tctx 39 lib/crypto/hmacmd5.c struct MD5Context tctx; tctx 41 lib/crypto/hmacmd5.c MD5Init(&tctx); tctx 42 lib/crypto/hmacmd5.c MD5Update(&tctx, key, key_len); tctx 43 lib/crypto/hmacmd5.c MD5Final(tk, &tctx); tctx 44 lib/crypto/hmacmd5test.c TALLOC_CTX *tctx = talloc_new(torture); tctx 45 lib/crypto/hmacmd5test.c if (!tctx) { return false; }; tctx 49 lib/crypto/hmacmd5test.c testarray[0].md5 = strhex_to_data_blob(tctx, "9294727a3638bb1c13f48ef8158bfc9d"); tctx 53 lib/crypto/hmacmd5test.c testarray[1].md5 = strhex_to_data_blob(tctx, "750c783e6ab0b503eaa86e310a5db738"); tctx 57 lib/crypto/hmacmd5test.c testarray[2].md5 = strhex_to_data_blob(tctx, "56be34521d144c88dbb8c733f0e8b3f6"); tctx 59 lib/crypto/hmacmd5test.c testarray[3].key = strhex_to_data_blob(tctx, "0102030405060708090a0b0c0d0e0f10111213141516171819"); tctx 61 lib/crypto/hmacmd5test.c testarray[3].md5 = strhex_to_data_blob(tctx, "697eaf0aca3a3aea3a75164746ffaa79"); tctx 65 lib/crypto/hmacmd5test.c testarray[4].md5 = strhex_to_data_blob(tctx, "56461ef2342edc00f9bab995690efd4c"); tctx 69 lib/crypto/hmacmd5test.c testarray[5].md5 = strhex_to_data_blob(tctx, "6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd"); tctx 74 lib/crypto/hmacmd5test.c testarray[6].md5 = strhex_to_data_blob(tctx, "6f630fad67cda0ee1fb1f562db3aa53e"); tctx 99 lib/crypto/hmacmd5test.c talloc_free(tctx); tctx 43 lib/crypto/hmacsha256.c SHA256_CTX tctx; tctx 45 lib/crypto/hmacsha256.c SHA256_Init(&tctx); tctx 46 lib/crypto/hmacsha256.c SHA256_Update(&tctx, key, key_len); tctx 47 lib/crypto/hmacsha256.c SHA256_Final(tk, &tctx); tctx 48 lib/socket_wrapper/testsuite.c static bool test_socket_wrapper_dir(struct torture_context *tctx) tctx 53 lib/socket_wrapper/testsuite.c torture_assert_str_equal(tctx, socket_wrapper_dir(), "foo", "setting failed"); tctx 55 lib/socket_wrapper/testsuite.c torture_assert_str_equal(tctx, socket_wrapper_dir(), "foo", "setting failed"); tctx 57 lib/socket_wrapper/testsuite.c torture_assert_str_equal(tctx, socket_wrapper_dir(), NULL, "resetting failed"); tctx 64 lib/socket_wrapper/testsuite.c static bool test_swrap_socket(struct torture_context *tctx) tctx 69 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, swrap_socket(1337, 1337, 0), -1, "unknown address family fails"); tctx 70 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, errno, EAFNOSUPPORT, "correct errno set"); tctx 71 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, swrap_socket(AF_INET, 1337, 0), -1, "unknown type fails"); tctx 72 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, errno, EPROTONOSUPPORT, "correct errno set"); tctx 73 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, swrap_socket(AF_INET, SOCK_DGRAM, 10), -1, "unknown protocol fails"); tctx 74 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, errno, EPROTONOSUPPORT, "correct errno set"); tctx 82 lib/socket_wrapper/testsuite.c static bool test_socket_wrapper_default_iface(struct torture_context *tctx) tctx 86 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, socket_wrapper_default_iface(), 1, "unset"); tctx 88 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, socket_wrapper_default_iface(), 2, "unset"); tctx 90 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, socket_wrapper_default_iface(), 1, "unset"); tctx 1107 lib/talloc/testsuite.c bool torture_local_talloc(struct torture_context *tctx) tctx 29 lib/talloc/testsuite_main.c bool torture_local_talloc(struct torture_context *tctx); tctx 80 lib/torture/torture.c _PUBLIC_ NTSTATUS torture_temp_dir(struct torture_context *tctx, tctx 84 lib/torture/torture.c SMB_ASSERT(tctx->outputdir != NULL); tctx 86 lib/torture/torture.c *tempdir = talloc_asprintf(tctx, "%s/%s.XXXXXX", tctx->outputdir, tctx 417 lib/torture/torture.h NTSTATUS torture_temp_dir(struct torture_context *tctx, tctx 434 lib/torture/torture.h struct torture_context *torture_context_child(struct torture_context *tctx); tctx 24 lib/util/charset/tests/charset.c static bool test_toupper_m(struct torture_context *tctx) tctx 26 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, toupper_m('c'), 'C', "c"); tctx 27 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, toupper_m('Z'), 'Z', "z"); tctx 28 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, toupper_m(0xFFFF4565), 0xFFFF4565, "0xFFFF4565"); tctx 32 lib/util/charset/tests/charset.c static bool test_tolower_m(struct torture_context *tctx) tctx 34 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, tolower_m('C'), 'c', "c"); tctx 35 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, tolower_m('z'), 'z', "z"); tctx 36 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, tolower_m(0xFFFF4565), 0xFFFF4565, "0xFFFF4565"); tctx 40 lib/util/charset/tests/charset.c static bool test_codepoint_cmpi(struct torture_context *tctx) tctx 42 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, codepoint_cmpi('a', 'a'), 0, "same char"); tctx 43 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, codepoint_cmpi('A', 'a'), 0, "upcase version"); tctx 44 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, codepoint_cmpi('b', 'a'), 1, "right diff"); tctx 45 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, codepoint_cmpi('a', 'b'), -1, "right diff"); tctx 49 lib/util/charset/tests/charset.c static bool test_strcasecmp_m(struct torture_context *tctx) tctx 51 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m("foo", "bar") != 0, "different strings"); tctx 52 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m("foo", "foo") == 0, "same case strings"); tctx 53 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m("foo", "Foo") == 0, "different case strings"); tctx 54 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m(NULL, "Foo") != 0, "one NULL"); tctx 55 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m("foo", NULL) != 0, "other NULL"); tctx 56 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m(NULL, NULL) == 0, "both NULL"); tctx 61 lib/util/charset/tests/charset.c static bool test_strequal_m(struct torture_context *tctx) tctx 63 lib/util/charset/tests/charset.c torture_assert(tctx, !strequal_m("foo", "bar"), "different strings"); tctx 64 lib/util/charset/tests/charset.c torture_assert(tctx, strequal_m("foo", "foo"), "same case strings"); tctx 65 lib/util/charset/tests/charset.c torture_assert(tctx, strequal_m("foo", "Foo"), "different case strings"); tctx 66 lib/util/charset/tests/charset.c torture_assert(tctx, !strequal_m(NULL, "Foo"), "one NULL"); tctx 67 lib/util/charset/tests/charset.c torture_assert(tctx, !strequal_m("foo", NULL), "other NULL"); tctx 68 lib/util/charset/tests/charset.c torture_assert(tctx, strequal_m(NULL, NULL), "both NULL"); tctx 72 lib/util/charset/tests/charset.c static bool test_strcsequal_m(struct torture_context *tctx) tctx 74 lib/util/charset/tests/charset.c torture_assert(tctx, !strcsequal_m("foo", "bar"), "different strings"); tctx 75 lib/util/charset/tests/charset.c torture_assert(tctx, strcsequal_m("foo", "foo"), "same case strings"); tctx 76 lib/util/charset/tests/charset.c torture_assert(tctx, !strcsequal_m("foo", "Foo"), "different case strings"); tctx 77 lib/util/charset/tests/charset.c torture_assert(tctx, !strcsequal_m(NULL, "Foo"), "one NULL"); tctx 78 lib/util/charset/tests/charset.c torture_assert(tctx, !strcsequal_m("foo", NULL), "other NULL"); tctx 79 lib/util/charset/tests/charset.c torture_assert(tctx, strcsequal_m(NULL, NULL), "both NULL"); tctx 83 lib/util/charset/tests/charset.c static bool test_string_replace_m(struct torture_context *tctx) tctx 87 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, data, "cla", "first char replaced"); tctx 90 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, data, "cac", "other chars replaced"); tctx 93 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, data, "cca", "other chars replaced"); tctx 96 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, data, "blala", "no chars replaced"); tctx 101 lib/util/charset/tests/charset.c static bool test_strncasecmp_m(struct torture_context *tctx) tctx 103 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("foo", "bar", 3) != 0, "different strings"); tctx 104 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("foo", "foo", 3) == 0, "same case strings"); tctx 105 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("foo", "Foo", 3) == 0, "different case strings"); tctx 106 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("fool", "Foo", 3) == 0, "different case strings"); tctx 107 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("fool", "Fool", 40) == 0, "over size"); tctx 108 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("BLA", "Fool", 0) == 0, "empty"); tctx 109 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m(NULL, "Foo", 3) != 0, "one NULL"); tctx 110 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("foo", NULL, 3) != 0, "other NULL"); tctx 111 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m(NULL, NULL, 3) == 0, "both NULL"); tctx 115 lib/util/charset/tests/charset.c static bool test_next_token_null(struct torture_context *tctx) tctx 118 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(NULL, buf, " ", 20), "null ptr works"); tctx 122 lib/util/charset/tests/charset.c static bool test_next_token(struct torture_context *tctx) tctx 126 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works"); tctx 127 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "foo", "token matches"); tctx 128 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "bar bla", "ptr modified correctly"); tctx 130 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works"); tctx 131 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "bar", "token matches"); tctx 132 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "bla", "ptr modified correctly"); tctx 134 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works"); tctx 135 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "bla", "token matches"); tctx 136 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly"); tctx 138 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(&teststr, buf, " ", 20), "finding token doesn't work"); tctx 142 lib/util/charset/tests/charset.c static bool test_next_token_implicit_sep(struct torture_context *tctx) tctx 146 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, NULL, 20), "finding token works"); tctx 147 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "foo", "token matches"); tctx 148 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "bar\n bla", "ptr modified correctly"); tctx 150 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, NULL, 20), "finding token works"); tctx 151 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "bar", "token matches"); tctx 152 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, " bla", "ptr modified correctly"); tctx 154 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, NULL, 20), "finding token works"); tctx 155 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "bla", "token matches"); tctx 156 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly"); tctx 158 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(&teststr, buf, NULL, 20), "finding token doesn't work"); tctx 162 lib/util/charset/tests/charset.c static bool test_next_token_seps(struct torture_context *tctx) tctx 166 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, ",", 20), "finding token works"); tctx 167 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "foo bla", "token matches"); tctx 168 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly"); tctx 170 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(&teststr, buf, ",", 20), "finding token doesn't work"); tctx 174 lib/util/charset/tests/charset.c static bool test_next_token_quotes(struct torture_context *tctx) tctx 178 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works"); tctx 179 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "foo bar", "token matches"); tctx 180 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "bla", "ptr modified correctly"); tctx 182 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works"); tctx 183 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "bla", "token matches"); tctx 184 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly"); tctx 186 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(&teststr, buf, " ", 20), "finding token doesn't work"); tctx 190 lib/util/charset/tests/charset.c static bool test_next_token_quote_wrong(struct torture_context *tctx) tctx 194 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works"); tctx 195 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "foo bar bla", "token matches"); tctx 196 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly"); tctx 198 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(&teststr, buf, " ", 20), "finding token doesn't work"); tctx 202 lib/util/charset/tests/charset.c static bool test_strlen_m(struct torture_context *tctx) tctx 204 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m("foo"), 3, "simple len"); tctx 205 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m("foo\x83l"), 6, "extended len"); tctx 206 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m(NULL), 0, "NULL"); tctx 210 lib/util/charset/tests/charset.c static bool test_strlen_m_term(struct torture_context *tctx) tctx 212 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m_term("foo"), 4, "simple len"); tctx 213 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m_term("foo\x83l"), 7, "extended len"); tctx 214 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m(NULL), 0, "NULL"); tctx 218 lib/util/charset/tests/charset.c static bool test_strhaslower(struct torture_context *tctx) tctx 220 lib/util/charset/tests/charset.c torture_assert(tctx, strhaslower("a"), "one low char"); tctx 221 lib/util/charset/tests/charset.c torture_assert(tctx, strhaslower("aB"), "one low, one up char"); tctx 222 lib/util/charset/tests/charset.c torture_assert(tctx, !strhaslower("B"), "one up char"); tctx 223 lib/util/charset/tests/charset.c torture_assert(tctx, !strhaslower(""), "empty string"); tctx 224 lib/util/charset/tests/charset.c torture_assert(tctx, !strhaslower("3"), "one digit"); tctx 228 lib/util/charset/tests/charset.c static bool test_strhasupper(struct torture_context *tctx) tctx 230 lib/util/charset/tests/charset.c torture_assert(tctx, strhasupper("B"), "one up char"); tctx 231 lib/util/charset/tests/charset.c torture_assert(tctx, strhasupper("aB"), "one low, one up char"); tctx 232 lib/util/charset/tests/charset.c torture_assert(tctx, !strhasupper("a"), "one low char"); tctx 233 lib/util/charset/tests/charset.c torture_assert(tctx, !strhasupper(""), "empty string"); tctx 234 lib/util/charset/tests/charset.c torture_assert(tctx, !strhasupper("3"), "one digit"); tctx 238 lib/util/charset/tests/charset.c static bool test_count_chars_m(struct torture_context *tctx) tctx 240 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, count_chars_m("foo", 'o'), 2, "simple"); tctx 241 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, count_chars_m("", 'o'), 0, "empty"); tctx 242 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, count_chars_m("bla", 'o'), 0, "none"); tctx 243 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, count_chars_m("bla", '\0'), 0, "null"); tctx 33 lib/util/charset/tests/iconv.c static bool iconv_untestable(struct torture_context *tctx) tctx 37 lib/util/charset/tests/iconv.c if (!lp_parm_bool(tctx->lp_ctx, NULL, "iconv", "native", true)) tctx 38 lib/util/charset/tests/iconv.c torture_skip(tctx, "system iconv disabled - skipping test"); tctx 42 lib/util/charset/tests/iconv.c torture_skip(tctx, "unable to test - system iconv library does not support UTF-16LE -> UCS-4LE"); tctx 47 lib/util/charset/tests/iconv.c torture_skip(tctx, "unable to test - system iconv library does not support UTF-16LE -> CP850\n"); tctx 285 lib/util/charset/tests/iconv.c static bool test_codepoint(struct torture_context *tctx, unsigned int codepoint) tctx 291 lib/util/charset/tests/iconv.c size = push_codepoint(lp_iconv_convenience(tctx->lp_ctx), (char *)buf, codepoint); tctx 292 lib/util/charset/tests/iconv.c torture_assert(tctx, size != -1 || (codepoint >= 0xd800 && codepoint <= 0x10000), tctx 302 lib/util/charset/tests/iconv.c c = next_codepoint_convenience(lp_iconv_convenience(tctx->lp_ctx), (char *)buf, &size2); tctx 304 lib/util/charset/tests/iconv.c torture_assert(tctx, c == codepoint, tctx 305 lib/util/charset/tests/iconv.c talloc_asprintf(tctx, tctx 308 lib/util/charset/tests/iconv.c torture_assert(tctx, size2 == size, tctx 309 lib/util/charset/tests/iconv.c talloc_asprintf(tctx, "next_codepoint(%u) gave wrong size %d (should be %d)\n", tctx 315 lib/util/charset/tests/iconv.c static bool test_next_codepoint(struct torture_context *tctx) tctx 318 lib/util/charset/tests/iconv.c if (iconv_untestable(tctx)) tctx 322 lib/util/charset/tests/iconv.c if (!test_codepoint(tctx, codepoint)) tctx 328 lib/util/charset/tests/iconv.c static bool test_first_1m(struct torture_context *tctx) tctx 334 lib/util/charset/tests/iconv.c if (iconv_untestable(tctx)) tctx 343 lib/util/charset/tests/iconv.c if (torture_setting_bool(tctx, "progress", true)) { tctx 344 lib/util/charset/tests/iconv.c torture_comment(tctx, "codepoint=%u \r", codepoint); tctx 349 lib/util/charset/tests/iconv.c if (!test_buffer(tctx, inbuf, size, "UTF-8")) tctx 355 lib/util/charset/tests/iconv.c static bool test_random_5m(struct torture_context *tctx) tctx 360 lib/util/charset/tests/iconv.c if (iconv_untestable(tctx)) tctx 368 lib/util/charset/tests/iconv.c if (torture_setting_bool(tctx, "progress", true)) { tctx 369 lib/util/charset/tests/iconv.c torture_comment(tctx, "i=%u \r", i); tctx 388 lib/util/charset/tests/iconv.c if (!test_buffer(tctx, inbuf, size, "UTF-8")) { tctx 393 lib/util/charset/tests/iconv.c if (!test_buffer(tctx, inbuf, size, "CP850")) { tctx 402 lib/util/charset/tests/iconv.c static bool test_string2key(struct torture_context *tctx) tctx 406 lib/util/charset/tests/iconv.c TALLOC_CTX *mem_ctx = talloc_new(tctx); tctx 419 lib/util/charset/tests/iconv.c torture_comment(tctx, "converting random buffer\n"); tctx 422 lib/util/charset/tests/iconv.c torture_fail(tctx, "Failed to convert random buffer\n"); tctx 429 lib/util/charset/tests/iconv.c torture_comment(tctx, "converting fixed buffer to UTF16\n"); tctx 432 lib/util/charset/tests/iconv.c torture_fail(tctx, "Failed to convert fixed buffer to UTF16_MUNGED\n"); tctx 435 lib/util/charset/tests/iconv.c torture_assert(tctx, ret == 20, "conversion should give 20 bytes\n"); tctx 437 lib/util/charset/tests/iconv.c torture_comment(tctx, "converting fixed buffer to UTF8\n"); tctx 440 lib/util/charset/tests/iconv.c torture_fail(tctx, "Failed to convert fixed buffer to UTF8\n"); tctx 443 lib/util/charset/tests/iconv.c torture_assert(tctx, strcmp(correct, out1) == 0, "conversion gave incorrect result\n"); tctx 25 lib/util/tests/data_blob.c static bool test_string(struct torture_context *tctx) tctx 29 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, blob.length, 3, "blob length"); tctx 30 lib/util/tests/data_blob.c torture_assert_str_equal(tctx, (char *)blob.data, "bla", "blob data"); tctx 35 lib/util/tests/data_blob.c static bool test_string_null(struct torture_context *tctx) tctx 39 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, blob.length, 4, "blob length"); tctx 40 lib/util/tests/data_blob.c torture_assert_str_equal(tctx, (char *)blob.data, "bla", "blob data"); tctx 45 lib/util/tests/data_blob.c static bool test_zero(struct torture_context *tctx) tctx 48 lib/util/tests/data_blob.c DATA_BLOB z = data_blob_talloc_zero(tctx, 4); tctx 49 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, z.length, 4, "length"); tctx 51 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, z.data[i], 0, "contents"); tctx 57 lib/util/tests/data_blob.c static bool test_clear(struct torture_context *tctx) tctx 61 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, z.length, 6, "length"); tctx 64 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, z.data[i], 0, "contents"); tctx 69 lib/util/tests/data_blob.c static bool test_cmp(struct torture_context *tctx) tctx 73 lib/util/tests/data_blob.c torture_assert(tctx, data_blob_cmp(&a, &b) != 0, "cmp different"); tctx 74 lib/util/tests/data_blob.c torture_assert(tctx, data_blob_cmp(&a, &a) == 0, "cmp self"); tctx 78 lib/util/tests/data_blob.c static bool test_hex_string(struct torture_context *tctx) tctx 81 lib/util/tests/data_blob.c torture_assert_str_equal(tctx, data_blob_hex_string(tctx, &a), "0C0A0F0E", "hex string"); tctx 33 lib/util/tests/file.c static bool test_file_load_save(struct torture_context *tctx) tctx 37 lib/util/tests/file.c TALLOC_CTX *mem_ctx = tctx; tctx 39 lib/util/tests/file.c torture_assert(tctx, file_save(TEST_FILENAME, TEST_DATA, strlen(TEST_DATA)), tctx 42 lib/util/tests/file.c torture_assert_file_contains_text(tctx, TEST_FILENAME, TEST_DATA, tctx 46 lib/util/tests/file.c torture_assert(tctx, data, "loading file"); tctx 48 lib/util/tests/file.c torture_assert_int_equal(tctx, len, strlen(TEST_DATA), "Length"); tctx 50 lib/util/tests/file.c torture_assert_mem_equal(tctx, data, TEST_DATA, len, "Contents"); tctx 54 lib/util/tests/file.c torture_assert_int_equal(tctx, len, 5, "Length"); tctx 56 lib/util/tests/file.c torture_assert_mem_equal(tctx, data, TEST_DATA, len, "Contents"); tctx 63 lib/util/tests/file.c static bool test_afdgets(struct torture_context *tctx) tctx 67 lib/util/tests/file.c TALLOC_CTX *mem_ctx = tctx; tctx 69 lib/util/tests/file.c torture_assert(tctx, file_save(TEST_FILENAME, (const void *)TEST_DATA, tctx 75 lib/util/tests/file.c torture_assert(tctx, fd != -1, "opening file"); tctx 78 lib/util/tests/file.c torture_assert(tctx, strcmp(line, TEST_LINE1) == 0, "line 1 mismatch"); tctx 81 lib/util/tests/file.c torture_assert(tctx, strcmp(line, TEST_LINE2) == 0, "line 2 mismatch"); tctx 84 lib/util/tests/file.c torture_assert(tctx, strcmp(line, TEST_LINE3) == 0, "line 3 mismatch"); tctx 30 lib/util/tests/genrand.c static bool test_reseed_callback(struct torture_context *tctx) tctx 36 lib/util/tests/genrand.c static bool test_check_password_quality(struct torture_context *tctx) tctx 38 lib/util/tests/genrand.c torture_assert(tctx, !check_password_quality(""), "empty password"); tctx 39 lib/util/tests/genrand.c torture_assert(tctx, !check_password_quality("a"), "one char password"); tctx 40 lib/util/tests/genrand.c torture_assert(tctx, !check_password_quality("aaaaaaaaaaaa"), "same char password"); tctx 41 lib/util/tests/genrand.c torture_assert(tctx, !check_password_quality("BLA"), "multiple upcases password"); tctx 42 lib/util/tests/genrand.c torture_assert(tctx, !check_password_quality("123"), "digits only"); tctx 43 lib/util/tests/genrand.c torture_assert(tctx, check_password_quality("A2e"), "valid"); tctx 44 lib/util/tests/genrand.c torture_assert(tctx, check_password_quality("BA2eLi443"), "valid"); tctx 48 lib/util/tests/genrand.c static bool test_generate_random_str(struct torture_context *tctx) tctx 52 lib/util/tests/genrand.c torture_assert_int_equal(tctx, strlen(r), 10, "right length generated"); tctx 54 lib/util/tests/genrand.c torture_assert_int_equal(tctx, strlen(r), 5, "right length generated"); tctx 25 lib/util/tests/idtree.c static bool torture_local_idtree_simple(struct torture_context *tctx) tctx 33 lib/util/tests/idtree.c TALLOC_CTX *mem_ctx = tctx; tctx 49 lib/util/tests/idtree.c torture_fail(tctx, talloc_asprintf(tctx, tctx 55 lib/util/tests/idtree.c torture_fail(tctx, talloc_asprintf(tctx, tctx 64 lib/util/tests/idtree.c torture_fail(tctx, tctx 65 lib/util/tests/idtree.c talloc_asprintf(tctx, tctx 73 lib/util/tests/idtree.c torture_fail(tctx, talloc_asprintf(tctx, tctx 83 lib/util/tests/idtree.c torture_comment(tctx, "done %d random ops\n", i); tctx 88 lib/util/tests/idtree.c torture_fail(tctx, talloc_asprintf(tctx, tctx 98 lib/util/tests/idtree.c torture_assert(tctx, ret != -1, "idr_get_new_above failed"); tctx 102 lib/util/tests/idtree.c torture_assert_int_equal(tctx, ret, 0x10000-2, "idr_get_new_above failed"); tctx 104 lib/util/tests/idtree.c torture_assert_int_equal(tctx, ret, 0x10000-1, "idr_get_new_above failed"); tctx 106 lib/util/tests/idtree.c torture_assert_int_equal(tctx, ret, 0x10000, "idr_get_new_above failed"); tctx 108 lib/util/tests/idtree.c torture_assert_int_equal(tctx, ret, -1, "idr_get_new_above succeeded above limit"); tctx 110 lib/util/tests/idtree.c torture_assert_int_equal(tctx, ret, -1, "idr_get_new_above succeeded above limit"); tctx 112 lib/util/tests/idtree.c torture_comment(tctx, "cleaned up\n"); tctx 25 lib/util/tests/str.c static bool test_string_sub_simple(struct torture_context *tctx) tctx 30 lib/util/tests/str.c torture_assert_str_equal(tctx, tmp, "barbar", "invalid sub"); tctx 34 lib/util/tests/str.c static bool test_string_sub_multiple(struct torture_context *tctx) tctx 39 lib/util/tests/str.c torture_assert_str_equal(tctx, tmp, "barblabar", "invalid sub"); tctx 43 lib/util/tests/str.c static bool test_string_sub_longer(struct torture_context *tctx) tctx 48 lib/util/tests/str.c torture_assert_str_equal(tctx, tmp, "bliebla", "invalid sub"); tctx 52 lib/util/tests/str.c static bool test_string_sub_shorter(struct torture_context *tctx) tctx 57 lib/util/tests/str.c torture_assert_str_equal(tctx, tmp, "blbla", "invalid sub"); tctx 61 lib/util/tests/str.c static bool test_string_sub_special_char(struct torture_context *tctx) tctx 66 lib/util/tests/str.c torture_assert_str_equal(tctx, tmp, "_b_lbla", "invalid sub"); tctx 70 lib/util/tests/str.c static bool test_string_sub_talloc_simple(struct torture_context *tctx) tctx 74 lib/util/tests/str.c t = string_sub_talloc(tctx, "foobla", "foo", "bl"); tctx 76 lib/util/tests/str.c torture_assert_str_equal(tctx, t, "blbla", "invalid sub"); tctx 81 lib/util/tests/str.c static bool test_string_sub_talloc_multiple(struct torture_context *tctx) tctx 85 lib/util/tests/str.c t = string_sub_talloc(tctx, "fooblafoo", "foo", "aapnootmies"); tctx 87 lib/util/tests/str.c torture_assert_str_equal(tctx, t, "aapnootmiesblaaapnootmies", tctx 35 lib/util/tests/strlist.c static bool test_lists_shell(struct torture_context *tctx, tctx 41 lib/util/tests/strlist.c TALLOC_CTX *mem_ctx = tctx; tctx 62 lib/util/tests/strlist.c torture_assert(tctx, match, talloc_asprintf(tctx, tctx 67 lib/util/tests/strlist.c static bool test_list_copy(struct torture_context *tctx) tctx 74 lib/util/tests/strlist.c result = (const char **)str_list_copy(tctx, list); tctx 75 lib/util/tests/strlist.c torture_assert_int_equal(tctx, str_list_length(result), 2, "list length"); tctx 76 lib/util/tests/strlist.c torture_assert_str_equal(tctx, result[0], "foo", "element 0"); tctx 77 lib/util/tests/strlist.c torture_assert_str_equal(tctx, result[1], "bar", "element 1"); tctx 78 lib/util/tests/strlist.c torture_assert_str_equal(tctx, result[2], NULL, "element 2"); tctx 80 lib/util/tests/strlist.c result = (const char **)str_list_copy(tctx, empty_list); tctx 81 lib/util/tests/strlist.c torture_assert_int_equal(tctx, str_list_length(result), 0, "list length"); tctx 82 lib/util/tests/strlist.c torture_assert_str_equal(tctx, result[0], NULL, "element 0"); tctx 84 lib/util/tests/strlist.c result = (const char **)str_list_copy(tctx, null_list); tctx 85 lib/util/tests/strlist.c torture_assert(tctx, result == NULL, "result NULL"); tctx 25 lib/util/tests/time.c static bool test_null_time(struct torture_context *tctx) tctx 27 lib/util/tests/time.c torture_assert(tctx, null_time(0), "0"); tctx 28 lib/util/tests/time.c torture_assert(tctx, null_time(0xFFFFFFFF), "0xFFFFFFFF"); tctx 29 lib/util/tests/time.c torture_assert(tctx, null_time(-1), "-1"); tctx 30 lib/util/tests/time.c torture_assert(tctx, !null_time(42), "42"); tctx 34 lib/util/tests/time.c static bool test_null_nttime(struct torture_context *tctx) tctx 36 lib/util/tests/time.c torture_assert(tctx, null_nttime(-1), "-1"); tctx 37 lib/util/tests/time.c torture_assert(tctx, null_nttime(-1), "-1"); tctx 38 lib/util/tests/time.c torture_assert(tctx, !null_nttime(42), "42"); tctx 43 lib/util/tests/time.c static bool test_http_timestring(struct torture_context *tctx) tctx 47 lib/util/tests/time.c result = http_timestring(tctx, 42); tctx 48 lib/util/tests/time.c torture_assert(tctx, !strncmp(start, result, tctx 50 lib/util/tests/time.c torture_assert_str_equal(tctx, "never", tctx 51 lib/util/tests/time.c http_timestring(tctx, get_time_t_max()), "42"); tctx 55 lib/util/tests/time.c static bool test_timestring(struct torture_context *tctx) tctx 58 lib/util/tests/time.c char *result = timestring(tctx, 42); tctx 59 lib/util/tests/time.c torture_assert(tctx, !strncmp(start, result, strlen(start)), tctx 64 lib/util/tests/time.c static bool test_get_time_zone(struct torture_context *tctx) tctx 75 lib/util/tests/time.c torture_assert_int_equal(tctx, old_offset+60*42, new_offset, tctx 91 source3/libsmb/smbencrypt.c struct MD5Context tctx; tctx 97 source3/libsmb/smbencrypt.c MD5Init(&tctx); tctx 98 source3/libsmb/smbencrypt.c MD5Update(&tctx, array, 32); tctx 99 source3/libsmb/smbencrypt.c MD5Final(hash_out, &tctx); tctx 592 source3/libsmb/smbencrypt.c struct MD5Context tctx; tctx 597 source3/libsmb/smbencrypt.c MD5Init(&tctx); tctx 598 source3/libsmb/smbencrypt.c MD5Update(&tctx, &pw_buf[516], 16); tctx 599 source3/libsmb/smbencrypt.c MD5Update(&tctx, psession_key->data, psession_key->length); tctx 600 source3/libsmb/smbencrypt.c MD5Final(key_out, &tctx); tctx 24 source4/auth/credentials/tests/simple.c static bool test_init(struct torture_context *tctx) tctx 26 source4/auth/credentials/tests/simple.c struct cli_credentials *creds = cli_credentials_init(tctx); tctx 30 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, "BLA", cli_credentials_get_domain(creds), tctx 35 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, "someuser", tctx 41 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, "p4ssw0rd", tctx 48 source4/auth/credentials/tests/simple.c static bool test_init_anonymous(struct torture_context *tctx) tctx 50 source4/auth/credentials/tests/simple.c struct cli_credentials *creds = cli_credentials_init_anon(tctx); tctx 52 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_domain(creds), tctx 55 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_username(creds), tctx 58 source4/auth/credentials/tests/simple.c torture_assert(tctx, cli_credentials_get_password(creds) == NULL, tctx 64 source4/auth/credentials/tests/simple.c static bool test_parse_string(struct torture_context *tctx) tctx 66 source4/auth/credentials/tests/simple.c struct cli_credentials *creds = cli_credentials_init_anon(tctx); tctx 71 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_domain(creds), tctx 74 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_username(creds), tctx 77 source4/auth/credentials/tests/simple.c torture_assert(tctx, cli_credentials_get_password(creds) == NULL, tctx 84 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_domain(creds), tctx 87 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_username(creds), tctx 90 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_password(creds), tctx 97 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_realm(creds), tctx 100 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, tctx 101 source4/auth/credentials/tests/simple.c cli_credentials_get_principal(creds, tctx), tctx 112 source4/lib/messaging/tests/irpc.c static bool test_echodata(struct torture_context *tctx, tctx 119 source4/lib/messaging/tests/irpc.c TALLOC_CTX *mem_ctx = tctx; tctx 128 source4/lib/messaging/tests/irpc.c torture_assert_ntstatus_ok(tctx, status, "EchoData failed"); tctx 133 source4/lib/messaging/tests/irpc.c torture_fail(tctx, "EchoData wrong answer"); tctx 136 source4/lib/messaging/tests/irpc.c torture_comment(tctx, "Echo '%*.*s' -> '%*.*s'\n", tctx 163 source4/lib/messaging/tests/irpc.c static bool test_speed(struct torture_context *tctx, tctx 172 source4/lib/messaging/tests/irpc.c TALLOC_CTX *mem_ctx = tctx; tctx 173 source4/lib/messaging/tests/irpc.c int timelimit = torture_setting_int(tctx, "timelimit", 10); tctx 179 source4/lib/messaging/tests/irpc.c torture_comment(tctx, "Sending echo for %d seconds\n", timelimit); tctx 186 source4/lib/messaging/tests/irpc.c torture_assert(tctx, irpc != NULL, "AddOne send failed"); tctx 198 source4/lib/messaging/tests/irpc.c torture_comment(tctx, "waiting for %d remaining replies (done %d)\n", tctx 204 source4/lib/messaging/tests/irpc.c torture_assert_int_equal(tctx, ping_count, pong_count, "ping test failed"); tctx 206 source4/lib/messaging/tests/irpc.c torture_comment(tctx, "echo rate of %.0f messages/sec\n", tctx 212 source4/lib/messaging/tests/irpc.c static bool irpc_setup(struct torture_context *tctx, void **_data) tctx 216 source4/lib/messaging/tests/irpc.c *_data = data = talloc(tctx, struct irpc_test_data); tctx 218 source4/lib/messaging/tests/irpc.c lp_set_cmdline(tctx->lp_ctx, "pid directory", "piddir.tmp"); tctx 220 source4/lib/messaging/tests/irpc.c data->ev = tctx->ev; tctx 221 source4/lib/messaging/tests/irpc.c torture_assert(tctx, data->msg_ctx1 = tctx 222 source4/lib/messaging/tests/irpc.c messaging_init(tctx, tctx 223 source4/lib/messaging/tests/irpc.c lp_messaging_path(tctx, tctx->lp_ctx), tctx 225 source4/lib/messaging/tests/irpc.c lp_iconv_convenience(tctx->lp_ctx), tctx 229 source4/lib/messaging/tests/irpc.c torture_assert(tctx, data->msg_ctx2 = tctx 230 source4/lib/messaging/tests/irpc.c messaging_init(tctx, tctx 231 source4/lib/messaging/tests/irpc.c lp_messaging_path(tctx, tctx->lp_ctx), tctx 233 source4/lib/messaging/tests/irpc.c lp_iconv_convenience(tctx->lp_ctx), tctx 59 source4/lib/messaging/tests/messaging.c static bool test_ping_speed(struct torture_context *tctx) tctx 67 source4/lib/messaging/tests/messaging.c int timelimit = torture_setting_int(tctx, "timelimit", 10); tctx 70 source4/lib/messaging/tests/messaging.c lp_set_cmdline(tctx->lp_ctx, "pid directory", "piddir.tmp"); tctx 72 source4/lib/messaging/tests/messaging.c ev = tctx->ev; tctx 74 source4/lib/messaging/tests/messaging.c msg_server_ctx = messaging_init(tctx, tctx 75 source4/lib/messaging/tests/messaging.c lp_messaging_path(tctx, tctx->lp_ctx), tctx 77 source4/lib/messaging/tests/messaging.c lp_iconv_convenience(tctx->lp_ctx), tctx 80 source4/lib/messaging/tests/messaging.c torture_assert(tctx, msg_server_ctx != NULL, "Failed to init ping messaging context"); tctx 83 source4/lib/messaging/tests/messaging.c messaging_register_tmp(msg_server_ctx, tctx, exit_message, &msg_exit); tctx 85 source4/lib/messaging/tests/messaging.c msg_client_ctx = messaging_init(tctx, tctx 86 source4/lib/messaging/tests/messaging.c lp_messaging_path(tctx, tctx->lp_ctx), tctx 88 source4/lib/messaging/tests/messaging.c lp_iconv_convenience(tctx->lp_ctx), tctx 91 source4/lib/messaging/tests/messaging.c torture_assert(tctx, msg_client_ctx != NULL, tctx 98 source4/lib/messaging/tests/messaging.c torture_comment(tctx, "Sending pings for %d seconds\n", timelimit); tctx 109 source4/lib/messaging/tests/messaging.c torture_assert_ntstatus_ok(tctx, status1, "msg1 failed"); tctx 112 source4/lib/messaging/tests/messaging.c torture_assert_ntstatus_ok(tctx, status2, "msg2 failed"); tctx 120 source4/lib/messaging/tests/messaging.c torture_comment(tctx, "waiting for %d remaining replies (done %d)\n", tctx 126 source4/lib/messaging/tests/messaging.c torture_comment(tctx, "sending exit\n"); tctx 129 source4/lib/messaging/tests/messaging.c torture_assert_int_equal(tctx, ping_count, pong_count, "ping test failed"); tctx 131 source4/lib/messaging/tests/messaging.c torture_comment(tctx, "ping rate of %.0f messages/sec\n", tctx 38 source4/lib/registry/tests/diff.c static bool test_generate_diff(struct torture_context *tctx, void *tcase_data) tctx 46 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "reg_generate_diff"); tctx 52 source4/lib/registry/tests/diff.c static bool test_diff_load(struct torture_context *tctx, void *tcase_data) tctx 60 source4/lib/registry/tests/diff.c ic = lp_iconv_convenience(tctx->lp_ctx); tctx 63 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "reg_diff_load"); tctx 68 source4/lib/registry/tests/diff.c static bool test_diff_apply(struct torture_context *tctx, void *tcase_data) tctx 74 source4/lib/registry/tests/diff.c error = reg_diff_apply(td->r1_ctx, lp_iconv_convenience(tctx->lp_ctx), td->filename); tctx 75 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "reg_diff_apply"); tctx 78 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKEY_LOCAL_MACHINE failed"); tctx 83 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\Software failed"); tctx 85 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\Software\\Microsoft failed"); tctx 87 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\Microsoft\\Windows failed"); tctx 89 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\Windows\\CurrentVersion failed"); tctx 91 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\CurrentVersion\\Policies failed"); tctx 93 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\Policies\\Explorer failed"); tctx 107 source4/lib/registry/tests/diff.c static bool test_generate_diff_key_add(struct torture_context *tctx, void *tcase_data) tctx 118 source4/lib/registry/tests/diff.c if (W_ERROR_IS_OK(reg_generate_diff_key(&rk, NULL, "bla", &cb, tctx))) tctx 121 source4/lib/registry/tests/diff.c torture_assert_str_equal(tctx, added_key, "bla", "key added"); tctx 126 source4/lib/registry/tests/diff.c static bool test_generate_diff_key_null(struct torture_context *tctx, void *tcase_data) tctx 153 source4/lib/registry/tests/diff.c static bool diff_setup_tcase(struct torture_context *tctx, void **data) tctx 165 source4/lib/registry/tests/diff.c td = talloc(tctx, struct diff_tcase_data); tctx 168 source4/lib/registry/tests/diff.c error = reg_open_local(tctx, &r1_ctx); tctx 169 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening registry 1 for patch tests failed"); tctx 171 source4/lib/registry/tests/diff.c error = reg_open_local(tctx, &r2_ctx); tctx 172 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening registry 2 for patch tests failed"); tctx 175 source4/lib/registry/tests/diff.c status = torture_temp_dir(tctx, "patchfile", &td->tempdir); tctx 176 source4/lib/registry/tests/diff.c torture_assert_ntstatus_ok(tctx, status, "Creating temp dir failed"); tctx 179 source4/lib/registry/tests/diff.c filename = talloc_asprintf(tctx, "%s/r1_local_machine.ldb", td->tempdir); tctx 180 source4/lib/registry/tests/diff.c error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r1_hklm); tctx 181 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening local machine file failed"); tctx 184 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Mounting hive failed"); tctx 186 source4/lib/registry/tests/diff.c filename = talloc_asprintf(tctx, "%s/r1_current_user.ldb", td->tempdir); tctx 187 source4/lib/registry/tests/diff.c error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r1_hkcu); tctx 188 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening current user file failed"); tctx 191 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Mounting hive failed"); tctx 194 source4/lib/registry/tests/diff.c filename = talloc_asprintf(tctx, "%s/r2_local_machine.ldb", td->tempdir); tctx 195 source4/lib/registry/tests/diff.c error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r2_hklm); tctx 196 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening local machine file failed"); tctx 199 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Mounting hive failed"); tctx 201 source4/lib/registry/tests/diff.c filename = talloc_asprintf(tctx, "%s/r2_current_user.ldb", td->tempdir); tctx 202 source4/lib/registry/tests/diff.c error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r2_hkcu); tctx 203 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening current user file failed"); tctx 206 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Mounting hive failed"); tctx 209 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKEY_CURRENT_USER failed"); tctx 211 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKCU\\Network failed"); tctx 213 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKCU\\Network\\L failed"); tctx 216 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKEY_LOCAL_MACHINE failed"); tctx 218 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\Sofware failed"); tctx 220 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\Software\\Microsoft failed"); tctx 222 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\Software\\Microsoft\\Windows failed"); tctx 224 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\..\\Windows\\CurrentVersion failed"); tctx 226 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\..\\CurrentVersion\\Policies failed"); tctx 228 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\..\\Policies\\Explorer failed"); tctx 246 source4/lib/registry/tests/diff.c static bool diff_setup_preg_tcase (struct torture_context *tctx, void **data) tctx 252 source4/lib/registry/tests/diff.c diff_setup_tcase(tctx, data); tctx 255 source4/lib/registry/tests/diff.c ic = lp_iconv_convenience(tctx->lp_ctx); tctx 257 source4/lib/registry/tests/diff.c td->filename = talloc_asprintf(tctx, "%s/test.pol", td->tempdir); tctx 258 source4/lib/registry/tests/diff.c error = reg_preg_diff_save(tctx, td->filename, ic, &td->callbacks, &td->callback_data); tctx 259 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "reg_preg_diff_save"); tctx 264 source4/lib/registry/tests/diff.c static bool diff_setup_dotreg_tcase (struct torture_context *tctx, void **data) tctx 270 source4/lib/registry/tests/diff.c diff_setup_tcase(tctx, data); tctx 273 source4/lib/registry/tests/diff.c ic = lp_iconv_convenience(tctx->lp_ctx); tctx 275 source4/lib/registry/tests/diff.c td->filename = talloc_asprintf(tctx, "%s/test.reg", td->tempdir); tctx 276 source4/lib/registry/tests/diff.c error = reg_dotreg_diff_save(tctx, td->filename, ic, &td->callbacks, &td->callback_data); tctx 277 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "reg_dotreg_diff_save"); tctx 31 source4/lib/registry/tests/hive.c static bool test_del_nonexistant_key(struct torture_context *tctx, tctx 36 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, tctx 42 source4/lib/registry/tests/hive.c static bool test_keyinfo_root(struct torture_context *tctx, tctx 51 source4/lib/registry/tests/hive.c error = hive_key_get_info(tctx, root, NULL, &num_subkeys, &num_values, tctx 53 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_num_subkeys()"); tctx 55 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, num_subkeys, 0, tctx 58 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_num_values"); tctx 60 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, num_values, 0, tctx 66 source4/lib/registry/tests/hive.c static bool test_keyinfo_nums(struct torture_context *tctx, void *test_data) tctx 75 source4/lib/registry/tests/hive.c error = hive_key_add_name(tctx, root, "Nested Keyll", NULL, tctx 77 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name"); tctx 80 source4/lib/registry/tests/hive.c data_blob_talloc(tctx, data, sizeof(data))); tctx 81 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value"); tctx 85 source4/lib/registry/tests/hive.c error = hive_key_get_info(tctx, root, NULL, &num_subkeys, &num_values, tctx 87 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_num_subkeys()"); tctx 89 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, num_subkeys, 1, "subkey count"); tctx 91 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_num_values"); tctx 93 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, num_values, 1, "value count"); tctx 98 source4/lib/registry/tests/hive.c static bool test_add_subkey(struct torture_context *tctx, tctx 104 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx; tctx 108 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name"); tctx 111 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_del"); tctx 116 source4/lib/registry/tests/hive.c static bool test_del_recursive(struct torture_context *tctx, tctx 123 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx; tctx 130 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name"); tctx 135 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name"); tctx 140 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value"); tctx 144 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_del"); tctx 149 source4/lib/registry/tests/hive.c static bool test_flush_key(struct torture_context *tctx, void *test_data) tctx 153 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, hive_key_flush(root), "flush key"); tctx 158 source4/lib/registry/tests/hive.c static bool test_del_key(struct torture_context *tctx, const void *test_data) tctx 163 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx; tctx 167 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name"); tctx 170 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_del"); tctx 173 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, "reg_key_del"); tctx 178 source4/lib/registry/tests/hive.c static bool test_set_value(struct torture_context *tctx, tctx 184 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx; tctx 190 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name"); tctx 194 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value"); tctx 199 source4/lib/registry/tests/hive.c static bool test_get_value(struct torture_context *tctx, const void *test_data) tctx 204 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx; tctx 213 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name"); tctx 216 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, tctx 221 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value"); tctx 224 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "getting value"); tctx 226 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, value.length, 4, "value length"); tctx 227 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, type, REG_DWORD, "value type"); tctx 229 source4/lib/registry/tests/hive.c torture_assert_mem_equal(tctx, &data, value.data, sizeof(uint32_t), tctx 235 source4/lib/registry/tests/hive.c static bool test_del_value(struct torture_context *tctx, const void *test_data) tctx 240 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx; tctx 249 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name"); tctx 253 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value"); tctx 256 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "deleting value"); tctx 259 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, "getting value"); tctx 262 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, tctx 268 source4/lib/registry/tests/hive.c static bool test_list_values(struct torture_context *tctx, tctx 274 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx; tctx 284 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name"); tctx 288 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value"); tctx 292 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "getting value"); tctx 294 source4/lib/registry/tests/hive.c torture_assert_str_equal(tctx, name, "Answer", "value name"); tctx 296 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, value.length, 4, "value length"); tctx 297 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, type, REG_DWORD, "value type"); tctx 300 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, data_val, IVAL(value.data, 0), "value data"); tctx 304 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS, tctx 310 source4/lib/registry/tests/hive.c static bool test_hive_security(struct torture_context *tctx, const void *_data) tctx 317 source4/lib/registry/tests/hive.c osd = security_descriptor_dacl_create(tctx, tctx 327 source4/lib/registry/tests/hive.c error = hive_key_add_name(tctx, root, "SecurityKey", NULL, tctx 329 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name"); tctx 331 source4/lib/registry/tests/hive.c error = hive_get_sec_desc(tctx, subkey, &nsd); tctx 332 source4/lib/registry/tests/hive.c torture_assert_werr_ok (tctx, error, "getting security descriptor"); tctx 334 source4/lib/registry/tests/hive.c torture_assert(tctx, security_descriptor_equal(osd, nsd), tctx 339 source4/lib/registry/tests/hive.c osd = security_descriptor_dacl_create(tctx, tctx 349 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "setting security descriptor"); tctx 351 source4/lib/registry/tests/hive.c error = hive_get_sec_desc(tctx, subkey, &nsd); tctx 352 source4/lib/registry/tests/hive.c torture_assert_werr_ok (tctx, error, "getting security descriptor"); tctx 354 source4/lib/registry/tests/hive.c torture_assert(tctx, security_descriptor_equal(osd, nsd), tctx 391 source4/lib/registry/tests/hive.c static bool hive_setup_dir(struct torture_context *tctx, void **data) tctx 398 source4/lib/registry/tests/hive.c status = torture_temp_dir(tctx, "hive-dir", &dirname); tctx 404 source4/lib/registry/tests/hive.c error = reg_create_directory(tctx, dirname, &key); tctx 415 source4/lib/registry/tests/hive.c static bool hive_setup_ldb(struct torture_context *tctx, void **data) tctx 422 source4/lib/registry/tests/hive.c status = torture_temp_dir(tctx, "hive-ldb", &dirname); tctx 428 source4/lib/registry/tests/hive.c error = reg_open_ldb_file(tctx, dirname, NULL, NULL, tctx->ev, tctx->lp_ctx, &key); tctx 439 source4/lib/registry/tests/hive.c static bool hive_setup_regf(struct torture_context *tctx, void **data) tctx 446 source4/lib/registry/tests/hive.c status = torture_temp_dir(tctx, "hive-regf", &dirname); tctx 452 source4/lib/registry/tests/hive.c error = reg_create_regf_file(tctx, lp_iconv_convenience(tctx->lp_ctx), tctx 464 source4/lib/registry/tests/hive.c static bool test_dir_refuses_null_location(struct torture_context *tctx) tctx 466 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, WERR_INVALID_PARAM, tctx 33 source4/lib/registry/tests/registry.c static bool test_get_predefined(struct torture_context *tctx, void *_data) tctx 40 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, tctx 48 source4/lib/registry/tests/registry.c static bool test_get_predefined_unknown(struct torture_context *tctx, tctx 56 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, tctx 61 source4/lib/registry/tests/registry.c static bool test_predef_key_by_name(struct torture_context *tctx, void *_data) tctx 69 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, tctx 74 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, tctx 80 source4/lib/registry/tests/registry.c static bool test_predef_key_by_name_invalid(struct torture_context *tctx, tctx 88 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, tctx 96 source4/lib/registry/tests/registry.c static bool test_create_subkey(struct torture_context *tctx, void *_data) tctx 103 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, tctx 108 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code"); tctx 109 source4/lib/registry/tests/registry.c torture_assert(tctx, newkey != NULL, "Creating new key"); tctx 117 source4/lib/registry/tests/registry.c static bool test_create_nested_subkey(struct torture_context *tctx, void *_data) tctx 124 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, tctx 129 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code"); tctx 130 source4/lib/registry/tests/registry.c torture_assert(tctx, newkey1 != NULL, "Creating new key"); tctx 134 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code"); tctx 135 source4/lib/registry/tests/registry.c torture_assert(tctx, newkey2 != NULL, "Creating new key"); tctx 143 source4/lib/registry/tests/registry.c static bool test_key_add_abs_top(struct torture_context *tctx, void *_data) tctx 149 source4/lib/registry/tests/registry.c error = reg_key_add_abs(tctx, rctx, "HKEY_CLASSES_ROOT", 0, NULL, tctx 151 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_ALREADY_EXISTS, tctx 160 source4/lib/registry/tests/registry.c static bool test_key_add_abs(struct torture_context *tctx, void *_data) tctx 166 source4/lib/registry/tests/registry.c error = reg_key_add_abs(tctx, rctx, "HKEY_CLASSES_ROOT\\bloe", 0, NULL, tctx 168 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "create lowest"); tctx 170 source4/lib/registry/tests/registry.c error = reg_key_add_abs(tctx, rctx, "HKEY_CLASSES_ROOT\\bloe\\bla", 0, tctx 172 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "create nested"); tctx 175 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, tctx 178 source4/lib/registry/tests/registry.c error = reg_open_key(tctx, root, "bloe", &result2); tctx 179 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "opening key"); tctx 181 source4/lib/registry/tests/registry.c error = reg_open_key(tctx, root, "bloe\\bla", &result2); tctx 182 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "opening key"); tctx 188 source4/lib/registry/tests/registry.c static bool test_del_key(struct torture_context *tctx, void *_data) tctx 195 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, tctx 200 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code"); tctx 201 source4/lib/registry/tests/registry.c torture_assert(tctx, newkey != NULL, "Creating new key"); tctx 204 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Delete key"); tctx 207 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, tctx 217 source4/lib/registry/tests/registry.c static bool create_test_key(struct torture_context *tctx, tctx 226 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, tctx 230 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code"); tctx 236 source4/lib/registry/tests/registry.c static bool test_flush_key(struct torture_context *tctx, void *_data) tctx 242 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Bremen", &root, &subkey)) tctx 246 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "flush key"); tctx 248 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, reg_key_flush(NULL), tctx 254 source4/lib/registry/tests/registry.c static bool test_query_key(struct torture_context *tctx, void *_data) tctx 263 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Munchen", &root, &subkey)) tctx 266 source4/lib/registry/tests/registry.c error = reg_key_get_info(tctx, subkey, &classname, tctx 270 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "get info key"); tctx 271 source4/lib/registry/tests/registry.c torture_assert(tctx, classname == NULL, "classname"); tctx 272 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, num_subkeys, 0, "num subkeys"); tctx 273 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, num_values, 0, "num values"); tctx 278 source4/lib/registry/tests/registry.c static bool test_query_key_nums(struct torture_context *tctx, void *_data) tctx 287 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Berlin", &root, &subkey1)) tctx 292 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code"); tctx 295 source4/lib/registry/tests/registry.c data_blob_talloc(tctx, &data, sizeof(data))); tctx 296 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "set value"); tctx 298 source4/lib/registry/tests/registry.c error = reg_key_get_info(tctx, subkey1, NULL, &num_subkeys, tctx 301 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "get info key"); tctx 302 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, num_subkeys, 1, "num subkeys"); tctx 303 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, num_values, 1, "num values"); tctx 313 source4/lib/registry/tests/registry.c static bool test_list_subkeys(struct torture_context *tctx, void *_data) tctx 321 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Goettingen", &root, &subkey)) tctx 324 source4/lib/registry/tests/registry.c error = reg_key_get_subkey_by_index(tctx, root, 0, &name, &classname, tctx 327 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Enum keys return code"); tctx 328 source4/lib/registry/tests/registry.c torture_assert_str_equal(tctx, name, "Goettingen", "Enum keys data"); tctx 331 source4/lib/registry/tests/registry.c error = reg_key_get_subkey_by_index(tctx, root, 0, NULL, NULL, NULL); tctx 333 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, tctx 336 source4/lib/registry/tests/registry.c error = reg_key_get_subkey_by_index(tctx, root, 1, NULL, NULL, NULL); tctx 338 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS, tctx 341 source4/lib/registry/tests/registry.c error = reg_key_get_subkey_by_index(tctx, subkey, 0, NULL, NULL, NULL); tctx 343 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS, tctx 352 source4/lib/registry/tests/registry.c static bool test_set_value(struct torture_context *tctx, void *_data) tctx 361 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Dusseldorf", &root, &subkey)) tctx 365 source4/lib/registry/tests/registry.c data_blob_talloc(tctx, data, sizeof(data))); tctx 366 source4/lib/registry/tests/registry.c torture_assert_werr_ok (tctx, error, "setting value"); tctx 374 source4/lib/registry/tests/registry.c static bool test_security(struct torture_context *tctx, void *_data) tctx 381 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Düsseldorf", &root, &subkey)) tctx 384 source4/lib/registry/tests/registry.c osd = security_descriptor_dacl_create(tctx, tctx 394 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "setting security descriptor"); tctx 396 source4/lib/registry/tests/registry.c error = reg_get_sec_desc(tctx, subkey, &nsd); tctx 397 source4/lib/registry/tests/registry.c torture_assert_werr_ok (tctx, error, "getting security descriptor"); tctx 399 source4/lib/registry/tests/registry.c torture_assert(tctx, security_descriptor_equal(osd, nsd), tctx 408 source4/lib/registry/tests/registry.c static bool test_get_value(struct torture_context *tctx, void *_data) tctx 418 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Duisburg", &root, &subkey)) tctx 421 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__, &type, tctx 423 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, tctx 427 source4/lib/registry/tests/registry.c data_blob_talloc(tctx, value, sizeof(value))); tctx 428 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "setting value"); tctx 430 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__, &type, tctx 432 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "getting value"); tctx 434 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, sizeof(value), data.length, "value length ok"); tctx 435 source4/lib/registry/tests/registry.c torture_assert_mem_equal(tctx, data.data, value, sizeof(value), tctx 437 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, REG_DWORD, type, "value type"); tctx 445 source4/lib/registry/tests/registry.c static bool test_del_value(struct torture_context *tctx, void *_data) tctx 455 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Warschau", &root, &subkey)) tctx 458 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__, &type, tctx 460 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, tctx 464 source4/lib/registry/tests/registry.c data_blob_talloc(tctx, value, sizeof(value))); tctx 465 source4/lib/registry/tests/registry.c torture_assert_werr_ok (tctx, error, "setting value"); tctx 468 source4/lib/registry/tests/registry.c torture_assert_werr_ok (tctx, error, "unsetting value"); tctx 470 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__, tctx 472 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, tctx 481 source4/lib/registry/tests/registry.c static bool test_list_values(struct torture_context *tctx, void *_data) tctx 492 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Bonn", &root, &subkey)) tctx 496 source4/lib/registry/tests/registry.c data_blob_talloc(tctx, value, sizeof(value))); tctx 497 source4/lib/registry/tests/registry.c torture_assert_werr_ok (tctx, error, "setting value"); tctx 499 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_index(tctx, subkey, 0, &name, tctx 501 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "getting value"); tctx 503 source4/lib/registry/tests/registry.c torture_assert_str_equal(tctx, name, "bar", "value name"); tctx 504 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, sizeof(value), data.length, "value length"); tctx 505 source4/lib/registry/tests/registry.c torture_assert_mem_equal(tctx, data.data, value, sizeof(value), tctx 507 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, REG_DWORD, type, "value type"); tctx 509 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_index(tctx, subkey, 1, &name, tctx 511 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS, tctx 517 source4/lib/registry/tests/registry.c static bool setup_local_registry(struct torture_context *tctx, void **data) tctx 526 source4/lib/registry/tests/registry.c error = reg_open_local(tctx, &rctx); tctx 527 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Opening local registry failed"); tctx 529 source4/lib/registry/tests/registry.c status = torture_temp_dir(tctx, "registry-local", &tempdir); tctx 530 source4/lib/registry/tests/registry.c torture_assert_ntstatus_ok(tctx, status, "Creating temp dir failed"); tctx 532 source4/lib/registry/tests/registry.c filename = talloc_asprintf(tctx, "%s/classes_root.ldb", tempdir); tctx 533 source4/lib/registry/tests/registry.c error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &hive_key); tctx 534 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Opening classes_root file failed"); tctx 537 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Mounting hive failed"); tctx 34 source4/lib/socket/testsuite.c static bool test_udp(struct torture_context *tctx) tctx 42 source4/lib/socket/testsuite.c TALLOC_CTX *mem_ctx = tctx; tctx 45 source4/lib/socket/testsuite.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces); tctx 48 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "creating DGRAM IP socket 1"); tctx 52 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "creating DGRAM IP socket 1"); tctx 58 source4/lib/socket/testsuite.c torture_assert(tctx, localhost, "Localhost not found"); tctx 61 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "listen on socket 1"); tctx 64 source4/lib/socket/testsuite.c torture_assert(tctx, srv_addr != NULL && tctx 66 source4/lib/socket/testsuite.c talloc_asprintf(tctx, tctx 70 source4/lib/socket/testsuite.c torture_comment(tctx, "server port is %d\n", srv_addr->port); tctx 78 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "sendto() on socket 2"); tctx 82 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "recvfrom() on socket 1"); tctx 84 source4/lib/socket/testsuite.c torture_assert_str_equal(tctx, from_addr->addr, srv_addr->addr, tctx 87 source4/lib/socket/testsuite.c torture_assert_int_equal(tctx, nread, size, "Unexpected recvfrom size"); tctx 89 source4/lib/socket/testsuite.c torture_assert_mem_equal(tctx, blob2.data, blob.data, size, tctx 94 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "sendto() on socket 1"); tctx 98 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "recvfrom() on socket 2"); tctx 99 source4/lib/socket/testsuite.c torture_assert_str_equal(tctx, from_addr->addr, srv_addr->addr, tctx 102 source4/lib/socket/testsuite.c torture_assert_int_equal(tctx, nread, size, "Unexpected recvfrom size"); tctx 104 source4/lib/socket/testsuite.c torture_assert_int_equal(tctx, from_addr->port, srv_addr->port, tctx 107 source4/lib/socket/testsuite.c torture_assert_mem_equal(tctx, blob2.data, blob.data, size, tctx 118 source4/lib/socket/testsuite.c static bool test_tcp(struct torture_context *tctx) tctx 126 source4/lib/socket/testsuite.c TALLOC_CTX *mem_ctx = tctx; tctx 127 source4/lib/socket/testsuite.c struct tevent_context *ev = tctx->ev; tctx 131 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "creating IP stream socket 1"); tctx 135 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "creating IP stream socket 1"); tctx 138 source4/lib/socket/testsuite.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces); tctx 141 source4/lib/socket/testsuite.c torture_assert(tctx, localhost, "Localhost not found"); tctx 144 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "listen on socket 1"); tctx 147 source4/lib/socket/testsuite.c torture_assert(tctx, srv_addr && srv_addr->addr, tctx 150 source4/lib/socket/testsuite.c torture_assert_str_equal(tctx, srv_addr->addr, iface_best_ip(ifaces, "127.0.0.1"), tctx 153 source4/lib/socket/testsuite.c torture_comment(tctx, "server port is %d\n", srv_addr->port); tctx 156 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "connect() on socket 2"); tctx 159 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "accept() on socket 1"); tctx 169 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "send() on socket 2"); tctx 172 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "recv() on socket 3"); tctx 176 source4/lib/socket/testsuite.c torture_assert(tctx, from_addr && from_addr->addr, tctx 179 source4/lib/socket/testsuite.c torture_assert_str_equal(tctx, from_addr->addr, srv_addr->addr, tctx 182 source4/lib/socket/testsuite.c torture_assert_int_equal(tctx, nread, size, "Unexpected recvfrom size"); tctx 184 source4/lib/socket/testsuite.c torture_assert_mem_equal(tctx, blob2.data, blob.data, size, tctx 26 source4/lib/tdr/testsuite.c static bool test_push_uint8(struct torture_context *tctx) tctx 29 source4/lib/tdr/testsuite.c struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 31 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_push_uint8(tdr, &v), "push failed"); tctx 32 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.length, 1, "length incorrect"); tctx 33 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[0], 4, "data incorrect"); tctx 37 source4/lib/tdr/testsuite.c static bool test_pull_uint8(struct torture_context *tctx) tctx 41 source4/lib/tdr/testsuite.c struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 46 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_uint8(tdr, tctx, &l), tctx 48 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 1, tdr->offset, tctx 53 source4/lib/tdr/testsuite.c static bool test_push_uint16(struct torture_context *tctx) tctx 56 source4/lib/tdr/testsuite.c struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 58 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_push_uint16(tdr, &v), "push failed"); tctx 59 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.length, 2, "length incorrect"); tctx 60 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[0], 0x32, "data incorrect"); tctx 61 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[1], 0x0F, "data incorrect"); tctx 65 source4/lib/tdr/testsuite.c static bool test_pull_uint16(struct torture_context *tctx) tctx 69 source4/lib/tdr/testsuite.c struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 74 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_uint16(tdr, tctx, &l), tctx 76 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 2, tdr->offset, "offset invalid"); tctx 77 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 782, l, "right int read"); tctx 81 source4/lib/tdr/testsuite.c static bool test_push_uint32(struct torture_context *tctx) tctx 84 source4/lib/tdr/testsuite.c struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 86 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_push_uint32(tdr, &v), "push failed"); tctx 87 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.length, 4, "length incorrect"); tctx 88 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[0], 0x32, "data incorrect"); tctx 89 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[1], 0x0F, "data incorrect"); tctx 90 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[2], 0x10, "data incorrect"); tctx 91 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[3], 0x00, "data incorrect"); tctx 95 source4/lib/tdr/testsuite.c static bool test_pull_uint32(struct torture_context *tctx) tctx 99 source4/lib/tdr/testsuite.c struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 104 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_uint32(tdr, tctx, &l), tctx 106 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 4, tdr->offset, "offset invalid"); tctx 107 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 782, l, "right int read"); tctx 111 source4/lib/tdr/testsuite.c static bool test_pull_charset(struct torture_context *tctx) tctx 113 source4/lib/tdr/testsuite.c struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 115 source4/lib/tdr/testsuite.c tdr->data.data = (uint8_t *)talloc_strdup(tctx, "bla"); tctx 119 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_charset(tdr, tctx, &l, -1, 1, CH_DOS), tctx 121 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 4, tdr->offset, "offset invalid"); tctx 122 source4/lib/tdr/testsuite.c torture_assert_str_equal(tctx, "bla", l, "right int read"); tctx 125 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_charset(tdr, tctx, &l, 2, 1, CH_UNIX), tctx 127 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 2, tdr->offset, "offset invalid"); tctx 128 source4/lib/tdr/testsuite.c torture_assert_str_equal(tctx, "bl", l, "right int read"); tctx 133 source4/lib/tdr/testsuite.c static bool test_pull_charset_empty(struct torture_context *tctx) tctx 135 source4/lib/tdr/testsuite.c struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 137 source4/lib/tdr/testsuite.c tdr->data.data = (uint8_t *)talloc_strdup(tctx, "bla"); tctx 141 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_charset(tdr, tctx, &l, 0, 1, CH_DOS), tctx 143 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 0, tdr->offset, "offset invalid"); tctx 144 source4/lib/tdr/testsuite.c torture_assert_str_equal(tctx, "", l, "right string read"); tctx 151 source4/lib/tdr/testsuite.c static bool test_push_charset(struct torture_context *tctx) tctx 154 source4/lib/tdr/testsuite.c struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 155 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_push_charset(tdr, &l, 4, 1, CH_UTF8), tctx 157 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 4, tdr->data.length, "offset invalid"); tctx 158 source4/lib/tdr/testsuite.c torture_assert(tctx, strcmp("bloe", (const char *)tdr->data.data) == 0, "right string push"); tctx 160 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_push_charset(tdr, &l, -1, 1, CH_UTF8), tctx 162 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 9, tdr->data.length, "offset invalid"); tctx 163 source4/lib/tdr/testsuite.c torture_assert_str_equal(tctx, "bloe", (const char *)tdr->data.data+4, "right string read"); tctx 28 source4/libcli/resolve/testsuite.c static bool test_async_resolve(struct torture_context *tctx) tctx 32 source4/libcli/resolve/testsuite.c int timelimit = torture_setting_int(tctx, "timelimit", 2); tctx 33 source4/libcli/resolve/testsuite.c const char *host = torture_setting_string(tctx, "host", NULL); tctx 36 source4/libcli/resolve/testsuite.c TALLOC_CTX *mem_ctx = tctx; tctx 38 source4/libcli/resolve/testsuite.c ev = tctx->ev; tctx 43 source4/libcli/resolve/testsuite.c torture_comment(tctx, "Testing async resolve of '%s' for %d seconds\n", tctx 48 source4/libcli/resolve/testsuite.c torture_assert(tctx, c != NULL, "resolve_name_host_send"); tctx 49 source4/libcli/resolve/testsuite.c torture_assert_ntstatus_ok(tctx, resolve_name_host_recv(c, mem_ctx, &s, NULL), tctx 54 source4/libcli/resolve/testsuite.c torture_comment(tctx, "async rate of %.1f resolves/sec\n", tctx 62 source4/libcli/resolve/testsuite.c static bool test_sync_resolve(struct torture_context *tctx) tctx 64 source4/libcli/resolve/testsuite.c int timelimit = torture_setting_int(tctx, "timelimit", 2); tctx 67 source4/libcli/resolve/testsuite.c const char *host = torture_setting_string(tctx, "host", NULL); tctx 69 source4/libcli/resolve/testsuite.c torture_comment(tctx, "Testing sync resolve of '%s' for %d seconds\n", tctx 76 source4/libcli/resolve/testsuite.c torture_comment(tctx, "sync rate of %.1f resolves/sec\n", tctx 31 source4/libcli/security/tests/sddl.c static bool test_sddl(struct torture_context *tctx, tctx 38 source4/libcli/security/tests/sddl.c TALLOC_CTX *mem_ctx = tctx; tctx 43 source4/libcli/security/tests/sddl.c torture_assert(tctx, sd != NULL, talloc_asprintf(tctx, tctx 47 source4/libcli/security/tests/sddl.c torture_assert(tctx, sddl2 != NULL, talloc_asprintf(tctx, tctx 51 source4/libcli/security/tests/sddl.c torture_assert(tctx, sd2 != NULL, talloc_asprintf(tctx, tctx 54 source4/libcli/security/tests/sddl.c torture_assert(tctx, security_descriptor_equal(sd, sd2), tctx 55 source4/libcli/security/tests/sddl.c talloc_asprintf(tctx, "Failed equality test for '%s'\n", sddl)); tctx 28 source4/librpc/tests/binding_string.c static bool test_BindingString(struct torture_context *tctx, tctx 35 source4/librpc/tests/binding_string.c TALLOC_CTX *mem_ctx = tctx; tctx 38 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(mem_ctx, binding, &b), tctx 42 source4/librpc/tests/binding_string.c torture_assert(tctx, s != NULL, "Error converting binding back to string"); tctx 44 source4/librpc/tests/binding_string.c torture_assert_casestr_equal(tctx, binding, s, tctx 48 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_binding_build_tower(mem_ctx, b, &tower), tctx 53 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_binding_from_tower(mem_ctx, &tower, &b2), tctx 63 source4/librpc/tests/binding_string.c torture_assert(tctx, s != NULL, "Error converting binding back to string for (stripped down)"); tctx 66 source4/librpc/tests/binding_string.c torture_assert(tctx, s != NULL, "Error converting binding back to string"); tctx 69 source4/librpc/tests/binding_string.c torture_assert_casestr_equal(tctx, s, s2, "Mismatch while comparing original and from protocol tower generated binding strings"); tctx 99 source4/librpc/tests/binding_string.c static bool test_parse_check_results(struct torture_context *tctx) tctx 104 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, tctx 108 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER", &b), "parse"); tctx 109 source4/librpc/tests/binding_string.c torture_assert(tctx, b->transport == NCACN_NP, "ncacn_np expected"); tctx 110 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_ip_tcp:$SERVER", &b), "parse"); tctx 111 source4/librpc/tests/binding_string.c torture_assert(tctx, b->transport == NCACN_IP_TCP, "ncacn_ip_tcp expected"); tctx 112 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[rpcecho]", &b), "parse"); tctx 113 source4/librpc/tests/binding_string.c torture_assert_str_equal(tctx, b->endpoint, "rpcecho", "endpoint"); tctx 114 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[/pipe/rpcecho]", &b), "parse"); tctx 115 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[/pipe/rpcecho,sign,seal]", &b), "parse"); tctx 116 source4/librpc/tests/binding_string.c torture_assert(tctx, b->flags == DCERPC_SIGN+DCERPC_SEAL, "sign+seal flags"); tctx 117 source4/librpc/tests/binding_string.c torture_assert_str_equal(tctx, b->endpoint, "/pipe/rpcecho", "endpoint"); tctx 118 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[,sign]", &b), "parse"); tctx 119 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_ip_tcp:$SERVER[,sign]", &b), "parse"); tctx 120 source4/librpc/tests/binding_string.c torture_assert(tctx, b->endpoint == NULL, "endpoint"); tctx 121 source4/librpc/tests/binding_string.c torture_assert(tctx, b->flags == DCERPC_SIGN, "sign flag"); tctx 122 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncalrpc:", &b), "parse"); tctx 123 source4/librpc/tests/binding_string.c torture_assert(tctx, b->transport == NCALRPC, "ncalrpc expected"); tctx 124 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, tctx 126 source4/librpc/tests/binding_string.c torture_assert(tctx, GUID_equal(&b->object.uuid, &uuid), "object uuid"); tctx 127 source4/librpc/tests/binding_string.c torture_assert_int_equal(tctx, b->object.if_version, 0, "object version"); tctx 128 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, tctx 134 source4/librpc/tests/binding_string.c static bool test_no_transport(struct torture_context *tctx) tctx 141 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, binding, &b), tctx 144 source4/librpc/tests/binding_string.c torture_assert(tctx, b->transport == NCA_UNKNOWN, "invalid transport"); tctx 146 source4/librpc/tests/binding_string.c s = dcerpc_binding_string(tctx, b); tctx 147 source4/librpc/tests/binding_string.c torture_assert(tctx, s != NULL, "Error converting binding back to string"); tctx 149 source4/librpc/tests/binding_string.c torture_assert_casestr_equal(tctx, binding, s, tctx 25 source4/param/tests/loadparm.c static bool test_create(struct torture_context *tctx) tctx 27 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 28 source4/param/tests/loadparm.c torture_assert(tctx, lp_ctx != NULL, "lp_ctx"); tctx 32 source4/param/tests/loadparm.c static bool test_set_option(struct torture_context *tctx) tctx 34 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 35 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "workgroup=werkgroep"), "lp_set_option failed"); tctx 36 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, "WERKGROEP", lp_workgroup(lp_ctx), "workgroup"); tctx 40 source4/param/tests/loadparm.c static bool test_set_cmdline(struct torture_context *tctx) tctx 42 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 43 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_cmdline(lp_ctx, "workgroup", "werkgroep"), "lp_set_cmdline failed"); tctx 44 source4/param/tests/loadparm.c torture_assert(tctx, lp_do_global_parameter(lp_ctx, "workgroup", "barbla"), "lp_set_option failed"); tctx 45 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, "WERKGROEP", lp_workgroup(lp_ctx), "workgroup"); tctx 49 source4/param/tests/loadparm.c static bool test_do_global_parameter(struct torture_context *tctx) tctx 51 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 52 source4/param/tests/loadparm.c torture_assert(tctx, lp_do_global_parameter(lp_ctx, "workgroup", "werkgroep42"), tctx 54 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, lp_workgroup(lp_ctx), "WERKGROEP42", "workgroup"); tctx 59 source4/param/tests/loadparm.c static bool test_do_global_parameter_var(struct torture_context *tctx) tctx 61 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 62 source4/param/tests/loadparm.c torture_assert(tctx, lp_do_global_parameter_var(lp_ctx, "workgroup", "werk%s%d", "groep", 42), tctx 64 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, lp_workgroup(lp_ctx), "WERKGROEP42", "workgroup"); tctx 69 source4/param/tests/loadparm.c static bool test_set_option_invalid(struct torture_context *tctx) tctx 71 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 72 source4/param/tests/loadparm.c torture_assert(tctx, !lp_set_option(lp_ctx, "workgroup"), "lp_set_option succeeded"); tctx 76 source4/param/tests/loadparm.c static bool test_set_option_parametric(struct torture_context *tctx) tctx 78 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 79 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=blaat"), "lp_set_option failed"); tctx 80 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, lp_parm_string(lp_ctx, NULL, "some", "thing"), "blaat", tctx 85 source4/param/tests/loadparm.c static bool test_lp_parm_double(struct torture_context *tctx) tctx 87 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 88 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=3.4"), "lp_set_option failed"); tctx 89 source4/param/tests/loadparm.c torture_assert(tctx, lp_parm_double(lp_ctx, NULL, "some", "thing", 2.0) == 3.4, tctx 91 source4/param/tests/loadparm.c torture_assert(tctx, lp_parm_double(lp_ctx, NULL, "some", "bla", 2.0) == 2.0, tctx 96 source4/param/tests/loadparm.c static bool test_lp_parm_bool(struct torture_context *tctx) tctx 98 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 99 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=true"), "lp_set_option failed"); tctx 100 source4/param/tests/loadparm.c torture_assert(tctx, lp_parm_bool(lp_ctx, NULL, "some", "thing", false) == true, tctx 102 source4/param/tests/loadparm.c torture_assert(tctx, lp_parm_bool(lp_ctx, NULL, "some", "bla", true) == true, tctx 107 source4/param/tests/loadparm.c static bool test_lp_parm_int(struct torture_context *tctx) tctx 109 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 110 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=34"), "lp_set_option failed"); tctx 111 source4/param/tests/loadparm.c torture_assert_int_equal(tctx, lp_parm_int(lp_ctx, NULL, "some", "thing", 20), 34, tctx 113 source4/param/tests/loadparm.c torture_assert_int_equal(tctx, lp_parm_int(lp_ctx, NULL, "some", "bla", 42), 42, tctx 118 source4/param/tests/loadparm.c static bool test_lp_parm_bytes(struct torture_context *tctx) tctx 120 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 121 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=16K"), "lp_set_option failed"); tctx 122 source4/param/tests/loadparm.c torture_assert_int_equal(tctx, lp_parm_bytes(lp_ctx, NULL, "some", "thing", 20), 16 * 1024, tctx 124 source4/param/tests/loadparm.c torture_assert_int_equal(tctx, lp_parm_bytes(lp_ctx, NULL, "some", "bla", 42), 42, tctx 129 source4/param/tests/loadparm.c static bool test_lp_do_service_parameter(struct torture_context *tctx) tctx 131 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 133 source4/param/tests/loadparm.c torture_assert(tctx, lp_do_service_parameter(lp_ctx, service, tctx 135 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, lp_parm_string(lp_ctx, service, "some", "thing"), "foo", tctx 140 source4/param/tests/loadparm.c static bool test_lp_service(struct torture_context *tctx) tctx 142 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx); tctx 144 source4/param/tests/loadparm.c torture_assert(tctx, service == lp_service(lp_ctx, "foo"), "invalid service"); tctx 27 source4/param/tests/share.c static bool test_list_empty(struct torture_context *tctx, tctx 35 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, share_list_all(tctx, ctx, &count, &names), tctx 41 source4/param/tests/share.c static bool test_create(struct torture_context *tctx, tctx 59 source4/param/tests/share.c torture_skip(tctx, "Not supported by backend"); tctx 61 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, status, "create_share failed"); tctx 63 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, share_list_all(tctx, ctx, &count, &names), tctx 66 source4/param/tests/share.c torture_assert(tctx, count >= 1, "creating share failed"); tctx 73 source4/param/tests/share.c torture_assert(tctx, found, "created share found"); tctx 79 source4/param/tests/share.c static bool test_create_invalid(struct torture_context *tctx, tctx 89 source4/param/tests/share.c torture_skip(tctx, "Not supported by backend"); tctx 91 source4/param/tests/share.c torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER, tctx 95 source4/param/tests/share.c torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER, tctx 102 source4/param/tests/share.c static bool test_share_remove_invalid(struct torture_context *tctx, tctx 112 source4/param/tests/share.c torture_skip(tctx, "Not supported by backend"); tctx 114 source4/param/tests/share.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_UNSUCCESSFUL, "remove fails"); tctx 121 source4/param/tests/share.c static bool test_share_remove(struct torture_context *tctx, tctx 135 source4/param/tests/share.c torture_skip(tctx, "Not supported by backend"); tctx 137 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, status, "create_share failed"); tctx 139 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, share_remove(ctx, "blie"), "remove failed"); tctx 144 source4/param/tests/share.c static bool test_double_create(struct torture_context *tctx, tctx 158 source4/param/tests/share.c torture_skip(tctx, "Not supported by backend"); tctx 160 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, status, "create_share failed"); tctx 162 source4/param/tests/share.c torture_assert_ntstatus_equal(tctx, NT_STATUS_OBJECT_NAME_COLLISION, tctx 183 source4/param/tests/share.c static bool setup_ldb(struct torture_context *tctx, void **data) tctx 185 source4/param/tests/share.c return NT_STATUS_IS_OK(share_get_context_by_name(tctx, "ldb", tctx->ev, tctx->lp_ctx, (struct share_context **)data)); tctx 188 source4/param/tests/share.c static bool setup_classic(struct torture_context *tctx, void **data) tctx 190 source4/param/tests/share.c return NT_STATUS_IS_OK(share_get_context_by_name(tctx, "classic", tctx->ev, tctx->lp_ctx, (struct share_context **)data)); tctx 193 source4/param/tests/share.c static bool teardown(struct torture_context *tctx, void *data) tctx 28 source4/torture/auth/ntlmssp.c static bool torture_ntlmssp_self_check(struct torture_context *tctx) tctx 34 source4/torture/auth/ntlmssp.c TALLOC_CTX *mem_ctx = tctx; tctx 36 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx, tctx 38 source4/torture/auth/ntlmssp.c tctx->ev, lp_gensec_settings(tctx, tctx->lp_ctx)), tctx 46 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx, tctx 52 source4/torture/auth/ntlmssp.c gensec_ntlmssp_state->session_key = strhex_to_data_blob(tctx, "0102030405060708090a0b0c0d0e0f00"); tctx 59 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx, tctx 63 source4/torture/auth/ntlmssp.c data = strhex_to_data_blob(tctx, "6a43494653"); tctx 67 source4/torture/auth/ntlmssp.c expected_sig = strhex_to_data_blob(tctx, "01000000e37f97f2544f4d7e00000000"); tctx 72 source4/torture/auth/ntlmssp.c torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length"); tctx 74 source4/torture/auth/ntlmssp.c torture_assert_mem_equal(tctx, sig.data, expected_sig.data, sig.length, tctx 77 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_equal(tctx, tctx 84 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_equal(tctx, tctx 91 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx, tctx 93 source4/torture/auth/ntlmssp.c tctx->ev, lp_gensec_settings(tctx, tctx->lp_ctx)), tctx 101 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx, tctx 107 source4/torture/auth/ntlmssp.c gensec_ntlmssp_state->session_key = strhex_to_data_blob(tctx, "0102030405e538b0"); tctx 114 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx, tctx 118 source4/torture/auth/ntlmssp.c data = strhex_to_data_blob(tctx, "6a43494653"); tctx 122 source4/torture/auth/ntlmssp.c expected_sig = strhex_to_data_blob(tctx, "0100000078010900397420fe0e5a0f89"); tctx 127 source4/torture/auth/ntlmssp.c torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length"); tctx 129 source4/torture/auth/ntlmssp.c torture_assert_mem_equal(tctx, sig.data+8, expected_sig.data+8, sig.length-8, tctx 132 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_equal(tctx, tctx 139 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_equal(tctx, tctx 33 source4/torture/auth/pac.c static bool torture_pac_self_check(struct torture_context *tctx) tctx 57 source4/torture/auth/pac.c TALLOC_CTX *mem_ctx = tctx; tctx 59 source4/torture/auth/pac.c torture_assert(tctx, 0 == smb_krb5_init_context(mem_ctx, tctx 61 source4/torture/auth/pac.c tctx->lp_ctx, tctx 72 source4/torture/auth/pac.c torture_assert(tctx, !ret, talloc_asprintf(tctx, tctx 88 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx, tctx 93 source4/torture/auth/pac.c nt_status = auth_anonymous_server_info(mem_ctx, lp_netbios_name(tctx->lp_ctx), &server_info); tctx 100 source4/torture/auth/pac.c torture_fail(tctx, "auth_anonymous_server_info"); tctx 112 source4/torture/auth/pac.c torture_fail(tctx, "krb5_parse_name_flags(norealm)"); tctx 117 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 134 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx, tctx 144 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 161 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx, tctx 168 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 182 source4/torture/auth/pac.c torture_fail(tctx, tctx 183 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 192 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 210 source4/torture/auth/pac.c torture_fail(tctx, tctx 211 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 230 source4/torture/auth/pac.c torture_fail(tctx, tctx 231 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 238 source4/torture/auth/pac.c torture_fail(tctx, tctx 239 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 295 source4/torture/auth/pac.c static bool torture_pac_saved_check(struct torture_context *tctx) tctx 318 source4/torture/auth/pac.c TALLOC_CTX *mem_ctx = tctx; tctx 320 source4/torture/auth/pac.c torture_assert(tctx, 0 == smb_krb5_init_context(mem_ctx, NULL, tctx 321 source4/torture/auth/pac.c tctx->lp_ctx, tctx 325 source4/torture/auth/pac.c pac_kdc_key = torture_setting_string(tctx, "pac_kdc_key", tctx 328 source4/torture/auth/pac.c pac_member_key = torture_setting_string(tctx, "pac_member_key", tctx 331 source4/torture/auth/pac.c torture_comment(tctx, "Using pac_kdc_key '%s'\n", pac_kdc_key); tctx 332 source4/torture/auth/pac.c torture_comment(tctx, "Using pac_member_key '%s'\n", pac_member_key); tctx 342 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) Could not interpret krbtgt key"); tctx 348 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) Could not interpret krbsrv key"); tctx 355 source4/torture/auth/pac.c torture_assert(tctx, !ret, tctx 356 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 369 source4/torture/auth/pac.c torture_fail(tctx, tctx 370 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 380 source4/torture/auth/pac.c pac_file = torture_setting_string(tctx, "pac_file", NULL); tctx 383 source4/torture/auth/pac.c torture_comment(tctx, "(saved test) Loaded pac of size %ld from %s\n", (long)tmp_blob.length, pac_file); tctx 390 source4/torture/auth/pac.c principal_string = torture_setting_string(tctx, "pac_client_principal", tctx 393 source4/torture/auth/pac.c authtime_string = torture_setting_string(tctx, "pac_authtime", "1120440609"); tctx 403 source4/torture/auth/pac.c torture_fail(tctx, tctx 404 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 412 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 426 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx, tctx 433 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 445 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx, tctx 460 source4/torture/auth/pac.c torture_fail(tctx, tctx 461 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 471 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 486 source4/torture/auth/pac.c torture_fail(tctx, tctx 487 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 504 source4/torture/auth/pac.c torture_fail(tctx, tctx 505 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 520 source4/torture/auth/pac.c torture_fail(tctx, tctx 521 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 528 source4/torture/auth/pac.c torture_comment(tctx, "skipping PAC encoding tests as non kdc key\n"); tctx 536 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 550 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) PAC push failed"); tctx 566 source4/torture/auth/pac.c torture_fail(tctx, tctx 567 source4/torture/auth/pac.c talloc_asprintf(tctx, tctx 584 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx, "(saved test) PAC push failed: length[%u] matches, but data does not", (unsigned)tmp_blob.length)); tctx 588 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 603 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) regnerated PAC create failed"); tctx 614 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), &pac_data2, tctx 617 source4/torture/auth/pac.c torture_assert_ntstatus_ok(tctx, nt_status, "can't parse the PAC"); tctx 629 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx, tctx 636 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), &pac_data2, tctx 639 source4/torture/auth/pac.c torture_assert_ntstatus_ok(tctx, nt_status, "can't parse the PAC"); tctx 656 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx, tctx 662 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 677 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) PAC decoding DID NOT fail on broken auth time (time + 1)"); tctx 694 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx, tctx 700 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 713 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) PAC decoding DID NOT fail on modified principal"); tctx 720 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), tctx 733 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) PAC decoding DID NOT fail on broken checksum"); tctx 37 source4/torture/basic/aliases.c static bool gen_aliases(struct torture_context *tctx, tctx 51 source4/torture/basic/aliases.c status = smb_raw_trans2(cli->tree, tctx, t2); tctx 54 source4/torture/basic/aliases.c t2b = talloc(tctx, struct trans2_blobs); tctx 59 source4/torture/basic/aliases.c torture_comment(tctx, tctx 66 source4/torture/basic/aliases.c torture_comment(tctx, "Found %d levels with success status\n", count); tctx 73 source4/torture/basic/aliases.c torture_comment(tctx, tctx 81 source4/torture/basic/aliases.c torture_comment(tctx, "Found %d aliased levels\n", alias_count); tctx 87 source4/torture/basic/aliases.c static bool qfsinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli) tctx 99 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 2); tctx 103 source4/torture/basic/aliases.c return gen_aliases(tctx, cli, &t2, 0); tctx 107 source4/torture/basic/aliases.c static bool qfileinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli) tctx 121 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 4); tctx 127 source4/torture/basic/aliases.