Remove more event_context_init() uses from function calls within deep down the code.
[bbaumbach/samba-autobuild/.git] / source4 / torture / auth / ntlmssp.c
index 5d8db9030dd9575aba3a6abc70805c79d9ca1960..739a048d29a790a8ce5c50b6c168e47fba0fd493 100644 (file)
@@ -1,11 +1,11 @@
 /* 
    Unix SMB/CIFS implementation.
-   basic raw test suite for change notify
+   Small self-tests for the NTLMSSP code
    Copyright (C) Andrew Bartlett <abartlet@samba.org> 2004
    
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
-   the Free Software Foundation; either version 2 of the License, or
+   the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
    
    This program is distributed in the hope that it will be useful,
    GNU General Public License for more details.
    
    You should have received a copy of the GNU General Public License
-   along with this program; if not, write to the Free Software
-   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */
 
 #include "includes.h"
-#include "auth/auth.h"
+#include "auth/gensec/gensec.h"
+#include "auth/gensec/gensec_proto.h"
+#include "auth/ntlmssp/ntlmssp.h"
+#include "lib/cmdline/popt_common.h"
+#include "torture/torture.h"
 
-BOOL torture_ntlmssp_self_check(void) 
+static bool torture_ntlmssp_self_check(struct torture_context *tctx)
 {
-       struct ntlmssp_state *ntlmssp_state;
+       struct gensec_security *gensec_security;
+       struct gensec_ntlmssp_state *gensec_ntlmssp_state;
        DATA_BLOB data;
        DATA_BLOB sig, expected_sig;
-       NTSTATUS status;
+       TALLOC_CTX *mem_ctx = tctx;
 
-       if (!NT_STATUS_IS_OK(ntlmssp_client_start(NULL, &ntlmssp_state))) {
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx, 
+               gensec_client_start(mem_ctx, &gensec_security,
+                                   tctx->ev, tctx->lp_ctx),
+               "gensec client start");
 
-       ntlmssp_state->session_key = strhex_to_data_blob("0102030405060708090a0b0c0d0e0f00");
+       gensec_set_credentials(gensec_security, cmdline_credentials);
+
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SIGN);
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SEAL);
+
+       torture_assert_ntstatus_ok(tctx, 
+                       gensec_start_mech_by_oid(gensec_security, GENSEC_OID_NTLMSSP),
+                       "Failed to start GENSEC for NTLMSSP");
+
+       gensec_ntlmssp_state = (struct gensec_ntlmssp_state *)gensec_security->private_data;
+
+       gensec_ntlmssp_state->session_key = strhex_to_data_blob("0102030405060708090a0b0c0d0e0f00");
        dump_data_pw("NTLMSSP session key: \n", 
-                    ntlmssp_state->session_key.data,  
-                    ntlmssp_state->session_key.length);
+                    gensec_ntlmssp_state->session_key.data,  
+                    gensec_ntlmssp_state->session_key.length);
 
-       ntlmssp_state->server_use_session_keys = True;
-       ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_KEY_EXCH | NTLMSSP_NEGOTIATE_NTLM2;
+       gensec_ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_SIGN | NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_KEY_EXCH | NTLMSSP_NEGOTIATE_NTLM2;
 
-       if (!NT_STATUS_IS_OK(status = ntlmssp_sign_init(ntlmssp_state))) {
-               printf("Failed to sign_init: %s\n", nt_errstr(status));
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx,  
+               ntlmssp_sign_init(gensec_ntlmssp_state),
+               "Failed to sign_init");
 
        data = strhex_to_data_blob("6a43494653");
-       ntlmssp_sign_packet(ntlmssp_state, ntlmssp_state, 
-                           data.data, data.length, data.data, data.length, &sig);
+       gensec_ntlmssp_sign_packet(gensec_security, gensec_security,
+                                  data.data, data.length, data.data, data.length, &sig);
 
        expected_sig = strhex_to_data_blob("01000000e37f97f2544f4d7e00000000");
 
        dump_data_pw("NTLMSSP calc sig:     ", sig.data, sig.length);
        dump_data_pw("NTLMSSP expected sig: ", expected_sig.data, expected_sig.length);
 
