summaryrefslogtreecommitdiffstats
path: root/source/torture
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2002-01-03 07:00:18 +0000
committerAndrew Bartlett <abartlet@samba.org>2002-01-03 07:00:18 +0000
commitd47e61eb468218cae631e78edbd5d02982c78ab0 (patch)
treefe1537368c1f93f5045f3e0a77545ad4fb7010d4 /source/torture
parentda9444d98f212af8f1b1e1df191adf3c31d50f6d (diff)
downloadsamba-d47e61eb468218cae631e78edbd5d02982c78ab0.tar.gz
samba-d47e61eb468218cae631e78edbd5d02982c78ab0.tar.xz
samba-d47e61eb468218cae631e78edbd5d02982c78ab0.zip
Workaround some 'smarts' in Win2k.
Win2k kills off connections that have issued a negprot but havn't yet issued a session setup when a second connection appears from the same host.
Diffstat (limited to 'source/torture')
-rw-r--r--source/torture/torture.c20
1 files changed, 20 insertions, 0 deletions
diff --git a/source/torture/torture.c b/source/torture/torture.c
index 53f3e11e43d..256fb891b3b 100644
--- a/source/torture/torture.c
+++ b/source/torture/torture.c
@@ -2869,27 +2869,47 @@ static BOOL run_error_map_extract(int dummy) {
fstring user;
+ /* NT-Error connection */
+
if (!open_nbt_connection(&c_nt)) {
return False;
}
+ c_nt.use_spnego = False;
+
if (!cli_negprot(&c_nt)) {
printf("%s rejected the NT-error negprot (%s)\n",host, cli_errstr(&c_nt));
cli_shutdown(&c_nt);
return False;
}
+ if (!cli_session_setup(&c_nt, "", "", 0, "", 0,
+ workgroup)) {
+ printf("%s rejected the NT-error initial session setup (%s)\n",host, cli_errstr(&c_nt));
+ return False;
+ }
+
+ /* DOS-Error connection */
+
if (!open_nbt_connection(&c_dos)) {
return False;
}
+ c_dos.use_spnego = False;
c_dos.force_dos_errors = True;
+
if (!cli_negprot(&c_dos)) {
printf("%s rejected the DOS-error negprot (%s)\n",host, cli_errstr(&c_dos));
cli_shutdown(&c_dos);
return False;
}
+ if (!cli_session_setup(&c_dos, "", "", 0, "", 0,
+ workgroup)) {
+ printf("%s rejected the DOS-error initial session setup (%s)\n",host, cli_errstr(&c_dos));
+ return False;
+ }
+
for (error=(0xc0000000 | 0x1); error < (0xc0000000| 0xFFF); error++) {
snprintf(user, sizeof(user), "%X", error);