if [ $# -lt 6 ]; then cat < /dev/null 2>&1 || ! which sha1sum > /dev/null 2>&1 ; then subunit_start_test "client encryption types" subunit_skip_test "client encryption types" </dev/null | sha1sum | cut -b 1-10` RUNDIR=`pwd` cd $BASEDIR WORKDIR=`mktemp -d -p .` WORKDIR=`basename $WORKDIR` cp -a client/* $WORKDIR/ sed -ri "s@(dir|directory) = (.*)/client/@\1 = \2/$WORKDIR/@" $WORKDIR/client.conf sed -ri "s/netbios name = .*/netbios name = $HOSTNAME/" $WORKDIR/client.conf rm -f $WORKDIR/private/secrets.tdb cd $RUNDIR failed=0 net_tool="$BINDIR/net -s $BASEDIR/$WORKDIR/client.conf --option=security=ads --option=kerberosencryptiontypes=$ETYPE_CONF" pcap_file=$BASEDIR/$WORKDIR/test.pcap export SOCKET_WRAPPER_PCAP_FILE=$pcap_file testit "join" $VALGRIND $net_tool ads join -kU$DC_USERNAME%$DC_PASSWORD || failed=`expr $failed + 1` testit "testjoin" $VALGRIND $net_tool ads testjoin -kP || failed=`expr $failed + 1` #The leave command does not use the locally-generated #krb5.conf export SOCKET_WRAPPER_PCAP_FILE= testit "leave" $VALGRIND $net_tool ads leave -U$DC_USERNAME%$DC_PASSWORD || failed=`expr $failed + 1` # # Older versions of tshark do not support -Y option, # They use -R which cannot be used with recent versions... # if ! tshark -r $pcap_file -nVY "kerberos" > /dev/null 2>&1 ; then subunit_start_test "client encryption types" subunit_skip_test "client encryption types" <