-       if (sig.length != expected_sig.length) {
-               printf("Wrong sig length: %d != %d\n", sig.length, expected_sig.length);
-               return False;
-       }
+       torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
+
+       torture_assert_mem_equal(tctx, sig.data, expected_sig.data, sig.length,
+                                  "data mismatch");
+
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_ACCESS_DENIED, "Check of just signed packet (should fail, wrong end)");
+
+       gensec_ntlmssp_state->session_key = data_blob(NULL, 0);
+
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_NO_USER_SESSION_KEY, "Check of just signed packet without a session key should fail");
+
+       talloc_free(gensec_security);
 
-       if (memcmp(sig.data, expected_sig.data, sig.length)) {
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx, 
+               gensec_client_start(mem_ctx, &gensec_security,
+                                   tctx->ev, tctx->lp_ctx),
+               "Failed to start GENSEC for NTLMSSP");
 
-       ntlmssp_end(&ntlmssp_state);
+       gensec_set_credentials(gensec_security, cmdline_credentials);
 
-       if (!NT_STATUS_IS_OK(ntlmssp_client_start(NULL, &ntlmssp_state))) {
-               return False;
-       }
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SIGN);
+       gensec_want_feature(gensec_security, GENSEC_FEATURE_SEAL);
 
-       ntlmssp_state->session_key = strhex_to_data_blob("0102030405e538b0");
+       torture_assert_ntstatus_ok(tctx, 
+               gensec_start_mech_by_oid(gensec_security, GENSEC_OID_NTLMSSP),
+               "GENSEC start mech by oid");
+
+       gensec_ntlmssp_state = (struct gensec_ntlmssp_state *)gensec_security->private_data;
+
+       gensec_ntlmssp_state->session_key = strhex_to_data_blob("0102030405e538b0");
        dump_data_pw("NTLMSSP session key: \n", 
-                    ntlmssp_state->session_key.data,  
-                    ntlmssp_state->session_key.length);
+                    gensec_ntlmssp_state->session_key.data,  
+                    gensec_ntlmssp_state->session_key.length);
 
-       ntlmssp_state->server_use_session_keys = True;
-       ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_KEY_EXCH;
+       gensec_ntlmssp_state->neg_flags = NTLMSSP_NEGOTIATE_SIGN | NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_KEY_EXCH;
 
-       if (!NT_STATUS_IS_OK(status = ntlmssp_sign_init(ntlmssp_state))) {
-               printf("Failed to sign_init: %s\n", nt_errstr(status));
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx,  
+               ntlmssp_sign_init(gensec_ntlmssp_state),
+               "Failed to sign_init");
 
        data = strhex_to_data_blob("6a43494653");
-       ntlmssp_sign_packet(ntlmssp_state, ntlmssp_state, 
+       gensec_ntlmssp_sign_packet(gensec_security, gensec_security,
                            data.data, data.length, data.data, data.length, &sig);
 
        expected_sig = strhex_to_data_blob("0100000078010900397420fe0e5a0f89");
@@ -91,14 +123,34 @@ BOOL torture_ntlmssp_self_check(void)
        dump_data_pw("NTLMSSP calc sig:     ", sig.data, sig.length);
        dump_data_pw("NTLMSSP expected sig: ", expected_sig.data, expected_sig.length);
 
-       if (sig.length != expected_sig.length) {
-               printf("Wrong sig length: %d != %d\n", sig.length, expected_sig.length);
-               return False;
-       }
+       torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
+
+       torture_assert_mem_equal(tctx, sig.data+8, expected_sig.data+8, sig.length-8,
+                                  "data mismatch");
+
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_ACCESS_DENIED, "Check of just signed packet (should fail, wrong end)");
+
+       sig.length /= 2;
+
+       torture_assert_ntstatus_equal(tctx, 
+                                     gensec_ntlmssp_check_packet(gensec_security, gensec_security,
+                                                                 data.data, data.length, data.data, data.length, &sig),
+                                     NT_STATUS_ACCESS_DENIED, "Check of just signed packet with short sig");
+
+       talloc_free(gensec_security);
+       return true;
+}
+
+struct torture_suite *torture_ntlmssp(TALLOC_CTX *mem_ctx)
+{
+       struct torture_suite *suite = torture_suite_create(mem_ctx, 
+                                                                                                          "NTLMSSP");
 
-       if (memcmp(sig.data+8, expected_sig.data+8, sig.length-8)) {
-               return False;
-       }
+       torture_suite_add_simple_test(suite, "NTLMSSP self check",
+                                                                  torture_ntlmssp_self_check);
 
-       return True;
+       return suite;
 }