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, tctx 135 source4/torture/basic/aliases.c if (!gen_aliases(tctx, cli, &t2, 2)) tctx 146 source4/torture/basic/aliases.c static bool qpathinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli) tctx 160 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 6); tctx 166 source4/torture/basic/aliases.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, tctx 175 source4/torture/basic/aliases.c smbcli_blob_append_string(cli->session, tctx, &t2.in.params, tctx 178 source4/torture/basic/aliases.c if (!gen_aliases(tctx, cli, &t2, 0)) tctx 188 source4/torture/basic/aliases.c static bool findfirst_aliases(struct torture_context *tctx, struct smbcli_state *cli) tctx 202 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 12); tctx 208 source4/torture/basic/aliases.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, tctx 221 source4/torture/basic/aliases.c smbcli_blob_append_string(cli->session, tctx, &t2.in.params, tctx 224 source4/torture/basic/aliases.c if (!gen_aliases(tctx, cli, &t2, 6)) tctx 235 source4/torture/basic/aliases.c static bool gen_set_aliases(struct torture_context *tctx, tctx 254 source4/torture/basic/aliases.c status = smb_raw_trans2(cli->tree, tctx, t2); tctx 274 source4/torture/basic/aliases.c torture_comment(tctx, "level=%d size=%d %s\n", level, dsize, nt_errstr(status)); tctx 282 source4/torture/basic/aliases.c t2b = talloc(tctx, struct trans2_blobs); tctx 287 source4/torture/basic/aliases.c torture_comment(tctx, tctx 294 source4/torture/basic/aliases.c torture_comment(tctx, "Found %d valid levels\n", count); tctx 302 source4/torture/basic/aliases.c static bool setfileinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli) tctx 316 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 6); tctx 322 source4/torture/basic/aliases.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, tctx 331 source4/torture/basic/aliases.c gen_set_aliases(tctx, cli, &t2, 2); tctx 340 source4/torture/basic/aliases.c static bool setpathinfo_aliases(struct torture_context *tctx, tctx 355 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 4); tctx 362 source4/torture/basic/aliases.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, tctx 371 source4/torture/basic/aliases.c smbcli_blob_append_string(cli->session, tctx, &t2.in.params, tctx 374 source4/torture/basic/aliases.c if (!gen_set_aliases(tctx, cli, &t2, 0)) tctx 377 source4/torture/basic/aliases.c torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli->tree, fname), tctx 378 source4/torture/basic/aliases.c talloc_asprintf(tctx, "unlink: %s", smbcli_errstr(cli->tree))); tctx 89 source4/torture/basic/attr.c bool torture_openattrtest(struct torture_context *tctx, tctx 106 source4/torture/basic/attr.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open %d (1) of %s failed (%s)", i, tctx 109 source4/torture/basic/attr.c torture_assert_ntstatus_ok(tctx, tctx 111 source4/torture/basic/attr.c talloc_asprintf(tctx, "close %d (1) of %s failed (%s)", i, fname, tctx 125 source4/torture/basic/attr.c torture_comment(tctx, "[%d] trunc open 0x%x -> 0x%x of %s failed - should have succeeded !(%s)\n", tctx 132 source4/torture/basic/attr.c torture_assert_ntstatus_equal(tctx, tctx 134 source4/torture/basic/attr.c talloc_asprintf(tctx, "[%d] trunc open 0x%x -> 0x%x failed with wrong error code %s", tctx 139 source4/torture/basic/attr.c torture_comment(tctx, "[%d] trunc open 0x%x -> 0x%x failed\n", k, open_attrs_table[i], open_attrs_table[j]); tctx 145 source4/torture/basic/attr.c torture_assert_ntstatus_ok(tctx, tctx 147 source4/torture/basic/attr.c talloc_asprintf(tctx, "close %d (2) of %s failed (%s)", j, tctx 150 source4/torture/basic/attr.c torture_assert_ntstatus_ok(tctx, tctx 152 source4/torture/basic/attr.c talloc_asprintf(tctx, "getatr(2) failed (%s)", smbcli_errstr(cli1->tree))); tctx 155 source4/torture/basic/attr.c torture_comment(tctx, "[%d] getatr check [0x%x] trunc [0x%x] got attr 0x%x\n", tctx 164 source4/torture/basic/attr.c torture_comment(tctx, "[%d] getatr check failed. [0x%x] trunc [0x%x] got attr 0x%x, should be 0x%x\n", tctx 39 source4/torture/basic/base.c static struct smbcli_state *open_nbt_connection(struct torture_context *tctx) tctx 43 source4/torture/basic/base.c const char *host = torture_setting_string(tctx, "host", NULL); tctx 46 source4/torture/basic/base.c make_nbt_name_client(&calling, lp_netbios_name(tctx->lp_ctx)); tctx 52 source4/torture/basic/base.c torture_comment(tctx, "Failed initialize smbcli_struct to connect with %s\n", host); tctx 56 source4/torture/basic/base.c lp_smbcli_options(tctx->lp_ctx, &options); tctx 58 source4/torture/basic/base.c if (!smbcli_socket_connect(cli, host, lp_smb_ports(tctx->lp_ctx), tctx->ev, tctx 59 source4/torture/basic/base.c lp_resolve_context(tctx->lp_ctx), &options, tctx 60 source4/torture/basic/base.c lp_iconv_convenience(tctx->lp_ctx), tctx 61 source4/torture/basic/base.c lp_socket_options(tctx->lp_ctx))) { tctx 62 source4/torture/basic/base.c torture_comment(tctx, "Failed to connect with %s\n", host); tctx 67 source4/torture/basic/base.c torture_comment(tctx, "%s rejected the session\n",host); tctx 78 source4/torture/basic/base.c static bool tcon_devtest(struct torture_context *tctx, tctx 84 source4/torture/basic/base.c const char *password = torture_setting_string(tctx, "password", NULL); tctx 89 source4/torture/basic/base.c torture_comment(tctx, "Trying share %s with devtype %s\n", myshare, devtype); tctx 93 source4/torture/basic/base.c torture_fail(tctx, talloc_asprintf(tctx, tctx 101 source4/torture/basic/base.c torture_fail(tctx, talloc_asprintf(tctx, tctx 109 source4/torture/basic/base.c torture_fail(tctx, "Returned unexpected error"); tctx 122 source4/torture/basic/base.c static bool run_fdpasstest(struct torture_context *tctx, tctx 132 source4/torture/basic/base.c torture_comment(tctx, "Opening a file on connection 1\n"); tctx 135 source4/torture/basic/base.c torture_assert(tctx, fnum1 != -1, tctx 136 source4/torture/basic/base.c talloc_asprintf(tctx, tctx 139 source4/torture/basic/base.c torture_comment(tctx, "writing to file on connection 1\n"); tctx 141 source4/torture/basic/base.c torture_assert(tctx, tctx 143 source4/torture/basic/base.c talloc_asprintf(tctx, tctx 151 source4/torture/basic/base.c torture_comment(tctx, "reading from file on connection 2\n"); tctx 153 source4/torture/basic/base.c torture_assert(tctx, smbcli_read(cli2->tree, fnum1, buf, 0, 13) != 13, tctx 154 source4/torture/basic/base.c talloc_asprintf(tctx, tctx 168 source4/torture/basic/base.c static bool run_attrtest(struct torture_context *tctx, tctx 182 source4/torture/basic/base.c torture_comment(tctx, "getatr failed (%s)\n", smbcli_errstr(cli->tree)); tctx 186 source4/torture/basic/base.c torture_comment(tctx, "New file time is %s", ctime(&t)); tctx 189 source4/torture/basic/base.c torture_comment(tctx, "ERROR: SMBgetatr bug. time is %s", tctx 197 source4/torture/basic/base.c torture_comment(tctx, "Setting file time to %s", ctime(&t2)); tctx 200 source4/torture/basic/base.c torture_comment(tctx, "setatr failed (%s)\n", smbcli_errstr(cli->tree)); tctx 205 source4/torture/basic/base.c torture_comment(tctx, "getatr failed (%s)\n", smbcli_errstr(cli->tree)); tctx 209 source4/torture/basic/base.c torture_comment(tctx, "Retrieved file time as %s", ctime(&t)); tctx 212 source4/torture/basic/base.c torture_comment(tctx, "ERROR: getatr/setatr bug. times are\n%s", tctx 214 source4/torture/basic/base.c torture_comment(tctx, "%s", ctime(&t2)); tctx 226 source4/torture/basic/base.c static bool run_trans2test(struct torture_context *tctx, tctx 240 source4/torture/basic/base.c torture_comment(tctx, "Testing qfileinfo\n"); tctx 246 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qfileinfo failed (%s)\n", smbcli_errstr(cli->tree)); tctx 250 source4/torture/basic/base.c torture_comment(tctx, "Testing NAME_INFO\n"); tctx 253 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qfilename failed (%s)\n", smbcli_errstr(cli->tree)); tctx 258 source4/torture/basic/base.c torture_comment(tctx, "qfilename gave different name? [%s] [%s]\n", tctx 269 source4/torture/basic/base.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli->tree)); tctx 274 source4/torture/basic/base.c torture_comment(tctx, "Checking for sticky create times\n"); tctx 277 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qpathinfo failed (%s)\n", smbcli_errstr(cli->tree)); tctx 281 source4/torture/basic/base.c torture_comment(tctx, "create time=%s", ctime(&c_time)); tctx 282 source4/torture/basic/base.c torture_comment(tctx, "modify time=%s", ctime(&m_time)); tctx 283 source4/torture/basic/base.c torture_comment(tctx, "This system appears to have sticky create times\n"); tctx 286 source4/torture/basic/base.c torture_comment(tctx, "access time=%s", ctime(&a_time)); tctx 287 source4/torture/basic/base.c torture_comment(tctx, "This system appears to set a midnight access time\n"); tctx 292 source4/torture/basic/base.c torture_comment(tctx, "ERROR: totally incorrect times - maybe word reversed? mtime=%s", ctime(&m_time)); tctx 303 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qpathinfo2 failed (%s)\n", smbcli_errstr(cli->tree)); tctx 307 source4/torture/basic/base.c torture_comment(tctx, "write time=%s", ctime(&w_time)); tctx 308 source4/torture/basic/base.c torture_comment(tctx, "This system appears to set a initial 0 write time\n"); tctx 319 source4/torture/basic/base.c torture_comment(tctx, "ERROR: mkdir failed (%s)\n", smbcli_errstr(cli->tree)); tctx 324 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qpathinfo2 failed (%s)\n", smbcli_errstr(cli->tree)); tctx 333 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qpathinfo2 failed (%s)\n", smbcli_errstr(cli->tree)); tctx 337 source4/torture/basic/base.c torture_comment(tctx, "This system does not update directory modification times\n"); tctx 348 source4/torture/basic/base.c static bool run_negprot_nowait(struct torture_context *tctx) tctx 354 source4/torture/basic/base.c torture_comment(tctx, "starting negprot nowait test\n"); tctx 356 source4/torture/basic/base.c cli = open_nbt_connection(tctx); tctx 361 source4/torture/basic/base.c torture_comment(tctx, "Filling send buffer\n"); tctx 365 source4/torture/basic/base.c req = smb_raw_negotiate_send(cli->transport, lp_unicode(tctx->lp_ctx), PROTOCOL_NT1); tctx 369 source4/torture/basic/base.c torture_comment(tctx, "Failed to fill pipe packet[%d] - %s (ignored)\n", i+1, nt_errstr(req->status)); tctx 372 source4/torture/basic/base.c torture_comment(tctx, "Failed to fill pipe - %s \n", nt_errstr(req->status)); tctx 379 source4/torture/basic/base.c torture_comment(tctx, "Opening secondary connection\n"); tctx 380 source4/torture/basic/base.c if (!torture_open_connection(&cli2, tctx, 1)) { tctx 381 source4/torture/basic/base.c torture_comment(tctx, "Failed to open secondary connection\n"); tctx 386 source4/torture/basic/base.c torture_comment(tctx, "Failed to close secondary connection\n"); tctx 399 source4/torture/basic/base.c static bool run_tcon_test(struct torture_context *tctx, struct smbcli_state *cli) tctx 408 source4/torture/basic/base.c const char *host = torture_setting_string(tctx, "host", NULL); tctx 409 source4/torture/basic/base.c const char *share = torture_setting_string(tctx, "share", NULL); tctx 410 source4/torture/basic/base.c const char *password = torture_setting_string(tctx, "password", NULL); tctx 413 source4/torture/basic/base.c torture_comment(tctx, "unlink of %s failed (%s)\n", fname, smbcli_errstr(cli->tree)); tctx 418 source4/torture/basic/base.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli->tree)); tctx 427 source4/torture/basic/base.c torture_comment(tctx, "initial write failed (%s)\n", smbcli_errstr(cli->tree)); tctx 433 source4/torture/basic/base.c torture_comment(tctx, "%s refused 2nd tree connect (%s)\n", host, tctx 447 source4/torture/basic/base.c torture_comment(tctx, "* server allows write with wrong TID\n"); tctx 450 source4/torture/basic/base.c torture_comment(tctx, "server fails write with wrong TID : %s\n", smbcli_errstr(cli->tree)); tctx 458 source4/torture/basic/base.c torture_comment(tctx, "* server allows write with invalid TID\n"); tctx 461 source4/torture/basic/base.c torture_comment(tctx, "server fails write with invalid TID : %s\n", smbcli_errstr(cli->tree)); tctx 469 source4/torture/basic/base.c torture_comment(tctx, "* server allows write with invalid VUID\n"); tctx 472 source4/torture/basic/base.c torture_comment(tctx, "server fails write with invalid VUID : %s\n", smbcli_errstr(cli->tree)); tctx 479 source4/torture/basic/base.c torture_comment(tctx, "close failed (%s)\n", smbcli_errstr(cli->tree)); tctx 486 source4/torture/basic/base.c torture_comment(tctx, "secondary tdis failed (%s)\n", smbcli_errstr(cli->tree)); tctx 501 source4/torture/basic/base.c static bool run_tcon_devtype_test(struct torture_context *tctx, tctx 504 source4/torture/basic/base.c const char *share = torture_setting_string(tctx, "share", NULL); tctx 506 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, "IPC$", "A:", NT_STATUS_BAD_DEVICE_TYPE)) tctx 509 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, "IPC$", "?????", NT_STATUS_OK)) tctx 512 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, "IPC$", "LPT:", NT_STATUS_BAD_DEVICE_TYPE)) tctx 515 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, "IPC$", "IPC", NT_STATUS_OK)) tctx 518 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, "IPC$", "FOOBA", NT_STATUS_BAD_DEVICE_TYPE)) tctx 521 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, share, "A:", NT_STATUS_OK)) tctx 524 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, share, "?????", NT_STATUS_OK)) tctx 527 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, share, "LPT:", NT_STATUS_BAD_DEVICE_TYPE)) tctx 530 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, share, "IPC", NT_STATUS_BAD_DEVICE_TYPE)) tctx 533 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, share, "FOOBA", NT_STATUS_BAD_DEVICE_TYPE)) tctx 539 source4/torture/basic/base.c static bool rw_torture2(struct torture_context *tctx, tctx 551 source4/torture/basic/base.c torture_assert(tctx, smbcli_deltree(c1->tree, lockfname) != -1, tctx 552 source4/torture/basic/base.c talloc_asprintf(tctx, tctx 557 source4/torture/basic/base.c torture_assert(tctx, fnum1 != -1, tctx 558 source4/torture/basic/base.c talloc_asprintf(tctx, tctx 563 source4/torture/basic/base.c torture_assert(tctx, fnum2 != -1, tctx 564 source4/torture/basic/base.c talloc_asprintf(tctx, tctx 568 source4/torture/basic/base.c torture_comment(tctx, "Checking data integrity over %d ops\n", tctx 575 source4/torture/basic/base.c if (torture_setting_bool(tctx, "progress", true)) { tctx 576 source4/torture/basic/base.c torture_comment(tctx, "%d\r", i); fflush(stdout); tctx 583 source4/torture/basic/base.c torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(c1->tree)); tctx 584 source4/torture/basic/base.c torture_comment(tctx, "wrote %d, expected %d\n", (int)bytes_written, (int)buf_size); tctx 590 source4/torture/basic/base.c torture_comment(tctx, "read failed (%s)\n", smbcli_errstr(c2->tree)); tctx 591 source4/torture/basic/base.c torture_comment(tctx, "read %d, expected %d\n", (int)bytes_read, (int)buf_size); tctx 596 source4/torture/basic/base.c torture_assert_mem_equal(tctx, buf_rd, buf, buf_size, tctx 600 source4/torture/basic/base.c torture_assert_ntstatus_ok(tctx, smbcli_close(c2->tree, fnum2), tctx 601 source4/torture/basic/base.c talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(c2->tree))); tctx 602 source4/torture/basic/base.c torture_assert_ntstatus_ok(tctx, smbcli_close(c1->tree, fnum1), tctx 603 source4/torture/basic/base.c talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(c1->tree))); tctx 605 source4/torture/basic/base.c torture_assert_ntstatus_ok(tctx, smbcli_unlink(c1->tree, lockfname), tctx 606 source4/torture/basic/base.c talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(c1->tree))); tctx 608 source4/torture/basic/base.c torture_comment(tctx, "\n"); tctx 615 source4/torture/basic/base.c static bool run_readwritetest(struct torture_context *tctx, tctx 619 source4/torture/basic/base.c torture_comment(tctx, "Running readwritetest v1\n"); tctx 620 source4/torture/basic/base.c if (!rw_torture2(tctx, cli1, cli2)) tctx 623 source4/torture/basic/base.c torture_comment(tctx, "Running readwritetest v2\n"); tctx 625 source4/torture/basic/base.c if (!rw_torture2(tctx, cli1, cli1)) tctx 634 source4/torture/basic/base.c static bool run_deferopen(struct torture_context *tctx, struct smbcli_state *cli, int dummy) tctx 644 source4/torture/basic/base.c nsec = torture_setting_int(tctx, "sharedelay", 1000000); tctx 649 source4/torture/basic/base.c torture_comment(tctx, "failed to connect\n"); tctx 653 source4/torture/basic/base.c torture_comment(tctx, "Testing deferred open requests.\n"); tctx 672 source4/torture/basic/base.c torture_comment(tctx,"Timing incorrect %.2f violation 1 sec == %.2f\n", tctx 680 source4/torture/basic/base.c torture_comment(tctx,"Failed to open %s, error=%s\n", fname, smbcli_errstr(cli->tree)); tctx 684 source4/torture/basic/base.c torture_comment(tctx, "pid %u open %d\n", (unsigned)getpid(), i); tctx 689 source4/torture/basic/base.c torture_comment(tctx,"Failed to close %s, error=%s\n", fname, smbcli_errstr(cli->tree)); tctx 698 source4/torture/basic/base.c torture_comment(tctx, "unlink of %s failed (%s)\n", fname, smbcli_errstr(cli->tree)); tctx 703 source4/torture/basic/base.c torture_comment(tctx, "deferred test finished\n"); tctx 711 source4/torture/basic/base.c static bool run_vuidtest(struct torture_context *tctx, tctx 731 source4/torture/basic/base.c torture_comment(tctx, "Testing qfileinfo with wrong vuid\n"); tctx 736 source4/torture/basic/base.c torture_fail(tctx, "qfileinfo passed with wrong vuid"); tctx 743 source4/torture/basic/base.c torture_fail(tctx, talloc_asprintf(tctx, tctx 751 source4/torture/basic/base.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum), tctx 752 source4/torture/basic/base.c talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(cli->tree))); tctx 762 source4/torture/basic/base.c static bool run_opentest(struct torture_context *tctx, struct smbcli_state *cli1, tctx 783 source4/torture/basic/base.c torture_comment(tctx, "Error code should be NT_STATUS_OBJECT_NAME_INVALID, was %s for file with %d char\n", tctx 797 source4/torture/basic/base.c torture_comment(tctx, "Create file with control char names passed.\n"); tctx 804 source4/torture/basic/base.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 809 source4/torture/basic/base.c torture_comment(tctx, "close2 failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 814 source4/torture/basic/base.c torture_comment(tctx, "smbcli_setatr failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 821 source4/torture/basic/base.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 831 source4/torture/basic/base.c torture_comment(tctx, "correct error code ERRDOS/ERRnoaccess returned\n"); tctx 834 source4/torture/basic/base.c torture_comment(tctx, "finished open test 1\n"); tctx 844 source4/torture/basic/base.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 853 source4/torture/basic/base.c torture_comment(tctx, "correct error code ERRDOS/ERRbadshare returned\n"); tctx 857 source4/torture/basic/base.c torture_comment(tctx, "close2 failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 863 source4/torture/basic/base.c torture_comment(tctx, "finished open test 2\n"); tctx 869 source4/torture/basic/base.c torture_comment(tctx, "(3) open (1) of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 878 source4/torture/basic/base.c torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 883 source4/torture/basic/base.c torture_comment(tctx, "(3) close1 failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 889 source4/torture/basic/base.c torture_comment(tctx, "(3) getatr failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 895 source4/torture/basic/base.c torture_comment(tctx, "(3) file size != 20\n"); tctx 904 source4/torture/basic/base.c torture_comment(tctx, "(3) open (2) of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 910 source4/torture/basic/base.c torture_comment(tctx, "close2 failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 916 source4/torture/basic/base.c torture_comment(tctx, "(3) getatr failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 922 source4/torture/basic/base.c torture_comment(tctx, "(3) file size != 0\n"); tctx 926 source4/torture/basic/base.c torture_comment(tctx, "finished open test 3\n"); tctx 931 source4/torture/basic/base.c torture_comment(tctx, "testing ctemp\n"); tctx 934 source4/torture/basic/base.c torture_comment(tctx, "ctemp failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 938 source4/torture/basic/base.c torture_comment(tctx, "ctemp gave path %s\n", tmp_path); tctx 940 source4/torture/basic/base.c torture_comment(tctx, "close of temp failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 943 source4/torture/basic/base.c torture_comment(tctx, "unlink of temp failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 951 source4/torture/basic/base.c torture_comment(tctx, "TEST #1 testing 2 non-io opens (no delete)\n"); tctx 957 source4/torture/basic/base.c torture_comment(tctx, "test 1 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 965 source4/torture/basic/base.c torture_comment(tctx, "test 1 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree)); tctx 971 source4/torture/basic/base.c torture_comment(tctx, "test 1 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 975 source4/torture/basic/base.c torture_comment(tctx, "test 1 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree)); tctx 979 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #1 passed.\n"); tctx 983 source4/torture/basic/base.c torture_comment(tctx, "TEST #2 testing 2 non-io opens (first with delete)\n"); tctx 989 source4/torture/basic/base.c torture_comment(tctx, "test 2 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 998 source4/torture/basic/base.c torture_comment(tctx, "test 2 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree)); tctx 1004 source4/torture/basic/base.c torture_comment(tctx, "test 1 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1008 source4/torture/basic/base.c torture_comment(tctx, "test 1 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1012 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #2 passed.\n"); tctx 1016 source4/torture/basic/base.c torture_comment(tctx, "TEST #3 testing 2 non-io opens (second with delete)\n"); tctx 1022 source4/torture/basic/base.c torture_comment(tctx, "test 3 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1031 source4/torture/basic/base.c torture_comment(tctx, "test 3 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree)); tctx 1037 source4/torture/basic/base.c torture_comment(tctx, "test 3 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1041 source4/torture/basic/base.c torture_comment(tctx, "test 3 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree)); tctx 1045 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #3 passed.\n"); tctx 1049 source4/torture/basic/base.c torture_comment(tctx, "TEST #4 testing 2 non-io opens (both with delete)\n"); tctx 1055 source4/torture/basic/base.c torture_comment(tctx, "test 4 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1064 source4/torture/basic/base.c torture_comment(tctx, "test 4 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, smbcli_errstr(cli2->tree)); tctx 1069 source4/torture/basic/base.c torture_comment(tctx, "test 4 open 2 of %s gave %s (correct error should be %s)\n", fname, smbcli_errstr(cli2->tree), "sharing violation"); tctx 1072 source4/torture/basic/base.c torture_comment(tctx, "test 4 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1076 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #4 passed.\n"); tctx 1080 source4/torture/basic/base.c torture_comment(tctx, "TEST #5 testing 2 non-io opens (both with delete - both with file share delete)\n"); tctx 1086 source4/torture/basic/base.c torture_comment(tctx, "test 5 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1095 source4/torture/basic/base.c torture_comment(tctx, "test 5 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree)); tctx 1101 source4/torture/basic/base.c torture_comment(tctx, "test 5 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1106 source4/torture/basic/base.c torture_comment(tctx, "test 5 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree)); tctx 1110 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #5 passed.\n"); tctx 1112 source4/torture/basic/base.c torture_comment(tctx, "TEST #6 testing 1 non-io open, one io open\n"); tctx 1120 source4/torture/basic/base.c torture_comment(tctx, "test 6 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1129 source4/torture/basic/base.c torture_comment(tctx, "test 6 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree)); tctx 1135 source4/torture/basic/base.c torture_comment(tctx, "test 6 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1140 source4/torture/basic/base.c torture_comment(tctx, "test 6 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree)); tctx 1144 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #6 passed.\n"); tctx 1146 source4/torture/basic/base.c torture_comment(tctx, "TEST #7 testing 1 non-io open, one io open with delete\n"); tctx 1154 source4/torture/basic/base.c torture_comment(tctx, "test 7 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1163 source4/torture/basic/base.c torture_comment(tctx, "test 7 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, smbcli_errstr(cli2->tree)); tctx 1168 source4/torture/basic/base.c torture_comment(tctx, "test 7 open 2 of %s gave %s (correct error should be %s)\n", fname, smbcli_errstr(cli2->tree), "sharing violation"); tctx 1171 source4/torture/basic/base.c torture_comment(tctx, "test 7 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1175 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #7 passed.\n"); tctx 1179 source4/torture/basic/base.c torture_comment(tctx, "TEST #8 testing one normal open, followed by lock, followed by open with truncate\n"); tctx 1185 source4/torture/basic/base.c torture_comment(tctx, "(8) open (1) of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1194 source4/torture/basic/base.c torture_comment(tctx, "(8) write failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 1200 source4/torture/basic/base.c torture_comment(tctx, "(8) getatr (1) failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 1206 source4/torture/basic/base.c torture_comment(tctx, "(8) file size != 20\n"); tctx 1213 source4/torture/basic/base.c torture_comment(tctx, "(8) lock1 failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 1220 source4/torture/basic/base.c torture_comment(tctx, "(8) open (2) of %s with truncate failed (%s)\n", fname, smbcli_errstr(cli1->tree)); tctx 1226 source4/torture/basic/base.c torture_comment(tctx, "(8) getatr (2) failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 1232 source4/torture/basic/base.c torture_comment(tctx, "(8) file size != 0\n"); tctx 1238 source4/torture/basic/base.c torture_comment(tctx, "(8) close1 failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 1243 source4/torture/basic/base.c torture_comment(tctx, "(8) close1 failed (%s)\n", smbcli_errstr(cli1->tree)); tctx 1249 source4/torture/basic/base.c torture_comment(tctx, "open test #8 passed.\n"); tctx 1280 source4/torture/basic/base.c static bool run_xcopy(struct torture_context *tctx, tctx 1293 source4/torture/basic/base.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, tctx 1300 source4/torture/basic/base.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, tctx 1306 source4/torture/basic/base.c static bool run_iometer(struct torture_context *tctx, tctx 1319 source4/torture/basic/base.c torture_assert_ntstatus_ok(tctx, status, tctx 1320 source4/torture/basic/base.c talloc_asprintf(tctx, "smbcli_getatr failed: %s", nt_errstr(status))); tctx 1322 source4/torture/basic/base.c torture_comment(tctx, "size: %d\n", (int)filesize); tctx 1328 source4/torture/basic/base.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, "open failed: %s", tctx 1346 source4/torture/basic/base.c torture_assert(tctx, res == sizeof(buf), tctx 1347 source4/torture/basic/base.c talloc_asprintf(tctx, "read failed: %s", tctx 1357 source4/torture/basic/base.c torture_assert(tctx, res == sizeof(buf), tctx 1358 source4/torture/basic/base.c talloc_asprintf(tctx, "read failed: %s", tctx 1369 source4/torture/basic/base.c static bool torture_chkpath_test(struct torture_context *tctx, tctx 1375 source4/torture/basic/base.c torture_comment(tctx, "Testing valid and invalid paths\n"); tctx 1383 source4/torture/basic/base.c torture_comment(tctx, "mkdir1 failed : %s\n", smbcli_errstr(cli->tree)); tctx 1388 source4/torture/basic/base.c torture_comment(tctx, "mkdir2 failed : %s\n", smbcli_errstr(cli->tree)); tctx 1394 source4/torture/basic/base.c torture_comment(tctx, "open1 failed (%s)\n", smbcli_errstr(cli->tree)); tctx 1400 source4/torture/basic/base.c torture_comment(tctx, "chkpath1 failed: %s\n", smbcli_errstr(cli->tree)); tctx 1405 source4/torture/basic/base.c torture_comment(tctx, "chkpath2 failed: %s\n", smbcli_errstr(cli->tree)); tctx 1413 source4/torture/basic/base.c torture_comment(tctx, "* chkpath on a file should fail\n"); tctx 1421 source4/torture/basic/base.c torture_comment(tctx, "* chkpath on a non existent file should fail\n"); tctx 1429 source4/torture/basic/base.c torture_comment(tctx, "* chkpath on a non existent component should fail\n"); tctx 1444 source4/torture/basic/base.c static bool torture_samba3_errorpaths(struct torture_context *tctx) tctx 1455 source4/torture/basic/base.c nt_status_support = lp_nt_status_support(tctx->lp_ctx); tctx 1457 source4/torture/basic/base.c if (!lp_set_cmdline(tctx->lp_ctx, "nt status support", "yes")) { tctx 1458 source4/torture/basic/base.c torture_comment(tctx, "Could not set 'nt status support = yes'\n"); tctx 1462 source4/torture/basic/base.c if (!torture_open_connection(&cli_nt, tctx, 0)) { tctx 1466 source4/torture/basic/base.c if (!lp_set_cmdline(tctx->lp_ctx, "nt status support", "no")) { tctx 1467 source4/torture/basic/base.c torture_comment(tctx, "Could not set 'nt status support = yes'\n"); tctx 1471 source4/torture/basic/base.c if (!torture_open_connection(&cli_dos, tctx, 1)) { tctx 1475 source4/torture/basic/base.c if (!lp_set_cmdline(tctx->lp_ctx, "nt status support", tctx 1477 source4/torture/basic/base.c torture_comment(tctx, "Could not reset 'nt status support = yes'"); tctx 1485 source4/torture/basic/base.c torture_comment(tctx, "smbcli_mkdir(%s) failed: %s\n", dname, tctx 1503 source4/torture/basic/base.c status = smb_raw_open(cli_nt->tree, tctx, &io); tctx 1505 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n", tctx 1510 source4/torture/basic/base.c status = smb_raw_open(cli_dos->tree, tctx, &io); tctx 1512 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n", tctx 1520 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n", tctx 1527 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n", tctx 1544 source4/torture/basic/base.c tctx, "(%s) incorrect status %s should be " tctx 1552 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s " tctx 1560 source4/torture/basic/base.c status = smb_raw_open(cli_nt->tree, tctx, &io); tctx 1562 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n", tctx 1568 source4/torture/basic/base.c status = smb_raw_open(cli_dos->tree, tctx, &io); tctx 1570 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n", tctx 1582 source4/torture/basic/base.c torture_comment(tctx, "Open(%s) with invalid deny mode succeeded -- " tctx 1589 source4/torture/basic/base.c torture_comment(tctx, "Expected DOS error ERRDOS/ERRbadaccess, " tctx 1596 source4/torture/basic/base.c torture_comment(tctx, "Open(%s) with invalid deny mode succeeded -- " tctx 1603 source4/torture/basic/base.c torture_comment(tctx, "Expected DOS error ERRDOS:ERRbadaccess, " tctx 1641 source4/torture/basic/base.c status = smb_raw_open(cli_nt->tree, tctx, &io); tctx 1643 source4/torture/basic/base.c torture_comment(tctx, "ntcreate as dir gave %s, " tctx 1653 source4/torture/basic/base.c status = smb_raw_open(cli_dos->tree, tctx, &io); tctx 1656 source4/torture/basic/base.c torture_comment(tctx, "ntcreate as dir gave %s, " tctx 1670 source4/torture/basic/base.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 1678 source4/torture/basic/base.c torture_comment(tctx, "Open(%s) succeeded -- expected failure\n", tctx 1686 source4/torture/basic/base.c torture_comment(tctx, "Expected DOS error ERRDOS/ERRcannotopen, got %s\n", tctx 1695 source4/torture/basic/base.c torture_comment(tctx, "Open(%s) succeeded -- expected failure\n", tctx 1703 source4/torture/basic/base.c torture_comment(tctx, "Expected error NT_STATUS_OBJECT_NAME_NOT_FOUND, " tctx 36 source4/torture/basic/charset.c static NTSTATUS unicode_open(struct torture_context *tctx, tctx 59 source4/torture/basic/charset.c if (!convert_string_talloc_convenience(ucs_name, lp_iconv_convenience(tctx->lp_ctx), CH_UTF16, CH_UNIX, ucs_name, (1+u_name_len)*2, (void **)&fname, &i, false)) { tctx 60 source4/torture/basic/charset.c torture_comment(tctx, "Failed to convert UCS2 Name into unix - convert_string_talloc() failure\n"); tctx 85 source4/torture/basic/charset.c status = smb_raw_open(tree, tctx, &io); tctx 96 source4/torture/basic/charset.c static bool test_composed(struct torture_context *tctx, tctx 103 source4/torture/basic/charset.c torture_assert(tctx, torture_setup_dir(cli, BASEDIR), tctx 106 source4/torture/basic/charset.c status1 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 2); tctx 107 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status1, "Failed to create composed name"); tctx 109 source4/torture/basic/charset.c status2 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 1); tctx 111 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status2, "Failed to create accented character"); tctx 119 source4/torture/basic/charset.c static bool test_diacritical(struct torture_context *tctx, tctx 126 source4/torture/basic/charset.c torture_assert(tctx, torture_setup_dir(cli, BASEDIR), tctx 129 source4/torture/basic/charset.c status1 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 1); tctx 131 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status1, "Failed to create naked diacritical"); tctx 134 source4/torture/basic/charset.c status2 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 2); tctx 136 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status2, "Failed to create double naked diacritical"); tctx 144 source4/torture/basic/charset.c static bool test_surrogate(struct torture_context *tctx, tctx 152 source4/torture/basic/charset.c torture_assert(tctx, torture_setup_dir(cli, BASEDIR), tctx 155 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 1); tctx 157 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status, "Failed to create partial surrogate 1"); tctx 159 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 1); tctx 161 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status, "Failed to create partial surrogate 2"); tctx 163 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name3, 2); tctx 165 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status, "Failed to create full surrogate"); tctx 173 source4/torture/basic/charset.c static bool test_widea(struct torture_context *tctx, tctx 181 source4/torture/basic/charset.c torture_assert(tctx, torture_setup_dir(cli, BASEDIR), tctx 184 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 1); tctx 186 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status, "Failed to create 'a'"); tctx 188 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 1); tctx 190 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status, "Failed to create wide-a"); tctx 192 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name3, 1); tctx 194 source4/torture/basic/charset.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_COLLISION, tctx 35 source4/torture/basic/delaywrite.c static bool test_delayed_write_update(struct torture_context *tctx, struct smbcli_state *cli) tctx 45 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 50 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update\n"); tctx 58 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname); tctx 66 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1); tctx 68 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed"); tctx 70 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n", tctx 71 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.basic_info.out.write_time)); tctx 80 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 89 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2); tctx 96 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 97 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time)); tctx 101 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds" tctx 108 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds" tctx 118 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 132 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1(struct torture_context *tctx, struct smbcli_state *cli) tctx 142 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 148 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update1\n"); tctx 156 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname); tctx 174 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1); tctx 176 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed"); tctx 178 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n", tctx 179 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.all_info.out.write_time)); tctx 185 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 194 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2); tctx 203 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 210 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 211 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.all_info.out.write_time)); tctx 215 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SMBwrite truncate " tctx 223 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SMBwrite truncate " tctx 234 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 243 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 252 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo3); tctx 267 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 268 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo3.all_info.out.write_time)); tctx 272 source4/torture/basic/delaywrite.c torture_comment(tctx, "server updated write_time after %.2f seconds" tctx 282 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 291 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4); tctx 292 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "pathinfo failed"); tctx 295 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 299 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write time on close (correct)\n"); tctx 313 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1a(struct torture_context *tctx, struct smbcli_state *cli) tctx 323 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 329 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update1a\n"); tctx 337 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname); tctx 355 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1); tctx 357 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed"); tctx 359 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n", tctx 360 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.all_info.out.write_time)); tctx 366 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "write failed - wrote %d bytes (%s)", tctx 374 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2); tctx 377 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s", tctx 384 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 391 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 392 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.all_info.out.write_time)); tctx 396 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SMBwrite truncate " tctx 404 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SMBwrite truncate " tctx 415 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 423 source4/torture/basic/delaywrite.c torture_assert_int_equal(tctx, written, 1, tctx 429 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo3); tctx 432 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s\n", tctx 439 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 446 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 447 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo3.all_info.out.write_time)); tctx 451 source4/torture/basic/delaywrite.c torture_comment(tctx, "server updated write_time after %.2f seconds" tctx 461 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 470 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4); tctx 471 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "pathinfo failed"); tctx 474 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 478 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write time on close (correct)\n"); tctx 492 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1b(struct torture_context *tctx, struct smbcli_state *cli) tctx 502 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 508 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update1b\n"); tctx 516 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname); tctx 534 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1); tctx 536 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed"); tctx 538 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n", tctx 539 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.all_info.out.write_time)); tctx 544 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "SET_END_OF_FILE failed"); tctx 549 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2); tctx 558 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 565 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 566 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.all_info.out.write_time)); tctx 570 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 579 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SET_END_OF_FILE truncate " tctx 590 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 598 source4/torture/basic/delaywrite.c torture_assert_int_equal(tctx, written, 1, tctx 604 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo3); tctx 607 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 620 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 621 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo3.all_info.out.write_time)); tctx 625 source4/torture/basic/delaywrite.c torture_comment(tctx, "server updated write_time after %.2f seconds" tctx 635 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Server updated write time (wrong!)\n"); tctx 643 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4); tctx 644 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "pathinfo failed"); tctx 647 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Server did not update write time on close (wrong!)\n"); tctx 650 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write time on close (correct)\n"); tctx 663 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1c(struct torture_context *tctx, struct smbcli_state *cli) tctx 674 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 680 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update1c\n"); tctx 688 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname); tctx 706 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1); tctx 708 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed"); tctx 710 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n", tctx 711 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.all_info.out.write_time)); tctx 720 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, tctx 726 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2); tctx 729 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s", tctx 736 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 743 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 744 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.all_info.out.write_time)); tctx 748 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SET_ALLOCATION_INFO truncate " tctx 756 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SET_ALLOCATION_INFO truncate " tctx 767 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 774 source4/torture/basic/delaywrite.c torture_assert_int_equal(tctx, written, 1, tctx 780 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo3); tctx 783 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s", tctx 790 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "file not expanded"); tctx 795 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 796 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo3.all_info.out.write_time)); tctx 800 source4/torture/basic/delaywrite.c torture_comment(tctx, "server updated write_time after %.2f seconds" tctx 810 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, tctx 819 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4); tctx 820 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "pathinfo failed"); tctx 823 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Server did not update write time on close (wrong!)\n"); tctx 826 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write time on close (correct)\n"); tctx 841 source4/torture/basic/delaywrite.c static bool test_delayed_write_update2(struct torture_context *tctx, struct smbcli_state *cli, tctx 853 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 859 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update2\n"); tctx 867 source4/torture/basic/delaywrite.c torture_comment(tctx, "Failed to open %s\n", fname); tctx 875 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1); tctx 877 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed"); tctx 879 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n", tctx 880 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.basic_info.out.write_time)); tctx 907 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "sfileinfo failed"); tctx 912 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli2->tree, tctx, &finfo2); tctx 918 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 919 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time)); tctx 922 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time (correct)\n"); tctx 924 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Server did not update write time (wrong!)\n"); tctx 934 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1); tctx 941 source4/torture/basic/delaywrite.c torture_comment(tctx, "Modified write time %s\n", tctx 942 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.basic_info.out.write_time)); tctx 945 source4/torture/basic/delaywrite.c torture_comment(tctx, "Doing a 10 byte write to extend the file and see if this changes the last write time.\n"); tctx 950 source4/torture/basic/delaywrite.c torture_comment(tctx, "write failed - wrote %d bytes (%s)\n", tctx 958 source4/torture/basic/delaywrite.c torture_comment(tctx, "Doing flush after write\n"); tctx 973 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2); tctx 980 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 981 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time)); tctx 984 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds" tctx 995 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write time (correct)\n"); tctx 1000 source4/torture/basic/delaywrite.c torture_comment(tctx, "Failed to open %s\n", fname); tctx 1004 source4/torture/basic/delaywrite.c torture_comment(tctx, "Doing a 10 byte write to extend the file via second fd and see if this changes the last write time.\n"); tctx 1009 source4/torture/basic/delaywrite.c torture_comment(tctx, "write failed - wrote %d bytes (%s)\n", tctx 1014 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2); tctx 1020 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 1021 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time)); tctx 1023 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time (wrong!)\n"); tctx 1027 source4/torture/basic/delaywrite.c torture_comment(tctx, "Closing the first fd to see if write time updated.\n"); tctx 1031 source4/torture/basic/delaywrite.c torture_comment(tctx, "Doing a 10 byte write to extend the file via second fd and see if this changes the last write time.\n"); tctx 1036 source4/torture/basic/delaywrite.c torture_comment(tctx, "write failed - wrote %d bytes (%s)\n", tctx 1044 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2); tctx 1050 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 1051 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time)); tctx 1053 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time (wrong!)\n"); tctx 1062 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2); tctx 1069 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 1070 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time)); tctx 1073 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 1084 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write time (correct)\n"); tctx 1087 source4/torture/basic/delaywrite.c torture_comment(tctx, "Closing second fd to see if write time updated.\n"); tctx 1094 source4/torture/basic/delaywrite.c torture_comment(tctx, "Failed to open %s\n", fname); tctx 1102 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1); tctx 1109 source4/torture/basic/delaywrite.c torture_comment(tctx, "Second open initial write time %s\n", tctx 1110 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.basic_info.out.write_time)); tctx 1113 source4/torture/basic/delaywrite.c torture_comment(tctx, "Doing a 10 byte write to extend the file to see if this changes the last write time.\n"); tctx 1118 source4/torture/basic/delaywrite.c torture_comment(tctx, "write failed - wrote %d bytes (%s)\n", tctx 1126 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2); tctx 1132 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 1133 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time)); tctx 1135 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time (wrong!)\n"); tctx 1143 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2); tctx 1150 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n", tctx 1151 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time)); tctx 1155 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds" tctx 1162 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds" tctx 1172 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Server did not update write time (wrong!)\n"); tctx 1200 source4/torture/basic/delaywrite.c static bool test_finfo_after_write(struct torture_context *tctx, struct smbcli_state *cli, tctx 1210 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 1215 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_finfo_after_write\n"); tctx 1224 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname); tctx 1231 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1); tctx 1235 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s", nt_errstr(status)); tctx 1244 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 1251 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": failed to open 2nd time - %s", tctx 1260 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", tctx 1269 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli2->tree, tctx, &finfo2); tctx 1272 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s", tctx 1280 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": create_time changed"); tctx 1287 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": access_time changed"); tctx 1294 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": write_time changed:\n" tctx 1296 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.basic_info.out.write_time), tctx 1297 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time)); tctx 1304 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": change_time changed"); tctx 1321 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo2); tctx 1324 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s", nt_errstr(status)); tctx 1344 source4/torture/basic/delaywrite.c bool strict = torture_setting_bool(tctx, "strict mode", false); \ tctx 1353 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": wrong write_time (%s)%s(%llu) %s (%s)%s(%llu)", \ tctx 1354 source4/torture/basic/delaywrite.c #given, nt_time_string(tctx, g), (unsigned long long)g, \ tctx 1355 source4/torture/basic/delaywrite.c #cmp, #correct, nt_time_string(tctx, c), (unsigned long long)c); \ tctx 1371 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": wrong access_time (%s)%s %s (%s)%s", \ tctx 1372 source4/torture/basic/delaywrite.c #given, nt_time_string(tctx, g), \ tctx 1373 source4/torture/basic/delaywrite.c #cmp, #correct, nt_time_string(tctx, c)); \ tctx 1388 source4/torture/basic/delaywrite.c _status = smb_raw_fileinfo(cli->tree, tctx, &finfo); \ tctx 1391 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s", \ tctx 1395 source4/torture/basic/delaywrite.c torture_comment(tctx, "fileinfo: Access(%s) Write(%s)\n", \ tctx 1396 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo.basic_info.out.access_time), \ tctx 1397 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo.basic_info.out.write_time)); \ tctx 1401 source4/torture/basic/delaywrite.c _status = smb_raw_pathinfo(cli2->tree, tctx, &pinfo); \ tctx 1403 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": pathinfo failed: %s", \ tctx 1408 source4/torture/basic/delaywrite.c torture_comment(tctx, "pathinfo: Access(%s) Write(%s)\n", \ tctx 1409 source4/torture/basic/delaywrite.c nt_time_string(tctx, pinfo.basic_info.out.access_time), \ tctx 1410 source4/torture/basic/delaywrite.c nt_time_string(tctx, pinfo.basic_info.out.write_time)); \ tctx 1430 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": setfileinfo failed: %s", \ tctx 1439 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3(struct torture_context *tctx, tctx 1451 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 1456 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update3\n"); tctx 1462 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n"); tctx 1466 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname); tctx 1496 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 1499 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 1509 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 1516 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 1532 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 1535 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 1544 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 1556 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n"); tctx 1569 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n"); tctx 1577 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated the write_time on close (correct)\n"); tctx 1594 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3a(struct torture_context *tctx, tctx 1607 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 1612 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update3a\n"); tctx 1618 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n"); tctx 1622 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname); tctx 1662 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 1665 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 1675 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 1682 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 1700 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a truncate SMBwrite [%d] on the file handle\n", i); tctx 1703 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written); tctx 1718 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 1721 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 1730 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 1742 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n"); tctx 1759 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a truncate SMBwrite [%d] on the file handle\n", i); tctx 1762 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written); tctx 1781 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n"); tctx 1789 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update the write_time on close (correct)\n"); tctx 1806 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3b(struct torture_context *tctx, tctx 1818 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 1823 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update3b\n"); tctx 1829 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n"); tctx 1833 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname); tctx 1873 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 1876 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 1886 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 1893 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 1909 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 1912 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 1921 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 1933 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n"); tctx 1946 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n"); tctx 1954 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated the write_time on close (correct)\n"); tctx 1973 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3c(struct torture_context *tctx, tctx 1986 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 1991 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update3c\n"); tctx 1997 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n"); tctx 2001 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname); tctx 2039 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a truncate SMBwrite [%d] on the file handle\n", i); tctx 2042 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written); tctx 2056 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 2059 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 2068 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 2080 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n"); tctx 2097 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a truncate write [%d] on the file handle\n", i); tctx 2100 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written); tctx 2121 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 2124 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 2133 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 2145 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n"); tctx 2158 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n"); tctx 2166 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated the write_time on close (correct)\n"); tctx 2184 source4/torture/basic/delaywrite.c static bool test_delayed_write_update4(struct torture_context *tctx, tctx 2196 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 2201 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update4\n"); tctx 2207 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n"); tctx 2211 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname); tctx 2236 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 2239 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 2261 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 2268 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 2284 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 2287 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 2296 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 2308 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not updatewrite_time (correct)\n"); tctx 2321 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n"); tctx 2329 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated the write_time on close (correct)\n"); tctx 2345 source4/torture/basic/delaywrite.c static bool test_delayed_write_update5(struct torture_context *tctx, tctx 2357 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 2362 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update5\n"); tctx 2368 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n"); tctx 2372 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname); tctx 2396 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 2399 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 2407 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the future on the file handle\n"); tctx 2412 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the past on the file handle\n"); tctx 2427 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 2439 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n"); tctx 2447 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 2450 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 2459 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 2471 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n"); tctx 2483 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n"); tctx 2491 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update the write_time on close (correct)\n"); tctx 2507 source4/torture/basic/delaywrite.c static bool test_delayed_write_update5b(struct torture_context *tctx, tctx 2519 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 2524 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update5b\n"); tctx 2530 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n"); tctx 2534 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname); tctx 2558 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 2561 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 2569 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the future on the file handle\n"); tctx 2574 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the past on the file handle\n"); tctx 2589 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 2601 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n"); tctx 2609 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a truncate write on the file handle\n"); tctx 2612 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 2621 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 2633 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n"); tctx 2645 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n"); tctx 2653 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update the write_time on close (correct)\n"); tctx 2673 source4/torture/basic/delaywrite.c static bool test_delayed_write_update6(struct torture_context *tctx, tctx 2686 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000); tctx 2692 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update6\n"); tctx 2698 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n"); tctx 2702 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname); tctx 2707 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the 2nd file handle on 2nd connection\n"); tctx 2711 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname); tctx 2737 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 2740 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 2748 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the future on the 2nd file handle\n"); tctx 2753 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the past on the 2nd file handle\n"); tctx 2768 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 2780 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n"); tctx 2788 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n"); tctx 2791 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written); tctx 2800 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds " tctx 2812 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n"); tctx 2825 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n"); tctx 2833 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated the write_time on close (correct)\n"); tctx 2846 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the 2nd file handle\n"); tctx 2854 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update the write_time on close (correct)\n"); tctx 32 source4/torture/basic/delete.c static bool check_delete_on_close(struct torture_context *tctx, tctx 44 source4/torture/basic/delete.c status = torture_single_search(cli, tctx, tctx 50 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status, tctx 51 source4/torture/basic/delete.c talloc_asprintf(tctx, "single_search failed (%s)", where)); tctx 60 source4/torture/basic/delete.c status = smb_raw_fileinfo(cli->tree, tctx, &io); tctx 61 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, tctx 64 source4/torture/basic/delete.c torture_assert(tctx, expect_it == io.all_info.out.delete_pending, tctx 65 source4/torture/basic/delete.c talloc_asprintf(tctx, tctx 69 source4/torture/basic/delete.c torture_assert(tctx, nlink == io.all_info.out.nlink, tctx 70 source4/torture/basic/delete.c talloc_asprintf(tctx, tctx 77 source4/torture/basic/delete.c status = smb_raw_fileinfo(cli->tree, tctx, &io); tctx 78 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "qpathinfo failed (%s)", where)); tctx 80 source4/torture/basic/delete.c torture_assert(tctx, expect_it == io.standard_info.out.delete_pending, tctx 81 source4/torture/basic/delete.c talloc_asprintf(tctx, "%s - Expected del_on_close flag %d, qfileinfo/standard_info gave %d\n", tctx 84 source4/torture/basic/delete.c torture_assert(tctx, nlink == io.standard_info.out.nlink, tctx 85 source4/torture/basic/delete.c talloc_asprintf(tctx, "%s - Expected nlink %d, qfileinfo/standard_info gave %d", tctx 94 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_DELETE_PENDING, tctx 97 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status, tctx 98 source4/torture/basic/delete.c talloc_asprintf(tctx, "qpathinfo failed (%s)", where)); tctx 105 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, _cli->tree->session->transport->error.e.nt_status, _expected, \ tctx 126 source4/torture/basic/delete.c static bool deltest1(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 138 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", tctx 141 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 142 source4/torture/basic/delete.c talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(cli1->tree))); tctx 145 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail)", tctx 152 source4/torture/basic/delete.c static bool deltest2(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 163 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, tctx 164 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed (%s)", tctx 167 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli1->tree, fnum1, true), tctx 168 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close failed (%s)", tctx 171 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 172 source4/torture/basic/delete.c talloc_asprintf(tctx, "close failed (%s)", tctx 190 source4/torture/basic/delete.c static bool deltest3(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 203 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 215 source4/torture/basic/delete.c torture_assert(tctx, fnum2 == -1, tctx 216 source4/torture/basic/delete.c talloc_asprintf(tctx, "open - 2 of %s succeeded - should have failed.", tctx 227 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 2 of %s failed (%s)", tctx 230 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, tctx 232 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close failed (%s)", tctx 235 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 236 source4/torture/basic/delete.c talloc_asprintf(tctx, "close 1 failed (%s)", tctx 239 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum2), tctx 240 source4/torture/basic/delete.c talloc_asprintf(tctx, "close 2 failed (%s)", tctx 260 source4/torture/basic/delete.c static bool deltest4(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 276 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", tctx 287 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 2 of %s failed (%s)", tctx 290 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, tctx 292 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 1 failed (%s)", tctx 295 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, tctx 297 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close failed (%s)", tctx 306 source4/torture/basic/delete.c torture_assert(tctx, fnum2 == -1, tctx 307 source4/torture/basic/delete.c talloc_asprintf(tctx, "open - 3 of %s succeeded ! Should have failed.", tctx 312 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 313 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)", tctx 320 source4/torture/basic/delete.c static bool deltest5(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 327 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", tctx 332 source4/torture/basic/delete.c torture_assert(tctx, !NT_STATUS_IS_OK(smbcli_nt_delete_on_close(cli1->tree, fnum1, true)), tctx 335 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 336 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)", smbcli_errstr(cli1->tree))); tctx 342 source4/torture/basic/delete.c static bool deltest6(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 356 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", tctx 361 source4/torture/basic/delete.c torture_assert(tctx, tctx 365 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, tctx 367 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)", tctx 374 source4/torture/basic/delete.c static bool deltest7(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 388 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", tctx 391 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli1->tree, fnum1, true), tctx 394 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__); tctx 396 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, tctx 400 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__); tctx 402 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 403 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)", smbcli_errstr(cli1->tree))); tctx 408 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", tctx 411 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 412 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)", tctx 419 source4/torture/basic/delete.c static bool deltest8(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 435 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, tctx 436 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed (%s)", tctx 447 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", tctx 450 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, tctx 454 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__); tctx 455 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__); tctx 457 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 458 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 1 failed (%s)", tctx 461 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, -1, fname, true, __location__); tctx 462 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__); tctx 464 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2), tctx 465 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)", smbcli_errstr(cli2->tree))); tctx 469 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, tctx 470 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded should have been deleted on close !\n", fname)); tctx 476 source4/torture/basic/delete.c static bool deltest9(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 490 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, tctx 491 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded should have failed!", tctx 498 source4/torture/basic/delete.c static bool deltest10(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 512 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, tctx 513 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed (%s)", tctx 517 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 518 source4/torture/basic/delete.c talloc_asprintf(tctx, "close failed (%s)", tctx 523 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, tctx 524 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded should have been deleted on close !", tctx 530 source4/torture/basic/delete.c static bool deltest11(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 545 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", tctx 550 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_CANNOT_DELETE, tctx 551 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close should fail with NT_STATUS_CANNOT_DELETE. Got %s instead)", smbcli_errstr(cli1->tree))); tctx 553 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 554 source4/torture/basic/delete.c talloc_asprintf(tctx, "close failed (%s)", tctx 561 source4/torture/basic/delete.c static bool deltest12(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 578 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, tctx 579 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded. Should fail with " tctx 583 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_CANNOT_DELETE, tctx 584 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close on open should " tctx 593 source4/torture/basic/delete.c static bool deltest13(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 615 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, tctx 616 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed (%s)", tctx 629 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, tctx 633 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, tctx 638 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__); tctx 639 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__); tctx 641 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli2->tree, fnum2, tctx 645 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__); tctx 646 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__); tctx 648 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 649 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 1 failed (%s)", tctx 652 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2), tctx 653 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)", tctx 658 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed!", tctx 667 source4/torture/basic/delete.c static bool deltest14(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 685 source4/torture/basic/delete.c torture_assert(tctx, dnum1 != -1, talloc_asprintf(tctx, "open of %s failed: %s!", tctx 688 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, dnum1, dname, false, __location__); tctx 689 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli1->tree, dnum1, true), tctx 691 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, dnum1, dname, true, __location__); tctx 705 source4/torture/basic/delete.c torture_assert(tctx, dnum1 == -1, "setting delete_on_close on file succeeded !"); tctx 711 source4/torture/basic/delete.c static bool deltest15(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 735 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, tctx 736 source4/torture/basic/delete.c talloc_asprintf(tctx, "open - 1 of %s failed (%s)", fname, smbcli_errstr(cli1->tree))); tctx 740 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status, "renaming failed!"); tctx 751 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, tctx 752 source4/torture/basic/delete.c talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 757 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status, tctx 765 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname_new, true, __location__); tctx 776 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 779 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__); tctx 793 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 807 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, tctx 815 source4/torture/basic/delete.c static bool deltest16(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 841 source4/torture/basic/delete.c torture_assert (tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", fname, smbcli_errstr(cli1->tree))); tctx 844 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__); tctx 847 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, -1, fname, false, __location__); tctx 848 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, -1, fname, false, __location__); tctx 861 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 864 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__); tctx 865 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, -1, fname, false, __location__); tctx 866 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__); tctx 867 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, -1, fname, false, __location__); tctx 871 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__); tctx 872 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, -1, fname, true, __location__); tctx 878 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail)", tctx 885 source4/torture/basic/delete.c static bool deltest17(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 910 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 926 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 930 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__); tctx 944 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 948 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__); tctx 949 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum2, fname, false, __location__); tctx 954 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum2, fname, true, __location__); tctx 960 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s failed (should succeed) - %s", tctx 969 source4/torture/basic/delete.c static bool deltest18(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 997 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 1006 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, dname, false, __location__); tctx 1020 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 1023 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, dname, false, __location__); tctx 1024 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum2, dname, false, __location__); tctx 1028 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum2, dname, true, __location__); tctx 1041 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail)", tctx 1048 source4/torture/basic/delete.c static bool deltest19(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1072 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 1090 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, tctx 1091 source4/torture/basic/delete.c talloc_asprintf(tctx, "open - 1 of %s failed (%s)", fname, smbcli_errstr(cli1->tree))); tctx 1099 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, dname, false, __location__); tctx 1112 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 1117 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum2, dname, true, __location__); tctx 1133 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, tctx 1134 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded (should fail)", dname)); tctx 1140 source4/torture/basic/delete.c static bool deltest20(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1151 source4/torture/basic/delete.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 1167 source4/torture/basic/delete.c torture_assert(tctx, dnum1 != -1, talloc_asprintf(tctx, "open of %s failed: %s!", tctx 1170 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, dnum1, dname, false, __location__); tctx 1178 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, tctx 1183 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, tctx 1190 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status, tctx 1198 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, tctx 1199 source4/torture/basic/delete.c talloc_asprintf(tctx, "smbcli_open failed: %s\n", tctx 1206 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_DIRECTORY_NOT_EMPTY, tctx 1214 source4/torture/basic/delete.c static bool deltest20a(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1239 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 1252 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 2 of %s failed (%s)", tctx 1256 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__); tctx 1257 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__); tctx 1261 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__); tctx 1267 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail) - %s", tctx 1280 source4/torture/basic/delete.c static bool deltest20b(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1307 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 1322 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", tctx 1335 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 2 of %s failed (%s)", tctx 1339 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__); tctx 1340 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__); tctx 1344 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__); tctx 1362 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx,status,NT_STATUS_OK,talloc_asprintf(tctx, "rename of %s to %s failed (%s)", tctx 1366 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname_new, false, __location__); tctx 1372 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail) - %s", tctx 1375 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail) - %s", tctx 1383 source4/torture/basic/delete.c static bool deltest21(struct torture_context *tctx) tctx 1390 source4/torture/basic/delete.c if (!torture_open_connection(&cli1, tctx, 0)) tctx 1393 source4/torture/basic/delete.c if (!torture_open_connection(&cli2, tctx, 1)) tctx 1405 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", tctx 1408 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, tctx 1410 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close failed (%s)", tctx 1414 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__); tctx 1421 source4/torture/basic/delete.c if (!torture_open_connection(&cli1, tctx, 0)) { tctx 1450 source4/torture/basic/delete.c static bool deltest22(struct torture_context *tctx) tctx 1457 source4/torture/basic/delete.c if (!torture_open_connection(&cli1, tctx, 0)) tctx 1463 source4/torture/basic/delete.c tctx, smbcli_mkdir(cli1->tree, dname), tctx 1464 source4/torture/basic/delete.c talloc_asprintf(tctx, "smbcli_mdir failed: (%s)\n", tctx 1478 source4/torture/basic/delete.c torture_assert(tctx, dnum1 != -1, tctx 1479 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed: %s!", tctx 1492 source4/torture/basic/delete.c torture_assert(tctx, dnum2 != -1, tctx 1493 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed: %s!", tctx 1497 source4/torture/basic/delete.c tctx, smbcli_nt_delete_on_close(cli1->tree, dnum1, true), tctx 1498 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close failed (%s)", tctx 1514 source4/torture/basic/delete.c torture_assert(tctx, dnum1 == -1, tctx 1515 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded!\n", tctx 1402 source4/torture/basic/denytest.c static void progress_bar(struct torture_context *tctx, uint_t i, uint_t total) tctx 1404 source4/torture/basic/denytest.c if (torture_setting_bool(tctx, "progress", true)) { tctx 1405 source4/torture/basic/denytest.c torture_comment(tctx, "%5d/%5d\r", i, total); tctx 1413 source4/torture/basic/denytest.c bool torture_denytest1(struct torture_context *tctx, tctx 1423 source4/torture/basic/denytest.c torture_comment(tctx, "Testing deny modes with 1 connection\n"); tctx 1432 source4/torture/basic/denytest.c torture_comment(tctx, "testing %d entries\n", (int)ARRAY_SIZE(denytable1)); tctx 1440 source4/torture/basic/denytest.c progress_bar(tctx, i, ARRAY_SIZE(denytable1)); tctx 1464 source4/torture/basic/denytest.c if (torture_setting_bool(tctx, "showall", false) || tctx 1470 source4/torture/basic/denytest.c torture_comment(tctx, "%lld: %s %8s %10s %8s %10s %s (correct=%s)\n", tctx 1495 source4/torture/basic/denytest.c torture_comment(tctx, "finshed denytest1 (%d failures)\n", failures); tctx 1503 source4/torture/basic/denytest.c bool torture_denytest2(struct torture_context *tctx, tctx 1527 source4/torture/basic/denytest.c progress_bar(tctx, i, ARRAY_SIZE(denytable1)); tctx 1551 source4/torture/basic/denytest.c if (torture_setting_bool(tctx, "showall", false) || tctx 1557 source4/torture/basic/denytest.c torture_comment(tctx, "%lld: %s %8s %10s %8s %10s %s (correct=%s)\n", tctx 1582 source4/torture/basic/denytest.c torture_comment(tctx, "finshed denytest2 (%d failures)\n", failures); tctx 1591 source4/torture/basic/denytest.c bool torture_denytest3(struct torture_context *tctx, tctx 1606 source4/torture/basic/denytest.c torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2); tctx 1617 source4/torture/basic/denytest.c torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2); tctx 1724 source4/torture/basic/denytest.c static bool torture_ntdenytest(struct torture_context *tctx, tctx 1754 source4/torture/basic/denytest.c torture_comment(tctx, "format: server correct\n"); tctx 1779 source4/torture/basic/denytest.c torture_comment(tctx, "testing %d entries on %s\n", torture_numops, fname); tctx 1792 source4/torture/basic/denytest.c progress_bar(tctx, i, torture_numops); tctx 1856 source4/torture/basic/denytest.c if (torture_setting_bool(tctx, "showall", false) || tctx 1859 source4/torture/basic/denytest.c torture_comment(tctx, "\n%-20s %-70s\n%-20s %-70s %4s %4s %s/%s\n", tctx 1883 source4/torture/basic/denytest.c torture_comment(tctx, "finshed ntdenytest (%d failures)\n", failures); tctx 1892 source4/torture/basic/denytest.c bool torture_ntdenytest1(struct torture_context *tctx, tctx 1899 source4/torture/basic/denytest.c torture_comment(tctx, "starting ntdenytest1 client %d\n", client); tctx 1901 source4/torture/basic/denytest.c return torture_ntdenytest(tctx, cli, cli, client); tctx 1917 source4/torture/basic/denytest.c torture_comment(tctx, "(%s) Incorrect status %s - should be %s\n", \ tctx 1925 source4/torture/basic/denytest.c torture_comment(tctx, "(%s) wrong value for %s 0x%x - should be 0x%x\n", \ tctx 1933 source4/torture/basic/denytest.c bool torture_denydos_sharing(struct torture_context *tctx, tctx 1947 source4/torture/basic/denytest.c torture_comment(tctx, "Checking DENY_DOS shared handle semantics\n"); tctx 1961 source4/torture/basic/denytest.c torture_comment(tctx, "openx twice with RDWR/DENY_DOS\n"); tctx 1970 source4/torture/basic/denytest.c torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2); tctx 1978 source4/torture/basic/denytest.c torture_comment(tctx, "two handles should be same file handle\n"); tctx 1994 source4/torture/basic/denytest.c torture_comment(tctx, "openx twice with RDWR/DENY_NONE\n"); tctx 2005 source4/torture/basic/denytest.c torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2); tctx 2007 source4/torture/basic/denytest.c torture_comment(tctx, "two handles should be separate\n"); tctx 36 source4/torture/basic/dir.c bool torture_dirtest1(struct torture_context *tctx, tctx 45 source4/torture/basic/dir.c torture_comment(tctx, "Creating %d random filenames\n", torture_numops); tctx 62 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "a*.