Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
ee1e1f0f
Commit
ee1e1f0f
authored
Jan 03, 2012
by
Alexandre Julliard
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
secur32/tests: Don't compare the encrypted results if the session key is different.
parent
8d66ca11
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
34 additions
and
48 deletions
+34
-48
ntlm.c
dlls/secur32/tests/ntlm.c
+34
-48
No files found.
dlls/secur32/tests/ntlm.c
View file @
ee1e1f0f
...
...
@@ -1058,47 +1058,43 @@ static void testSignSeal(void)
ok
(
sec_status
==
SEC_E_OK
,
"EncryptMessage returned %s, not SEC_E_OK.
\n
"
,
getSecError
(
sec_status
));
ok
(
!
memcmp
(
crypt
.
pBuffers
[
0
].
pvBuffer
,
crypt_trailer_client
,
crypt
.
pBuffers
[
0
].
cbBuffer
),
"Crypt trailer not as expected.
\n
"
);
if
(
memcmp
(
crypt
.
pBuffers
[
0
].
pvBuffer
,
crypt_trailer_client
,
crypt
.
pBuffers
[
0
].
cbBuffer
))
{
int
i
;
for
(
i
=
0
;
i
<
crypt
.
pBuffers
[
0
].
cbBuffer
;
i
++
)
{
if
(
i
%
8
==
0
)
printf
(
" "
);
printf
(
"0x%02x,"
,
((
unsigned
char
*
)
crypt
.
pBuffers
[
0
].
pvBuffer
)[
i
]);
if
(
i
%
8
==
7
)
printf
(
"
\n
"
);
}
printf
(
"
\n
"
);
}
ok
(
!
memcmp
(
crypt
.
pBuffers
[
1
].
pvBuffer
,
crypt_message_client
,
crypt
.
pBuffers
[
1
].
cbBuffer
),
"Crypt message not as expected.
\n
"
);
if
(
memcmp
(
crypt
.
pBuffers
[
1
].
pvBuffer
,
crypt_message_client
,
crypt
.
pBuffers
[
1
].
cbBuffer
))
/* first 8 bytes must always be the same */
ok
(
!
memcmp
(
crypt
.
pBuffers
[
0
].
pvBuffer
,
crypt_trailer_client
,
8
),
"Crypt trailer not as expected.
\n
"
);
/* the rest depends on the session key */
if
(
!
memcmp
(
crypt
.
pBuffers
[
0
].
pvBuffer
,
crypt_trailer_client
,
crypt
.
pBuffers
[
0
].
cbBuffer
))
{
int
i
;
for
(
i
=
0
;
i
<
crypt
.
pBuffers
[
1
].
cbBuffer
;
i
++
)
ok
(
!
memcmp
(
crypt
.
pBuffers
[
0
].
pvBuffer
,
crypt_trailer_client
,
crypt
.
pBuffers
[
0
].
cbBuffer
),
"Crypt trailer not as expected.
\n
"
);
ok
(
!
memcmp
(
crypt
.
pBuffers
[
1
].
pvBuffer
,
crypt_message_client
,
crypt
.
pBuffers
[
1
].
cbBuffer
),
"Crypt message not as expected.
\n
"
);
if
(
memcmp
(
crypt
.
pBuffers
[
1
].
pvBuffer
,
crypt_message_client
,
crypt
.
pBuffers
[
1
].
cbBuffer
))
{
if
(
i
%
8
==
0
)
printf
(
" "
);
printf
(
"0x%02x,"
,
((
unsigned
char
*
)
crypt
.
pBuffers
[
1
].
pvBuffer
)[
i
]);
if
(
i
%
8
==
7
)
printf
(
"
\n
"
);
int
i
;
for
(
i
=
0
;
i
<
crypt
.
pBuffers
[
1
].
cbBuffer
;
i
++
)
{
if
(
i
%
8
==
0
)
printf
(
" "
);
printf
(
"0x%02x,"
,
((
unsigned
char
*
)
crypt
.
pBuffers
[
1
].
