tctx               39 lib/crypto/hmacmd5.c                 struct MD5Context tctx;
tctx               41 lib/crypto/hmacmd5.c                 MD5Init(&tctx);
tctx               42 lib/crypto/hmacmd5.c                 MD5Update(&tctx, key, key_len);
tctx               43 lib/crypto/hmacmd5.c                 MD5Final(tk, &tctx);
tctx               44 lib/crypto/hmacmd5test.c 	TALLOC_CTX *tctx = talloc_new(torture);
tctx               45 lib/crypto/hmacmd5test.c 	if (!tctx) { return false; };
tctx               49 lib/crypto/hmacmd5test.c 	testarray[0].md5	= strhex_to_data_blob(tctx, "9294727a3638bb1c13f48ef8158bfc9d");
tctx               53 lib/crypto/hmacmd5test.c 	testarray[1].md5	= strhex_to_data_blob(tctx, "750c783e6ab0b503eaa86e310a5db738");
tctx               57 lib/crypto/hmacmd5test.c 	testarray[2].md5	= strhex_to_data_blob(tctx, "56be34521d144c88dbb8c733f0e8b3f6");
tctx               59 lib/crypto/hmacmd5test.c 	testarray[3].key	= strhex_to_data_blob(tctx, "0102030405060708090a0b0c0d0e0f10111213141516171819");
tctx               61 lib/crypto/hmacmd5test.c 	testarray[3].md5	= strhex_to_data_blob(tctx, "697eaf0aca3a3aea3a75164746ffaa79");
tctx               65 lib/crypto/hmacmd5test.c 	testarray[4].md5	= strhex_to_data_blob(tctx, "56461ef2342edc00f9bab995690efd4c");
tctx               69 lib/crypto/hmacmd5test.c 	testarray[5].md5	= strhex_to_data_blob(tctx, "6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd");
tctx               74 lib/crypto/hmacmd5test.c 	testarray[6].md5	= strhex_to_data_blob(tctx, "6f630fad67cda0ee1fb1f562db3aa53e");
tctx               99 lib/crypto/hmacmd5test.c 	talloc_free(tctx);
tctx               43 lib/crypto/hmacsha256.c                 SHA256_CTX tctx;
tctx               45 lib/crypto/hmacsha256.c                 SHA256_Init(&tctx);
tctx               46 lib/crypto/hmacsha256.c                 SHA256_Update(&tctx, key, key_len);
tctx               47 lib/crypto/hmacsha256.c                 SHA256_Final(tk, &tctx);
tctx               48 lib/socket_wrapper/testsuite.c static bool test_socket_wrapper_dir(struct torture_context *tctx)
tctx               53 lib/socket_wrapper/testsuite.c 	torture_assert_str_equal(tctx, socket_wrapper_dir(), "foo", "setting failed");
tctx               55 lib/socket_wrapper/testsuite.c 	torture_assert_str_equal(tctx, socket_wrapper_dir(), "foo", "setting failed");
tctx               57 lib/socket_wrapper/testsuite.c 	torture_assert_str_equal(tctx, socket_wrapper_dir(), NULL, "resetting failed");
tctx               64 lib/socket_wrapper/testsuite.c static bool test_swrap_socket(struct torture_context *tctx)
tctx               69 lib/socket_wrapper/testsuite.c 	torture_assert_int_equal(tctx, swrap_socket(1337, 1337, 0), -1, "unknown address family fails");
tctx               70 lib/socket_wrapper/testsuite.c 	torture_assert_int_equal(tctx, errno, EAFNOSUPPORT, "correct errno set");
tctx               71 lib/socket_wrapper/testsuite.c 	torture_assert_int_equal(tctx, swrap_socket(AF_INET, 1337, 0), -1, "unknown type fails");
tctx               72 lib/socket_wrapper/testsuite.c 	torture_assert_int_equal(tctx, errno, EPROTONOSUPPORT, "correct errno set");
tctx               73 lib/socket_wrapper/testsuite.c 	torture_assert_int_equal(tctx, swrap_socket(AF_INET, SOCK_DGRAM, 10), -1, "unknown protocol fails");
tctx               74 lib/socket_wrapper/testsuite.c 	torture_assert_int_equal(tctx, errno, EPROTONOSUPPORT, "correct errno set");
tctx               82 lib/socket_wrapper/testsuite.c static bool test_socket_wrapper_default_iface(struct torture_context *tctx)
tctx               86 lib/socket_wrapper/testsuite.c 	torture_assert_int_equal(tctx, socket_wrapper_default_iface(), 1, "unset");
tctx               88 lib/socket_wrapper/testsuite.c 	torture_assert_int_equal(tctx, socket_wrapper_default_iface(), 2, "unset");
tctx               90 lib/socket_wrapper/testsuite.c 	torture_assert_int_equal(tctx, socket_wrapper_default_iface(), 1, "unset");
tctx             1107 lib/talloc/testsuite.c bool torture_local_talloc(struct torture_context *tctx)
tctx               29 lib/talloc/testsuite_main.c bool torture_local_talloc(struct torture_context *tctx);
tctx               80 lib/torture/torture.c _PUBLIC_ NTSTATUS torture_temp_dir(struct torture_context *tctx, 
tctx               84 lib/torture/torture.c 	SMB_ASSERT(tctx->outputdir != NULL);
tctx               86 lib/torture/torture.c 	*tempdir = talloc_asprintf(tctx, "%s/%s.XXXXXX", tctx->outputdir, 
tctx              417 lib/torture/torture.h NTSTATUS torture_temp_dir(struct torture_context *tctx, 
tctx              434 lib/torture/torture.h struct torture_context *torture_context_child(struct torture_context *tctx);
tctx               24 lib/util/charset/tests/charset.c static bool test_toupper_m(struct torture_context *tctx)
tctx               26 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, toupper_m('c'), 'C', "c");
tctx               27 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, toupper_m('Z'), 'Z', "z");
tctx               28 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, toupper_m(0xFFFF4565), 0xFFFF4565, "0xFFFF4565");
tctx               32 lib/util/charset/tests/charset.c static bool test_tolower_m(struct torture_context *tctx)
tctx               34 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, tolower_m('C'), 'c', "c");
tctx               35 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, tolower_m('z'), 'z', "z");
tctx               36 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, tolower_m(0xFFFF4565), 0xFFFF4565, "0xFFFF4565");
tctx               40 lib/util/charset/tests/charset.c static bool test_codepoint_cmpi(struct torture_context *tctx)
tctx               42 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, codepoint_cmpi('a', 'a'), 0, "same char");
tctx               43 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, codepoint_cmpi('A', 'a'), 0, "upcase version");
tctx               44 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, codepoint_cmpi('b', 'a'), 1, "right diff");
tctx               45 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, codepoint_cmpi('a', 'b'), -1, "right diff");
tctx               49 lib/util/charset/tests/charset.c static bool test_strcasecmp_m(struct torture_context *tctx)
tctx               51 lib/util/charset/tests/charset.c 	torture_assert(tctx, strcasecmp_m("foo", "bar") != 0, "different strings");
tctx               52 lib/util/charset/tests/charset.c 	torture_assert(tctx, strcasecmp_m("foo", "foo") == 0, "same case strings");
tctx               53 lib/util/charset/tests/charset.c 	torture_assert(tctx, strcasecmp_m("foo", "Foo") == 0, "different case strings");
tctx               54 lib/util/charset/tests/charset.c 	torture_assert(tctx, strcasecmp_m(NULL, "Foo") != 0, "one NULL");
tctx               55 lib/util/charset/tests/charset.c 	torture_assert(tctx, strcasecmp_m("foo", NULL) != 0, "other NULL");
tctx               56 lib/util/charset/tests/charset.c 	torture_assert(tctx, strcasecmp_m(NULL, NULL) == 0, "both NULL");
tctx               61 lib/util/charset/tests/charset.c static bool test_strequal_m(struct torture_context *tctx)
tctx               63 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strequal_m("foo", "bar"), "different strings");
tctx               64 lib/util/charset/tests/charset.c 	torture_assert(tctx, strequal_m("foo", "foo"), "same case strings");
tctx               65 lib/util/charset/tests/charset.c 	torture_assert(tctx, strequal_m("foo", "Foo"), "different case strings");
tctx               66 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strequal_m(NULL, "Foo"), "one NULL");
tctx               67 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strequal_m("foo", NULL), "other NULL");
tctx               68 lib/util/charset/tests/charset.c 	torture_assert(tctx, strequal_m(NULL, NULL), "both NULL");
tctx               72 lib/util/charset/tests/charset.c static bool test_strcsequal_m(struct torture_context *tctx)