*", 0, list_fn, NULL)); tctx 63 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "b*.*", 0, list_fn, NULL)); tctx 64 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "xyzabc", 0, list_fn, NULL)); tctx 66 source4/torture/basic/dir.c torture_comment(tctx, "dirtest core %g seconds\n", timeval_elapsed(&tv)); tctx 79 source4/torture/basic/dir.c bool torture_dirtest2(struct torture_context *tctx, tctx 91 source4/torture/basic/dir.c torture_comment(tctx, "Creating %d files\n", torture_entries); tctx 123 source4/torture/basic/dir.c torture_comment(tctx, "num_seen = %d\n", num_seen ); tctx 136 source4/torture/basic/dir.c torture_comment(tctx, "num_seen = %d\n", num_seen ); tctx 144 source4/torture/basic/dir.c torture_comment(tctx, "num_seen = %d\n", num_seen ); tctx 159 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "a*.*", 0, list_fn, NULL)); tctx 160 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "b*.*", 0, list_fn, NULL)); tctx 161 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "xyzabc", 0, list_fn, NULL)); tctx 40 source4/torture/basic/locking.c static bool torture_locktest1(struct torture_context *tctx, tctx 54 source4/torture/basic/locking.c torture_assert(tctx, fnum1 != -1, tctx 55 source4/torture/basic/locking.c talloc_asprintf(tctx, tctx 58 source4/torture/basic/locking.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, tctx 61 source4/torture/basic/locking.c torture_assert(tctx, fnum3 != -1, talloc_asprintf(tctx, tctx 64 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, tctx 66 source4/torture/basic/locking.c talloc_asprintf(tctx, "lock1 failed (%s)", smbcli_errstr(cli1->tree))); tctx 68 source4/torture/basic/locking.c torture_assert(tctx, tctx 75 source4/torture/basic/locking.c torture_assert(tctx, tctx 82 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, tctx 84 source4/torture/basic/locking.c talloc_asprintf(tctx, tctx 87 source4/torture/basic/locking.c torture_assert(tctx, tctx 94 source4/torture/basic/locking.c torture_assert(tctx, tctx 101 source4/torture/basic/locking.c torture_assert(tctx, tctx 109 source4/torture/basic/locking.c torture_comment(tctx, "Testing lock timeout with timeout=%u\n", tctx 112 source4/torture/basic/locking.c torture_assert(tctx, tctx 121 source4/torture/basic/locking.c torture_fail(tctx, tctx 124 source4/torture/basic/locking.c torture_comment(tctx, "server slept for %u seconds for a %u second timeout\n", tctx 127 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum2), tctx 128 source4/torture/basic/locking.c talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli1->tree))); tctx 130 source4/torture/basic/locking.c torture_assert(tctx, tctx 137 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 138 source4/torture/basic/locking.c talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli1->tree))); tctx 140 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum3), tctx 141 source4/torture/basic/locking.c talloc_asprintf(tctx, "close3 failed (%s)", smbcli_errstr(cli2->tree))); tctx 143 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli1->tree, fname), tctx 144 source4/torture/basic/locking.c talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(cli1->tree))); tctx 161 source4/torture/basic/locking.c static bool torture_locktest2(struct torture_context *tctx, tctx 171 source4/torture/basic/locking.c torture_comment(tctx, "Testing pid context\n"); tctx 176 source4/torture/basic/locking.c torture_assert(tctx, fnum1 != -1, tctx 177 source4/torture/basic/locking.c talloc_asprintf(tctx, tctx 181 source4/torture/basic/locking.c torture_assert(tctx, fnum2 != -1, tctx 182 source4/torture/basic/locking.c talloc_asprintf(tctx, "open2 of %s failed (%s)", tctx 188 source4/torture/basic/locking.c torture_assert(tctx, fnum3 != -1, tctx 189 source4/torture/basic/locking.c talloc_asprintf(tctx, tctx 194 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, tctx 196 source4/torture/basic/locking.c talloc_asprintf(tctx, tctx 199 source4/torture/basic/locking.c torture_assert(tctx, tctx 206 source4/torture/basic/locking.c torture_assert(tctx, tctx 213 source4/torture/basic/locking.c torture_assert(tctx, tctx 220 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, tctx 222 source4/torture/basic/locking.c talloc_asprintf(tctx, tctx 227 source4/torture/basic/locking.c torture_assert(tctx, tctx 231 source4/torture/basic/locking.c torture_assert(tctx, tctx 239 source4/torture/basic/locking.c torture_assert(tctx, tctx 247 source4/torture/basic/locking.c torture_assert(tctx, tctx 255 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum1), tctx 256 source4/torture/basic/locking.c talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli->tree))); tctx 258 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum2), tctx 259 source4/torture/basic/locking.c talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli->tree))); tctx 261 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum3), tctx 262 source4/torture/basic/locking.c talloc_asprintf(tctx, "close3 failed (%s)", smbcli_errstr(cli->tree))); tctx 273 source4/torture/basic/locking.c static bool torture_locktest3(struct torture_context *tctx, tctx 284 source4/torture/basic/locking.c torture_comment(tctx, "Testing 32 bit offset ranges"); tctx 291 source4/torture/basic/locking.c torture_assert(tctx, fnum1 != -1, tctx 292 source4/torture/basic/locking.c talloc_asprintf(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree))); tctx 294 source4/torture/basic/locking.c torture_assert(tctx, fnum2 != -1, tctx 295 source4/torture/basic/locking.c talloc_asprintf(tctx, "open2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree))); tctx 297 source4/torture/basic/locking.c torture_comment(tctx, "Establishing %d locks\n", torture_numops); tctx 301 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, tctx 303 source4/torture/basic/locking.c talloc_asprintf(tctx, "lock1 %d failed (%s)", i, smbcli_errstr(cli1->tree))); tctx 305 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, tctx 307 source4/torture/basic/locking.c talloc_asprintf(tctx, "lock2 %d failed (%s)", tctx 311 source4/torture/basic/locking.c torture_comment(tctx, "Testing %d locks\n", torture_numops); tctx 316 source4/torture/basic/locking.c torture_assert(tctx, tctx 318 source4/torture/basic/locking.c talloc_asprintf(tctx, "error: lock1 %d succeeded!", i)); tctx 320 source4/torture/basic/locking.c torture_assert(tctx, tctx 322 source4/torture/basic/locking.c talloc_asprintf(tctx, "error: lock2 %d succeeded!", i)); tctx 324 source4/torture/basic/locking.c torture_assert(tctx, tctx 326 source4/torture/basic/locking.c talloc_asprintf(tctx, "error: lock3 %d succeeded!", i)); tctx 328 source4/torture/basic/locking.c torture_assert(tctx, tctx 330 source4/torture/basic/locking.c talloc_asprintf(tctx, "error: lock4 %d succeeded!", i)); tctx 333 source4/torture/basic/locking.c torture_comment(tctx, "Removing %d locks\n", torture_numops); tctx 338 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, tctx 340 source4/torture/basic/locking.c talloc_asprintf(tctx, "unlock1 %d failed (%s)", tctx 344 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, tctx 346 source4/torture/basic/locking.c talloc_asprintf(tctx, "unlock2 %d failed (%s)", tctx 351 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 352 source4/torture/basic/locking.c talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli1->tree))); tctx 354 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2), tctx 355 source4/torture/basic/locking.c talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli2->tree))); tctx 357 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli1->tree, fname), tctx 358 source4/torture/basic/locking.c talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(cli1->tree))); tctx 364 source4/torture/basic/locking.c torture_comment(tctx, "** "); correct = false; \ tctx 370 source4/torture/basic/locking.c static bool torture_locktest4(struct torture_context *tctx, tctx 390 source4/torture/basic/locking.c torture_comment(tctx, "Failed to create file\n"); tctx 398 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s set overlapping write locks\n", ret?"can":"cannot"); tctx 403 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s set overlapping read locks\n", ret?"can":"cannot"); tctx 408 source4/torture/basic/locking.c torture_comment(tctx, "a different connection %s set overlapping write locks\n", ret?"can":"cannot"); tctx 413 source4/torture/basic/locking.c torture_comment(tctx, "a different connection %s set overlapping read locks\n", ret?"can":"cannot"); tctx 418 source4/torture/basic/locking.c torture_comment(tctx, "a different pid %s set overlapping write locks\n", ret?"can":"cannot"); tctx 423 source4/torture/basic/locking.c torture_comment(tctx, "a different pid %s set overlapping read locks\n", ret?"can":"cannot"); tctx 428 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s set the same read lock twice\n", ret?"can":"cannot"); tctx 433 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s set the same write lock twice\n", ret?"can":"cannot"); tctx 438 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s overlay a read lock with a write lock\n", ret?"can":"cannot"); tctx 443 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s overlay a write lock with a read lock\n", ret?"can":"cannot"); tctx 448 source4/torture/basic/locking.c torture_comment(tctx, "a different pid %s overlay a write lock with a read lock\n", ret?"can":"cannot"); tctx 454 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s coalesce read locks\n", ret?"can":"cannot"); tctx 460 source4/torture/basic/locking.c torture_comment(tctx, "this server %s strict write locking\n", ret?"doesn't do":"does"); tctx 465 source4/torture/basic/locking.c torture_comment(tctx, "this server %s strict read locking\n", ret?"doesn't do":"does"); tctx 473 source4/torture/basic/locking.c torture_comment(tctx, "this server %s do recursive read locking\n", ret?"does":"doesn't"); tctx 483 source4/torture/basic/locking.c torture_comment(tctx, "this server %s do recursive lock overlays\n", ret?"does":"doesn't"); tctx 490 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s remove a read lock using write locking\n", ret?"can":"cannot"); tctx 497 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s remove a write lock using read locking\n", ret?"can":"cannot"); tctx 505 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s remove the first lock first\n", ret?"does":"doesn't"); tctx 519 source4/torture/basic/locking.c torture_comment(tctx, "the server %s have the NT byte range lock bug\n", !ret?"does":"doesn't"); tctx 532 source4/torture/basic/locking.c static bool torture_locktest5(struct torture_context *tctx, struct smbcli_state *cli1, tctx 551 source4/torture/basic/locking.c torture_assert(tctx, smbcli_write(cli1->tree, fnum1, 0, buf, 0, sizeof(buf)) == sizeof(buf), tctx 561 source4/torture/basic/locking.c torture_comment(tctx, "this server %s the NT locking bug\n", ret ? "doesn't have" : "has"); tctx 569 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s overlay a write with a read lock\n", ret?"can":"cannot"); tctx 574 source4/torture/basic/locking.c torture_comment(tctx, "a different processs %s get a read lock on the first process lock stack\n", ret?"can":"cannot"); tctx 582 source4/torture/basic/locking.c torture_comment(tctx, "the same processs on a different fnum %s get a read lock\n", ret?"can":"cannot"); tctx 592 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s stack read locks\n", ret?"can":"cannot"); tctx 601 source4/torture/basic/locking.c torture_comment(tctx, "the first unlock removes the %s lock\n", ret?"WRITE":"READ"); tctx 613 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s unlock the stack of 3 locks\n", ret?"can":"cannot"); tctx 618 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s count the lock stack\n", !ret?"can":"cannot"); tctx 624 source4/torture/basic/locking.c torture_comment(tctx, "a different processs %s get a write lock on the unlocked stack\n", ret?"can":"cannot"); tctx 627 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 628 source4/torture/basic/locking.c talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli1->tree))); tctx 630 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2), tctx 631 source4/torture/basic/locking.c talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli2->tree))); tctx 633 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum3), tctx 634 source4/torture/basic/locking.c talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli2->tree))); tctx 636 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli1->tree, fname), tctx 637 source4/torture/basic/locking.c talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(cli1->tree))); tctx 645 source4/torture/basic/locking.c static bool torture_locktest6(struct torture_context *tctx, tctx 658 source4/torture/basic/locking.c torture_comment(tctx, "Testing %s\n", fname[i]); tctx 665 source4/torture/basic/locking.c torture_comment(tctx, "CHANGE_LOCKTYPE gave %s\n", nt_errstr(status)); tctx 670 source4/torture/basic/locking.c torture_comment(tctx, "CANCEL_LOCK gave %s\n", nt_errstr(status)); tctx 678 source4/torture/basic/locking.c static bool torture_locktest7(struct torture_context *tctx, tctx 688 source4/torture/basic/locking.c torture_assert(tctx, torture_setup_dir(cli1, BASEDIR), tctx 689 source4/torture/basic/locking.c talloc_asprintf(tctx, "Unable to set up %s", BASEDIR)); tctx 695 source4/torture/basic/locking.c torture_assert(tctx, smbcli_write(cli1->tree, fnum1, 0, buf, 0, sizeof(buf)) == sizeof(buf), tctx 700 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_lock(cli1->tree, fnum1, 130, 4, 0, READ_LOCK), tctx 701 source4/torture/basic/locking.c talloc_asprintf(tctx, "Unable to apply read lock on range 130:4, error was %s", tctx 704 source4/torture/basic/locking.c torture_comment(tctx, "pid1 successfully locked range 130:4 for READ\n"); tctx 706 source4/torture/basic/locking.c torture_assert(tctx, smbcli_read(cli1->tree, fnum1, buf, 130, 4) == 4, tctx 707 source4/torture/basic/locking.c talloc_asprintf(tctx, "pid1 unable to read the range 130:4, error was %s)", tctx 710 source4/torture/basic/locking.c torture_comment(tctx, "pid1 successfully read the range 130:4\n"); tctx 713 source4/torture/basic/locking.c torture_comment(tctx, "pid1 unable to write to the range 130:4, error was %s\n", smbcli_errstr(cli1->tree)); tctx 714 source4/torture/basic/locking.c torture_assert_ntstatus_equal(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_FILE_LOCK_CONFLICT, tctx 717 source4/torture/basic/locking.c torture_fail(tctx, "pid1 successfully wrote to the range 130:4 (should be denied)"); tctx 723 source4/torture/basic/locking.c torture_comment(tctx, "pid2 unable to read the range 130:4, error was %s\n", smbcli_errstr(cli1->tree)); tctx 725 source4/torture/basic/locking.c torture_comment(tctx, "pid2 successfully read the range 130:4\n"); tctx 729 source4/torture/basic/locking.c torture_comment(tctx, "pid2 unable to write to the range 130:4, error was %s\n", smbcli_errstr(cli1->tree)); tctx 730 source4/torture/basic/locking.c torture_assert_ntstatus_equal(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_FILE_LOCK_CONFLICT, tctx 733 source4/torture/basic/locking.c torture_fail(tctx, "pid2 successfully wrote to the range 130:4 (should be denied)"); tctx 739 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_lock(cli1->tree, fnum1, 130, 4, 0, WRITE_LOCK), tctx 740 source4/torture/basic/locking.c talloc_asprintf(tctx, "Unable to apply write lock on range 130:4, error was %s", tctx 742 source4/torture/basic/locking.c torture_comment(tctx, "pid1 successfully locked range 130:4 for WRITE\n"); tctx 744 source4/torture/basic/locking.c torture_assert(tctx, smbcli_read(cli1->tree, fnum1, buf, 130, 4) == 4, tctx 745 source4/torture/basic/locking.c talloc_asprintf(tctx, "pid1 unable to read the range 130:4, error was %s", tctx 747 source4/torture/basic/locking.c torture_comment(tctx, "pid1 successfully read the range 130:4\n"); tctx 749 source4/torture/basic/locking.c torture_assert(tctx, smbcli_write(cli1->tree, fnum1, 0, buf, 130, 4) == 4, tctx 750 source4/torture/basic/locking.c talloc_asprintf(tctx, "pid1 unable to write to the range 130:4, error was %s", tctx 752 source4/torture/basic/locking.c torture_comment(tctx, "pid1 successfully wrote to the range 130:4\n"); tctx 757 source4/torture/basic/locking.c torture_comment(tctx, "pid2 unable to read the range 130:4, error was %s\n", tctx 759 source4/torture/basic/locking.c torture_assert_ntstatus_equal(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_FILE_LOCK_CONFLICT, tctx 762 source4/torture/basic/locking.c torture_fail(tctx, "pid2 successfully read the range 130:4 (should be denied)"); tctx 766 source4/torture/basic/locking.c torture_comment(tctx, "pid2 unable to write to the range 130:4, error was %s\n", tctx 769 source4/torture/basic/locking.c torture_comment(tctx, "Incorrect error (should be NT_STATUS_FILE_LOCK_CONFLICT) (%s)\n", tctx 774 source4/torture/basic/locking.c torture_comment(tctx, "pid2 successfully wrote to the range 130:4 (should be denied) (%s)\n", tctx 779 source4/torture/basic/locking.c torture_comment(tctx, "Testing truncate of locked file.\n"); tctx 783 source4/torture/basic/locking.c torture_assert(tctx, fnum2 != -1, "Unable to truncate locked file"); tctx 785 source4/torture/basic/locking.c torture_comment(tctx, "Truncated locked file.\n"); tctx 787 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_getatr(cli1->tree, fname, NULL, &size, NULL), tctx 788 source4/torture/basic/locking.c talloc_asprintf(tctx, "getatr failed (%s)", smbcli_errstr(cli1->tree))); tctx 790 source4/torture/basic/locking.c torture_assert(tctx, size == 0, talloc_asprintf(tctx, "Unable to truncate locked file. Size was %u", (unsigned)size)); tctx 35 source4/torture/basic/mangle_test.c static bool test_one(struct torture_context *tctx ,struct smbcli_state *cli, tctx 64 source4/torture/basic/mangle_test.c name2 = talloc_asprintf(tctx, "\\mangle_test\\%s", shortname); tctx 50 source4/torture/basic/misc.c static bool rw_torture(struct torture_context *tctx, struct smbcli_state *c) tctx 66 source4/torture/basic/misc.c torture_comment(tctx, "open of %s failed (%s)\n", lockfname, smbcli_errstr(c->tree)); tctx 75 source4/torture/basic/misc.c if (torture_setting_bool(tctx, "progress", true)) { tctx 76 source4/torture/basic/misc.c torture_comment(tctx, "%d\r", i); tctx 88 source4/torture/basic/misc.c torture_comment(tctx, "open failed (%s)\n", smbcli_errstr(c->tree)); tctx 94 source4/torture/basic/misc.c torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(c->tree)); tctx 102 source4/torture/basic/misc.c torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(c->tree)); tctx 110 source4/torture/basic/misc.c torture_comment(tctx, "read failed (%s)\n", smbcli_errstr(c->tree)); tctx 115 source4/torture/basic/misc.c torture_comment(tctx, "data corruption!\n"); tctx 120 source4/torture/basic/misc.c torture_comment(tctx, "close failed (%s)\n", smbcli_errstr(c->tree)); tctx 125 source4/torture/basic/misc.c torture_comment(tctx, "unlink failed (%s)\n", smbcli_errstr(c->tree)); tctx 130 source4/torture/basic/misc.c torture_comment(tctx, "unlock failed (%s)\n", smbcli_errstr(c->tree)); tctx 139 source4/torture/basic/misc.c torture_comment(tctx, "%d\n", i); tctx 144 source4/torture/basic/misc.c bool run_torture(struct torture_context *tctx, struct smbcli_state *cli, int dummy) tctx 146 source4/torture/basic/misc.c return rw_torture(tctx, cli); tctx 153 source4/torture/basic/misc.c bool run_pipe_number(struct torture_context *tctx, tctx 165 source4/torture/basic/misc.c torture_comment(tctx, "Open of pipe %s failed with error (%s)\n", pipe_name, smbcli_errstr(cli1->tree)); tctx 169 source4/torture/basic/misc.c if (torture_setting_bool(tctx, "progress", true)) { tctx 170 source4/torture/basic/misc.c torture_comment(tctx, "%d\r", num_pipes); tctx 175 source4/torture/basic/misc.c torture_comment(tctx, "pipe_number test - we can open %d %s pipes.\n", num_pipes, pipe_name ); tctx 187 source4/torture/basic/misc.c bool torture_holdcon(struct torture_context *tctx) tctx 193 source4/torture/basic/misc.c torture_comment(tctx, "Opening %d connections\n", torture_numops); tctx 198 source4/torture/basic/misc.c if (!torture_open_connection(&cli[i], tctx, i)) { tctx 201 source4/torture/basic/misc.c if (torture_setting_bool(tctx, "progress", true)) { tctx 202 source4/torture/basic/misc.c torture_comment(tctx, "opened %d connections\r", i); tctx 207 source4/torture/basic/misc.c torture_comment(tctx, "\nStarting pings\n"); tctx 215 source4/torture/basic/misc.c torture_comment(tctx, "Connection %d is dead\n", i); tctx 224 source4/torture/basic/misc.c torture_comment(tctx, "All connections dead - finishing\n"); tctx 228 source4/torture/basic/misc.c torture_comment(tctx, "."); tctx 238 source4/torture/basic/misc.c bool run_maxfidtest(struct torture_context *tctx, struct smbcli_state *cli, int dummy) tctx 247 source4/torture/basic/misc.c torture_comment(tctx, "failed to connect\n"); tctx 252 source4/torture/basic/misc.c torture_comment(tctx, "Failed to deltree \\maxfid - %s\n", tctx 257 source4/torture/basic/misc.c torture_comment(tctx, "Failed to mkdir \\maxfid, error=%s\n", tctx 262 source4/torture/basic/misc.c torture_comment(tctx, "Testing maximum number of open files\n"); tctx 268 source4/torture/basic/misc.c torture_comment(tctx, "Failed to mkdir %s, error=%s\n", tctx 278 source4/torture/basic/misc.c torture_comment(tctx, "open of %s failed (%s)\n", tctx 280 source4/torture/basic/misc.c torture_comment(tctx, "maximum fnum is %d\n", i); tctx 284 source4/torture/basic/misc.c if (torture_setting_bool(tctx, "progress", true)) { tctx 285 source4/torture/basic/misc.c torture_comment(tctx, "%6d\r", i); tctx 289 source4/torture/basic/misc.c torture_comment(tctx, "%6d\n", i); tctx 294 source4/torture/basic/misc.c torture_comment(tctx, "cleaning up\n"); tctx 298 source4/torture/basic/misc.c torture_comment(tctx, "Close of fnum %d failed - %s\n", fnums[i], smbcli_errstr(cli->tree)); tctx 301 source4/torture/basic/misc.c torture_comment(tctx, "unlink of %s failed (%s)\n", tctx 309 source4/torture/basic/misc.c torture_comment(tctx, "Close of fnum %d failed - %s\n", fnums[maxfid-i], smbcli_errstr(cli->tree)); tctx 312 source4/torture/basic/misc.c torture_comment(tctx, "unlink of %s failed (%s)\n", tctx 318 source4/torture/basic/misc.c if (torture_setting_bool(tctx, "progress", true)) { tctx 319 source4/torture/basic/misc.c torture_comment(tctx, "%6d %6d\r", i, maxfid-i); tctx 323 source4/torture/basic/misc.c torture_comment(tctx, "%6d\n", 0); tctx 326 source4/torture/basic/misc.c torture_comment(tctx, "Failed to deltree \\maxfid - %s\n", tctx 331 source4/torture/basic/misc.c torture_comment(tctx, "maxfid test finished\n"); tctx 344 source4/torture/basic/misc.c bool torture_ioctl_test(struct torture_context *tctx, tctx 354 source4/torture/basic/misc.c mem_ctx = talloc_named_const(tctx, 0, "ioctl_test"); tctx 360 source4/torture/basic/misc.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli->tree)); tctx 368 source4/torture/basic/misc.c torture_comment(tctx, "ioctl job info: %s\n", smbcli_errstr(cli->tree)); tctx 371 source4/torture/basic/misc.c torture_comment(tctx, "testing device=0x%x\n", device); tctx 377 source4/torture/basic/misc.c torture_comment(tctx, "ioctl device=0x%x function=0x%x OK : %d bytes\n", tctx 403 source4/torture/basic/misc.c struct torture_context *tctx; tctx 434 source4/torture/basic/misc.c static int init_benchrw_params(struct torture_context *tctx, tctx 440 source4/torture/basic/misc.c lpar->retry = torture_setting_int(tctx, "retry",3); tctx 441 source4/torture/basic/misc.c lpar->blocksize = torture_setting_int(tctx, "blocksize",65535); tctx 442 source4/torture/basic/misc.c lpar->writeblocks = torture_setting_int(tctx, "writeblocks",15); tctx 443 source4/torture/basic/misc.c lpar->writeratio = torture_setting_int(tctx, "writeratio",5); tctx 445 source4/torture/basic/misc.c tctx, "parallel_requests", 5); tctx 446 source4/torture/basic/misc.c lpar->workgroup = lp_workgroup(tctx->lp_ctx); tctx 448 source4/torture/basic/misc.c p = torture_setting_string(tctx, "unclist", NULL); tctx 453 source4/torture/basic/misc.c torture_comment(tctx, "Failed to load unc names list " tctx 458 source4/torture/basic/misc.c lpar->unc = talloc_array(tctx, struct unclist *, tctx 470 source4/torture/basic/misc.c tctx, "Failed to parse UNC " tctx 476 source4/torture/basic/misc.c talloc(tctx, struct unclist); tctx 482 source4/torture/basic/misc.c lpar->unc = talloc_array(tctx, struct unclist *, 1); tctx 483 source4/torture/basic/misc.c lpar->unc[0] = talloc(tctx,struct unclist); tctx 484 source4/torture/basic/misc.c lpar->unc[0]->host = torture_setting_string(tctx, "host", tctx 486 source4/torture/basic/misc.c lpar->unc[0]->share = torture_setting_string(tctx, "share", tctx 495 source4/torture/basic/misc.c static NTSTATUS benchrw_close(struct torture_context *tctx, tctx 503 source4/torture/basic/misc.c torture_comment(tctx, "Close file %d (%d)\n",state->nr,state->fnum); tctx 518 source4/torture/basic/misc.c static NTSTATUS benchrw_readwrite(struct torture_context *tctx, tctx 525 source4/torture/basic/misc.c struct torture_context *tctx = state->tctx; tctx 546 source4/torture/basic/misc.c benchrw_readwrite(tctx, state); tctx 553 source4/torture/basic/misc.c static NTSTATUS benchrw_readwrite(struct torture_context *tctx, tctx 562 source4/torture/basic/misc.c torture_comment(tctx, "Callback WRITE file:%d (%d/%d)\n", tctx 575 source4/torture/basic/misc.c torture_comment(tctx, tctx 607 source4/torture/basic/misc.c static NTSTATUS benchrw_open(struct torture_context *tctx, tctx 614 source4/torture/basic/misc.c status = smb_raw_open_recv(req,tctx,( tctx 620 source4/torture/basic/misc.c torture_comment(tctx, "File opened (%d)\n",state->fnum); tctx 624 source4/torture/basic/misc.c torture_comment(tctx, "Write initial test file:%d (%d/%d)\n",state->nr, tctx 654 source4/torture/basic/misc.c static NTSTATUS benchrw_mkdir(struct torture_context *tctx, tctx 664 source4/torture/basic/misc.c torture_comment(tctx, "Open File %d/%d\n",state->nr+1, tctx 665 source4/torture/basic/misc.c torture_setting_int(tctx, "nprocs", 4)); tctx 666 source4/torture/basic/misc.c open_parms=talloc_zero(tctx, union smb_open); tctx 680 source4/torture/basic/misc.c writedata = talloc_size(tctx,state->lp_params->blocksize); tctx 705 source4/torture/basic/misc.c struct torture_context *tctx = state->tctx; tctx 716 source4/torture/basic/misc.c if (!NT_STATUS_IS_OK(benchrw_mkdir(tctx, req,state))) { tctx 717 source4/torture/basic/misc.c torture_comment(tctx, "Failed to create the test " tctx 726 source4/torture/basic/misc.c if (!NT_STATUS_IS_OK(benchrw_open(tctx, req,state))){ tctx 727 source4/torture/basic/misc.c torture_comment(tctx, "Failed to open/write the " tctx 739 source4/torture/basic/misc.c status = benchrw_readwrite(tctx,state); tctx 741 source4/torture/basic/misc.c torture_comment(tctx, "Failed to read/write " tctx 750 source4/torture/basic/misc.c if (!NT_STATUS_IS_OK(benchrw_close(tctx,req,state))){ tctx 751 source4/torture/basic/misc.c torture_comment(tctx, "Failed to read/write/close " tctx 759 source4/torture/basic/misc.c torture_comment(tctx, "File %d closed\n",state->nr); tctx 761 source4/torture/basic/misc.c torture_comment(tctx, "Failed to close the " tctx 779 source4/torture/basic/misc.c struct torture_context *tctx = state->tctx; tctx 788 source4/torture/basic/misc.c torture_comment(tctx, "Failed to open connection: " tctx 795 source4/torture/basic/misc.c torture_comment(tctx, "Failed to open connection " tctx 808 source4/torture/basic/misc.c struct torture_context *tctx, tctx 816 source4/torture/basic/misc.c torture_comment(tctx, "Open Connection to %s/%s\n",host,share); tctx 819 source4/torture/basic/misc.c smb->in.dest_ports=lp_smb_ports(tctx->lp_ctx); tctx 820 source4/torture/basic/misc.c smb->in.socket_options = lp_socket_options(tctx->lp_ctx); tctx 825 source4/torture/basic/misc.c smb->in.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx); tctx 826 source4/torture/basic/misc.c smb->in.gensec_settings = lp_gensec_settings(mem_ctx, tctx->lp_ctx); tctx 828 source4/torture/basic/misc.c lp_smbcli_options(tctx->lp_ctx, &smb->in.options); tctx 829 source4/torture/basic/misc.c lp_smbcli_session_options(tctx->lp_ctx, &smb->in.session_options); tctx 832 source4/torture/basic/misc.c lp_resolve_context(tctx->lp_ctx),ev); tctx 835 source4/torture/basic/misc.c bool run_benchrw(struct torture_context *tctx) tctx 848 source4/torture/basic/misc.c int torture_nprocs = torture_setting_int(tctx, "nprocs", 4); tctx 850 source4/torture/basic/misc.c torture_comment(tctx, "Start BENCH-READWRITE num_ops=%d " tctx 855 source4/torture/basic/misc.c ev = tctx->ev; tctx 856 source4/torture/basic/misc.c state = talloc_array(tctx, struct benchrw_state *, torture_nprocs); tctx 859 source4/torture/basic/misc.c num_unc_names = init_benchrw_params(tctx,&lpparams); tctx 863 source4/torture/basic/misc.c state[i]=talloc(tctx,struct benchrw_state); tctx 864 source4/torture/basic/misc.c state[i]->tctx = tctx; tctx 869 source4/torture/basic/misc.c state[i]->dname=talloc_asprintf(tctx,"benchrw%d",i); tctx 870 source4/torture/basic/misc.c state[i]->fname=talloc_asprintf(tctx,"%s%s", tctx 876 source4/torture/basic/misc.c torture_comment(tctx, "Starting async requests\n"); tctx 884 source4/torture/basic/misc.c tctx,struct smb_composite_connect) ; tctx 888 source4/torture/basic/misc.c tctx, smb_con, tctx,ev, tctx 898 source4/torture/basic/misc.c torture_comment(tctx, "Setup test dir %d\n",i); tctx 903 source4/torture/basic/misc.c tctx, tctx 925 source4/torture/basic/misc.c torture_comment(tctx, "Deleting test dir %s " tctx 931 source4/torture/basic/misc.c torture_comment(tctx, "ERROR: Tree " tctx 30 source4/torture/basic/rename.c bool torture_test_rename(struct torture_context *tctx, tctx 45 source4/torture/basic/rename.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "First open failed - %s", tctx 48 source4/torture/basic/rename.c torture_assert(tctx, NT_STATUS_IS_ERR(smbcli_rename(cli1->tree, fname, fname1)), tctx 51 source4/torture/basic/rename.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 52 source4/torture/basic/rename.c talloc_asprintf(tctx, "close - 1 failed (%s)", smbcli_errstr(cli1->tree))); tctx 62 source4/torture/basic/rename.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, tctx 65 source4/torture/basic/rename.c torture_assert_ntstatus_ok(tctx, smbcli_rename(cli1->tree, fname, fname1), tctx 66 source4/torture/basic/rename.c talloc_asprintf(tctx, tctx 70 source4/torture/basic/rename.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 71 source4/torture/basic/rename.c talloc_asprintf(tctx, tctx 83 source4/torture/basic/rename.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "Third open failed - %s", tctx 86 source4/torture/basic/rename.c torture_assert_ntstatus_ok(tctx, smbcli_rename(cli1->tree, fname, fname1), tctx 87 source4/torture/basic/rename.c talloc_asprintf(tctx, "Third rename failed - this should have succeeded - %s", tctx 90 source4/torture/basic/rename.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), tctx 91 source4/torture/basic/rename.c talloc_asprintf(tctx, "close - 3 failed (%s)", smbcli_errstr(cli1->tree))); tctx 34 source4/torture/basic/secleak.c static bool try_failed_login(struct torture_context *tctx, struct smbcli_state *cli) tctx 41 source4/torture/basic/secleak.c lp_smbcli_session_options(tctx->lp_ctx, &options); tctx 46 source4/torture/basic/secleak.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 48 source4/torture/basic/secleak.c setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx); tctx 50 source4/torture/basic/secleak.c cli_credentials_set_conf(setup.in.credentials, tctx->lp_ctx); tctx 65 source4/torture/basic/secleak.c bool torture_sec_leak(struct torture_context *tctx, struct smbcli_state *cli) tctx 68 source4/torture/basic/secleak.c int timelimit = torture_setting_int(tctx, "timelimit", 20); tctx 71 source4/torture/basic/secleak.c if (!try_failed_login(tctx, cli)) { tctx 36 source4/torture/basic/unlink.c bool torture_unlinktest(struct torture_context *tctx, struct smbcli_state *cli) tctx 44 source4/torture/basic/unlink.c torture_assert(tctx, torture_setup_dir(cli, BASEDIR), tctx 45 source4/torture/basic/unlink.c talloc_asprintf(tctx, "Failed setting up %s", BASEDIR)); tctx 49 source4/torture/basic/unlink.c torture_comment(tctx, "Opening a file\n"); tctx 52 source4/torture/basic/unlink.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, "open of %s failed (%s)", fname, smbcli_errstr(cli->tree))); tctx 54 source4/torture/basic/unlink.c torture_comment(tctx, "Unlinking a open file\n"); tctx 56 source4/torture/basic/unlink.c torture_assert(tctx, !NT_STATUS_IS_OK(smbcli_unlink(cli->tree, fname)), tctx 65 source4/torture/basic/unlink.c torture_comment(tctx, "testing unlink after ntcreatex with DELETE access\n"); tctx 81 source4/torture/basic/unlink.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "failed to open %s", fname)); tctx 83 source4/torture/basic/unlink.c torture_assert(tctx, !NT_STATUS_IS_OK(smbcli_unlink(cli->tree, fname)), tctx 28 source4/torture/basic/utable.c bool torture_utable(struct torture_context *tctx, tctx 40 source4/torture/basic/utable.c torture_comment(tctx, "Generating valid character table\n"); tctx 44 source4/torture/basic/utable.c torture_assert(tctx, torture_setup_dir(cli, "\\utable"), tctx 53 source4/torture/basic/utable.c convert_string_convenience(lp_iconv_convenience(tctx->lp_ctx), CH_UTF16, CH_UNIX, tctx 70 source4/torture/basic/utable.c torture_comment(tctx, "fname=[%s] alt_name=[%s]\n", fname, alt_name); tctx 77 source4/torture/basic/utable.c if (torture_setting_bool(tctx, "progress", true)) { tctx 78 source4/torture/basic/utable.c torture_comment(tctx, "%d (%d/%d)\r", c, chars_allowed, alt_allowed); tctx 83 source4/torture/basic/utable.c torture_comment(tctx, "%d (%d/%d)\n", c, chars_allowed, alt_allowed); tctx 87 source4/torture/basic/utable.c torture_comment(tctx, "%d chars allowed %d alt chars allowed\n", chars_allowed, alt_allowed); tctx 90 source4/torture/basic/utable.c torture_assert(tctx, fd != -1, tctx 91 source4/torture/basic/utable.c talloc_asprintf(tctx, tctx 95 source4/torture/basic/utable.c torture_comment(tctx, "wrote valid.dat\n"); tctx 119 source4/torture/basic/utable.c bool torture_casetable(struct torture_context *tctx, tctx 128 source4/torture/basic/utable.c torture_comment(tctx, "Determining upper/lower case table\n"); tctx 132 source4/torture/basic/utable.c torture_assert(tctx, torture_setup_dir(cli, "\\utable"), tctx 140 source4/torture/basic/utable.c torture_comment(tctx, "%04x (%c)\n", c, isprint(c)?c:'.'); tctx 142 source4/torture/basic/utable.c fname = form_name(lp_iconv_convenience(tctx->lp_ctx), c); tctx 153 source4/torture/basic/utable.c torture_assert(tctx, fnum != -1, tctx 154 source4/torture/basic/utable.c talloc_asprintf(tctx, tctx 167 source4/torture/basic/utable.c torture_comment(tctx, "too many chars match?? size=%d c=0x%04x\n", tctx 174 source4/torture/basic/utable.c torture_comment(tctx, "%04x: ", c); tctx 177 source4/torture/basic/utable.c torture_comment(tctx, "%04x ", c2[i]); tctx 180 source4/torture/basic/utable.c torture_comment(tctx, "\n"); tctx 45 source4/torture/ldap/basic.c static bool test_bind_sasl(struct torture_context *tctx, tctx 53 source4/torture/ldap/basic.c status = torture_ldap_bind_sasl(conn, creds, tctx->lp_ctx); tctx 32 source4/torture/ldap/cldap.c #define CHECK_STATUS(status, correct) torture_assert_ntstatus_equal(tctx, status, correct, "incorrect status") tctx 34 source4/torture/ldap/cldap.c #define CHECK_VAL(v, correct) torture_assert_int_equal(tctx, (v), (correct), "incorrect value"); tctx 36 source4/torture/ldap/cldap.c #define CHECK_STRING(v, correct) torture_assert_str_equal(tctx, v, correct, "incorrect value"); tctx 40 source4/torture/ldap/cldap.c static bool test_cldap_netlogon(struct torture_context *tctx, const char *dest) tctx 49 source4/torture/ldap/cldap.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 53 source4/torture/ldap/cldap.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx); tctx 62 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 75 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 83 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 89 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 95 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 103 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 110 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 116 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 124 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 134 source4/torture/ldap/cldap.c search.in.domain_guid = GUID_string(tctx, &n1.data.nt5_ex.domain_uuid); tctx 135 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 138 source4/torture/ldap/cldap.c CHECK_STRING(GUID_string(tctx, &search.out.netlogon.data.nt5_ex.domain_uuid), search.in.domain_guid); tctx 143 source4/torture/ldap/cldap.c search.in.domain_guid = GUID_string(tctx, &guid); tctx 144 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 150 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 158 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 167 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 176 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 184 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 191 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 200 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 204 source4/torture/ldap/cldap.c search.in.domain_guid = GUID_string(tctx, &n1.data.nt5_ex.domain_uuid); tctx 205 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 212 source4/torture/ldap/cldap.c search.in.domain_guid = GUID_string(tctx, &guid); tctx 213 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 220 source4/torture/ldap/cldap.c search.in.domain_guid = GUID_string(tctx, &guid); tctx 222 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 234 source4/torture/ldap/cldap.c static bool test_cldap_netlogon_flags(struct torture_context *tctx, tctx 243 source4/torture/ldap/cldap.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 249 source4/torture/ldap/cldap.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx); tctx 254 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 343 source4/torture/ldap/cldap.c static bool test_cldap_netlogon_flag_ds_dns_forest(struct torture_context *tctx, tctx 354 source4/torture/ldap/cldap.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 360 source4/torture/ldap/cldap.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx); tctx 365 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search); tctx 385 source4/torture/ldap/cldap.c search2.in.dest_port = lp_cldap_port(tctx->lp_ctx); tctx 391 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search2); tctx 417 source4/torture/ldap/cldap.c static bool test_cldap_generic(struct torture_context *tctx, const char *dest) tctx 426 source4/torture/ldap/cldap.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 430 source4/torture/ldap/cldap.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx); tctx 434 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search); tctx 441 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search); tctx 450 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search); tctx 459 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search); tctx 468 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search); tctx 477 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search); tctx 52 source4/torture/ldap/cldapbench.c static bool bench_cldap_netlogon(struct torture_context *tctx, const char *address) tctx 58 source4/torture/ldap/cldapbench.c int timelimit = torture_setting_int(tctx, "timelimit", 10); tctx 62 source4/torture/ldap/cldapbench.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 64 source4/torture/ldap/cldapbench.c state = talloc_zero(tctx, struct bench_state); tctx 68 source4/torture/ldap/cldapbench.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx); tctx 82 source4/torture/ldap/cldapbench.c if (torture_setting_bool(tctx, "progress", true)) { tctx 124 source4/torture/ldap/cldapbench.c static bool bench_cldap_rootdse(struct torture_context *tctx, const char *address) tctx 130 source4/torture/ldap/cldapbench.c int timelimit = torture_setting_int(tctx, "timelimit", 10); tctx 134 source4/torture/ldap/cldapbench.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 136 source4/torture/ldap/cldapbench.c state = talloc_zero(tctx, struct bench_state); tctx 140 source4/torture/ldap/cldapbench.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx); tctx 155 source4/torture/ldap/cldapbench.c if (torture_setting_bool(tctx, "progress", true)) { tctx 164 source4/torture/ldap/cldapbench.c tevent_loop_once(tctx->ev); tctx 168 source4/torture/ldap/cldapbench.c tevent_loop_once(tctx->ev); tctx 57 source4/torture/ldap/common.c NTSTATUS torture_ldap_connection(struct torture_context *tctx, tctx 68 source4/torture/ldap/common.c *conn = ldap4_new_connection(tctx, tctx->lp_ctx, tctx->ev); tctx 80 source4/torture/ldap/common.c NTSTATUS torture_ldap_connection2(struct torture_context *tctx, struct ldap_connection **conn, tctx 85 source4/torture/ldap/common.c status = torture_ldap_connection(tctx, conn, url); tctx 90 source4/torture/ldap/common.c printf("Failed a simple ldap bind - %s\n", ldap_errstr(*conn, tctx, status)); tctx 45 source4/torture/libnet/libnet_BecomeDC.c struct torture_context *tctx; tctx 282 source4/torture/libnet/libnet_BecomeDC.c if (lp_parm_bool(s->tctx->lp_ctx, NULL, "become dc", "dump objects", false)) { tctx 325 source4/torture/libnet/libnet_BecomeDC.c s->ldb = ldb_wrap_connect(s, s->tctx->ev, s->tctx->lp_ctx, sam_ldb_path, tctx 326 source4/torture/libnet/libnet_BecomeDC.c system_session(s, s->tctx->lp_ctx), tctx 523 source4/torture/libnet/libnet_BecomeDC.c if (lp_parm_bool(s->tctx->lp_ctx, NULL, "become dc", "dump objects", false)) { tctx 553 source4/torture/libnet/libnet_BecomeDC.c if (lp_parm_bool(s->tctx->lp_ctx, NULL, "become dc", "dump objects", false)) { tctx 584 source4/torture/libnet/libnet_BecomeDC.c s->tctx = torture; tctx 668 source4/torture/libnet/libnet_BecomeDC.c s->ldb = ldb_wrap_connect(s, s->tctx->ev, s->lp_ctx, sam_ldb_path, tctx 82 source4/torture/libnet/userman.c static bool test_usermod(struct torture_context *tctx, struct dcerpc_pipe *p, tctx 106 source4/torture/libnet/userman.c torture_comment(tctx, "modifying user (%d simultaneous change(s))\n", tctx 109 source4/torture/libnet/userman.c torture_comment(tctx, "fields to change: ["); tctx 204 source4/torture/libnet/userman.c torture_comment(tctx, ((i < num_changes - 1) ? "%s," : "%s"), fldname); tctx 206 source4/torture/libnet/userman.c torture_comment(tctx, "]\n"); tctx 209 source4/torture/libnet/userman.c torture_assert_ntstatus_ok(tctx, status, "Failed to call sync libnet_rpc_usermod"); tctx 268 source4/torture/libnet/userman.c static bool test_compare(struct torture_context *tctx, tctx 285 source4/torture/libnet/userman.c torture_assert_ntstatus_ok(tctx, status, "Failed to call sync libnet_rpc_userinfo"); tctx 32 source4/torture/libnet/utils.c bool test_opendomain(struct torture_context *tctx, tctx 44 source4/torture/libnet/utils.c torture_comment(tctx, "connecting\n"); tctx 51 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "Connect failed"); tctx 57 source4/torture/libnet/utils.c torture_comment(tctx, "domain lookup on %s\n", domname->string); tctx 60 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "LookupDomain failed"); tctx 67 source4/torture/libnet/utils.c torture_comment(tctx, "opening domain\n"); tctx 70 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "OpenDomain failed"); tctx 78 source4/torture/libnet/utils.c bool test_user_cleanup(struct torture_context *tctx, struct dcerpc_pipe *p, tctx 99 source4/torture/libnet/utils.c torture_comment(tctx, "user account lookup '%s'\n", name); tctx 102 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "LookupNames failed"); tctx 111 source4/torture/libnet/utils.c torture_comment(tctx, "opening user account\n"); tctx 114 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "OpenUser failed"); tctx 119 source4/torture/libnet/utils.c torture_comment(tctx, "deleting user account\n"); tctx 122 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "DeleteUser failed"); tctx 128 source4/torture/libnet/utils.c bool test_user_create(struct torture_context *tctx, tctx 146 source4/torture/libnet/utils.c torture_comment(tctx, "creating user account %s\n", name); tctx 153 source4/torture/libnet/utils.c torture_comment(tctx, "User (%s) already exists - attempting to delete and recreate account again\n", name); tctx 154 source4/torture/libnet/utils.c if (!test_user_cleanup(tctx, p, mem_ctx, handle, name)) { tctx 158 source4/torture/libnet/utils.c torture_comment(tctx, "creating user account\n"); tctx 161 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "CreateUser failed"); tctx 22 source4/torture/libnet/utils.h bool test_opendomain(struct torture_context *tctx, tctx 27 source4/torture/libnet/utils.h bool test_user_create(struct torture_context *tctx, tctx 32 source4/torture/libnet/utils.h bool test_user_cleanup(struct torture_context *tctx, tctx 30 source4/torture/local/torture.c static bool test_tempdir(struct torture_context *tctx) tctx 33 source4/torture/local/torture.c TALLOC_CTX *mem_ctx = tctx; tctx 35 source4/torture/local/torture.c torture_assert_ntstatus_ok(tctx, torture_temp_dir(mem_ctx, "tempdir", &location), tctx 38 source4/torture/local/torture.c torture_assert(tctx, directory_exist(location), tctx 43 source4/torture/local/torture.c static bool test_provision(struct torture_context *tctx) tctx 46 source4/torture/local/torture.c struct provision_settings *settings = talloc_zero(tctx, struct provision_settings); tctx 50 source4/torture/local/torture.c torture_assert_ntstatus_ok(tctx, torture_temp_dir(tctx, "torture_provision", &targetdir), tctx 67 source4/torture/local/torture.c status = provision_bare(settings, tctx->lp_ctx, settings, &result); tctx 69 source4/torture/local/torture.c torture_assert_ntstatus_ok(tctx, status, "provision"); tctx 71 source4/torture/local/torture.c torture_assert_str_equal(tctx, result.domaindn, "DC=EXAMPLE,DC=COM", tctx 40 source4/torture/nbench/nbench.c for (n=0;n<=nb_max_retries && !op;n++) do_reconnect(&cli, tctx, client) tctx 42 source4/torture/nbench/nbench.c static void do_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client) tctx 47 source4/torture/nbench/nbench.c if (nb_reconnect(cli, tctx, client)) { tctx 57 source4/torture/nbench/nbench.c static bool run_netbench(struct torture_context *tctx, struct smbcli_state *cli, int client) tctx 59 source4/torture/nbench/nbench.c int torture_nprocs = torture_setting_int(tctx, "nprocs", 4); tctx 65 source4/torture/nbench/nbench.c double target_rate = torture_setting_double(tctx, "targetrate", 0); tctx 160 source4/torture/nbench/nbio.c bool nb_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client) tctx 168 source4/torture/nbench/nbio.c if (!torture_open_connection(cli, tctx, client)) { tctx 67 source4/torture/nbt/dgram.c static bool nbt_test_netlogon(struct torture_context *tctx) tctx 70 source4/torture/nbt/dgram.c struct nbt_dgram_socket *dgmsock = nbt_dgram_socket_init(tctx, tctx->ev, tctx 71 source4/torture/nbt/dgram.c lp_iconv_convenience(tctx->lp_ctx)); tctx 87 source4/torture/nbt/dgram.c name.name = lp_workgroup(tctx->lp_ctx); tctx 92 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, tctx 93 source4/torture/nbt/dgram.c resolve_name(lp_resolve_context(tctx->lp_ctx), &name, tctx, &address, tctx->ev), tctx 94 source4/torture/nbt/dgram.c talloc_asprintf(tctx, "Failed to resolve %s", name.name)); tctx 96 source4/torture/nbt/dgram.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces); tctx 101 source4/torture/nbt/dgram.c myaddress, lp_dgram_port(tctx->lp_ctx)); tctx 102 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address"); tctx 113 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address"); tctx 134 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx)); tctx 135 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address"); tctx 140 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request"); tctx 148 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet"); tctx 150 source4/torture/nbt/dgram.c torture_assert(tctx, response->response_type == NETLOGON_GET_PDC, "Got incorrect type of netlogon response"); tctx 151 source4/torture/nbt/dgram.c torture_assert(tctx, response->data.get_pdc.command == NETLOGON_RESPONSE_FROM_PDC, "Got incorrect netlogon response command"); tctx 158 source4/torture/nbt/dgram.c static bool nbt_test_netlogon2(struct torture_context *tctx) tctx 161 source4/torture/nbt/dgram.c struct nbt_dgram_socket *dgmsock = nbt_dgram_socket_init(tctx, tctx->ev, tctx 162 source4/torture/nbt/dgram.c lp_iconv_convenience(tctx->lp_ctx)); tctx 181 source4/torture/nbt/dgram.c name.name = lp_workgroup(tctx->lp_ctx); tctx 186 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, tctx 187 source4/torture/nbt/dgram.c resolve_name(lp_resolve_context(tctx->lp_ctx), &name, tctx, &address, tctx->ev), tctx 188 source4/torture/nbt/dgram.c talloc_asprintf(tctx, "Failed to resolve %s", name.name)); tctx 190 source4/torture/nbt/dgram.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces); tctx 194 source4/torture/nbt/dgram.c myaddress, lp_dgram_port(tctx->lp_ctx)); tctx 195 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address"); tctx 206 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address"); tctx 229 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx)); tctx 231 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address"); tctx 235 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request"); tctx 243 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet"); tctx 245 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response"); tctx 248 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE_EX, "Got incorrect netlogon response command"); tctx 249 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.nt_version, NETLOGON_NT_VERSION_5EX_WITH_IP|NETLOGON_NT_VERSION_5EX|NETLOGON_NT_VERSION_1, "Got incorrect netlogon response command"); tctx 268 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx)); tctx 270 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address"); tctx 274 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request"); tctx 282 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet"); tctx 284 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response"); tctx 287 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_USER_UNKNOWN, "Got incorrect netlogon response command"); tctx 289 source4/torture/nbt/dgram.c torture_assert_str_equal(tctx, response->data.samlogon.data.nt5_ex.user_name, TEST_NAME"$", "Got incorrect user in netlogon response"); tctx 291 source4/torture/nbt/dgram.c join_ctx = torture_join_domain(tctx, TEST_NAME, tctx 294 source4/torture/nbt/dgram.c torture_assert(tctx, join_ctx != NULL, tctx 295 source4/torture/nbt/dgram.c talloc_asprintf(tctx, "Failed to join domain %s as %s\n", tctx 296 source4/torture/nbt/dgram.c lp_workgroup(tctx->lp_ctx), TEST_NAME)); tctx 318 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx)); tctx 320 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address"); tctx 324 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request"); tctx 333 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet"); tctx 335 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response"); tctx 338 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_USER_UNKNOWN, "Got incorrect netlogon response command"); tctx 359 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx)); tctx 361 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address"); tctx 365 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request"); tctx 374 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet"); tctx 376 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response"); tctx 379 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE, "Got incorrect netlogon response command"); tctx 398 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx)); tctx 400 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address"); tctx 404 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request"); tctx 413 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet"); tctx 415 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response"); tctx 418 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_USER_UNKNOWN, "Got incorrect netlogon response command"); tctx 420 source4/torture/nbt/dgram.c torture_leave_domain(tctx, join_ctx); tctx 426 source4/torture/nbt/dgram.c static bool nbt_test_ntlogon(struct torture_context *tctx) tctx 429 source4/torture/nbt/dgram.c struct nbt_dgram_socket *dgmsock = nbt_dgram_socket_init(tctx, tctx->ev, tctx 430 source4/torture/nbt/dgram.c lp_iconv_convenience(tctx->lp_ctx)); tctx 449 source4/torture/nbt/dgram.c name.name = lp_workgroup(tctx->lp_ctx); tctx 454 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, tctx 455 source4/torture/nbt/dgram.c resolve_name(lp_resolve_context(tctx->lp_ctx), &name, tctx, &address, tctx->ev), tctx 456 source4/torture/nbt/dgram.c talloc_asprintf(tctx, "Failed to resolve %s", name.name)); tctx 458 source4/torture/nbt/dgram.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces); tctx 462 source4/torture/nbt/dgram.c myaddress, lp_dgram_port(tctx->lp_ctx)); tctx 463 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address"); tctx 474 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address"); tctx 479 source4/torture/nbt/dgram.c join_ctx = torture_join_domain(tctx, TEST_NAME, tctx 483 source4/torture/nbt/dgram.c torture_assert(tctx, join_ctx != NULL, tctx 484 source4/torture/nbt/dgram.c talloc_asprintf(tctx, "Failed to join domain %s as %s\n", tctx 485 source4/torture/nbt/dgram.c lp_workgroup(tctx->lp_ctx), TEST_NAME)); tctx 508 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx)); tctx 509 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address"); tctx 514 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request"); tctx 522 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet"); tctx 524 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response"); tctx 527 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE, "Got incorrect netlogon response command"); tctx 529 source4/torture/nbt/dgram.c torture_assert_str_equal(tctx, response->data.samlogon.data.nt5_ex.user_name, TEST_NAME"$", "Got incorrect user in netlogon response"); tctx 552 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx)); tctx 553 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address"); tctx 558 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request"); tctx 566 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet"); tctx 568 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response"); tctx 571 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE, "Got incorrect netlogon response command"); tctx 573 source4/torture/nbt/dgram.c torture_assert_str_equal(tctx, response->data.samlogon.data.nt5_ex.user_name, TEST_NAME"$", "Got incorrect user in netlogon response"); tctx 592 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx)); tctx 593 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address"); tctx 598 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request"); tctx 606 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet"); tctx 608 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_GET_PDC, "Got incorrect type of ntlogon response"); tctx 609 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.get_pdc.command, NETLOGON_RESPONSE_FROM_PDC, "Got incorrect ntlogon response command"); tctx 611 source4/torture/nbt/dgram.c torture_leave_domain(tctx, join_ctx); tctx 629 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx)); tctx 630 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address"); tctx 635 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request"); tctx 643 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet"); tctx 645 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_GET_PDC, "Got incorrect type of ntlogon response"); tctx 646 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.get_pdc.command, NETLOGON_RESPONSE_FROM_PDC, "Got incorrect ntlogon response command"); tctx 28 source4/torture/nbt/nbt.c struct nbt_name_socket *torture_init_nbt_socket(struct torture_context *tctx) tctx 30 source4/torture/nbt/nbt.c return nbt_name_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 33 source4/torture/nbt/nbt.c bool torture_nbt_get_name(struct torture_context *tctx, tctx 37 source4/torture/nbt/nbt.c make_nbt_name_server(name, strupper_talloc(tctx, tctx 38 source4/torture/nbt/nbt.c torture_setting_string(tctx, "host", NULL))); tctx 41 source4/torture/nbt/nbt.c torture_assert_ntstatus_ok(tctx, tctx 42 source4/torture/nbt/nbt.c resolve_name(lp_resolve_context(tctx->lp_ctx), name, tctx, address, tctx->ev), tctx 43 source4/torture/nbt/nbt.c talloc_asprintf(tctx, tctx 48 source4/torture/nbt/query.c static bool bench_namequery(struct torture_context *tctx) tctx 50 source4/torture/nbt/query.c struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx); tctx 55 source4/torture/nbt/query.c int timelimit = torture_setting_int(tctx, "timelimit", 5); tctx 60 source4/torture/nbt/query.c if (!torture_nbt_get_name(tctx, &name, &address)) tctx 65 source4/torture/nbt/query.c io.in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 70 source4/torture/nbt/query.c result = talloc_zero(tctx, struct result_struct); tctx 72 source4/torture/nbt/query.c torture_comment(tctx, "Running for %d seconds\n", timelimit); tctx 77 source4/torture/nbt/query.c torture_assert(tctx, req != NULL, "Failed to setup request!"); tctx 82 source4/torture/nbt/query.c if (torture_setting_bool(tctx, "progress", true)) { tctx 83 source4/torture/nbt/query.c torture_comment(tctx, "%.1f queries per second (%d failures) \r", tctx 98 source4/torture/nbt/query.c torture_comment(tctx, "%.1f queries per second (%d failures) \n", tctx 31 source4/torture/nbt/register.c #define CHECK_VALUE(tctx, v, correct) \ tctx 32 source4/torture/nbt/register.c torture_assert_int_equal(tctx, v, correct, "Incorrect value") tctx 34 source4/torture/nbt/register.c #define CHECK_STRING(tctx, v, correct) \ tctx 35 source4/torture/nbt/register.c torture_assert_casestr_equal(tctx, v, correct, "Incorrect value") tctx 43 source4/torture/nbt/register.c static bool nbt_register_own(struct torture_context *tctx) tctx 47 source4/torture/nbt/register.c struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx); tctx 54 source4/torture/nbt/register.c if (!torture_nbt_get_name(tctx, &name, &address)) tctx 57 source4/torture/nbt/register.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces); tctx 61 source4/torture/nbt/register.c socket_address = socket_address_from_strings(tctx, nbtsock->sock->backend_name, tctx 63 source4/torture/nbt/register.c torture_assert(tctx, socket_address != NULL, "Unable to get address"); tctx 66 source4/torture/nbt/register.c torture_assert_ntstatus_ok(tctx, status, tctx 69 source4/torture/nbt/register.c torture_comment(tctx, "Testing name defense to name registration\n"); tctx 73 source4/torture/nbt/register.c io.in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 83 source4/torture/nbt/register.c status = nbt_name_register(nbtsock, tctx, &io); tctx 84 source4/torture/nbt/register.c torture_assert_ntstatus_ok(tctx, status, tctx 85 source4/torture/nbt/register.c talloc_asprintf(tctx, "Bad response from %s for name register", tctx 88 source4/torture/nbt/register.c CHECK_STRING(tctx, io.out.name.name, name.name); tctx 89 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.name.type, name.type); tctx 90 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT); tctx 96 source4/torture/nbt/register.c status = nbt_name_register(nbtsock, tctx, &io); tctx 98 source4/torture/nbt/register.c torture_assert_ntstatus_ok(tctx, status, tctx 99 source4/torture/nbt/register.c talloc_asprintf(tctx, "Bad response from %s for name register demand", address)); tctx 101 source4/torture/nbt/register.c CHECK_STRING(tctx, io.out.name.name, name.name); tctx 102 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.name.type, name.type); tctx 103 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT); tctx 112 source4/torture/nbt/register.c static bool nbt_refresh_own(struct torture_context *tctx) tctx 116 source4/torture/nbt/register.c struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx); tctx 123 source4/torture/nbt/register.c if (!torture_nbt_get_name(tctx, &name, &address)) tctx 126 source4/torture/nbt/register.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces); tctx 130 source4/torture/nbt/register.c socket_address = socket_address_from_strings(tctx, nbtsock->sock->backend_name, tctx 132 source4/torture/nbt/register.c torture_assert(tctx, socket_address != NULL, tctx 136 source4/torture/nbt/register.c torture_assert_ntstatus_ok(tctx, status, tctx 139 source4/torture/nbt/register.c torture_comment(tctx, "Testing name defense to name refresh\n"); tctx 143 source4/torture/nbt/register.c io.in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 151 source4/torture/nbt/register.c status = nbt_name_refresh(nbtsock, tctx, &io); tctx 153 source4/torture/nbt/register.c torture_assert_ntstatus_ok(tctx, status, tctx 154 source4/torture/nbt/register.c talloc_asprintf(tctx, "Bad response from %s for name refresh", address)); tctx 156 source4/torture/nbt/register.c CHECK_STRING(tctx, io.out.name.name, name.name); tctx 157 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.name.type, name.type); tctx 158 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT); tctx 34 source4/torture/nbt/wins.c #define CHECK_VALUE(tctx, v, correct) \ tctx 35 source4/torture/nbt/wins.c torture_assert_int_equal(tctx, v, correct, "Incorrect value") tctx 37 source4/torture/nbt/wins.c #define CHECK_STRING(tctx, v, correct) \ tctx 38 source4/torture/nbt/wins.c torture_assert_casestr_equal(tctx, v, correct, "Incorrect value") tctx 40 source4/torture/nbt/wins.c #define CHECK_NAME(tctx, _name, correct) do { \ tctx 41 source4/torture/nbt/wins.c CHECK_STRING(tctx, (_name).name, (correct).name); \ tctx 42 source4/torture/nbt/wins.c CHECK_VALUE(tctx, (uint8_t)(_name).type, (uint8_t)(correct).type); \ tctx 43 source4/torture/nbt/wins.c CHECK_STRING(tctx, (_name).scope, (correct).scope); \ tctx 50 source4/torture/nbt/wins.c static bool nbt_test_wins_name(struct torture_context *tctx, const char *address, tctx 61 source4/torture/nbt/wins.c struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx); tctx 67 source4/torture/nbt/wins.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces); tctx 69 source4/torture/nbt/wins.c myaddress = talloc_strdup(tctx, iface_best_ip(ifaces, address)); tctx 71 source4/torture/nbt/wins.c socket_address = socket_address_from_strings(tctx, tctx 73 source4/torture/nbt/wins.c myaddress, lp_nbt_port(tctx->lp_ctx)); tctx 74 source4/torture/nbt/wins.c torture_assert(tctx, socket_address != NULL, tctx 83 source4/torture/nbt/wins.c socket_address = socket_address_from_strings(tctx, tctx 86 source4/torture/nbt/wins.c torture_assert(tctx, socket_address != NULL, tctx 91 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 95 source4/torture/nbt/wins.c torture_comment(tctx, "Testing name registration to WINS with name %s at %s nb_flags=0x%x\n", tctx 96 source4/torture/nbt/wins.c nbt_name_string(tctx, name), myaddress, nb_flags); tctx 98 source4/torture/nbt/wins.c torture_comment(tctx, "release the name\n"); tctx 100 source4/torture/nbt/wins.c release.in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 108 source4/torture/nbt/wins.c status = nbt_name_release(nbtsock, tctx, &release); tctx 109 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name query", address)); tctx 110 source4/torture/nbt/wins.c CHECK_VALUE(tctx, release.out.rcode, 0); tctx 115 source4/torture/nbt/wins.c torture_comment(tctx, "no low port - skip: register the name with a wrong address\n"); tctx 117 source4/torture/nbt/wins.c torture_comment(tctx, "register the name with a wrong address (makes the next request slow!)\n"); tctx 119 source4/torture/nbt/wins.c io.in.wins_port = lp_nbt_port(tctx->lp_ctx); tctx 120 source4/torture/nbt/wins.c io.in.wins_servers = str_list_make(tctx, address, NULL); tctx 121 source4/torture/nbt/wins.c io.in.addresses = str_list_make(tctx, "127.64.64.1", NULL); tctx 125 source4/torture/nbt/wins.c status = nbt_name_register_wins(nbtsock, tctx, &io); tctx 127 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 128 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name register\n", tctx 131 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 132 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name register\n", tctx 135 source4/torture/nbt/wins.c CHECK_STRING(tctx, io.out.wins_server, address); tctx 136 source4/torture/nbt/wins.c CHECK_VALUE(tctx, io.out.rcode, 0); tctx 138 source4/torture/nbt/wins.c torture_comment(tctx, "register the name correct address\n"); tctx 140 source4/torture/nbt/wins.c name_register.in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 175 source4/torture/nbt/wins.c status = nbt_name_register_recv(req, tctx, &name_register); tctx 177 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 178 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name register\n", tctx 181 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 182 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name register\n", tctx 185 source4/torture/nbt/wins.c CHECK_VALUE(tctx, name_register.out.rcode, 0); tctx 186 source4/torture/nbt/wins.c CHECK_STRING(tctx, name_register.out.reply_addr, myaddress); tctx 189 source4/torture/nbt/wins.c torture_comment(tctx, "register the name correct address\n"); tctx 191 source4/torture/nbt/wins.c io.in.wins_port = lp_nbt_port(tctx->lp_ctx); tctx 192 source4/torture/nbt/wins.c io.in.wins_servers = (const char **)str_list_make(tctx, address, NULL); tctx 193 source4/torture/nbt/wins.c io.in.addresses = (const char **)str_list_make(tctx, myaddress, NULL); tctx 197 source4/torture/nbt/wins.c status = nbt_name_register_wins(nbtsock, tctx, &io); tctx 198 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name register", address)); tctx 200 source4/torture/nbt/wins.c CHECK_STRING(tctx, io.out.wins_server, address); tctx 201 source4/torture/nbt/wins.c CHECK_VALUE(tctx, io.out.rcode, 0); tctx 207 source4/torture/nbt/wins.c torture_comment(tctx, "Try to register as non-group\n"); tctx 209 source4/torture/nbt/wins.c status = nbt_name_register_wins(nbtsock, tctx, &io); tctx 210 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name register\n", tctx 212 source4/torture/nbt/wins.c CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT); tctx 215 source4/torture/nbt/wins.c torture_comment(tctx, "query the name to make sure its there\n"); tctx 218 source4/torture/nbt/wins.c query.in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 224 source4/torture/nbt/wins.c status = nbt_name_query(nbtsock, tctx, &query); tctx 227 source4/torture/nbt/wins.c tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, tctx 228 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name query", address)); tctx 231 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name query", address)); tctx 233 source4/torture/nbt/wins.c CHECK_NAME(tctx, query.out.name, *name); tctx 234 source4/torture/nbt/wins.c CHECK_VALUE(tctx, query.out.num_addrs, 1); tctx 237 source4/torture/nbt/wins.c CHECK_STRING(tctx, query.out.reply_addrs[0], "255.255.255.255"); tctx 239 source4/torture/nbt/wins.c CHECK_STRING(tctx, query.out.reply_addrs[0], myaddress); tctx 243 source4/torture/nbt/wins.c query.in.name.name = strupper_talloc(tctx, name->name); tctx 246 source4/torture/nbt/wins.c torture_comment(tctx, "check case sensitivity\n"); tctx 247 source4/torture/nbt/wins.c status = nbt_name_query(nbtsock, tctx, &query); tctx 248 source4/torture/nbt/wins.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, talloc_asprintf(tctx, "Bad response from %s for name query", address)); tctx 253 source4/torture/nbt/wins.c query.in.name.scope = strupper_talloc(tctx, name->scope); tctx 257 source4/torture/nbt/wins.c torture_comment(tctx, "check case sensitivity on scope\n"); tctx 258 source4/torture/nbt/wins.c status = nbt_name_query(nbtsock, tctx, &query); tctx 259 source4/torture/nbt/wins.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, talloc_asprintf(tctx, "Bad response from %s for name query", address)); tctx 262 source4/torture/nbt/wins.c torture_comment(tctx, "refresh the name\n"); tctx 264 source4/torture/nbt/wins.c refresh.in.wins_port = lp_nbt_port(tctx->lp_ctx); tctx 265 source4/torture/nbt/wins.c refresh.in.wins_servers = (const char **)str_list_make(tctx, address, NULL); tctx 266 source4/torture/nbt/wins.c refresh.in.addresses = (const char **)str_list_make(tctx, myaddress, NULL); tctx 270 source4/torture/nbt/wins.c status = nbt_name_refresh_wins(nbtsock, tctx, &refresh); tctx 272 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 273 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name refresh", tctx 276 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 277 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name refresh", tctx 280 source4/torture/nbt/wins.c CHECK_STRING(tctx, refresh.out.wins_server, address); tctx 281 source4/torture/nbt/wins.c CHECK_VALUE(tctx, refresh.out.rcode, 0); tctx 285 source4/torture/nbt/wins.c release.in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 293 source4/torture/nbt/wins.c status = nbt_name_release(nbtsock, tctx, &release); tctx 295 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 296 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name release", tctx 299 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 300 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name release", tctx 303 source4/torture/nbt/wins.c CHECK_NAME(tctx, release.out.name, *name); tctx 304 source4/torture/nbt/wins.c CHECK_VALUE(tctx, release.out.rcode, 0); tctx 309 source4/torture/nbt/wins.c torture_comment(tctx, "no low port - skip: register the name with a wrong address\n"); tctx 311 source4/torture/nbt/wins.c torture_comment(tctx, "register the name with a wrong address (makes the next request slow!)\n"); tctx 313 source4/torture/nbt/wins.c io.in.wins_port = lp_nbt_port(tctx->lp_ctx); tctx 314 source4/torture/nbt/wins.c io.in.wins_servers = str_list_make(tctx, address, NULL); tctx 315 source4/torture/nbt/wins.c io.in.addresses = str_list_make(tctx, "127.64.64.1", NULL); tctx 319 source4/torture/nbt/wins.c status = nbt_name_register_wins(nbtsock, tctx, &io); tctx 321 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 322 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name register\n", tctx 325 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 326 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name register\n", tctx 329 source4/torture/nbt/wins.c CHECK_STRING(tctx, io.out.wins_server, address); tctx 330 source4/torture/nbt/wins.c CHECK_VALUE(tctx, io.out.rcode, 0); tctx 333 source4/torture/nbt/wins.c torture_comment(tctx, "refresh the name with the correct address\n"); tctx 335 source4/torture/nbt/wins.c refresh.in.wins_port = lp_nbt_port(tctx->lp_ctx); tctx 336 source4/torture/nbt/wins.c refresh.in.wins_servers = str_list_make(tctx, address, NULL); tctx 337 source4/torture/nbt/wins.c refresh.in.addresses = str_list_make(tctx, myaddress, NULL); tctx 341 source4/torture/nbt/wins.c status = nbt_name_refresh_wins(nbtsock, tctx, &refresh); tctx 343 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 344 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name refresh", tctx 347 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 348 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name refresh", tctx 351 source4/torture/nbt/wins.c CHECK_STRING(tctx, refresh.out.wins_server, address); tctx 352 source4/torture/nbt/wins.c CHECK_VALUE(tctx, refresh.out.rcode, 0); tctx 354 source4/torture/nbt/wins.c torture_comment(tctx, "release the name\n"); tctx 356 source4/torture/nbt/wins.c release.in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 364 source4/torture/nbt/wins.c status = nbt_name_release(nbtsock, tctx, &release); tctx 365 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name query", address)); tctx 367 source4/torture/nbt/wins.c CHECK_NAME(tctx, release.out.name, *name); tctx 368 source4/torture/nbt/wins.c CHECK_VALUE(tctx, release.out.rcode, 0); tctx 370 source4/torture/nbt/wins.c torture_comment(tctx, "release again\n"); tctx 371 source4/torture/nbt/wins.c status = nbt_name_release(nbtsock, tctx, &release); tctx 372 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 373 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name query", tctx 376 source4/torture/nbt/wins.c CHECK_NAME(tctx, release.out.name, *name); tctx 377 source4/torture/nbt/wins.c CHECK_VALUE(tctx, release.out.rcode, 0); tctx 380 source4/torture/nbt/wins.c torture_comment(tctx, "query the name to make sure its gone\n"); tctx 382 source4/torture/nbt/wins.c status = nbt_name_query(nbtsock, tctx, &query); tctx 385 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, tctx 388 source4/torture/nbt/wins.c torture_assert_ntstatus_equal(tctx, status, tctx 401 source4/torture/nbt/wins.c static bool nbt_test_wins(struct torture_context *tctx) tctx 408 source4/torture/nbt/wins.c if (!torture_nbt_get_name(tctx, &name, &address)) tctx 411 source4/torture/nbt/wins.c name.name = talloc_asprintf(tctx, "_TORTURE-%5u", r); tctx 415 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true); tctx 418 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false); tctx 420 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false); tctx 423 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true); tctx 426 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false); tctx 429 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false); tctx 432 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true); tctx 435 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true); tctx 438 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false); tctx 442 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true); tctx 446 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false); tctx 450 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false); tctx 452 source4/torture/nbt/wins.c name.name = talloc_asprintf(tctx, "_T\01-%5u.foo", r); tctx 453 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false); tctx 456 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false); tctx 458 source4/torture/nbt/wins.c name.name = talloc_asprintf(tctx, "."); tctx 459 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false); tctx 461 source4/torture/nbt/wins.c name.name = talloc_asprintf(tctx, "%5u-\377\200\300FOO", r); tctx 462 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false); tctx 48 source4/torture/nbt/winsbench.c static struct nbt_name generate_name(TALLOC_CTX *tctx, int idx) tctx 51 source4/torture/nbt/winsbench.c name.name = talloc_asprintf(tctx, "WINSBench%6u", idx); tctx 226 source4/torture/nbt/winsbench.c static bool bench_wins(struct torture_context *tctx) tctx 228 source4/torture/nbt/winsbench.c struct nbt_name_socket *nbtsock = nbt_name_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 232 source4/torture/nbt/winsbench.c int timelimit = torture_setting_int(tctx, "timelimit", 5); tctx 240 source4/torture/nbt/winsbench.c if (!torture_nbt_get_name(tctx, &name, &address)) tctx 248 source4/torture/nbt/winsbench.c state->wins_port = lp_nbt_port(tctx->lp_ctx); tctx 249 source4/torture/nbt/winsbench.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces); tctx 250 source4/torture/nbt/winsbench.c state->my_ip = talloc_strdup(tctx, iface_best_ip(ifaces, address)); tctx 258 source4/torture/nbt/winsbench.c torture_comment(tctx, "Running for %d seconds\n", timelimit); tctx 264 source4/torture/nbt/winsbench.c if (torture_setting_bool(tctx, "progress", true)) { tctx 265 source4/torture/nbt/winsbench.c torture_comment(tctx, "%.1f queries per second (%d failures) \r", tctx 280 source4/torture/nbt/winsbench.c torture_comment(tctx, "%.1f queries per second (%d failures) \n", tctx 35 source4/torture/nbt/winsreplication.c #define CHECK_STATUS(tctx, status, correct) \ tctx 36 source4/torture/nbt/winsreplication.c torture_assert_ntstatus_equal(tctx, status, correct, \ tctx 39 source4/torture/nbt/winsreplication.c #define CHECK_VALUE(tctx, v, correct) \ tctx 40 source4/torture/nbt/winsreplication.c torture_assert(tctx, (v) == (correct), \ tctx 41 source4/torture/nbt/winsreplication.c talloc_asprintf(tctx, "Incorrect value %s=%d - should be %d\n", \ tctx 44 source4/torture/nbt/winsreplication.c #define CHECK_VALUE_UINT64(tctx, v, correct) \ tctx 45 source4/torture/nbt/winsreplication.c torture_assert(tctx, (v) == (correct), \ tctx 46 source4/torture/nbt/winsreplication.c talloc_asprintf(tctx, "Incorrect value %s=%llu - should be %llu\n", \ tctx 49 source4/torture/nbt/winsreplication.c #define CHECK_VALUE_STRING(tctx, v, correct) \ tctx 50 source4/torture/nbt/winsreplication.c torture_assert_str_equal(tctx, v, correct, "Invalid value") tctx 84 source4/torture/nbt/winsreplication.c static bool test_assoc_ctx1(struct torture_context *tctx) tctx 101 source4/torture/nbt/winsreplication.c if (!torture_nbt_get_name(tctx, &name, &address)) tctx 104 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test if assoc_ctx is only valid on the conection it was created on\n"); tctx 106 source4/torture/nbt/winsreplication.c wrepl_socket1 = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 107 source4/torture/nbt/winsreplication.c wrepl_socket2 = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 109 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Setup 2 wrepl connections\n"); tctx 110 source4/torture/nbt/winsreplication.c status = wrepl_connect(wrepl_socket1, wrepl_best_ip(tctx->lp_ctx, address), address); tctx 111 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 113 source4/torture/nbt/winsreplication.c status = wrepl_connect(wrepl_socket2, wrepl_best_ip(tctx->lp_ctx, address), address); tctx 114 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 116 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a start association request (conn1)\n"); tctx 118 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 120 source4/torture/nbt/winsreplication.c torture_comment(tctx, "association context (conn1): 0x%x\n", associate1.out.assoc_ctx); tctx 122 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a start association request (conn2)\n"); tctx 124 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 126 source4/torture/nbt/winsreplication.c torture_comment(tctx, "association context (conn2): 0x%x\n", associate2.out.assoc_ctx); tctx 128 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a replication table query, with assoc 1 (conn2), the anwser should be on conn1\n"); tctx 137 source4/torture/nbt/winsreplication.c status = wrepl_request_recv(req, tctx, &rep_packet); tctx 138 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 140 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a association request (conn2), to make sure the last request was ignored\n"); tctx 142 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 144 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a replication table query, with invalid assoc (conn1), receive answer from conn2\n"); tctx 147 source4/torture/nbt/winsreplication.c status = wrepl_request_recv(req, tctx, &rep_packet); tctx 148 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 150 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a association request (conn1), to make sure the last request was handled correct\n"); tctx 152 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 156 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a association stop request (conn1), reson: %u\n", assoc_stop.in.reason); tctx 158 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_END_OF_FILE); tctx 162 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a association stop request (conn2), reson: %u\n", assoc_stop.in.reason); tctx 164 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 166 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Close 2 wrepl connections\n"); tctx 175 source4/torture/nbt/winsreplication.c static bool test_assoc_ctx2(struct torture_context *tctx) tctx 184 source4/torture/nbt/winsreplication.c if (!torture_nbt_get_name(tctx, &name, &address)) tctx 187 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test if we always get back the same assoc_ctx\n"); tctx 189 source4/torture/nbt/winsreplication.c wrepl_socket = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 191 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Setup wrepl connections\n"); tctx 192 source4/torture/nbt/winsreplication.c status = wrepl_connect(wrepl_socket, wrepl_best_ip(tctx->lp_ctx, address), address); tctx 193 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 195 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send 1st start association request\n"); tctx 197 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 199 source4/torture/nbt/winsreplication.c torture_comment(tctx, "1st association context: 0x%x\n", associate.out.assoc_ctx); tctx 201 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send 2nd start association request\n"); tctx 203 source4/torture/nbt/winsreplication.c torture_assert_ntstatus_ok(tctx, status, "2nd start association failed"); tctx 204 source4/torture/nbt/winsreplication.c torture_assert(tctx, associate.out.assoc_ctx == assoc_ctx1, tctx 206 source4/torture/nbt/winsreplication.c torture_comment(tctx, "2nd association context: 0x%x\n", associate.out.assoc_ctx); tctx 208 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send 3rd start association request\n"); tctx 210 source4/torture/nbt/winsreplication.c torture_assert(tctx, associate.out.assoc_ctx == assoc_ctx1, tctx 212 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 213 source4/torture/nbt/winsreplication.c torture_comment(tctx, "3rd association context: 0x%x\n", associate.out.assoc_ctx); tctx 215 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Close wrepl connections\n"); tctx 224 source4/torture/nbt/winsreplication.c static void display_entry(struct torture_context *tctx, struct wrepl_name *name) tctx 228 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s\n", nbt_name_string(tctx, &name->name)); tctx 229 source4/torture/nbt/winsreplication.c torture_comment(tctx, "\tTYPE:%u STATE:%u NODE:%u STATIC:%u VERSION_ID: %llu\n", tctx 231 source4/torture/nbt/winsreplication.c torture_comment(tctx, "\tRAW_FLAGS: 0x%08X OWNER: %-15s\n", tctx 234 source4/torture/nbt/winsreplication.c torture_comment(tctx, "\tADDR: %-15s OWNER: %-15s\n", tctx 242 source4/torture/nbt/winsreplication.c static bool test_wins_replication(struct torture_context *tctx) tctx 253 source4/torture/nbt/winsreplication.c if (!torture_nbt_get_name(tctx, &name, &address)) tctx 256 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test one pull replication cycle\n"); tctx 258 source4/torture/nbt/winsreplication.c wrepl_socket = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 260 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Setup wrepl connections\n"); tctx 261 source4/torture/nbt/winsreplication.c status = wrepl_connect(wrepl_socket, wrepl_best_ip(tctx->lp_ctx, address), address); tctx 262 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 264 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a start association request\n"); tctx 267 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 269 source4/torture/nbt/winsreplication.c torture_comment(tctx, "association context: 0x%x\n", associate.out.assoc_ctx); tctx 271 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a replication table query\n"); tctx 274 source4/torture/nbt/winsreplication.c status = wrepl_pull_table(wrepl_socket, tctx, &pull_table); tctx 288 source4/torture/nbt/winsreplication.c torture_fail(tctx, "We are not a valid pull partner for the server"); tctx 290 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 292 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Found %d replication partners\n", pull_table.out.num_partners); tctx 296 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s max_version=%6llu min_version=%6llu type=%d\n", tctx 305 source4/torture/nbt/winsreplication.c status = wrepl_pull_names(wrepl_socket, tctx, &pull_names); tctx 306 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 308 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Received %d names\n", pull_names.out.num_names); tctx 311 source4/torture/nbt/winsreplication.c display_entry(tctx, &pull_names.out.names[j]); tctx 315 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Close wrepl connections\n"); tctx 542 source4/torture/nbt/winsreplication.c struct torture_context *tctx, const char *address) tctx 552 source4/torture/nbt/winsreplication.c ctx = talloc_zero(tctx, struct test_wrepl_conflict_conn); tctx 556 source4/torture/nbt/winsreplication.c ctx->pull = wrepl_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 559 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Setup wrepl conflict pull connection\n"); tctx 560 source4/torture/nbt/winsreplication.c status = wrepl_connect(ctx->pull, wrepl_best_ip(tctx->lp_ctx, ctx->address), ctx->address); tctx 613 source4/torture/nbt/winsreplication.c ctx->nbtsock = nbt_name_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 616 source4/torture/nbt/winsreplication.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces); tctx 618 source4/torture/nbt/winsreplication.c ctx->myaddr = socket_address_from_strings(tctx, ctx->nbtsock->sock->backend_name, iface_best_ip(ifaces, address), 0); tctx 623 source4/torture/nbt/winsreplication.c ctx->myaddr2 = socket_address_from_strings(tctx, ctx->nbtsock->sock->backend_name, iface_n_ip(ifaces, i), 0); tctx 631 source4/torture/nbt/winsreplication.c ctx->nbtsock_srv = nbt_name_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 635 source4/torture/nbt/winsreplication.c nbt_srv_addr = socket_address_from_strings(tctx, ctx->nbtsock_srv->sock->backend_name, ctx->myaddr->addr, lp_nbt_port(tctx->lp_ctx)); tctx 648 source4/torture/nbt/winsreplication.c ctx->nbtsock2 = nbt_name_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 654 source4/torture/nbt/winsreplication.c ctx->nbtsock_srv2 = nbt_name_socket_init(ctx, ctx->nbtsock_srv->event_ctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 658 source4/torture/nbt/winsreplication.c nbt_srv_addr = socket_address_from_strings(tctx, tctx 661 source4/torture/nbt/winsreplication.c lp_nbt_port(tctx->lp_ctx)); tctx 708 source4/torture/nbt/winsreplication.c static bool test_wrepl_update_one(struct torture_context *tctx, tctx 725 source4/torture/nbt/winsreplication.c wrepl_socket = wrepl_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 727 source4/torture/nbt/winsreplication.c status = wrepl_connect(wrepl_socket, wrepl_best_ip(tctx->lp_ctx, ctx->address), ctx->address); tctx 728 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 731 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 750 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 751 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, repl_recv->mess_type, WREPL_REPLICATION); tctx 752 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, repl_recv->message.replication.command, WREPL_REPL_SEND_REQUEST); tctx 769 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 770 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, repl_recv->mess_type, WREPL_STOP_ASSOCIATION); tctx 771 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, repl_recv->message.stop.reason, 0); tctx 777 source4/torture/nbt/winsreplication.c static bool test_wrepl_is_applied(struct torture_context *tctx, tctx 792 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 793 source4/torture/nbt/winsreplication.c torture_assert(tctx, pull_names.out.num_names == (expected?1:0), tctx 794 source4/torture/nbt/winsreplication.c talloc_asprintf(tctx, "Invalid number of records returned - expected %d got %d", expected, pull_names.out.num_names)); tctx 803 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, names[0].name.type, name->name->type); tctx 804 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, names[0].name.name, name->name->name); tctx 805 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, names[0].name.scope, name->name->scope); tctx 806 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, flags, name->flags); tctx 807 source4/torture/nbt/winsreplication.c CHECK_VALUE_UINT64(tctx, names[0].version_id, name->id); tctx 810 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, names[0].num_addresses, tctx 813 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, names[0].num_addresses, 1); tctx 814 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, names[0].addresses[0].address, tctx 822 source4/torture/nbt/winsreplication.c static bool test_wrepl_mhomed_merged(struct torture_context *tctx, tctx 851 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 852 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, pull_names.out.num_names, 1); tctx 860 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, names[0].name.type, name2->name->type); tctx 861 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, names[0].name.name, name2->name->name); tctx 862 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, names[0].name.scope, name2->name->scope); tctx 863 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, flags, name2->flags | WREPL_TYPE_MHOMED); tctx 864 source4/torture/nbt/winsreplication.c CHECK_VALUE_UINT64(tctx, names[0].version_id, name2->id); tctx 866 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, names[0].num_addresses, num_ips); tctx 876 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, owner, owner2->address); tctx 886 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, owner, owner1->address); tctx 893 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, addr, "not found in address list"); tctx 899 source4/torture/nbt/winsreplication.c static bool test_wrepl_sgroup_merged(struct torture_context *tctx, tctx 940 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 958 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s: Name '%s' not found\n", __location__, nbt_name_string(ctx, name2->name)); tctx 966 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name->name.type, name2->name->type); tctx 967 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name->name.name, name2->name->name); tctx 968 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name->name.scope, name2->name->scope); tctx 969 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, flags, name2->flags); tctx 971 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name->num_addresses, num_ips); tctx 981 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, owner, ips2[j].owner); tctx 992 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, owner, owner1->address); tctx 994 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, owner, ips1[j].owner); tctx 1002 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, addr, "not found in address list"); tctx 1008 source4/torture/nbt/winsreplication.c static bool test_conflict_same_owner(struct torture_context *tctx, tctx 1126 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test Replica Conflicts with same owner[%s] for %s\n", tctx 1135 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s,%s%s vs. %s,%s%s with %s ip(s) => %s\n", tctx 1160 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->a,wins_name_cur); tctx 1162 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->a, wins_name_last, false); tctx 1163 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->a, wins_name_cur, false); tctx 1165 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->a, wins_name_cur, true); tctx 1172 source4/torture/nbt/winsreplication.c torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, __location__); tctx 1180 source4/torture/nbt/winsreplication.c static bool test_conflict_different_owner(struct torture_context *tctx, tctx 4778 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test Replica Conflicts with different owners\n"); tctx 4785 source4/torture/nbt/winsreplication.c torture_comment(tctx, "(%s) Programmer error, invalid record[%u]: %s\n", tctx 4789 source4/torture/nbt/winsreplication.c torture_comment(tctx, "(%s) Programmer error, invalid record[%u]: %s\n", tctx 4815 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s,%s%s vs. %s,%s%s %s => %s\n", tctx 4844 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r1.owner, wins_name_r1); tctx 4845 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r1.owner, tctx 4866 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2); tctx 4868 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r1.owner, tctx 4871 source4/torture/nbt/winsreplication.c ret &= test_wrepl_sgroup_merged(tctx, ctx, records[i].r2.merge_owner, tctx 4880 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r1.owner, tctx 4884 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner, tctx 4887 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner, tctx 4893 source4/torture/nbt/winsreplication.c torture_comment(tctx, "failed before sgroup_cleanup record[%u]: %s\n", i, records[i].line); tctx 4906 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r1.owner, wins_name_r1); tctx 4910 source4/torture/nbt/winsreplication.c ret &= test_wrepl_sgroup_merged(tctx, ctx, NULL, tctx 4927 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2); tctx 4938 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2); tctx 4939 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner, wins_name_r2, true); tctx 4950 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2); tctx 4951 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner, wins_name_r2, true); tctx 4954 source4/torture/nbt/winsreplication.c torture_comment(tctx, "failed in sgroup_cleanup record[%u]: %s\n", i, records[i].line); tctx 4963 source4/torture/nbt/winsreplication.c torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, records[i].line); tctx 4971 source4/torture/nbt/winsreplication.c static bool test_conflict_owned_released_vs_replica(struct torture_context *tctx, tctx 6525 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test Replica records vs. owned released records\n"); tctx 6528 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s => %s\n", nbt_name_string(ctx, &records[i].name), tctx 6536 source4/torture/nbt/winsreplication.c name_register->in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 6548 source4/torture/nbt/winsreplication.c torture_comment(tctx, "No response from %s for name register\n", ctx->address); tctx 6552 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Bad response from %s for name register - %s\n", tctx 6556 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name_register->out.rcode, 0); tctx 6557 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.reply_from, ctx->address); tctx 6558 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name_register->out.name.type, records[i].name.type); tctx 6559 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.name.name, records[i].name.name); tctx 6560 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.name.scope, records[i].name.scope); tctx 6561 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.reply_addr, records[i].wins.ips[0].ip); tctx 6565 source4/torture/nbt/winsreplication.c release->in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 6575 source4/torture/nbt/winsreplication.c torture_comment(tctx, "No response from %s for name release\n", ctx->address); tctx 6579 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Bad response from %s for name query - %s\n", tctx 6583 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, release->out.rcode, 0); tctx 6602 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name); tctx 6603 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, tctx 6615 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name); tctx 6616 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true); tctx 6620 source4/torture/nbt/winsreplication.c release->in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 6629 source4/torture/nbt/winsreplication.c torture_comment(tctx, "No response from %s for name release\n", ctx->address); tctx 6633 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Bad response from %s for name query - %s\n", tctx 6637 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, release->out.rcode, 0); tctx 6640 source4/torture/nbt/winsreplication.c torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, records[i].line); tctx 6688 source4/torture/nbt/winsreplication.c static bool test_conflict_owned_active_vs_replica(struct torture_context *tctx, tctx 9160 source4/torture/nbt/winsreplication.c torture_comment(tctx, "SKIP: Test Replica records vs. owned active records: not bound to port[%d]\n", tctx 9161 source4/torture/nbt/winsreplication.c lp_nbt_port(tctx->lp_ctx)); tctx 9165 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test Replica records vs. owned active records\n"); tctx 9178 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s\n", records[i].section); tctx 9182 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s => SKIPPED\n", nbt_name_string(ctx, &records[i].name)); tctx 9196 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s%s%s => %s\n", tctx 9223 source4/torture/nbt/winsreplication.c name_register->in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 9255 source4/torture/nbt/winsreplication.c torture_comment(tctx, "No response from %s for name register\n", ctx->address); tctx 9259 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Bad response from %s for name register - %s\n", tctx 9263 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name_register->out.rcode, 0); tctx 9264 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.reply_from, ctx->address); tctx 9265 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name_register->out.name.type, records[i].name.type); tctx 9266 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.name.name, records[i].name.name); tctx 9267 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.name.scope, records[i].name.scope); tctx 9268 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.reply_addr, records[i].wins.ips[j].ip); tctx 9299 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name); tctx 9330 source4/torture/nbt/winsreplication.c ret &= test_wrepl_mhomed_merged(tctx, ctx, &ctx->c, tctx 9336 source4/torture/nbt/winsreplication.c ret &= test_wrepl_sgroup_merged(tctx, ctx, NULL, tctx 9343 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, tctx 9357 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name); tctx 9358 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true); tctx 9369 source4/torture/nbt/winsreplication.c release->in.dest_port = lp_nbt_port(tctx->lp_ctx); tctx 9378 source4/torture/nbt/winsreplication.c torture_comment(tctx, "No response from %s for name release\n", ctx->address); tctx 9382 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Bad response from %s for name query - %s\n", tctx 9386 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, release->out.rcode, 0); tctx 9399 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name); tctx 9410 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name); tctx 9411 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true); tctx 9421 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name); tctx 9422 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true); tctx 9427 source4/torture/nbt/winsreplication.c torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, records[i].line); tctx 9633 source4/torture/nbt/winsreplication.c static bool torture_nbt_winsreplication_replica(struct torture_context *tctx) tctx 9641 source4/torture/nbt/winsreplication.c if (!torture_nbt_get_name(tctx, &name, &address)) tctx 9644 source4/torture/nbt/winsreplication.c ctx = test_create_conflict_ctx(tctx, address); tctx 9647 source4/torture/nbt/winsreplication.c ret &= test_conflict_same_owner(tctx, ctx); tctx 9648 source4/torture/nbt/winsreplication.c ret &= test_conflict_different_owner(tctx, ctx); tctx 9656 source4/torture/nbt/winsreplication.c static bool torture_nbt_winsreplication_owned(struct torture_context *tctx) tctx 9663 source4/torture/nbt/winsreplication.c if (torture_setting_bool(tctx, "quick", false)) tctx 9664 source4/torture/nbt/winsreplication.c torture_skip(tctx, tctx 9667 source4/torture/nbt/winsreplication.c if (!torture_nbt_get_name(tctx, &name, &address)) tctx 9670 source4/torture/nbt/winsreplication.c ctx = test_create_conflict_ctx(tctx, address); tctx 9671 source4/torture/nbt/winsreplication.c torture_assert(tctx, ctx != NULL, "Creating context failed"); tctx 9673 source4/torture/nbt/winsreplication.c ret &= test_conflict_owned_released_vs_replica(tctx, ctx); tctx 9674 source4/torture/nbt/winsreplication.c ret &= test_conflict_owned_active_vs_replica(tctx, ctx); tctx 33 source4/torture/ndr/atsvc.c static bool jobenum_in_check(struct torture_context *tctx, tctx 36 source4/torture/ndr/atsvc.c torture_assert(tctx, r->in.servername != NULL, "servername ptr"); tctx 37 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername"); tctx 38 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.ctr->entries_read, 0, "ctr entries read"); tctx 39 source4/torture/ndr/atsvc.c torture_assert(tctx, r->in.ctr->first_entry == NULL, "ctr entries first_entry"); tctx 40 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.preferred_max_len, -1, "preferred max len"); tctx 41 source4/torture/ndr/atsvc.c torture_assert(tctx, r->in.resume_handle != NULL, "resume handle ptr"); tctx 42 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, *r->in.resume_handle, 0, "resume handle"); tctx 80 source4/torture/ndr/atsvc.c static bool jobenum_out_check(struct torture_context *tctx, tctx 83 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->out.ctr->entries_read, 7, "entries read"); tctx 84 source4/torture/ndr/atsvc.c torture_assert(tctx, r->out.ctr->first_entry != NULL, "first entry"); tctx 85 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].job_id, 1, "job id"); tctx 86 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].job_time, 84600000, "job time"); tctx 87 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].days_of_week, 0x2, "days of week"); tctx 88 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].flags, 0x13, "flags"); tctx 89 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->out.ctr->first_entry[0].command, "foo.exe", "command"); tctx 90 source4/torture/ndr/atsvc.c torture_assert(tctx, r->out.total_entries != NULL, "total entries ptr"); tctx 91 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, *r->out.total_entries, 7, "total entries"); tctx 92 source4/torture/ndr/atsvc.c torture_assert(tctx, r->out.resume_handle, "resume handle ptr"); tctx 93 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, *r->out.resume_handle, 0, "resume handle"); tctx 94 source4/torture/ndr/atsvc.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 109 source4/torture/ndr/atsvc.c static bool jobadd_in_check(struct torture_context *tctx, tctx 112 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername"); tctx 113 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.job_info->job_time, 84600000, "time"); tctx 114 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.job_info->days_of_month, 0, "days of month"); tctx 115 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.job_info->days_of_week, 0x2, "days of week"); tctx 116 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.job_info->flags, 17, "flags"); tctx 117 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->in.job_info->command, "foo.exe", "command"); tctx 126 source4/torture/ndr/atsvc.c static bool jobadd_out_check(struct torture_context *tctx, tctx 129 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, *r->out.job_id, 14, "job id"); tctx 130 source4/torture/ndr/atsvc.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 141 source4/torture/ndr/atsvc.c static bool jobdel_in_check(struct torture_context *tctx, tctx 144 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername"); tctx 145 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.min_job_id, 14, "min job id"); tctx 146 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.max_job_id, 14, "max job id"); tctx 154 source4/torture/ndr/atsvc.c static bool jobdel_out_check(struct torture_context *tctx, tctx 168 source4/torture/ndr/atsvc.c static bool jobgetinfo_in_check(struct torture_context *tctx, tctx 171 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername"); tctx 172 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.job_id, 1, "job id"); tctx 184 source4/torture/ndr/atsvc.c static bool jobgetinfo_out_check(struct torture_context *tctx, tctx 187 source4/torture/ndr/atsvc.c torture_assert(tctx, *r->out.job_info != NULL, "job info"); tctx 188 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, (*r->out.job_info)->job_time, 84600000, "time"); tctx 189 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, (*r->out.job_info)->days_of_month, 0, "days of month"); tctx 190 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, (*r->out.job_info)->days_of_week, 0x2, "days of week"); tctx 191 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, (*r->out.job_info)->flags, 0x13, "flags"); tctx 192 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, (*r->out.job_info)->command, "foo.exe", "command"); tctx 29 source4/torture/ndr/dfs.c static bool getmanagerversion_out_check(struct torture_context *tctx, tctx 32 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, *r->out.version, 4, "version"); tctx 45 source4/torture/ndr/dfs.c static bool enumex_in_check300(struct torture_context *tctx, tctx 48 source4/torture/ndr/dfs.c torture_assert_str_equal(tctx, r->in.dfs_name, "w2k3dc", "dfs name"); tctx 49 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->in.level, 300, "level"); tctx 50 source4/torture/ndr/dfs.c torture_assert(tctx, r->in.total != NULL, "total ptr"); tctx 51 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, *r->in.total, 0, "total"); tctx 52 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->in.bufsize, -1, "buf size"); tctx 53 source4/torture/ndr/dfs.c torture_assert(tctx, r->in.info != NULL, "info ptr"); tctx 54 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->in.info->level, 300, "info level"); tctx 55 source4/torture/ndr/dfs.c torture_assert(tctx, r->in.info->e.info300->s == NULL, "info data ptr"); tctx 84 source4/torture/ndr/dfs.c static bool enumex_out_check300(struct torture_context *tctx, tctx 87 source4/torture/ndr/dfs.c torture_assert_werr_ok(tctx, r->out.result, "return code"); tctx 88 source4/torture/ndr/dfs.c torture_assert(tctx, r->out.total != NULL, "total ptr"); tctx 89 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, *r->out.total, 3, "total"); tctx 90 source4/torture/ndr/dfs.c torture_assert(tctx, r->out.info != NULL, "info ptr"); tctx 91 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->out.info->level, 300, "info level"); tctx 92 source4/torture/ndr/dfs.c torture_assert(tctx, r->out.info->e.info300 != NULL, "info data ptr"); tctx 93 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->out.info->e.info300->count, 3, "info enum array"); tctx 94 source4/torture/ndr/dfs.c torture_assert_str_equal(tctx, r->out.info->e.info300->s[0].dom_root, "\\W2K3DC\\standaloneroot", "info enum array 0"); tctx 95 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->out.info->e.info300->s[0].flavor, 256, "info enum flavor 0"); tctx 96 source4/torture/ndr/dfs.c torture_assert_str_equal(tctx, r->out.info->e.info300->s[1].dom_root, "\\W2K3DC\\standaloneroot2", "info enum array 1"); tctx 97 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->out.info->e.info300->s[1].flavor, 256, "info enum flavor 1"); tctx 98 source4/torture/ndr/dfs.c torture_assert_str_equal(tctx, r->out.info->e.info300->s[2].dom_root, "\\W2K3DOM\\testdomainroot", "info enum array 2"); tctx 99 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->out.info->e.info300->s[2].flavor, 512, "info enum flavor 2"); tctx 39 source4/torture/ndr/epmap.c static bool map_in_check(struct torture_context *tctx, tctx 43 source4/torture/ndr/epmap.c torture_assert_int_equal(tctx, r->in.max_towers, 1, "max towers"); tctx 44 source4/torture/ndr/epmap.c torture_assert(tctx, r->in.map_tower != NULL, "map tower"); tctx 45 source4/torture/ndr/epmap.c torture_assert_int_equal(tctx, r->in.map_tower->tower_length, 75, "tower len"); tctx 58 source4/torture/ndr/epmap.c static bool map_out_check(struct torture_context *tctx, tctx 61 source4/torture/ndr/epmap.c torture_assert_int_equal(tctx, *r->out.num_towers, 1, "num towers"); tctx 62 source4/torture/ndr/epmap.c torture_assert_int_equal(tctx, r->out.result, 0x4b, "return code"); tctx 299 source4/torture/ndr/lsa.c static bool lsarlookupnames_in_check(struct torture_context *tctx, tctx 304 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.num_names, 100, "num names"); tctx 306 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.names[i].string, "Users", "names"); tctx 308 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids != NULL, "sids"); tctx 309 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->count, 0, "sids count"); tctx 310 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids == NULL, "sids domains"); tctx 311 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level"); tctx 312 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.count != NULL, "count ptr"); tctx 313 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 0, "count"); tctx 428 source4/torture/ndr/lsa.c static bool lsarlookupnames_out_check(struct torture_context *tctx, tctx 432 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.domains != NULL, "domains ptr"); tctx 433 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->count, 1, "domains count"); tctx 434 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->max_size, 32, "domains size"); tctx 435 source4/torture/ndr/lsa.c torture_assert(tctx, domains->domains != NULL, "domains domains"); tctx 436 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, domains->domains[0].name.string, "BUILTIN", "domain name"); tctx 438 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.count != NULL, "count ptr"); tctx 439 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.count, 100, "count"); tctx 441 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->count, 100, "sids count"); tctx 442 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->sids[0].sid_type, 4, "sid type"); tctx 443 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->sids[0].rid, 0x221, "sid rid"); tctx 444 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->sids[0].sid_index, 0, "sid index"); tctx 655 source4/torture/ndr/lsa.c static bool lsarlookupsids_in_check(struct torture_context *tctx, tctx 659 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->num_sids, 100, "num sids"); tctx 660 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids != NULL, "sids sids"); tctx 661 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.names->count, 0, "names count"); tctx 662 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.names->names == NULL, "names names"); tctx 663 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level"); tctx 664 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.count != NULL, "count ptr"); tctx 665 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 0, "count"); tctx 1015 source4/torture/ndr/lsa.c static bool lsarlookupsids_out_check(struct torture_context *tctx, tctx 1019 source4/torture/ndr/lsa.c torture_assert(tctx, domains != NULL, "domains"); tctx 1020 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->count, 1, "domains count"); tctx 1021 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->max_size, 32, "domains size"); tctx 1022 source4/torture/ndr/lsa.c torture_assert(tctx, domains->domains != NULL, "domains domains"); tctx 1023 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, domains->domains[0].name.string, "BUILTIN", "name"); tctx 1024 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1036 source4/torture/ndr/lsa.c static bool lsaropenpolicy2_in_check(struct torture_context *tctx, tctx 1039 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.system_name, "\\", "system name"); tctx 1040 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr != NULL, "attr ptr"); tctx 1041 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.attr->len, 0, "attr len"); tctx 1042 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr->root_dir == NULL, "attr root"); tctx 1043 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr->object_name == NULL, "attr object name"); tctx 1044 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.attr->attributes, 0, "attr attributes"); tctx 1045 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask"); tctx 1054 source4/torture/ndr/lsa.c static bool lsaropenpolicy2_out_check(struct torture_context *tctx, tctx 1058 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1069 source4/torture/ndr/lsa.c static bool lsaropenpolicy_in_check(struct torture_context *tctx, tctx 1072 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.system_name != NULL, "system name"); tctx 1073 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr != NULL, "attr ptr"); tctx 1074 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.attr->len, 0, "attr len"); tctx 1075 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr->root_dir == NULL, "attr root"); tctx 1076 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr->object_name == NULL, "attr object name"); tctx 1077 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.attr->attributes, 0, "attr attributes"); tctx 1078 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask"); tctx 1088 source4/torture/ndr/lsa.c static bool lsaropenpolicy_out_check(struct torture_context *tctx, tctx 1092 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1103 source4/torture/ndr/lsa.c static bool lsarcreateaccount_in_check(struct torture_context *tctx, tctx 1108 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask"); tctx 1117 source4/torture/ndr/lsa.c static bool lsarcreateaccount_out_check(struct torture_context *tctx, tctx 1121 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1130 source4/torture/ndr/lsa.c static bool lsardelete_in_check(struct torture_context *tctx, tctx 1141 source4/torture/ndr/lsa.c static bool lsardelete_out_check(struct torture_context *tctx, tctx 1144 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1159 source4/torture/ndr/lsa.c static bool lsarcreatesecret_in_check(struct torture_context *tctx, tctx 1163 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.name.string, "torturesecret-852885356", "name"); tctx 1164 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask"); tctx 1173 source4/torture/ndr/lsa.c static bool lsarcreatesecret_out_check(struct torture_context *tctx, tctx 1177 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1192 source4/torture/ndr/lsa.c static bool lsaropensecret_in_check(struct torture_context *tctx, tctx 1196 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.name.string, "torturesecret-852885356", "name"); tctx 1197 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask"); tctx 1206 source4/torture/ndr/lsa.c static bool lsaropensecret_out_check(struct torture_context *tctx, tctx 1210 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1224 source4/torture/ndr/lsa.c static bool lsarsetsecret_in_check(struct torture_context *tctx, tctx 1228 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.new_val != NULL, "new val ptr"); tctx 1229 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.old_val == NULL, "old val ptr"); tctx 1230 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.new_val->length, 32, "new val len"); tctx 1231 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.new_val->size, 32, "new val size"); tctx 1240 source4/torture/ndr/lsa.c static bool lsarsetsecret_out_check(struct torture_context *tctx, tctx 1243 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1254 source4/torture/ndr/lsa.c static bool lsarquerysecret_in_check(struct torture_context *tctx, tctx 1258 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.new_val != NULL, "new val ptr"); tctx 1259 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.new_val->buf == NULL, "new val ptr ptr"); tctx 1260 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.new_mtime != NULL, "new mtime ptr"); tctx 1262 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.old_val == NULL, "old val ptr"); tctx 1263 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.old_mtime == NULL, "old mtime ptr"); tctx 1279 source4/torture/ndr/lsa.c static bool lsarquerysecret_out_check(struct torture_context *tctx, tctx 1283 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.new_val != NULL, "new val ptr"); tctx 1284 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.new_mtime != NULL, "new mtime ptr"); tctx 1286 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.old_val == NULL, "old val ptr"); tctx 1287 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.old_mtime == NULL, "old mtime ptr"); tctx 1303 source4/torture/ndr/lsa.c static bool lsarcreatetrusteddomain_in_check(struct torture_context *tctx, tctx 1307 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.info->name.string, "torturedomain", "name"); tctx 1308 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.info->sid != NULL, "sid"); tctx 1309 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask"); tctx 1318 source4/torture/ndr/lsa.c static bool lsarcreatetrusteddomain_out_check(struct torture_context *tctx, tctx 1322 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1332 source4/torture/ndr/lsa.c static bool lsarenumerateaccounts_in_check(struct torture_context *tctx, tctx 1336 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.resume_handle != NULL, "resume handle ptr"); tctx 1337 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.resume_handle, 0, "resume handle"); tctx 1338 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.num_entries, 100, "num entries"); tctx 1361 source4/torture/ndr/lsa.c static bool lsarenumerateaccounts_out_check(struct torture_context *tctx, tctx 1364 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.resume_handle != NULL, "resume handle ptr"); tctx 1365 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.resume_handle, 7, "resume handle"); tctx 1366 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->num_sids, 7, "num sids"); tctx 1367 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.sids->sids != NULL, "sids sids"); tctx 1368 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.sids->sids[0].sid != NULL, "sids sids"); tctx 1369 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1395 source4/torture/ndr/lsa.c static bool lsarlookupsids2_in_check(struct torture_context *tctx, tctx 1399 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->num_sids, 7, "num sids"); tctx 1400 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids != NULL, "sids sids"); tctx 1401 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids[0].sid != NULL, "sids sids"); tctx 1402 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.names != NULL, "names ptr"); tctx 1403 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.names->count, 0, "names count"); tctx 1404 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.names->names == NULL, "names"); tctx 1405 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level"); tctx 1406 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.count != NULL, "count ptr"); tctx 1407 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 7, "count"); tctx 1408 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.unknown1, 0, "unknown 1"); tctx 1409 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.unknown2, 0, "unknown 2"); tctx 1476 source4/torture/ndr/lsa.c static bool lsarlookupsids2_out_check(struct torture_context *tctx, tctx 1481 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.names != NULL, "names ptr"); tctx 1482 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.domains != NULL, "domains ptr"); tctx 1483 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->count, 4, "domains count"); tctx 1484 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->max_size, 32, "domains size"); tctx 1485 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, domains->domains[0].name.string, "NT AUTHORITY", "trust info name"); tctx 1486 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.names->count, 7, "names count"); tctx 1487 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[0].name.string, "Account Operators", "name str 1"); tctx 1488 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[1].name.string, "Administrators", "name str 2"); tctx 1489 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[2].name.string, "SUPPORT_388945a0", "name str 3"); tctx 1490 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.count != NULL, "count ptr"); tctx 1491 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.count, 7, "count"); tctx 1492 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1534 source4/torture/ndr/lsa.c static bool lsarlookupnames2_in_check(struct torture_context *tctx, tctx 1538 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.num_names, 7, "num names"); tctx 1539 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.names[0].string, "Account Operators", tctx 1541 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.names[1].string, "Administrators", tctx 1543 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level"); tctx 1544 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.lookup_options, 0, "lookup_options"); tctx 1545 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.client_revision, 0, "client_revision"); tctx 1546 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 0, "count"); tctx 1547 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->count, 0, "sids count"); tctx 1548 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids == NULL, "sids sids"); tctx 1587 source4/torture/ndr/lsa.c static bool lsarlookupnames2_out_check(struct torture_context *tctx, tctx 1590 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.count, 7, "count"); tctx 1591 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->count, 7, "sids count"); tctx 1592 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1633 source4/torture/ndr/lsa.c static bool lsarlookupnames3_in_check(struct torture_context *tctx, tctx 1637 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.num_names, 7, "num names"); tctx 1638 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.names[0].string, "Account Operators", tctx 1640 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.names[1].string, "Administrators", tctx 1642 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level"); tctx 1643 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.lookup_options, 0, "lookup_options"); tctx 1644 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.client_revision, 0, "client_revision"); tctx 1645 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 0, "count"); tctx 1646 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->count, 0, "sids count"); tctx 1647 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids == NULL, "sids sids"); tctx 1697 source4/torture/ndr/lsa.c static bool lsarlookupnames3_out_check(struct torture_context *tctx, tctx 1700 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.count, 7, "count"); tctx 1701 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->count, 7, "sids count"); tctx 1702 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1728 source4/torture/ndr/lsa.c static bool lsarlookupsids3_in_check(struct torture_context *tctx, tctx 1732 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->num_sids, 7, "num sids"); tctx 1733 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids != NULL, "sids sids"); tctx 1734 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids[0].sid != NULL, "sids sids"); tctx 1735 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.names != NULL, "names ptr"); tctx 1736 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.names->count, 0, "names count"); tctx 1737 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.names->names == NULL, "names"); tctx 1738 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level"); tctx 1739 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.count != NULL, "count ptr"); tctx 1740 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 7, "count"); tctx 1741 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.unknown1, 0, "unknown 1"); tctx 1742 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.unknown2, 0, "unknown 2"); tctx 1752 source4/torture/ndr/lsa.c static bool lsarlookupsids3_out_check(struct torture_context *tctx, tctx 1757 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.names != NULL, "names ptr"); tctx 1758 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.domains != NULL, "domains ptr"); tctx 1759 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->count, 4, "domains count"); tctx 1760 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->max_size, 32, "domains size"); tctx 1761 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, domains->domains[0].name.string, "NT AUTHORITY", "trust info name"); tctx 1762 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.names->count, 7, "names count"); tctx 1763 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[0].name.string, "Account Operators", "name str 1"); tctx 1764 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[1].name.string, "Administrators", "name str 2"); tctx 1765 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[2].name.string, "SUPPORT_388945a0", "name str 3"); tctx 1766 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.count != NULL, "count ptr"); tctx 1767 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.count, 7, "count"); tctx 1768 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 1779 source4/torture/ndr/lsa.c static bool lsarenumerateprivileges_in_check(struct torture_context *tctx, tctx 1783 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.resume_handle != NULL, "resume handle ptr"); tctx 1784 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.resume_handle, 0, "resume handle"); tctx 1785 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.max_count, 100, "max count"); tctx 1973 source4/torture/ndr/lsa.c static bool lsarenumerateprivileges_out_check(struct torture_context *tctx, tctx 1976 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.resume_handle != NULL, "resume handle ptr"); tctx 1977 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.resume_handle, 29, "resume handle"); tctx 1978 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.privs->privs[0].name.string, "SeCreateTokenPrivilege", "name"); tctx 1979 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.privs->privs[1].name.string, "SeAssignPrimaryTokenPrivilege", "name"); tctx 1980 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 35 source4/torture/ndr/ndr.c static bool wrap_ndr_pull_test(struct torture_context *tctx, tctx 41 source4/torture/ndr/ndr.c void *ds = talloc_zero_size(tctx, data->struct_size); tctx 42 source4/torture/ndr/ndr.c struct ndr_pull *ndr = ndr_pull_init_blob(&(data->data), tctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 46 source4/torture/ndr/ndr.c torture_assert_ndr_success(tctx, data->pull_fn(ndr, data->ndr_flags, ds), tctx 49 source4/torture/ndr/ndr.c torture_assert(tctx, ndr->offset == ndr->data_size, tctx 50 source4/torture/ndr/ndr.c talloc_asprintf(tctx, tctx 54 source4/torture/ndr/ndr.c return check_fn(tctx, ds); tctx 92 source4/torture/ndr/ndr.c static bool test_check_string_terminator(struct torture_context *tctx) tctx 96 source4/torture/ndr/ndr.c TALLOC_CTX *mem_ctx = tctx; tctx 99 source4/torture/ndr/ndr.c blob = strhex_to_data_blob(tctx, "0000"); tctx 101 source4/torture/ndr/ndr.c ndr = ndr_pull_init_blob(&blob, mem_ctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 103 source4/torture/ndr/ndr.c torture_assert_ndr_success(tctx, ndr_check_string_terminator(ndr, 1, 2), tctx 106 source4/torture/ndr/ndr.c torture_assert(tctx, ndr->offset == 0, tctx 110 source4/torture/ndr/ndr.c torture_fail(tctx, "check_string_terminator checked beyond string boundaries"); tctx 113 source4/torture/ndr/ndr.c torture_assert(tctx, ndr->offset == 0, tctx 118 source4/torture/ndr/ndr.c blob = strhex_to_data_blob(tctx, "11220000"); tctx 119 source4/torture/ndr/ndr.c ndr = ndr_pull_init_blob(&blob, mem_ctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 121 source4/torture/ndr/ndr.c torture_assert_ndr_success(tctx, tctx 125 source4/torture/ndr/ndr.c torture_assert_ndr_success(tctx, tctx 130 source4/torture/ndr/ndr.c torture_fail(tctx, "check_string_terminator erroneously reported terminator"); tctx 133 source4/torture/ndr/ndr.c torture_assert(tctx, ndr->offset == 0, tctx 138 source4/torture/ndr/ndr.c static bool test_guid_from_string_valid(struct torture_context *tctx) tctx 144 source4/torture/ndr/ndr.c static bool test_guid_from_string_null(struct torture_context *tctx) tctx 147 source4/torture/ndr/ndr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER, tctx 153 source4/torture/ndr/ndr.c static bool test_guid_from_string_invalid(struct torture_context *tctx) tctx 156 source4/torture/ndr/ndr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER, tctx 162 source4/torture/ndr/ndr.c static bool test_guid_from_string(struct torture_context *tctx) tctx 165 source4/torture/ndr/ndr.c torture_assert_ntstatus_ok(tctx, tctx 179 source4/torture/ndr/ndr.c torture_assert(tctx, GUID_equal(&g1, &exp), "UUID parsed incorrectly"); tctx 180 source4/torture/ndr/ndr.c torture_assert_ntstatus_ok(tctx, tctx 183 source4/torture/ndr/ndr.c torture_assert(tctx, GUID_equal(&g1, &exp), "UUID parsed incorrectly"); tctx 188 source4/torture/ndr/ndr.c static bool test_guid_string_valid(struct torture_context *tctx) tctx 202 source4/torture/ndr/ndr.c torture_assert_str_equal(tctx, "00000001-0002-0003-0405-060708090a0b", GUID_string(tctx, &g), tctx 207 source4/torture/ndr/ndr.c static bool test_guid_string2_valid(struct torture_context *tctx) tctx 221 source4/torture/ndr/ndr.c torture_assert_str_equal(tctx, "{00000001-0002-0003-0405-060708090a0b}", GUID_string2(tctx, &g), tctx 226 source4/torture/ndr/ndr.c static bool test_compare_uuid(struct torture_context *tctx) tctx 230 source4/torture/ndr/ndr.c torture_assert_int_equal(tctx, 0, GUID_compare(&g1, &g2), tctx 233 source4/torture/ndr/ndr.c torture_assert_int_equal(tctx, 1, GUID_compare(&g1, &g2), tctx 237 source4/torture/ndr/ndr.c torture_assert_int_equal(tctx, 10, GUID_compare(&g1, &g2), tctx 242 source4/torture/ndr/ndr.c torture_assert_int_equal(tctx, 20, GUID_compare(&g1, &g2), tctx 40 source4/torture/ndr/netlogon.c static bool netrserverauthenticate3_in_check(struct torture_context *tctx, tctx 44 source4/torture/ndr/netlogon.c torture_assert_str_equal(tctx, r->in.server_name, "\\\\NATIVE-DC.NATIVE.BASE", "server name"); tctx 45 source4/torture/ndr/netlogon.c torture_assert_str_equal(tctx, r->in.account_name, "NATIVE-2K$", "account name"); tctx 46 source4/torture/ndr/netlogon.c torture_assert_int_equal(tctx, r->in.secure_channel_type, 2, "secure channel type"); tctx 47 source4/torture/ndr/netlogon.c torture_assert_str_equal(tctx, r->in.computer_name, "NATIVE-2K", "computer name"); tctx 48 source4/torture/ndr/netlogon.c torture_assert_int_equal(tctx, *r->in.negotiate_flags, 0x6007ffff, "negotiate flags"); tctx 49 source4/torture/ndr/netlogon.c torture_assert_mem_equal(tctx, cred_expected, r->in.credentials->data, 8, "credentials"); tctx 58 source4/torture/ndr/netlogon.c static bool netrserverauthenticate3_out_check(struct torture_context *tctx, tctx 62 source4/torture/ndr/netlogon.c torture_assert_mem_equal(tctx, cred_expected, r->out.return_credentials->data, 8, "return_credentials"); tctx 63 source4/torture/ndr/netlogon.c torture_assert_int_equal(tctx, *r->out.negotiate_flags, 0x6007ffff, "negotiate flags"); tctx 64 source4/torture/ndr/netlogon.c torture_assert_int_equal(tctx, *r->out.rid, 0x454, "rid"); tctx 65 source4/torture/ndr/netlogon.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 82 source4/torture/ndr/netlogon.c static bool netrserverreqchallenge_in_check(struct torture_context *tctx, tctx 86 source4/torture/ndr/netlogon.c torture_assert_str_equal(tctx, r->in.server_name, "\\\\NATIVE-DC.NATIVE.BASE", "server name"); tctx 87 source4/torture/ndr/netlogon.c torture_assert_str_equal(tctx, r->in.computer_name, "NATIVE-2K", "account name"); tctx 88 source4/torture/ndr/netlogon.c torture_assert_mem_equal(tctx, cred_expected, r->in.credentials->data, 8, "credentials"); tctx 97 source4/torture/ndr/netlogon.c static bool netrserverreqchallenge_out_check(struct torture_context *tctx, tctx 101 source4/torture/ndr/netlogon.c torture_assert_mem_equal(tctx, cred_expected, r->out.return_credentials->data, 8, "return_credentials"); tctx 102 source4/torture/ndr/netlogon.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code"); tctx 32 source4/torture/ndr/winreg.c static bool closekey_in_check(struct torture_context *tctx, tctx 35 source4/torture/ndr/winreg.c torture_assert(tctx, ck->in.handle != NULL, "handle invalid"); tctx 36 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, ck->in.handle->handle_type, 0, "handle type"); tctx 45 source4/torture/ndr/winreg.c static bool closekey_out_check(struct torture_context *tctx, tctx 48 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, ck->out.handle->handle_type, 0, "handle type"); tctx 49 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, ck->out.result, "return code"); tctx 57 source4/torture/ndr/winreg.c static bool openhklm_in_check(struct torture_context *tctx, tctx 60 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.system_name != NULL, "system name pointer"); tctx 61 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.system_name, 34016, "system name"); tctx 62 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask"); tctx 71 source4/torture/ndr/winreg.c static bool openhklm_out_check(struct torture_context *tctx, tctx 74 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.handle != NULL, "handle pointer"); tctx 75 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.handle->handle_type, 0, "handle_type"); tctx 76 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code"); tctx 91 source4/torture/ndr/winreg.c static bool createkey_in_check(struct torture_context *tctx, tctx 94 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->in.name.name, "spottyfoot", "name"); tctx 95 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.keyclass.name == NULL, "keyclass"); tctx 96 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.options, 0, "option"); tctx 97 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask"); tctx 98 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.secdesc == NULL, "secdesc"); tctx 99 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.action_taken == NULL, "action_taken"); tctx 110 source4/torture/ndr/winreg.c static bool createkey_out_check(struct torture_context *tctx, tctx 113 source4/torture/ndr/winreg.c torture_assert(tctx, GUID_all_zero(&r->out.new_handle->uuid), "new_handle"); tctx 114 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.action_taken == NULL, "action_taken pointer"); tctx 115 source4/torture/ndr/winreg.c torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, tctx 131 source4/torture/ndr/winreg.c static bool enumvalue_in_check(struct torture_context *tctx, tctx 134 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.enum_index, 5, "enum index"); tctx 135 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.type != NULL, "type pointer"); tctx 136 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.type, 0, "type"); tctx 137 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.size, 65535, "size"); tctx 138 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.length, 0, "length"); tctx 139 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.name->size, 512, "name size"); tctx 140 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.name->length, 0, "name length"); tctx 162 source4/torture/ndr/winreg.c static bool enumvalue_out_check(struct torture_context *tctx, tctx 165 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.name->size, 512, "name size"); tctx 166 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.name->length, 18, "name length"); tctx 167 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->out.name->name, "HOMEPATH", "name"); tctx 168 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.type, 1, "type"); tctx 169 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.size, 76, "size"); tctx 170 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.length, 76, "length"); tctx 171 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code"); tctx 197 source4/torture/ndr/winreg.c static bool queryvalue_in_check(struct torture_context *tctx, tctx 200 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->in.value_name->name, "HOMEPATH", "name"); tctx 201 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.type, 0, "type"); tctx 202 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.data_size, 4095, "size"); tctx 203 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.data_length, 0, "length"); tctx 204 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.data == NULL, "data pointer"); tctx 215 source4/torture/ndr/winreg.c static bool queryvalue_out_check(struct torture_context *tctx, tctx 218 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code"); tctx 219 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.type, 1, "type"); tctx 220 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.data == NULL, "data pointer"); tctx 221 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.data_size, 76, "size"); tctx 222 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.data_length, 0, "length"); tctx 242 source4/torture/ndr/winreg.c static bool querymultiplevalues_in_check(struct torture_context *tctx, tctx 245 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.num_values, 1, "num values"); tctx 246 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->in.values[0].name->name, "HOMEPATH", tctx 249 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.values[0].type, 0, "type"); tctx 250 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.values[0].offset, 0, "offset"); tctx 251 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.values[0].length, 0, "length"); tctx 252 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.buffer_size, 76, "buffer size"); tctx 274 source4/torture/ndr/winreg.c static bool querymultiplevalues_out_check(struct torture_context *tctx, tctx 277 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->out.values[0].name->name, "HOMEPATH", tctx 280 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.values[0].type, 0, "type"); tctx 281 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.values[0].offset, 0, "offset"); tctx 282 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.values[0].length, 0, "length"); tctx 284 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.buffer_size, 76, "buffer size"); tctx 285 source4/torture/ndr/winreg.c torture_assert_werr_equal(tctx, r->out.result, WERR_MORE_DATA, tctx 296 source4/torture/ndr/winreg.c static bool flushkey_in_check(struct torture_context *tctx, tctx 299 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.handle->handle_type, 0, "handle type"); tctx 307 source4/torture/ndr/winreg.c static bool flushkey_out_check(struct torture_context *tctx, tctx 310 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code"); tctx 324 source4/torture/ndr/winreg.c static bool openkey_in_check(struct torture_context *tctx, struct winreg_OpenKey *r) tctx 326 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.unknown, 0, "unknown"); tctx 327 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask"); tctx 328 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->in.keyname.name, "spottyfoot", "keyname"); tctx 338 source4/torture/ndr/winreg.c static bool openkey_out_check(struct torture_context *tctx, struct winreg_OpenKey *r) tctx 340 source4/torture/ndr/winreg.c torture_assert(tctx, GUID_all_zero(&r->out.handle->uuid), "handle"); tctx 341 source4/torture/ndr/winreg.c torture_assert_werr_equal(tctx, r->out.result, WERR_BADFILE, "return code"); tctx 354 source4/torture/ndr/winreg.c static bool deletekey_in_check(struct torture_context *tctx, struct winreg_DeleteKey *r) tctx 357 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->in.key.name, "spottyfoot", "key name"); tctx 365 source4/torture/ndr/winreg.c static bool deletekey_out_check(struct torture_context *tctx, struct winreg_DeleteKey *r) tctx 367 source4/torture/ndr/winreg.c torture_assert_werr_equal(tctx, r->out.result, WERR_BADFILE, "return code"); tctx 376 source4/torture/ndr/winreg.c static bool getversion_in_check(struct torture_context *tctx, struct winreg_GetVersion *r) tctx 386 source4/torture/ndr/winreg.c static bool getversion_out_check(struct torture_context *tctx, struct winreg_GetVersion *r) tctx 388 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.version, 5, "version"); tctx 389 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code"); tctx 399 source4/torture/ndr/winreg.c static bool queryinfokey_in_check(struct torture_context *tctx, struct winreg_QueryInfoKey *r) tctx 402 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.classname->name == NULL, "class in"); tctx 413 source4/torture/ndr/winreg.c static bool queryinfokey_out_check(struct torture_context *tctx, struct winreg_QueryInfoKey *r) tctx 415 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.classname != NULL, "class out"); tctx 416 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.classname->name != NULL, "class out name"); tctx 417 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->out.classname->name, "", "class out name"); tctx 418 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.num_subkeys, 0, "num subkeys"); tctx 419 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.max_subkeylen, 0, "subkey length"); tctx 420 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.max_classlen, 140, "subkey size"); tctx 421 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code"); tctx 433 source4/torture/ndr/winreg.c static bool notifychangekeyvalue_in_check(struct torture_context *tctx, struct winreg_NotifyChangeKeyValue *r) tctx 435 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.watch_subtree, 1, "watch subtree"); tctx 436 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.notify_filter, 0, "notify filter"); tctx 437 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.unknown, 0, "unknown"); tctx 438 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.string1.name == NULL, "string1"); tctx 439 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.string2.name == NULL, "string2"); tctx 440 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.unknown2, 0, "unknown2"); tctx 448 source4/torture/ndr/winreg.c static bool notifychangekeyvalue_out_check(struct torture_context *tctx, struct winreg_NotifyChangeKeyValue *r) tctx 450 source4/torture/ndr/winreg.c torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, "notify change key value"); tctx 460 source4/torture/ndr/winreg.c static bool getkeysecurity_in_check(struct torture_context *tctx, tctx 464 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sec_info, 2, "sec info"); tctx 465 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->size, 65536, "sd size"); tctx 466 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->len, 0, "sd len"); tctx 467 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.sd->data == NULL, "sd data"); tctx 478 source4/torture/ndr/winreg.c static bool getkeysecurity_out_check(struct torture_context *tctx, tctx 481 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->size, 20, "sd size"); tctx 482 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->len, 20, "sd len"); tctx 483 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code"); tctx 496 source4/torture/ndr/winreg.c static bool enumkey_in_check(struct torture_context *tctx, struct winreg_EnumKey *r) tctx 498 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.enum_index, 0, "enum index"); tctx 499 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.name->size, 1044, "name size"); tctx 500 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.name->length, 0, "name len"); tctx 501 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.keyclass != NULL, "keyclass pointer"); tctx 502 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.keyclass->name == NULL, "keyclass"); tctx 503 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.last_changed_time != NULL, "last_changed_time != NULL"); tctx 515 source4/torture/ndr/winreg.c static bool enumkey_out_check(struct torture_context *tctx, struct winreg_EnumKey *r) tctx 517 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.name->size, 1044, "name size"); tctx 518 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.name->length, 8, "name len"); tctx 519 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.keyclass != NULL, "keyclass pointer"); tctx 520 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.keyclass->name == NULL, "keyclass"); tctx 521 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.last_changed_time != NULL, "last_changed_time pointer"); tctx 318 source4/torture/rap/rap.c static bool test_netshareenum(struct torture_context *tctx, tctx 327 source4/torture/rap/rap.c torture_assert_ntstatus_ok(tctx, tctx 328 source4/torture/rap/rap.c smbcli_rap_netshareenum(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), ""); tctx 415 source4/torture/rap/rap.c static bool test_netserverenum(struct torture_context *tctx, tctx 427 source4/torture/rap/rap.c torture_assert_ntstatus_ok(tctx, tctx 428 source4/torture/rap/rap.c smbcli_rap_netserverenum2(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), ""); tctx 506 source4/torture/rap/rap.c static bool test_netservergetinfo(struct torture_context *tctx, tctx 515 source4/torture/rap/rap.c torture_assert_ntstatus_ok(tctx, smbcli_rap_netservergetinfo(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), ""); tctx 517 source4/torture/rap/rap.c torture_assert_ntstatus_ok(tctx, smbcli_rap_netservergetinfo(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), ""); tctx 43 source4/torture/raw/acls.c static bool test_sd(struct torture_context *tctx, tctx 73 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 83 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 89 source4/torture/raw/acls.c test_sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-5432"); tctx 107 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 127 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 148 source4/torture/raw/acls.c static bool test_nttrans_create(struct torture_context *tctx, tctx 182 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 194 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 202 source4/torture/raw/acls.c test_sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-54321"); tctx 215 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 220 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 241 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &_q); \ tctx 254 source4/torture/raw/acls.c static bool test_nttrans_create_null_dacl(struct torture_context *tctx, tctx 264 source4/torture/raw/acls.c struct security_descriptor *sd = security_descriptor_initialise(tctx); tctx 287 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 298 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 334 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 351 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 359 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 367 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 375 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 383 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 409 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 432 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 440 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 445 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 450 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 455 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 476 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 499 source4/torture/raw/acls.c static bool test_creator_sid(struct torture_context *tctx, tctx 528 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 536 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 540 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid); tctx 543 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 561 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 566 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 571 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 576 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 580 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 596 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 609 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 614 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 623 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 628 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 635 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 648 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx, tctx 656 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 670 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 675 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 684 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 689 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 711 source4/torture/raw/acls.c static bool test_generic_bits(struct torture_context *tctx, tctx 767 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 775 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 779 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid); tctx 813 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 829 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx, tctx 837 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 849 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 861 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 877 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx, tctx 885 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 897 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 932 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 940 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 944 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid); tctx 978 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 994 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx, tctx 1002 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 1014 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1026 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 1042 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx, tctx 1050 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 1062 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1086 source4/torture/raw/acls.c static bool test_owner_bits(struct torture_context *tctx, tctx 1121 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1129 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 1133 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid); tctx 1153 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 1174 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1209 source4/torture/raw/acls.c static bool test_inheritance(struct torture_context *tctx, tctx 1349 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1357 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 1361 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid); tctx 1365 source4/torture/raw/acls.c sd_def = security_descriptor_dacl_create(tctx, tctx 1377 source4/torture/raw/acls.c creator_owner = dom_sid_parse_talloc(tctx, SID_CREATOR_OWNER); tctx 1380 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 1400 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1405 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 1445 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1450 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 1517 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 1539 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1546 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 1550 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx, tctx 1568 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1582 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1588 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1592 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1609 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1613 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1637 source4/torture/raw/acls.c static bool test_inheritance_dynamic(struct torture_context *tctx, tctx 1670 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1678 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q); tctx 1682 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid); tctx 1686 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 1707 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1715 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1722 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1726 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 1741 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1749 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1803 source4/torture/raw/acls.c static bool test_sd_get_set(struct torture_context *tctx, tctx 1841 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, tctx 1864 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1884 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1891 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &fi); tctx 1900 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &fi); tctx 1919 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &fi); tctx 1938 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &fi); tctx 1957 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &fi); tctx 1989 source4/torture/raw/acls.c bool torture_raw_acls(struct torture_context *tctx, struct smbcli_state *cli) tctx 1997 source4/torture/raw/acls.c ret &= test_sd(tctx, cli); tctx 1998 source4/torture/raw/acls.c ret &= test_nttrans_create(tctx, cli); tctx 1999 source4/torture/raw/acls.c ret &= test_nttrans_create_null_dacl(tctx, cli); tctx 2000 source4/torture/raw/acls.c ret &= test_creator_sid(tctx, cli); tctx 2001 source4/torture/raw/acls.c ret &= test_generic_bits(tctx, cli); tctx 2002 source4/torture/raw/acls.c ret &= test_owner_bits(tctx, cli); tctx 2003 source4/torture/raw/acls.c ret &= test_inheritance(tctx, cli); tctx 2004 source4/torture/raw/acls.c ret &= test_inheritance_dynamic(tctx, cli); tctx 2005 source4/torture/raw/acls.c ret &= test_sd_get_set(tctx, cli); tctx 59 source4/torture/raw/chkpath.c static bool test_path_ex(struct smbcli_state *cli, struct torture_context *tctx, tctx 99 source4/torture/raw/chkpath.c if (tctx && torture_setting_bool(tctx, "samba4", false)) { tctx 120 source4/torture/raw/chkpath.c static bool test_chkpath(struct smbcli_state *cli, struct torture_context *tctx) tctx 135 source4/torture/raw/chkpath.c fnum = create_complex_file(cli, tctx, BASEDIR "\\test.txt.."); tctx 150 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR, BASEDIR, NT_STATUS_OK, NT_STATUS_OK); tctx 151 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR) + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK); tctx 152 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\\\") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK); tctx 153 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\foo\\..") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK); tctx 154 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\f\\o\\o\\..\\..\\..") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK); tctx 155 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\foo\\\\..\\\\") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK); tctx 156 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR"\\", BASEDIR, NT_STATUS_OK, NT_STATUS_OK); tctx 157 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR"\\\\..\\"BASEDIR, BASEDIR, NT_STATUS_OK, NT_STATUS_OK); tctx 158 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR"\\\\\\", BASEDIR, NT_STATUS_OK, NT_STATUS_OK); tctx 159 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, "\\\\\\\\"BASEDIR"\\\\\\\\", BASEDIR, NT_STATUS_OK, NT_STATUS_OK); tctx 160 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, "\\\\\\\\"BASEDIR, BASEDIR, NT_STATUS_OK, NT_STATUS_OK); tctx 161 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR "\\foo\\..\\test.txt..", BASEDIR "\\test.txt..", tctx 163 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, "", "\\", NT_STATUS_OK, NT_STATUS_OK); tctx 182 source4/torture/raw/chkpath.c status = single_search(cli, tctx, "\\.\\\\\\\\\\\\."); tctx 224 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR "\\..", "\\", NT_STATUS_OK,NT_STATUS_OK); tctx 243 source4/torture/raw/chkpath.c status = single_search(cli, tctx, BASEDIR".\\.\\.\\.\\foo\\..\\.\\"); tctx 271 source4/torture/raw/chkpath.c static bool test_chkpath_names(struct smbcli_state *cli, struct torture_context *tctx) tctx 289 source4/torture/raw/chkpath.c char *path = talloc_asprintf(tctx, "%s\\File0x%02X%c", tctx 309 source4/torture/raw/chkpath.c torture_setting_bool(tctx, "samba3", false)) { tctx 47 source4/torture/raw/composite.c static bool test_loadfile(struct smbcli_state *cli, struct torture_context *tctx) tctx 58 source4/torture/raw/composite.c int *count = talloc_zero(tctx, int); tctx 60 source4/torture/raw/composite.c data = talloc_array(tctx, uint8_t, len); tctx 80 source4/torture/raw/composite.c c = talloc_array(tctx, struct composite_context *, num_ops); tctx 91 source4/torture/raw/composite.c if (torture_setting_bool(tctx, "progress", true)) { tctx 99 source4/torture/raw/composite.c status = smb_composite_loadfile_recv(c[i], tctx); tctx 125 source4/torture/raw/composite.c static bool test_fetchfile(struct smbcli_state *cli, struct torture_context *tctx) tctx 137 source4/torture/raw/composite.c int *count = talloc_zero(tctx, int); tctx 140 source4/torture/raw/composite.c data = talloc_array(tctx, uint8_t, len); tctx 156 source4/torture/raw/composite.c io2.in.dest_host = torture_setting_string(tctx, "host", NULL); tctx 157 source4/torture/raw/composite.c io2.in.ports = lp_smb_ports(tctx->lp_ctx); tctx 158 source4/torture/raw/composite.c io2.in.called_name = torture_setting_string(tctx, "host", NULL); tctx 159 source4/torture/raw/composite.c io2.in.service = torture_setting_string(tctx, "share", NULL); tctx 163 source4/torture/raw/composite.c io2.in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 165 source4/torture/raw/composite.c io2.in.resolve_ctx = lp_resolve_context(tctx->lp_ctx); tctx 166 source4/torture/raw/composite.c io2.in.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx); tctx 167 source4/torture/raw/composite.c io2.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx); tctx 168 source4/torture/raw/composite.c lp_smbcli_options(tctx->lp_ctx, &io2.in.options); tctx 169 source4/torture/raw/composite.c lp_smbcli_session_options(tctx->lp_ctx, &io2.in.session_options); tctx 174 source4/torture/raw/composite.c c = talloc_array(tctx, struct composite_context *, torture_numops); tctx 186 source4/torture/raw/composite.c if (torture_setting_bool(tctx, "progress", true)) { tctx 194 source4/torture/raw/composite.c status = smb_composite_fetchfile_recv(c[i], tctx); tctx 223 source4/torture/raw/composite.c static bool test_appendacl(struct smbcli_state *cli, struct torture_context *tctx) tctx 235 source4/torture/raw/composite.c int *count = talloc_zero(tctx, int); tctx 241 source4/torture/raw/composite.c io_orig = talloc_array(tctx, struct smb_composite_appendacl *, num_ops); tctx 269 source4/torture/raw/composite.c test_sd = security_descriptor_initialise(tctx); tctx 270 source4/torture/raw/composite.c test_sid = dom_sid_parse_talloc (tctx, "S-1-5-32-1234-5432"); tctx 272 source4/torture/raw/composite.c ace = talloc_zero(tctx, struct security_ace); tctx 289 source4/torture/raw/composite.c c = talloc_array(tctx, struct composite_context *, num_ops); tctx 290 source4/torture/raw/composite.c io = talloc_array(tctx, struct smb_composite_appendacl *, num_ops); tctx 302 source4/torture/raw/composite.c event_ctx = tctx->ev; tctx 306 source4/torture/raw/composite.c if (torture_setting_bool(tctx, "progress", true)) { tctx 336 source4/torture/raw/composite.c static bool test_fsinfo(struct smbcli_state *cli, struct torture_context *tctx) tctx 346 source4/torture/raw/composite.c int *count = talloc_zero(tctx, int); tctx 349 source4/torture/raw/composite.c io1.in.dest_host = torture_setting_string(tctx, "host", NULL); tctx 350 source4/torture/raw/composite.c io1.in.dest_ports = lp_smb_ports(tctx->lp_ctx); tctx 351 source4/torture/raw/composite.c io1.in.socket_options = lp_socket_options(tctx->lp_ctx); tctx 352 source4/torture/raw/composite.c io1.in.called_name = torture_setting_string(tctx, "host", NULL); tctx 353 source4/torture/raw/composite.c io1.in.service = torture_setting_string(tctx, "share", NULL); tctx 356 source4/torture/raw/composite.c io1.in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 358 source4/torture/raw/composite.c io1.in.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx); tctx 359 source4/torture/raw/composite.c io1.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx); tctx 363 source4/torture/raw/composite.c event_ctx = tctx->ev; tctx 364 source4/torture/raw/composite.c c = talloc_array(tctx, struct composite_context *, torture_numops); tctx 367 source4/torture/raw/composite.c c[i] = smb_composite_fsinfo_send(cli->tree, &io1, lp_resolve_context(tctx->lp_ctx)); tctx 376 source4/torture/raw/composite.c if (torture_setting_bool(tctx, "progress", true)) { tctx 384 source4/torture/raw/composite.c status = smb_composite_fsinfo_recv(c[i], tctx); tctx 399 source4/torture/raw/composite.c guid=GUID_string(tctx, &io1.out.fsinfo->objectid_information.out.guid); tctx 412 source4/torture/raw/composite.c bool torture_raw_composite(struct torture_context *tctx, tctx 421 source4/torture/raw/composite.c ret &= test_fetchfile(cli, tctx); tctx 422 source4/torture/raw/composite.c ret &= test_loadfile(cli, tctx); tctx 423 source4/torture/raw/composite.c ret &= test_appendacl(cli, tctx); tctx 424 source4/torture/raw/composite.c ret &= test_fsinfo(cli, tctx); tctx 63 source4/torture/raw/context.c static bool test_session(struct smbcli_state *cli, struct torture_context *tctx) tctx 95 source4/torture/raw/context.c lp_smbcli_session_options(tctx->lp_ctx, &options); tctx 96 source4/torture/raw/context.c gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx); tctx 98 source4/torture/raw/context.c session = smbcli_session_init(cli->transport, tctx, false, options); tctx 102 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 113 source4/torture/raw/context.c session2 = smbcli_session_init(cli->transport, tctx, false, options); tctx 118 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 140 source4/torture/raw/context.c session3 = smbcli_session_init(cli->transport, tctx, false, options); tctx 145 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 153 source4/torture/raw/context.c session4 = smbcli_session_init(cli->transport, tctx, false, options); tctx 158 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 160 source4/torture/raw/context.c anon_creds = cli_credentials_init(tctx); tctx 161 source4/torture/raw/context.c cli_credentials_set_conf(anon_creds, tctx->lp_ctx); tctx 173 source4/torture/raw/context.c tree = smbcli_tree_init(session, tctx, false); tctx 189 source4/torture/raw/context.c status = smb_raw_open(tree, tctx, &io); tctx 235 source4/torture/raw/context.c setups[i].in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 240 source4/torture/raw/context.c sessions[i] = smbcli_session_init(cli->transport, tctx, false, options); tctx 268 source4/torture/raw/context.c static bool test_tree(struct smbcli_state *cli, struct torture_context *tctx) tctx 288 source4/torture/raw/context.c share = torture_setting_string(tctx, "share", NULL); tctx 289 source4/torture/raw/context.c host = torture_setting_string(tctx, "host", NULL); tctx 292 source4/torture/raw/context.c tree = smbcli_tree_init(cli->session, tctx, false); tctx 297 source4/torture/raw/context.c tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share); tctx 299 source4/torture/raw/context.c status = smb_raw_tcon(tree, tctx, &tcon); tctx 308 source4/torture/raw/context.c status = smb_raw_tcon(tree, tctx, &tcon); tctx 325 source4/torture/raw/context.c status = smb_raw_open(tree, tctx, &io); tctx 373 source4/torture/raw/context.c static bool test_tree_ulogoff(struct smbcli_state *cli, struct torture_context *tctx) tctx 397 source4/torture/raw/context.c share = torture_setting_string(tctx, "share", NULL); tctx 398 source4/torture/raw/context.c host = torture_setting_string(tctx, "host", NULL); tctx 400 source4/torture/raw/context.c lp_smbcli_session_options(tctx->lp_ctx, &options); tctx 403 source4/torture/raw/context.c session1 = smbcli_session_init(cli->transport, tctx, false, options); tctx 406 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 408 source4/torture/raw/context.c setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx); tctx 415 source4/torture/raw/context.c tree = smbcli_tree_init(session1, tctx, false); tctx 419 source4/torture/raw/context.c tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share); tctx 421 source4/torture/raw/context.c status = smb_raw_tcon(tree, tctx, &tcon); tctx 439 source4/torture/raw/context.c status = smb_raw_open(tree, tctx, &io); tctx 460 source4/torture/raw/context.c session2 = smbcli_session_init(cli->transport, tctx, false, options); tctx 463 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 465 source4/torture/raw/context.c setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx); tctx 487 source4/torture/raw/context.c status = smb_raw_open(tree, tctx, &io); tctx 636 source4/torture/raw/context.c static bool test_pid_2sess(struct smbcli_state *cli, struct torture_context *tctx) tctx 657 source4/torture/raw/context.c lp_smbcli_session_options(tctx->lp_ctx, &options); tctx 660 source4/torture/raw/context.c session = smbcli_session_init(cli->transport, tctx, false, options); tctx 664 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 666 source4/torture/raw/context.c setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx); tctx 691 source4/torture/raw/context.c status = smb_raw_open(cli->tree, tctx, &io); tctx 743 source4/torture/raw/context.c static bool test_pid_2tcon(struct smbcli_state *cli, struct torture_context *tctx) tctx 765 source4/torture/raw/context.c share = torture_setting_string(tctx, "share", NULL); tctx 766 source4/torture/raw/context.c host = torture_setting_string(tctx, "host", NULL); tctx 769 source4/torture/raw/context.c tree = smbcli_tree_init(cli->session, tctx, false); tctx 774 source4/torture/raw/context.c tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share); tctx 776 source4/torture/raw/context.c status = smb_raw_tcon(tree, tctx, &tcon); tctx 799 source4/torture/raw/context.c status = smb_raw_open(cli->tree, tctx, &io); tctx 830 source4/torture/raw/context.c status = smb_raw_open(cli->tree, tctx, &io); tctx 885 source4/torture/raw/context.c static bool torture_raw_context_int(struct torture_context *tctx, tctx 890 source4/torture/raw/context.c ret &= test_session(cli, tctx); tctx 891 source4/torture/raw/context.c ret &= test_tree(cli, tctx); tctx 892 source4/torture/raw/context.c ret &= test_tree_ulogoff(cli, tctx); tctx 893 source4/torture/raw/context.c ret &= test_pid_exit_only_sees_open(cli, tctx); tctx 894 source4/torture/raw/context.c ret &= test_pid_2sess(cli, tctx); tctx 895 source4/torture/raw/context.c ret &= test_pid_2tcon(cli, tctx); tctx 231 source4/torture/raw/eas.c static bool test_max_eas(struct smbcli_state *cli, struct torture_context *tctx) tctx 249 source4/torture/raw/eas.c maxeasize = torture_setting_int(tctx, "maxeasize", 65536); tctx 250 source4/torture/raw/eas.c maxeanames = torture_setting_int(tctx, "maxeanames", 101); tctx 251 source4/torture/raw/eas.c maxeastart = torture_setting_int(tctx, "maxeastart", 1); tctx 252 source4/torture/raw/eas.c maxeadebug = torture_setting_int(tctx, "maxeadebug", 0); tctx 298 source4/torture/raw/eas.c status = smb_raw_open(cli->tree, tctx, &io); tctx 302 source4/torture/raw/eas.c eablob = data_blob_talloc(tctx, NULL, maxeasize); tctx 338 source4/torture/raw/eas.c eaname = talloc_asprintf(tctx, "MAX%d", i); tctx 73 source4/torture/raw/lock.c static bool test_lock(struct torture_context *tctx, struct smbcli_state *cli) tctx 208 source4/torture/raw/lock.c static bool test_lockx(struct torture_context *tctx, struct smbcli_state *cli) tctx 366 source4/torture/raw/lock.c if (TARGET_IS_WIN7(tctx)) tctx 378 source4/torture/raw/lock.c if (TARGET_IS_WIN7(tctx)) tctx 396 source4/torture/raw/lock.c static bool test_pidhigh(struct torture_context *tctx, tctx 476 source4/torture/raw/lock.c static bool test_async(struct torture_context *tctx, tctx 498 source4/torture/raw/lock.c lp_smbcli_session_options(tctx->lp_ctx, &options); tctx 629 source4/torture/raw/lock.c session = smbcli_session_init(cli->transport, tctx, false, options); tctx 632 source4/torture/raw/lock.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx); tctx 634 source4/torture/raw/lock.c setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx); tctx 640 source4/torture/raw/lock.c share = torture_setting_string(tctx, "share", NULL); tctx 641 source4/torture/raw/lock.c host = torture_setting_string(tctx, "host", NULL); tctx 642 source4/torture/raw/lock.c tree = smbcli_tree_init(session, tctx, false); tctx 646 source4/torture/raw/lock.c tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share); tctx 648 source4/torture/raw/lock.c status = smb_raw_tcon(tree, tctx, &tcon); tctx 813 source4/torture/raw/lock.c static bool test_errorcode(struct torture_context *tctx, tctx 857 source4/torture/raw/lock.c status = smb_raw_open(cli->tree, tctx, &op); tctx 861 source4/torture/raw/lock.c status = smb_raw_open(cli->tree, tctx, &op); tctx 1295 source4/torture/raw/lock.c static bool test_changetype(struct torture_context *tctx, tctx 1397 source4/torture/raw/lock.c static bool test_zerobytelocks(struct torture_context *tctx, struct smbcli_state *cli) tctx 1487 source4/torture/raw/lock.c static bool test_unlock(struct torture_context *tctx, struct smbcli_state *cli) tctx 1641 source4/torture/raw/lock.c if (TARGET_IS_WIN7(tctx)) tctx 1654 source4/torture/raw/lock.c if (TARGET_IS_WIN7(tctx)) tctx 1672 source4/torture/raw/lock.c static bool test_multiple_unlock(struct torture_context *tctx, struct smbcli_state *cli) tctx 1789 source4/torture/raw/lock.c static bool test_stacking(struct torture_context *tctx, struct smbcli_state *cli) tctx 47 source4/torture/raw/lockbench.c struct torture_context *tctx; tctx 184 source4/torture/raw/lockbench.c if (!torture_get_conn_index(state->client_num, state->mem_ctx, state->tctx, &host, &share)) { tctx 191 source4/torture/raw/lockbench.c io->in.gensec_settings = lp_gensec_settings(state->mem_ctx, state->tctx->lp_ctx); tctx 192 source4/torture/raw/lockbench.c io->in.socket_options = lp_socket_options(state->tctx->lp_ctx); tctx 198 source4/torture/raw/lockbench.c io->in.workgroup = lp_workgroup(state->tctx->lp_ctx); tctx 199 source4/torture/raw/lockbench.c io->in.iconv_convenience = lp_iconv_convenience(state->tctx->lp_ctx); tctx 200 source4/torture/raw/lockbench.c lp_smbcli_options(state->tctx->lp_ctx, &io->in.options); tctx 201 source4/torture/raw/lockbench.c lp_smbcli_session_options(state->tctx->lp_ctx, &io->in.session_options); tctx 208 source4/torture/raw/lockbench.c lp_resolve_context(state->tctx->lp_ctx), tctx 336 source4/torture/raw/lockbench.c state[i].tctx = torture; tctx 40 source4/torture/raw/mkdir.c static bool test_mkdir(struct smbcli_state *cli, struct torture_context *tctx) tctx 78 source4/torture/raw/mkdir.c smbcli_close(cli->tree, create_complex_file(cli, tctx, path)); tctx 110 source4/torture/raw/mkdir.c md.t2mkdir.in.path = talloc_asprintf(tctx, "%s\\bad_path\\bad_path", tctx 121 source4/torture/raw/mkdir.c md.t2mkdir.in.eas = talloc_array(tctx, struct ea_struct, md.t2mkdir.in.num_eas); tctx 124 source4/torture/raw/mkdir.c md.t2mkdir.in.eas[0].value = data_blob_talloc(tctx, "blah", 4); tctx 127 source4/torture/raw/mkdir.c md.t2mkdir.in.eas[1].value = data_blob_talloc(tctx, "foo bar", 7); tctx 130 source4/torture/raw/mkdir.c md.t2mkdir.in.eas[2].value = data_blob_talloc(tctx, "xx1", 3); tctx 133 source4/torture/raw/mkdir.c if (torture_setting_bool(tctx, "samba3", false) tctx 547 source4/torture/raw/notify.c static bool test_notify_mask(struct smbcli_state *cli, struct torture_context *tctx) tctx 590 source4/torture/raw/notify.c status = smb_raw_open(cli->tree, tctx, &io); \ tctx 599 source4/torture/raw/notify.c status = smb_raw_changenotify_recv(req, tctx, ¬ify); \ tctx 711 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");, tctx 717 source4/torture/raw/notify.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 724 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, tctx 735 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");, tctx 743 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");, tctx 751 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");, tctx 760 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");, tctx 768 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");, tctx 842 source4/torture/raw/notify.c static bool test_notify_tdis(struct torture_context *tctx) tctx 854 source4/torture/raw/notify.c if (!torture_open_connection(&cli, tctx, 0)) { tctx 874 source4/torture/raw/notify.c status = smb_raw_open(cli->tree, tctx, &io); tctx 892 source4/torture/raw/notify.c status = smb_raw_changenotify_recv(req, tctx, ¬ify); tctx 904 source4/torture/raw/notify.c static bool test_notify_exit(struct torture_context *tctx) tctx 916 source4/torture/raw/notify.c if (!torture_open_connection(&cli, tctx, 0)) { tctx 936 source4/torture/raw/notify.c status = smb_raw_open(cli->tree, tctx, &io); tctx 953 source4/torture/raw/notify.c status = smb_raw_changenotify_recv(req, tctx, ¬ify); tctx 965 source4/torture/raw/notify.c static bool test_notify_ulogoff(struct torture_context *tctx) tctx 977 source4/torture/raw/notify.c if (!torture_open_connection(&cli, tctx, 0)) { tctx 997 source4/torture/raw/notify.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1014 source4/torture/raw/notify.c status = smb_raw_changenotify_recv(req, tctx, ¬ify); tctx 1033 source4/torture/raw/notify.c static bool test_notify_tcp_dis(struct torture_context *tctx) tctx 1045 source4/torture/raw/notify.c if (!torture_open_connection(&cli, tctx, 0)) { tctx 1065 source4/torture/raw/notify.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1081 source4/torture/raw/notify.c status = smb_raw_changenotify_recv(req, tctx, ¬ify); tctx 1438 source4/torture/raw/notify.c struct torture_context *tctx) tctx 1445 source4/torture/raw/notify.c share = torture_setting_string(tctx, "share", NULL); tctx 1446 source4/torture/raw/notify.c host = torture_setting_string(tctx, "host", NULL); tctx 1449 source4/torture/raw/notify.c tree = smbcli_tree_init(cli->session, tctx, false); tctx 1454 source4/torture/raw/notify.c tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share); tctx 1456 source4/torture/raw/notify.c status = smb_raw_tcon(tree, tctx, &tcon); tctx 56 source4/torture/raw/offline.c struct torture_context *tctx; tctx 410 source4/torture/raw/offline.c state[i].tctx = torture; tctx 424 source4/torture/raw/offline.c state[i].tctx = torture; tctx 75 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname); \ tctx 94 source4/torture/raw/open.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \ tctx 101 source4/torture/raw/open.c timestring(tctx, t1), \ tctx 102 source4/torture/raw/open.c timestring(tctx, t2)); \ tctx 103 source4/torture/raw/open.c dump_all_info(tctx, &finfo); \ tctx 111 source4/torture/raw/open.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \ tctx 117 source4/torture/raw/open.c nt_time_string(tctx, t), \ tctx 118 source4/torture/raw/open.c nt_time_string(tctx, t2)); \ tctx 119 source4/torture/raw/open.c dump_all_info(tctx, &finfo); \ tctx 126 source4/torture/raw/open.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \ tctx 131 source4/torture/raw/open.c dump_all_info(tctx, &finfo); \ tctx 157 source4/torture/raw/open.c static bool test_open(struct smbcli_state *cli, struct torture_context *tctx) tctx 172 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 180 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 185 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 198 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 205 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 212 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 220 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 231 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 235 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 248 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 268 source4/torture/raw/open.c static bool test_openx(struct smbcli_state *cli, struct torture_context *tctx) tctx 314 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname); tctx 323 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 342 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 359 source4/torture/raw/open.c fnum2 = create_complex_file(cli, tctx, fname); tctx 367 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 383 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 388 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 399 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 401 source4/torture/raw/open.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 417 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 424 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 444 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 451 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 457 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 464 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname_exe); tctx 476 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 498 source4/torture/raw/open.c static bool test_t2open(struct smbcli_state *cli, struct torture_context *tctx) tctx 528 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname1); tctx 549 source4/torture/raw/open.c io.t2open.in.eas = talloc_array(tctx, struct ea_struct, io.t2open.in.num_eas); tctx 552 source4/torture/raw/open.c io.t2open.in.eas[0].value = data_blob_talloc(tctx, "first value", 11); tctx 555 source4/torture/raw/open.c io.t2open.in.eas[1].value = data_blob_talloc(tctx, "foo", 3); tctx 558 source4/torture/raw/open.c io.t2open.in.eas[2].value = data_blob_talloc(tctx, "xy", 2); tctx 569 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 572 source4/torture/raw/open.c && torture_setting_bool(tctx, "samba3", false)) { tctx 597 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 627 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 631 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 641 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 649 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 663 source4/torture/raw/open.c static bool test_ntcreatex(struct smbcli_state *cli, struct torture_context *tctx) tctx 722 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 738 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 757 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname); tctx 765 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 802 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 836 source4/torture/raw/open.c static bool test_nttrans_create(struct smbcli_state *cli, struct torture_context *tctx) tctx 899 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 915 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 934 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname); tctx 942 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 961 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 985 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1023 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1066 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1104 source4/torture/raw/open.c static bool test_ntcreatex_brlocked(struct smbcli_state *cli, struct torture_context *tctx) tctx 1130 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1161 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io1); tctx 1174 source4/torture/raw/open.c static bool test_mknew(struct smbcli_state *cli, struct torture_context *tctx) tctx 1190 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1194 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1202 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1212 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1229 source4/torture/raw/open.c static bool test_create(struct smbcli_state *cli, struct torture_context *tctx) tctx 1245 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1249 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1258 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1268 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1285 source4/torture/raw/open.c static bool test_ctemp(struct smbcli_state *cli, TALLOC_CTX *tctx) tctx 1301 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1309 source4/torture/raw/open.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo); tctx 1328 source4/torture/raw/open.c static bool test_chained(struct smbcli_state *cli, TALLOC_CTX *tctx) tctx 1341 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname); tctx 1364 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1385 source4/torture/raw/open.c static bool test_no_leading_slash(struct smbcli_state *cli, TALLOC_CTX *tctx) tctx 1398 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname); tctx 1414 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1431 source4/torture/raw/open.c static bool test_openx_over_dir(struct smbcli_state *cli, TALLOC_CTX *tctx) tctx 1459 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1473 source4/torture/raw/open.c static bool test_raw_open_multi(struct torture_context *tctx) tctx 1484 source4/torture/raw/open.c const char *host = torture_setting_string(tctx, "host", NULL); tctx 1485 source4/torture/raw/open.c const char *share = torture_setting_string(tctx, "share", NULL); tctx 1493 source4/torture/raw/open.c if ((tctx->ev == NULL) || (clients == NULL) || (requests == NULL) || tctx 1499 source4/torture/raw/open.c if (!torture_open_connection_share(mem_ctx, &cli, tctx, host, share, tctx->ev)) { tctx 1507 source4/torture/raw/open.c tctx, host, share, tctx->ev)) { tctx 1576 source4/torture/raw/open.c if (event_loop_once(tctx->ev) != 0) { tctx 1596 source4/torture/raw/open.c static bool test_open_for_delete(struct smbcli_state *cli, struct torture_context *tctx) tctx 1623 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 1638 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io); tctx 47 source4/torture/raw/openbench.c struct torture_context *tctx; tctx 126 source4/torture/raw/openbench.c if (!torture_get_conn_index(state->client_num, state->mem_ctx, state->tctx, &host, &share)) { tctx 133 source4/torture/raw/openbench.c io->in.socket_options = lp_socket_options(state->tctx->lp_ctx); tctx 139 source4/torture/raw/openbench.c io->in.workgroup = lp_workgroup(state->tctx->lp_ctx); tctx 140 source4/torture/raw/openbench.c io->in.gensec_settings = lp_gensec_settings(state->mem_ctx, state->tctx->lp_ctx); tctx 141 source4/torture/raw/openbench.c lp_smbcli_options(state->tctx->lp_ctx, &io->in.options); tctx 142 source4/torture/raw/openbench.c lp_smbcli_session_options(state->tctx->lp_ctx, &io->in.session_options); tctx 151 source4/torture/raw/openbench.c lp_resolve_context(state->tctx->lp_ctx), tctx 389 source4/torture/raw/openbench.c state[i].tctx = torture; tctx 34 source4/torture/raw/oplock.c torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got 0x%x - should be 0x%x\n", \ tctx 41 source4/torture/raw/oplock.c torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got %d - should be between %d and %d\n", \ tctx 48 source4/torture/raw/oplock.c torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got '%s' - should be '%s'\n", \ tctx 54 source4/torture/raw/oplock.c #define CHECK_STATUS(tctx, status, correct) do { \ tctx 56 source4/torture/raw/oplock.c torture_result(tctx, TORTURE_FAIL, __location__": Incorrect status %s - should be %s", \ tctx 174 source4/torture/raw/oplock.c static bool open_connection_no_level2_oplocks(struct torture_context *tctx, tctx 181 source4/torture/raw/oplock.c lp_smbcli_options(tctx->lp_ctx, &options); tctx 182 source4/torture/raw/oplock.c lp_smbcli_session_options(tctx->lp_ctx, &session_options); tctx 186 source4/torture/raw/oplock.c status = smbcli_full_connection(tctx, c, tctx 187 source4/torture/raw/oplock.c torture_setting_string(tctx, "host", NULL), tctx 188 source4/torture/raw/oplock.c lp_smb_ports(tctx->lp_ctx), tctx 189 source4/torture/raw/oplock.c torture_setting_string(tctx, "share", NULL), tctx 190 source4/torture/raw/oplock.c NULL, lp_socket_options(tctx->lp_ctx), cmdline_credentials, tctx 191 source4/torture/raw/oplock.c lp_resolve_context(tctx->lp_ctx), tctx 192 source4/torture/raw/oplock.c tctx->ev, &options, &session_options, tctx 193 source4/torture/raw/oplock.c lp_iconv_convenience(tctx->lp_ctx), tctx 194 source4/torture/raw/oplock.c lp_gensec_settings(tctx, tctx->lp_ctx)); tctx 203 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive1(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 236 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE1: open a file with an exclusive oplock (share mode: none)\n"); tctx 240 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 241 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 245 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open should not cause a break\n"); tctx 246 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 247 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 251 source4/torture/raw/oplock.c torture_comment(tctx, "unlink it - should also be no break\n"); tctx 255 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 268 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive2(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 301 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE2: open a file with an exclusive oplock (share mode: all)\n"); tctx 308 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 309 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 313 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open should cause a break to level 2\n"); tctx 314 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 315 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 325 source4/torture/raw/oplock.c torture_comment(tctx, "try to unlink it - should not cause a break, but a sharing violation\n"); tctx 329 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 333 source4/torture/raw/oplock.c torture_comment(tctx, "close 1st handle\n"); tctx 336 source4/torture/raw/oplock.c torture_comment(tctx, "try to unlink it - should not cause a break, but a sharing violation\n"); tctx 340 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 344 source4/torture/raw/oplock.c torture_comment(tctx, "close 1st handle\n"); tctx 347 source4/torture/raw/oplock.c torture_comment(tctx, "unlink it\n"); tctx 351 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 362 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive3(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 395 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE3: open a file with an exclusive oplock (share mode: none)\n"); tctx 400 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 401 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 405 source4/torture/raw/oplock.c torture_comment(tctx, "setpathinfo EOF should trigger a break to none\n"); tctx 413 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 427 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive4(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 459 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE4: open with exclusive oplock\n"); tctx 464 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 465 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 470 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only shouldn't cause oplock break\n"); tctx 474 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 475 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 491 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive5(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 524 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE5: open with exclusive oplock\n"); tctx 533 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 534 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 540 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_OVERWRITE_IF dispostion causes oplock break\n"); tctx 545 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 546 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 562 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive6(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 597 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE6: open a file with an exclusive oplock (share mode: none)\n"); tctx 601 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 602 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 606 source4/torture/raw/oplock.c torture_comment(tctx, "rename should not generate a break but get a sharing violation\n"); tctx 616 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 629 source4/torture/raw/oplock.c static bool test_raw_oplock_batch1(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 666 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH1: open with batch oplock\n"); tctx 671 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 672 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 676 source4/torture/raw/oplock.c torture_comment(tctx, "unlink should generate a break\n"); tctx 680 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 687 source4/torture/raw/oplock.c torture_comment(tctx, "2nd unlink should not generate a break\n"); tctx 690 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 694 source4/torture/raw/oplock.c torture_comment(tctx, "writing should generate a self break to none\n"); tctx 713 source4/torture/raw/oplock.c static bool test_raw_oplock_batch2(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 747 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH2: open with batch oplock\n"); tctx 752 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 753 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 757 source4/torture/raw/oplock.c torture_comment(tctx, "unlink should generate a break, which we ack as break to none\n"); tctx 762 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 769 source4/torture/raw/oplock.c torture_comment(tctx, "2nd unlink should not generate a break\n"); tctx 772 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 776 source4/torture/raw/oplock.c torture_comment(tctx, "writing should not generate a break\n"); tctx 792 source4/torture/raw/oplock.c static bool test_raw_oplock_batch3(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 825 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH3: if we close on break then the unlink can succeed\n"); tctx 831 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 832 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 840 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 856 source4/torture/raw/oplock.c static bool test_raw_oplock_batch4(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 889 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH4: a self read should not cause a break\n"); tctx 896 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 897 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 907 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 920 source4/torture/raw/oplock.c static bool test_raw_oplock_batch5(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 952 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH5: a 2nd open should give a break\n"); tctx 959 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 960 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 967 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 968 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 984 source4/torture/raw/oplock.c static bool test_raw_oplock_batch6(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1017 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH6: a 2nd open should give a break to level II if the first open allowed shared read\n"); tctx 1027 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1028 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1034 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 1035 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1045 source4/torture/raw/oplock.c torture_comment(tctx, "write should trigger a break to none on both\n"); tctx 1065 source4/torture/raw/oplock.c static bool test_raw_oplock_batch7(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1097 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH7: a 2nd open should get an oplock when we close instead of ack\n"); tctx 1106 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1107 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1116 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 1117 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1135 source4/torture/raw/oplock.c static bool test_raw_oplock_batch8(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1167 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH8: open with batch oplock\n"); tctx 1174 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1175 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1180 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only shouldn't cause oplock break\n"); tctx 1186 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 1187 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1203 source4/torture/raw/oplock.c static bool test_raw_oplock_batch9(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1236 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH9: open with attributes only can create file\n"); tctx 1243 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1244 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1248 source4/torture/raw/oplock.c torture_comment(tctx, "Subsequent normal open should break oplock on attribute only open to level II\n"); tctx 1258 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 1259 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1268 source4/torture/raw/oplock.c torture_comment(tctx, "third oplocked open should grant level2 without break\n"); tctx 1277 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 1278 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1286 source4/torture/raw/oplock.c torture_comment(tctx, "write should trigger a break to none on both\n"); tctx 1309 source4/torture/raw/oplock.c static bool test_raw_oplock_batch10(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1341 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH10: Open with oplock after a non-oplock open should grant level2\n"); tctx 1348 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1349 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1365 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 1366 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1372 source4/torture/raw/oplock.c torture_comment(tctx, "write should trigger a break to none\n"); tctx 1382 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1399 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1417 source4/torture/raw/oplock.c static bool test_raw_oplock_batch11(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1451 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH11: Test if setpathinfo set EOF breaks oplocks.\n"); tctx 1464 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1465 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1478 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1492 source4/torture/raw/oplock.c static bool test_raw_oplock_batch12(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1526 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH12: Test if setpathinfo allocation size breaks oplocks.\n"); tctx 1539 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1540 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1553 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1567 source4/torture/raw/oplock.c static bool test_raw_oplock_batch13(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1600 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH13: open with batch oplock\n"); tctx 1611 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1612 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1618 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_OVERWRITE dispostion causes oplock break\n"); tctx 1628 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 1629 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1645 source4/torture/raw/oplock.c static bool test_raw_oplock_batch14(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1677 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH14: open with batch oplock\n"); tctx 1687 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1688 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1694 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_SUPERSEDE dispostion causes oplock break\n"); tctx 1704 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 1705 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1720 source4/torture/raw/oplock.c static bool test_raw_oplock_batch15(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1754 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH15: Test if qpathinfo all info breaks a batch oplock (should not).\n"); tctx 1768 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1769 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1779 source4/torture/raw/oplock.c status = smb_raw_pathinfo(cli2->tree, tctx, &qfi); tctx 1781 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1793 source4/torture/raw/oplock.c static bool test_raw_oplock_batch16(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1826 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH16: open with batch oplock\n"); tctx 1837 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1838 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1844 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_OVERWRITE_IF dispostion causes oplock break\n"); tctx 1854 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 1855 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1871 source4/torture/raw/oplock.c static bool test_raw_oplock_batch17(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1906 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH17: open a file with an batch oplock (share mode: none)\n"); tctx 1913 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1914 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1918 source4/torture/raw/oplock.c torture_comment(tctx, "rename should trigger a break\n"); tctx 1928 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 1942 source4/torture/raw/oplock.c static bool test_raw_oplock_batch18(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 1977 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH18: open a file with an batch oplock (share mode: none)\n"); tctx 1984 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 1985 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 1989 source4/torture/raw/oplock.c torture_comment(tctx, "ntrename should trigger a break\n"); tctx 1999 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 2013 source4/torture/raw/oplock.c static bool test_raw_oplock_batch19(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 2051 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH19: open a file with an batch oplock (share mode: none)\n"); tctx 2056 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 2057 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2061 source4/torture/raw/oplock.c torture_comment(tctx, "setpathinfo rename info should not trigger a break nor a violation\n"); tctx 2071 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2078 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi); tctx 2079 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2082 source4/torture/raw/oplock.c torture_comment(tctx, "setfileinfo rename info should not trigger a break nor a violation\n"); tctx 2091 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2098 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi); tctx 2099 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2116 source4/torture/raw/oplock.c bool test_trans2rename(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 2154 source4/torture/raw/oplock.c torture_comment(tctx, "open a file with an exclusive oplock (share mode: none)\n"); tctx 2158 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 2159 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2163 source4/torture/raw/oplock.c torture_comment(tctx, "setpathinfo rename info should not trigger a break nor a violation\n"); tctx 2173 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2180 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi); tctx 2181 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2184 source4/torture/raw/oplock.c torture_comment(tctx, "setfileinfo rename info should not trigger a break nor a violation\n"); tctx 2193 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2200 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi); tctx 2201 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2218 source4/torture/raw/oplock.c bool test_nttransrename(struct torture_context *tctx, struct smbcli_state *cli1) tctx 2254 source4/torture/raw/oplock.c torture_comment(tctx, "nttrans_rename: open a file with an exclusive oplock (share mode: none)\n"); tctx 2258 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 2259 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2263 source4/torture/raw/oplock.c torture_comment(tctx, "nttrans_rename: should not trigger a break nor a share mode violation\n"); tctx 2272 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2276 source4/torture/raw/oplock.c torture_comment(tctx, "nttrans_rename: the server should have done nothing\n"); tctx 2281 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi); tctx 2282 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2289 source4/torture/raw/oplock.c status = smb_raw_pathinfo(cli1->tree, tctx, &qpi); tctx 2290 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2297 source4/torture/raw/oplock.c status = smb_raw_pathinfo(cli1->tree, tctx, &qpi); tctx 2298 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND); tctx 2300 source4/torture/raw/oplock.c torture_comment(tctx, "nttrans_rename: after closing the file the file is still not renamed\n"); tctx 2302 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2308 source4/torture/raw/oplock.c status = smb_raw_pathinfo(cli1->tree, tctx, &qpi); tctx 2309 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2316 source4/torture/raw/oplock.c status = smb_raw_pathinfo(cli1->tree, tctx, &qpi); tctx 2317 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND); tctx 2319 source4/torture/raw/oplock.c torture_comment(tctx, "nttrans_rename: rename with an invalid handle gives NT_STATUS_INVALID_HANDLE\n"); tctx 2328 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_INVALID_HANDLE); tctx 2337 source4/torture/raw/oplock.c static bool test_raw_oplock_batch20(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 2375 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH20: open a file with an batch oplock (share mode: all)\n"); tctx 2383 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 2384 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2388 source4/torture/raw/oplock.c torture_comment(tctx, "setpathinfo rename info should not trigger a break nor a violation\n"); tctx 2398 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2405 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi); tctx 2406 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2409 source4/torture/raw/oplock.c torture_comment(tctx, "open a file with the new name an batch oplock (share mode: all)\n"); tctx 2418 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 2419 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2426 source4/torture/raw/oplock.c torture_comment(tctx, "setfileinfo rename info should not trigger a break nor a violation\n"); tctx 2435 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2444 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi); tctx 2445 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2452 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli2->tree, tctx, &qfi); tctx 2453 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2465 source4/torture/raw/oplock.c static bool test_raw_oplock_batch21(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 2503 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH21: open with batch oplock\n"); tctx 2508 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 2509 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2513 source4/torture/raw/oplock.c torture_comment(tctx, "writing should not generate a break\n"); tctx 2516 source4/torture/raw/oplock.c CHECK_STATUS(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_OK); tctx 2521 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2534 source4/torture/raw/oplock.c static bool test_raw_oplock_batch22(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 2542 source4/torture/raw/oplock.c int timeout = torture_setting_int(tctx, "oplocktimeout", 30); tctx 2545 source4/torture/raw/oplock.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 2546 source4/torture/raw/oplock.c torture_skip(tctx, "BATCH22 disabled against samba3\n"); tctx 2576 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH22: open with batch oplock\n"); tctx 2584 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 2585 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2589 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open shoud not succeed after the oplock break timeout\n"); tctx 2592 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 2593 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION); tctx 2603 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open shoud succeed after the oplock release without break\n"); tctx 2606 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 2607 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2626 source4/torture/raw/oplock.c static bool test_raw_oplock_batch23(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 2644 source4/torture/raw/oplock.c ret = open_connection_no_level2_oplocks(tctx, &cli3); tctx 2662 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH23: a open and ask for a batch oplock\n"); tctx 2673 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 2674 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2680 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open without level2 oplock support should generate a break to level2\n"); tctx 2681 source4/torture/raw/oplock.c status = smb_raw_open(cli3->tree, tctx, &io); tctx 2682 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2693 source4/torture/raw/oplock.c torture_comment(tctx, "a 3rd open with level2 oplock support should not generate a break\n"); tctx 2694 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 2695 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2713 source4/torture/raw/oplock.c static bool test_raw_oplock_batch24(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2) tctx 2731 source4/torture/raw/oplock.c ret = open_connection_no_level2_oplocks(tctx, &cli3); tctx 2749 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH24: a open without level support and ask for a batch oplock\n"); tctx 2760 source4/torture/raw/oplock.c status = smb_raw_open(cli3->tree, tctx, &io); tctx 2761 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2767 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open with level2 oplock support should generate a break to none\n"); tctx 2768 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io); tctx 2769 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2789 source4/torture/raw/oplock.c static bool test_raw_oplock_batch25(struct torture_context *tctx, tctx 2824 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH25: open a file with an batch oplock " tctx 2831 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io); tctx 2832 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 2836 source4/torture/raw/oplock.c torture_comment(tctx, "setpathinfo attribute info should not trigger " tctx 2846 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK); tctx 85 source4/torture/raw/read.c static bool test_read(struct torture_context *tctx, struct smbcli_state *cli) tctx 97 source4/torture/raw/read.c buf = talloc_zero_array(tctx, uint8_t, maxsize); tctx 211 source4/torture/raw/read.c static bool test_lockread(struct torture_context *tctx, tctx 224 source4/torture/raw/read.c buf = talloc_zero_array(tctx, uint8_t, maxsize); tctx 357 source4/torture/raw/read.c static bool test_readx(struct torture_context *tctx, struct smbcli_state *cli) tctx 369 source4/torture/raw/read.c buf = talloc_zero_array(tctx, uint8_t, maxsize); tctx 502 source4/torture/raw/read.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 546 source4/torture/raw/read.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 556 source4/torture/raw/read.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 612 source4/torture/raw/read.c static bool test_readbraw(struct torture_context *tctx, tctx 625 source4/torture/raw/read.c buf = talloc_zero_array(tctx, uint8_t, maxsize); tctx 785 source4/torture/raw/read.c static bool test_read_for_execute(struct torture_context *tctx, tctx 799 source4/torture/raw/read.c buf = talloc_zero_array(tctx, uint8_t, maxsize); tctx 819 source4/torture/raw/read.c status = smb_raw_open(cli->tree, tctx, &op); tctx 850 source4/torture/raw/read.c status = smb_raw_open(cli->tree, tctx, &op); tctx 897 source4/torture/raw/read.c status = smb_raw_open(cli->tree, tctx, &op); tctx 46 source4/torture/raw/rename.c static bool test_mv(struct torture_context *tctx, tctx 82 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &op); tctx 102 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &op); tctx 123 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); tctx 191 source4/torture/raw/rename.c static bool test_osxrename(struct torture_context *tctx, tctx 223 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &op); tctx 242 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); tctx 263 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); tctx 277 source4/torture/raw/rename.c static bool test_ntrename(struct torture_context *tctx, tctx 296 source4/torture/raw/rename.c fnum = create_complex_file(cli, tctx, fname1); tctx 356 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); tctx 362 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); tctx 372 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); tctx 387 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); tctx 394 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); tctx 403 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); tctx 409 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); tctx 419 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); tctx 522 source4/torture/raw/rename.c static bool test_dir_rename(struct torture_context *tctx, struct smbcli_state *cli) tctx 556 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &io); tctx 580 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &io); tctx 611 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &io); tctx 632 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &io); tctx 654 source4/torture/raw/rename.c extern bool test_trans2rename(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2); tctx 655 source4/torture/raw/rename.c extern bool test_nttransrename(struct torture_context *tctx, struct smbcli_state *cli1); tctx 277 source4/torture/raw/samba3hide.c bool torture_samba3_closeerr(struct torture_context *tctx) tctx 286 source4/torture/raw/samba3hide.c if (!torture_open_connection(&cli, tctx, 0)) { tctx 293 source4/torture/raw/samba3hide.c tctx, smbcli_mkdir(cli->tree, dname), tctx 294 source4/torture/raw/samba3hide.c talloc_asprintf(tctx, "smbcli_mdir failed: (%s)\n", tctx 299 source4/torture/raw/samba3hide.c torture_assert(tctx, fnum != -1, tctx 300 source4/torture/raw/samba3hide.c talloc_asprintf(tctx, "smbcli_open failed: %s\n", tctx 310 source4/torture/raw/samba3hide.c torture_assert(tctx, fnum != -1, tctx 311 source4/torture/raw/samba3hide.c talloc_asprintf(tctx, "smbcli_open failed: %s\n", tctx 316 source4/torture/raw/samba3hide.c torture_assert_ntstatus_ok(tctx, status, tctx 321 source4/torture/raw/samba3hide.c torture_assert_ntstatus_ok(tctx, status, tctx 329 source4/torture/raw/samba3hide.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_ACCESS_DENIED, tctx 680 source4/torture/raw/samba3misc.c bool torture_samba3_posixtimedlock(struct torture_context *tctx) tctx 699 source4/torture/raw/samba3misc.c if (!torture_open_connection(&cli, tctx, 0)) { tctx 708 source4/torture/raw/samba3misc.c torture_warning(tctx, "smbcli_mkdir failed: %s\n", tctx 714 source4/torture/raw/samba3misc.c if (!(fpath = talloc_asprintf(tctx, "%s\\%s", dirname, fname))) { tctx 715 source4/torture/raw/samba3misc.c torture_warning(tctx, "talloc failed\n"); tctx 721 source4/torture/raw/samba3misc.c torture_warning(tctx, "Could not create file %s: %s\n", fpath, tctx 727 source4/torture/raw/samba3misc.c if (!(localdir = torture_setting_string(tctx, "localdir", NULL))) { tctx 728 source4/torture/raw/samba3misc.c torture_warning(tctx, "Need 'localdir' setting\n"); tctx 733 source4/torture/raw/samba3misc.c if (!(localname = talloc_asprintf(tctx, "%s/%s/%s", localdir, dirname, tctx 735 source4/torture/raw/samba3misc.c torture_warning(tctx, "talloc failed\n"); tctx 746 source4/torture/raw/samba3misc.c torture_warning(tctx, "open(%s) failed: %s\n", tctx 757 source4/torture/raw/samba3misc.c torture_warning(tctx, "fcntl failed: %s\n", strerror(errno)); tctx 797 source4/torture/raw/samba3misc.c torture_warning(tctx, "smb_raw_lock_send failed\n"); tctx 825 source4/torture/raw/samba3misc.c bool torture_samba3_rootdirfid(struct torture_context *tctx) tctx 834 source4/torture/raw/samba3misc.c if (!torture_open_connection(&cli, tctx, 0)) { tctx 856 source4/torture/raw/samba3misc.c status = smb_raw_open(cli->tree, tctx, &io); tctx 878 source4/torture/raw/samba3misc.c status = smb_raw_open(cli->tree, tctx, &io); tctx 895 source4/torture/raw/samba3misc.c bool torture_samba3_oplock_logoff(struct torture_context *tctx) tctx 906 source4/torture/raw/samba3misc.c if (!torture_open_connection(&cli, tctx, 0)) { tctx 926 source4/torture/raw/samba3misc.c status = smb_raw_open(cli->tree, tctx, &io); tctx 47 source4/torture/raw/search.c TALLOC_CTX *tctx, tctx 83 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx, tctx 235 source4/torture/raw/search.c static bool test_one_file(struct torture_context *tctx, tctx 247 source4/torture/raw/search.c fnum = create_complex_file(cli, tctx, fname); tctx 259 source4/torture/raw/search.c torture_comment(tctx, "testing %s\n", levels[i].name); tctx 261 source4/torture/raw/search.c levels[i].status = torture_single_search(cli, tctx, fname, tctx 282 source4/torture/raw/search.c status = torture_single_search(cli, tctx, fname2, tctx 306 source4/torture/raw/search.c status = smb_raw_pathinfo(cli->tree, tctx, &all_info); tctx 307 source4/torture/raw/search.c torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_ALL_INFO failed"); tctx 311 source4/torture/raw/search.c status = smb_raw_pathinfo(cli->tree, tctx, &alt_info); tctx 312 source4/torture/raw/search.c torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_ALT_NAME_INFO failed"); tctx 316 source4/torture/raw/search.c status = smb_raw_pathinfo(cli->tree, tctx, &internal_info); tctx 317 source4/torture/raw/search.c torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_INTERNAL_INFORMATION failed"); tctx 321 source4/torture/raw/search.c status = smb_raw_pathinfo(cli->tree, tctx, &name_info); tctx 322 source4/torture/raw/search.c torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_NAME_INFO failed"); tctx 342 source4/torture/raw/search.c #sname1, #field1, timestring(tctx, s->sname1.field1), \ tctx 343 source4/torture/raw/search.c #sname2, #field2, nt_time_string(tctx, v.sname2.out.field2)); \ tctx 354 source4/torture/raw/search.c #sname1, #field1, nt_time_string(tctx, s->sname1.field1), \ tctx 355 source4/torture/raw/search.c #sname2, #field2, nt_time_string(tctx, v.sname2.out.field2)); \ tctx 505 source4/torture/raw/search.c TALLOC_CTX *tctx; tctx 519 source4/torture/raw/search.c data->list = talloc_realloc(data->tctx, tctx 535 source4/torture/raw/search.c TALLOC_CTX *tctx, tctx 567 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx, tctx 608 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx, tctx 626 source4/torture/raw/search.c #define CHECK_STATUS(status, correct) torture_assert_ntstatus_equal(tctx, status, correct, "incorrect status") tctx 628 source4/torture/raw/search.c #define CHECK_VALUE(v, correct) torture_assert_int_equal(tctx, (v), (correct), "incorrect value"); tctx 630 source4/torture/raw/search.c #define CHECK_STRING(v, correct) torture_assert_casestr_equal(tctx, v, correct, "incorrect value"); tctx 656 source4/torture/raw/search.c static bool test_many_files(struct torture_context *tctx, tctx 699 source4/torture/raw/search.c torture_comment(tctx, "Testing with %d files\n", num_files); tctx 704 source4/torture/raw/search.c torture_assert(tctx, fnum != -1, "Failed to create"); tctx 715 source4/torture/raw/search.c torture_setting_bool(tctx, "samba3", false)) { tctx 716 source4/torture/raw/search.c torture_comment(tctx, tctx 722 source4/torture/raw/search.c result.tctx = talloc_new(tctx); tctx 724 source4/torture/raw/search.c torture_comment(tctx, tctx 727 source4/torture/raw/search.c status = multiple_search(cli, tctx, BASEDIR "\\*.*", tctx 732 source4/torture/raw/search.c torture_assert_ntstatus_ok(tctx, status, "search failed"); tctx 750 source4/torture/raw/search.c torture_assert_str_equal(tctx, fname, s, "Incorrect name"); tctx 753 source4/torture/raw/search.c talloc_free(result.tctx); tctx 798 source4/torture/raw/search.c static bool test_modify_search(struct torture_context *tctx, tctx 831 source4/torture/raw/search.c result.tctx = talloc_new(tctx); tctx 841 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx, tctx 855 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx, tctx 865 source4/torture/raw/search.c fnum = create_complex_file(cli, tctx, BASEDIR "\\T013-13.txt.3"); tctx 885 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx, tctx 905 source4/torture/raw/search.c attrib_string(tctx, result.list[i].both_directory_info.attrib), tctx 921 source4/torture/raw/search.c static bool test_sorted(struct torture_context *tctx, struct smbcli_state *cli) tctx 937 source4/torture/raw/search.c fname = talloc_asprintf(cli, BASEDIR "\\%s.txt", generate_random_str_list(tctx, 10, "abcdefgh")); tctx 950 source4/torture/raw/search.c result.tctx = tctx; tctx 952 source4/torture/raw/search.c status = multiple_search(cli, tctx, BASEDIR "\\*.*", tctx 984 source4/torture/raw/search.c static bool test_many_dirs(struct torture_context *tctx, tctx 1026 source4/torture/raw/search.c file = talloc_zero_array(tctx, union smb_search_data, num_dirs); tctx 1027 source4/torture/raw/search.c file2 = talloc_zero_array(tctx, union smb_search_data, num_dirs); tctx 1028 source4/torture/raw/search.c file3 = talloc_zero_array(tctx, union smb_search_data, num_dirs); tctx 1038 source4/torture/raw/search.c io.search_first.in.pattern = talloc_asprintf(tctx, BASEDIR "\\d%d\\*.txt", i); tctx 1039 source4/torture/raw/search.c fname = talloc_asprintf(tctx, "f%d-", i); tctx 1043 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx, tctx 1072 source4/torture/raw/search.c fname = talloc_asprintf(tctx, "f%d-", i); tctx 1076 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx, tctx 1106 source4/torture/raw/search.c fname = talloc_asprintf(tctx, "f%d-", i); tctx 1109 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx, tctx 1148 source4/torture/raw/search.c static bool test_os2_delete(struct torture_context *tctx, tctx 1182 source4/torture/raw/search.c result.tctx = tctx; tctx 1192 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx, tctx 1214 source4/torture/raw/search.c result.tctx = tctx; tctx 1216 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx, tctx 1260 source4/torture/raw/search.c static bool test_ea_list(struct torture_context *tctx, tctx 1289 source4/torture/raw/search.c setfile.ea_set.in.eas = talloc_array(tctx, struct ea_struct, 2); tctx 1305 source4/torture/raw/search.c result.tctx = tctx; tctx 1315 source4/torture/raw/search.c io.t2ffirst.in.ea_names = talloc_array(tctx, struct ea_name, 2); tctx 1319 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx, tctx 1332 source4/torture/raw/search.c nxt.t2fnext.in.ea_names = talloc_array(tctx, struct ea_name, 2); tctx 1336 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx, tctx 209 source4/torture/raw/streams.c static bool test_stream_dir(struct torture_context *tctx, tctx 279 source4/torture/raw/streams.c static bool test_stream_io(struct torture_context *tctx, tctx 363 source4/torture/raw/streams.c if (!torture_setting_bool(tctx, "samba4", false)) { tctx 396 source4/torture/raw/streams.c if (!torture_setting_bool(tctx, "samba4", false)) { tctx 420 source4/torture/raw/streams.c static bool test_stream_sharemodes(struct torture_context *tctx, tctx 509 source4/torture/raw/streams.c static bool test_stream_delete(struct torture_context *tctx, tctx 650 source4/torture/raw/streams.c static bool test_stream_names(struct torture_context *tctx, tctx 777 source4/torture/raw/streams.c if (torture_setting_bool(tctx, "samba4", true)) { tctx 791 source4/torture/raw/streams.c char *path = talloc_asprintf(tctx, "%s%s", tctx 822 source4/torture/raw/streams.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 847 source4/torture/raw/streams.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 877 source4/torture/raw/streams.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 956 source4/torture/raw/streams.c static bool test_stream_names2(struct torture_context *tctx, tctx 985 source4/torture/raw/streams.c char *path = talloc_asprintf(tctx, "%s:Stream%c0x%02X:$DATA", tctx 1034 source4/torture/raw/streams.c status2 = smb_raw_fileinfo(cli->tree, tctx, &finfo1); \ tctx 1043 source4/torture/raw/streams.c static bool test_stream_rename(struct torture_context *tctx, tctx 1116 source4/torture/raw/streams.c static bool test_stream_rename2(struct torture_context *tctx, tctx 1285 source4/torture/raw/streams.c if (torture_setting_bool(tctx, "samba3", false) || tctx 1286 source4/torture/raw/streams.c torture_setting_bool(tctx, "samba4", false)) { tctx 1309 source4/torture/raw/streams.c static bool create_file_with_stream(struct torture_context *tctx, tctx 1343 source4/torture/raw/streams.c static bool test_stream_create_disposition(struct torture_context *tctx, tctx 1362 source4/torture/raw/streams.c if (!create_file_with_stream(tctx, cli, mem_ctx, fname, tctx 1410 source4/torture/raw/streams.c if (!create_file_with_stream(tctx, cli, mem_ctx, fname, tctx 1428 source4/torture/raw/streams.c if (!create_file_with_stream(tctx, cli, mem_ctx, fname, tctx 1447 source4/torture/raw/streams.c if (!create_file_with_stream(tctx, cli, mem_ctx, fname, tctx 1466 source4/torture/raw/streams.c if (!create_file_with_stream(tctx, cli, mem_ctx, fname, tctx 1496 source4/torture/raw/streams.c static bool test_stream_large_streaminfo(struct torture_context *tctx, tctx 1520 source4/torture/raw/streams.c ret = create_file_with_stream(tctx, cli, mem_ctx, fname, tctx 1539 source4/torture/raw/streams.c static bool test_stream_attributes(struct torture_context *tctx, tctx 1559 source4/torture/raw/streams.c ret = create_file_with_stream(tctx, cli, mem_ctx, fname, tctx 62 source4/torture/raw/tconrate.c static int fork_tcon_client(struct torture_context *tctx, tctx 73 source4/torture/raw/tconrate.c lp_smbcli_options(tctx->lp_ctx, &options); tctx 74 source4/torture/raw/tconrate.c lp_smbcli_session_options(tctx->lp_ctx, &session_options); tctx 101 source4/torture/raw/tconrate.c host, lp_smb_ports(tctx->lp_ctx), share, tctx 102 source4/torture/raw/tconrate.c NULL, lp_socket_options(tctx->lp_ctx), cmdline_credentials, tctx 103 source4/torture/raw/tconrate.c lp_resolve_context(tctx->lp_ctx), tctx 104 source4/torture/raw/tconrate.c tctx->ev, &options, &session_options, tctx 105 source4/torture/raw/tconrate.c lp_iconv_convenience(tctx->lp_ctx), tctx 106 source4/torture/raw/tconrate.c lp_gensec_settings(tctx, tctx->lp_ctx)); tctx 151 source4/torture/raw/tconrate.c bool torture_bench_treeconnect(struct torture_context *tctx) tctx 153 source4/torture/raw/tconrate.c const char *host = torture_setting_string(tctx, "host", NULL); tctx 154 source4/torture/raw/tconrate.c const char *share = torture_setting_string(tctx, "share", NULL); tctx 156 source4/torture/raw/tconrate.c int timelimit = torture_setting_int(tctx, "timelimit", tctx 158 source4/torture/raw/tconrate.c int nprocs = torture_setting_int(tctx, "nprocs", 4); tctx 166 source4/torture/raw/tconrate.c torture_assert(tctx, nprocs > 0, "bad proc count"); tctx 167 source4/torture/raw/tconrate.c torture_assert(tctx, timelimit > 0, "bad timelimit"); tctx 168 source4/torture/raw/tconrate.c torture_assert(tctx, curr_counts, "allocation failure"); tctx 169 source4/torture/raw/tconrate.c torture_assert(tctx, last_counts, "allocation failure"); tctx 173 source4/torture/raw/tconrate.c fork_tcon_client(tctx, &curr_counts[i], timelimit, host, share); tctx 41 source4/torture/raw/unlink.c static bool test_unlink(struct torture_context *tctx, struct smbcli_state *cli) tctx 132 source4/torture/raw/unlink.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 160 source4/torture/raw/unlink.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 172 source4/torture/raw/unlink.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 182 source4/torture/raw/unlink.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 203 source4/torture/raw/unlink.c static bool test_delete_on_close(struct torture_context *tctx, tctx 229 source4/torture/raw/unlink.c fnum = create_complex_file(cli, tctx, fname); tctx 243 source4/torture/raw/unlink.c fnum = create_complex_file(cli, tctx, fname); tctx 285 source4/torture/raw/unlink.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 295 source4/torture/raw/unlink.c fnum2 = create_complex_file(cli, tctx, inside); tctx 326 source4/torture/raw/unlink.c fnum2 = create_complex_file(cli, tctx, inside); tctx 342 source4/torture/raw/unlink.c status = smb_raw_open(cli->tree, tctx, &op); tctx 358 source4/torture/raw/unlink.c fnum2 = create_complex_file(cli, tctx, inside); tctx 374 source4/torture/raw/unlink.c status = smb_raw_open(cli->tree, tctx, &op); tctx 391 source4/torture/raw/unlink.c fnum = create_complex_file(cli, tctx, inside); tctx 409 source4/torture/raw/unlink.c status = smb_raw_open(cli->tree, tctx, &op); tctx 415 source4/torture/raw/unlink.c status = smb_raw_open(cli->tree, tctx, &op); tctx 55 source4/torture/raw/write.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \ tctx 60 source4/torture/raw/write.c dump_all_info(tctx, &finfo); \ tctx 99 source4/torture/raw/write.c static bool test_write(struct torture_context *tctx, tctx 112 source4/torture/raw/write.c buf = talloc_zero_array(tctx, uint8_t, maxsize); tctx 227 source4/torture/raw/write.c static bool test_writex(struct torture_context *tctx, tctx 241 source4/torture/raw/write.c if (!torture_setting_bool(tctx, "dangerous", false)) { tctx 243 source4/torture/raw/write.c torture_comment(tctx, "dangerous not set - limiting range of test to 2^%d\n", max_bits); tctx 246 source4/torture/raw/write.c buf = talloc_zero_array(tctx, uint8_t, maxsize); tctx 415 source4/torture/raw/write.c static bool test_writeunlock(struct torture_context *tctx, tctx 428 source4/torture/raw/write.c buf = talloc_zero_array(tctx, uint8_t, maxsize); tctx 558 source4/torture/raw/write.c static bool test_writeclose(struct torture_context *tctx, tctx 571 source4/torture/raw/write.c buf = talloc_zero_array(tctx, uint8_t, maxsize); tctx 26 source4/torture/rpc/atsvc.c static bool test_JobGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx, uint32_t job_id) tctx 30 source4/torture/rpc/atsvc.c struct atsvc_JobInfo *info = talloc(tctx, struct atsvc_JobInfo); tctx 39 source4/torture/rpc/atsvc.c status = dcerpc_atsvc_JobGetInfo(p, tctx, &r); tctx 41 source4/torture/rpc/atsvc.c torture_assert_ntstatus_ok(tctx, status, "JobGetInfo failed"); tctx 46 source4/torture/rpc/atsvc.c static bool test_JobDel(struct dcerpc_pipe *p, struct torture_context *tctx, uint32_t min_job_id, tctx 56 source4/torture/rpc/atsvc.c status = dcerpc_atsvc_JobDel(p, tctx, &r); tctx 58 source4/torture/rpc/atsvc.c torture_assert_ntstatus_ok(tctx, status, "JobDel failed"); tctx 63 source4/torture/rpc/atsvc.c static bool test_JobEnum(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 80 source4/torture/rpc/atsvc.c status = dcerpc_atsvc_JobEnum(p, tctx, &r); tctx 82 source4/torture/rpc/atsvc.c torture_assert_ntstatus_ok(tctx, status, "JobEnum failed"); tctx 85 source4/torture/rpc/atsvc.c if (!test_JobGetInfo(p, tctx, r.out.ctr->first_entry[i].job_id)) { tctx 93 source4/torture/rpc/atsvc.c static bool test_JobAdd(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 107 source4/torture/rpc/atsvc.c status = dcerpc_atsvc_JobAdd(p, tctx, &r); tctx 109 source4/torture/rpc/atsvc.c torture_assert_ntstatus_ok(tctx, status, "JobAdd failed"); tctx 113 source4/torture/rpc/atsvc.c if (!test_JobEnum(tctx, p)) { tctx 117 source4/torture/rpc/atsvc.c if (!test_JobGetInfo(p, tctx, *r.out.job_id)) { tctx 121 source4/torture/rpc/atsvc.c if (!test_JobDel(p, tctx, *r.out.job_id, *r.out.job_id)) { tctx 91 source4/torture/rpc/autoidl.c static void reopen(struct torture_context *tctx, tctx 99 source4/torture/rpc/autoidl.c status = torture_rpc_connection(tctx, p, iface); tctx 114 source4/torture/rpc/autoidl.c static void test_ptr_scan(struct torture_context *tctx, const struct ndr_interface_table *iface, tctx 117 source4/torture/rpc/autoidl.c static void try_expand(struct torture_context *tctx, const struct ndr_interface_table *iface, tctx 125 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface); tctx 134 source4/torture/rpc/autoidl.c status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out); tctx 140 source4/torture/rpc/autoidl.c test_ptr_scan(tctx, iface, opnum, &stub_in, tctx 147 source4/torture/rpc/autoidl.c printf("expand by %d gives fault %s\n", n, dcerpc_errstr(tctx, p->last_fault_code)); tctx 151 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface); tctx 159 source4/torture/rpc/autoidl.c static void test_ptr_scan(struct torture_context *tctx, const struct ndr_interface_table *iface, tctx 167 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface); tctx 175 source4/torture/rpc/autoidl.c status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out); tctx 180 source4/torture/rpc/autoidl.c ofs-min_ofs, dcerpc_errstr(tctx, p->last_fault_code)); tctx 182 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface); tctx 185 source4/torture/rpc/autoidl.c try_expand(tctx, iface, opnum, &stub_in, ofs+4, depth+1); tctx 187 source4/torture/rpc/autoidl.c try_expand(tctx, iface, opnum, &stub_in, max_ofs, depth+1); tctx 199 source4/torture/rpc/autoidl.c static void test_scan_call(struct torture_context *tctx, const struct ndr_interface_table *iface, int opnum) tctx 207 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface); tctx 209 source4/torture/rpc/autoidl.c get_policy_handle(p, tctx, &handle); tctx 217 source4/torture/rpc/autoidl.c status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out); tctx 224 source4/torture/rpc/autoidl.c test_ptr_scan(tctx, iface, opnum, &stub_in, 0, stub_in.length, 0); tctx 228 source4/torture/rpc/autoidl.c fill_blob_handle(&stub_in, tctx, &handle); tctx 230 source4/torture/rpc/autoidl.c status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out); tctx 237 source4/torture/rpc/autoidl.c test_ptr_scan(tctx, iface, opnum, &stub_in, 0, stub_in.length, 0); tctx 242 source4/torture/rpc/autoidl.c printf("opnum %d size %d fault %s\n", opnum, i, dcerpc_errstr(tctx, p->last_fault_code)); tctx 244 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface); tctx 257 source4/torture/rpc/autoidl.c static void test_auto_scan(struct torture_context *tctx, const struct ndr_interface_table *iface) tctx 259 source4/torture/rpc/autoidl.c test_scan_call(tctx, iface, 2); tctx 101 source4/torture/rpc/bench.c static bool bench_NetShareEnumAll(struct torture_context *tctx, struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) tctx 105 source4/torture/rpc/bench.c int timelimit = torture_setting_int(tctx, "timelimit", 10); tctx 115 source4/torture/rpc/bench.c if (torture_setting_bool(tctx, "progress", true)) { tctx 27 source4/torture/rpc/browser.c bool test_BrowserrQueryOtherDomains(struct torture_context *tctx, tctx 39 source4/torture/rpc/browser.c torture_comment(tctx, "dcerpc_BrowserrQueryOtherDomains\n"); tctx 49 source4/torture/rpc/browser.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 57 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r); tctx 58 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed"); tctx 59 source4/torture/rpc/browser.c torture_assert_werr_ok(tctx, r.out.result, "BrowserrQueryOtherDomains failed"); tctx 60 source4/torture/rpc/browser.c torture_assert_int_equal(tctx, *r.out.total_entries, 0, "BrowserrQueryOtherDomains"); tctx 66 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r); tctx 67 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed"); tctx 68 source4/torture/rpc/browser.c torture_assert_werr_ok(tctx, r.out.result, "BrowserrQueryOtherDomains failed"); tctx 69 source4/torture/rpc/browser.c torture_assert_int_equal(tctx, *r.out.total_entries, 0, "BrowserrQueryOtherDomains"); tctx 72 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r); tctx 73 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed"); tctx 74 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_INVALID_PARAM, r.out.result, tctx 80 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r); tctx 81 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed"); tctx 82 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result, tctx 89 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r); tctx 90 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed"); tctx 91 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result, tctx 95 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r); tctx 96 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed"); tctx 97 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result, tctx 101 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r); tctx 102 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed"); tctx 103 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result, tctx 107 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r); tctx 108 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed"); tctx 109 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result, tctx 33 source4/torture/rpc/countcalls.c bool count_calls(struct torture_context *tctx, tctx 41 source4/torture/rpc/countcalls.c NTSTATUS status = torture_rpc_connection(tctx, &p, iface); tctx 47 source4/torture/rpc/dfs.c struct torture_context *tctx, tctx 59 source4/torture/rpc/dfs.c if (!(libnetctx = libnet_context_init(tctx->ev, tctx->lp_ctx))) { tctx 89 source4/torture/rpc/dfs.c struct torture_context *tctx, tctx 99 source4/torture/rpc/dfs.c if (!(libnetctx = libnet_context_init(tctx->ev, tctx->lp_ctx))) { tctx 120 source4/torture/rpc/dfs.c struct torture_context *tctx, tctx 127 source4/torture/rpc/dfs.c if (!torture_open_connection_share(mem_ctx, cli, tctx, host, share, tctx->ev)) { tctx 486 source4/torture/rpc/dfs.c struct torture_context *tctx, tctx 496 source4/torture/rpc/dfs.c test_NetShareDel(mem_ctx, tctx, host, sharename); tctx 497 source4/torture/rpc/dfs.c torture_open_connection_share(mem_ctx, &cli, tctx, host, "C$", tctx->ev); tctx 504 source4/torture/rpc/dfs.c struct torture_context *tctx, tctx 515 source4/torture/rpc/dfs.c test_cleanup_stdroot(p, mem_ctx, tctx, host, sharename, dir); tctx 517 source4/torture/rpc/dfs.c ret &= test_CreateDir(mem_ctx, &cli, tctx, host, "C$", dir); tctx 518 source4/torture/rpc/dfs.c ret &= test_NetShareAdd(mem_ctx, tctx, host, sharename, path); tctx 522 source4/torture/rpc/dfs.c ret &= test_NetShareDel(mem_ctx, tctx, host, sharename); tctx 32 source4/torture/rpc/drsuapi.c bool test_DsBind(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 44 source4/torture/rpc/drsuapi.c torture_comment(tctx, "testing DsBind\n"); tctx 46 source4/torture/rpc/drsuapi.c status = dcerpc_drsuapi_DsBind(p, tctx, &r); tctx 50 source4/torture/rpc/drsuapi.c errstr = dcerpc_errstr(tctx, p->last_fault_code); tctx 52 source4/torture/rpc/drsuapi.c torture_fail(tctx, "dcerpc_drsuapi_DsBind failed"); tctx 54 source4/torture/rpc/drsuapi.c torture_fail(tctx, "DsBind failed"); tctx 252 source4/torture/rpc/drsuapi.c static bool test_DsReplicaGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 330 source4/torture/rpc/drsuapi.c if (torture_setting_bool(tctx, "samba4", false)) { tctx 367 source4/torture/rpc/drsuapi.c status = dcerpc_drsuapi_DsReplicaGetInfo(p, tctx, &r); tctx 371 source4/torture/rpc/drsuapi.c errstr = dcerpc_errstr(tctx, p->last_fault_code); tctx 389 source4/torture/rpc/drsuapi.c static bool test_DsReplicaSync(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 407 source4/torture/rpc/drsuapi.c if (!torture_setting_bool(tctx, "dangerous", false)) { tctx 412 source4/torture/rpc/drsuapi.c if (torture_setting_bool(tctx, "samba4", false)) { tctx 440 source4/torture/rpc/drsuapi.c status = dcerpc_drsuapi_DsReplicaSync(p, tctx, &r); tctx 444 source4/torture/rpc/drsuapi.c errstr = dcerpc_errstr(tctx, p->last_fault_code); tctx 457 source4/torture/rpc/drsuapi.c static bool test_DsReplicaUpdateRefs(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 475 source4/torture/rpc/drsuapi.c if (torture_setting_bool(tctx, "samba4", false)) { tctx 497 source4/torture/rpc/drsuapi.c r.in.req.req1.dest_dsa_dns_name = talloc_asprintf(tctx, "__some_dest_dsa_guid_string._msdn.%s", tctx 504 source4/torture/rpc/drsuapi.c status = dcerpc_drsuapi_DsReplicaUpdateRefs(p, tctx, &r); tctx 508 source4/torture/rpc/drsuapi.c errstr = dcerpc_errstr(tctx, p->last_fault_code); tctx 521 source4/torture/rpc/drsuapi.c static bool test_DsGetNCChanges(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 545 source4/torture/rpc/drsuapi.c if (torture_setting_bool(tctx, "samba4", false)) { tctx 577 source4/torture/rpc/drsuapi.c if (lp_parm_bool(tctx->lp_ctx, NULL, "drsuapi","compression", false)) { tctx 600 source4/torture/rpc/drsuapi.c if (lp_parm_bool(tctx->lp_ctx, NULL, "drsuapi", "compression", false)) { tctx 603 source4/torture/rpc/drsuapi.c if (lp_parm_bool(tctx->lp_ctx, NULL, "drsuapi", "neighbour_writeable", true)) { tctx 623 source4/torture/rpc/drsuapi.c status = dcerpc_drsuapi_DsGetNCChanges(p, tctx, &r); tctx 627 source4/torture/rpc/drsuapi.c errstr = dcerpc_errstr(tctx, p->last_fault_code); tctx 215 source4/torture/rpc/drsuapi_cracknames.c bool test_DsCrackNames(struct torture_context *tctx, tctx 343 source4/torture/rpc/drsuapi_cracknames.c ldb = ldb_init(mem_ctx, tctx->ev); tctx 608 source4/torture/rpc/drsuapi_cracknames.c .skip = torture_setting_bool(tctx, "samba4", false) tctx 28 source4/torture/rpc/dssetup.c bool test_DsRoleGetPrimaryDomainInformation_ext(struct torture_context *tctx, tctx 38 source4/torture/rpc/dssetup.c torture_comment(tctx, "dcerpc_dssetup_DsRoleGetPrimaryDomainInformation level %d\n", i); tctx 40 source4/torture/rpc/dssetup.c status = dcerpc_dssetup_DsRoleGetPrimaryDomainInformation(p, tctx, &r); tctx 41 source4/torture/rpc/dssetup.c torture_assert_ntstatus_equal(tctx, ext_status, status, "DsRoleGetPrimaryDomainInformation failed"); tctx 43 source4/torture/rpc/dssetup.c torture_assert_werr_ok(tctx, r.out.result, "DsRoleGetPrimaryDomainInformation failed"); tctx 50 source4/torture/rpc/dssetup.c bool test_DsRoleGetPrimaryDomainInformation(struct torture_context *tctx, tctx 53 source4/torture/rpc/dssetup.c return test_DsRoleGetPrimaryDomainInformation_ext(tctx, p, NT_STATUS_OK); tctx 83 source4/torture/rpc/dssync.c static struct DsSyncTest *test_create_context(struct torture_context *tctx) tctx 89 source4/torture/rpc/dssync.c const char *binding = torture_setting_string(tctx, "binding", NULL); tctx 90 source4/torture/rpc/dssync.c ctx = talloc_zero(tctx, struct DsSyncTest); tctx 154 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "xpress", false)) { tctx 178 source4/torture/rpc/dssync.c static bool _test_DsBind(struct torture_context *tctx, tctx 187 source4/torture/rpc/dssync.c credentials, tctx->ev, tctx->lp_ctx); tctx 240 source4/torture/rpc/dssync.c static bool test_LDAPBind(struct torture_context *tctx, struct DsSyncTest *ctx, tctx 246 source4/torture/rpc/dssync.c status = torture_ldap_connection(tctx, &l->conn, ctx->ldap_url); tctx 254 source4/torture/rpc/dssync.c status = torture_ldap_bind_sasl(l->conn, credentials, tctx->lp_ctx); tctx 264 source4/torture/rpc/dssync.c static bool test_GetInfo(struct torture_context *tctx, struct DsSyncTest *ctx) tctx 276 source4/torture/rpc/dssync.c cldap = cldap_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx)); tctx 288 source4/torture/rpc/dssync.c names[0].str = talloc_asprintf(ctx, "%s\\", lp_workgroup(tctx->lp_ctx)); tctx 310 source4/torture/rpc/dssync.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx); tctx 326 source4/torture/rpc/dssync.c struct ldb_context *ldb = ldb_init(ctx, tctx->ev); tctx 449 source4/torture/rpc/dssync.c static void test_analyse_objects(struct torture_context *tctx, tctx 457 source4/torture/rpc/dssync.c if (!lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "print_pwd_blobs", false)) { tctx 461 source4/torture/rpc/dssync.c save_values_dir = lp_parm_string(tctx->lp_ctx, NULL, "dssync", "save_pwd_blobs_dir"); tctx 578 source4/torture/rpc/dssync.c lp_iconv_convenience(tctx->lp_ctx), ptr, tctx 594 source4/torture/rpc/dssync.c static bool test_FetchData(struct torture_context *tctx, struct DsSyncTest *ctx) tctx 624 source4/torture/rpc/dssync.c partition = lp_parm_string(tctx->lp_ctx, NULL, "dssync", "partition"); tctx 630 source4/torture/rpc/dssync.c highest_usn = lp_parm_int(tctx->lp_ctx, NULL, "dssync", "highest_usn", 0); tctx 632 source4/torture/rpc/dssync.c array[0].level = lp_parm_int(tctx->lp_ctx, NULL, "dssync", "get_nc_changes_level", array[0].level); tctx 634 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "print_pwd_blobs", false)) { tctx 670 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "compression", false)) { tctx 673 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "neighbour_writeable", true)) { tctx 702 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "compression", false)) { tctx 705 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "neighbour_writeable", true)) { tctx 775 source4/torture/rpc/dssync.c test_analyse_objects(tctx, ctx, &gensec_skey, ctr1->first_object); tctx 805 source4/torture/rpc/dssync.c test_analyse_objects(tctx, ctx, &gensec_skey, ctr6->first_object); tctx 820 source4/torture/rpc/dssync.c static bool test_FetchNT4Data(struct torture_context *tctx, tctx 843 source4/torture/rpc/dssync.c req.req1.unknown1 = lp_parm_int(tctx->lp_ctx, NULL, "dssync", "nt4-1", 3); tctx 844 source4/torture/rpc/dssync.c req.req1.unknown2 = lp_parm_int(tctx->lp_ctx, NULL, "dssync", "nt4-2", 0x00004000); tctx 33 source4/torture/rpc/echo.c #define TEST_ADDONE(tctx, value) do { \ tctx 37 source4/torture/rpc/echo.c status = dcerpc_echo_AddOne(p, tctx, &r); \ tctx 38 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "AddOne(%d) failed", i)); \ tctx 39 source4/torture/rpc/echo.c torture_assert (tctx, n == i+1, talloc_asprintf(tctx, "%d + 1 != %u (should be %u)\n", i, n, i+1)); \ tctx 40 source4/torture/rpc/echo.c torture_comment (tctx, "%d + 1 = %u\n", i, n); \ tctx 43 source4/torture/rpc/echo.c static bool test_addone(struct torture_context *tctx, tctx 52 source4/torture/rpc/echo.c TEST_ADDONE(tctx, i); tctx 55 source4/torture/rpc/echo.c TEST_ADDONE(tctx, 0x7FFFFFFE); tctx 56 source4/torture/rpc/echo.c TEST_ADDONE(tctx, 0xFFFFFFFE); tctx 57 source4/torture/rpc/echo.c TEST_ADDONE(tctx, 0xFFFFFFFF); tctx 58 source4/torture/rpc/echo.c TEST_ADDONE(tctx, random() & 0xFFFFFFFF); tctx 65 source4/torture/rpc/echo.c static bool test_echodata(struct torture_context *tctx, tctx 74 source4/torture/rpc/echo.c if (torture_setting_bool(tctx, "quick", false) && tctx 81 source4/torture/rpc/echo.c data_in = talloc_array(tctx, uint8_t, len); tctx 82 source4/torture/rpc/echo.c data_out = talloc_array(tctx, uint8_t, len); tctx 90 source4/torture/rpc/echo.c status = dcerpc_echo_EchoData(p, tctx, &r); tctx 91 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, tctx 98 source4/torture/rpc/echo.c torture_comment(tctx, "Bad data returned for len %d at offset %d\n", tctx 100 source4/torture/rpc/echo.c torture_comment(tctx, "in:\n"); tctx 102 source4/torture/rpc/echo.c torture_comment(tctx, "out:\n"); tctx 113 source4/torture/rpc/echo.c static bool test_sourcedata(struct torture_context *tctx, tctx 121 source4/torture/rpc/echo.c if (torture_setting_bool(tctx, "quick", false) && tctx 130 source4/torture/rpc/echo.c status = dcerpc_echo_SourceData(p, tctx, &r); tctx 131 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, tctx 136 source4/torture/rpc/echo.c torture_assert(tctx, v[i] == (i & 0xFF), tctx 137 source4/torture/rpc/echo.c talloc_asprintf(tctx, tctx 146 source4/torture/rpc/echo.c static bool test_sinkdata(struct torture_context *tctx, tctx 155 source4/torture/rpc/echo.c if (torture_setting_bool(tctx, "quick", false) && tctx 162 source4/torture/rpc/echo.c data_in = talloc_array(tctx, uint8_t, len); tctx 170 source4/torture/rpc/echo.c status = dcerpc_echo_SinkData(p, tctx, &r); tctx 171 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, tctx 175 source4/torture/rpc/echo.c torture_comment(tctx, "sunk %d bytes\n", len); tctx 183 source4/torture/rpc/echo.c static bool test_testcall(struct torture_context *tctx, tctx 193 source4/torture/rpc/echo.c status = dcerpc_echo_TestCall(p, tctx, &r); tctx 194 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, "TestCall failed"); tctx 196 source4/torture/rpc/echo.c torture_assert_str_equal(tctx, s, "input string", "Didn't receive back same string"); tctx 204 source4/torture/rpc/echo.c static bool test_testcall2(struct torture_context *tctx, tctx 213 source4/torture/rpc/echo.c r.out.info = talloc(tctx, union echo_Info); tctx 215 source4/torture/rpc/echo.c torture_comment(tctx, "Testing TestCall2 level %d\n", i); tctx 216 source4/torture/rpc/echo.c status = dcerpc_echo_TestCall2(p, tctx, &r); tctx 217 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, "TestCall2 failed"); tctx 225 source4/torture/rpc/echo.c static bool test_sleep(struct torture_context *tctx, tctx 240 source4/torture/rpc/echo.c if (torture_setting_bool(tctx, "quick", false)) { tctx 241 source4/torture/rpc/echo.c torture_skip(tctx, "TestSleep disabled - use \"torture:quick=no\" to enable\n"); tctx 243 source4/torture/rpc/echo.c torture_comment(tctx, "Testing TestSleep - use \"torture:quick=yes\" to disable\n"); tctx 250 source4/torture/rpc/echo.c req[i] = dcerpc_echo_TestSleep_send(p, tctx, &r[i]); tctx 251 source4/torture/rpc/echo.c torture_assert(tctx, req[i], "Failed to send async sleep request\n"); tctx 256 source4/torture/rpc/echo.c torture_assert(tctx, event_loop_once(ctx) == 0, tctx 267 source4/torture/rpc/echo.c torture_comment(tctx, "rounded_tdiff=%d\n", rounded_tdiff); tctx 268 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, tctx 269 source4/torture/rpc/echo.c talloc_asprintf(tctx, "TestSleep(%d) failed", i)); tctx 270 source4/torture/rpc/echo.c torture_assert(tctx, r[i].out.result == r[i].in.seconds, tctx 271 source4/torture/rpc/echo.c talloc_asprintf(tctx, "Failed - Asked to sleep for %u seconds (server replied with %u seconds and the reply takes only %u seconds)", tctx 273 source4/torture/rpc/echo.c torture_assert(tctx, r[i].out.result <= rounded_tdiff, tctx 274 source4/torture/rpc/echo.c talloc_asprintf(tctx, "Failed - Slept for %u seconds (but reply takes only %u.%06u seconds)", tctx 277 source4/torture/rpc/echo.c torture_comment(tctx, "Slept for %u seconds (but reply takes %u.%06u seconds - busy server?)\n", tctx 280 source4/torture/rpc/echo.c torture_comment(tctx, "Slept for %u seconds (reply takes %u.%06u seconds - ok)\n", tctx 283 source4/torture/rpc/echo.c torture_comment(tctx, "(Failed) - Not async - Slept for %u seconds (but reply takes %u.%06u seconds)", tctx 290 source4/torture/rpc/echo.c torture_comment(tctx, "\n"); tctx 297 source4/torture/rpc/echo.c static bool test_enum(struct torture_context *tctx, tctx 317 source4/torture/rpc/echo.c status = dcerpc_echo_TestEnum(p, tctx, &r); tctx 318 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, "TestEnum failed"); tctx 325 source4/torture/rpc/echo.c static bool test_surrounding(struct torture_context *tctx, tctx 332 source4/torture/rpc/echo.c r.in.data = talloc(tctx, struct echo_Surrounding); tctx 335 source4/torture/rpc/echo.c r.in.data->surrounding = talloc_zero_array(tctx, uint16_t, r.in.data->x); tctx 337 source4/torture/rpc/echo.c r.out.data = talloc(tctx, struct echo_Surrounding); tctx 339 source4/torture/rpc/echo.c status = dcerpc_echo_TestSurrounding(p, tctx, &r); tctx 340 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, "TestSurrounding failed"); tctx 342 source4/torture/rpc/echo.c torture_assert(tctx, r.out.data->x == 2 * r.in.data->x, tctx 351 source4/torture/rpc/echo.c static bool test_doublepointer(struct torture_context *tctx, tctx 363 source4/torture/rpc/echo.c status = dcerpc_echo_TestDoublePointer(p, tctx, &r); tctx 364 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, "TestDoublePointer failed"); tctx 366 source4/torture/rpc/echo.c torture_assert_int_equal(tctx, value, r.out.result, tctx 375 source4/torture/rpc/echo.c static bool test_timeout(struct torture_context *tctx, tctx 383 source4/torture/rpc/echo.c if (torture_setting_bool(tctx, "quick", false)) { tctx 384 source4/torture/rpc/echo.c torture_skip(tctx, "timeout testing disabled - use \"torture:quick=no\" to enable\n"); tctx 387 source4/torture/rpc/echo.c torture_comment(tctx, "testing request timeouts\n"); tctx 391 source4/torture/rpc/echo.c req = dcerpc_echo_TestSleep_send(p, tctx, &r); tctx 393 source4/torture/rpc/echo.c torture_comment(tctx, "Failed to send async sleep request\n"); tctx 399 source4/torture/rpc/echo.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_IO_TIMEOUT, tctx 402 source4/torture/rpc/echo.c torture_comment(tctx, "testing request destruction\n"); tctx 403 source4/torture/rpc/echo.c req = dcerpc_echo_TestSleep_send(p, tctx, &r); tctx 405 source4/torture/rpc/echo.c torture_comment(tctx, "Failed to send async sleep request\n"); tctx 410 source4/torture/rpc/echo.c req = dcerpc_echo_TestSleep_send(p, tctx, &r); tctx 412 source4/torture/rpc/echo.c torture_comment(tctx, "Failed to send async sleep request\n"); tctx 417 source4/torture/rpc/echo.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_IO_TIMEOUT, tctx 422 source4/torture/rpc/echo.c return test_addone(tctx, p); tctx 138 source4/torture/rpc/epmapper.c static bool test_Lookup(struct torture_context *tctx, tctx 165 source4/torture/rpc/epmapper.c status = dcerpc_epm_Lookup(p, tctx, &r); tctx 171 source4/torture/rpc/epmapper.c *r.out.num_ents, GUID_string(tctx, &handle.uuid)); tctx 175 source4/torture/rpc/epmapper.c display_tower(tctx, &r.out.entries[i].tower->tower); tctx 177 source4/torture/rpc/epmapper.c test_Map(p, tctx, r.out.entries[i].tower); tctx 185 source4/torture/rpc/epmapper.c torture_assert_ntstatus_ok(tctx, status, "Lookup failed"); tctx 212 source4/torture/rpc/epmapper.c static bool test_Insert(struct torture_context *tctx, tctx 221 source4/torture/rpc/epmapper.c r.in.entries = talloc_array(tctx, struct epm_entry_t, 1); tctx 224 source4/torture/rpc/epmapper.c status = dcerpc_parse_binding(tctx, "ncalrpc:[SMBTORTURE]", &bd); tctx 225 source4/torture/rpc/epmapper.c torture_assert_ntstatus_ok(tctx, status, tctx 228 source4/torture/rpc/epmapper.c r.in.entries[0].tower = talloc(tctx, struct epm_twr_t); tctx 230 source4/torture/rpc/epmapper.c status = dcerpc_binding_build_tower(tctx, bd, &r.in.entries[0].tower->tower); tctx 231 source4/torture/rpc/epmapper.c torture_assert_ntstatus_ok(tctx, status, tctx 236 source4/torture/rpc/epmapper.c status = dcerpc_epm_Insert(p, tctx, &r); tctx 237 source4/torture/rpc/epmapper.c torture_assert_ntstatus_ok(tctx, status, "Insert failed"); tctx 239 source4/torture/rpc/epmapper.c torture_assert(tctx, r.out.result == 0, "Insert failed"); tctx 241 source4/torture/rpc/epmapper.c if (!test_Delete(p, tctx, r.in.entries)) { tctx 248 source4/torture/rpc/epmapper.c static bool test_InqObject(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 253 source4/torture/rpc/epmapper.c r.in.epm_object = talloc(tctx, struct GUID); tctx 256 source4/torture/rpc/epmapper.c status = dcerpc_epm_InqObject(p, tctx, &r); tctx 257 source4/torture/rpc/epmapper.c torture_assert_ntstatus_ok(tctx, status, "InqObject failed"); tctx 40 source4/torture/rpc/eventlog.c static bool get_policy_handle(struct torture_context *tctx, tctx 60 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 61 source4/torture/rpc/eventlog.c dcerpc_eventlog_OpenEventLogW(p, tctx, &r), tctx 64 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, r.out.result, "OpenEventLog failed"); tctx 71 source4/torture/rpc/eventlog.c static bool test_GetNumRecords(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 78 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle)) tctx 85 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 86 source4/torture/rpc/eventlog.c dcerpc_eventlog_GetNumRecords(p, tctx, &r), tctx 89 source4/torture/rpc/eventlog.c torture_comment(tctx, "%d records\n", *r.out.number); tctx 93 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 94 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr), tctx 99 source4/torture/rpc/eventlog.c static bool test_ReadEventLog(struct torture_context *tctx, tctx 110 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle)) tctx 121 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_ReadEventLogW(p, tctx, &r); tctx 123 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_INVALID_PARAMETER, tctx 141 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_ReadEventLogW(p, tctx, &r); tctx 148 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_BUFFER_TOO_SMALL, tctx 154 source4/torture/rpc/eventlog.c r.out.data = talloc_array(tctx, uint8_t, r.in.number_of_bytes); tctx 156 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_ReadEventLogW(p, tctx, &r); tctx 158 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status, "ReadEventLog failed"); tctx 168 source4/torture/rpc/eventlog.c ndr_err = ndr_pull_struct_blob_all(&blob, tctx, tctx 169 source4/torture/rpc/eventlog.c lp_iconv_convenience(tctx->lp_ctx), &rec, tctx 173 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status, tctx 188 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status, tctx 196 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 197 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr), tctx 203 source4/torture/rpc/eventlog.c static bool test_ReportEventLog(struct torture_context *tctx, tctx 214 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle)) tctx 219 source4/torture/rpc/eventlog.c strings = talloc_array(tctx, struct lsa_String, 1); tctx 239 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 240 source4/torture/rpc/eventlog.c dcerpc_eventlog_ReportEventW(p, tctx, &r), tctx 243 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, r.out.result, "ReportEventW failed"); tctx 247 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 248 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr), tctx 253 source4/torture/rpc/eventlog.c static bool test_FlushEventLog(struct torture_context *tctx, tctx 260 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle)) tctx 266 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, tctx 267 source4/torture/rpc/eventlog.c dcerpc_eventlog_FlushEventLog(p, tctx, &r), tctx 273 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 274 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr), tctx 280 source4/torture/rpc/eventlog.c static bool test_ClearEventLog(struct torture_context *tctx, tctx 287 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle)) tctx 293 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 294 source4/torture/rpc/eventlog.c dcerpc_eventlog_ClearEventLogW(p, tctx, &r), tctx 299 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 300 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr), tctx 306 source4/torture/rpc/eventlog.c static bool test_GetLogInformation(struct torture_context *tctx, tctx 315 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle)) tctx 324 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_GetLogInformation(p, tctx, &r); tctx 326 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_LEVEL, tctx 331 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_GetLogInformation(p, tctx, &r); tctx 333 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_BUFFER_TOO_SMALL, tctx 337 source4/torture/rpc/eventlog.c r.out.buffer = talloc_array(tctx, uint8_t, bytes_needed); tctx 339 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_GetLogInformation(p, tctx, &r); tctx 341 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status, "GetLogInformation failed"); tctx 345 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 346 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr), tctx 353 source4/torture/rpc/eventlog.c static bool test_OpenEventLog(struct torture_context *tctx, tctx 359 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle)) tctx 364 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 365 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr), tctx 371 source4/torture/rpc/eventlog.c static bool test_BackupLog(struct torture_context *tctx, tctx 383 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle)) tctx 386 source4/torture/rpc/eventlog.c tmp = talloc_asprintf(tctx, "C:\\%s", TEST_BACKUP_NAME); tctx 392 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_BackupEventLogW(p, tctx, &r); tctx 393 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, status, tctx 396 source4/torture/rpc/eventlog.c tmp = talloc_asprintf(tctx, "\\??\\C:\\%s", TEST_BACKUP_NAME); tctx 402 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_BackupEventLogW(p, tctx, &r); tctx 403 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status, "BackupEventLogW failed"); tctx 405 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_BackupEventLogW(p, tctx, &r); tctx 406 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, status, tctx 411 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 412 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr), tctx 424 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_OpenBackupEventLogW(p, tctx, &b); tctx 426 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status, "OpenBackupEventLogW failed"); tctx 430 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, tctx 431 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr), tctx 29 source4/torture/rpc/frsapi.c static bool test_GetDsPollingIntervalW(struct torture_context *tctx, tctx 43 source4/torture/rpc/frsapi.c torture_assert_ntstatus_ok(tctx, tctx 44 source4/torture/rpc/frsapi.c dcerpc_frsapi_GetDsPollingIntervalW(p, tctx, &r), tctx 47 source4/torture/rpc/frsapi.c torture_assert_werr_ok(tctx, r.out.result, tctx 53 source4/torture/rpc/frsapi.c static bool test_SetDsPollingIntervalW(struct torture_context *tctx, tctx 67 source4/torture/rpc/frsapi.c torture_assert_ntstatus_ok(tctx, tctx 68 source4/torture/rpc/frsapi.c dcerpc_frsapi_SetDsPollingIntervalW(p, tctx, &r), tctx 71 source4/torture/rpc/frsapi.c torture_assert_werr_ok(tctx, r.out.result, tctx 77 source4/torture/rpc/frsapi.c static bool test_DsPollingIntervalW(struct torture_context *tctx, tctx 83 source4/torture/rpc/frsapi.c if (!test_GetDsPollingIntervalW(tctx, p, &i1, &i2, &i3)) { tctx 87 source4/torture/rpc/frsapi.c if (!test_SetDsPollingIntervalW(tctx, p, i1, i2, i3)) { tctx 94 source4/torture/rpc/frsapi.c if (!test_SetDsPollingIntervalW(tctx, p, k1, k2, k3)) { tctx 98 source4/torture/rpc/frsapi.c if (!test_GetDsPollingIntervalW(tctx, p, &k1, &k2, &k3)) { tctx 109 source4/torture/rpc/frsapi.c static bool test_IsPathReplicated_err(struct torture_context *tctx, tctx 128 source4/torture/rpc/frsapi.c torture_assert_ntstatus_ok(tctx, tctx 129 source4/torture/rpc/frsapi.c dcerpc_frsapi_IsPathReplicated(p, tctx, &r), tctx 132 source4/torture/rpc/frsapi.c torture_assert_werr_equal(tctx, r.out.result, werr, tctx 138 source4/torture/rpc/frsapi.c static bool _test_IsPathReplicated(struct torture_context *tctx, tctx 143 source4/torture/rpc/frsapi.c return test_IsPathReplicated_err(tctx, p, path, type, WERR_OK); tctx 146 source4/torture/rpc/frsapi.c static bool test_IsPathReplicated(struct torture_context *tctx, tctx 156 source4/torture/rpc/frsapi.c if (!test_IsPathReplicated_err(tctx, p, NULL, 0, tctx 162 source4/torture/rpc/frsapi.c if (!_test_IsPathReplicated(tctx, p, dcerpc_server_name(p), tctx 169 source4/torture/rpc/frsapi.c const char *path = talloc_asprintf(tctx, "\\\\%s\\SYSVOL", tctx 171 source4/torture/rpc/frsapi.c if (!_test_IsPathReplicated(tctx, p, path, lvls[i])) { tctx 177 source4/torture/rpc/frsapi.c if (!