pvBuffer
)[
i
]);
if
(
i
%
8
==
7
)
printf
(
"
\n
"
);
}
printf
(
"
\n
"
);
}
printf
(
"
\n
"
);
}
data
[
0
].
cbBuffer
=
sizeof
(
crypt_trailer_server
);
data
[
1
].
cbBuffer
=
sizeof
(
crypt_message_server
);
memcpy
(
data
[
0
].
pvBuffer
,
crypt_trailer_server
,
data
[
0
].
cbBuffer
);
memcpy
(
data
[
1
].
pvBuffer
,
crypt_message_server
,
data
[
1
].
cbBuffer
);
data
[
0
].
cbBuffer
=
sizeof
(
crypt_trailer_server
);
data
[
1
].
cbBuffer
=
sizeof
(
crypt_message_server
);
memcpy
(
data
[
0
].
pvBuffer
,
crypt_trailer_server
,
data
[
0
].
cbBuffer
);
memcpy
(
data
[
1
].
pvBuffer
,
crypt_message_server
,
data
[
1
].
cbBuffer
);
sec_status
=
pDecryptMessage
(
&
client
.
ctxt
,
&
crypt
,
0
,
&
qop
);
sec_status
=
pDecryptMessage
(
&
client
.
ctxt
,
&
crypt
,
0
,
&
qop
);
ok
(
sec_status
==
SEC_E_OK
,
"DecryptMessage returned %s, not SEC_E_OK.
\n
"
,
getSecError
(
sec_status
));
ok
(
!
memcmp
(
crypt
.
pBuffers
[
1
].
pvBuffer
,
message_binary
,
crypt
.
pBuffers
[
1
].
cbBuffer
),
"Failed to decrypt message correctly.
\n
"
);
ok
(
sec_status
==
SEC_E_OK
,
"DecryptMessage returned %s, not SEC_E_OK.
\n
"
,
getSecError
(
sec_status
));
ok
(
!
memcmp
(
crypt
.
pBuffers
[
1
].
pvBuffer
,
message_binary
,
crypt
.
pBuffers
[
1
].
cbBuffer
),
"Failed to decrypt message correctly.
\n
"
);
}
else
trace
(
"A different session key is being used
\n
"
);
trace
(
"Testing with more than one buffer.
\n
"
);
...
...
@@ -1139,20 +1135,10 @@ static void testSignSeal(void)
ok
(
sec_status
==
SEC_E_OK
,
"EncryptMessage returned %s, not SEC_E_OK.
\n
"
,
getSecError
(
sec_status
));
ok
(
!
memcmp
(
crypt
.
pBuffers
[
3
].
pvBuffer
,
crypt_trailer_client2
,
crypt
.
pBuffers
[
3
].
cbBuffer
),
"Crypt trailer not as expected.
\n
"
);
ok
(
!
memcmp
(
crypt
.
pBuffers
[
3
].
pvBuffer
,
crypt_trailer_client2
,
8
),
"Crypt trailer not as expected.
\n
"
);
if
(
memcmp
(
crypt
.
pBuffers
[
3
].
pvBuffer
,
crypt_trailer_client2
,
crypt
.
pBuffers
[
3
].
cbBuffer
))
{
int
i
;
for
(
i
=
0
;
i
<
crypt
.
pBuffers
[
3
].
cbBuffer
;
i
++
)
{
if
(
i
%
8
==
0
)
printf
(
" "
);
printf
(
"0x%02x,"
,
((
unsigned
char
*
)
crypt
.
pBuffers
[
3
].
pvBuffer
)[
i
]);
if
(
i
%
8
==
7
)
printf
(
"
\n
"
);
}
printf
(
"
\n
"
);
}
crypt
.
pBuffers
[
3
].
cbBuffer
))
goto
end
;
ok
(
!
memcmp
(
crypt
.
pBuffers
[
1
].
pvBuffer
,
crypt_message_client2
,
crypt
.
pBuffers
[
1
].
cbBuffer
),
"Crypt message not as expected.
\n
"
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment