5 Usage: test_ntlm_auth_s3.sh PYTHON SRC3DIR NTLM_AUTH CCACHE SERVER
18 incdir
=`dirname $0`/..
/..
/..
/testprogs
/blackbox
26 # --server-use-winbindd is set so we know it isn't cheating and using the hard-coded passwords
28 testit
"ntlm_auth with krb5 gss-spnego-client and gss-spnego server" $PYTHON $SRC3DIR/torture
/test_ntlm_auth.py
$NTLM_AUTH $ADDARGS --target-hostname=$SERVER --target-service=host --client-helper=gss-spnego-client
--server-helper=gss-spnego
--server-use-winbindd || failed
=`expr $failed + 1`
30 echo YR| testit
"ntlm_auth with krb5 and an invalid keytab" $NTLM_AUTH --helper-protocol=gss-spnego
--option=security
=ads
--option=kerberosmethod
='dedicatedkeytab' --option=dedicatedkeytabfile
=FILE
:`pwd`/$CCACHE.keytab-does-not-exist || failed
=`expr $failed + 1`