_test_IsPathReplicated(tctx, p, tctx 187 source4/torture/rpc/frsapi.c static bool test_ForceReplication(struct torture_context *tctx, tctx 196 source4/torture/rpc/frsapi.c r.in.replica_set = talloc_asprintf(tctx, "%s", tctx 197 source4/torture/rpc/frsapi.c lp_realm(tctx->lp_ctx)); tctx 200 source4/torture/rpc/frsapi.c torture_assert_ntstatus_ok(tctx, tctx 201 source4/torture/rpc/frsapi.c dcerpc_frsapi_ForceReplication(p, tctx, &r), tctx 204 source4/torture/rpc/frsapi.c torture_assert_werr_ok(tctx, r.out.result, tctx 210 source4/torture/rpc/frsapi.c static bool test_InfoW(struct torture_context *tctx, tctx 224 source4/torture/rpc/frsapi.c info = talloc_zero(tctx, struct frsapi_Info); tctx 235 source4/torture/rpc/frsapi.c torture_assert_ntstatus_ok(tctx, tctx 236 source4/torture/rpc/frsapi.c dcerpc_frsapi_InfoW(p, tctx, &r), tctx 239 source4/torture/rpc/frsapi.c torture_assert_werr_ok(tctx, r.out.result, "InfoW failed"); tctx 33 source4/torture/rpc/initshutdown.c static bool test_Abort(struct torture_context *tctx, tctx 42 source4/torture/rpc/initshutdown.c status = dcerpc_initshutdown_Abort(p, tctx, &r); tctx 44 source4/torture/rpc/initshutdown.c torture_assert_ntstatus_ok(tctx, status, tctx 47 source4/torture/rpc/initshutdown.c torture_assert_werr_ok(tctx, r.out.result, "initshutdown_Abort failed"); tctx 52 source4/torture/rpc/initshutdown.c static bool test_Init(struct torture_context *tctx, tctx 60 source4/torture/rpc/initshutdown.c r.in.message = talloc(tctx, struct lsa_StringLarge); tctx 66 source4/torture/rpc/initshutdown.c status = dcerpc_initshutdown_Init(p, tctx, &r); tctx 68 source4/torture/rpc/initshutdown.c torture_assert_ntstatus_ok(tctx, status, "initshutdown_Init failed"); tctx 69 source4/torture/rpc/initshutdown.c torture_assert_werr_ok(tctx, r.out.result, "initshutdown_Init failed"); tctx 71 source4/torture/rpc/initshutdown.c return test_Abort(tctx, p); tctx 74 source4/torture/rpc/initshutdown.c static bool test_InitEx(struct torture_context *tctx, tctx 82 source4/torture/rpc/initshutdown.c r.in.message = talloc(tctx, struct lsa_StringLarge); tctx 89 source4/torture/rpc/initshutdown.c status = dcerpc_initshutdown_InitEx(p, tctx, &r); tctx 91 source4/torture/rpc/initshutdown.c torture_assert_ntstatus_ok(tctx, status, "initshutdown_InitEx failed"); tctx 93 source4/torture/rpc/initshutdown.c torture_assert_werr_ok(tctx, r.out.result, "initshutdown_InitEx failed"); tctx 95 source4/torture/rpc/initshutdown.c return test_Abort(tctx, p); tctx 41 source4/torture/rpc/lsa.c struct torture_context *tctx) tctx 69 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenPolicy(p, tctx, &r); tctx 85 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 95 source4/torture/rpc/lsa.c *handle = talloc(tctx, struct policy_handle); tctx 117 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenPolicy2(p, tctx, &r); tctx 152 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 169 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_String, tnames->count); tctx 184 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupNames(p, tctx, &r); tctx 219 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 243 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_String, tnames.count); tctx 258 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupNames(p, tctx, &r); tctx 270 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 283 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames); tctx 287 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames); tctx 291 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames); tctx 295 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames); tctx 298 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames); tctx 303 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames); tctx 307 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames); tctx 311 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames); tctx 315 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames); tctx 320 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 338 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_String, tnames->count); tctx 355 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupNames2(p, tctx, &r); tctx 362 source4/torture/rpc/lsa.c torture_assert_int_equal(tctx, count, sids.count, tctx 365 source4/torture/rpc/lsa.c torture_assert(tctx, sids.sids, "invalid sid buffer"); tctx 376 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 394 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_String, tnames->count); tctx 411 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupNames3(p, tctx, &r); tctx 418 source4/torture/rpc/lsa.c torture_assert_int_equal(tctx, count, sids.count, tctx 421 source4/torture/rpc/lsa.c torture_assert(tctx, sids.sids, "invalid sid buffer"); tctx 431 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 448 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_String, tnames->count); tctx 464 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupNames4(p, tctx, &r); tctx 471 source4/torture/rpc/lsa.c torture_assert_int_equal(tctx, count, sids.count, tctx 474 source4/torture/rpc/lsa.c torture_assert(tctx, sids.sids, "invalid sid buffer"); tctx 485 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 509 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupSids(p, tctx, &r); tctx 517 source4/torture/rpc/lsa.c if (!test_LookupNames(p, tctx, handle, &names)) { tctx 526 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 552 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupSids2(p, tctx, &r); tctx 560 source4/torture/rpc/lsa.c if (!test_LookupNames2(p, tctx, handle, &names, false)) { tctx 564 source4/torture/rpc/lsa.c if (!test_LookupNames3(p, tctx, handle, &names, false)) { tctx 572 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 596 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupSids3(p, tctx, &r); tctx 610 source4/torture/rpc/lsa.c if (!test_LookupNames4(p, tctx, &names, false)) { tctx 618 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 630 source4/torture/rpc/lsa.c sids.sids = talloc_array(tctx, struct lsa_SidPtr, sids.num_sids); tctx 634 source4/torture/rpc/lsa.c sids.sids[i].sid = dom_sid_parse_talloc(tctx, sidstr); tctx 655 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupSids(p, tctx, &r); tctx 663 source4/torture/rpc/lsa.c if (!test_LookupNames(p, tctx, handle, &names)) { tctx 687 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupSids3(p, tctx, &r); tctx 698 source4/torture/rpc/lsa.c if (!test_LookupNames4(p, tctx, &names, false)) { tctx 727 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 741 source4/torture/rpc/lsa.c count = talloc_array(tctx, uint32_t, num_async_requests); tctx 742 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_TransNameArray, num_async_requests); tctx 743 source4/torture/rpc/lsa.c r = talloc_array(tctx, struct lsa_LookupSids, num_async_requests); tctx 747 source4/torture/rpc/lsa.c req = talloc_array(tctx, struct rpc_request *, num_async_requests); tctx 751 source4/torture/rpc/lsa.c sidptr.sid = dom_sid_parse_talloc(tctx, "S-1-5-32-545"); tctx 793 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 805 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupPrivValue(p, tctx, &r); tctx 815 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 827 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupPrivName(p, tctx, &r); tctx 837 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 855 source4/torture/rpc/lsa.c privs.set = talloc_array(tctx, struct lsa_LUIDAttribute, 1); tctx 859 source4/torture/rpc/lsa.c status = dcerpc_lsa_RemovePrivilegesFromAccount(p, tctx, &r); tctx 869 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupPrivName(p, tctx, &r_name); tctx 889 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 905 source4/torture/rpc/lsa.c privs.set = talloc_array(tctx, struct lsa_LUIDAttribute, 1); tctx 909 source4/torture/rpc/lsa.c status = dcerpc_lsa_AddPrivilegesToAccount(p, tctx, &r); tctx 919 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 933 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumPrivsAccount(p, tctx, &r); tctx 942 source4/torture/rpc/lsa.c test_LookupPrivName(p, tctx, handle, tctx 946 source4/torture/rpc/lsa.c ret &= test_RemovePrivilegesFromAccount(p, tctx, handle, acct_handle, tctx 948 source4/torture/rpc/lsa.c ret &= test_AddPrivilegesToAccount(p, tctx, acct_handle, tctx 956 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 969 source4/torture/rpc/lsa.c status = dcerpc_lsa_GetSystemAccessAccount(p, tctx, &r); tctx 1010 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1019 source4/torture/rpc/lsa.c status = dcerpc_lsa_Delete(p, tctx, &r); tctx 1029 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1039 source4/torture/rpc/lsa.c status = dcerpc_lsa_DeleteObject(p, tctx, &r); tctx 1050 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1058 source4/torture/rpc/lsa.c newsid = dom_sid_parse_talloc(tctx, "S-1-5-12349876-4321-2854"); tctx 1067 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateAccount(p, tctx, &r); tctx 1075 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenAccount(p, tctx, &r_o); tctx 1085 source4/torture/rpc/lsa.c if (!test_Delete(p, tctx, &acct_handle)) { tctx 1089 source4/torture/rpc/lsa.c if (!test_DeleteObject(p, tctx, &acct_handle)) { tctx 1097 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1110 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenTrustedDomainByName(p, tctx, &r); tctx 1116 source4/torture/rpc/lsa.c if (!test_Delete(p, tctx, &trustdom_handle)) { tctx 1120 source4/torture/rpc/lsa.c if (!test_DeleteObject(p, tctx, &trustdom_handle)) { tctx 1128 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1138 source4/torture/rpc/lsa.c status = dcerpc_lsa_DeleteTrustedDomain(p, tctx, &r); tctx 1149 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1182 source4/torture/rpc/lsa.c secname[LOCAL] = talloc_asprintf(tctx, "torturesecret-%u", (uint_t)random()); tctx 1183 source4/torture/rpc/lsa.c secname[GLOBAL] = talloc_asprintf(tctx, "G$torturesecret-%u", (uint_t)random()); tctx 1194 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateSecret(p, tctx, &r); tctx 1204 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateSecret(p, tctx, &r); tctx 1217 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenSecret(p, tctx, &r2); tctx 1240 source4/torture/rpc/lsa.c status = dcerpc_lsa_SetSecret(p, tctx, &r3); tctx 1258 source4/torture/rpc/lsa.c status = dcerpc_lsa_SetSecret(p, tctx, &r3); tctx 1279 source4/torture/rpc/lsa.c status = dcerpc_lsa_QuerySecret(p, tctx, &r4); tctx 1291 source4/torture/rpc/lsa.c blob2 = data_blob_talloc(tctx, NULL, blob1.length); tctx 1293 source4/torture/rpc/lsa.c secret2 = sess_decrypt_string(tctx, tctx 1317 source4/torture/rpc/lsa.c status = dcerpc_lsa_SetSecret(p, tctx, &r5); tctx 1338 source4/torture/rpc/lsa.c status = dcerpc_lsa_QuerySecret(p, tctx, &r6); tctx 1354 source4/torture/rpc/lsa.c blob2 = data_blob_talloc(tctx, NULL, blob1.length); tctx 1356 source4/torture/rpc/lsa.c secret4 = sess_decrypt_string(tctx, tctx 1367 source4/torture/rpc/lsa.c blob2 = data_blob_talloc(tctx, NULL, blob1.length); tctx 1369 source4/torture/rpc/lsa.c secret2 = sess_decrypt_string(tctx, tctx 1381 source4/torture/rpc/lsa.c nt_time_string(tctx, *r6.out.old_mtime), tctx 1382 source4/torture/rpc/lsa.c nt_time_string(tctx, *r6.out.new_mtime)); tctx 1399 source4/torture/rpc/lsa.c status = dcerpc_lsa_SetSecret(p, tctx, &r7); tctx 1417 source4/torture/rpc/lsa.c status = dcerpc_lsa_QuerySecret(p, tctx, &r8); tctx 1438 source4/torture/rpc/lsa.c blob2 = data_blob_talloc(tctx, NULL, blob1.length); tctx 1440 source4/torture/rpc/lsa.c secret6 = sess_decrypt_string(tctx, tctx 1451 source4/torture/rpc/lsa.c nt_time_string(tctx, *r8.out.old_mtime), tctx 1452 source4/torture/rpc/lsa.c nt_time_string(tctx, *r8.out.new_mtime)); tctx 1458 source4/torture/rpc/lsa.c if (!test_Delete(p, tctx, &sec_handle)) { tctx 1462 source4/torture/rpc/lsa.c if (!test_DeleteObject(p, tctx, &sec_handle)) { tctx 1468 source4/torture/rpc/lsa.c status = dcerpc_lsa_DeleteObject(p, tctx, &d_o); tctx 1476 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenSecret(p, tctx, &r2); tctx 1490 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1504 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumAccountRights(p, tctx, &r); tctx 1507 source4/torture/rpc/lsa.c dom_sid_string(tctx, sid), nt_errstr(status)); tctx 1516 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1524 source4/torture/rpc/lsa.c if (torture_setting_bool(tctx, "samba4", false)) { tctx 1535 source4/torture/rpc/lsa.c status = dcerpc_lsa_QuerySecurity(p, tctx, &r); tctx 1545 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1560 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenAccount(p, tctx, &r); tctx 1566 source4/torture/rpc/lsa.c if (!test_EnumPrivsAccount(p, tctx, handle, &acct_handle)) { tctx 1570 source4/torture/rpc/lsa.c if (!test_GetSystemAccessAccount(p, tctx, handle, &acct_handle)) { tctx 1574 source4/torture/rpc/lsa.c if (!test_QuerySecurity(p, tctx, handle, &acct_handle)) { tctx 1582 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1602 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumAccounts(p, tctx, &r); tctx 1611 source4/torture/rpc/lsa.c if (!test_LookupSids(p, tctx, handle, &sids1)) { tctx 1615 source4/torture/rpc/lsa.c if (!test_LookupSids2(p, tctx, handle, &sids1)) { tctx 1625 source4/torture/rpc/lsa.c ret &= test_OpenAccount(p, tctx, handle, sids1.sids[i].sid); tctx 1626 source4/torture/rpc/lsa.c ret &= test_EnumAccountRights(p, tctx, handle, sids1.sids[i].sid); tctx 1640 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumAccounts(p, tctx, &r); tctx 1655 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1676 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupPrivDisplayName(p, tctx, &r); tctx 1689 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1705 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumAccountsWithUserRight(p, tctx, &r); tctx 1722 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1741 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumPrivs(p, tctx, &r); tctx 1748 source4/torture/rpc/lsa.c test_LookupPrivDisplayName(p, tctx, handle, (struct lsa_String *)&privs1.privs[i].name); tctx 1749 source4/torture/rpc/lsa.c test_LookupPrivValue(p, tctx, handle, (struct lsa_String *)&privs1.privs[i].name); tctx 1750 source4/torture/rpc/lsa.c if (!test_EnumAccountsWithUserRight(p, tctx, handle, (struct lsa_String *)&privs1.privs[i].name)) { tctx 1759 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1771 source4/torture/rpc/lsa.c if (torture_setting_bool(tctx, "samba4", false)) { tctx 1789 source4/torture/rpc/lsa.c status = dcerpc_lsa_lsaRQueryForestTrustInformation(p, tctx, &r); tctx 1800 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1810 source4/torture/rpc/lsa.c ret &= test_QueryForestTrustInformation(p, tctx, handle, tctx 1819 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 1844 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenTrustedDomain(p, tctx, &trust); tctx 1863 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q); tctx 1875 source4/torture/rpc/lsa.c status = dcerpc_lsa_CloseTrustedDomainEx(p, tctx, &c_trust); tctx 1884 source4/torture/rpc/lsa.c status = dcerpc_lsa_Close(p, tctx, &c); tctx 1903 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfoBySid(p, tctx, &q); tctx 1921 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenTrustedDomainByName(p, tctx, &trust_by_name); tctx 1934 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q); tctx 1949 source4/torture/rpc/lsa.c status = dcerpc_lsa_Close(p, tctx, &c); tctx 1966 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfoByName(p, tctx, &q); tctx 1982 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 2001 source4/torture/rpc/lsa.c enum_status = dcerpc_lsa_EnumTrustDom(p, tctx, &r); tctx 2023 source4/torture/rpc/lsa.c enum_status = dcerpc_lsa_EnumTrustDom(p, tctx, &r); tctx 2051 source4/torture/rpc/lsa.c ret &= test_query_each_TrustDom(p, tctx, handle, &domains); tctx 2063 source4/torture/rpc/lsa.c enum_status = dcerpc_lsa_EnumTrustedDomainsEx(p, tctx, &r_ex); tctx 2078 source4/torture/rpc/lsa.c enum_status = dcerpc_lsa_EnumTrustedDomainsEx(p, tctx, &r_ex); tctx 2107 source4/torture/rpc/lsa.c ret &= test_query_each_TrustDomEx(p, tctx, handle, &domains_ex); tctx 2115 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 2130 source4/torture/rpc/lsa.c if (!test_EnumTrustDom(p, tctx, handle)) { tctx 2135 source4/torture/rpc/lsa.c char *trust_name = talloc_asprintf(tctx, "torturedom%02d", i); tctx 2136 source4/torture/rpc/lsa.c char *trust_sid = talloc_asprintf(tctx, "S-1-5-21-97398-379795-100%02d", i); tctx 2138 source4/torture/rpc/lsa.c domsid[i] = dom_sid_parse_talloc(tctx, trust_sid); tctx 2148 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateTrustedDomain(p, tctx, &r); tctx 2150 source4/torture/rpc/lsa.c test_DeleteTrustedDomain(p, tctx, handle, trustinfo.name); tctx 2151 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateTrustedDomain(p, tctx, &r); tctx 2161 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q); tctx 2193 source4/torture/rpc/lsa.c if (!test_EnumTrustDom(p, tctx, handle)) { tctx 2198 source4/torture/rpc/lsa.c if (!test_DeleteTrustedDomainBySid(p, tctx, handle, domsid[i])) { tctx 2207 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 2234 source4/torture/rpc/lsa.c char *trust_name = talloc_asprintf(tctx, "torturedom%02d", i); tctx 2235 source4/torture/rpc/lsa.c char *trust_name_dns = talloc_asprintf(tctx, "torturedom%02d.samba.example.com", i); tctx 2236 source4/torture/rpc/lsa.c char *trust_sid = talloc_asprintf(tctx, "S-1-5-21-97398-379795-100%02d", i); tctx 2238 source4/torture/rpc/lsa.c domsid[i] = dom_sid_parse_talloc(tctx, trust_sid); tctx 2263 source4/torture/rpc/lsa.c ndr_err = ndr_push_struct_blob(&auth_blob, tctx, lp_iconv_convenience(tctx->lp_ctx), &auth_struct, tctx 2281 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateTrustedDomainEx2(p, tctx, &r); tctx 2283 source4/torture/rpc/lsa.c test_DeleteTrustedDomain(p, tctx, handle, trustinfo.netbios_name); tctx 2284 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateTrustedDomainEx2(p, tctx, &r); tctx 2294 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q); tctx 2327 source4/torture/rpc/lsa.c if (!test_EnumTrustDom(p, tctx, handle)) { tctx 2333 source4/torture/rpc/lsa.c if (!test_DeleteTrustedDomainBySid(p, tctx, handle, domsid[i])) { tctx 2343 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 2361 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryDomainInformationPolicy(p, tctx, &r); tctx 2379 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 2406 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryInfoPolicy2(p, tctx, tctx 2409 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryInfoPolicy(p, tctx, &r); tctx 2440 source4/torture/rpc/lsa.c if (torture_setting_bool(tctx, "samba4", false)) { tctx 2465 source4/torture/rpc/lsa.c tnames.names = talloc_zero_array(tctx, struct lsa_TranslatedName, tnames.count); tctx 2470 source4/torture/rpc/lsa.c tnames.names[2].name.string = talloc_asprintf(tctx, "%s\\", info->dns.name.string); tctx 2472 source4/torture/rpc/lsa.c tnames.names[3].name.string = talloc_asprintf(tctx, "%s\\", info->dns.dns_domain.string); tctx 2474 source4/torture/rpc/lsa.c tnames.names[4].name.string = talloc_asprintf(tctx, "%s\\guest", info->dns.name.string); tctx 2476 source4/torture/rpc/lsa.c tnames.names[5].name.string = talloc_asprintf(tctx, "%s\\krbtgt", info->dns.name.string); tctx 2478 source4/torture/rpc/lsa.c tnames.names[6].name.string = talloc_asprintf(tctx, "%s\\guest", info->dns.dns_domain.string); tctx 2480 source4/torture/rpc/lsa.c tnames.names[7].name.string = talloc_asprintf(tctx, "%s\\krbtgt", info->dns.dns_domain.string); tctx 2482 source4/torture/rpc/lsa.c tnames.names[8].name.string = talloc_asprintf(tctx, "krbtgt@%s", info->dns.name.string); tctx 2484 source4/torture/rpc/lsa.c tnames.names[9].name.string = talloc_asprintf(tctx, "krbtgt@%s", info->dns.dns_domain.string); tctx 2486 source4/torture/rpc/lsa.c tnames.names[10].name.string = talloc_asprintf(tctx, "%s\\"TEST_MACHINENAME "$", info->dns.name.string); tctx 2488 source4/torture/rpc/lsa.c tnames.names[11].name.string = talloc_asprintf(tctx, "%s\\"TEST_MACHINENAME "$", info->dns.dns_domain.string); tctx 2490 source4/torture/rpc/lsa.c tnames.names[12].name.string = talloc_asprintf(tctx, TEST_MACHINENAME "$@%s", info->dns.name.string); tctx 2492 source4/torture/rpc/lsa.c tnames.names[13].name.string = talloc_asprintf(tctx, TEST_MACHINENAME "$@%s", info->dns.dns_domain.string); tctx 2494 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames); tctx 2503 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 2506 source4/torture/rpc/lsa.c return test_QueryInfoPolicyCalls(false, p, tctx, handle); tctx 2510 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 2513 source4/torture/rpc/lsa.c return test_QueryInfoPolicyCalls(true, p, tctx, handle); tctx 2517 source4/torture/rpc/lsa.c struct torture_context *tctx) tctx 2532 source4/torture/rpc/lsa.c status = dcerpc_lsa_GetUserName(p, tctx, &r); tctx 2544 source4/torture/rpc/lsa.c status = dcerpc_lsa_GetUserName(p, tctx, &r); tctx 2555 source4/torture/rpc/lsa.c struct torture_context *tctx, tctx 2567 source4/torture/rpc/lsa.c status = dcerpc_lsa_Close(p, tctx, &r); tctx 2573 source4/torture/rpc/lsa.c status = dcerpc_lsa_Close(p, tctx, &r); tctx 2585 source4/torture/rpc/lsa.c bool torture_rpc_lsa(struct torture_context *tctx) tctx 2594 source4/torture/rpc/lsa.c status = torture_rpc_connection(tctx, &p, &ndr_table_lsarpc); tctx 2599 source4/torture/rpc/lsa.c if (!test_OpenPolicy(p, tctx)) { tctx 2603 source4/torture/rpc/lsa.c if (!test_lsa_OpenPolicy2(p, tctx, &handle)) { tctx 2608 source4/torture/rpc/lsa.c join = torture_join_domain(tctx, TEST_MACHINENAME, ACB_WSTRUST, &machine_creds); tctx 2612 source4/torture/rpc/lsa.c if (!test_LookupNames_wellknown(p, tctx, handle)) { tctx 2616 source4/torture/rpc/lsa.c if (!test_LookupNames_bogus(p, tctx, handle)) { tctx 2620 source4/torture/rpc/lsa.c if (!test_LookupSids_async(p, tctx, handle)) { tctx 2624 source4/torture/rpc/lsa.c if (!test_QueryDomainInfoPolicy(p, tctx, handle)) { tctx 2628 source4/torture/rpc/lsa.c if (!test_CreateAccount(p, tctx, handle)) { tctx 2632 source4/torture/rpc/lsa.c if (!test_CreateSecret(p, tctx, handle)) { tctx 2635 source4/torture/rpc/lsa.c if (!test_CreateTrustedDomain(p, tctx, handle)) { tctx 2639 source4/torture/rpc/lsa.c if (!test_CreateTrustedDomainEx2(p, tctx, handle)) { tctx 2643 source4/torture/rpc/lsa.c if (!test_EnumAccounts(p, tctx, handle)) { tctx 2647 source4/torture/rpc/lsa.c if (!test_EnumPrivs(p, tctx, handle)) { tctx 2651 source4/torture/rpc/lsa.c if (!test_QueryInfoPolicy(p, tctx, handle)) { tctx 2655 source4/torture/rpc/lsa.c if (!test_QueryInfoPolicy2(p, tctx, handle)) { tctx 2659 source4/torture/rpc/lsa.c if (!test_Delete(p, tctx, handle)) { tctx 2663 source4/torture/rpc/lsa.c if (!test_many_LookupSids(p, tctx, handle)) { tctx 2667 source4/torture/rpc/lsa.c if (!test_lsa_Close(p, tctx, handle)) { tctx 2671 source4/torture/rpc/lsa.c torture_leave_domain(tctx, join); tctx 2674 source4/torture/rpc/lsa.c if (!test_many_LookupSids(p, tctx, handle)) { tctx 2679 source4/torture/rpc/lsa.c if (!test_GetUserName(p, tctx)) { tctx 2686 source4/torture/rpc/lsa.c bool torture_rpc_lsa_get_user(struct torture_context *tctx) tctx 2692 source4/torture/rpc/lsa.c status = torture_rpc_connection(tctx, &p, &ndr_table_lsarpc); tctx 2697 source4/torture/rpc/lsa.c if (!test_GetUserName(p, tctx)) { tctx 2704 source4/torture/rpc/lsa.c static bool testcase_LookupNames(struct torture_context *tctx, tctx 2712 source4/torture/rpc/lsa.c if (!test_OpenPolicy(p, tctx)) { tctx 2716 source4/torture/rpc/lsa.c if (!test_lsa_OpenPolicy2(p, tctx, &handle)) { tctx 2725 source4/torture/rpc/lsa.c tnames.names = talloc_array(tctx, struct lsa_TranslatedName, tnames.count); tctx 2730 source4/torture/rpc/lsa.c if (!test_LookupNames(p, tctx, handle, &tnames)) { tctx 2735 source4/torture/rpc/lsa.c tnames2.names = talloc_array(tctx, struct lsa_TranslatedName2, tnames2.count); tctx 2740 source4/torture/rpc/lsa.c if (!test_LookupNames2(p, tctx, handle, &tnames2, true)) { tctx 2744 source4/torture/rpc/lsa.c if (!test_LookupNames3(p, tctx, handle, &tnames2, true)) { tctx 2748 source4/torture/rpc/lsa.c if (!test_lsa_Close(p, tctx, handle)) { tctx 172 source4/torture/rpc/lsa_lookup.c static bool get_downleveltrust(struct torture_context *tctx, struct dcerpc_pipe *p, tctx 188 source4/torture/rpc/lsa_lookup.c status = dcerpc_lsa_EnumTrustDom(p, tctx, &r); tctx 191 source4/torture/rpc/lsa_lookup.c torture_fail(tctx, "no trusts"); tctx 194 source4/torture/rpc/lsa_lookup.c torture_fail(tctx, "no trusts"); tctx 209 source4/torture/rpc/lsa_lookup.c status = dcerpc_lsa_QueryTrustedDomainInfoBySid(p, tctx, &q); tctx 219 source4/torture/rpc/lsa_lookup.c torture_fail(tctx, "I need a AD DC with an outgoing trust to NT4"); tctx 328 source4/torture/rpc/lsa_lookup.c static bool test_LookupSidsReply(struct torture_context *tctx, tctx 347 source4/torture/rpc/lsa_lookup.c if (!open_policy(tctx, p, &handle)) { tctx 351 source4/torture/rpc/lsa_lookup.c dom_admin_sid = talloc_asprintf(tctx, "%s-%d", dom_sid, 512); tctx 353 source4/torture/rpc/lsa_lookup.c sids = talloc_array(tctx, struct dom_sid *, num_sids); tctx 355 source4/torture/rpc/lsa_lookup.c sids[0] = dom_sid_parse_talloc(tctx, dom_admin_sid); tctx 361 source4/torture/rpc/lsa_lookup.c sidarray.sids = talloc_array(tctx, struct lsa_SidPtr, num_sids); tctx 376 source4/torture/rpc/lsa_lookup.c status = dcerpc_lsa_LookupSids(p, tctx, &r); tctx 378 source4/torture/rpc/lsa_lookup.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NONE_MAPPED, tctx 381 source4/torture/rpc/lsa_lookup.c torture_assert_int_equal(tctx, names.count, num_sids, tctx 383 source4/torture/rpc/lsa_lookup.c torture_assert(tctx, names.names, tctx 385 source4/torture/rpc/lsa_lookup.c torture_assert_str_equal(tctx, names.names[0].name.string, dom_admin_sid, tctx 390 source4/torture/rpc/lsa_lookup.c torture_assert_int_equal(tctx, domains->count, num_sids, tctx 392 source4/torture/rpc/lsa_lookup.c torture_assert(tctx, domains->domains, tctx 394 source4/torture/rpc/lsa_lookup.c torture_assert_str_equal(tctx, dom_sid_string(tctx, domains->domains[0].sid), dom_sid, tctx 34 source4/torture/rpc/mgmt.c bool test_inq_if_ids(struct torture_context *tctx, tctx 76 source4/torture/rpc/mgmt.c per_id_test(tctx, priv, mem_ctx, id); tctx 42 source4/torture/rpc/netlogon.c static bool test_LogonUasLogon(struct torture_context *tctx, tctx 54 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonUasLogon(p, tctx, &r); tctx 55 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonUasLogon"); tctx 60 source4/torture/rpc/netlogon.c static bool test_LogonUasLogoff(struct torture_context *tctx, tctx 72 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonUasLogoff(p, tctx, &r); tctx 73 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonUasLogoff"); tctx 78 source4/torture/rpc/netlogon.c bool test_SetupCredentials(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 90 source4/torture/rpc/netlogon.c mach_password = cli_credentials_get_nt_hash(credentials, tctx); tctx 93 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerReqChallenge\n"); tctx 95 source4/torture/rpc/netlogon.c creds = talloc(tctx, struct creds_CredentialState); tctx 96 source4/torture/rpc/netlogon.c torture_assert(tctx, creds != NULL, "memory allocation"); tctx 105 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerReqChallenge(p, tctx, &r); tctx 106 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge"); tctx 109 source4/torture/rpc/netlogon.c a.in.account_name = talloc_asprintf(tctx, "%s$", machine_name); tctx 119 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerAuthenticate\n"); tctx 121 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerAuthenticate(p, tctx, &a); tctx 125 source4/torture/rpc/netlogon.c return test_SetupCredentials2(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS, tctx 129 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerAuthenticate"); tctx 131 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &credentials3), tctx 138 source4/torture/rpc/netlogon.c bool test_SetupCredentials2(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 152 source4/torture/rpc/netlogon.c mach_password = cli_credentials_get_nt_hash(machine_credentials, tctx); tctx 155 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerReqChallenge\n"); tctx 157 source4/torture/rpc/netlogon.c creds = talloc(tctx, struct creds_CredentialState); tctx 158 source4/torture/rpc/netlogon.c torture_assert(tctx, creds != NULL, "memory allocation"); tctx 167 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerReqChallenge(p, tctx, &r); tctx 168 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge"); tctx 171 source4/torture/rpc/netlogon.c a.in.account_name = talloc_asprintf(tctx, "%s$", machine_name); tctx 183 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerAuthenticate2\n"); tctx 185 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerAuthenticate2(p, tctx, &a); tctx 186 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerAuthenticate2"); tctx 188 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &credentials3), tctx 191 source4/torture/rpc/netlogon.c torture_comment(tctx, "negotiate_flags=0x%08x\n", negotiate_flags); tctx 198 source4/torture/rpc/netlogon.c static bool test_SetupCredentials3(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 216 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerReqChallenge\n"); tctx 218 source4/torture/rpc/netlogon.c creds = talloc(tctx, struct creds_CredentialState); tctx 219 source4/torture/rpc/netlogon.c torture_assert(tctx, creds != NULL, "memory allocation"); tctx 228 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerReqChallenge(p, tctx, &r); tctx 229 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge"); tctx 234 source4/torture/rpc/netlogon.c a.in.account_name = talloc_asprintf(tctx, "%s$", machine_name); tctx 247 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerAuthenticate3\n"); tctx 249 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerAuthenticate3(p, tctx, &a); tctx 250 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerAuthenticate3"); tctx 251 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &credentials3), "Credential chaining failed"); tctx 253 source4/torture/rpc/netlogon.c torture_comment(tctx, "negotiate_flags=0x%08x\n", negotiate_flags); tctx 256 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerReqChallenge(p, tctx, &r); tctx 257 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge"); tctx 266 source4/torture/rpc/netlogon.c static bool test_SetPassword(struct torture_context *tctx, tctx 277 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) { tctx 281 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 282 source4/torture/rpc/netlogon.c r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME); tctx 289 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8); tctx 294 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerPasswordSet on machine account\n"); tctx 295 source4/torture/rpc/netlogon.c torture_comment(tctx, "Changing machine account password to '%s'\n", tctx 300 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet(p, tctx, &r); tctx 301 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet"); tctx 304 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n"); tctx 311 source4/torture/rpc/netlogon.c torture_comment(tctx, tctx 313 source4/torture/rpc/netlogon.c torture_comment(tctx, tctx 318 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet(p, tctx, &r); tctx 319 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet (2)"); tctx 322 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n"); tctx 327 source4/torture/rpc/netlogon.c torture_assert(tctx, tctx 328 source4/torture/rpc/netlogon.c test_SetupCredentials(p, tctx, machine_credentials, &creds), tctx 355 source4/torture/rpc/netlogon.c static bool test_SetPassword2(struct torture_context *tctx, tctx 369 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) { tctx 373 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 374 source4/torture/rpc/netlogon.c r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME); tctx 381 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8); tctx 388 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerPasswordSet2 on machine account\n"); tctx 389 source4/torture/rpc/netlogon.c torture_comment(tctx, "Changing machine account password to '%s'\n", password); tctx 393 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r); tctx 394 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet2"); tctx 397 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n"); tctx 402 source4/torture/rpc/netlogon.c if (!torture_setting_bool(tctx, "dangerous", false)) { tctx 403 source4/torture/rpc/netlogon.c torture_comment(tctx, tctx 418 source4/torture/rpc/netlogon.c torture_comment(tctx, tctx 420 source4/torture/rpc/netlogon.c torture_comment(tctx, tctx 425 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r); tctx 426 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet2"); tctx 429 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n"); tctx 435 source4/torture/rpc/netlogon.c torture_assert(tctx, test_SetupCredentials(p, tctx, machine_credentials, &creds), tctx 439 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8); tctx 446 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing second ServerPasswordSet2 on machine account\n"); tctx 447 source4/torture/rpc/netlogon.c torture_comment(tctx, "Changing machine account password to '%s'\n", password); tctx 451 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r); tctx 452 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet2 (2)"); tctx 455 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n"); tctx 462 source4/torture/rpc/netlogon.c torture_comment(tctx, tctx 464 source4/torture/rpc/netlogon.c torture_comment(tctx, tctx 469 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r); tctx 470 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet (3)"); tctx 473 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n"); tctx 478 source4/torture/rpc/netlogon.c torture_assert (tctx, tctx 479 source4/torture/rpc/netlogon.c test_SetupCredentials(p, tctx, machine_credentials, &creds), tctx 482 source4/torture/rpc/netlogon.c new_random_pass = netlogon_very_rand_pass(tctx, 128); tctx 492 source4/torture/rpc/netlogon.c torture_comment(tctx, tctx 497 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r); tctx 498 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet (3)"); tctx 501 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n"); tctx 509 source4/torture/rpc/netlogon.c torture_assert (tctx, tctx 510 source4/torture/rpc/netlogon.c test_SetupCredentials(p, tctx, machine_credentials, &creds), tctx 516 source4/torture/rpc/netlogon.c static bool test_GetPassword(struct torture_context *tctx, tctx 527 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) { tctx 533 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 534 source4/torture/rpc/netlogon.c r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME); tctx 541 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordGet(p, tctx, &r); tctx 542 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordGet"); tctx 547 source4/torture/rpc/netlogon.c static bool test_GetTrustPasswords(struct torture_context *tctx, tctx 558 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) { tctx 564 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 565 source4/torture/rpc/netlogon.c r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME); tctx 573 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerTrustPasswordsGet(p, tctx, &r); tctx 574 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerTrustPasswordsGet"); tctx 582 source4/torture/rpc/netlogon.c bool test_netlogon_ops(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 596 source4/torture/rpc/netlogon.c if (lp_client_lanman_auth(tctx->lp_ctx)) { tctx 600 source4/torture/rpc/netlogon.c if (lp_client_ntlmv2_auth(tctx->lp_ctx)) { tctx 604 source4/torture/rpc/netlogon.c cli_credentials_get_ntlm_username_domain(cmdline_credentials, tctx, tctx 613 source4/torture/rpc/netlogon.c names_blob = NTLMv2_generate_names_blob(tctx, cli_credentials_get_workstation(credentials), tctx 616 source4/torture/rpc/netlogon.c status = cli_credentials_get_ntlm_response(cmdline_credentials, tctx, tctx 622 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "cli_credentials_get_ntlm_response failed"); tctx 637 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 654 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r); tctx 655 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed"); tctx 657 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred), tctx 667 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing SamLogon with validation level %d and a NULL credential\n", i); tctx 669 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r); tctx 670 source4/torture/rpc/netlogon.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_PARAMETER, tctx 681 source4/torture/rpc/netlogon.c static bool test_SamLogon(struct torture_context *tctx, tctx 687 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, credentials, &creds)) { tctx 691 source4/torture/rpc/netlogon.c return test_netlogon_ops(p, tctx, credentials, creds); tctx 700 source4/torture/rpc/netlogon.c static bool test_DatabaseSync(struct torture_context *tctx, tctx 712 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) { tctx 718 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 733 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing DatabaseSync of id %d\n", r.in.database_id); tctx 740 source4/torture/rpc/netlogon.c status = dcerpc_netr_DatabaseSync(p, tctx, &r); tctx 748 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DatabaseSync"); tctx 751 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n"); tctx 760 source4/torture/rpc/netlogon.c torture_comment(tctx, "\tsequence_nums[%d]=%llu\n", tctx 774 source4/torture/rpc/netlogon.c static bool test_DatabaseDeltas(struct torture_context *tctx, tctx 787 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) { tctx 791 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 806 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing DatabaseDeltas of id %d at %llu\n", tctx 812 source4/torture/rpc/netlogon.c status = dcerpc_netr_DatabaseDeltas(p, tctx, &r); tctx 815 source4/torture/rpc/netlogon.c torture_comment(tctx, "not considering %s to be an error\n", tctx 822 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DatabaseDeltas"); tctx 825 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n"); tctx 835 source4/torture/rpc/netlogon.c static bool test_DatabaseRedo(struct torture_context *tctx, tctx 851 source4/torture/rpc/netlogon.c sid = dom_sid_parse_talloc(tctx, "S-1-5-21-1111111111-2222222222-333333333-500"); tctx 1086 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-5-32-544"), tctx 1098 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-5-32-544"), tctx 1111 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-5-32-544"), tctx 1172 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-5-32"), tctx 1195 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-1-0"), tctx 1208 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-1-0"), tctx 1221 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-1-0"), tctx 1267 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1291 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing DatabaseRedo\n"); tctx 1293 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) { tctx 1327 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing DatabaseRedo with database %s and %s\n", tctx 1330 source4/torture/rpc/netlogon.c status = dcerpc_netr_DatabaseRedo(p, tctx, &r); tctx 1335 source4/torture/rpc/netlogon.c torture_assert_ntstatus_equal(tctx, status, changes[i].expected_error, changes[i].comment); tctx 1337 source4/torture/rpc/netlogon.c torture_assert_int_equal(tctx, tctx 1342 source4/torture/rpc/netlogon.c torture_assert_int_equal(tctx, tctx 1348 source4/torture/rpc/netlogon.c torture_assert_int_equal(tctx, tctx 1356 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n"); tctx 1357 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) { tctx 1371 source4/torture/rpc/netlogon.c static bool test_AccountDeltas(struct torture_context *tctx, tctx 1385 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) { tctx 1391 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1406 source4/torture/rpc/netlogon.c status = dcerpc_netr_AccountDeltas(p, tctx, &r); tctx 1407 source4/torture/rpc/netlogon.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "AccountDeltas"); tctx 1415 source4/torture/rpc/netlogon.c static bool test_AccountSync(struct torture_context *tctx, struct dcerpc_pipe *p, tctx 1432 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) { tctx 1436 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1452 source4/torture/rpc/netlogon.c status = dcerpc_netr_AccountSync(p, tctx, &r); tctx 1453 source4/torture/rpc/netlogon.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "AccountSync"); tctx 1461 source4/torture/rpc/netlogon.c static bool test_GetDcName(struct torture_context *tctx, tctx 1468 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1469 source4/torture/rpc/netlogon.c r.in.domainname = lp_workgroup(tctx->lp_ctx); tctx 1472 source4/torture/rpc/netlogon.c status = dcerpc_netr_GetDcName(p, tctx, &r); tctx 1473 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "GetDcName"); tctx 1474 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "GetDcName"); tctx 1476 source4/torture/rpc/netlogon.c torture_comment(tctx, "\tDC is at '%s'\n", dcname); tctx 1484 source4/torture/rpc/netlogon.c static bool test_LogonControl(struct torture_context *tctx, tctx 1492 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1499 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl level %d\n", i); tctx 1501 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl(p, tctx, &r); tctx 1502 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl"); tctx 1512 source4/torture/rpc/netlogon.c static bool test_GetAnyDCName(struct torture_context *tctx, tctx 1519 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1520 source4/torture/rpc/netlogon.c r.in.domainname = lp_workgroup(tctx->lp_ctx); tctx 1523 source4/torture/rpc/netlogon.c status = dcerpc_netr_GetAnyDCName(p, tctx, &r); tctx 1524 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "GetAnyDCName"); tctx 1525 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "GetAnyDCName"); tctx 1528 source4/torture/rpc/netlogon.c torture_comment(tctx, "\tDC is at '%s'\n", dcname); tctx 1538 source4/torture/rpc/netlogon.c static bool test_LogonControl2(struct torture_context *tctx, tctx 1547 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx); tctx 1549 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1558 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2 level %d function %d\n", tctx 1561 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2(p, tctx, &r); tctx 1562 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl"); tctx 1565 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx); tctx 1573 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2 level %d function %d\n", tctx 1576 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2(p, tctx, &r); tctx 1577 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl"); tctx 1580 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx); tctx 1588 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2 level %d function %d\n", tctx 1591 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2(p, tctx, &r); tctx 1592 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl"); tctx 1603 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2 level %d function %d\n", tctx 1606 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2(p, tctx, &r); tctx 1607 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl"); tctx 1616 source4/torture/rpc/netlogon.c static bool test_DatabaseSync2(struct torture_context *tctx, tctx 1629 source4/torture/rpc/netlogon.c if (!test_SetupCredentials2(p, tctx, NETLOGON_NEG_AUTH2_FLAGS, tctx 1637 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1653 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing DatabaseSync2 of id %d\n", r.in.database_id); tctx 1660 source4/torture/rpc/netlogon.c status = dcerpc_netr_DatabaseSync2(p, tctx, &r); tctx 1669 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DatabaseSync2"); tctx 1672 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n"); tctx 1685 source4/torture/rpc/netlogon.c static bool test_LogonControl2Ex(struct torture_context *tctx, tctx 1694 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx); tctx 1696 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1705 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n", tctx 1708 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2Ex(p, tctx, &r); tctx 1709 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl"); tctx 1712 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx); tctx 1720 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n", tctx 1723 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2Ex(p, tctx, &r); tctx 1724 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl"); tctx 1727 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx); tctx 1735 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n", tctx 1738 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2Ex(p, tctx, &r); tctx 1739 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl"); tctx 1750 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n", tctx 1753 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2Ex(p, tctx, &r); tctx 1754 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl"); tctx 1760 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetForestTrustInformation(struct torture_context *tctx, tctx 1769 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1774 source4/torture/rpc/netlogon.c torture_comment(tctx ,"Testing netr_DsRGetForestTrustInformation\n"); tctx 1776 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetForestTrustInformation(p, tctx, &r); tctx 1777 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DsRGetForestTrustInformation"); tctx 1778 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "DsRGetForestTrustInformation"); tctx 1786 source4/torture/rpc/netlogon.c static bool test_DsrEnumerateDomainTrusts(struct torture_context *tctx, tctx 1794 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1798 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsrEnumerateDomainTrusts(p, tctx, &r); tctx 1799 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DsrEnumerateDomaintrusts"); tctx 1800 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "DsrEnumerateDomaintrusts"); tctx 1807 source4/torture/rpc/netlogon.c if (!test_netr_DsRGetForestTrustInformation(tctx, p, NULL)) { tctx 1817 source4/torture/rpc/netlogon.c if (!test_netr_DsRGetForestTrustInformation(tctx, p, tctx 1827 source4/torture/rpc/netlogon.c static bool test_netr_NetrEnumerateTrustedDomains(struct torture_context *tctx, tctx 1834 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1837 source4/torture/rpc/netlogon.c status = dcerpc_netr_NetrEnumerateTrustedDomains(p, tctx, &r); tctx 1838 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_NetrEnumerateTrustedDomains"); tctx 1839 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "NetrEnumerateTrustedDomains"); tctx 1844 source4/torture/rpc/netlogon.c static bool test_netr_NetrEnumerateTrustedDomainsEx(struct torture_context *tctx, tctx 1851 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1854 source4/torture/rpc/netlogon.c status = dcerpc_netr_NetrEnumerateTrustedDomainsEx(p, tctx, &r); tctx 1855 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_NetrEnumerateTrustedDomainsEx"); tctx 1856 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "NetrEnumerateTrustedDomainsEx"); tctx 1862 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetSiteName(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1870 source4/torture/rpc/netlogon.c if (torture_setting_bool(tctx, "samba4", false)) tctx 1871 source4/torture/rpc/netlogon.c torture_skip(tctx, "skipping DsRGetSiteName test against Samba4"); tctx 1875 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_DsRGetSiteName\n"); tctx 1877 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetSiteName(p, tctx, &r); tctx 1878 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DsRGetSiteName"); tctx 1879 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "DsRGetSiteName"); tctx 1880 source4/torture/rpc/netlogon.c torture_assert_str_equal(tctx, expected_site, site, "netr_DsRGetSiteName"); tctx 1882 source4/torture/rpc/netlogon.c r.in.computer_name = talloc_asprintf(tctx, "\\\\%s", computer_name); tctx 1883 source4/torture/rpc/netlogon.c torture_comment(tctx, tctx 1886 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetSiteName(p, tctx, &r); tctx 1887 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DsRGetSiteName"); tctx 1888 source4/torture/rpc/netlogon.c torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_COMPUTERNAME, "netr_DsRGetSiteName"); tctx 1896 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetDCName(struct torture_context *tctx, tctx 1903 source4/torture/rpc/netlogon.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1904 source4/torture/rpc/netlogon.c r.in.domain_name = talloc_asprintf(tctx, "%s", lp_realm(tctx->lp_ctx)); tctx 1910 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetDCName(p, tctx, &r); tctx 1911 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DsRGetDCName"); tctx 1912 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "DsRGetDCName"); tctx 1913 source4/torture/rpc/netlogon.c return test_netr_DsRGetSiteName(p, tctx, tctx 1921 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetDCNameEx(struct torture_context *tctx, tctx 1928 source4/torture/rpc/netlogon.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1929 source4/torture/rpc/netlogon.c r.in.domain_name = talloc_asprintf(tctx, "%s", lp_realm(tctx->lp_ctx)); tctx 1935 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetDCNameEx(p, tctx, &r); tctx 1936 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_DsRGetDCNameEx"); tctx 1937 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "netr_DsRGetDCNameEx"); tctx 1939 source4/torture/rpc/netlogon.c return test_netr_DsRGetSiteName(p, tctx, info->dc_unc, tctx 1946 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetDCNameEx2(struct torture_context *tctx, tctx 1953 source4/torture/rpc/netlogon.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1956 source4/torture/rpc/netlogon.c r.in.domain_name = talloc_asprintf(tctx, "%s", lp_realm(tctx->lp_ctx)); tctx 1962 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_DsRGetDCNameEx2 without client account\n"); tctx 1964 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetDCNameEx2(p, tctx, &r); tctx 1965 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_DsRGetDCNameEx2"); tctx 1966 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "netr_DsRGetDCNameEx2"); tctx 1968 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_DsRGetDCNameEx2 with client acount\n"); tctx 1974 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetDCNameEx2(p, tctx, &r); tctx 1975 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_DsRGetDCNameEx2"); tctx 1976 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "netr_DsRGetDCNameEx2"); tctx 1977 source4/torture/rpc/netlogon.c return test_netr_DsRGetSiteName(p, tctx, info->dc_unc, tctx 1981 source4/torture/rpc/netlogon.c static bool test_netr_DsrGetDcSiteCoverageW(struct torture_context *tctx, tctx 1988 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1991 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsrGetDcSiteCoverageW(p, tctx, &r); tctx 1992 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "failed"); tctx 1993 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "failed"); tctx 1998 source4/torture/rpc/netlogon.c static bool test_netr_DsRAddressToSitenamesW(struct torture_context *tctx, tctx 2006 source4/torture/rpc/netlogon.c ctr = talloc(tctx, struct netr_DsRAddressToSitenamesWCtr); tctx 2009 source4/torture/rpc/netlogon.c addr.buffer = talloc_zero_array(tctx, uint8_t, addr.size); tctx 2017 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 2019 source4/torture/rpc/netlogon.c r.in.addresses = talloc_zero_array(tctx, struct netr_DsRAddress, r.in.count); tctx 2023 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRAddressToSitenamesW(p, tctx, &r); tctx 2024 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "failed"); tctx 2025 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "failed"); tctx 2030 source4/torture/rpc/netlogon.c static bool test_netr_DsRAddressToSitenamesExW(struct torture_context *tctx, tctx 2038 source4/torture/rpc/netlogon.c ctr = talloc(tctx, struct netr_DsRAddressToSitenamesExWCtr); tctx 2041 source4/torture/rpc/netlogon.c addr.buffer = talloc_zero_array(tctx, uint8_t, addr.size); tctx 2049 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 2051 source4/torture/rpc/netlogon.c r.in.addresses = talloc_zero_array(tctx, struct netr_DsRAddress, r.in.count); tctx 2055 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRAddressToSitenamesExW(p, tctx, &r); tctx 2056 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "failed"); tctx 2057 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "failed"); tctx 2062 source4/torture/rpc/netlogon.c static bool test_netr_ServerGetTrustInfo(struct torture_context *tctx, tctx 2077 source4/torture/rpc/netlogon.c if (!test_SetupCredentials3(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS, tctx 2084 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 2085 source4/torture/rpc/netlogon.c r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME); tctx 2095 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerGetTrustInfo(p, tctx, &r); tctx 2096 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "failed"); tctx 2097 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &return_authenticator.cred), "Credential chaining failed"); tctx 2103 source4/torture/rpc/netlogon.c static bool test_GetDomainInfo(struct torture_context *tctx, tctx 2114 source4/torture/rpc/netlogon.c if (!test_SetupCredentials3(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS, tctx 2123 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 2142 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_LogonGetDomainInfo\n"); tctx 2144 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonGetDomainInfo(p, tctx, &r); tctx 2145 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_LogonGetDomainInfo"); tctx 2146 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &a.cred), "Credential chaining failed"); tctx 2148 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_LogonGetDomainInfo 2nd call\n"); tctx 2151 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonGetDomainInfo(p, tctx, &r); tctx 2152 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_LogonGetDomainInfo"); tctx 2153 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &a.cred), "Credential chaining failed"); tctx 2167 source4/torture/rpc/netlogon.c static bool test_GetDomainInfo_async(struct torture_context *tctx, tctx 2180 source4/torture/rpc/netlogon.c int *async_counter = talloc(tctx, int); tctx 2183 source4/torture/rpc/netlogon.c if (!test_SetupCredentials3(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS, tctx 2189 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 2208 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_LogonGetDomainInfo - async count %d\n", ASYNC_COUNT); tctx 2216 source4/torture/rpc/netlogon.c req[i] = dcerpc_netr_LogonGetDomainInfo_send(p, tctx, &r); tctx 2223 source4/torture/rpc/netlogon.c torture_assert_int_equal(tctx, event_loop_once(dcerpc_event_context(p)), 0, tctx 2230 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_LogonGetDomainInfo_async"); tctx 2231 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, r.out.result, "netr_LogonGetDomainInfo_async"); tctx 2233 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds_async[i], &a.cred), tctx 2237 source4/torture/rpc/netlogon.c torture_comment(tctx, tctx 2240 source4/torture/rpc/netlogon.c torture_assert_int_equal(tctx, (*async_counter), ASYNC_COUNT, "int"); tctx 2245 source4/torture/rpc/netlogon.c static bool test_ManyGetDCName(struct torture_context *tctx, tctx 2267 source4/torture/rpc/netlogon.c torture_comment(tctx, "Torturing GetDCName\n"); tctx 2270 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "Failed to create secondary connection"); tctx 2273 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "Failed to create bind on secondary connection"); tctx 2292 source4/torture/rpc/netlogon.c status = dcerpc_lsa_OpenPolicy2(p2, tctx, &o); tctx 2293 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "OpenPolicy2 failed"); tctx 2301 source4/torture/rpc/netlogon.c status = dcerpc_lsa_EnumTrustDom(p2, tctx, &t); tctx 2305 source4/torture/rpc/netlogon.c torture_fail(tctx, "Could not list domains"); tctx 2309 source4/torture/rpc/netlogon.c d.in.logon_server = talloc_asprintf(tctx, "\\\\%s", tctx 2319 source4/torture/rpc/netlogon.c status = dcerpc_netr_GetAnyDCName(p, tctx, &d); tctx 2320 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "GetAnyDCName"); tctx 2322 source4/torture/rpc/netlogon.c torture_comment(tctx, "\tDC for domain %s is %s\n", info->name.string, tctx 2 source4/torture/rpc/netlogon.h bool test_SetupCredentials2(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 29 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetVersion(struct torture_context *tctx, tctx 38 source4/torture/rpc/ntsvcs.c status = dcerpc_PNP_GetVersion(p, tctx, &r); tctx 40 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, status, "PNP_GetVersion"); tctx 41 source4/torture/rpc/ntsvcs.c torture_assert_werr_ok(tctx, r.out.result, "PNP_GetVersion"); tctx 42 source4/torture/rpc/ntsvcs.c torture_assert_int_equal(tctx, version, 0x400, "invalid version"); tctx 47 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetDeviceListSize(struct torture_context *tctx, tctx 57 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, tctx 58 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceListSize(p, tctx, &r), tctx 60 source4/torture/rpc/ntsvcs.c torture_assert_werr_equal(tctx, r.out.result, WERR_CM_INVALID_POINTER, tctx 65 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, tctx 66 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceListSize(p, tctx, &r), tctx 68 source4/torture/rpc/ntsvcs.c torture_assert_werr_ok(tctx, r.out.result, tctx 74 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetDeviceList(struct torture_context *tctx, tctx 81 source4/torture/rpc/ntsvcs.c buffer = talloc_array(tctx, uint16_t, 0); tctx 89 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, tctx 90 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceList(p, tctx, &r), tctx 92 source4/torture/rpc/ntsvcs.c torture_assert_werr_equal(tctx, r.out.result, WERR_CM_INVALID_POINTER, tctx 97 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, tctx 98 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceList(p, tctx, &r), tctx 108 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, tctx 109 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceListSize(p, tctx, &s), tctx 111 source4/torture/rpc/ntsvcs.c torture_assert_werr_ok(tctx, s.out.result, tctx 115 source4/torture/rpc/ntsvcs.c buffer = talloc_array(tctx, uint16_t, length); tctx 121 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, tctx 122 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceList(p, tctx, &r), tctx 125 source4/torture/rpc/ntsvcs.c torture_assert_werr_ok(tctx, r.out.result, tctx 131 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetDeviceRegProp(struct torture_context *tctx, tctx 142 source4/torture/rpc/ntsvcs.c buffer = talloc(tctx, uint8_t); tctx 155 source4/torture/rpc/ntsvcs.c status = dcerpc_PNP_GetDeviceRegProp(p, tctx, &r); tctx 156 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, status, "PNP_GetDeviceRegProp"); tctx 160 source4/torture/rpc/ntsvcs.c buffer = talloc_array(tctx, uint8_t, needed); tctx 163 source4/torture/rpc/ntsvcs.c status = dcerpc_PNP_GetDeviceRegProp(p, tctx, &r); tctx 164 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, status, "PNP_GetDeviceRegProp"); tctx 34 source4/torture/rpc/oxidresolve.c static bool test_RemoteActivation(struct torture_context *tctx, tctx 43 source4/torture/rpc/oxidresolve.c status = torture_rpc_connection(tctx, &p, tctx 64 source4/torture/rpc/oxidresolve.c status = dcerpc_RemoteActivation(p, tctx, &r); tctx 88 source4/torture/rpc/oxidresolve.c static bool test_SimplePing(struct torture_context *tctx, tctx 97 source4/torture/rpc/oxidresolve.c status = dcerpc_SimplePing(p, tctx, &r); tctx 98 source4/torture/rpc/oxidresolve.c torture_assert_ntstatus_ok(tctx, status, "SimplePing"); tctx 99 source4/torture/rpc/oxidresolve.c torture_assert_werr_ok(tctx, r.out.result, "SimplePing"); tctx 104 source4/torture/rpc/oxidresolve.c static bool test_ComplexPing(struct torture_context *tctx, tctx 113 source4/torture/rpc/oxidresolve.c if (!test_RemoteActivation(tctx, &oxid, &oid)) tctx 124 source4/torture/rpc/oxidresolve.c status = dcerpc_ComplexPing(p, tctx, &r); tctx 140 source4/torture/rpc/oxidresolve.c static bool test_ServerAlive(struct torture_context *tctx, tctx 146 source4/torture/rpc/oxidresolve.c status = dcerpc_ServerAlive(p, tctx, &r); tctx 147 source4/torture/rpc/oxidresolve.c torture_assert_ntstatus_ok(tctx, status, "ServerAlive"); tctx 148 source4/torture/rpc/oxidresolve.c torture_assert_werr_ok(tctx, r.out.result, "ServerAlive"); tctx 153 source4/torture/rpc/oxidresolve.c static bool test_ResolveOxid(struct torture_context *tctx, tctx 162 source4/torture/rpc/oxidresolve.c if (!test_RemoteActivation(tctx, &oxid, &oid)) tctx 169 source4/torture/rpc/oxidresolve.c status = dcerpc_ResolveOxid(p, tctx, &r); tctx 170 source4/torture/rpc/oxidresolve.c torture_assert_ntstatus_ok(tctx, status, "ResolveOxid"); tctx 171 source4/torture/rpc/oxidresolve.c torture_assert_werr_ok(tctx, r.out.result, "ResolveOxid"); tctx 176 source4/torture/rpc/oxidresolve.c static bool test_ResolveOxid2(struct torture_context *tctx, tctx 185 source4/torture/rpc/oxidresolve.c if (!test_RemoteActivation(tctx, &oxid, &oid)) tctx 192 source4/torture/rpc/oxidresolve.c status = dcerpc_ResolveOxid2(p, tctx, &r); tctx 193 source4/torture/rpc/oxidresolve.c torture_assert_ntstatus_ok(tctx, status, "ResolveOxid2"); tctx 195 source4/torture/rpc/oxidresolve.c torture_assert_werr_ok(tctx, r.out.result, "ResolveOxid2"); tctx 197 source4/torture/rpc/oxidresolve.c torture_comment(tctx, "Remote server versions: %d, %d\n", r.out.ComVersion->MajorVersion, r.out.ComVersion->MinorVersion); tctx 202 source4/torture/rpc/oxidresolve.c static bool test_ServerAlive2(struct torture_context *tctx, tctx 208 source4/torture/rpc/oxidresolve.c status = dcerpc_ServerAlive2(p, tctx, &r); tctx 209 source4/torture/rpc/oxidresolve.c torture_assert_ntstatus_ok(tctx, status, "ServerAlive2"); tctx 210 source4/torture/rpc/oxidresolve.c torture_assert_werr_ok(tctx, r.out.result, "ServerAlive2"); tctx 31 source4/torture/rpc/remact.c static bool test_RemoteActivation(struct torture_context *tctx, tctx 51 source4/torture/rpc/remact.c status = dcerpc_RemoteActivation(p, tctx, &r); tctx 52 source4/torture/rpc/remact.c torture_assert_ntstatus_ok(tctx, status, "RemoteActivation"); tctx 54 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, r.out.result, "RemoteActivation"); tctx 56 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, *r.out.hr, "RemoteActivation"); tctx 58 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, r.out.results[0], "RemoteActivation"); tctx 64 source4/torture/rpc/remact.c status = dcerpc_RemoteActivation(p, tctx, &r); tctx 65 source4/torture/rpc/remact.c torture_assert_ntstatus_ok(tctx, status, tctx 68 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, r.out.result, tctx 71 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, *r.out.hr, "RemoteActivation(GetClassObject)"); tctx 73 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, r.out.results[0], tctx 43 source4/torture/rpc/remote_pac.c static bool test_PACVerify(struct torture_context *tctx, tctx 73 source4/torture/rpc/remote_pac.c TALLOC_CTX *tmp_ctx = talloc_new(tctx); tctx 75 source4/torture/rpc/remote_pac.c torture_assert(tctx, tmp_ctx != NULL, "talloc_new() failed"); tctx 77 source4/torture/rpc/remote_pac.c if (!test_SetupCredentials2(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS, tctx 83 source4/torture/rpc/remote_pac.c status = torture_temp_dir(tctx, "PACVerify", &tmp_dir); tctx 84 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "torture_temp_dir failed"); tctx 86 source4/torture/rpc/remote_pac.c status = gensec_client_start(tctx, &gensec_client_context, tctx->ev, tctx 87 source4/torture/rpc/remote_pac.c lp_gensec_settings(tctx, tctx->lp_ctx)); tctx 88 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_client_start (client) failed"); tctx 93 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_set_credentials (client) failed"); tctx 96 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_start_mech_by_sasl_name (client) failed"); tctx 98 source4/torture/rpc/remote_pac.c status = gensec_server_start(tctx, tctx->ev, tctx 99 source4/torture/rpc/remote_pac.c lp_gensec_settings(tctx, tctx->lp_ctx), tctx 101 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_server_start (server) failed"); tctx 104 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_set_credentials (server) failed"); tctx 107 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_start_mech_by_sasl_name (server) failed"); tctx 115 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_update (client) failed"); tctx 120 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_update (server) failed"); tctx 131 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_session_info failed"); tctx 147 source4/torture/rpc/remote_pac.c ndr_err = ndr_push_struct_blob(&pac_wrapped, tmp_ctx, lp_iconv_convenience(tctx->lp_ctx), &pac_wrapped_struct, tctx 149 source4/torture/rpc/remote_pac.c torture_assert(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), "ndr_push_struct_blob of PACValidate structure failed"); tctx 151 source4/torture/rpc/remote_pac.c torture_assert(tctx, (creds->negotiate_flags & NETLOGON_NEG_ARCFOUR), "not willing to even try a PACValidate without RC4 encryption"); tctx 176 source4/torture/rpc/remote_pac.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 183 source4/torture/rpc/remote_pac.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r); tctx 185 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed"); tctx 198 source4/torture/rpc/remote_pac.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 202 source4/torture/rpc/remote_pac.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r); tctx 204 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_LOGON_FAILURE, "LogonSamLogon failed"); tctx 206 source4/torture/rpc/remote_pac.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred), tctx 220 source4/torture/rpc/remote_pac.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 224 source4/torture/rpc/remote_pac.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r); tctx 226 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_PARAMETER, "LogonSamLogon failed"); tctx 228 source4/torture/rpc/remote_pac.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred), tctx 249 source4/torture/rpc/remote_pac.c ndr_err = ndr_push_struct_blob(&pac_wrapped, tmp_ctx, lp_iconv_convenience(tctx->lp_ctx), &pac_wrapped_struct, tctx 251 source4/torture/rpc/remote_pac.c torture_assert(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), "ndr_push_struct_blob of PACValidate structure failed"); tctx 253 source4/torture/rpc/remote_pac.c torture_assert(tctx, (creds->negotiate_flags & NETLOGON_NEG_ARCFOUR), "not willing to even try a PACValidate without RC4 encryption"); tctx 267 source4/torture/rpc/remote_pac.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 271 source4/torture/rpc/remote_pac.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r); tctx 273 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_LOGON_FAILURE, "LogonSamLogon failed"); tctx 275 source4/torture/rpc/remote_pac.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred), tctx 296 source4/torture/rpc/remote_pac.c ndr_err = ndr_push_struct_blob(&pac_wrapped, tmp_ctx, lp_iconv_convenience(tctx->lp_ctx), &pac_wrapped_struct, tctx 298 source4/torture/rpc/remote_pac.c torture_assert(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), "ndr_push_struct_blob of PACValidate structure failed"); tctx 300 source4/torture/rpc/remote_pac.c torture_assert(tctx, (creds->negotiate_flags & NETLOGON_NEG_ARCFOUR), "not willing to even try a PACValidate without RC4 encryption"); tctx 314 source4/torture/rpc/remote_pac.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 318 source4/torture/rpc/remote_pac.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r); tctx 320 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_PARAMETER, "LogonSamLogon failed"); tctx 322 source4/torture/rpc/remote_pac.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred), tctx 47 source4/torture/rpc/rpc.c NTSTATUS torture_rpc_binding(struct torture_context *tctx, tctx 51 source4/torture/rpc/rpc.c const char *binding_string = torture_setting_string(tctx, "binding", tctx 55 source4/torture/rpc/rpc.c torture_comment(tctx, tctx 60 source4/torture/rpc/rpc.c status = dcerpc_parse_binding(tctx, binding_string, binding); tctx 73 source4/torture/rpc/rpc.c _PUBLIC_ NTSTATUS torture_rpc_connection(struct torture_context *tctx, tctx 80 source4/torture/rpc/rpc.c dcerpc_init(tctx->lp_ctx); tctx 82 source4/torture/rpc/rpc.c status = torture_rpc_binding(tctx, &binding); tctx 86 source4/torture/rpc/rpc.c status = dcerpc_pipe_connect_b(tctx, tctx 88 source4/torture/rpc/rpc.c cmdline_credentials, tctx->ev, tctx->lp_ctx); tctx 92 source4/torture/rpc/rpc.c dcerpc_binding_string(tctx, binding), nt_errstr(status)); tctx 101 source4/torture/rpc/rpc.c NTSTATUS torture_rpc_connection_transport(struct torture_context *tctx, tctx 110 source4/torture/rpc/rpc.c status = torture_rpc_binding(tctx, &binding); tctx 117 source4/torture/rpc/rpc.c status = dcerpc_pipe_connect_b(tctx, p, binding, table, tctx 118 source4/torture/rpc/rpc.c cmdline_credentials, tctx->ev, tctx->lp_ctx); tctx 127 source4/torture/rpc/rpc.c static bool torture_rpc_setup_machine(struct torture_context *tctx, tctx 132 source4/torture/rpc/rpc.c struct torture_rpc_tcase *tcase = talloc_get_type(tctx->active_tcase, tctx 136 source4/torture/rpc/rpc.c status = torture_rpc_binding(tctx, &binding); tctx 140 source4/torture/rpc/rpc.c *data = tcase_data = talloc_zero(tctx, struct torture_rpc_tcase_data); tctx 142 source4/torture/rpc/rpc.c tcase_data->join_ctx = torture_join_domain(tctx, tcase->machine_name, tctx 146 source4/torture/rpc/rpc.c torture_fail(tctx, "Failed to join as BDC"); tctx 148 source4/torture/rpc/rpc.c status = dcerpc_pipe_connect_b(tctx, tctx 152 source4/torture/rpc/rpc.c tcase_data->credentials, tctx->ev, tctx->lp_ctx); tctx 154 source4/torture/rpc/rpc.c torture_assert_ntstatus_ok(tctx, status, "Error connecting to server"); tctx 190 source4/torture/rpc/rpc.c static bool torture_rpc_setup_anonymous(struct torture_context *tctx, tctx 196 source4/torture/rpc/rpc.c struct torture_rpc_tcase *tcase = talloc_get_type(tctx->active_tcase, tctx 199 source4/torture/rpc/rpc.c status = torture_rpc_binding(tctx, &binding); tctx 203 source4/torture/rpc/rpc.c *data = tcase_data = talloc_zero(tctx, struct torture_rpc_tcase_data); tctx 204 source4/torture/rpc/rpc.c tcase_data->credentials = cli_credentials_init_anon(tctx); tctx 206 source4/torture/rpc/rpc.c status = dcerpc_pipe_connect_b(tctx, tctx 210 source4/torture/rpc/rpc.c tcase_data->credentials, tctx->ev, tctx->lp_ctx); tctx 212 source4/torture/rpc/rpc.c torture_assert_ntstatus_ok(tctx, status, "Error connecting to server"); tctx 217 source4/torture/rpc/rpc.c static bool torture_rpc_setup (struct torture_context *tctx, void **data) tctx 221 source4/torture/rpc/rpc.c tctx->active_tcase, struct torture_rpc_tcase); tctx 224 source4/torture/rpc/rpc.c *data = tcase_data = talloc_zero(tctx, struct torture_rpc_tcase_data); tctx 227 source4/torture/rpc/rpc.c status = torture_rpc_connection(tctx, tctx 231 source4/torture/rpc/rpc.c torture_assert_ntstatus_ok(tctx, status, "Error connecting to server"); tctx 267 source4/torture/rpc/rpc.c static bool torture_rpc_wrap_test(struct torture_context *tctx, tctx 277 source4/torture/rpc/rpc.c return fn(tctx, tcase_data->pipe); tctx 280 source4/torture/rpc/rpc.c static bool torture_rpc_wrap_test_ex(struct torture_context *tctx, tctx 290 source4/torture/rpc/rpc.c return fn(tctx, tcase_data->pipe, test->data); tctx 294 source4/torture/rpc/rpc.c static bool torture_rpc_wrap_test_creds(struct torture_context *tctx, tctx 304 source4/torture/rpc/rpc.c return fn(tctx, tcase_data->pipe, tcase_data->credentials); tctx 44 source4/torture/rpc/rpc.h NTSTATUS torture_rpc_connection(struct torture_context *tctx, tctx 48 source4/torture/rpc/rpc.h struct test_join *torture_join_domain(struct torture_context *tctx, tctx 53 source4/torture/rpc/rpc.h void torture_leave_domain(struct torture_context *tctx, struct test_join *join); tctx 1347 source4/torture/rpc/samba3rpc.c static bool test_join3(struct torture_context *tctx, tctx 1360 source4/torture/rpc/samba3rpc.c lp_smbcli_options(tctx->lp_ctx, &options); tctx 1361 source4/torture/rpc/samba3rpc.c lp_smbcli_session_options(tctx->lp_ctx, &session_options); tctx 1363 source4/torture/rpc/samba3rpc.c status = smbcli_full_connection(tctx, &cli, tctx 1364 source4/torture/rpc/samba3rpc.c torture_setting_string(tctx, "host", NULL), tctx 1365 source4/torture/rpc/samba3rpc.c lp_smb_ports(tctx->lp_ctx), tctx 1366 source4/torture/rpc/samba3rpc.c "IPC$", NULL, lp_socket_options(tctx->lp_ctx), tctx 1367 source4/torture/rpc/samba3rpc.c smb_creds, lp_resolve_context(tctx->lp_ctx), tctx 1368 source4/torture/rpc/samba3rpc.c tctx->ev, &options, &session_options, tctx 1369 source4/torture/rpc/samba3rpc.c lp_iconv_convenience(tctx->lp_ctx), tctx 1370 source4/torture/rpc/samba3rpc.c lp_gensec_settings(tctx, tctx->lp_ctx)); tctx 1383 source4/torture/rpc/samba3rpc.c cli_credentials_set_conf(wks_creds, tctx->lp_ctx); tctx 1391 source4/torture/rpc/samba3rpc.c if (!join3(cli, tctx->lp_ctx, use_level25, samr_creds, wks_creds)) { tctx 1400 source4/torture/rpc/samba3rpc.c if (!auth2(cli, tctx->lp_ctx, wks_creds)) { tctx 1405 source4/torture/rpc/samba3rpc.c if (!leave(cli, tctx->lp_ctx, samr_creds, wks_creds)) { tctx 1316 source4/torture/rpc/samlogon.c struct torture_context *tctx, tctx 1348 source4/torture/rpc/samlogon.c samlogon_state.workgroup = lp_workgroup(tctx->lp_ctx); tctx 1349 source4/torture/rpc/samlogon.c samlogon_state.netbios_name = lp_netbios_name(tctx->lp_ctx); tctx 1356 source4/torture/rpc/samlogon.c samlogon_state.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx); tctx 58 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 62 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 66 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 70 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 91 source4/torture/rpc/samr.c bool test_samr_handle_Close(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 100 source4/torture/rpc/samr.c status = dcerpc_samr_Close(p, tctx, &r); tctx 101 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "Close"); tctx 106 source4/torture/rpc/samr.c static bool test_Shutdown(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 112 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "dangerous", false)) { tctx 113 source4/torture/rpc/samr.c torture_skip(tctx, "samr_Shutdown disabled - enable dangerous tests to use\n"); tctx 119 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Shutdown\n"); tctx 121 source4/torture/rpc/samr.c status = dcerpc_samr_Shutdown(p, tctx, &r); tctx 122 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "samr_Shutdown"); tctx 127 source4/torture/rpc/samr.c static bool test_SetDsrmPassword(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 135 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "dangerous", false)) { tctx 136 source4/torture/rpc/samr.c torture_skip(tctx, "samr_SetDsrmPassword disabled - enable dangerous tests to use"); tctx 147 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_SetDsrmPassword\n"); tctx 149 source4/torture/rpc/samr.c status = dcerpc_samr_SetDsrmPassword(p, tctx, &r); tctx 150 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_SUPPORTED, "samr_SetDsrmPassword"); tctx 157 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 169 source4/torture/rpc/samr.c status = dcerpc_samr_QuerySecurity(p, tctx, &r); tctx 170 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "QuerySecurity"); tctx 172 source4/torture/rpc/samr.c torture_assert(tctx, sdbuf != NULL, "sdbuf is NULL"); tctx 178 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba4", false)) { tctx 179 source4/torture/rpc/samr.c torture_skip(tctx, "skipping SetSecurity test against Samba4\n"); tctx 182 source4/torture/rpc/samr.c status = dcerpc_samr_SetSecurity(p, tctx, &s); tctx 183 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "SetSecurity"); tctx 185 source4/torture/rpc/samr.c status = dcerpc_samr_QuerySecurity(p, tctx, &r); tctx 186 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "QuerySecurity"); tctx 192 source4/torture/rpc/samr.c static bool test_SetUserInfo(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 208 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 226 source4/torture/rpc/samr.c status = dcerpc_samr_ ##call(p, tctx, &r); \ tctx 228 source4/torture/rpc/samr.c torture_comment(tctx, #call " level %u failed - %s (%s)\n", \ tctx 236 source4/torture/rpc/samr.c torture_comment(tctx, "Failed to set %s to '%s' (%s)\n", \ tctx 244 source4/torture/rpc/samr.c torture_comment(tctx, "Failed to set %s to '%s' (%s)\n", \ tctx 252 source4/torture/rpc/samr.c torture_comment(tctx, "Failed to set %s to 0x%llx - got 0x%llx (%s)\n", \ tctx 259 source4/torture/rpc/samr.c torture_comment(tctx, "field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \ tctx 283 source4/torture/rpc/samr.c torture_comment(tctx, "field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \ tctx 307 source4/torture/rpc/samr.c torture_comment(tctx, "field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \ tctx 343 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 350 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-1", base_account_name); tctx 352 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-3", base_account_name); tctx 354 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-5", base_account_name); tctx 356 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-6", base_account_name); tctx 358 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-7", base_account_name); tctx 360 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-21", base_account_name); tctx 445 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 460 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 524 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 609 source4/torture/rpc/samr.c static bool test_SetUserPass(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 624 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp); tctx 628 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 646 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 24 (set password)\n"); tctx 648 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 661 source4/torture/rpc/samr.c static bool test_SetUserPass_23(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 677 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp); tctx 681 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 702 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 23 (set password)\n"); tctx 704 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 726 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 23 (set password) with wrong password\n"); tctx 728 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 739 source4/torture/rpc/samr.c static bool test_SetUserPassEx(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 748 source4/torture/rpc/samr.c DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16); tctx 758 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp); tctx 763 source4/torture/rpc/samr.c newpass = samr_rand_pass_fixed_len(tctx, policy_min_pw_len - 1); tctx 765 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 792 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 26 (set password ex)\n"); tctx 794 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 809 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 26 (set password ex) with wrong session key\n"); tctx 811 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 823 source4/torture/rpc/samr.c static bool test_SetUserPass_25(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 832 source4/torture/rpc/samr.c DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16); tctx 842 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp); tctx 846 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 875 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 25 (set password ex)\n"); tctx 877 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 892 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 25 (set password ex) with wrong session key\n"); tctx 894 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 904 source4/torture/rpc/samr.c static bool test_SetUserPass_18(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 921 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp); tctx 925 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 949 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16); tctx 956 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16); tctx 961 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 18 (set password hash)\n"); tctx 963 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 975 source4/torture/rpc/samr.c static bool test_SetUserPass_21(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 993 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp); tctx 997 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 1035 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16); tctx 1044 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16); tctx 1049 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 21 (set password hash)\n"); tctx 1051 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 1065 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 1078 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 1091 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 1106 source4/torture/rpc/samr.c DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16); tctx 1119 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp); tctx 1123 source4/torture/rpc/samr.c newpass = samr_rand_pass_silent(tctx, policy_min_pw_len); tctx 1136 source4/torture/rpc/samr.c comment = talloc_asprintf(tctx, "comment: %ld\n", time(NULL)); tctx 1226 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16); tctx 1233 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16); tctx 1244 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16); tctx 1252 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16); tctx 1274 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo2(p, tctx, &s2); tctx 1276 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 1290 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, tctx 1294 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, tctx 1313 source4/torture/rpc/samr.c static bool test_SetAliasInfo(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1329 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetAliasInfo level %u\n", levels[i]); tctx 1333 source4/torture/rpc/samr.c r.in.info = talloc(tctx, union samr_AliasInfo); tctx 1341 source4/torture/rpc/samr.c status = dcerpc_samr_SetAliasInfo(p, tctx, &r); tctx 1352 source4/torture/rpc/samr.c status = dcerpc_samr_QueryAliasInfo(p, tctx, &q); tctx 1363 source4/torture/rpc/samr.c static bool test_GetGroupsForUser(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1370 source4/torture/rpc/samr.c torture_comment(tctx, "testing GetGroupsForUser\n"); tctx 1375 source4/torture/rpc/samr.c status = dcerpc_samr_GetGroupsForUser(p, tctx, &r); tctx 1376 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetGroupsForUser"); tctx 1382 source4/torture/rpc/samr.c static bool test_GetDomPwInfo(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1392 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string); tctx 1394 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &r); tctx 1395 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo"); tctx 1397 source4/torture/rpc/samr.c r.in.domain_name->string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1398 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string); tctx 1400 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &r); tctx 1401 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo"); tctx 1404 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string); tctx 1406 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &r); tctx 1407 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo"); tctx 1410 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string); tctx 1412 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &r); tctx 1413 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo"); tctx 1418 source4/torture/rpc/samr.c static bool test_GetUserPwInfo(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1425 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetUserPwInfo\n"); tctx 1430 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &r); tctx 1431 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetUserPwInfo"); tctx 1436 source4/torture/rpc/samr.c static NTSTATUS test_LookupName(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1452 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n); tctx 1461 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n); tctx 1471 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n); tctx 1479 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n); tctx 1491 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n); tctx 1504 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 1512 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, domain_handle, name, &rid); tctx 1521 source4/torture/rpc/samr.c status = dcerpc_samr_OpenUser(p, tctx, &r); tctx 1531 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 1544 source4/torture/rpc/samr.c status = test_OpenUser_byname(p, tctx, handle, "testuser", &user_handle); tctx 1578 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r); tctx 1584 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &user_handle)) { tctx 1592 source4/torture/rpc/samr.c static bool test_ChangePasswordUser(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1611 source4/torture/rpc/samr.c status = test_OpenUser_byname(p, tctx, handle, acct_name, &user_handle); tctx 1618 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp); tctx 1622 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 1624 source4/torture/rpc/samr.c torture_comment(tctx, "Testing ChangePasswordUser\n"); tctx 1626 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL, tctx 1657 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r); tctx 1658 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_WRONG_PASSWORD, tctx 1678 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r); tctx 1679 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_WRONG_PASSWORD, tctx 1699 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r); tctx 1722 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r); tctx 1752 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r); tctx 1762 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 1790 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r); tctx 1800 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 1828 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r); tctx 1852 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r); tctx 1862 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &user_handle)) { tctx 1870 source4/torture/rpc/samr.c static bool test_OemChangePasswordUser2(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1894 source4/torture/rpc/samr.c torture_comment(tctx, "Testing OemChangePasswordUser2\n"); tctx 1896 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL, tctx 1901 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &dom_pw_info); tctx 1906 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 1908 source4/torture/rpc/samr.c server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1926 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r); tctx 1948 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r); tctx 1965 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r); tctx 1978 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r); tctx 1992 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r); tctx 2006 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r); tctx 2026 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r); tctx 2040 source4/torture/rpc/samr.c static bool test_ChangePasswordUser2(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 2064 source4/torture/rpc/samr.c torture_comment(tctx, "Testing ChangePasswordUser2 on %s\n", acct_name); tctx 2066 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL, tctx 2072 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &dom_pw_info); tctx 2077 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 2080 source4/torture/rpc/samr.c server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 2105 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser2(p, tctx, &r); tctx 2119 source4/torture/rpc/samr.c bool test_ChangePasswordUser3(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 2140 source4/torture/rpc/samr.c torture_comment(tctx, "Testing ChangePasswordUser3\n"); tctx 2145 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len); tctx 2147 source4/torture/rpc/samr.c newpass = samr_rand_pass_fixed_len(tctx, policy_min_pw_len); tctx 2151 source4/torture/rpc/samr.c torture_comment(tctx, "Using password '%s'\n", newpass); tctx 2154 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL, tctx 2158 source4/torture/rpc/samr.c server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 2189 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r); tctx 2220 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r); tctx 2229 source4/torture/rpc/samr.c init_lsa_String(&account_bad, talloc_asprintf(tctx, "%sXX", account_string)); tctx 2232 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r); tctx 2266 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r); tctx 2329 source4/torture/rpc/samr.c return test_ChangePasswordUser3(p, tctx, account_string, tctx 2344 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "ChangePasswordUser3"); tctx 2345 source4/torture/rpc/samr.c *password = talloc_strdup(tctx, newpass); tctx 2351 source4/torture/rpc/samr.c bool test_ChangePasswordRandomBytes(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 2361 source4/torture/rpc/samr.c DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16); tctx 2377 source4/torture/rpc/samr.c new_random_pass = samr_very_rand_pass(tctx, 128); tctx 2379 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL, tctx 2383 source4/torture/rpc/samr.c server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 2413 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 25 (set password ex) with a password made up of only random bytes\n"); tctx 2415 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s); tctx 2422 source4/torture/rpc/samr.c torture_comment(tctx, "Testing ChangePasswordUser3 with a password made up of only random bytes\n"); tctx 2426 source4/torture/rpc/samr.c new_random_pass = samr_very_rand_pass(tctx, 128); tctx 2447 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r); tctx 2462 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, 128); tctx 2485 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r); tctx 2496 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "ChangePasswordUser3 (on second random password)"); tctx 2497 source4/torture/rpc/samr.c *password = talloc_strdup(tctx, newpass); tctx 2504 source4/torture/rpc/samr.c static bool test_GetMembersInAlias(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 2511 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetMembersInAlias\n"); tctx 2516 source4/torture/rpc/samr.c status = dcerpc_samr_GetMembersInAlias(p, tctx, &r); tctx 2517 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetMembersInAlias"); tctx 2522 source4/torture/rpc/samr.c static bool test_AddMemberToAlias(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 2531 source4/torture/rpc/samr.c sid = dom_sid_add_rid(tctx, domain_sid, 512); tctx 2533 source4/torture/rpc/samr.c torture_comment(tctx, "testing AddAliasMember\n"); tctx 2537 source4/torture/rpc/samr.c status = dcerpc_samr_AddAliasMember(p, tctx, &r); tctx 2538 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "AddAliasMember"); tctx 2543 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteAliasMember(p, tctx, &d); tctx 2544 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "DelAliasMember"); tctx 2549 source4/torture/rpc/samr.c static bool test_AddMultipleMembersToAlias(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 2557 source4/torture/rpc/samr.c torture_comment(tctx, "testing AddMultipleMembersToAlias\n"); tctx 2562 source4/torture/rpc/samr.c sids.sids = talloc_array(tctx, struct lsa_SidPtr, 3); tctx 2564 source4/torture/rpc/samr.c sids.sids[0].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-1"); tctx 2565 source4/torture/rpc/samr.c sids.sids[1].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-2"); tctx 2566 source4/torture/rpc/samr.c sids.sids[2].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-3"); tctx 2568 source4/torture/rpc/samr.c status = dcerpc_samr_AddMultipleMembersToAlias(p, tctx, &a); tctx 2569 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "AddMultipleMembersToAlias"); tctx 2572 source4/torture/rpc/samr.c torture_comment(tctx, "testing RemoveMultipleMembersFromAlias\n"); tctx 2576 source4/torture/rpc/samr.c status = dcerpc_samr_RemoveMultipleMembersFromAlias(p, tctx, &r); tctx 2577 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "RemoveMultipleMembersFromAlias"); tctx 2580 source4/torture/rpc/samr.c status = dcerpc_samr_RemoveMultipleMembersFromAlias(p, tctx, &r); tctx 2581 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "RemoveMultipleMembersFromAlias"); tctx 2584 source4/torture/rpc/samr.c sids.sids[2].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-4"); tctx 2586 source4/torture/rpc/samr.c status = dcerpc_samr_RemoveMultipleMembersFromAlias(p, tctx, &r); tctx 2587 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, "RemoveMultipleMembersFromAlias"); tctx 2592 source4/torture/rpc/samr.c static bool test_TestPrivateFunctionsUser(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 2598 source4/torture/rpc/samr.c torture_comment(tctx, "Testing TestPrivateFunctionsUser\n"); tctx 2602 source4/torture/rpc/samr.c status = dcerpc_samr_TestPrivateFunctionsUser(p, tctx, &r); tctx 2603 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "TestPrivateFunctionsUser"); tctx 2609 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 2621 source4/torture/rpc/samr.c torture_comment(tctx, "Testing QueryUserInfo%s level 5 and 21 call ", tctx 2634 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo2(p, tctx, &r2); tctx 2640 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &r); tctx 2666 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, pwdlastset5, pwdlastset21, tctx 2671 source4/torture/rpc/samr.c torture_comment(tctx, "(pwdlastset: %lld)\n", *pwdlastset); tctx 2676 source4/torture/rpc/samr.c static bool test_SamLogon_Creds(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 2692 source4/torture/rpc/samr.c if (lp_client_lanman_auth(tctx->lp_ctx)) { tctx 2696 source4/torture/rpc/samr.c if (lp_client_ntlmv2_auth(tctx->lp_ctx)) { tctx 2700 source4/torture/rpc/samr.c cli_credentials_get_ntlm_username_domain(test_credentials, tctx, tctx 2709 source4/torture/rpc/samr.c names_blob = NTLMv2_generate_names_blob(tctx, cli_credentials_get_workstation(machine_credentials), tctx 2712 source4/torture/rpc/samr.c status = cli_credentials_get_ntlm_response(test_credentials, tctx, tctx 2718 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "cli_credentials_get_ntlm_response failed"); tctx 2735 source4/torture/rpc/samr.