tctx               74 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strcsequal_m("foo", "bar"), "different strings");
tctx               75 lib/util/charset/tests/charset.c 	torture_assert(tctx, strcsequal_m("foo", "foo"), "same case strings");
tctx               76 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strcsequal_m("foo", "Foo"), "different case strings");
tctx               77 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strcsequal_m(NULL, "Foo"), "one NULL");
tctx               78 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strcsequal_m("foo", NULL), "other NULL");
tctx               79 lib/util/charset/tests/charset.c 	torture_assert(tctx, strcsequal_m(NULL, NULL), "both NULL");
tctx               83 lib/util/charset/tests/charset.c static bool test_string_replace_m(struct torture_context *tctx)
tctx               87 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, data, "cla", "first char replaced");
tctx               90 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, data, "cac", "other chars replaced");
tctx               93 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, data, "cca", "other chars replaced");
tctx               96 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, data, "blala", "no chars replaced");
tctx              101 lib/util/charset/tests/charset.c static bool test_strncasecmp_m(struct torture_context *tctx)
tctx              103 lib/util/charset/tests/charset.c 	torture_assert(tctx, strncasecmp_m("foo", "bar", 3) != 0, "different strings");
tctx              104 lib/util/charset/tests/charset.c 	torture_assert(tctx, strncasecmp_m("foo", "foo", 3) == 0, "same case strings");
tctx              105 lib/util/charset/tests/charset.c 	torture_assert(tctx, strncasecmp_m("foo", "Foo", 3) == 0, "different case strings");
tctx              106 lib/util/charset/tests/charset.c 	torture_assert(tctx, strncasecmp_m("fool", "Foo", 3) == 0, "different case strings");
tctx              107 lib/util/charset/tests/charset.c 	torture_assert(tctx, strncasecmp_m("fool", "Fool", 40) == 0, "over size");
tctx              108 lib/util/charset/tests/charset.c 	torture_assert(tctx, strncasecmp_m("BLA", "Fool", 0) == 0, "empty");
tctx              109 lib/util/charset/tests/charset.c 	torture_assert(tctx, strncasecmp_m(NULL, "Foo", 3) != 0, "one NULL");
tctx              110 lib/util/charset/tests/charset.c 	torture_assert(tctx, strncasecmp_m("foo", NULL, 3) != 0, "other NULL");
tctx              111 lib/util/charset/tests/charset.c 	torture_assert(tctx, strncasecmp_m(NULL, NULL, 3) == 0, "both NULL");
tctx              115 lib/util/charset/tests/charset.c static bool test_next_token_null(struct torture_context *tctx)
tctx              118 lib/util/charset/tests/charset.c 	torture_assert(tctx, !next_token(NULL, buf, " ", 20), "null ptr works");
tctx              122 lib/util/charset/tests/charset.c static bool test_next_token(struct torture_context *tctx)
tctx              126 lib/util/charset/tests/charset.c 	torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx              127 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, buf, "foo", "token matches");
tctx              128 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, teststr, "bar bla", "ptr modified correctly");
tctx              130 lib/util/charset/tests/charset.c 	torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx              131 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, buf, "bar", "token matches");
tctx              132 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, teststr, "bla", "ptr modified correctly");
tctx              134 lib/util/charset/tests/charset.c 	torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx              135 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, buf, "bla", "token matches");
tctx              136 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly");
tctx              138 lib/util/charset/tests/charset.c 	torture_assert(tctx, !next_token(&teststr, buf, " ", 20), "finding token doesn't work");
tctx              142 lib/util/charset/tests/charset.c static bool test_next_token_implicit_sep(struct torture_context *tctx)
tctx              146 lib/util/charset/tests/charset.c 	torture_assert(tctx, next_token(&teststr, buf, NULL, 20), "finding token works");
tctx              147 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, buf, "foo", "token matches");
tctx              148 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, teststr, "bar\n bla", "ptr modified correctly");
tctx              150 lib/util/charset/tests/charset.c 	torture_assert(tctx, next_token(&teststr, buf, NULL, 20), "finding token works");
tctx              151 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, buf, "bar", "token matches");
tctx              152 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, teststr, " bla", "ptr modified correctly");
tctx              154 lib/util/charset/tests/charset.c 	torture_assert(tctx, next_token(&teststr, buf, NULL, 20), "finding token works");
tctx              155 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, buf, "bla", "token matches");
tctx              156 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly");
tctx              158 lib/util/charset/tests/charset.c 	torture_assert(tctx, !next_token(&teststr, buf, NULL, 20), "finding token doesn't work");
tctx              162 lib/util/charset/tests/charset.c static bool test_next_token_seps(struct torture_context *tctx)
tctx              166 lib/util/charset/tests/charset.c 	torture_assert(tctx, next_token(&teststr, buf, ",", 20), "finding token works");
tctx              167 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, buf, "foo bla", "token matches");
tctx              168 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly");
tctx              170 lib/util/charset/tests/charset.c 	torture_assert(tctx, !next_token(&teststr, buf, ",", 20), "finding token doesn't work");
tctx              174 lib/util/charset/tests/charset.c static bool test_next_token_quotes(struct torture_context *tctx)
tctx              178 lib/util/charset/tests/charset.c 	torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx              179 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, buf, "foo bar", "token matches");
tctx              180 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, teststr, "bla", "ptr modified correctly");
tctx              182 lib/util/charset/tests/charset.c 	torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx              183 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, buf, "bla", "token matches");
tctx              184 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly");
tctx              186 lib/util/charset/tests/charset.c 	torture_assert(tctx, !next_token(&teststr, buf, " ", 20), "finding token doesn't work");
tctx              190 lib/util/charset/tests/charset.c static bool test_next_token_quote_wrong(struct torture_context *tctx)
tctx              194 lib/util/charset/tests/charset.c 	torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx              195 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, buf, "foo bar bla", "token matches");
tctx              196 lib/util/charset/tests/charset.c 	torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly");
tctx              198 lib/util/charset/tests/charset.c 	torture_assert(tctx, !next_token(&teststr, buf, " ", 20), "finding token doesn't work");
tctx              202 lib/util/charset/tests/charset.c static bool test_strlen_m(struct torture_context *tctx)
tctx              204 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, strlen_m("foo"), 3, "simple len");
tctx              205 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, strlen_m("foo\x83l"), 6, "extended len");
tctx              206 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, strlen_m(NULL), 0, "NULL");
tctx              210 lib/util/charset/tests/charset.c static bool test_strlen_m_term(struct torture_context *tctx)
tctx              212 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, strlen_m_term("foo"), 4, "simple len");
tctx              213 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, strlen_m_term("foo\x83l"), 7, "extended len");
tctx              214 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, strlen_m(NULL), 0, "NULL");
tctx              218 lib/util/charset/tests/charset.c static bool test_strhaslower(struct torture_context *tctx)
tctx              220 lib/util/charset/tests/charset.c 	torture_assert(tctx, strhaslower("a"), "one low char");
tctx              221 lib/util/charset/tests/charset.c 	torture_assert(tctx, strhaslower("aB"), "one low, one up char");
tctx              222 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strhaslower("B"), "one up char");
tctx              223 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strhaslower(""), "empty string");
tctx              224 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strhaslower("3"), "one digit");
tctx              228 lib/util/charset/tests/charset.c static bool test_strhasupper(struct torture_context *tctx)
tctx              230 lib/util/charset/tests/charset.c 	torture_assert(tctx, strhasupper("B"), "one up char");
tctx              231 lib/util/charset/tests/charset.c 	torture_assert(tctx, strhasupper("aB"), "one low, one up char");
tctx              232 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strhasupper("a"), "one low char");
tctx              233 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strhasupper(""), "empty string");
tctx              234 lib/util/charset/tests/charset.c 	torture_assert(tctx, !strhasupper("3"), "one digit");
tctx              238 lib/util/charset/tests/charset.c static bool test_count_chars_m(struct torture_context *tctx)
tctx              240 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, count_chars_m("foo", 'o'), 2, "simple");
tctx              241 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, count_chars_m("", 'o'), 0, "empty");
tctx              242 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, count_chars_m("bla", 'o'), 0, "none");
tctx              243 lib/util/charset/tests/charset.c 	torture_assert_int_equal(tctx, count_chars_m("bla", '\0'), 0, "null");
tctx               33 lib/util/charset/tests/iconv.c static bool iconv_untestable(struct torture_context *tctx)
tctx               37 lib/util/charset/tests/iconv.c 	if (!lp_parm_bool(tctx->lp_ctx, NULL, "iconv", "native", true))
tctx               38 lib/util/charset/tests/iconv.c 		torture_skip(tctx, "system iconv disabled - skipping test");
tctx               42 lib/util/charset/tests/iconv.c 		torture_skip(tctx, "unable to test - system iconv library does not support UTF-16LE -> UCS-4LE");
tctx               47 lib/util/charset/tests/iconv.c 		torture_skip(tctx, "unable to test - system iconv library does not support UTF-16LE -> CP850\n");
tctx              285 lib/util/charset/tests/iconv.c static bool test_codepoint(struct torture_context *tctx, unsigned int codepoint)
tctx              291 lib/util/charset/tests/iconv.c 	size = push_codepoint(lp_iconv_convenience(tctx->lp_ctx), (char *)buf, codepoint);
tctx              292 lib/util/charset/tests/iconv.c 	torture_assert(tctx, size != -1 || (codepoint >= 0xd800 && codepoint <= 0x10000), 
tctx              302 lib/util/charset/tests/iconv.c 	c = next_codepoint_convenience(lp_iconv_convenience(tctx->lp_ctx), (char *)buf, &size2);
tctx              304 lib/util/charset/tests/iconv.c 	torture_assert(tctx, c == codepoint, 
tctx              305 lib/util/charset/tests/iconv.c 		       talloc_asprintf(tctx, 
tctx              308 lib/util/charset/tests/iconv.c 	torture_assert(tctx, size2 == size, 
tctx              309 lib/util/charset/tests/iconv.c 			talloc_asprintf(tctx, "next_codepoint(%u) gave wrong size %d (should be %d)\n", 
tctx              315 lib/util/charset/tests/iconv.c static bool test_next_codepoint(struct torture_context *tctx)
tctx              318 lib/util/charset/tests/iconv.c 	if (iconv_untestable(tctx))
tctx              322 lib/util/charset/tests/iconv.c 		if (!test_codepoint(tctx, codepoint))
tctx              328 lib/util/charset/tests/iconv.c static bool test_first_1m(struct torture_context *tctx)
tctx              334 lib/util/charset/tests/iconv.c 	if (iconv_untestable(tctx))
tctx              343 lib/util/charset/tests/iconv.c 			if (torture_setting_bool(tctx, "progress", true)) {
tctx              344 lib/util/charset/tests/iconv.c 				torture_comment(tctx, "codepoint=%u   \r", codepoint);
tctx              349 lib/util/charset/tests/iconv.c 		if (!test_buffer(tctx, inbuf, size, "UTF-8"))
tctx              355 lib/util/charset/tests/iconv.c static bool test_random_5m(struct torture_context *tctx)
tctx              360 lib/util/charset/tests/iconv.c 	if (iconv_untestable(tctx))
tctx              368 lib/util/charset/tests/iconv.c 			if (torture_setting_bool(tctx, "progress", true)) {
tctx              369 lib/util/charset/tests/iconv.c 				torture_comment(tctx, "i=%u              \r", i);
tctx              388 lib/util/charset/tests/iconv.c 		if (!test_buffer(tctx, inbuf, size, "UTF-8")) {
tctx              393 lib/util/charset/tests/iconv.c 		if (!test_buffer(tctx, inbuf, size, "CP850")) {
tctx              402 lib/util/charset/tests/iconv.c static bool test_string2key(struct torture_context *tctx)
tctx              406 lib/util/charset/tests/iconv.c 	TALLOC_CTX *mem_ctx = talloc_new(tctx);
tctx              419 lib/util/charset/tests/iconv.c 	torture_comment(tctx, "converting random buffer\n");
tctx              422 lib/util/charset/tests/iconv.c 		torture_fail(tctx, "Failed to convert random buffer\n");
tctx              429 lib/util/charset/tests/iconv.c 	torture_comment(tctx, "converting fixed buffer to UTF16\n");
tctx              432 lib/util/charset/tests/iconv.c 		torture_fail(tctx, "Failed to convert fixed buffer to UTF16_MUNGED\n");
tctx              435 lib/util/charset/tests/iconv.c 	torture_assert(tctx, ret == 20, "conversion should give 20 bytes\n");
tctx              437 lib/util/charset/tests/iconv.c 	torture_comment(tctx, "converting fixed buffer to UTF8\n");
tctx              440 lib/util/charset/tests/iconv.c 		torture_fail(tctx, "Failed to convert fixed buffer to UTF8\n");
tctx              443 lib/util/charset/tests/iconv.c 	torture_assert(tctx, strcmp(correct, out1) == 0, "conversion gave incorrect result\n");
tctx               25 lib/util/tests/data_blob.c static bool test_string(struct torture_context *tctx)
tctx               29 lib/util/tests/data_blob.c 	torture_assert_int_equal(tctx, blob.length, 3, "blob length");
tctx               30 lib/util/tests/data_blob.c 	torture_assert_str_equal(tctx, (char *)blob.data, "bla", "blob data");
tctx               35 lib/util/tests/data_blob.c static bool test_string_null(struct torture_context *tctx)
tctx               39 lib/util/tests/data_blob.c 	torture_assert_int_equal(tctx, blob.length, 4, "blob length");
tctx               40 lib/util/tests/data_blob.c 	torture_assert_str_equal(tctx, (char *)blob.data, "bla", "blob data");
tctx               45 lib/util/tests/data_blob.c static bool test_zero(struct torture_context *tctx)
tctx               48 lib/util/tests/data_blob.c 	DATA_BLOB z = data_blob_talloc_zero(tctx, 4);
tctx               49 lib/util/tests/data_blob.c 	torture_assert_int_equal(tctx, z.length, 4, "length");
tctx               51 lib/util/tests/data_blob.c 		torture_assert_int_equal(tctx, z.data[i], 0, "contents");
tctx               57 lib/util/tests/data_blob.c static bool test_clear(struct torture_context *tctx)
tctx               61 lib/util/tests/data_blob.c 	torture_assert_int_equal(tctx, z.length, 6, "length");
tctx               64 lib/util/tests/data_blob.c 		torture_assert_int_equal(tctx, z.data[i], 0, "contents");
tctx               69 lib/util/tests/data_blob.c static bool test_cmp(struct torture_context *tctx)
tctx               73 lib/util/tests/data_blob.c 	torture_assert(tctx, data_blob_cmp(&a, &b) != 0, "cmp different");
tctx               74 lib/util/tests/data_blob.c 	torture_assert(tctx, data_blob_cmp(&a, &a) == 0, "cmp self");
tctx               78 lib/util/tests/data_blob.c static bool test_hex_string(struct torture_context *tctx)
tctx               81 lib/util/tests/data_blob.c 	torture_assert_str_equal(tctx, data_blob_hex_string(tctx, &a), "0C0A0F0E", "hex string");
tctx               33 lib/util/tests/file.c static bool test_file_load_save(struct torture_context *tctx)
tctx               37 lib/util/tests/file.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               39 lib/util/tests/file.c 	torture_assert(tctx, file_save(TEST_FILENAME, TEST_DATA, strlen(TEST_DATA)),
tctx               42 lib/util/tests/file.c 	torture_assert_file_contains_text(tctx, TEST_FILENAME, TEST_DATA, 
tctx               46 lib/util/tests/file.c 	torture_assert(tctx, data, "loading file");
tctx               48 lib/util/tests/file.c 	torture_assert_int_equal(tctx, len, strlen(TEST_DATA), "Length");
tctx               50 lib/util/tests/file.c 	torture_assert_mem_equal(tctx, data, TEST_DATA, len, "Contents");
tctx               54 lib/util/tests/file.c 	torture_assert_int_equal(tctx, len, 5, "Length");
tctx               56 lib/util/tests/file.c 	torture_assert_mem_equal(tctx, data, TEST_DATA, len, "Contents");
tctx               63 lib/util/tests/file.c static bool test_afdgets(struct torture_context *tctx)
tctx               67 lib/util/tests/file.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               69 lib/util/tests/file.c 	torture_assert(tctx, file_save(TEST_FILENAME, (const void *)TEST_DATA, 
tctx               75 lib/util/tests/file.c 	torture_assert(tctx, fd != -1, "opening file");
tctx               78 lib/util/tests/file.c 	torture_assert(tctx, strcmp(line, TEST_LINE1) == 0, "line 1 mismatch");
tctx               81 lib/util/tests/file.c 	torture_assert(tctx, strcmp(line, TEST_LINE2) == 0, "line 2 mismatch");
tctx               84 lib/util/tests/file.c 	torture_assert(tctx, strcmp(line, TEST_LINE3) == 0, "line 3 mismatch");
tctx               30 lib/util/tests/genrand.c static bool test_reseed_callback(struct torture_context *tctx)
tctx               36 lib/util/tests/genrand.c static bool test_check_password_quality(struct torture_context *tctx)
tctx               38 lib/util/tests/genrand.c 	torture_assert(tctx, !check_password_quality(""), "empty password");
tctx               39 lib/util/tests/genrand.c 	torture_assert(tctx, !check_password_quality("a"), "one char password");
tctx               40 lib/util/tests/genrand.c 	torture_assert(tctx, !check_password_quality("aaaaaaaaaaaa"), "same char password");
tctx               41 lib/util/tests/genrand.c 	torture_assert(tctx, !check_password_quality("BLA"), "multiple upcases password");
tctx               42 lib/util/tests/genrand.c 	torture_assert(tctx, !check_password_quality("123"), "digits only");
tctx               43 lib/util/tests/genrand.c 	torture_assert(tctx, check_password_quality("A2e"), "valid");
tctx               44 lib/util/tests/genrand.c 	torture_assert(tctx, check_password_quality("BA2eLi443"), "valid");
tctx               48 lib/util/tests/genrand.c static bool test_generate_random_str(struct torture_context *tctx)
tctx               52 lib/util/tests/genrand.c 	torture_assert_int_equal(tctx, strlen(r), 10, "right length generated");
tctx               54 lib/util/tests/genrand.c 	torture_assert_int_equal(tctx, strlen(r), 5, "right length generated");
tctx               25 lib/util/tests/idtree.c static bool torture_local_idtree_simple(struct torture_context *tctx)
tctx               33 lib/util/tests/idtree.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               49 lib/util/tests/idtree.c 				torture_fail(tctx, talloc_asprintf(tctx, 
tctx               55 lib/util/tests/idtree.c 					torture_fail(tctx, talloc_asprintf(tctx,
tctx               64 lib/util/tests/idtree.c 				torture_fail(tctx, 
tctx               65 lib/util/tests/idtree.c 					     talloc_asprintf(tctx,
tctx               73 lib/util/tests/idtree.c 					torture_fail(tctx, talloc_asprintf(tctx,
tctx               83 lib/util/tests/idtree.c 	torture_comment(tctx, "done %d random ops\n", i);
tctx               88 lib/util/tests/idtree.c 				torture_fail(tctx, talloc_asprintf(tctx,
tctx               98 lib/util/tests/idtree.c 		torture_assert(tctx, ret != -1, "idr_get_new_above failed");
tctx              102 lib/util/tests/idtree.c 	torture_assert_int_equal(tctx, ret, 0x10000-2, "idr_get_new_above failed");
tctx              104 lib/util/tests/idtree.c 	torture_assert_int_equal(tctx, ret, 0x10000-1, "idr_get_new_above failed");
tctx              106 lib/util/tests/idtree.c 	torture_assert_int_equal(tctx, ret, 0x10000, "idr_get_new_above failed");
tctx              108 lib/util/tests/idtree.c 	torture_assert_int_equal(tctx, ret, -1, "idr_get_new_above succeeded above limit");
tctx              110 lib/util/tests/idtree.c 	torture_assert_int_equal(tctx, ret, -1, "idr_get_new_above succeeded above limit");
tctx              112 lib/util/tests/idtree.c 	torture_comment(tctx, "cleaned up\n");
tctx               25 lib/util/tests/str.c static bool test_string_sub_simple(struct torture_context *tctx)
tctx               30 lib/util/tests/str.c 	torture_assert_str_equal(tctx, tmp, "barbar", "invalid sub");
tctx               34 lib/util/tests/str.c static bool test_string_sub_multiple(struct torture_context *tctx)
tctx               39 lib/util/tests/str.c 	torture_assert_str_equal(tctx, tmp, "barblabar", "invalid sub");
tctx               43 lib/util/tests/str.c static bool test_string_sub_longer(struct torture_context *tctx)
tctx               48 lib/util/tests/str.c 	torture_assert_str_equal(tctx, tmp, "bliebla", "invalid sub");
tctx               52 lib/util/tests/str.c static bool test_string_sub_shorter(struct torture_context *tctx)
tctx               57 lib/util/tests/str.c 	torture_assert_str_equal(tctx, tmp, "blbla", "invalid sub");
tctx               61 lib/util/tests/str.c static bool test_string_sub_special_char(struct torture_context *tctx)
tctx               66 lib/util/tests/str.c 	torture_assert_str_equal(tctx, tmp, "_b_lbla", "invalid sub");
tctx               70 lib/util/tests/str.c static bool test_string_sub_talloc_simple(struct torture_context *tctx)
tctx               74 lib/util/tests/str.c 	t = string_sub_talloc(tctx, "foobla", "foo", "bl");
tctx               76 lib/util/tests/str.c 	torture_assert_str_equal(tctx, t, "blbla", "invalid sub");
tctx               81 lib/util/tests/str.c static bool test_string_sub_talloc_multiple(struct torture_context *tctx)
tctx               85 lib/util/tests/str.c 	t = string_sub_talloc(tctx, "fooblafoo", "foo", "aapnootmies");
tctx               87 lib/util/tests/str.c 	torture_assert_str_equal(tctx, t, "aapnootmiesblaaapnootmies", 
tctx               35 lib/util/tests/strlist.c static bool test_lists_shell(struct torture_context *tctx,
tctx               41 lib/util/tests/strlist.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               62 lib/util/tests/strlist.c 	torture_assert(tctx, match, talloc_asprintf(tctx, 
tctx               67 lib/util/tests/strlist.c static bool test_list_copy(struct torture_context *tctx)
tctx               74 lib/util/tests/strlist.c 	result = (const char **)str_list_copy(tctx, list);
tctx               75 lib/util/tests/strlist.c 	torture_assert_int_equal(tctx, str_list_length(result), 2, "list length");
tctx               76 lib/util/tests/strlist.c 	torture_assert_str_equal(tctx, result[0], "foo", "element 0");
tctx               77 lib/util/tests/strlist.c 	torture_assert_str_equal(tctx, result[1], "bar", "element 1");
tctx               78 lib/util/tests/strlist.c 	torture_assert_str_equal(tctx, result[2], NULL, "element 2");
tctx               80 lib/util/tests/strlist.c 	result = (const char **)str_list_copy(tctx, empty_list);
tctx               81 lib/util/tests/strlist.c 	torture_assert_int_equal(tctx, str_list_length(result), 0, "list length");
tctx               82 lib/util/tests/strlist.c 	torture_assert_str_equal(tctx, result[0], NULL, "element 0");
tctx               84 lib/util/tests/strlist.c 	result = (const char **)str_list_copy(tctx, null_list);
tctx               85 lib/util/tests/strlist.c 	torture_assert(tctx, result == NULL, "result NULL");
tctx               25 lib/util/tests/time.c static bool test_null_time(struct torture_context *tctx)
tctx               27 lib/util/tests/time.c 	torture_assert(tctx, null_time(0), "0");
tctx               28 lib/util/tests/time.c 	torture_assert(tctx, null_time(0xFFFFFFFF), "0xFFFFFFFF");
tctx               29 lib/util/tests/time.c 	torture_assert(tctx, null_time(-1), "-1");
tctx               30 lib/util/tests/time.c 	torture_assert(tctx, !null_time(42), "42");
tctx               34 lib/util/tests/time.c static bool test_null_nttime(struct torture_context *tctx)
tctx               36 lib/util/tests/time.c 	torture_assert(tctx, null_nttime(-1), "-1");
tctx               37 lib/util/tests/time.c 	torture_assert(tctx, null_nttime(-1), "-1");
tctx               38 lib/util/tests/time.c 	torture_assert(tctx, !null_nttime(42), "42");
tctx               43 lib/util/tests/time.c static bool test_http_timestring(struct torture_context *tctx)
tctx               47 lib/util/tests/time.c 	result = http_timestring(tctx, 42);
tctx               48 lib/util/tests/time.c 	torture_assert(tctx, !strncmp(start, result, 
tctx               50 lib/util/tests/time.c 	torture_assert_str_equal(tctx, "never", 
tctx               51 lib/util/tests/time.c 				 http_timestring(tctx, get_time_t_max()), "42");
tctx               55 lib/util/tests/time.c static bool test_timestring(struct torture_context *tctx)
tctx               58 lib/util/tests/time.c 	char *result = timestring(tctx, 42);
tctx               59 lib/util/tests/time.c 	torture_assert(tctx, !strncmp(start, result, strlen(start)),
tctx               64 lib/util/tests/time.c static bool test_get_time_zone(struct torture_context *tctx)
tctx               75 lib/util/tests/time.c 	torture_assert_int_equal(tctx, old_offset+60*42, new_offset,
tctx               91 source3/libsmb/smbencrypt.c 	struct MD5Context tctx;
tctx               97 source3/libsmb/smbencrypt.c 	MD5Init(&tctx);
tctx               98 source3/libsmb/smbencrypt.c 	MD5Update(&tctx, array, 32);
tctx               99 source3/libsmb/smbencrypt.c 	MD5Final(hash_out, &tctx);
tctx              592 source3/libsmb/smbencrypt.c 	struct MD5Context tctx;
tctx              597 source3/libsmb/smbencrypt.c 	MD5Init(&tctx);
tctx              598 source3/libsmb/smbencrypt.c 	MD5Update(&tctx, &pw_buf[516], 16);
tctx              599 source3/libsmb/smbencrypt.c 	MD5Update(&tctx, psession_key->data, psession_key->length);
tctx              600 source3/libsmb/smbencrypt.c 	MD5Final(key_out, &tctx);
tctx               24 source4/auth/credentials/tests/simple.c static bool test_init(struct torture_context *tctx)
tctx               26 source4/auth/credentials/tests/simple.c 	struct cli_credentials *creds = cli_credentials_init(tctx);
tctx               30 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, "BLA", cli_credentials_get_domain(creds),
tctx               35 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, "someuser", 
tctx               41 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, "p4ssw0rd", 
tctx               48 source4/auth/credentials/tests/simple.c static bool test_init_anonymous(struct torture_context *tctx)
tctx               50 source4/auth/credentials/tests/simple.c 	struct cli_credentials *creds = cli_credentials_init_anon(tctx);
tctx               52 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, cli_credentials_get_domain(creds),
tctx               55 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, cli_credentials_get_username(creds),
tctx               58 source4/auth/credentials/tests/simple.c 	torture_assert(tctx, cli_credentials_get_password(creds) == NULL,
tctx               64 source4/auth/credentials/tests/simple.c static bool test_parse_string(struct torture_context *tctx)
tctx               66 source4/auth/credentials/tests/simple.c 	struct cli_credentials *creds = cli_credentials_init_anon(tctx);
tctx               71 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, cli_credentials_get_domain(creds),
tctx               74 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, cli_credentials_get_username(creds),
tctx               77 source4/auth/credentials/tests/simple.c 	torture_assert(tctx, cli_credentials_get_password(creds) == NULL,
tctx               84 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, cli_credentials_get_domain(creds),
tctx               87 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, cli_credentials_get_username(creds),
tctx               90 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, cli_credentials_get_password(creds),
tctx               97 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, cli_credentials_get_realm(creds),
tctx              100 source4/auth/credentials/tests/simple.c 	torture_assert_str_equal(tctx, 
tctx              101 source4/auth/credentials/tests/simple.c 				 cli_credentials_get_principal(creds, tctx),
tctx              112 source4/lib/messaging/tests/irpc.c static bool test_echodata(struct torture_context *tctx,
tctx              119 source4/lib/messaging/tests/irpc.c 	TALLOC_CTX *mem_ctx = tctx;
tctx              128 source4/lib/messaging/tests/irpc.c 	torture_assert_ntstatus_ok(tctx, status, "EchoData failed");
tctx              133 source4/lib/messaging/tests/irpc.c 		torture_fail(tctx, "EchoData wrong answer");
tctx              136 source4/lib/messaging/tests/irpc.c 	torture_comment(tctx, "Echo '%*.*s' -> '%*.*s'\n", 
tctx              163 source4/lib/messaging/tests/irpc.c static bool test_speed(struct torture_context *tctx,
tctx              172 source4/lib/messaging/tests/irpc.c 	TALLOC_CTX *mem_ctx = tctx;
tctx              173 source4/lib/messaging/tests/irpc.c 	int timelimit = torture_setting_int(tctx, "timelimit", 10);
tctx              179 source4/lib/messaging/tests/irpc.c 	torture_comment(tctx, "Sending echo for %d seconds\n", timelimit);
tctx              186 source4/lib/messaging/tests/irpc.c 		torture_assert(tctx, irpc != NULL, "AddOne send failed");
tctx              198 source4/lib/messaging/tests/irpc.c 	torture_comment(tctx, "waiting for %d remaining replies (done %d)\n", 
tctx              204 source4/lib/messaging/tests/irpc.c 	torture_assert_int_equal(tctx, ping_count, pong_count, "ping test failed");
tctx              206 source4/lib/messaging/tests/irpc.c 	torture_comment(tctx, "echo rate of %.0f messages/sec\n", 
tctx              212 source4/lib/messaging/tests/irpc.c static bool irpc_setup(struct torture_context *tctx, void **_data)
tctx              216 source4/lib/messaging/tests/irpc.c 	*_data = data = talloc(tctx, struct irpc_test_data);
tctx              218 source4/lib/messaging/tests/irpc.c 	lp_set_cmdline(tctx->lp_ctx, "pid directory", "piddir.tmp");
tctx              220 source4/lib/messaging/tests/irpc.c 	data->ev = tctx->ev;
tctx              221 source4/lib/messaging/tests/irpc.c 	torture_assert(tctx, data->msg_ctx1 = 
tctx              222 source4/lib/messaging/tests/irpc.c 		       messaging_init(tctx, 
tctx              223 source4/lib/messaging/tests/irpc.c 				      lp_messaging_path(tctx, tctx->lp_ctx), 
tctx              225 source4/lib/messaging/tests/irpc.c 				      lp_iconv_convenience(tctx->lp_ctx),
tctx              229 source4/lib/messaging/tests/irpc.c 	torture_assert(tctx, data->msg_ctx2 = 
tctx              230 source4/lib/messaging/tests/irpc.c 		       messaging_init(tctx, 
tctx              231 source4/lib/messaging/tests/irpc.c 				      lp_messaging_path(tctx, tctx->lp_ctx),
tctx              233 source4/lib/messaging/tests/irpc.c 				      lp_iconv_convenience(tctx->lp_ctx),
tctx               59 source4/lib/messaging/tests/messaging.c static bool test_ping_speed(struct torture_context *tctx)
tctx               67 source4/lib/messaging/tests/messaging.c 	int timelimit = torture_setting_int(tctx, "timelimit", 10);
tctx               70 source4/lib/messaging/tests/messaging.c 	lp_set_cmdline(tctx->lp_ctx, "pid directory", "piddir.tmp");
tctx               72 source4/lib/messaging/tests/messaging.c 	ev = tctx->ev;
tctx               74 source4/lib/messaging/tests/messaging.c 	msg_server_ctx = messaging_init(tctx, 
tctx               75 source4/lib/messaging/tests/messaging.c 					lp_messaging_path(tctx, tctx->lp_ctx), 
tctx               77 source4/lib/messaging/tests/messaging.c 				        lp_iconv_convenience(tctx->lp_ctx),
tctx               80 source4/lib/messaging/tests/messaging.c 	torture_assert(tctx, msg_server_ctx != NULL, "Failed to init ping messaging context");
tctx               83 source4/lib/messaging/tests/messaging.c 	messaging_register_tmp(msg_server_ctx, tctx, exit_message, &msg_exit);
tctx               85 source4/lib/messaging/tests/messaging.c 	msg_client_ctx = messaging_init(tctx, 
tctx               86 source4/lib/messaging/tests/messaging.c 					lp_messaging_path(tctx, tctx->lp_ctx), 
tctx               88 source4/lib/messaging/tests/messaging.c 				        lp_iconv_convenience(tctx->lp_ctx),
tctx               91 source4/lib/messaging/tests/messaging.c 	torture_assert(tctx, msg_client_ctx != NULL, 
tctx               98 source4/lib/messaging/tests/messaging.c 	torture_comment(tctx, "Sending pings for %d seconds\n", timelimit);
tctx              109 source4/lib/messaging/tests/messaging.c 		torture_assert_ntstatus_ok(tctx, status1, "msg1 failed");
tctx              112 source4/lib/messaging/tests/messaging.c 		torture_assert_ntstatus_ok(tctx, status2, "msg2 failed");
tctx              120 source4/lib/messaging/tests/messaging.c 	torture_comment(tctx, "waiting for %d remaining replies (done %d)\n", 
tctx              126 source4/lib/messaging/tests/messaging.c 	torture_comment(tctx, "sending exit\n");
tctx              129 source4/lib/messaging/tests/messaging.c 	torture_assert_int_equal(tctx, ping_count, pong_count, "ping test failed");
tctx              131 source4/lib/messaging/tests/messaging.c 	torture_comment(tctx, "ping rate of %.0f messages/sec\n", 
tctx               38 source4/lib/registry/tests/diff.c static bool test_generate_diff(struct torture_context *tctx, void *tcase_data)
tctx               46 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "reg_generate_diff");
tctx               52 source4/lib/registry/tests/diff.c static bool test_diff_load(struct torture_context *tctx, void *tcase_data)
tctx               60 source4/lib/registry/tests/diff.c 	ic = lp_iconv_convenience(tctx->lp_ctx);
tctx               63 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "reg_diff_load");
tctx               68 source4/lib/registry/tests/diff.c static bool test_diff_apply(struct torture_context *tctx, void *tcase_data)
tctx               74 source4/lib/registry/tests/diff.c 	error = reg_diff_apply(td->r1_ctx, lp_iconv_convenience(tctx->lp_ctx), td->filename);
tctx               75 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "reg_diff_apply");
tctx               78 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening HKEY_LOCAL_MACHINE failed");
tctx               83 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening HKLM\\Software failed");
tctx               85 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening HKLM\\Software\\Microsoft failed");
tctx               87 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\Microsoft\\Windows failed");
tctx               89 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\Windows\\CurrentVersion failed");
tctx               91 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\CurrentVersion\\Policies failed");
tctx               93 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\Policies\\Explorer failed");
tctx              107 source4/lib/registry/tests/diff.c static bool test_generate_diff_key_add(struct torture_context *tctx, void *tcase_data)
tctx              118 source4/lib/registry/tests/diff.c 	if (W_ERROR_IS_OK(reg_generate_diff_key(&rk, NULL, "bla", &cb, tctx)))
tctx              121 source4/lib/registry/tests/diff.c 	torture_assert_str_equal(tctx, added_key, "bla", "key added");
tctx              126 source4/lib/registry/tests/diff.c static bool test_generate_diff_key_null(struct torture_context *tctx, void *tcase_data)
tctx              153 source4/lib/registry/tests/diff.c static bool diff_setup_tcase(struct torture_context *tctx, void **data)
tctx              165 source4/lib/registry/tests/diff.c 	td = talloc(tctx, struct diff_tcase_data);
tctx              168 source4/lib/registry/tests/diff.c 	error = reg_open_local(tctx, &r1_ctx);
tctx              169 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening registry 1 for patch tests failed");
tctx              171 source4/lib/registry/tests/diff.c 	error = reg_open_local(tctx, &r2_ctx);
tctx              172 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening registry 2 for patch tests failed");
tctx              175 source4/lib/registry/tests/diff.c 	status = torture_temp_dir(tctx, "patchfile", &td->tempdir);
tctx              176 source4/lib/registry/tests/diff.c 	torture_assert_ntstatus_ok(tctx, status, "Creating temp dir failed");
tctx              179 source4/lib/registry/tests/diff.c 	filename = talloc_asprintf(tctx, "%s/r1_local_machine.ldb", td->tempdir);
tctx              180 source4/lib/registry/tests/diff.c 	error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r1_hklm);
tctx              181 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening local machine file failed");
tctx              184 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Mounting hive failed");
tctx              186 source4/lib/registry/tests/diff.c 	filename = talloc_asprintf(tctx, "%s/r1_current_user.ldb", td->tempdir);
tctx              187 source4/lib/registry/tests/diff.c 	error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r1_hkcu);
tctx              188 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening current user file failed");
tctx              191 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Mounting hive failed");
tctx              194 source4/lib/registry/tests/diff.c 	filename = talloc_asprintf(tctx, "%s/r2_local_machine.ldb", td->tempdir);
tctx              195 source4/lib/registry/tests/diff.c 	error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r2_hklm);
tctx              196 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening local machine file failed");
tctx              199 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Mounting hive failed");
tctx              201 source4/lib/registry/tests/diff.c 	filename = talloc_asprintf(tctx, "%s/r2_current_user.ldb", td->tempdir);
tctx              202 source4/lib/registry/tests/diff.c 	error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r2_hkcu);
tctx              203 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening current user file failed");
tctx              206 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Mounting hive failed");
tctx              209 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening HKEY_CURRENT_USER failed");
tctx              211 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening HKCU\\Network failed");
tctx              213 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening HKCU\\Network\\L failed");
tctx              216 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Opening HKEY_LOCAL_MACHINE failed");
tctx              218 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Creating HKLM\\Sofware failed");
tctx              220 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Creating HKLM\\Software\\Microsoft failed");
tctx              222 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Creating HKLM\\Software\\Microsoft\\Windows failed");
tctx              224 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Creating HKLM\\..\\Windows\\CurrentVersion failed");
tctx              226 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Creating HKLM\\..\\CurrentVersion\\Policies failed");
