17:58:15 +0000 (12:58 -0500)
Andrew Bartlett
(This used to be commit a8e76085a7414068aa96b6544b28afc1e1e1010c)

source4/torture/auth/ntlmssp.c

index c6415b05c7824c6121cee6a8af8bb758e911a2cc..02b7ad80b2d98d8dcab2a405ad36601b01febcdf 100644 (file)
@@ -50,8 +50,17 @@ BOOL torture_ntlmssp_self_check(int dummy)
 
        expected_sig = strhex_to_data_blob("01000000e37f97f2544f4d7e00000000");
 
-       dump_data_pw("NTLMSSP sig: ", sig.data, sig.length);
-       dump_data_pw("NTLMSSP sig: ", expected_sig.data, expected_sig.length);
+       dump_data_pw("NTLMSSP calc sig:     ", sig.data, sig.length);
+       dump_data_pw("NTLMSSP expected sig: ", expected_sig.data, expected_sig.length);
+
+       if (sig.length != expected_sig.length) {
+               printf("Wrong sig length: %d != %d\n", sig.length, expected_sig.length);
+               return False;
+       }
+
+       if (memcmp(sig.data, expected_sig.data, sig.length)) {
+               return False;
+       }
 
        ntlmssp_end(&ntlmssp_state);
 
@@ -78,8 +87,17 @@ BOOL torture_ntlmssp_self_check(int dummy)
 
        expected_sig = strhex_to_data_blob("0100000078010900397420fe0e5a0f89");
 
-       dump_data_pw("NTLMSSP sig: ", sig.data, sig.length);
-       dump_data_pw("NTLMSSP sig: ", expected_sig.data, expected_sig.length);
+       dump_data_pw("NTLMSSP calc sig:     ", sig.data, sig.length);
+       dump_data_pw("NTLMSSP expected sig: ", expected_sig.data, expected_sig.length);
+
+       if (sig.length != expected_sig.length) {
+               printf("Wrong sig length: %d != %d\n", sig.length, expected_sig.length);
+               return False;
+       }
+
+       if (memcmp(sig.data, expected_sig.data, sig.length)) {
+               return False;
+       }
 
        return True;
 }