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 2751 source4/torture/rpc/samr.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r); tctx 2753 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, expected_result, "LogonSamLogon failed"); tctx 2756 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed"); tctx 2759 source4/torture/rpc/samr.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred), tctx 2765 source4/torture/rpc/samr.c static bool test_SamLogon(struct torture_context *tctx, tctx 2773 source4/torture/rpc/samr.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) { tctx 2777 source4/torture/rpc/samr.c return test_SamLogon_Creds(p, tctx, machine_credentials, test_credentials, tctx 2781 source4/torture/rpc/samr.c static bool test_SamLogon_with_creds(struct torture_context *tctx, tctx 2791 source4/torture/rpc/samr.c test_credentials = cli_credentials_init(tctx); tctx 2796 source4/torture/rpc/samr.c lp_workgroup(tctx->lp_ctx), CRED_SPECIFIED); tctx 2806 source4/torture/rpc/samr.c if (!test_SamLogon(tctx, p, machine_creds, test_credentials, tctx 2808 source4/torture/rpc/samr.c torture_warning(tctx, "new password did not work\n"); tctx 2817 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 2838 source4/torture/rpc/samr.c fields = talloc_asprintf(tctx, "(fields_present: 0x%08x)", tctx 2845 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo%s level %d call " tctx 2850 source4/torture/rpc/samr.c if (!test_SetUserPass_level_ex(p, tctx, handle, level, tctx 2859 source4/torture/rpc/samr.c if (!test_QueryUserInfo_pwdlastset(p, tctx, handle, tctx 2869 source4/torture/rpc/samr.c if (!test_SamLogon_with_creds(tctx, np, tctx 2881 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 2912 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 2918 source4/torture/rpc/samr.c status = torture_rpc_connection(tctx, &np, &ndr_table_netlogon); tctx 2944 source4/torture/rpc/samr.c torture_comment(tctx, "------------------------------\n" tctx 2966 source4/torture/rpc/samr.c if (!test_SetPassword_level(p, np, tctx, handle, tctx 2995 source4/torture/rpc/samr.c torture_comment(tctx, "not considering a non-0 " tctx 3003 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: " tctx 3019 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n"); tctx 3026 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n"); tctx 3039 source4/torture/rpc/samr.c if (!test_SetPassword_level(p, np, tctx, handle, tctx 3070 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, pwdlastset_old, tctx 3076 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: " tctx 3082 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: " tctx 3097 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n"); tctx 3104 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n"); tctx 3119 source4/torture/rpc/samr.c if (!test_SetPassword_level(p, np, tctx, handle, tctx 3148 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, pwdlastset_old, tctx 3154 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: " tctx 3160 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: " tctx 3172 source4/torture/rpc/samr.c if (!test_SetPassword_level(p, np, tctx, handle, tctx 3196 source4/torture/rpc/samr.c torture_comment(tctx, "not considering a non-0 " tctx 3211 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, pwdlastset_old, tctx 3218 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: " tctx 3225 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: " tctx 3241 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n"); tctx 3248 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n"); tctx 3283 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 3297 source4/torture/rpc/samr.c user_sid = dom_sid_add_rid(tctx, domain_sid, rid); tctx 3309 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r); tctx 3310 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, tctx 3331 source4/torture/rpc/samr.c status = dcerpc_lsa_AddAccountRights(lp, tctx, &r); tctx 3332 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3351 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccounts(lp, tctx, &r); tctx 3352 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3361 source4/torture/rpc/samr.c torture_assert(tctx, found_sid, tctx 3375 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r); tctx 3376 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3380 source4/torture/rpc/samr.c torture_warning(tctx, "failed to find newly added rights"); tctx 3395 source4/torture/rpc/samr.c status = dcerpc_lsa_OpenAccount(lp, tctx, &r); tctx 3396 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3409 source4/torture/rpc/samr.c status = dcerpc_lsa_GetSystemAccessAccount(lp, tctx, &r); tctx 3410 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3422 source4/torture/rpc/samr.c status = dcerpc_lsa_Close(lp, tctx, &r); tctx 3423 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3435 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteUser(p, tctx, &r); tctx 3436 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "Delete User failed"); tctx 3454 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccounts(lp, tctx, &r); tctx 3455 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3464 source4/torture/rpc/samr.c torture_assert(tctx, found_sid, tctx 3478 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r); tctx 3479 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3483 source4/torture/rpc/samr.c torture_warning(tctx, "failed to find newly added rights"); tctx 3498 source4/torture/rpc/samr.c status = dcerpc_lsa_OpenAccount(lp, tctx, &r); tctx 3499 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3512 source4/torture/rpc/samr.c status = dcerpc_lsa_GetSystemAccessAccount(lp, tctx, &r); tctx 3513 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3525 source4/torture/rpc/samr.c status = dcerpc_lsa_DeleteObject(lp, tctx, &r); tctx 3526 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3545 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccounts(lp, tctx, &r); tctx 3546 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 3555 source4/torture/rpc/samr.c torture_assert(tctx, !found_sid, tctx 3569 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r); tctx 3570 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, tctx 3578 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 3601 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, domain_handle, base_acct_name, &rid); tctx 3608 source4/torture/rpc/samr.c if (!test_QuerySecurity(p, tctx, user_handle)) { tctx 3612 source4/torture/rpc/samr.c if (!test_QueryUserInfo(p, tctx, user_handle)) { tctx 3616 source4/torture/rpc/samr.c if (!test_QueryUserInfo2(p, tctx, user_handle)) { tctx 3620 source4/torture/rpc/samr.c if (!test_SetUserInfo(p, tctx, user_handle, base_acct_flags, tctx 3625 source4/torture/rpc/samr.c if (!test_GetUserPwInfo(p, tctx, user_handle)) { tctx 3629 source4/torture/rpc/samr.c if (!test_TestPrivateFunctionsUser(p, tctx, user_handle)) { tctx 3633 source4/torture/rpc/samr.c if (!test_SetUserPass(p, tctx, user_handle, &password)) { tctx 3640 source4/torture/rpc/samr.c char *v = generate_random_str(tctx, 1); tctx 3648 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) { tctx 3652 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, simple_pass, false)) { tctx 3657 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) { tctx 3662 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, samr_rand_pass(tctx, 4), false)) { tctx 3667 source4/torture/rpc/samr.c if (!test_ChangePasswordRandomBytes(p, tctx, base_acct_name, user_handle, &password)) { tctx 3673 source4/torture/rpc/samr.c if (!test_SetUserPass_23(p, tctx, user_handle, password_fields[i], &password)) { tctx 3678 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) { tctx 3684 source4/torture/rpc/samr.c if (!test_SetUserPass_25(p, tctx, user_handle, password_fields[i], &password)) { tctx 3689 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) { tctx 3694 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, false, &password)) { tctx 3698 source4/torture/rpc/samr.c if (!test_ChangePassword(p, tctx, base_acct_name, domain_handle, &password)) { tctx 3702 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba4", false)) { tctx 3706 source4/torture/rpc/samr.c if (!test_SetUserPass_18(p, tctx, user_handle, &password)) { tctx 3710 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) { tctx 3722 source4/torture/rpc/samr.c if (!test_SetUserPass_21(p, tctx, user_handle, password_fields[i], &password)) { tctx 3727 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) { tctx 3737 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &q); tctx 3749 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 3765 source4/torture/rpc/samr.c if (!test_SetPassword_pwdlastset(p, tctx, base_acct_flags, tctx 3773 source4/torture/rpc/samr.c torture_comment(tctx, "pwdLastSet test succeeded\n"); tctx 3775 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed\n"); tctx 3785 source4/torture/rpc/samr.c status = torture_rpc_connection(tctx, &lp, &ndr_table_lsarpc); tctx 3786 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "Failed to open LSA pipe"); tctx 3788 source4/torture/rpc/samr.c if (!test_lsa_OpenPolicy2(lp, tctx, &lsa_handle)) { tctx 3792 source4/torture/rpc/samr.c if (!test_DeleteUser_with_privs(p, lp, tctx, tctx 3799 source4/torture/rpc/samr.c if (!test_lsa_Close(lp, tctx, lsa_handle)) { tctx 3804 source4/torture/rpc/samr.c torture_warning(tctx, "privileged user delete test failed\n"); tctx 3816 source4/torture/rpc/samr.c static bool test_alias_ops(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 3822 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 3823 source4/torture/rpc/samr.c if (!test_QuerySecurity(p, tctx, alias_handle)) { tctx 3828 source4/torture/rpc/samr.c if (!test_QueryAliasInfo(p, tctx, alias_handle)) { tctx 3832 source4/torture/rpc/samr.c if (!test_SetAliasInfo(p, tctx, alias_handle)) { tctx 3836 source4/torture/rpc/samr.c if (!test_AddMemberToAlias(p, tctx, alias_handle, domain_sid)) { tctx 3840 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba4", false)) { tctx 3845 source4/torture/rpc/samr.c if (!test_AddMultipleMembersToAlias(p, tctx, alias_handle)) { tctx 3853 source4/torture/rpc/samr.c static bool test_DeleteUser(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 3858 source4/torture/rpc/samr.c torture_comment(tctx, "Testing DeleteUser\n"); tctx 3863 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteUser(p, tctx, &d); tctx 3864 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "DeleteUser"); tctx 3870 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 3878 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, handle, name, &rid); tctx 3883 source4/torture/rpc/samr.c status = test_OpenUser_byname(p, tctx, handle, name, &user_handle); tctx 3890 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteUser(p, tctx, &d); tctx 3904 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 3913 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, handle, name, &rid); tctx 3922 source4/torture/rpc/samr.c status = dcerpc_samr_OpenGroup(p, tctx, &r); tctx 3929 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteDomainGroup(p, tctx, &d); tctx 3943 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 3955 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, domain_handle, name, &rid); tctx 3964 source4/torture/rpc/samr.c status = dcerpc_samr_OpenAlias(p, tctx, &r); tctx 3971 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteDomAlias(p, tctx, &d); tctx 3984 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 3995 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteDomAlias(p, tctx, &d); tctx 4004 source4/torture/rpc/samr.c static bool test_CreateAlias(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 4026 source4/torture/rpc/samr.c status = dcerpc_samr_CreateDomAlias(p, tctx, &r); tctx 4028 source4/torture/rpc/samr.c if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) { tctx 4040 source4/torture/rpc/samr.c if (!test_DeleteAlias_byname(p, tctx, domain_handle, r.in.alias_name->string)) { tctx 4043 source4/torture/rpc/samr.c status = dcerpc_samr_CreateDomAlias(p, tctx, &r); tctx 4055 source4/torture/rpc/samr.c if (!test_alias_ops(p, tctx, alias_handle, domain_sid)) { tctx 4063 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 4073 source4/torture/rpc/samr.c if (!test_ChangePasswordUser(p, tctx, acct_name, domain_handle, password)) { tctx 4077 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, acct_name, password, 0, true)) { tctx 4081 source4/torture/rpc/samr.c if (!test_OemChangePasswordUser2(p, tctx, acct_name, domain_handle, password)) { tctx 4086 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, *password, 0, true)) { tctx 4092 source4/torture/rpc/samr.c char *v = generate_random_str(tctx, 1); tctx 4098 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, simple_pass, 0, true)) { tctx 4120 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo(p, tctx, &r); tctx 4140 source4/torture/rpc/samr.c status = dcerpc_samr_SetDomainInfo(p, tctx, &s); tctx 4147 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, len - 1, password, NULL, 0, true)) { tctx 4156 source4/torture/rpc/samr.c status = dcerpc_samr_SetDomainInfo(p, tctx, &s); tctx 4174 source4/torture/rpc/samr.c n.in.names = talloc_array(tctx, struct lsa_String, 1); tctx 4179 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n); tctx 4190 source4/torture/rpc/samr.c status = dcerpc_samr_OpenUser(p, tctx, &r); tctx 4200 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &q); tctx 4208 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, tctx 4216 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) { tctx 4220 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) { tctx 4227 source4/torture/rpc/samr.c static bool test_CreateUser(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 4252 source4/torture/rpc/samr.c user_ctx = talloc_named(tctx, 0, "test_CreateUser2 per-user context"); tctx 4265 source4/torture/rpc/samr.c if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) { tctx 4316 source4/torture/rpc/samr.c if (!test_user_ops(p, tctx, &user_handle, domain_handle, tctx 4345 source4/torture/rpc/samr.c static bool test_CreateUser2(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 4388 source4/torture/rpc/samr.c user_ctx = talloc_named(tctx, 0, "test_CreateUser2 per-user context"); tctx 4403 source4/torture/rpc/samr.c if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) { tctx 4476 source4/torture/rpc/samr.c if (!test_user_ops(p, tctx, &user_handle, domain_handle, tctx 4502 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 4519 source4/torture/rpc/samr.c status = dcerpc_samr_QueryAliasInfo(p, tctx, &r); tctx 4531 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 4548 source4/torture/rpc/samr.c status = dcerpc_samr_QueryGroupInfo(p, tctx, &r); tctx 4560 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 4573 source4/torture/rpc/samr.c status = dcerpc_samr_QueryGroupMember(p, tctx, &r); tctx 4584 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 4603 source4/torture/rpc/samr.c status = dcerpc_samr_QueryGroupInfo(p, tctx, &r); tctx 4630 source4/torture/rpc/samr.c status = dcerpc_samr_SetGroupInfo(p, tctx, &s); tctx 4652 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 4670 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &r); tctx 4682 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 4700 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo2(p, tctx, &r); tctx 4712 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 4727 source4/torture/rpc/samr.c status = dcerpc_samr_OpenUser(p, tctx, &r); tctx 4733 source4/torture/rpc/samr.c if (!test_QuerySecurity(p, tctx, &user_handle)) { tctx 4737 source4/torture/rpc/samr.c if (!test_QueryUserInfo(p, tctx, &user_handle)) { tctx 4741 source4/torture/rpc/samr.c if (!test_QueryUserInfo2(p, tctx, &user_handle)) { tctx 4745 source4/torture/rpc/samr.c if (!test_GetUserPwInfo(p, tctx, &user_handle)) { tctx 4749 source4/torture/rpc/samr.c if (!test_GetGroupsForUser(p,tctx, &user_handle)) { tctx 4753 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &user_handle)) { tctx 4761 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 4776 source4/torture/rpc/samr.c status = dcerpc_samr_OpenGroup(p, tctx, &r); tctx 4782 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 4783 source4/torture/rpc/samr.c if (!test_QuerySecurity(p, tctx, &group_handle)) { tctx 4788 source4/torture/rpc/samr.c if (!test_QueryGroupInfo(p, tctx, &group_handle)) { tctx 4792 source4/torture/rpc/samr.c if (!test_QueryGroupMember(p, tctx, &group_handle)) { tctx 4796 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &group_handle)) { tctx 4803 source4/torture/rpc/samr.c static bool test_OpenAlias(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 4811 source4/torture/rpc/samr.c torture_comment(tctx, "Testing OpenAlias(%u)\n", rid); tctx 4818 source4/torture/rpc/samr.c status = dcerpc_samr_OpenAlias(p, tctx, &r); tctx 4824 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 4825 source4/torture/rpc/samr.c if (!test_QuerySecurity(p, tctx, &alias_handle)) { tctx 4830 source4/torture/rpc/samr.c if (!test_QueryAliasInfo(p, tctx, &alias_handle)) { tctx 4834 source4/torture/rpc/samr.c if (!test_GetMembersInAlias(p, tctx, &alias_handle)) { tctx 4838 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &alias_handle)) { tctx 4845 source4/torture/rpc/samr.c static bool check_mask(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 4856 source4/torture/rpc/samr.c torture_comment(tctx, "Testing OpenUser(%u)\n", rid); tctx 4863 source4/torture/rpc/samr.c status = dcerpc_samr_OpenUser(p, tctx, &r); tctx 4873 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &q); tctx 4886 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &user_handle)) { tctx 4894 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 4925 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainUsers(p, tctx, &r); tctx 4932 source4/torture/rpc/samr.c torture_assert(tctx, sam, "EnumDomainUsers failed: r.out.sam unexpectedly NULL"); tctx 4940 source4/torture/rpc/samr.c if (!check_mask(p, tctx, handle, sam->entries[i].idx, mask)) { tctx 4943 source4/torture/rpc/samr.c } else if (!test_OpenUser(p, tctx, handle, sam->entries[i].idx)) { tctx 4952 source4/torture/rpc/samr.c n.in.names = talloc_array(tctx, struct lsa_String, sam->count); tctx 4958 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n); tctx 4968 source4/torture/rpc/samr.c lr.in.rids = talloc_array(tctx, uint32_t, sam->count); tctx 4974 source4/torture/rpc/samr.c status = dcerpc_samr_LookupRids(p, tctx, &lr); tctx 4975 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "LookupRids"); tctx 4983 source4/torture/rpc/samr.c static bool test_EnumDomainUsers_async(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 4993 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "dangerous", false)) { tctx 4994 source4/torture/rpc/samr.c torture_skip(tctx, "samr async test disabled - enable dangerous tests to use\n"); tctx 4997 source4/torture/rpc/samr.c torture_comment(tctx, "Testing EnumDomainUsers_async\n"); tctx 5006 source4/torture/rpc/samr.c req[i] = dcerpc_samr_EnumDomainUsers_send(p, tctx, &r); tctx 5018 source4/torture/rpc/samr.c torture_comment(tctx, "%d async requests OK\n", i); tctx 5024 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 5044 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainGroups(p, tctx, &r); tctx 5055 source4/torture/rpc/samr.c if (!test_OpenGroup(p, tctx, handle, sam->entries[i].idx)) { tctx 5064 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 5084 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainAliases(p, tctx, &r); tctx 5095 source4/torture/rpc/samr.c if (!test_OpenAlias(p, tctx, handle, sam->entries[i].idx)) { tctx 5104 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 5126 source4/torture/rpc/samr.c status = dcerpc_samr_GetDisplayEnumerationIndex(p, tctx, &r); tctx 5138 source4/torture/rpc/samr.c status = dcerpc_samr_GetDisplayEnumerationIndex(p, tctx, &r); tctx 5151 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 5173 source4/torture/rpc/samr.c status = dcerpc_samr_GetDisplayEnumerationIndex2(p, tctx, &r); tctx 5184 source4/torture/rpc/samr.c status = dcerpc_samr_GetDisplayEnumerationIndex2(p, tctx, &r); tctx 5211 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 5250 source4/torture/rpc/samr.c status = dcerpc_samr_OpenUser(p, tctx, &r); tctx 5260 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &q); tctx 5309 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &user_handle)) { tctx 5317 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 5347 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDisplayInfo(p, tctx, &r); tctx 5355 source4/torture/rpc/samr.c if (!test_each_DisplayInfo_user(p, tctx, &r, &seen_testuser)) { tctx 5361 source4/torture/rpc/samr.c if (!test_each_DisplayInfo_user(p, tctx, &r, NULL)) { tctx 5382 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo(p, tctx, &dom_info); tctx 5400 source4/torture/rpc/samr.c if (NT_STATUS_IS_OK(test_OpenUser_byname(p, tctx, handle, TEST_ACCOUNT_NAME, &user_handle))) { tctx 5404 source4/torture/rpc/samr.c test_samr_handle_Close(p, tctx, &user_handle); tctx 5426 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 5450 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDisplayInfo2(p, tctx, &r); tctx 5461 source4/torture/rpc/samr.c static bool test_QueryDisplayInfo3(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 5474 source4/torture/rpc/samr.c torture_comment(tctx, "Testing QueryDisplayInfo3 level %u\n", levels[i]); tctx 5485 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDisplayInfo3(p, tctx, &r); tctx 5498 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 5520 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDisplayInfo(p, tctx, &r); tctx 5544 source4/torture/rpc/samr.c static bool test_QueryDomainInfo(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 5555 source4/torture/rpc/samr.c const char *domain_comment = talloc_asprintf(tctx, tctx 5557 source4/torture/rpc/samr.c timestring(tctx, time(NULL))); tctx 5561 source4/torture/rpc/samr.c s.in.info = talloc(tctx, union samr_DomainInfo); tctx 5564 source4/torture/rpc/samr.c status = dcerpc_samr_SetDomainInfo(p, tctx, &s); tctx 5572 source4/torture/rpc/samr.c torture_comment(tctx, "Testing QueryDomainInfo level %u\n", levels[i]); tctx 5578 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo(p, tctx, &r); tctx 5627 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetDomainInfo level %u\n", levels[i]); tctx 5633 source4/torture/rpc/samr.c status = dcerpc_samr_SetDomainInfo(p, tctx, &s); tctx 5650 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo(p, tctx, &r); tctx 5663 source4/torture/rpc/samr.c static bool test_QueryDomainInfo2(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 5680 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo2(p, tctx, &r); tctx 5694 source4/torture/rpc/samr.c static bool test_GroupList(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 5712 source4/torture/rpc/samr.c torture_comment(tctx, "Testing coherency of querydispinfo vs enumdomgroups\n"); tctx 5723 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainGroups(p, tctx, &q1); tctx 5730 source4/torture/rpc/samr.c add_string_to_array(tctx, tctx 5736 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "EnumDomainGroups"); tctx 5738 source4/torture/rpc/samr.c torture_assert(tctx, sam, "EnumDomainGroups failed to return sam"); tctx 5751 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDisplayInfo(p, tctx, &q2); tctx 5797 source4/torture/rpc/samr.c static bool test_DeleteDomainGroup(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 5803 source4/torture/rpc/samr.c torture_comment(tctx, "Testing DeleteDomainGroup\n"); tctx 5808 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteDomainGroup(p, tctx, &d); tctx 5809 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "DeleteDomainGroup"); tctx 5814 source4/torture/rpc/samr.c static bool test_TestPrivateFunctionsDomain(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 5821 source4/torture/rpc/samr.c torture_comment(tctx, "Testing TestPrivateFunctionsDomain\n"); tctx 5825 source4/torture/rpc/samr.c status = dcerpc_samr_TestPrivateFunctionsDomain(p, tctx, &r); tctx 5826 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "TestPrivateFunctionsDomain"); tctx 5831 source4/torture/rpc/samr.c static bool test_RidToSid(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 5843 source4/torture/rpc/samr.c torture_comment(tctx, "Testing RidToSid\n"); tctx 5845 source4/torture/rpc/samr.c calc_sid = dom_sid_dup(tctx, domain_sid); tctx 5850 source4/torture/rpc/samr.c status = dcerpc_samr_RidToSid(p, tctx, &r); tctx 5859 source4/torture/rpc/samr.c dom_sid_string(tctx, out_sid), tctx 5860 source4/torture/rpc/samr.c dom_sid_string(tctx, calc_sid)); tctx 5869 source4/torture/rpc/samr.c static bool test_GetBootKeyInformation(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 5877 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetBootKeyInformation\n"); tctx 5882 source4/torture/rpc/samr.c status = dcerpc_samr_GetBootKeyInformation(p, tctx, &r); tctx 5885 source4/torture/rpc/samr.c torture_comment(tctx, "GetBootKeyInformation (ignored) - %s\n", nt_errstr(status)); tctx 5891 source4/torture/rpc/samr.c static bool test_AddGroupMember(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 5903 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, domain_handle, TEST_ACCOUNT_NAME, &rid); tctx 5904 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "test_AddGroupMember looking up name " TEST_ACCOUNT_NAME); tctx 5910 source4/torture/rpc/samr.c torture_comment(tctx, "Testing AddGroupMember and DeleteGroupMember\n"); tctx 5915 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteGroupMember(p, tctx, &d); tctx 5916 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_MEMBER_NOT_IN_GROUP, status, "DeleteGroupMember"); tctx 5918 source4/torture/rpc/samr.c status = dcerpc_samr_AddGroupMember(p, tctx, &r); tctx 5919 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "AddGroupMember"); tctx 5921 source4/torture/rpc/samr.c status = dcerpc_samr_AddGroupMember(p, tctx, &r); tctx 5922 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_MEMBER_IN_GROUP, status, "AddGroupMember"); tctx 5924 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba4", false) || tctx 5925 source4/torture/rpc/samr.c torture_setting_bool(tctx, "samba3", false)) { tctx 5926 source4/torture/rpc/samr.c torture_comment(tctx, "skipping SetMemberAttributesOfGroup test against Samba4\n"); tctx 5935 source4/torture/rpc/samr.c status = dcerpc_samr_SetMemberAttributesOfGroup(p, tctx, &s); tctx 5936 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "SetMemberAttributesOfGroup"); tctx 5942 source4/torture/rpc/samr.c status = dcerpc_samr_QueryGroupMember(p, tctx, &q); tctx 5943 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "QueryGroupMember"); tctx 5945 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteGroupMember(p, tctx, &d); tctx 5946 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "DeleteGroupMember"); tctx 5948 source4/torture/rpc/samr.c status = dcerpc_samr_AddGroupMember(p, tctx, &r); tctx 5949 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "AddGroupMember"); tctx 5956 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 5979 source4/torture/rpc/samr.c status = dcerpc_samr_CreateDomainGroup(p, tctx, &r); tctx 5981 source4/torture/rpc/samr.c if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) { tctx 5983 source4/torture/rpc/samr.c torture_comment(tctx, "Server correctly refused create of '%s'\n", r.in.name->string); tctx 5993 source4/torture/rpc/samr.c if (!test_DeleteGroup_byname(p, tctx, domain_handle, r.in.name->string)) { tctx 5998 source4/torture/rpc/samr.c status = dcerpc_samr_CreateDomainGroup(p, tctx, &r); tctx 6001 source4/torture/rpc/samr.c if (!test_DeleteUser_byname(p, tctx, domain_handle, r.in.name->string)) { tctx 6007 source4/torture/rpc/samr.c status = dcerpc_samr_CreateDomainGroup(p, tctx, &r); tctx 6009 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "CreateDomainGroup"); tctx 6015 source4/torture/rpc/samr.c if (!test_AddGroupMember(p, tctx, domain_handle, group_handle)) { tctx 6020 source4/torture/rpc/samr.c if (!test_SetGroupInfo(p, tctx, group_handle)) { tctx 6032 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 6039 source4/torture/rpc/samr.c r.in.sid = dom_sid_parse_talloc(tctx, "S-1-5-32-12-34-56-78"); tctx 6041 source4/torture/rpc/samr.c status = dcerpc_samr_RemoveMemberFromForeignDomain(p, tctx, &r); tctx 6042 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "RemoveMemberFromForeignDomain"); tctx 6048 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 6071 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainUsers(p, tctx, &r); tctx 6073 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 6088 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 6110 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainGroups(p, tctx, &r); tctx 6112 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 6127 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 6149 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainAliases(p, tctx, &r); tctx 6151 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 6166 source4/torture/rpc/samr.c struct torture_context *tctx, tctx 6189 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo2(p, tctx, &r); tctx 6190 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, tctx 6219 source4/torture/rpc/samr.c name = talloc_asprintf(tctx, "%s%04d", TEST_ACCOUNT_NAME, i); tctx 6220 source4/torture/rpc/samr.c ret &= test_CreateUser(p, tctx, domain_handle, name, &handle, domain_sid, 0, NULL, false); tctx 6223 source4/torture/rpc/samr.c name = talloc_asprintf(tctx, "%s%04d", TEST_GROUPNAME, i); tctx 6224 source4/torture/rpc/samr.c ret &= test_CreateDomainGroup(p, tctx, domain_handle, name, &handle, domain_sid, false); tctx 6227 source4/torture/rpc/samr.c name = talloc_asprintf(tctx, "%s%04d", TEST_ALIASNAME, i); tctx 6228 source4/torture/rpc/samr.c ret &= test_CreateAlias(p, tctx, domain_handle, name, &handle, domain_sid, false); tctx 6234 source4/torture/rpc/samr.c ret &= test_samr_handle_Close(p, tctx, &handle); tctx 6243 source4/torture/rpc/samr.c ret &= test_EnumDomainUsers(p, tctx, domain_handle, &num_enum); tctx 6246 source4/torture/rpc/samr.c ret &= test_EnumDomainGroups(p, tctx, domain_handle, &num_enum); tctx 6249 source4/torture/rpc/samr.c ret &= test_EnumDomainAliases(p, tctx, domain_handle, &num_enum); tctx 6255 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, num_enum, num_anounced + num_created, tctx 6271 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, num_disp, num_anounced + num_created, tctx 6277 source4/torture/rpc/samr.c static bool test_Connect(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 6280 source4/torture/rpc/samr.c static bool test_OpenDomain(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 6298 source4/torture/rpc/samr.c torture_comment(tctx, "Testing OpenDomain of %s\n", dom_sid_string(tctx, sid)); tctx 6305 source4/torture/rpc/samr.c status = dcerpc_samr_OpenDomain(p, tctx, &r); tctx 6306 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "OpenDomain"); tctx 6310 source4/torture/rpc/samr.c ret &= test_samr_handle_Close(p, tctx, handle); tctx 6316 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 6317 source4/torture/rpc/samr.c ret &= test_CreateUser2(p, tctx, &domain_handle, sid, which_ops, NULL); tctx 6319 source4/torture/rpc/samr.c ret &= test_CreateUser(p, tctx, &domain_handle, TEST_ACCOUNT_NAME, &user_handle, sid, which_ops, NULL, true); tctx 6321 source4/torture/rpc/samr.c ret &= test_QueryDisplayInfo(p, tctx, &domain_handle); tctx 6323 source4/torture/rpc/samr.c printf("Testing PASSWORDS or ATTRIBUTES on domain %s failed!\n", dom_sid_string(tctx, sid)); tctx 6327 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 6328 source4/torture/rpc/samr.c ret &= test_CreateUser2(p, tctx, &domain_handle, sid, which_ops, machine_credentials); tctx 6330 source4/torture/rpc/samr.c ret &= test_CreateUser(p, tctx, &domain_handle, TEST_ACCOUNT_NAME, &user_handle, sid, which_ops, machine_credentials, true); tctx 6332 source4/torture/rpc/samr.c printf("Testing PASSWORDS PWDLASTSET on domain %s failed!\n", dom_sid_string(tctx, sid)); tctx 6338 source4/torture/rpc/samr.c ret &= test_ManyObjects(p, tctx, &domain_handle, sid, which_ops); tctx 6341 source4/torture/rpc/samr.c ret &= test_CreateUser(p, tctx, &domain_handle, TEST_ACCOUNT_NAME, &user_handle, sid, which_ops, NULL, true); tctx 6343 source4/torture/rpc/samr.c printf("Failed to CreateUser in SAMR-OTHER on domain %s!\n", dom_sid_string(tctx, sid)); tctx 6345 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 6346 source4/torture/rpc/samr.c ret &= test_QuerySecurity(p, tctx, &domain_handle); tctx 6348 source4/torture/rpc/samr.c ret &= test_RemoveMemberFromForeignDomain(p, tctx, &domain_handle); tctx 6349 source4/torture/rpc/samr.c ret &= test_CreateAlias(p, tctx, &domain_handle, TEST_ALIASNAME, &alias_handle, sid, true); tctx 6350 source4/torture/rpc/samr.c ret &= test_CreateDomainGroup(p, tctx, &domain_handle, TEST_GROUPNAME, &group_handle, sid, true); tctx 6351 source4/torture/rpc/samr.c ret &= test_QueryDomainInfo(p, tctx, &domain_handle); tctx 6352 source4/torture/rpc/samr.c ret &= test_QueryDomainInfo2(p, tctx, &domain_handle); tctx 6353 source4/torture/rpc/samr.c ret &= test_EnumDomainUsers_all(p, tctx, &domain_handle); tctx 6354 source4/torture/rpc/samr.c ret &= test_EnumDomainUsers_async(p, tctx, &domain_handle); tctx 6355 source4/torture/rpc/samr.c ret &= test_EnumDomainGroups_all(p, tctx, &domain_handle); tctx 6356 source4/torture/rpc/samr.c ret &= test_EnumDomainAliases_all(p, tctx, &domain_handle); tctx 6357 source4/torture/rpc/samr.c ret &= test_QueryDisplayInfo2(p, tctx, &domain_handle); tctx 6358 source4/torture/rpc/samr.c ret &= test_QueryDisplayInfo3(p, tctx, &domain_handle); tctx 6359 source4/torture/rpc/samr.c ret &= test_QueryDisplayInfo_continue(p, tctx, &domain_handle); tctx 6361 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba4", false)) { tctx 6362 source4/torture/rpc/samr.c torture_comment(tctx, "skipping GetDisplayEnumerationIndex test against Samba4\n"); tctx 6364 source4/torture/rpc/samr.c ret &= test_GetDisplayEnumerationIndex(p, tctx, &domain_handle); tctx 6365 source4/torture/rpc/samr.c ret &= test_GetDisplayEnumerationIndex2(p, tctx, &domain_handle); tctx 6367 source4/torture/rpc/samr.c ret &= test_GroupList(p, tctx, &domain_handle); tctx 6368 source4/torture/rpc/samr.c ret &= test_TestPrivateFunctionsDomain(p, tctx, &domain_handle); tctx 6369 source4/torture/rpc/samr.c ret &= test_RidToSid(p, tctx, sid, &domain_handle); tctx 6370 source4/torture/rpc/samr.c ret &= test_GetBootKeyInformation(p, tctx, &domain_handle); tctx 6372 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SAMR-OTHER on domain %s failed!\n", dom_sid_string(tctx, sid)); tctx 6378 source4/torture/rpc/samr.c !test_DeleteUser(p, tctx, &user_handle)) { tctx 6383 source4/torture/rpc/samr.c !test_DeleteAlias(p, tctx, &alias_handle)) { tctx 6388 source4/torture/rpc/samr.c !test_DeleteDomainGroup(p, tctx, &group_handle)) { tctx 6392 source4/torture/rpc/samr.c ret &= test_samr_handle_Close(p, tctx, &domain_handle); tctx 6395 source4/torture/rpc/samr.c ret &= test_Connect(p, tctx, handle); tctx 6398 source4/torture/rpc/samr.c printf("Testing domain %s failed!\n", dom_sid_string(tctx, sid)); tctx 6404 source4/torture/rpc/samr.c static bool test_LookupDomain(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 6416 source4/torture/rpc/samr.c torture_comment(tctx, "Testing LookupDomain(%s)\n", domain); tctx 6424 source4/torture/rpc/samr.c status = dcerpc_samr_LookupDomain(p, tctx, &r); tctx 6425 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER, status, "LookupDomain expected NT_STATUS_INVALID_PARAMETER"); tctx 6429 source4/torture/rpc/samr.c status = dcerpc_samr_LookupDomain(p, tctx, &r); tctx 6430 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_NO_SUCH_DOMAIN, status, "LookupDomain expected NT_STATUS_NO_SUCH_DOMAIN"); tctx 6437 source4/torture/rpc/samr.c status = dcerpc_samr_LookupDomain(p, tctx, &r); tctx 6438 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "LookupDomain"); tctx 6440 source4/torture/rpc/samr.c if (!test_GetDomPwInfo(p, tctx, &n1)) { tctx 6444 source4/torture/rpc/samr.c if (!test_OpenDomain(p, tctx, handle, *r.out.sid, which_ops, tctx 6453 source4/torture/rpc/samr.c static bool test_EnumDomains(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 6472 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomains(p, tctx, &r); tctx 6473 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "EnumDomains"); tctx 6480 source4/torture/rpc/samr.c if (!test_LookupDomain(p, tctx, handle, tctx 6487 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomains(p, tctx, &r); tctx 6488 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "EnumDomains"); tctx 6494 source4/torture/rpc/samr.c static bool test_Connect(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 6508 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Connect\n"); tctx 6514 source4/torture/rpc/samr.c status = dcerpc_samr_Connect(p, tctx, &r); tctx 6516 source4/torture/rpc/samr.c torture_comment(tctx, "Connect failed - %s\n", nt_errstr(status)); tctx 6523 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Connect2\n"); tctx 6529 source4/torture/rpc/samr.c status = dcerpc_samr_Connect2(p, tctx, &r2); tctx 6531 source4/torture/rpc/samr.c torture_comment(tctx, "Connect2 failed - %s\n", nt_errstr(status)); tctx 6535 source4/torture/rpc/samr.c test_samr_handle_Close(p, tctx, handle); tctx 6541 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Connect3\n"); tctx 6548 source4/torture/rpc/samr.c status = dcerpc_samr_Connect3(p, tctx, &r3); tctx 6554 source4/torture/rpc/samr.c test_samr_handle_Close(p, tctx, handle); tctx 6560 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Connect4\n"); tctx 6567 source4/torture/rpc/samr.c status = dcerpc_samr_Connect4(p, tctx, &r4); tctx 6573 source4/torture/rpc/samr.c test_samr_handle_Close(p, tctx, handle); tctx 6579 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Connect5\n"); tctx 6592 source4/torture/rpc/samr.c status = dcerpc_samr_Connect5(p, tctx, &r5); tctx 6598 source4/torture/rpc/samr.c test_samr_handle_Close(p, tctx, handle); tctx 34 source4/torture/rpc/samr_accessmask.c static NTSTATUS torture_samr_Close(struct torture_context *tctx, tctx 43 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_Close(p, tctx, &cl); tctx 48 source4/torture/rpc/samr_accessmask.c static NTSTATUS torture_samr_Connect5(struct torture_context *tctx, tctx 67 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_Connect5(p, tctx, &r5); tctx 73 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_Connect5(struct torture_context *tctx, tctx 85 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &h); tctx 121 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &h); tctx 143 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_EnumDomains(struct torture_context *tctx, tctx 159 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch); tctx 180 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_EnumDomains(p, tctx, &ed); tctx 186 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch); tctx 207 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_EnumDomains(p, tctx, &ed); tctx 213 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch); tctx 234 source4/torture/rpc/samr_accessmask.c static bool test_samr_connect_user_acl(struct torture_context *tctx, tctx 251 source4/torture/rpc/samr_accessmask.c const char *binding = torture_setting_string(tctx, "binding", NULL); tctx 256 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, SEC_FLAG_MAXIMUM_ALLOWED, &ch); tctx 267 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_QuerySecurity(p, tctx, &qs); tctx 294 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_SetSecurity(p, tctx, &ss); tctx 302 source4/torture/rpc/samr_accessmask.c status = dcerpc_pipe_connect(tctx, tctx 304 source4/torture/rpc/samr_accessmask.c test_credentials, tctx->ev, tctx->lp_ctx); tctx 311 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, test_p, SEC_FLAG_MAXIMUM_ALLOWED, &uch); tctx 323 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_QuerySecurity(p, tctx, &qs); tctx 334 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch); tctx 354 source4/torture/rpc/samr_accessmask.c static bool test_samr_connect_user_acl_enforced(struct torture_context *tctx, tctx 364 source4/torture/rpc/samr_accessmask.c const char *binding = torture_setting_string(tctx, "binding", NULL); tctx 369 source4/torture/rpc/samr_accessmask.c status = dcerpc_pipe_connect(tctx, tctx 371 source4/torture/rpc/samr_accessmask.c test_credentials, tctx->ev, tctx->lp_ctx); tctx 378 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, test_p, SAMR_ACCESS_SHUTDOWN_SERVER, &uch); tctx 400 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_LookupDomain(struct torture_context *tctx, tctx 415 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch); tctx 432 source4/torture/rpc/samr_accessmask.c dn.string = lp_workgroup(tctx->lp_ctx); tctx 434 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_LookupDomain(p, tctx, &ld); tctx 440 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch); tctx 457 source4/torture/rpc/samr_accessmask.c dn.string = lp_workgroup(tctx->lp_ctx); tctx 459 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_LookupDomain(p, tctx, &ld); tctx 465 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch); tctx 487 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_OpenDomain(struct torture_context *tctx, tctx 502 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, SEC_FLAG_MAXIMUM_ALLOWED, &ch); tctx 511 source4/torture/rpc/samr_accessmask.c dn.string = lp_workgroup(tctx->lp_ctx); tctx 512 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_LookupDomain(p, tctx, &ld); tctx 524 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch); tctx 543 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_OpenDomain(p, tctx, &od); tctx 549 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &dh); tctx 555 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch); tctx 569 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch); tctx 582 source4/torture/rpc/samr_accessmask.c static bool test_samr_connect(struct torture_context *tctx, tctx 591 source4/torture/rpc/samr_accessmask.c if (torture_setting_bool(tctx, "samba3", false)) { tctx 592 source4/torture/rpc/samr_accessmask.c torture_skip(tctx, "Skipping test against Samba 3"); tctx 596 source4/torture/rpc/samr_accessmask.c testuser = torture_create_testuser(tctx, TEST_USER_NAME, lp_workgroup(tctx->lp_ctx), tctx 602 source4/torture/rpc/samr_accessmask.c test_credentials = cli_credentials_init(tctx); tctx 604 source4/torture/rpc/samr_accessmask.c cli_credentials_set_domain(test_credentials, lp_workgroup(tctx->lp_ctx), tctx 614 source4/torture/rpc/samr_accessmask.c if (!test_samr_connect_user_acl(tctx, p, test_credentials, test_sid)) { tctx 628 source4/torture/rpc/samr_accessmask.c if (!test_samr_connect_user_acl_enforced(tctx, p, test_credentials, test_sid)) { tctx 633 source4/torture/rpc/samr_accessmask.c torture_leave_domain(tctx, testuser); tctx 427 source4/torture/rpc/samsync.c static bool samsync_handle_user(struct torture_context *tctx, TALLOC_CTX *mem_ctx, struct samsync_state *samsync_state, tctx 582 source4/torture/rpc/samsync.c ndr_err = ndr_pull_struct_blob(&data, mem_ctx, lp_iconv_convenience(tctx->lp_ctx), &keys, (ndr_pull_flags_fn_t)ndr_pull_netr_USER_KEYS); tctx 1147 source4/torture/rpc/samsync.c static bool test_DatabaseSync(struct torture_context *tctx, tctx 1221 source4/torture/rpc/samsync.c if (!samsync_handle_user(tctx, delta_ctx, samsync_state, tctx 33 source4/torture/rpc/scanner.c static bool test_num_calls(struct torture_context *tctx, tctx 50 source4/torture/rpc/scanner.c status = torture_rpc_connection(tctx, &p, iface); tctx 44 source4/torture/rpc/schannel.c bool test_netlogon_ex_ops(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 58 source4/torture/rpc/schannel.c if (lp_client_lanman_auth(tctx->lp_ctx)) { tctx 62 source4/torture/rpc/schannel.c if (lp_client_ntlmv2_auth(tctx->lp_ctx)) { tctx 66 source4/torture/rpc/schannel.c cli_credentials_get_ntlm_username_domain(cmdline_credentials, tctx, tctx 75 source4/torture/rpc/schannel.c names_blob = NTLMv2_generate_names_blob(tctx, cli_credentials_get_workstation(credentials), tctx 78 source4/torture/rpc/schannel.c status = cli_credentials_get_ntlm_response(cmdline_credentials, tctx, tctx 84 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, tctx 100 source4/torture/rpc/schannel.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 109 source4/torture/rpc/schannel.c torture_comment(tctx, tctx 116 source4/torture/rpc/schannel.c status = dcerpc_netr_LogonSamLogonEx(p, tctx, &r); tctx 117 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed"); tctx 126 source4/torture/rpc/schannel.c static bool test_samr_ops(struct torture_context *tctx, tctx 139 source4/torture/rpc/schannel.c name.string = lp_workgroup(tctx->lp_ctx); tctx 149 source4/torture/rpc/schannel.c status = dcerpc_samr_Connect(p, tctx, &connect_r); tctx 161 source4/torture/rpc/schannel.c opendom.in.sid = dom_sid_parse_talloc(tctx, "S-1-5-32"); tctx 164 source4/torture/rpc/schannel.c status = dcerpc_samr_OpenDomain(p, tctx, &opendom); tctx 175 source4/torture/rpc/schannel.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &r); tctx 191 source4/torture/rpc/schannel.c static bool test_lsa_ops(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 207 source4/torture/rpc/schannel.c status = dcerpc_lsa_GetUserName(p, tctx, &r); tctx 225 source4/torture/rpc/schannel.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 237 source4/torture/rpc/schannel.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 242 source4/torture/rpc/schannel.c if (!test_many_LookupSids(p, tctx, NULL)) { tctx 254 source4/torture/rpc/schannel.c static bool test_schannel(struct torture_context *tctx, tctx 260 source4/torture/rpc/schannel.c const char *binding = torture_setting_string(tctx, "binding", NULL); tctx 271 source4/torture/rpc/schannel.c join_ctx = torture_join_domain(tctx, tctx 272 source4/torture/rpc/schannel.c talloc_asprintf(tctx, "%s%d", TEST_MACHINE_NAME, i), tctx 274 source4/torture/rpc/schannel.c torture_assert(tctx, join_ctx != NULL, "Failed to join domain"); tctx 276 source4/torture/rpc/schannel.c status = dcerpc_parse_binding(tctx, binding, &b); tctx 277 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "Bad binding string"); tctx 282 source4/torture/rpc/schannel.c status = dcerpc_pipe_connect_b(tctx, &p, b, &ndr_table_samr, tctx 283 source4/torture/rpc/schannel.c credentials, tctx->ev, tctx->lp_ctx); tctx 284 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, tctx 287 source4/torture/rpc/schannel.c torture_assert(tctx, test_samr_ops(tctx, p), tctx 295 source4/torture/rpc/schannel.c status = dcerpc_epm_map_binding(tctx, b, &ndr_table_netlogon, tctx->ev, tctx->lp_ctx); tctx 296 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "epm map"); tctx 300 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "seconday connection"); tctx 303 source4/torture/rpc/schannel.c credentials, lp_gensec_settings(tctx, tctx->lp_ctx), tctx 308 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "bind auth"); tctx 310 source4/torture/rpc/schannel.c status = dcerpc_schannel_creds(p_netlogon->conn->security_state.generic_state, tctx, &creds); tctx 311 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "schannel creds"); tctx 314 source4/torture/rpc/schannel.c torture_assert(tctx, test_netlogon_ops(p_netlogon, tctx, credentials, creds), tctx 317 source4/torture/rpc/schannel.c torture_assert(tctx, test_netlogon_ex_ops(p_netlogon, tctx, credentials, creds), tctx 321 source4/torture/rpc/schannel.c status = dcerpc_epm_map_binding(tctx, b, &ndr_table_lsarpc, tctx->ev, tctx->lp_ctx); tctx 322 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "epm map"); tctx 327 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "seconday connection"); tctx 330 source4/torture/rpc/schannel.c credentials, lp_gensec_settings(tctx, tctx->lp_ctx), tctx 335 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "bind auth"); tctx 337 source4/torture/rpc/schannel.c torture_assert(tctx, test_lsa_ops(tctx, p_lsa), tctx 346 source4/torture/rpc/schannel.c status = dcerpc_parse_binding(tctx, binding, &b); tctx 347 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "Bad binding string"); tctx 352 source4/torture/rpc/schannel.c status = dcerpc_pipe_connect_b(tctx, &p_samr2, b, &ndr_table_samr, tctx 353 source4/torture/rpc/schannel.c credentials, tctx->ev, tctx->lp_ctx); tctx 354 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, tctx 358 source4/torture/rpc/schannel.c torture_assert (tctx, test_samr_ops(tctx, p_samr2), tctx 362 source4/torture/rpc/schannel.c status = dcerpc_epm_map_binding(tctx, b, &ndr_table_netlogon, tctx->ev, tctx->lp_ctx); tctx 363 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "epm"); tctx 367 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "seconday connection"); tctx 371 source4/torture/rpc/schannel.c credentials, lp_gensec_settings(tctx, tctx->lp_ctx), tctx 376 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "auth failed"); tctx 379 source4/torture/rpc/schannel.c torture_assert(tctx, test_netlogon_ex_ops(p_netlogon2, tctx, credentials, creds), tctx 385 source4/torture/rpc/schannel.c torture_assert(tctx, test_netlogon_ops(p_netlogon2, tctx, credentials, creds), tctx 394 source4/torture/rpc/schannel.c status = dcerpc_pipe_connect_b(tctx, &p_netlogon3, b, &ndr_table_netlogon, tctx 395 source4/torture/rpc/schannel.c credentials, tctx->ev, tctx->lp_ctx); tctx 396 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "Failed to connect without schannel"); tctx 398 source4/torture/rpc/schannel.c torture_assert(tctx, !test_netlogon_ex_ops(p_netlogon3, tctx, credentials, creds), tctx 402 source4/torture/rpc/schannel.c tctx->last_result = TORTURE_OK; tctx 403 source4/torture/rpc/schannel.c tctx->last_reason = NULL; tctx 405 source4/torture/rpc/schannel.c torture_assert(tctx, test_netlogon_ops(p_netlogon3, tctx, credentials, creds), tctx 408 source4/torture/rpc/schannel.c torture_leave_domain(tctx, join_ctx); tctx 524 source4/torture/rpc/schannel.c struct torture_context *tctx; tctx 551 source4/torture/rpc/schannel.c torture_comment(s->tctx, "conn[%u]: %s\n", conn->index, nt_errstr(s->error)); tctx 574 source4/torture/rpc/schannel.c if (lp_client_lanman_auth(s->tctx->lp_ctx)) { tctx 578 source4/torture/rpc/schannel.c if (lp_client_ntlmv2_auth(s->tctx->lp_ctx)) { tctx 606 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(s->tctx, status, tctx 632 source4/torture/rpc/schannel.c torture_assert(s->tctx, req, "Failed to setup LogonSamLogonEx request"); tctx 681 source4/torture/rpc/schannel.c s->tctx = torture; tctx 690 source4/torture/rpc/schannel.c tmp = torture_setting_string(s->tctx, "extra_user1", NULL); tctx 697 source4/torture/rpc/schannel.c tmp = torture_setting_string(s->tctx, "extra_user2", NULL); tctx 702 source4/torture/rpc/schannel.c s->join_ctx1 = torture_join_domain(s->tctx, talloc_asprintf(s, "%sb", TEST_MACHINE_NAME), tctx 706 source4/torture/rpc/schannel.c s->join_ctx2 = torture_join_domain(s->tctx, talloc_asprintf(s, "%sc", TEST_MACHINE_NAME), tctx 37 source4/torture/rpc/session_key.c struct torture_context *tctx, tctx 56 source4/torture/rpc/session_key.c secname = talloc_asprintf(tctx, "torturesecret-%u", (uint_t)random()); tctx 58 source4/torture/rpc/session_key.c torture_comment(tctx, "Testing CreateSecret of %s\n", secname); tctx 66 source4/torture/rpc/session_key.c status = dcerpc_lsa_CreateSecret(p, tctx, &r); tctx 67 source4/torture/rpc/session_key.c torture_assert_ntstatus_ok(tctx, status, "CreateSecret failed"); tctx 70 source4/torture/rpc/session_key.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_fetch_session_key failed"); tctx 81 source4/torture/rpc/session_key.c torture_comment(tctx, "Testing SetSecret\n"); tctx 83 source4/torture/rpc/session_key.c status = dcerpc_lsa_SetSecret(p, tctx, &r3); tctx 84 source4/torture/rpc/session_key.c torture_assert_ntstatus_ok(tctx, status, "SetSecret failed"); tctx 96 source4/torture/rpc/session_key.c torture_comment(tctx, "Testing SetSecret with broken key\n"); tctx 98 source4/torture/rpc/session_key.c status = dcerpc_lsa_SetSecret(p, tctx, &r3); tctx 99 source4/torture/rpc/session_key.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_UNKNOWN_REVISION, tctx 116 source4/torture/rpc/session_key.c torture_comment(tctx, "Testing QuerySecret\n"); tctx 117 source4/torture/rpc/session_key.c status = dcerpc_lsa_QuerySecret(p, tctx, &r4); tctx 118 source4/torture/rpc/session_key.c torture_assert_ntstatus_ok(tctx, status, "QuerySecret failed"); tctx 120 source4/torture/rpc/session_key.c torture_fail(tctx, "No secret buffer returned"); tctx 124 source4/torture/rpc/session_key.c blob2 = data_blob_talloc(tctx, NULL, blob1.length); tctx 126 source4/torture/rpc/session_key.c secret2 = sess_decrypt_string(tctx, &blob1, &session_key); tctx 128 source4/torture/rpc/session_key.c torture_assert_str_equal(tctx, secret1, secret2, "Returned secret invalid"); tctx 132 source4/torture/rpc/session_key.c status = dcerpc_lsa_DeleteObject(p, tctx, &d); tctx 133 source4/torture/rpc/session_key.c torture_assert_ntstatus_ok(tctx, status, "delete should have returned OKINVALID_HANDLE"); tctx 53 source4/torture/rpc/spoolss.c #define COMPARE_STRING(tctx, c,r,e) \ tctx 54 source4/torture/rpc/spoolss.c torture_assert_str_equal(tctx, c.e, r.e, "invalid value") tctx 60 source4/torture/rpc/spoolss.c torture_fail(tctx, #c "." #e "field is not " #type "\n"); \ tctx 63 source4/torture/rpc/spoolss.c torture_fail(tctx, #r "." #e "field is not " #type "\n"); \ tctx 70 source4/torture/rpc/spoolss.c #define COMPARE_UINT32(tctx, c, r, e) do {\ tctx 72 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, c.e, r.e, "invalid value"); \ tctx 75 source4/torture/rpc/spoolss.c #define COMPARE_STRING_ARRAY(tctx, c,r,e) tctx 77 source4/torture/rpc/spoolss.c static bool test_OpenPrinter_server(struct torture_context *tctx, struct dcerpc_pipe *p, struct test_spoolss_context *ctx) tctx 88 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing OpenPrinter(%s)\n", op.in.printername); tctx 91 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_OpenPrinter failed"); tctx 92 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, op.out.result, "dcerpc_spoolss_OpenPrinter failed"); tctx 97 source4/torture/rpc/spoolss.c static bool test_EnumPorts(struct torture_context *tctx, tctx 121 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPorts level %u\n", r.in.level); tctx 124 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPorts failed"); tctx 129 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, tctx 138 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPorts failed"); tctx 140 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPorts failed"); tctx 142 source4/torture/rpc/spoolss.c torture_assert(tctx, info, "EnumPorts returned no info"); tctx 151 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, ctx->port_count[level], ctx->port_count[old_level], tctx 163 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info1, ref->info2, port_name); tctx 175 source4/torture/rpc/spoolss.c static bool test_GetPrintProcessorDirectory(struct torture_context *tctx, tctx 215 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetPrintProcessorDirectory level %u\n", r.in.level); tctx 218 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, tctx 220 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, tctx 229 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_GetPrintProcessorDirectory failed"); tctx 231 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetPrintProcessorDirectory failed"); tctx 238 source4/torture/rpc/spoolss.c static bool test_GetPrinterDriverDirectory(struct torture_context *tctx, tctx 278 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetPrinterDriverDirectory level %u\n", r.in.level); tctx 281 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, tctx 283 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, tctx 292 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_GetPrinterDriverDirectory failed"); tctx 294 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetPrinterDriverDirectory failed"); tctx 300 source4/torture/rpc/spoolss.c static bool test_EnumPrinterDrivers(struct torture_context *tctx, tctx 320 source4/torture/rpc/spoolss.c r.in.server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 329 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinterDrivers level %u\n", r.in.level); tctx 332 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, tctx 345 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrinterDrivers failed"); tctx 348 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrinterDrivers failed"); tctx 357 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, ctx->driver_count[level], ctx->driver_count[old_level], tctx 368 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info1, ref->info6, driver_name); tctx 371 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info2, ref->info6, version); tctx 372 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info2, ref->info6, driver_name); tctx 373 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info2, ref->info6, architecture); tctx 374 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info2, ref->info6, driver_path); tctx 375 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info2, ref->info6, data_file); tctx 376 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info2, ref->info6, config_file); tctx 379 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info3, ref->info6, version); tctx 380 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, driver_name); tctx 381 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, architecture); tctx 382 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, driver_path); tctx 383 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, data_file); tctx 384 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, config_file); tctx 385 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, help_file); tctx 386 source4/torture/rpc/spoolss.c COMPARE_STRING_ARRAY(tctx, cur->info3, ref->info6, dependent_files); tctx 387 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, monitor_name); tctx 388 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, default_datatype); tctx 391 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info4, ref->info6, version); tctx 392 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, driver_name); tctx 393 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, architecture); tctx 394 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, driver_path); tctx 395 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, data_file); tctx 396 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, config_file); tctx 397 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, help_file); tctx 398 source4/torture/rpc/spoolss.c COMPARE_STRING_ARRAY(tctx, cur->info4, ref->info6, dependent_files); tctx 399 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, monitor_name); tctx 400 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, default_datatype); tctx 401 source4/torture/rpc/spoolss.c COMPARE_STRING_ARRAY(tctx, cur->info4, ref->info6, previous_names); tctx 404 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info5, ref->info6, version); tctx 405 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info6, driver_name); tctx 406 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info6, architecture); tctx 407 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info6, driver_path); tctx 408 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info6, data_file); tctx 409 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info6, config_file); tctx 424 source4/torture/rpc/spoolss.c static bool test_EnumMonitors(struct torture_context *tctx, tctx 448 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumMonitors level %u\n", r.in.level); tctx 451 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumMonitors failed"); tctx 456 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, tctx 465 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumMonitors failed"); tctx 467 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumMonitors failed"); tctx 476 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, ctx->monitor_count[level], ctx->monitor_count[old_level], tctx 487 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info1, ref->info2, monitor_name); tctx 499 source4/torture/rpc/spoolss.c static bool test_EnumPrintProcessors(struct torture_context *tctx, tctx 524 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrintProcessors level %u\n", r.in.level); tctx 527 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcessors failed"); tctx 532 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, tctx 541 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcessors failed"); tctx 543 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrintProcessors failed"); tctx 552 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, ctx->print_processor_count[level], ctx->print_processor_count[old_level], tctx 574 source4/torture/rpc/spoolss.c static bool test_EnumPrintProcDataTypes(struct torture_context *tctx, tctx 599 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrintProcDataTypes level %u\n", r.in.level); tctx 602 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcDataType failed"); tctx 607 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, tctx 616 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcDataTypes failed"); tctx 618 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrintProcDataTypes failed"); tctx 625 source4/torture/rpc/spoolss.c static bool test_EnumPrinters(struct torture_context *tctx, tctx 650 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinters level %u\n", r.in.level); tctx 653 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrinters failed"); tctx 658 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, tctx 667 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrinters failed"); tctx 669 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrinters failed"); tctx 678 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, ctx->printer_count[level], ctx->printer_count[old_level], tctx 689 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info0, ref->info2, printername); tctx 690 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info0, ref->info2, servername); tctx 691 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info0, ref->info2, cjobs); tctx 710 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info0, ref->info2, status); tctx 723 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info1, ref->info2, comment); tctx 729 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info2, printername); tctx 730 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info2, servername); tctx 731 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info4, ref->info2, attributes); tctx 734 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info2, printername); tctx 735 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info2, portname); tctx 736 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info5, ref->info2, attributes); tctx 751 source4/torture/rpc/spoolss.c static bool test_GetPrinter(struct torture_context *tctx, tctx 768 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetPrinter level %u\n", r.in.level); tctx 770 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinter(p, tctx, &r); tctx 771 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed"); tctx 774 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed); tctx 778 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinter(p, tctx, &r); tctx 781 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed"); tctx 783 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetPrinter failed"); tctx 790 source4/torture/rpc/spoolss.c static bool test_ClosePrinter(struct torture_context *tctx, tctx 800 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing ClosePrinter\n"); tctx 802 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_ClosePrinter(p, tctx, &r); tctx 803 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed"); tctx 808 source4/torture/rpc/spoolss.c static bool test_GetForm(struct torture_context *tctx, tctx 825 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetForm level %d\n", r.in.level); tctx 827 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetForm(p, tctx, &r); tctx 828 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetForm failed"); tctx 831 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed); tctx 835 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetForm(p, tctx, &r); tctx 836 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetForm failed"); tctx 838 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetForm failed"); tctx 840 source4/torture/rpc/spoolss.c torture_assert(tctx, r.out.info, "No form info returned"); tctx 843 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetForm failed"); tctx 848 source4/torture/rpc/spoolss.c static bool test_EnumForms(struct torture_context *tctx, tctx 872 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumForms level %d\n", levels[i]); tctx 874 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumForms(p, tctx, &r); tctx 875 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumForms failed"); tctx 882 source4/torture/rpc/spoolss.c torture_fail(tctx, "EnumForms on the PrintServer isn't supported by test server (NT4)"); tctx 886 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed); tctx 891 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumForms(p, tctx, &r); tctx 893 source4/torture/rpc/spoolss.c torture_assert(tctx, info, "No forms returned"); tctx 897 source4/torture/rpc/spoolss.c ret &= test_GetForm(tctx, p, handle, info[j].info1.form_name, levels[i]); tctx 901 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumForms failed"); tctx 903 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumForms failed"); tctx 909 source4/torture/rpc/spoolss.c static bool test_DeleteForm(struct torture_context *tctx, tctx 920 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_DeleteForm(p, tctx, &r); tctx 922 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "DeleteForm failed"); tctx 924 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "DeleteForm failed"); tctx 929 source4/torture/rpc/spoolss.c static bool test_AddForm(struct torture_context *tctx, tctx 951 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_AddForm(p, tctx, &r); tctx 953 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "AddForm failed"); tctx 955 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "AddForm failed"); tctx 957 source4/torture/rpc/spoolss.c if (!print_server) ret &= test_GetForm(tctx, p, handle, form_name, 1); tctx 974 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_SetForm(p, tctx, &sf); tctx 976 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "SetForm failed"); tctx 978 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "SetForm failed"); tctx 981 source4/torture/rpc/spoolss.c if (!print_server) ret &= test_GetForm(tctx, p, handle, form_name, 1); tctx 983 source4/torture/rpc/spoolss.c if (!test_DeleteForm(tctx, p, handle, form_name)) { tctx 990 source4/torture/rpc/spoolss.c static bool test_EnumPorts_old(struct torture_context *tctx, tctx 999 source4/torture/rpc/spoolss.c r.in.servername = talloc_asprintf(tctx, "\\\\%s", tctx 1008 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPorts\n"); tctx 1010 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPorts(p, tctx, &r); tctx 1012 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPorts failed"); tctx 1015 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed); tctx 1020 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPorts(p, tctx, &r); tctx 1021 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPorts failed"); tctx 1023 source4/torture/rpc/spoolss.c torture_assert(tctx, info, "No ports returned"); tctx 1029 source4/torture/rpc/spoolss.c static bool test_AddPort(struct torture_context *tctx, tctx 1035 source4/torture/rpc/spoolss.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", tctx 1040 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing AddPort\n"); tctx 1042 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_AddPort(p, tctx, &r); tctx 1044 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "AddPort failed"); tctx 1060 source4/torture/rpc/spoolss.c static bool test_GetJob(struct torture_context *tctx, tctx 1077 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetJob level %d\n", r.in.level); tctx 1079 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetJob(p, tctx, &r); tctx 1080 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_UNKNOWN_LEVEL, "Unexpected return code"); tctx 1084 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetJob level %d\n", r.in.level); tctx 1089 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetJob(p, tctx, &r); tctx 1090 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetJob failed"); tctx 1093 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed); tctx 1098 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetJob(p, tctx, &r); tctx 1099 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetJob failed"); tctx 1102 source4/torture/rpc/spoolss.c torture_assert(tctx, r.out.info, "No job info returned"); tctx 1103 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetJob failed"); tctx 1109 source4/torture/rpc/spoolss.c static bool test_SetJob(struct torture_context *tctx, tctx 1124 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_PAUSE\n"); tctx 1127 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RESUME\n"); tctx 1130 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_CANCEL\n"); tctx 1133 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RESTART\n"); tctx 1136 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_DELETE\n"); tctx 1139 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_SEND_TO_PRINTER\n"); tctx 1142 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_LAST_PAGE_EJECTED\n"); tctx 1145 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RETAIN\n"); tctx 1148 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RELEASE\n"); tctx 1151 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob\n"); tctx 1155 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_SetJob(p, tctx, &r); tctx 1156 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "SetJob failed"); tctx 1157 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "SetJob failed"); tctx 1162 source4/torture/rpc/spoolss.c static bool test_AddJob(struct torture_context *tctx, tctx 1176 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing AddJob\n"); tctx 1178 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_AddJob(p, tctx, &r); tctx 1179 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_UNKNOWN_LEVEL, "AddJob failed"); tctx 1183 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_AddJob(p, tctx, &r); tctx 1184 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM, "AddJob failed"); tctx 1190 source4/torture/rpc/spoolss.c static bool test_EnumJobs(struct torture_context *tctx, tctx 1210 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumJobs\n"); tctx 1212 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumJobs(p, tctx, &r); tctx 1214 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumJobs failed"); tctx 1218 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed); tctx 1223 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumJobs(p, tctx, &r); tctx 1225 source4/torture/rpc/spoolss.c torture_assert(tctx, info, "No jobs returned"); tctx 1229 source4/torture/rpc/spoolss.c test_GetJob(tctx, p, handle, info[j].info1.job_id); tctx 1232 source4/torture/rpc/spoolss.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 1233 source4/torture/rpc/spoolss.c test_SetJob(tctx, p, handle, info[j].info1.job_id, SPOOLSS_JOB_CONTROL_PAUSE); tctx 1234 source4/torture/rpc/spoolss.c test_SetJob(tctx, p, handle, info[j].info1.job_id, SPOOLSS_JOB_CONTROL_RESUME); tctx 1239 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumJobs failed"); tctx 1245 source4/torture/rpc/spoolss.c static bool test_DoPrintTest(struct torture_context *tctx, tctx 1261 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing StartDocPrinter\n"); tctx 1271 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_StartDocPrinter(p, tctx, &s); tctx 1272 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_StartDocPrinter failed"); tctx 1273 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, s.out.result, "StartDocPrinter failed"); tctx 1276 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing StartPagePrinter: Page[%d]\n", i); tctx 1280 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_StartPagePrinter(p, tctx, &sp); tctx 1281 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, tctx 1283 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, sp.out.result, "StartPagePrinter failed"); tctx 1285 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing WritePrinter: Page[%d]\n", i); tctx 1288 source4/torture/rpc/spoolss.c w.in.data = data_blob_string_const(talloc_asprintf(tctx,"TortureTestPage: %d\nData\n",i)); tctx 1291 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_WritePrinter(p, tctx, &w); tctx 1292 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_WritePrinter failed"); tctx 1293 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, w.out.result, "WritePrinter failed"); tctx 1295 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EndPagePrinter: Page[%d]\n", i); tctx 1299 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EndPagePrinter(p, tctx, &ep); tctx 1300 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EndPagePrinter failed"); tctx 1301 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, ep.out.result, "EndPagePrinter failed"); tctx 1304 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EndDocPrinter\n"); tctx 1308 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EndDocPrinter(p, tctx, &e); tctx 1309 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EndDocPrinter failed"); tctx 1310 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, e.out.result, "EndDocPrinter failed"); tctx 1312 source4/torture/rpc/spoolss.c ret &= test_AddJob(tctx, p, handle); tctx 1313 source4/torture/rpc/spoolss.c ret &= test_EnumJobs(tctx, p, handle); tctx 1315 source4/torture/rpc/spoolss.c ret &= test_SetJob(tctx, p, handle, job_id, SPOOLSS_JOB_CONTROL_DELETE); tctx 1320 source4/torture/rpc/spoolss.c static bool test_PausePrinter(struct torture_context *tctx, tctx 1342 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetPrinter: SPOOLSS_PRINTER_CONTROL_PAUSE\n"); tctx 1344 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_SetPrinter(p, tctx, &r); tctx 1346 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "SetPrinter failed"); tctx 1348 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "SetPrinter failed"); tctx 1353 source4/torture/rpc/spoolss.c static bool test_ResumePrinter(struct torture_context *tctx, tctx 1375 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetPrinter: SPOOLSS_PRINTER_CONTROL_RESUME\n"); tctx 1377 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_SetPrinter(p, tctx, &r); tctx 1379 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "SetPrinter failed"); tctx 1381 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "SetPrinter failed"); tctx 1386 source4/torture/rpc/spoolss.c static bool test_GetPrinterData(struct torture_context *tctx, tctx 1404 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetPrinterData\n"); tctx 1406 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterData(p, tctx, &r); tctx 1407 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterData failed"); tctx 1412 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterData(p, tctx, &r); tctx 1413 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterData failed"); tctx 1415 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetPrinterData failed"); tctx 1421 source4/torture/rpc/spoolss.c static bool test_GetPrinterDataEx(struct torture_context *tctx, tctx 1440 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetPrinterDataEx\n"); tctx 1442 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterDataEx(p, tctx, &r); tctx 1446 source4/torture/rpc/spoolss.c torture_skip(tctx, "GetPrinterDataEx not supported by server\n"); tctx 1448 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterDataEx failed"); tctx 1453 source4/torture/rpc/spoolss.c r.out.buffer = talloc_array(tctx, uint8_t, needed); tctx 1455 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterDataEx(p, tctx, &r); tctx 1456 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterDataEx failed"); tctx 1458 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetPrinterDataEx failed"); tctx 1464 source4/torture/rpc/spoolss.c static bool test_EnumPrinterData(struct torture_context *tctx, struct dcerpc_pipe *p, tctx 1485 source4/torture/rpc/spoolss.c r.out.data = talloc_zero_array(tctx, uint8_t, 0); tctx 1487 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinterData\n"); tctx 1489 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterData(p, tctx, &r); tctx 1491 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterData failed"); tctx 1494 source4/torture/rpc/spoolss.c r.out.value_name = talloc_zero_array(tctx, const char, value_size); tctx 1496 source4/torture/rpc/spoolss.c r.out.data = talloc_zero_array(tctx, uint8_t, data_size); tctx 1498 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterData(p, tctx, &r); tctx 1500 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterData failed"); tctx 1502 source4/torture/rpc/spoolss.c test_GetPrinterData(tctx, p, handle, r.out.value_name); tctx 1504 source4/torture/rpc/spoolss.c test_GetPrinterDataEx(tctx, tctx 1515 source4/torture/rpc/spoolss.c static bool test_EnumPrinterDataEx(struct torture_context *tctx, tctx 1532 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinterDataEx\n"); tctx 1534 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &r); tctx 1535 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDataEx failed"); tctx 1539 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &r); tctx 1541 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDataEx failed"); tctx 1547 source4/torture/rpc/spoolss.c static bool test_DeletePrinterData(struct torture_context *tctx, tctx 1558 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing DeletePrinterData\n"); tctx 1560 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_DeletePrinterData(p, tctx, &r); tctx 1562 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "DeletePrinterData failed"); tctx 1567 source4/torture/rpc/spoolss.c static bool test_SetPrinterData(struct torture_context *tctx, tctx 1580 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetPrinterData\n"); tctx 1582 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_SetPrinterData(p, tctx, &r); tctx 1584 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "SetPrinterData failed"); tctx 1586 source4/torture/rpc/spoolss.c if (!test_GetPrinterData(tctx, p, handle, value_name)) { tctx 1590 source4/torture/rpc/spoolss.c if (!test_DeletePrinterData(tctx, p, handle, value_name)) { tctx 1597 source4/torture/rpc/spoolss.c static bool test_SecondaryClosePrinter(struct torture_context *tctx, tctx 1611 source4/torture/rpc/spoolss.c torture_comment(tctx, "testing close on secondary pipe\n"); tctx 1613 source4/torture/rpc/spoolss.c status = dcerpc_parse_binding(tctx, p->conn->binding_string, &b); tctx 1614 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "Failed to parse dcerpc binding"); tctx 1617 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "Failed to create secondary connection"); tctx 1620 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "Failed to create bind on secondary connection"); tctx 1625 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_ClosePrinter(p2, tctx, &cp); tctx 1626 source4/torture/rpc/spoolss.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NET_WRITE_FAULT, tctx 1629 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, p2->last_fault_code, DCERPC_FAULT_CONTEXT_MISMATCH, tctx 1637 source4/torture/rpc/spoolss.c static bool test_OpenPrinter_badname(struct torture_context *tctx, tctx 1652 source4/torture/rpc/spoolss.c torture_comment(tctx, "\nTesting OpenPrinter(%s) with bad name\n", op.in.printername); tctx 1654 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_OpenPrinter(p, tctx, &op); tctx 1655 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinter failed"); tctx 1657 source4/torture/rpc/spoolss.c torture_comment(tctx, "OpenPrinter(%s) unexpected result[%s] should be WERR_INVALID_PRINTER_NAME\n", tctx 1662 source4/torture/rpc/spoolss.c ret &=test_ClosePrinter(tctx, p, &handle); tctx 1673 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing OpenPrinterEx(%s) with bad name\n", opEx.in.printername); tctx 1675 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &opEx); tctx 1676 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinterEx failed"); tctx 1678 source4/torture/rpc/spoolss.c torture_comment(tctx, "OpenPrinterEx(%s) unexpected result[%s] should be WERR_INVALID_PARAM\n", tctx 1683 source4/torture/rpc/spoolss.c ret &=test_ClosePrinter(tctx, p, &handle); tctx 1689 source4/torture/rpc/spoolss.c static bool test_OpenPrinter(struct torture_context *tctx, tctx 1698 source4/torture/rpc/spoolss.c r.in.printername = talloc_asprintf(tctx, "\\\\%s\\%s", dcerpc_server_name(p), name); tctx 1704 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing OpenPrinter(%s)\n", r.in.printername); tctx 1706 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_OpenPrinter(p, tctx, &r); tctx 1708 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinter failed"); tctx 1710 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "OpenPrinter failed"); tctx 1712 source4/torture/rpc/spoolss.c if (!test_GetPrinter(tctx, p, &handle)) { tctx 1716 source4/torture/rpc/spoolss.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 1717 source4/torture/rpc/spoolss.c if (!test_SecondaryClosePrinter(tctx, p, &handle)) { tctx 1722 source4/torture/rpc/spoolss.c if (!test_ClosePrinter(tctx, p, &handle)) { tctx 1729 source4/torture/rpc/spoolss.c static bool call_OpenPrinterEx(struct torture_context *tctx, tctx 1738 source4/torture/rpc/spoolss.c r.in.printername = talloc_asprintf(tctx, "\\\\%s\\%s", tctx 1741 source4/torture/rpc/spoolss.c r.in.printername = talloc_asprintf(tctx, "\\\\%s", tctx 1760 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing OpenPrinterEx(%s)\n", r.in.printername); tctx 1762 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &r); tctx 1764 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinterEx failed"); tctx 1766 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "OpenPrinterEx failed"); tctx 1771 source4/torture/rpc/spoolss.c static bool test_OpenPrinterEx(struct torture_context *tctx, tctx 1778 source4/torture/rpc/spoolss.c if (!call_OpenPrinterEx(tctx, p, name, &handle)) { tctx 1782 source4/torture/rpc/spoolss.c if (!test_GetPrinter(tctx, p, &handle)) { tctx 1786 source4/torture/rpc/spoolss.c if (!test_EnumForms(tctx, p, &handle, false)) { tctx 1790 source4/torture/rpc/spoolss.c if (!test_AddForm(tctx, p, &handle, false)) { tctx 1794 source4/torture/rpc/spoolss.c if (!test_EnumPrinterData(tctx, p, &handle)) { tctx 1798 source4/torture/rpc/spoolss.c if (!test_EnumPrinterDataEx(tctx, p, &handle)) { tctx 1802 source4/torture/rpc/spoolss.c if (!test_PausePrinter(tctx, p, &handle)) { tctx 1806 source4/torture/rpc/spoolss.c if (!test_DoPrintTest(tctx, p, &handle)) { tctx 1810 source4/torture/rpc/spoolss.c if (!test_ResumePrinter(tctx, p, &handle)) { tctx 1814 source4/torture/rpc/spoolss.c if (!test_SetPrinterData(tctx, p, &handle)) { tctx 1818 source4/torture/rpc/spoolss.c if (!torture_setting_bool(tctx, "samba3", false)) { tctx 1819 source4/torture/rpc/spoolss.c if (!test_SecondaryClosePrinter(tctx, p, &handle)) { tctx 1824 source4/torture/rpc/spoolss.c if (!test_ClosePrinter(tctx, p, &handle)) { tctx 1831 source4/torture/rpc/spoolss.c static bool test_EnumPrinters_old(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 1854 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinters level %u\n", r.in.level); tctx 1856 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinters(p, tctx, &r); tctx 1857 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinters failed"); tctx 1860 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed); tctx 1864 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinters(p, tctx, &r); tctx 1867 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinters failed"); tctx 1869 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrinters failed"); tctx 1872 source4/torture/rpc/spoolss.c torture_comment(tctx, "No printers returned\n"); tctx 1878 source4/torture/rpc/spoolss.c char *unc = talloc_strdup(tctx, info[j].info1.name); tctx 1889 source4/torture/rpc/spoolss.c if (!test_OpenPrinter(tctx, p, name)) { tctx 1892 source4/torture/rpc/spoolss.c if (!test_OpenPrinterEx(tctx, p, name)) { tctx 1926 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterDriver2(p, tctx, &r); tctx 1934 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterDriver2(p, tctx, &r); tctx 1953 source4/torture/rpc/spoolss.c static bool test_EnumPrinterDrivers_old(struct torture_context *tctx, tctx 1967 source4/torture/rpc/spoolss.c r.in.server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1976 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinterDrivers level %u\n", r.in.level); tctx 1978 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterDrivers(p, tctx, &r); tctx 1980 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDrivers failed"); tctx 1983 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed); tctx 1987 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterDrivers(p, tctx, &r); tctx 1990 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDrivers failed"); tctx 1992 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrinterDrivers failed"); tctx 1995 source4/torture/rpc/spoolss.c torture_comment(tctx, "No printer drivers returned\n"); tctx 185 source4/torture/rpc/spoolss_notify.c static bool test_RFFPCNEx(struct torture_context *tctx, tctx 203 source4/torture/rpc/spoolss_notify.c ntvfs_init(tctx->lp_ctx); tctx 207 source4/torture/rpc/spoolss_notify.c q.in.printername = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 213 source4/torture/rpc/spoolss_notify.c torture_comment(tctx, "Testing OpenPrinter(%s)\n", q.in.printername); tctx 215 source4/torture/rpc/spoolss_notify.c status = dcerpc_spoolss_OpenPrinter(p, tctx, &q); tctx 217 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinter failed"); tctx 219 source4/torture/rpc/spoolss_notify.c torture_assert_werr_ok(tctx, q.out.result, "OpenPrinter failed"); tctx 232 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, dcerpc_register_ep_server(&ep_server), tctx 235 source4/torture/rpc/spoolss_notify.c lp_set_cmdline(tctx->lp_ctx, "dcerpc endpoint servers", "spoolss"); tctx 237 source4/torture/rpc/spoolss_notify.