tctx              228 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "Creating HKLM\\..\\Policies\\Explorer failed");
tctx              246 source4/lib/registry/tests/diff.c static bool diff_setup_preg_tcase (struct torture_context *tctx, void **data)
tctx              252 source4/lib/registry/tests/diff.c 	diff_setup_tcase(tctx, data);
tctx              255 source4/lib/registry/tests/diff.c 	ic = lp_iconv_convenience(tctx->lp_ctx);
tctx              257 source4/lib/registry/tests/diff.c 	td->filename = talloc_asprintf(tctx, "%s/test.pol", td->tempdir);
tctx              258 source4/lib/registry/tests/diff.c 	error = reg_preg_diff_save(tctx, td->filename, ic, &td->callbacks, &td->callback_data);
tctx              259 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "reg_preg_diff_save");
tctx              264 source4/lib/registry/tests/diff.c static bool diff_setup_dotreg_tcase (struct torture_context *tctx, void **data)
tctx              270 source4/lib/registry/tests/diff.c 	diff_setup_tcase(tctx, data);
tctx              273 source4/lib/registry/tests/diff.c 	ic = lp_iconv_convenience(tctx->lp_ctx);
tctx              275 source4/lib/registry/tests/diff.c 	td->filename = talloc_asprintf(tctx, "%s/test.reg", td->tempdir);
tctx              276 source4/lib/registry/tests/diff.c 	error = reg_dotreg_diff_save(tctx, td->filename, ic, &td->callbacks, &td->callback_data);
tctx              277 source4/lib/registry/tests/diff.c 	torture_assert_werr_ok(tctx, error, "reg_dotreg_diff_save");
tctx               31 source4/lib/registry/tests/hive.c static bool test_del_nonexistant_key(struct torture_context *tctx,
tctx               36 source4/lib/registry/tests/hive.c 	torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx               42 source4/lib/registry/tests/hive.c static bool test_keyinfo_root(struct torture_context *tctx,
tctx               51 source4/lib/registry/tests/hive.c 	error = hive_key_get_info(tctx, root, NULL, &num_subkeys, &num_values,
tctx               53 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "reg_key_num_subkeys()");
tctx               55 source4/lib/registry/tests/hive.c 	torture_assert_int_equal(tctx, num_subkeys, 0,
tctx               58 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "reg_key_num_values");
tctx               60 source4/lib/registry/tests/hive.c 	torture_assert_int_equal(tctx, num_values, 0,
tctx               66 source4/lib/registry/tests/hive.c static bool test_keyinfo_nums(struct torture_context *tctx, void *test_data)
tctx               75 source4/lib/registry/tests/hive.c 	error = hive_key_add_name(tctx, root, "Nested Keyll", NULL,
tctx               77 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx               80 source4/lib/registry/tests/hive.c 			       data_blob_talloc(tctx, data, sizeof(data)));
tctx               81 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx               85 source4/lib/registry/tests/hive.c 	error = hive_key_get_info(tctx, root, NULL, &num_subkeys, &num_values,
tctx               87 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "reg_key_num_subkeys()");
tctx               89 source4/lib/registry/tests/hive.c 	torture_assert_int_equal(tctx, num_subkeys, 1, "subkey count");
tctx               91 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "reg_key_num_values");
tctx               93 source4/lib/registry/tests/hive.c 	torture_assert_int_equal(tctx, num_values, 1, "value count");
tctx               98 source4/lib/registry/tests/hive.c static bool test_add_subkey(struct torture_context *tctx,
tctx              104 source4/lib/registry/tests/hive.c 	TALLOC_CTX *mem_ctx = tctx;
tctx              108 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx              111 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "reg_key_del");
tctx              116 source4/lib/registry/tests/hive.c static bool test_del_recursive(struct torture_context *tctx,
tctx              123 source4/lib/registry/tests/hive.c 	TALLOC_CTX *mem_ctx = tctx;
tctx              130 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx              135 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx              140 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx              144 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_del");
tctx              149 source4/lib/registry/tests/hive.c static bool test_flush_key(struct torture_context *tctx, void *test_data)
tctx              153 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, hive_key_flush(root), "flush key");
tctx              158 source4/lib/registry/tests/hive.c static bool test_del_key(struct torture_context *tctx, const void *test_data)
tctx              163 source4/lib/registry/tests/hive.c 	TALLOC_CTX *mem_ctx = tctx;
tctx              167 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx              170 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "reg_key_del");
tctx              173 source4/lib/registry/tests/hive.c 	torture_assert_werr_equal(tctx, error, WERR_BADFILE, "reg_key_del");
tctx              178 source4/lib/registry/tests/hive.c static bool test_set_value(struct torture_context *tctx,
tctx              184 source4/lib/registry/tests/hive.c 	TALLOC_CTX *mem_ctx = tctx;
tctx              190 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx              194 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx              199 source4/lib/registry/tests/hive.c static bool test_get_value(struct torture_context *tctx, const void *test_data)
tctx              204 source4/lib/registry/tests/hive.c 	TALLOC_CTX *mem_ctx = tctx;
tctx              213 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx              216 source4/lib/registry/tests/hive.c 	torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx              221 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx              224 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "getting value");
tctx              226 source4/lib/registry/tests/hive.c 	torture_assert_int_equal(tctx, value.length, 4, "value length");
tctx              227 source4/lib/registry/tests/hive.c 	torture_assert_int_equal(tctx, type, REG_DWORD, "value type");
tctx              229 source4/lib/registry/tests/hive.c 	torture_assert_mem_equal(tctx, &data, value.data, sizeof(uint32_t),
tctx              235 source4/lib/registry/tests/hive.c static bool test_del_value(struct torture_context *tctx, const void *test_data)
tctx              240 source4/lib/registry/tests/hive.c 	TALLOC_CTX *mem_ctx = tctx;
tctx              249 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx              253 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx              256 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "deleting value");
tctx              259 source4/lib/registry/tests/hive.c 	torture_assert_werr_equal(tctx, error, WERR_BADFILE, "getting value");
tctx              262 source4/lib/registry/tests/hive.c 	torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx              268 source4/lib/registry/tests/hive.c static bool test_list_values(struct torture_context *tctx,
tctx              274 source4/lib/registry/tests/hive.c 	TALLOC_CTX *mem_ctx = tctx;
tctx              284 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx              288 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx              292 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "getting value");
tctx              294 source4/lib/registry/tests/hive.c 	torture_assert_str_equal(tctx, name, "Answer", "value name");
tctx              296 source4/lib/registry/tests/hive.c 	torture_assert_int_equal(tctx, value.length, 4, "value length");
tctx              297 source4/lib/registry/tests/hive.c 	torture_assert_int_equal(tctx, type, REG_DWORD, "value type");
tctx              300 source4/lib/registry/tests/hive.c 	torture_assert_int_equal(tctx, data_val, IVAL(value.data, 0), "value data");
tctx              304 source4/lib/registry/tests/hive.c 	torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS,