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces); tctx 239 source4/torture/rpc/spoolss_notify.c torture_comment(tctx, "Listening for callbacks on %s\n", address); tctx 240 source4/torture/rpc/spoolss_notify.c status = smbsrv_add_socket(p->conn->event_ctx, tctx->lp_ctx, &single_ops, address); tctx 241 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, status, "starting smb server"); tctx 243 source4/torture/rpc/spoolss_notify.c status = dcesrv_init_context(tctx, tctx->lp_ctx, endpoints, &dce_ctx); tctx 244 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, status, tctx 248 source4/torture/rpc/spoolss_notify.c r.in.local_machine = talloc_asprintf(tctx, "\\\\%s", address); tctx 254 source4/torture/rpc/spoolss_notify.c t1.types = talloc_zero_array(tctx, struct spoolss_NotifyOptionType, 2); tctx 268 source4/torture/rpc/spoolss_notify.c status = dcerpc_spoolss_RemoteFindFirstPrinterChangeNotifyEx(p, tctx, &r); tctx 270 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, status, "FFPCNEx failed"); tctx 272 source4/torture/rpc/spoolss_notify.c torture_assert_werr_ok(tctx, r.out.result, "error return code for FFPCNEx"); tctx 277 source4/torture/rpc/spoolss_notify.c torture_comment(tctx, "Testing ClosePrinter\n"); tctx 279 source4/torture/rpc/spoolss_notify.c status = dcerpc_spoolss_ClosePrinter(p, tctx, &cp); tctx 280 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed"); tctx 283 source4/torture/rpc/spoolss_notify.c torture_assert(tctx, received_packets != NULL, "no packets received"); tctx 284 source4/torture/rpc/spoolss_notify.c torture_assert_int_equal(tctx, received_packets->opnum, 58, "invalid opnum"); tctx 295 source4/torture/rpc/spoolss_notify.c static bool test_ReplyOpenPrinter(struct torture_context *tctx, tctx 309 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, tctx 310 source4/torture/rpc/spoolss_notify.c dcerpc_spoolss_ReplyOpenPrinter(pipe, tctx, &r), tctx 313 source4/torture/rpc/spoolss_notify.c torture_assert_werr_ok(tctx, r.out.result, "error return code"); tctx 318 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, tctx 319 source4/torture/rpc/spoolss_notify.c dcerpc_spoolss_ReplyClosePrinter(pipe, tctx, &s), tctx 322 source4/torture/rpc/spoolss_notify.c torture_assert_werr_ok(tctx, r.out.result, "error return code"); tctx 42 source4/torture/rpc/spoolss_win.c static bool test_OpenPrinterEx(struct torture_context *tctx, tctx 52 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Opening printer '%s'\n", printer_name); tctx 54 source4/torture/rpc/spoolss_win.c op.in.printername = talloc_strdup(tctx, printer_name); tctx 70 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &op); tctx 71 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinterEx failed"); tctx 72 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, op.out.result, "OpenPrinterEx failed"); tctx 77 source4/torture/rpc/spoolss_win.c static bool test_OpenPrinterAsAdmin(struct torture_context *tctx, tctx 95 source4/torture/rpc/spoolss_win.c op.in.printername = talloc_strdup(tctx, printername); tctx 106 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing OpenPrinterEx(%s) with admin rights\n", tctx 109 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &op); tctx 112 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_ClosePrinter(p, tctx, &cp); tctx 113 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed"); tctx 120 source4/torture/rpc/spoolss_win.c static bool test_ClosePrinter(struct torture_context *tctx, tctx 125 source4/torture/rpc/spoolss_win.c static bool test_OpenPrinterSequence(struct torture_context *tctx, tctx 130 source4/torture/rpc/spoolss_win.c char *printername = talloc_asprintf(tctx, "\\\\%s", tctx 134 source4/torture/rpc/spoolss_win.c ret = test_OpenPrinterEx(tctx, p, handle, printername, 0); tctx 135 source4/torture/rpc/spoolss_win.c torture_assert(tctx, ret == true, "OpenPrinterEx failed."); tctx 137 source4/torture/rpc/spoolss_win.c ret = test_ClosePrinter(tctx, p, handle); tctx 138 source4/torture/rpc/spoolss_win.c torture_assert(tctx, ret, "ClosePrinter failed"); tctx 141 source4/torture/rpc/spoolss_win.c ret = test_OpenPrinterAsAdmin(tctx, p, printername); tctx 142 source4/torture/rpc/spoolss_win.c torture_assert(tctx, ret == true, tctx 145 source4/torture/rpc/spoolss_win.c ret = test_OpenPrinterEx(tctx, p, handle, printername, SERVER_EXECUTE); tctx 146 source4/torture/rpc/spoolss_win.c torture_assert(tctx, ret == true, "OpenPrinterEx failed."); tctx 151 source4/torture/rpc/spoolss_win.c static bool test_GetPrinterData(struct torture_context *tctx, tctx 164 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing GetPrinterData(%s).\n", value_name); tctx 172 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_GetPrinterData(p, tctx, &gpd); tctx 173 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterData failed."); tctx 174 source4/torture/rpc/spoolss_win.c torture_assert_werr_equal(tctx, gpd.out.result, expected_werr, tctx 178 source4/torture/rpc/spoolss_win.c torture_assert_int_equal(tctx, data.value, tctx 185 source4/torture/rpc/spoolss_win.c static bool test_EnumPrinters(struct torture_context *tctx, tctx 198 source4/torture/rpc/spoolss_win.c ep.in.server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 207 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinters failed."); tctx 214 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status,"EnumPrinters failed."); tctx 217 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, ep.out.result, "EnumPrinters failed."); tctx 222 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Found %d printer(s).\n", ctx->printer_count); tctx 227 source4/torture/rpc/spoolss_win.c static bool test_GetPrinter(struct torture_context *tctx, tctx 239 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Test GetPrinter level %d\n", level); tctx 247 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_GetPrinter(p, tctx, &gp); tctx 248 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed"); tctx 254 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_GetPrinter(p, tctx, &gp); tctx 255 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed"); tctx 258 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, gp.out.result, "GetPrinter failed"); tctx 270 source4/torture/rpc/spoolss_win.c static bool test_EnumJobs(struct torture_context *tctx, tctx 276 source4/torture/rpc/spoolss_win.c DATA_BLOB blob = data_blob_talloc_zero(tctx, 1024); tctx 281 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Test EnumJobs\n"); tctx 291 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumJobs(p, tctx, &ej); tctx 292 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumJobs failed"); tctx 294 source4/torture/rpc/spoolss_win.c blob = data_blob_talloc_zero(tctx, needed); tctx 297 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumJobs(p, tctx, &ej); tctx 298 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumJobs failed"); tctx 300 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, ej.out.result, "EnumJobs failed"); tctx 305 source4/torture/rpc/spoolss_win.c static bool test_GetPrinterDriver2(struct torture_context *tctx, tctx 312 source4/torture/rpc/spoolss_win.c DATA_BLOB blob = data_blob_talloc_zero(tctx, 87424); tctx 317 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing GetPrinterDriver2\n"); tctx 330 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_GetPrinterDriver2(p, tctx, &gpd2); tctx 331 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterDriver2 failed"); tctx 334 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, gpd2.out.result, tctx 341 source4/torture/rpc/spoolss_win.c static bool test_EnumForms(struct torture_context *tctx, tctx 348 source4/torture/rpc/spoolss_win.c DATA_BLOB blob = data_blob_talloc_zero(tctx, initial_blob_size); tctx 353 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing EnumForms\n"); tctx 363 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumForms(p, tctx, &ef); tctx 364 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumForms failed"); tctx 367 source4/torture/rpc/spoolss_win.c blob = data_blob_talloc_zero(tctx, needed); tctx 370 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumForms(p, tctx, &ef); tctx 371 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumForms failed"); tctx 374 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, ef.out.result, "EnumForms failed"); tctx 379 source4/torture/rpc/spoolss_win.c static bool test_EnumPrinterKey(struct torture_context *tctx, tctx 390 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing EnumPrinterKey(%s)\n", key); tctx 393 source4/torture/rpc/spoolss_win.c epk.in.key_name = talloc_strdup(tctx, key); tctx 398 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumPrinterKey(p, tctx, &epk); tctx 399 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterKey failed"); tctx 404 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumPrinterKey(p, tctx, &epk); tctx 405 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, tctx 409 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, epk.out.result, "EnumPrinterKey failed"); tctx 416 source4/torture/rpc/spoolss_win.c static bool test_EnumPrinterDataEx(struct torture_context *tctx, tctx 429 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing EnumPrinterDataEx(%s)\n", key); tctx 432 source4/torture/rpc/spoolss_win.c epde.in.key_name = talloc_strdup(tctx, key); tctx 438 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &epde); tctx 439 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDataEx failed."); tctx 442 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &epde); tctx 443 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, tctx 447 source4/torture/rpc/spoolss_win.c torture_assert_werr_equal(tctx, epde.out.result, expected_error, tctx 453 source4/torture/rpc/spoolss_win.c static bool test_ClosePrinter(struct torture_context *tctx, tctx 463 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_ClosePrinter(p, tctx, &cp); tctx 464 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed"); tctx 469 source4/torture/rpc/spoolss_win.c static bool test_WinXP(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 480 source4/torture/rpc/spoolss_win.c ntvfs_init(tctx->lp_ctx); tctx 482 source4/torture/rpc/spoolss_win.c ctx = talloc_zero(tctx, struct test_spoolss_win_context); tctx 483 source4/torture/rpc/spoolss_win.c tmp_ctx = talloc_zero(tctx, struct test_spoolss_win_context); tctx 485 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterSequence(tctx, p, &handle01); tctx 486 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinterData(tctx, p, &handle01,"UISingleJobStatusString", tctx 488 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Skip RemoteFindNextPrinterChangeNotifyEx test\n"); tctx 491 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle1, server_name, 0); tctx 493 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinters(tctx, p, ctx, 1024); tctx 495 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle02, server_name, 0); tctx 496 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinterData(tctx, p, &handle02, "MajorVersion", WERR_OK, tctx 498 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle02); tctx 505 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle02, tctx 508 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle02, ctx, 2, 0); tctx 510 source4/torture/rpc/spoolss_win.c torture_assert_str_equal(tctx, ctx->current_info->info2.printername, tctx 515 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle03, tctx 517 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle03, ctx, 0, 1164); tctx 518 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle03, ctx, 2, 0); tctx 520 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle04, tctx 522 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle04, ctx, 2, 0); tctx 523 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle04); tctx 525 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle04, tctx 527 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle04, ctx, 2, 4096); tctx 528 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle04); tctx 530 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterAsAdmin(tctx, p, tctx 533 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle04, tctx 535 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinterData(tctx, p, &handle04,"UISingleJobStatusString", tctx 537 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Skip RemoteFindNextPrinterChangeNotifyEx test\n"); tctx 539 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2, tctx 542 source4/torture/rpc/spoolss_win.c ret &= test_EnumJobs(tctx, p, &handle04); tctx 543 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle04, ctx, 2, 4096); tctx 545 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2); tctx 546 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle04); tctx 548 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinters(tctx, p, ctx, 1556); tctx 549 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinterDriver2(tctx, p, ctx, &handle03); tctx 550 source4/torture/rpc/spoolss_win.c ret &= test_EnumForms(tctx, p, &handle03, 0); tctx 552 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinterKey(tctx, p, &handle03, "", ctx); tctx 556 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinterKey(tctx, p, &handle03, tctx 559 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinterDataEx(tctx, p, &handle03, tctx 564 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinterDataEx(tctx, p, &handle03, "", 0, tctx 567 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle03, tmp_ctx, 2, 0); tctx 569 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2, tctx 571 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2); tctx 573 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle03, tmp_ctx, 2, 2556); tctx 575 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2, tctx 577 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2); tctx 579 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2, tctx 581 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2); tctx 583 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle03, tmp_ctx, 7, 0); tctx 585 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2, tctx 587 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2); tctx 589 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle03); tctx 591 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2, tctx 593 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2); tctx 595 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle03, server_name, 0); tctx 596 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinterData(tctx, p, &handle03, "W3SvcInstalled", tctx 598 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle03); tctx 600 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle1); tctx 601 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle02); tctx 603 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle02, tctx 605 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle02, tmp_ctx, 2, 0); tctx 606 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle02); tctx 609 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle01); tctx 30 source4/torture/rpc/srvsvc.c static bool test_NetCharDevGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 39 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 45 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetCharDevGetInfo level %u on device '%s'\n", tctx 47 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetCharDevGetInfo(p, tctx, &r); tctx 48 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetCharDevGetInfo failed"); tctx 49 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetCharDevGetInfo failed"); tctx 55 source4/torture/rpc/srvsvc.c static bool test_NetCharDevControl(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 63 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 69 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetCharDevControl opcode %u on device '%s'\n", tctx 71 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetCharDevControl(p, tctx, &r); tctx 72 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetCharDevControl failed"); tctx 73 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetCharDevControl failed"); tctx 79 source4/torture/rpc/srvsvc.c static bool test_NetCharDevEnum(struct torture_context *tctx, tctx 93 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 116 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetCharDevEnum level %u\n", info_ctr.level); tctx 117 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetCharDevEnum(p, tctx, &r); tctx 118 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetCharDevEnum failed"); tctx 120 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetCharDevEnum failed: %s\n", win_errstr(r.out.result)); tctx 129 source4/torture/rpc/srvsvc.c if (!test_NetCharDevGetInfo(p, tctx, device)) { tctx 132 source4/torture/rpc/srvsvc.c if (!test_NetCharDevControl(p, tctx, device)) { tctx 145 source4/torture/rpc/srvsvc.c static bool test_NetCharDevQGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 154 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 156 source4/torture/rpc/srvsvc.c r.in.user = talloc_asprintf(tctx,"Administrator"); tctx 161 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetCharDevQGetInfo level %u on devicequeue '%s'\n", tctx 163 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetCharDevQGetInfo(p, tctx, &r); tctx 164 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetCharDevQGetInfo failed"); tctx 165 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetCharDevQGetInfo failed"); tctx 226 source4/torture/rpc/srvsvc.c static bool test_NetCharDevQEnum(struct torture_context *tctx, tctx 240 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 241 source4/torture/rpc/srvsvc.c r.in.user = talloc_asprintf(tctx,"%s","Administrator"); tctx 263 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetCharDevQEnum level %u\n", info_ctr.level); tctx 264 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetCharDevQEnum(p, tctx, &r); tctx 265 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetCharDevQEnum failed"); tctx 267 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetCharDevQEnum failed: %s\n", win_errstr(r.out.result)); tctx 276 source4/torture/rpc/srvsvc.c if (!test_NetCharDevQGetInfo(p, tctx, device)) { tctx 289 source4/torture/rpc/srvsvc.c static bool test_NetConnEnum(struct torture_context *tctx, tctx 303 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 304 source4/torture/rpc/srvsvc.c r.in.path = talloc_asprintf(tctx,"%s","ADMIN$"); tctx 325 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetConnEnum level %u\n", info_ctr.level); tctx 326 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetConnEnum(p, tctx, &r); tctx 327 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetConnEnum failed"); tctx 329 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetConnEnum failed: %s\n", win_errstr(r.out.result)); tctx 339 source4/torture/rpc/srvsvc.c static bool test_NetFileEnum(struct torture_context *tctx, tctx 353 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 375 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetFileEnum level %u\n", info_ctr.level); tctx 376 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetFileEnum(p, tctx, &r); tctx 377 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetFileEnum failed"); tctx 379 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetFileEnum failed: %s\n", win_errstr(r.out.result)); tctx 389 source4/torture/rpc/srvsvc.c static bool test_NetSessEnum(struct torture_context *tctx, tctx 406 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 441 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetSessEnum level %u\n", info_ctr.level); tctx 442 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetSessEnum(p, tctx, &r); tctx 443 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetSessEnum failed"); tctx 445 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetSessEnum failed: %s\n", win_errstr(r.out.result)); tctx 455 source4/torture/rpc/srvsvc.c static bool test_NetShareCheck(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 462 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 466 source4/torture/rpc/srvsvc.c torture_comment(tctx, tctx 469 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareCheck(p, tctx, &r); tctx 470 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_srvsvc_NetShareCheck failed"); tctx 471 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetShareCheck failed"); tctx 476 source4/torture/rpc/srvsvc.c static bool test_NetShareGetInfo(struct torture_context *tctx, tctx 497 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 508 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetShareGetInfo level %u on share '%s'\n", tctx 511 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareGetInfo(p, tctx, &r); tctx 512 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed"); tctx 513 source4/torture/rpc/srvsvc.c torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareGetInfo failed"); tctx 517 source4/torture/rpc/srvsvc.c if (!test_NetShareCheck(p, tctx, r.out.info->info2->path)) { tctx 525 source4/torture/rpc/srvsvc.c static bool test_NetShareGetInfoAdminFull(struct torture_context *tctx, tctx 528 source4/torture/rpc/srvsvc.c return test_NetShareGetInfo(tctx, p, "ADMIN$", true); tctx 531 source4/torture/rpc/srvsvc.c static bool test_NetShareGetInfoAdminAnon(struct torture_context *tctx, tctx 534 source4/torture/rpc/srvsvc.c return test_NetShareGetInfo(tctx, p, "ADMIN$", false); tctx 537 source4/torture/rpc/srvsvc.c static bool test_NetShareAddSetDel(struct torture_context *tctx, tctx 565 source4/torture/rpc/srvsvc.c talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 566 source4/torture/rpc/srvsvc.c r.in.share_name = talloc_strdup(tctx, "testshare"); tctx 568 source4/torture/rpc/srvsvc.c info.info2 = talloc(tctx, struct srvsvc_NetShareInfo2); tctx 571 source4/torture/rpc/srvsvc.c info.info2->comment = talloc_strdup(tctx, "test comment"); tctx 575 source4/torture/rpc/srvsvc.c info.info2->path = talloc_strdup(tctx, "C:\\"); tctx 582 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareAdd(p, tctx, &a); tctx 583 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareAdd level 2 on share 'testshare' failed"); tctx 584 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, a.out.result, "NetShareAdd level 2 on share 'testshare' failed"); tctx 595 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetShareSetInfo level %u on share '%s'\n", tctx 600 source4/torture/rpc/srvsvc.c info.info0 = talloc(tctx, struct srvsvc_NetShareInfo0); tctx 604 source4/torture/rpc/srvsvc.c info.info1 = talloc(tctx, struct srvsvc_NetShareInfo1); tctx 607 source4/torture/rpc/srvsvc.c info.info1->comment = talloc_strdup(tctx, "test comment 1"); tctx 610 source4/torture/rpc/srvsvc.c info.info2 = talloc(tctx, struct srvsvc_NetShareInfo2); tctx 613 source4/torture/rpc/srvsvc.c info.info2->comment = talloc_strdup(tctx, "test comment 2"); tctx 617 source4/torture/rpc/srvsvc.c info.info2->path = talloc_strdup(tctx, "::BLaH::"); /* "C:\\"); */ tctx 621 source4/torture/rpc/srvsvc.c info.info501 = talloc(tctx, struct srvsvc_NetShareInfo501); tctx 624 source4/torture/rpc/srvsvc.c info.info501->comment = talloc_strdup(tctx, "test comment 501"); tctx 629 source4/torture/rpc/srvsvc.c info.info502 = talloc(tctx, struct srvsvc_NetShareInfo502); tctx 632 source4/torture/rpc/srvsvc.c info.info502->comment = talloc_strdup(tctx, "test comment 502"); tctx 636 source4/torture/rpc/srvsvc.c info.info502->path = talloc_strdup(tctx, "C:\\"); tctx 641 source4/torture/rpc/srvsvc.c info.info1004 = talloc(tctx, struct srvsvc_NetShareInfo1004); tctx 642 source4/torture/rpc/srvsvc.c info.info1004->comment = talloc_strdup(tctx, "test comment 1004"); tctx 645 source4/torture/rpc/srvsvc.c info.info1005 = talloc(tctx, struct srvsvc_NetShareInfo1005); tctx 649 source4/torture/rpc/srvsvc.c info.info1006 = talloc(tctx, struct srvsvc_NetShareInfo1006); tctx 659 source4/torture/rpc/srvsvc.c info.info1501 = talloc_zero(tctx, struct sec_desc_buf); tctx 665 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareSetInfo(p, tctx, &r); tctx 666 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed"); tctx 667 source4/torture/rpc/srvsvc.c torture_assert_werr_equal(tctx, r.out.result, levels[i].expected, "NetShareSetInfo failed"); tctx 672 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareGetInfo(p, tctx, &q); tctx 673 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed"); tctx 674 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, q.out.result, "NetShareGetInfo failed"); tctx 676 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info502->name, r.in.share_name, tctx 683 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info502->comment, "test comment 1", "comment"); tctx 686 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info2->comment, "test comment 2", "comment"); tctx 687 source4/torture/rpc/srvsvc.c torture_assert_int_equal(tctx, q.out.info->info2->max_users, 2, "max users"); tctx 688 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info2->path, "C:\\", "path"); tctx 691 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info501->comment, "test comment 501", "comment"); tctx 694 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info502->comment, "test comment 502", "comment"); tctx 695 source4/torture/rpc/srvsvc.c torture_assert_int_equal(tctx, q.out.info->info502->max_users, 502, "max users"); tctx 696 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info502->path, "C:\\", "path"); tctx 699 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info1004->comment, "test comment 1004", tctx 705 source4/torture/rpc/srvsvc.c torture_assert_int_equal(tctx, q.out.info->info1006->max_users, 1006, "Max users"); tctx 718 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareDel(p, tctx, &d); tctx 719 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareDel on share 'testshare502' failed"); tctx 720 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, a.out.result, "NetShareDel on share 'testshare502' failed"); tctx 728 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAll(struct torture_context *tctx, tctx 757 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 800 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetShareEnumAll level %u\n", info_ctr.level); tctx 801 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareEnumAll(p, tctx, &r); tctx 802 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareEnumAll failed"); tctx 803 source4/torture/rpc/srvsvc.c torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareEnumAll failed"); tctx 810 source4/torture/rpc/srvsvc.c if (!test_NetShareGetInfo(tctx, p, name, admin)) { tctx 820 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAllFull(struct torture_context *tctx, tctx 823 source4/torture/rpc/srvsvc.c return test_NetShareEnumAll(tctx, p, true); tctx 826 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAllAnon(struct torture_context *tctx, tctx 829 source4/torture/rpc/srvsvc.c return test_NetShareEnumAll(tctx, p, false); tctx 832 source4/torture/rpc/srvsvc.c static bool test_NetShareEnum(struct torture_context *tctx, tctx 857 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 895 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetShareEnum level %u\n", info_ctr.level); tctx 896 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareEnum(p, tctx, &r); tctx 897 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareEnum failed"); tctx 898 source4/torture/rpc/srvsvc.c torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareEnum failed"); tctx 904 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumFull(struct torture_context *tctx, tctx 907 source4/torture/rpc/srvsvc.c return test_NetShareEnum(tctx, p, true); tctx 910 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAnon(struct torture_context *tctx, tctx 913 source4/torture/rpc/srvsvc.c return test_NetShareEnum(tctx, p, false); tctx 919 source4/torture/rpc/srvsvc.c static bool test_NetSrvGetInfo(struct torture_context *tctx, tctx 928 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 933 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetSrvGetInfo level %u\n", r.in.level); tctx 934 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetSrvGetInfo(p, tctx, &r); tctx 935 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetSrvGetInfo failed"); tctx 937 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetSrvGetInfo failed: %s\n", win_errstr(r.out.result)); tctx 947 source4/torture/rpc/srvsvc.c static bool test_NetDiskEnum(struct torture_context *tctx, tctx 970 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetDiskEnum level %u\n", r.in.level); tctx 971 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetDiskEnum(p, tctx, &r); tctx 972 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetDiskEnum failed"); tctx 973 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetDiskEnum failed"); tctx 982 source4/torture/rpc/srvsvc.c static bool test_NetTransportEnum(struct torture_context *tctx, tctx 997 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s", dcerpc_server_name(p)); tctx 1016 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetTransportEnum level %u\n", transports.level); tctx 1017 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetTransportEnum(p, tctx, &r); tctx 1018 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetTransportEnum failed"); tctx 1020 source4/torture/rpc/srvsvc.c torture_comment(tctx, "unexpected result: %s\n", win_errstr(r.out.result)); tctx 1030 source4/torture/rpc/srvsvc.c static bool test_NetRemoteTOD(struct torture_context *tctx, tctx 1037 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p)); tctx 1040 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetRemoteTOD\n"); tctx 1041 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetRemoteTOD(p, tctx, &r); tctx 1042 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetRemoteTOD failed"); tctx 1043 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetRemoteTOD failed"); tctx 1052 source4/torture/rpc/srvsvc.c static bool test_NetNameValidate(struct torture_context *tctx, tctx 1061 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 1071 source4/torture/rpc/srvsvc.c r.in.name = name = talloc_array(tctx, char, 4097); tctx 1084 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetNameValidate(p, tctx, &r); tctx 1111 source4/torture/rpc/srvsvc.c invalidc = talloc_strdup(tctx, ""); tctx 1114 source4/torture/rpc/srvsvc.c r.in.name = name = talloc_asprintf(tctx, "%c", (char)n); tctx 1116 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetNameValidate(p, tctx, &r); tctx 31 source4/torture/rpc/svcctl.c static bool test_OpenSCManager(struct dcerpc_pipe *p, struct torture_context *tctx, struct policy_handle *h) tctx 40 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, tctx 41 source4/torture/rpc/svcctl.c dcerpc_svcctl_OpenSCManagerW(p, tctx, &r), tctx 47 source4/torture/rpc/svcctl.c static bool test_CloseServiceHandle(struct dcerpc_pipe *p, struct torture_context *tctx, struct policy_handle *h) tctx 53 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, tctx 54 source4/torture/rpc/svcctl.c dcerpc_svcctl_CloseServiceHandle(p, tctx, &r), tctx 60 source4/torture/rpc/svcctl.c static bool test_OpenService(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 70 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, tctx 71 source4/torture/rpc/svcctl.c dcerpc_svcctl_OpenServiceW(p, tctx, &r), tctx 73 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "OpenServiceW failed!"); tctx 79 source4/torture/rpc/svcctl.c static bool test_QueryServiceStatus(struct torture_context *tctx, tctx 87 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h)) tctx 90 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s)) tctx 96 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceStatus(p, tctx, &r); tctx 97 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceStatus failed!"); tctx 98 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceStatus failed!"); tctx 100 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s)) tctx 103 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h)) tctx 109 source4/torture/rpc/svcctl.c static bool test_QueryServiceStatusEx(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 120 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h)) tctx 123 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s)) tctx 126 source4/torture/rpc/svcctl.c buffer = talloc(tctx, uint8_t); tctx 134 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceStatusEx(p, tctx, &r); tctx 135 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceStatusEx failed!"); tctx 139 source4/torture/rpc/svcctl.c buffer = talloc_array(tctx, uint8_t, needed); tctx 142 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceStatusEx(p, tctx, &r); tctx 143 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceStatusEx failed!"); tctx 144 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceStatusEx failed!"); tctx 147 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s)) tctx 150 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h)) tctx 156 source4/torture/rpc/svcctl.c static bool test_QueryServiceConfigW(struct torture_context *tctx, tctx 167 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h)) tctx 170 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s)) tctx 178 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfigW(p, tctx, &r); tctx 179 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfigW failed!"); tctx 183 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfigW(p, tctx, &r); tctx 184 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfigW failed!"); tctx 187 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceConfigW failed!"); tctx 189 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s)) tctx 192 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h)) tctx 198 source4/torture/rpc/svcctl.c static bool test_QueryServiceConfig2W(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 209 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h)) tctx 212 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s)) tctx 215 source4/torture/rpc/svcctl.c buffer = talloc(tctx, uint8_t); tctx 223 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r); tctx 224 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!"); tctx 228 source4/torture/rpc/svcctl.c buffer = talloc_array(tctx, uint8_t, needed); tctx 231 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r); tctx 232 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!"); tctx 233 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceConfig2W failed!"); tctx 241 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r); tctx 242 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!"); tctx 246 source4/torture/rpc/svcctl.c buffer = talloc_array(tctx, uint8_t, needed); tctx 249 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r); tctx 250 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!"); tctx 251 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceConfig2W failed!"); tctx 254 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s)) tctx 257 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h)) tctx 263 source4/torture/rpc/svcctl.c static bool test_QueryServiceObjectSecurity(struct torture_context *tctx, tctx 272 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h)) tctx 275 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s)) tctx 284 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, tctx 285 source4/torture/rpc/svcctl.c dcerpc_svcctl_QueryServiceObjectSecurity(p, tctx, &r), tctx 287 source4/torture/rpc/svcctl.c torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM, tctx 292 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, tctx 293 source4/torture/rpc/svcctl.c dcerpc_svcctl_QueryServiceObjectSecurity(p, tctx, &r), tctx 298 source4/torture/rpc/svcctl.c buffer = talloc_array(tctx, uint8_t, needed); tctx 300 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, tctx 301 source4/torture/rpc/svcctl.c dcerpc_svcctl_QueryServiceObjectSecurity(p, tctx, &r), tctx 305 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceObjectSecurity failed!"); tctx 307 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s)) tctx 310 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h)) tctx 316 source4/torture/rpc/svcctl.c static bool test_StartServiceW(struct torture_context *tctx, tctx 322 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h)) tctx 325 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s)) tctx 332 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, tctx 333 source4/torture/rpc/svcctl.c dcerpc_svcctl_StartServiceW(p, tctx, &r), tctx 335 source4/torture/rpc/svcctl.c torture_assert_werr_equal(tctx, r.out.result, tctx 339 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s)) tctx 342 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h)) tctx 348 source4/torture/rpc/svcctl.c static bool test_ControlService(struct torture_context *tctx, tctx 355 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h)) tctx 358 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s)) tctx 365 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, tctx 366 source4/torture/rpc/svcctl.c dcerpc_svcctl_ControlService(p, tctx, &r), tctx 368 source4/torture/rpc/svcctl.c torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM, tctx 371 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s)) tctx 374 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h)) tctx 380 source4/torture/rpc/svcctl.c static bool test_EnumServicesStatus(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 391 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h)) tctx 404 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_EnumServicesStatusW(p, tctx, &r); tctx 406 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "EnumServicesStatus failed!"); tctx 410 source4/torture/rpc/svcctl.c r.out.service = talloc_array(tctx, uint8_t, needed); tctx 412 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_EnumServicesStatusW(p, tctx, &r); tctx 414 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "EnumServicesStatus failed!"); tctx 415 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "EnumServicesStatus failed"); tctx 425 source4/torture/rpc/svcctl.c blob.data = talloc_steal(tctx, r.out.service); tctx 427 source4/torture/rpc/svcctl.c ndr = ndr_pull_init_blob(&blob, tctx, lp_iconv_convenience(tctx->lp_ctx)); tctx 429 source4/torture/rpc/svcctl.c service = talloc_array(tctx, struct ENUM_SERVICE_STATUSW, services_returned); tctx 443 source4/torture/rpc/svcctl.c torture_assert(tctx, service[i].service_name, tctx 451 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h)) tctx 457 source4/torture/rpc/svcctl.c static bool test_EnumDependentServicesW(struct torture_context *tctx, tctx 469 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h)) tctx 472 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s)) tctx 482 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, tctx 483 source4/torture/rpc/svcctl.c dcerpc_svcctl_EnumDependentServicesW(p, tctx, &r), tctx 486 source4/torture/rpc/svcctl.c torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM, tctx 493 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, tctx 494 source4/torture/rpc/svcctl.c dcerpc_svcctl_EnumDependentServicesW(p, tctx, &r), tctx 499 source4/torture/rpc/svcctl.c r.out.service_status = talloc_array(tctx, uint8_t, needed); tctx 501 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, tctx 502 source4/torture/rpc/svcctl.c dcerpc_svcctl_EnumDependentServicesW(p, tctx, &r), tctx 507 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, tctx 511 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s)) tctx 514 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h)) tctx 520 source4/torture/rpc/svcctl.c static bool test_SCManager(struct torture_context *tctx, tctx 525 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h)) tctx 528 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h)) tctx 309 source4/torture/rpc/testjoin.c _PUBLIC_ struct test_join *torture_join_domain(struct torture_context *tctx, tctx 321 source4/torture/rpc/testjoin.c tj = talloc(tctx, struct test_join); tctx 330 source4/torture/rpc/testjoin.c libnet_ctx = libnet_context_init(tctx->ev, tctx->lp_ctx); tctx 339 source4/torture/rpc/testjoin.c libnet_r->in.binding = torture_setting_string(tctx, "binding", NULL); tctx 341 source4/torture/rpc/testjoin.c libnet_r->in.binding = talloc_asprintf(libnet_r, "ncacn_np:%s", torture_setting_string(tctx, "host", NULL)); tctx 394 source4/torture/rpc/testjoin.c lp_netbios_name(tctx->lp_ctx), timestring(tj, time(NULL))); tctx 402 source4/torture/rpc/testjoin.c cli_credentials_set_conf(*machine_credentials, tctx->lp_ctx); tctx 30 source4/torture/rpc/unixinfo.c static bool test_sidtouid(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 37 source4/torture/rpc/unixinfo.c sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-5432"); tctx 41 source4/torture/rpc/unixinfo.c status = dcerpc_unixinfo_SidToUid(p, tctx, &r); tctx 43 source4/torture/rpc/unixinfo.c } else torture_assert_ntstatus_ok(tctx, status, "SidToUid failed"); tctx 51 source4/torture/rpc/unixinfo.c static bool test_uidtosid(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 59 source4/torture/rpc/unixinfo.c torture_assert_ntstatus_ok(tctx, dcerpc_unixinfo_UidToSid(p, tctx, &r), tctx 65 source4/torture/rpc/unixinfo.c static bool test_getpwuid(struct torture_context *tctx, tctx 81 source4/torture/rpc/unixinfo.c r.out.infos = talloc_array(tctx, struct unixinfo_GetPWUidInfo, num_uids); tctx 83 source4/torture/rpc/unixinfo.c result = dcerpc_unixinfo_GetPWUid(p, tctx, &r); tctx 85 source4/torture/rpc/unixinfo.c torture_assert_ntstatus_ok(tctx, result, "GetPWUid failed"); tctx 93 source4/torture/rpc/unixinfo.c static bool test_sidtogid(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 100 source4/torture/rpc/unixinfo.c sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-5432"); tctx 104 source4/torture/rpc/unixinfo.c status = dcerpc_unixinfo_SidToGid(p, tctx, &r); tctx 106 source4/torture/rpc/unixinfo.c } else torture_assert_ntstatus_ok(tctx, status, "SidToGid failed"); tctx 114 source4/torture/rpc/unixinfo.c static bool test_gidtosid(struct torture_context *tctx, struct dcerpc_pipe *p) tctx 122 source4/torture/rpc/unixinfo.c torture_assert_ntstatus_ok(tctx, dcerpc_unixinfo_GidToSid(p, tctx, &r), tctx 59 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 69 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_GetVersion(p, tctx, &r), tctx 72 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "GetVersion failed"); tctx 78 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 91 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, tctx 92 source4/torture/rpc/winreg.c dcerpc_winreg_NotifyChangeKeyValue(p, tctx, &r), tctx 96 source4/torture/rpc/winreg.c torture_comment(tctx, tctx 105 source4/torture/rpc/winreg.c static bool test_CreateKey(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 123 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_CreateKey(p, tctx, &r), tctx 126 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "CreateKey failed"); tctx 136 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 147 source4/torture/rpc/winreg.c sd = security_descriptor_dacl_create(tctx, tctx 157 source4/torture/rpc/winreg.c torture_assert_ndr_success(tctx, tctx 158 source4/torture/rpc/winreg.c ndr_push_struct_blob(&sdblob, tctx, NULL, sd, tctx 178 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_CreateKey(p, tctx, &r), tctx 181 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "CreateKey with sd failed"); tctx 187 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 208 source4/torture/rpc/winreg.c r.in.sd = r.out.sd = talloc_zero(tctx, struct KeySecurityData); tctx 211 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, tctx 212 source4/torture/rpc/winreg.c dcerpc_winreg_GetKeySecurity(p, tctx, &r), tctx 215 source4/torture/rpc/winreg.c torture_assert_werr_equal(tctx, r.out.result, get_werr, tctx 221 source4/torture/rpc/winreg.c sd = talloc_zero(tctx, struct security_descriptor); tctx 223 source4/torture/rpc/winreg.c torture_assert_ndr_success(tctx, tctx 224 source4/torture/rpc/winreg.c ndr_pull_struct_blob(&sdblob, tctx, NULL, sd, tctx 242 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 246 source4/torture/rpc/winreg.c return _test_GetKeySecurity(p, tctx, handle, NULL, WERR_OK, sd_out); tctx 250 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 267 source4/torture/rpc/winreg.c torture_assert_ndr_success(tctx, tctx 268 source4/torture/rpc/winreg.c ndr_push_struct_blob(&sdblob, tctx, NULL, sd, tctx 272 source4/torture/rpc/winreg.c sdata = talloc_zero(tctx, struct KeySecurityData); tctx 300 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, tctx 301 source4/torture/rpc/winreg.c dcerpc_winreg_SetKeySecurity(p, tctx, &r), tctx 304 source4/torture/rpc/winreg.c torture_assert_werr_equal(tctx, r.out.result, werr, tctx 311 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 315 source4/torture/rpc/winreg.c return _test_SetKeySecurity(p, tctx, handle, NULL, sd, WERR_OK); tctx 318 source4/torture/rpc/winreg.c static bool test_CloseKey(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 326 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_CloseKey(p, tctx, &r), tctx 329 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "CloseKey failed"); tctx 334 source4/torture/rpc/winreg.c static bool test_FlushKey(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 342 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_FlushKey(p, tctx, &r), tctx 345 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "FlushKey failed"); tctx 350 source4/torture/rpc/winreg.c static bool _test_OpenKey(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 366 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_OpenKey(p, tctx, &r), tctx 369 source4/torture/rpc/winreg.c torture_assert_werr_equal(tctx, r.out.result, open_werr, tctx 379 source4/torture/rpc/winreg.c static bool test_OpenKey(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 383 source4/torture/rpc/winreg.c return _test_OpenKey(p, tctx, hive_handle, keyname, tctx 388 source4/torture/rpc/winreg.c static bool test_Cleanup(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 397 source4/torture/rpc/winreg.c dcerpc_winreg_DeleteKey(p, tctx, &r); tctx 403 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 410 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, NULL, get_werr, &sd)) { tctx 414 source4/torture/rpc/winreg.c if (!_test_SetKeySecurity(p, tctx, handle, NULL, sd, set_werr)) { tctx 422 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 429 source4/torture/rpc/winreg.c torture_comment(tctx, "SecurityDescriptor get & set\n"); tctx 431 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { tctx 435 source4/torture/rpc/winreg.c if (!_test_GetSetSecurityDescriptor(p, tctx, &new_handle, tctx 440 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) { tctx 448 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 460 source4/torture/rpc/winreg.c if (!_test_OpenKey(p, tctx, handle, key, access_mask, &new_handle, tctx 469 source4/torture/rpc/winreg.c if (!_test_GetSetSecurityDescriptor(p, tctx, &new_handle, tctx 474 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) { tctx 482 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 489 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) { tctx 507 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 515 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { tctx 519 source4/torture/rpc/winreg.c ret = test_dacl_trustee_present(p, tctx, &new_handle, sid); tctx 521 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle); tctx 527 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 535 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) { tctx 553 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 561 source4/torture/rpc/winreg.c if (!_test_OpenKey(p, tctx, handle, key, SEC_FLAG_SYSTEM_SECURITY, tctx 566 source4/torture/rpc/winreg.c ret = test_sacl_trustee_present(p, tctx, &new_handle, sid); tctx 568 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle); tctx 574 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 581 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) { tctx 593 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 601 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { tctx 605 source4/torture/rpc/winreg.c ret = test_owner_present(p, tctx, &new_handle, sid); tctx 607 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle); tctx 613 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 620 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) { tctx 632 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 640 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { tctx 644 source4/torture/rpc/winreg.c ret = test_group_present(p, tctx, &new_handle, sid); tctx 646 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle); tctx 652 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 660 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) { tctx 679 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 686 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) { tctx 704 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 712 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { tctx 716 source4/torture/rpc/winreg.c if (!test_SetKeySecurity(p, tctx, &new_handle, sd)) { tctx 720 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) { tctx 728 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 736 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { tctx 740 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, &new_handle, sd)) { tctx 744 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) { tctx 752 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 779 source4/torture/rpc/winreg.c torture_comment(tctx, "SecurityDescriptor inheritance\n"); tctx 781 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { tctx 785 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, &new_handle, NULL, WERR_OK, &sd)) { tctx 789 source4/torture/rpc/winreg.c sd_orig = security_descriptor_copy(tctx, sd); tctx 794 source4/torture/rpc/winreg.c ace = security_ace_create(tctx, tctx 810 source4/torture/rpc/winreg.c if (!test_SetKeySecurity(p, tctx, &new_handle, sd)) { tctx 814 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) { tctx 819 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) { tctx 823 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, handle, TEST_SUBKEY_SD, NULL)) { tctx 828 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, TEST_SUBKEY_SD, &new_handle)) { tctx 833 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) { tctx 839 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle); tctx 840 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, handle, TEST_SUBSUBKEY_SD, NULL)) { tctx 845 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, TEST_SUBSUBKEY_SD, &new_handle)) { tctx 850 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) { tctx 857 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle); tctx 858 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, handle, TEST_SUBKEY_SD); tctx 859 source4/torture/rpc/winreg.c test_RestoreSecurity(p, tctx, handle, key, sd_orig); tctx 865 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 891 source4/torture/rpc/winreg.c torture_comment(tctx, "SecurityDescriptor inheritance block\n"); tctx 893 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) { tctx 897 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, &new_handle, NULL, WERR_OK, &sd)) { tctx 901 source4/torture/rpc/winreg.c sd_orig = security_descriptor_copy(tctx, sd); tctx 906 source4/torture/rpc/winreg.c ace = security_ace_create(tctx, tctx 919 source4/torture/rpc/winreg.c if (!_test_SetKeySecurity(p, tctx, &new_handle, NULL, sd, WERR_OK)) { tctx 923 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) { tctx 928 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) { tctx 932 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, handle, TEST_SUBSUBKEY_SD, NULL)) { tctx 936 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, TEST_SUBSUBKEY_SD, &new_handle)) { tctx 941 source4/torture/rpc/winreg.c if (test_dacl_ace_present(p, tctx, &new_handle, ace)) { tctx 947 source4/torture/rpc/winreg.c sid = dom_sid_parse_talloc(tctx, TEST_SID); tctx 952 source4/torture/rpc/winreg.c if (test_dacl_trustee_present(p, tctx, &new_handle, sid)) { tctx 958 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle); tctx 960 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, TEST_SUBKEY_SD, &new_handle)) { tctx 965 source4/torture/rpc/winreg.c if (test_dacl_ace_present(p, tctx, &new_handle, ace)) { tctx 971 source4/torture/rpc/winreg.c if (!test_dacl_trustee_flags_present(p, tctx, &new_handle, sid, ace_flags)) { tctx 979 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle); tctx 980 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, handle, TEST_SUBKEY_SD); tctx 981 source4/torture/rpc/winreg.c test_RestoreSecurity(p, tctx, handle, key, sd_orig); tctx 987 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 1019 source4/torture/rpc/winreg.c torture_comment(tctx, tctx 1022 source4/torture/rpc/winreg.c torture_comment(tctx, tctx 1028 source4/torture/rpc/winreg.c if (_test_SecurityDescriptor(p, tctx, handle, tctx 1047 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 1066 source4/torture/rpc/winreg.c torture_comment(tctx, "SecurityDescriptor (%s) sets for secinfo: " tctx 1070 source4/torture/rpc/winreg.c if (!_test_OpenKey(p, tctx, handle, key, tctx 1080 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle); tctx 1084 source4/torture/rpc/winreg.c if (!_test_SetKeySecurity(p, tctx, &new_handle, &sec_info, tctx 1087 source4/torture/rpc/winreg.c torture_warning(tctx, tctx 1091 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle); tctx 1095 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle); tctx 1099 source4/torture/rpc/winreg.c present = fn(p, tctx, handle, key, sid); tctx 1101 source4/torture/rpc/winreg.c torture_warning(tctx, tctx 1107 source4/torture/rpc/winreg.c torture_warning(tctx, tctx 1118 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 1128 source4/torture/rpc/winreg.c security_descriptor_dacl_create(tctx, tctx 1133 source4/torture/rpc/winreg.c security_descriptor_dacl_create(tctx, tctx 1138 source4/torture/rpc/winreg.c security_descriptor_dacl_create(tctx, tctx 1152 source4/torture/rpc/winreg.c security_descriptor_sacl_create(tctx, tctx 1231 source4/torture/rpc/winreg.c sid = dom_sid_parse_talloc(tctx, TEST_SID); tctx 1236 source4/torture/rpc/winreg.c if (!test_BackupSecurity(p, tctx, handle, key, &sd_orig)) { tctx 1246 source4/torture/rpc/winreg.c if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle, tctx 1270 source4/torture/rpc/winreg.c if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle, tctx 1294 source4/torture/rpc/winreg.c if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle, tctx 1318 source4/torture/rpc/winreg.c if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle, tctx 1337 source4/torture/rpc/winreg.c test_RestoreSecurity(p, tctx, handle, key, sd_orig); tctx 1343 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 1349 source4/torture/rpc/winreg.c if (!test_SecurityDescriptor(p, tctx, handle, key)) { tctx 1354 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorInheritance(p, tctx, handle, key)) { tctx 1359 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorBlockInheritance(p, tctx, handle, key)) { tctx 1364 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorsSecInfo(p, tctx, handle, key)) { tctx 1369 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorsMasks(p, tctx, handle, key)) { tctx 1377 source4/torture/rpc/winreg.c static bool test_DeleteKey(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1386 source4/torture/rpc/winreg.c status = dcerpc_winreg_DeleteKey(p, tctx, &r); tctx 1388 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, status, "DeleteKey failed"); tctx 1389 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "DeleteKey failed"); tctx 1395 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 1415 source4/torture/rpc/winreg.c r.out.classname = talloc(tctx, struct winreg_String); tctx 1417 source4/torture/rpc/winreg.c r.in.classname = talloc(tctx, struct winreg_String); tctx 1420 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, tctx 1421 source4/torture/rpc/winreg.c dcerpc_winreg_QueryInfoKey(p, tctx, &r), tctx 1424 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "QueryInfoKey failed"); tctx 1429 source4/torture/rpc/winreg.c static bool test_key(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1433 source4/torture/rpc/winreg.c static bool test_EnumKey(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1457 source4/torture/rpc/winreg.c status = dcerpc_winreg_EnumKey(p, tctx, &r); tctx 1462 source4/torture/rpc/winreg.c torture_comment(tctx, "EnumKey: %d: %s\n", tctx 1466 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, r.out.name->name, tctx 1469 source4/torture/rpc/winreg.c test_key(p, tctx, &key_handle, tctx 1478 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, status, "EnumKey failed"); tctx 1482 source4/torture/rpc/winreg.c torture_fail(tctx, "EnumKey failed"); tctx 1489 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 1499 source4/torture/rpc/winreg.c r.in.values = r.out.values = talloc_array(tctx, struct QueryMultipleValue, 1); tctx 1500 source4/torture/rpc/winreg.c r.in.values[0].name = talloc(tctx, struct winreg_String); tctx 1507 source4/torture/rpc/winreg.c r.in.buffer_size = r.out.buffer_size = talloc(tctx, uint32_t); tctx 1511 source4/torture/rpc/winreg.c r.in.buffer = r.out.buffer = talloc_zero_array(tctx, uint8_t, tctx 1514 source4/torture/rpc/winreg.c status = dcerpc_winreg_QueryMultipleValues(p, tctx, &r); tctx 1517 source4/torture/rpc/winreg.c torture_fail(tctx, "QueryMultipleValues failed"); tctx 1523 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "QueryMultipleValues failed"); tctx 1529 source4/torture/rpc/winreg.c struct torture_context *tctx, tctx 1542 source4/torture/rpc/winreg.c r.in.value_name = talloc_zero(tctx, struct winreg_String); tctx 1548 source4/torture/rpc/winreg.c status = dcerpc_winreg_QueryValue(p, tctx, &r); tctx 1550 source4/torture/rpc/winreg.c torture_fail(tctx, "QueryValue failed"); tctx 1553 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "QueryValue failed"); tctx 1558 source4/torture/rpc/winreg.c static bool test_EnumValue(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1583 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, tctx 1584 source4/torture/rpc/winreg.c dcerpc_winreg_EnumValue(p, tctx, &r), tctx 1588 source4/torture/rpc/winreg.c ret &= test_QueryValue(p, tctx, handle, tctx 1590 source4/torture/rpc/winreg.c ret &= test_QueryMultipleValues(p, tctx, handle, tctx 1597 source4/torture/rpc/winreg.c torture_assert_werr_equal(tctx, r.out.result, WERR_NO_MORE_ITEMS, tctx 1604 source4/torture/rpc/winreg.c struct torture_context *tctx) tctx 1612 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, tctx 1613 source4/torture/rpc/winreg.c dcerpc_winreg_AbortSystemShutdown(p, tctx, &r), tctx 1616 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, tctx 1622 source4/torture/rpc/winreg.c static bool test_InitiateSystemShutdown(struct torture_context *tctx, tctx 1630 source4/torture/rpc/winreg.c r.in.message = talloc(tctx, struct lsa_StringLarge); tctx 1636 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, tctx 1637 source4/torture/rpc/winreg.c dcerpc_winreg_InitiateSystemShutdown(p, tctx, &r), tctx 1640 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, tctx 1643 source4/torture/rpc/winreg.c return test_AbortSystemShutdown(p, tctx); tctx 1647 source4/torture/rpc/winreg.c static bool test_InitiateSystemShutdownEx(struct torture_context *tctx, tctx 1655 source4/torture/rpc/winreg.c r.in.message = talloc(tctx, struct lsa_StringLarge); tctx 1662 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, tctx 1663 source4/torture/rpc/winreg.c dcerpc_winreg_InitiateSystemShutdownEx(p, tctx, &r), tctx 1666 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, tctx 1669 source4/torture/rpc/winreg.c return test_AbortSystemShutdown(p, tctx); tctx 1673 source4/torture/rpc/winreg.c static bool test_key(struct dcerpc_pipe *p, struct torture_context *tctx, tctx 1680 source4/torture/rpc/winreg.c if (!test_QueryInfoKey(p, tctx, handle, NULL)) { tctx 1683 source4/torture/rpc/winreg.c if (!test_NotifyChangeKeyValue(p, tctx, handle)) { tctx 1686 source4/torture/rpc/winreg.c if (test_security && !test_GetKeySecurity(p, tctx, handle, NULL)) { tctx 1689 source4/torture/rpc/winreg.c if (!test_EnumKey(p, tctx, handle, depth, test_security)) { tctx 1692 source4/torture/rpc/winreg.c if (!test_EnumValue(p, tctx, handle, 0xFF, 0xFFFF)) { tctx 1695 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, handle); tctx 1702 source4/torture/rpc/winreg.c static bool test_Open_Security(struct torture_context *tctx, tctx 1717 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, open_fn(p, tctx, &r), tctx 1720 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, &handle, TEST_KEY_BASE); tctx 1722 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, &handle, TEST_KEY_BASE, NULL)) { tctx 1723 source4/torture/rpc/winreg.c torture_comment(tctx, tctx 1727 source4/torture/rpc/winreg.c if (test_CreateKey_sd(p, tctx, &handle, TEST_KEY2, tctx 1732 source4/torture/rpc/winreg.c if (created2 && !test_CloseKey(p, tctx, &newhandle)) { tctx 1737 source4/torture/rpc/winreg.c if (test_CreateKey_sd(p, tctx, &handle, TEST_KEY4, NULL, &newhandle)) { tctx 1741 source4/torture/rpc/winreg.c if (created4 && !test_CloseKey(p, tctx, &newhandle)) { tctx 1746 source4/torture/rpc/winreg.c if (created4 && !test_SecurityDescriptors(p, tctx, &handle, TEST_KEY4)) { tctx 1750 source4/torture/rpc/winreg.c if (created4 && !test_DeleteKey(p, tctx, &handle, TEST_KEY4)) { tctx 1755 source4/torture/rpc/winreg.c if (created2 && !test_DeleteKey(p, tctx, &handle, TEST_KEY2)) { tctx 1762 source4/torture/rpc/winreg.c if(!test_key(p, tctx, &handle, MAX_DEPTH - 1, true)) { tctx 1766 source4/torture/rpc/winreg.c if (!test_key(p, tctx, &handle, 0, true)) { tctx 1771 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, &handle, TEST_KEY_BASE); tctx 1776 source4/torture/rpc/winreg.c static bool test_Open(struct torture_context *tctx, struct dcerpc_pipe *p, tctx 1791 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, open_fn(p, tctx, &r), tctx 1794 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, &handle, TEST_KEY_BASE); tctx 1796 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, &handle, TEST_KEY_BASE, NULL)) { tctx 1797 source4/torture/rpc/winreg.c torture_comment(tctx, tctx 1801 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, &handle, TEST_KEY1, NULL)) { tctx 1802 source4/torture/rpc/winreg.c torture_comment(tctx, tctx 1808 source4/torture/rpc/winreg.c if (created && !test_FlushKey(p, tctx, &handle)) { tctx 1809 source4/torture/rpc/winreg.c torture_comment(tctx, "FlushKey failed\n"); tctx 1813 source4/torture/rpc/winreg.c if (created && !test_OpenKey(p, tctx, &handle, TEST_KEY1, &newhandle)) tctx 1814 source4/torture/rpc/winreg.c torture_fail(tctx, tctx 1817 source4/torture/rpc/winreg.c if (created && !test_CloseKey(p, tctx, &newhandle)) tctx 1818 source4/torture/rpc/winreg.c torture_fail(tctx, tctx 1821 source4/torture/rpc/winreg.c if (created && !test_DeleteKey(p, tctx, &handle, TEST_KEY1)) { tctx 1822 source4/torture/rpc/winreg.c torture_comment(tctx, "DeleteKey failed\n"); tctx 1828 source4/torture/rpc/winreg.c if (created && !test_FlushKey(p, tctx, &handle)) { tctx 1829 source4/torture/rpc/winreg.c torture_comment(tctx, "FlushKey failed\n"); tctx 1834 source4/torture/rpc/winreg.c !_test_OpenKey(p, tctx, &handle, TEST_KEY1, tctx 1837 source4/torture/rpc/winreg.c torture_comment(tctx, tctx 1843 source4/torture/rpc/winreg.c if (!test_GetVersion(p, tctx, &handle)) { tctx 1844 source4/torture/rpc/winreg.c torture_comment(tctx, "GetVersion failed\n"); tctx 1848 source4/torture/rpc/winreg.c if (created && test_CreateKey(p, tctx, &handle, TEST_KEY3, NULL)) { tctx 1853 source4/torture/rpc/winreg.c test_CreateKey(p, tctx, &handle, TEST_SUBKEY, NULL)) { tctx 1858 source4/torture/rpc/winreg.c !test_DeleteKey(p, tctx, &handle, TEST_KEY3)) { tctx 1865 source4/torture/rpc/winreg.c if(!test_key(p, tctx, &handle, MAX_DEPTH - 1, false)) { tctx 1869 source4/torture/rpc/winreg.c if (!test_key(p, tctx, &handle, 0, false)) { tctx 1874 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, &handle, TEST_KEY_BASE); tctx 37 source4/torture/rpc/wkssvc.c static bool test_NetWkstaGetInfo(struct torture_context *tctx, tctx 51 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetWkstaGetInfo level %u\n", tctx 53 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetWkstaGetInfo(p, tctx, &r); tctx 54 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 55 source4/torture/rpc/wkssvc.c talloc_asprintf(tctx, "NetWkstaGetInfo level %u failed", tctx 57 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 58 source4/torture/rpc/wkssvc.c talloc_asprintf(tctx, "NetWkstaGetInfo level %u failed", tctx 65 source4/torture/rpc/wkssvc.c static bool test_NetWkstaTransportEnum(struct torture_context *tctx, tctx 90 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetWkstaTransportEnum level 0\n"); tctx 92 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetWkstaTransportEnum(p, tctx, &r); tctx 93 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 95 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, talloc_asprintf(tctx, tctx 102 source4/torture/rpc/wkssvc.c static bool test_NetrWkstaTransportAdd(struct torture_context *tctx, tctx 123 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrWkstaTransportAdd level 0\n"); tctx 125 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrWkstaTransportAdd(p, tctx, &r); tctx 126 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 128 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, tctx 135 source4/torture/rpc/wkssvc.c static bool test_NetrWkstaTransportDel(struct torture_context *tctx, tctx 145 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrWkstaTransportDel\n"); tctx 147 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrWkstaTransportDel(p, tctx, &r); tctx 148 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 150 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 156 source4/torture/rpc/wkssvc.c static bool test_NetWkstaEnumUsers(struct torture_context *tctx, tctx 176 source4/torture/rpc/wkssvc.c user0 = talloc_zero(tctx, tctx 181 source4/torture/rpc/wkssvc.c user1 = talloc_zero(tctx, tctx 196 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetWkstaEnumUsers level %u\n", tctx 199 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetWkstaEnumUsers(p, tctx, &r); tctx 200 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 202 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 209 source4/torture/rpc/wkssvc.c static bool test_NetrWkstaUserGetInfo(struct torture_context *tctx, tctx 215 source4/torture/rpc/wkssvc.c const char *dom = lp_workgroup(tctx->lp_ctx); tctx 241 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrWkstaUserGetInfo level %u\n", tctx 244 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrWkstaUserGetInfo(p, tctx, &r); tctx 245 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 247 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, tctx 255 source4/torture/rpc/wkssvc.c static bool test_NetrUseEnum(struct torture_context *tctx, tctx 276 source4/torture/rpc/wkssvc.c use0 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr0); tctx 280 source4/torture/rpc/wkssvc.c use1 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr1); tctx 284 source4/torture/rpc/wkssvc.c use2 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr2); tctx 291 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 298 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUseEnum level %u\n", tctx 301 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseEnum(p, tctx, &r); tctx 302 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 304 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 311 source4/torture/rpc/wkssvc.c static bool test_NetrUseAdd(struct torture_context *tctx, tctx 321 source4/torture/rpc/wkssvc.c ctr = talloc(tctx, union wkssvc_NetrUseGetInfoCtr); tctx 330 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 335 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUseAdd level %u\n", tctx 338 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseAdd(p, tctx, &r); tctx 339 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 341 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_UNKNOWN_LEVEL, tctx 353 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 358 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUseAdd level %u\n", tctx 361 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseAdd(p, tctx, &r); tctx 362 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 364 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 370 source4/torture/rpc/wkssvc.c static bool test_NetrUseDel(struct torture_context *tctx, tctx 376 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 380 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUseDel\n"); tctx 382 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseDel(p, tctx, &r); tctx 383 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 385 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 390 source4/torture/rpc/wkssvc.c static bool test_NetrUseGetInfo_level(struct torture_context *tctx, tctx 402 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 406 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseGetInfo(p, tctx, &r); tctx 408 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 410 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, werr, tctx 415 source4/torture/rpc/wkssvc.c static bool test_NetrUseGetInfo(struct torture_context *tctx, tctx 431 source4/torture/rpc/wkssvc.c use0 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr0); tctx 434 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 440 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseEnum(p, tctx, &r); tctx 441 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 443 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 452 source4/torture/rpc/wkssvc.c if (!test_NetrUseGetInfo_level(tctx, p, use_name, tctx 466 source4/torture/rpc/wkssvc.c if (!test_NetrUseGetInfo_level(tctx, p, use_name, tctx 480 source4/torture/rpc/wkssvc.c static bool test_NetrLogonDomainNameAdd(struct torture_context *tctx, tctx 486 source4/torture/rpc/wkssvc.c r.in.domain_name = lp_workgroup(tctx->lp_ctx); tctx 488 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrLogonDomainNameAdd\n"); tctx 490 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrLogonDomainNameAdd(p, tctx, &r); tctx 491 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 493 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED, tctx 498 source4/torture/rpc/wkssvc.c static bool test_NetrLogonDomainNameDel(struct torture_context *tctx, tctx 504 source4/torture/rpc/wkssvc.c r.in.domain_name = lp_workgroup(tctx->lp_ctx); tctx 506 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrLogonDomainNameDel\n"); tctx 508 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrLogonDomainNameDel(p, tctx, &r); tctx 509 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 511 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED, tctx 516 source4/torture/rpc/wkssvc.c static bool test_NetrEnumerateComputerNames_level(struct torture_context *tctx, tctx 527 source4/torture/rpc/wkssvc.c ctr = talloc_zero(tctx, struct wkssvc_ComputerNamesCtr); tctx 534 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrEnumerateComputerNames level %u\n", tctx 537 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrEnumerateComputerNames(p, tctx, &r); tctx 538 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 540 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 544 source4/torture/rpc/wkssvc.c torture_comment(tctx, tctx 554 source4/torture/rpc/wkssvc.c if (!add_string_to_array(tctx, tctx 567 source4/torture/rpc/wkssvc.c static bool test_NetrEnumerateComputerNames(struct torture_context *tctx, tctx 575 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, tctx 587 source4/torture/rpc/wkssvc.c static bool test_NetrValidateName(struct torture_context *tctx, tctx 597 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 598 source4/torture/rpc/wkssvc.c r.in.name = lp_workgroup(tctx->lp_ctx); tctx 603 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrValidateName level %u\n", tctx 606 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrValidateName(p, tctx, &r); tctx 607 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 609 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, tctx 617 source4/torture/rpc/wkssvc.c static bool test_NetrValidateName2(struct torture_context *tctx, tctx 627 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); tctx 628 source4/torture/rpc/wkssvc.c r.in.name = lp_workgroup(tctx->lp_ctx); tctx 633 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrValidateName2 level %u\n", tctx 636 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrValidateName2(p, tctx, &r); tctx 637 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 639 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, tctx 647 source4/torture/rpc/wkssvc.c static bool test_NetrAddAlternateComputerName(struct torture_context *tctx, tctx 662 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrAddAlternateComputerName\n"); tctx 664 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrAddAlternateComputerName(p, tctx, &r); tctx 665 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 667 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 670 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p, tctx 683 source4/torture/rpc/wkssvc.c torture_comment(tctx, "new alternate name not set\n"); tctx 688 source4/torture/rpc/wkssvc.c static bool test_NetrRemoveAlternateComputerName(struct torture_context *tctx, tctx 703 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrRemoveAlternateComputerName\n"); tctx 705 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrRemoveAlternateComputerName(p, tctx, &r); tctx 706 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 708 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 711 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p, tctx 727 source4/torture/rpc/wkssvc.c static bool test_NetrSetPrimaryComputername_name(struct torture_context *tctx, tctx 740 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrSetPrimaryComputername(p, tctx, &r); tctx 741 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 743 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 749 source4/torture/rpc/wkssvc.c static bool test_NetrSetPrimaryComputername(struct torture_context *tctx, tctx 767 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrSetPrimaryComputername\n"); tctx 769 source4/torture/rpc/wkssvc.c if (!test_NetrAddAlternateComputerName(tctx, p)) { tctx 773 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p, tctx 784 source4/torture/rpc/wkssvc.c if (!test_NetrSetPrimaryComputername_name(tctx, p, tctx 790 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p, tctx 802 source4/torture/rpc/wkssvc.c torture_comment(tctx, tctx 808 source4/torture/rpc/wkssvc.c if (!test_NetrSetPrimaryComputername_name(tctx, p, tctx 814 source4/torture/rpc/wkssvc.c if (!test_NetrRemoveAlternateComputerName(tctx, p)) { tctx 822 source4/torture/rpc/wkssvc.c static bool test_NetrRenameMachineInDomain(struct torture_context *tctx, tctx 834 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrRenameMachineInDomain\n"); tctx 836 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrRenameMachineInDomain(p, tctx, &r); tctx 837 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 839 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED, tctx 844 source4/torture/rpc/wkssvc.c static bool test_NetrRenameMachineInDomain2_name(struct torture_context *tctx, tctx 857 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrRenameMachineInDomain2(p, tctx, &r); tctx 858 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 860 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 865 source4/torture/rpc/wkssvc.c static bool test_NetrRenameMachineInDomain2(struct torture_context *tctx, tctx 871 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrRenameMachineInDomain2\n"); tctx 873 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p, tctx 884 source4/torture/rpc/wkssvc.c if (!test_NetrRenameMachineInDomain2_name(tctx, p, tctx 890 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p, tctx 902 source4/torture/rpc/wkssvc.c test_NetrRenameMachineInDomain2_name(tctx, p, names_o[0]); tctx 907 source4/torture/rpc/wkssvc.c test_NetrRenameMachineInDomain2_name(tctx, p, names_o[0]); tctx 911 source4/torture/rpc/wkssvc.c if (!test_NetrRenameMachineInDomain2_name(tctx, p, names_o[0])) tctx 916 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p, tctx 934 source4/torture/rpc/wkssvc.c static bool test_NetrWorkstationStatisticsGet(struct torture_context *tctx, tctx 943 source4/torture/rpc/wkssvc.c info = talloc_zero(tctx, struct wkssvc_NetrWorkstationStatistics); tctx 948 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrWorkstationStatisticsGet\n"); tctx 950 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrWorkstationStatisticsGet(p, tctx, &r); tctx 951 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 953 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 960 source4/torture/rpc/wkssvc.c static bool test_NetrMessageBufferSend(struct torture_context *tctx, tctx 969 source4/torture/rpc/wkssvc.c push_ucs2_talloc(tctx, (void **)&msg, message, &size); tctx 977 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrMessageBufferSend\n"); tctx 979 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrMessageBufferSend(p, tctx, &r); tctx 980 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 982 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 987 source4/torture/rpc/wkssvc.c static bool test_NetrGetJoinInformation(struct torture_context *tctx, tctx 999 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrGetJoinInformation\n"); tctx 1001 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrGetJoinInformation(p, tctx, &r); tctx 1002 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 1004 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 1009 source4/torture/rpc/wkssvc.c static bool test_GetJoinInformation(struct torture_context *tctx, tctx 1023 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrGetJoinInformation(p, tctx, &r); tctx 1024 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 1026 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, tctx 1034 source4/torture/rpc/wkssvc.c *name = talloc_strdup(tctx, name_buffer); tctx 1041 source4/torture/rpc/wkssvc.c static bool test_NetrGetJoinableOus(struct torture_context *tctx, tctx 1050 source4/torture/rpc/wkssvc.c r.in.domain_name = lp_workgroup(tctx->lp_ctx); tctx 1056 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrGetJoinableOus\n"); tctx 1058 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrGetJoinableOus(p, tctx, &r); tctx 1059 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, "NetrGetJoinableOus failed"); tctx 1060 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, tctx 1067 source4/torture/rpc/wkssvc.c static bool test_NetrGetJoinableOus2(struct torture_context *tctx, tctx 1076 source4/torture/rpc/wkssvc.c r.in.domain_name = lp_workgroup(tctx->lp_ctx); tctx 1082 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrGetJoinableOus2\n"); tctx 1084 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrGetJoinableOus2(p, tctx, &r); tctx 1085 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, "NetrGetJoinableOus2 failed"); tctx 1086 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, tctx 1093 source4/torture/rpc/wkssvc.c static bool test_NetrUnjoinDomain(struct torture_context *tctx, tctx 1102 source4/torture/rpc/wkssvc.c admin_account = talloc_asprintf(tctx, "%s\\%s", tctx 1103 source4/torture/rpc/wkssvc.c lp_workgroup(tctx->lp_ctx), tctx 1111 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUnjoinDomain\n"); tctx 1113 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUnjoinDomain(p, tctx, &r); tctx 1114 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 1116 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED, tctx 1121 source4/torture/rpc/wkssvc.c static bool test_NetrJoinDomain(struct torture_context *tctx, tctx 1130 source4/torture/rpc/wkssvc.c admin_account = talloc_asprintf(tctx, "%s\\%s", tctx 1131 source4/torture/rpc/wkssvc.c lp_workgroup(tctx->lp_ctx), tctx 1135 source4/torture/rpc/wkssvc.c r.in.domain_name = lp_realm(tctx->lp_ctx); tctx 1141 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrJoinDomain\n"); tctx 1143 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrJoinDomain(p, tctx, &r); tctx 1144 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 1146 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED, tctx 1197 source4/torture/rpc/wkssvc.c static bool test_NetrJoinDomain2(struct torture_context *tctx, tctx 1214 source4/torture/rpc/wkssvc.c if (!test_GetJoinInformation(tctx, p, &join_status, &join_name)) tctx 1231 source4/torture/rpc/wkssvc.c domain_admin_account = torture_setting_string(tctx, "domain_admin_account", NULL); tctx 1233 source4/torture/rpc/wkssvc.c domain_admin_password = torture_setting_string(tctx, "domain_admin_password", NULL); tctx 1235 source4/torture/rpc/wkssvc.c domain_name = torture_setting_string(tctx, "domain_name", NULL); tctx 1240 source4/torture/rpc/wkssvc.c torture_comment(tctx, "not enough input parameter\n"); tctx 1249 source4/torture/rpc/wkssvc.c encode_wkssvc_join_password_buffer(tctx, domain_admin_password, tctx 1260 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrJoinDomain2 (assuming non-DC)\n"); tctx 1262 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrJoinDomain2(p, tctx, &r); tctx 1263 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 1265 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, expected_err, tctx 1268 source4/torture/rpc/wkssvc.c if (!test_GetJoinInformation(tctx, p, &join_status, &join_name)) tctx 1274 source4/torture/rpc/wkssvc.c torture_comment(tctx, tctx 1282 source4/torture/rpc/wkssvc.c static bool test_NetrUnjoinDomain2(struct torture_context *tctx, tctx 1298 source4/torture/rpc/wkssvc.c if (!test_GetJoinInformation(tctx, p, &join_status, &join_name)) tctx 1315 source4/torture/rpc/wkssvc.c domain_admin_account = torture_setting_string(tctx, "domain_admin_account", NULL); tctx 1317 source4/torture/rpc/wkssvc.c domain_admin_password = torture_setting_string(tctx, "domain_admin_password", NULL); tctx 1321 source4/torture/rpc/wkssvc.c torture_comment(tctx, "not enough input parameter\n"); tctx 1330 source4/torture/rpc/wkssvc.c encode_wkssvc_join_password_buffer(tctx, domain_admin_password, tctx 1338 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUnjoinDomain2 (assuming non-DC)\n"); tctx 1340 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUnjoinDomain2(p, tctx, &r); tctx 1341 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, tctx 1343 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, expected_err, tctx 1346 source4/torture/rpc/wkssvc.c if (!test_GetJoinInformation(tctx, p, &join_status, &join_name)) tctx 1358 source4/torture/rpc/wkssvc.c torture_comment(tctx, tctx 67 source4/torture/smb2/connect.c static NTSTATUS torture_smb2_write(struct torture_context *tctx, struct smb2_tree *tree, struct smb2_handle handle) tctx 76 source4/torture/smb2/connect.c if (torture_setting_bool(tctx, "dangerous", false)) { tctx 78 source4/torture/smb2/connect.c } else if (torture_setting_bool(tctx, "samba4", false)) { tctx 80 source4/torture/smb2/getinfo.c static bool torture_smb2_fileinfo(struct torture_context *tctx, struct smb2_tree *tree) tctx 34 source4/torture/smb2/maxwrite.c static NTSTATUS torture_smb2_write(struct torture_context *tctx, tctx 46 source4/torture/smb2/maxwrite.c TALLOC_CTX *tmp_ctx = talloc_new(tctx); tctx 31 source4/torture/smb2/oplocks.c torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got 0x%x - should be 0x%x\n", \ tctx 38 source4/torture/smb2/oplocks.c torture_result(tctx, TORTURE_FAIL, __location__": Incorrect status %s - should be %s", \ tctx 106 source4/torture/smb2/oplocks.c bool torture_smb2_oplock_batch1(struct torture_context *tctx, tctx 109 source4/torture/smb2/oplocks.c TALLOC_CTX *mem_ctx = talloc_new(tctx); tctx 31 source4/torture/smb2/persistent_handles.c torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got 0x%x - should be 0x%x\n", \ tctx 38 source4/torture/smb2/persistent_handles.c torture_result(tctx, TORTURE_FAIL, __location__": Incorrect status %s - should be %s", \ tctx 48 source4/torture/smb2/persistent_handles.c bool torture_smb2_persistent_handles1(struct torture_context *tctx, tctx 52 source4/torture/smb2/persistent_handles.c TALLOC_CTX *mem_ctx = talloc_new(tctx); tctx 113 source4/torture/smb2/persistent_handles.c torture_comment(tctx, "position: %llu\n", tctx 130 source4/torture/smb2/persistent_handles.c torture_comment(tctx, "position: %llu\n", tctx 145 source4/torture/smb2/persistent_handles.c b = data_blob_talloc(tctx, NULL, 16); tctx 173 source4/torture/smb2/persistent_handles.c torture_comment(tctx, "position: %llu\n", tctx 267 source4/torture/smb2/util.c bool torture_smb2_connection(struct torture_context *tctx, struct smb2_tree **tree) tctx 270 source4/torture/smb2/util.c const char *host = torture_setting_string(tctx, "host", NULL); tctx 271 source4/torture/smb2/util.c const char *share = torture_setting_string(tctx, "share", NULL); tctx 275 source4/torture/smb2/util.c lp_smbcli_options(tctx->lp_ctx, &options); tctx 277 source4/torture/smb2/util.c status = smb2_connect(tctx, host, tctx 278 source4/torture/smb2/util.c lp_smb_ports(tctx->lp_ctx), tctx 280 source4/torture/smb2/util.c lp_resolve_context(tctx->lp_ctx), tctx 282 source4/torture/smb2/util.c tctx->ev, &options, tctx 283 source4/torture/smb2/util.c lp_socket_options(tctx->lp_ctx), tctx 284 source4/torture/smb2/util.c lp_gensec_settings(tctx, tctx->lp_ctx) tctx 208 source4/torture/smbiconv.c cd = smb_iconv_open_ex(tctx, to, from, lp_parm_bool(tctx->lp_ctx, NULL, "iconv", "native", true)); tctx 404 source4/torture/smbtorture.c static void run_shell(struct torture_context *tctx) tctx 430 source4/torture/smbtorture.c lp_set_cmdline(tctx->lp_ctx, name, argv[2]); tctx 443 source4/torture/smbtorture.c run_test(tctx, argv[1]); tctx 51 source4/torture/unix/unix_info2.c static struct smbcli_state *connect_to_server(struct torture_context *tctx) tctx 56 source4/torture/unix/unix_info2.c const char *host = torture_setting_string(tctx, "host", NULL); tctx 57 source4/torture/unix/unix_info2.c const char *share = torture_setting_string(tctx, "share", NULL); tctx 61 source4/torture/unix/unix_info2.c lp_smbcli_options(tctx->lp_ctx, &options); tctx 62 source4/torture/unix/unix_info2.c lp_smbcli_session_options(tctx->lp_ctx, &session_options); tctx 64 source4/torture/unix/unix_info2.c status = smbcli_full_connection(tctx, &cli, host, tctx 65 source4/torture/unix/unix_info2.c lp_smb_ports(tctx->lp_ctx), tctx 66 source4/torture/unix/unix_info2.c share, NULL, lp_socket_options(tctx->lp_ctx), tctx 68 source4/torture/unix/unix_info2.c lp_resolve_context(tctx->lp_ctx), tctx 69 source4/torture/unix/unix_info2.c tctx->ev, &options, &session_options, tctx 70 source4/torture/unix/unix_info2.c lp_iconv_convenience(tctx->lp_ctx), tctx 71 source4/torture/unix/unix_info2.c lp_gensec_settings(tctx, tctx->lp_ctx)); tctx 71 source4/torture/unix/whoami.c static struct smbcli_state *connect_to_server(struct torture_context *tctx, tctx 77 source4/torture/unix/whoami.c const char *host = torture_setting_string(tctx, "host", NULL); tctx 78 source4/torture/unix/whoami.c const char *share = torture_setting_string(tctx, "share", NULL); tctx 82 source4/torture/unix/whoami.c lp_smbcli_options(tctx->lp_ctx, &options); tctx 83 source4/torture/unix/whoami.c lp_smbcli_session_options(tctx->lp_ctx, &session_options); tctx 85 source4/torture/unix/whoami.c status = smbcli_full_connection(tctx, &cli, host, tctx 86 source4/torture/unix/whoami.c lp_smb_ports(tctx->lp_ctx), tctx 87 source4/torture/unix/whoami.c share, NULL, lp_socket_options(tctx->lp_ctx), tctx 88 source4/torture/unix/whoami.c creds, lp_resolve_context(tctx->lp_ctx), tctx 89 source4/torture/unix/whoami.c tctx->ev, &options, &session_options, tctx 90 source4/torture/unix/whoami.c lp_iconv_convenience(tctx->lp_ctx), tctx 91 source4/torture/unix/whoami.c lp_gensec_settings(tctx, tctx->lp_ctx)); tctx 56 source4/torture/util.h struct torture_context *tctx, tctx 62 source4/torture/util.h struct torture_context *tctx, tctx 66 source4/torture/util.h struct torture_context *tctx, tctx 68 source4/torture/util.h _PUBLIC_ bool torture_open_connection(struct smbcli_state **c, struct torture_context *tctx, int conn_index); tctx 72 source4/torture/util.h double torture_create_procs(struct torture_context *tctx, tctx 470 source4/torture/util_smb.c struct torture_context *tctx, tctx 480 source4/torture/util_smb.c lp_smbcli_options(tctx->lp_ctx, &options); tctx 481 source4/torture/util_smb.c lp_smbcli_session_options(tctx->lp_ctx, &session_options); tctx 483 source4/torture/util_smb.c options.use_oplocks = torture_setting_bool(tctx, "use_oplocks", true); tctx 484 source4/torture/util_smb.c options.use_level2_oplocks = torture_setting_bool(tctx, "use_level2_oplocks", true); tctx 487 source4/torture/util_smb.c lp_smb_ports(tctx->lp_ctx), tctx 489 source4/torture/util_smb.c lp_socket_options(tctx->lp_ctx), tctx 491 source4/torture/util_smb.c lp_resolve_context(tctx->lp_ctx), tctx 493 source4/torture/util_smb.c lp_iconv_convenience(tctx->lp_ctx), tctx 494 source4/torture/util_smb.c lp_gensec_settings(tctx, tctx->lp_ctx)); tctx 505 source4/torture/util_smb.c struct torture_context *tctx, tctx 512 source4/torture/util_smb.c (*host) = talloc_strdup(mem_ctx, torture_setting_string(tctx, "host", NULL)); tctx 513 source4/torture/util_smb.c (*share) = talloc_strdup(mem_ctx, torture_setting_string(tctx, "share", NULL)); tctx 515 source4/torture/util_smb.c p = torture_setting_string(tctx, "unclist", NULL); tctx 541 source4/torture/util_smb.c struct torture_context *tctx, tctx 547 source4/torture/util_smb.c if (!torture_get_conn_index(conn_index, ev, tctx, &host, &share)) { tctx 551 source4/torture/util_smb.c ret = torture_open_connection_share(NULL, c, tctx, host, share, ev); tctx 558 source4/torture/util_smb.c _PUBLIC_ bool torture_open_connection(struct smbcli_state **c, struct torture_context *tctx, int conn_index) tctx 560 source4/torture/util_smb.c return torture_open_connection_ev(c, conn_index, tctx, tctx->ev); tctx 614 source4/torture/util_smb.c double torture_create_procs(struct torture_context *tctx, tctx 622 source4/torture/util_smb.c int torture_nprocs = torture_setting_int(tctx, "nprocs", 4); tctx 663 source4/torture/util_smb.c lp_set_cmdline(tctx->lp_ctx, "netbios name", myname); tctx 668 source4/torture/util_smb.c if (torture_open_connection(¤t_cli, tctx, i)) { tctx 688 source4/torture/util_smb.c child_status_out[i] = fn(tctx, current_cli, i);