tctx              310 source4/lib/registry/tests/hive.c static bool test_hive_security(struct torture_context *tctx, const void *_data)
tctx              317 source4/lib/registry/tests/hive.c 	osd = security_descriptor_dacl_create(tctx,
tctx              327 source4/lib/registry/tests/hive.c 	error = hive_key_add_name(tctx, root, "SecurityKey", NULL,
tctx              329 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx              331 source4/lib/registry/tests/hive.c 	error = hive_get_sec_desc(tctx, subkey, &nsd);
tctx              332 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok (tctx, error, "getting security descriptor");
tctx              334 source4/lib/registry/tests/hive.c 	torture_assert(tctx, security_descriptor_equal(osd, nsd),
tctx              339 source4/lib/registry/tests/hive.c 	osd = security_descriptor_dacl_create(tctx,
tctx              349 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok(tctx, error, "setting security descriptor");
tctx              351 source4/lib/registry/tests/hive.c 	error = hive_get_sec_desc(tctx, subkey, &nsd);
tctx              352 source4/lib/registry/tests/hive.c 	torture_assert_werr_ok (tctx, error, "getting security descriptor");
tctx              354 source4/lib/registry/tests/hive.c 	torture_assert(tctx, security_descriptor_equal(osd, nsd),
tctx              391 source4/lib/registry/tests/hive.c static bool hive_setup_dir(struct torture_context *tctx, void **data)
tctx              398 source4/lib/registry/tests/hive.c 	status = torture_temp_dir(tctx, "hive-dir", &dirname);
tctx              404 source4/lib/registry/tests/hive.c 	error = reg_create_directory(tctx, dirname, &key);
tctx              415 source4/lib/registry/tests/hive.c static bool hive_setup_ldb(struct torture_context *tctx, void **data)
tctx              422 source4/lib/registry/tests/hive.c 	status = torture_temp_dir(tctx, "hive-ldb", &dirname);
tctx              428 source4/lib/registry/tests/hive.c 	error = reg_open_ldb_file(tctx, dirname, NULL, NULL, tctx->ev, tctx->lp_ctx, &key);
tctx              439 source4/lib/registry/tests/hive.c static bool hive_setup_regf(struct torture_context *tctx, void **data)
tctx              446 source4/lib/registry/tests/hive.c 	status = torture_temp_dir(tctx, "hive-regf", &dirname);
tctx              452 source4/lib/registry/tests/hive.c 	error = reg_create_regf_file(tctx, lp_iconv_convenience(tctx->lp_ctx),
tctx              464 source4/lib/registry/tests/hive.c static bool test_dir_refuses_null_location(struct torture_context *tctx)
tctx              466 source4/lib/registry/tests/hive.c 	torture_assert_werr_equal(tctx, WERR_INVALID_PARAM,
tctx               33 source4/lib/registry/tests/registry.c static bool test_get_predefined(struct torture_context *tctx, void *_data)
tctx               40 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error,
tctx               48 source4/lib/registry/tests/registry.c static bool test_get_predefined_unknown(struct torture_context *tctx,
tctx               56 source4/lib/registry/tests/registry.c 	torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx               61 source4/lib/registry/tests/registry.c static bool test_predef_key_by_name(struct torture_context *tctx, void *_data)
tctx               69 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error,
tctx               74 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error,
tctx               80 source4/lib/registry/tests/registry.c static bool test_predef_key_by_name_invalid(struct torture_context *tctx,
tctx               88 source4/lib/registry/tests/registry.c 	torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx               96 source4/lib/registry/tests/registry.c static bool test_create_subkey(struct torture_context *tctx, void *_data)
tctx              103 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error,
tctx              108 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx              109 source4/lib/registry/tests/registry.c 	torture_assert(tctx, newkey != NULL, "Creating new key");
tctx              117 source4/lib/registry/tests/registry.c static bool test_create_nested_subkey(struct torture_context *tctx, void *_data)
tctx              124 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error,
tctx              129 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx              130 source4/lib/registry/tests/registry.c 	torture_assert(tctx, newkey1 != NULL, "Creating new key");
tctx              134 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx              135 source4/lib/registry/tests/registry.c 	torture_assert(tctx, newkey2 != NULL, "Creating new key");
tctx              143 source4/lib/registry/tests/registry.c static bool test_key_add_abs_top(struct torture_context *tctx, void *_data)
tctx              149 source4/lib/registry/tests/registry.c 	error = reg_key_add_abs(tctx, rctx, "HKEY_CLASSES_ROOT", 0, NULL,
tctx              151 source4/lib/registry/tests/registry.c 	torture_assert_werr_equal(tctx, error, WERR_ALREADY_EXISTS,
tctx              160 source4/lib/registry/tests/registry.c static bool test_key_add_abs(struct torture_context *tctx, void *_data)
tctx              166 source4/lib/registry/tests/registry.c 	error = reg_key_add_abs(tctx, rctx,  "HKEY_CLASSES_ROOT\\bloe", 0, NULL,
tctx              168 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "create lowest");
tctx              170 source4/lib/registry/tests/registry.c 	error = reg_key_add_abs(tctx, rctx,  "HKEY_CLASSES_ROOT\\bloe\\bla", 0,
tctx              172 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "create nested");
tctx              175 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error,
tctx              178 source4/lib/registry/tests/registry.c 	error = reg_open_key(tctx, root, "bloe", &result2);
tctx              179 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "opening key");
tctx              181 source4/lib/registry/tests/registry.c 	error = reg_open_key(tctx, root, "bloe\\bla", &result2);
tctx              182 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "opening key");
tctx              188 source4/lib/registry/tests/registry.c static bool test_del_key(struct torture_context *tctx, void *_data)
tctx              195 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error,
tctx              200 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx              201 source4/lib/registry/tests/registry.c 	torture_assert(tctx, newkey != NULL, "Creating new key");
tctx              204 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "Delete key");
tctx              207 source4/lib/registry/tests/registry.c 	torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx              217 source4/lib/registry/tests/registry.c static bool create_test_key(struct torture_context *tctx,
tctx              226 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error,
tctx              230 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx              236 source4/lib/registry/tests/registry.c static bool test_flush_key(struct torture_context *tctx, void *_data)
tctx              242 source4/lib/registry/tests/registry.c 	if (!create_test_key(tctx, rctx, "Bremen", &root, &subkey))
tctx              246 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "flush key");
tctx              248 source4/lib/registry/tests/registry.c 	torture_assert_werr_equal(tctx, reg_key_flush(NULL),
tctx              254 source4/lib/registry/tests/registry.c static bool test_query_key(struct torture_context *tctx, void *_data)
tctx              263 source4/lib/registry/tests/registry.c 	if (!create_test_key(tctx, rctx, "Munchen", &root, &subkey))
tctx              266 source4/lib/registry/tests/registry.c 	error = reg_key_get_info(tctx, subkey, &classname,
tctx              270 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "get info key");
tctx              271 source4/lib/registry/tests/registry.c 	torture_assert(tctx, classname == NULL, "classname");
tctx              272 source4/lib/registry/tests/registry.c 	torture_assert_int_equal(tctx, num_subkeys, 0, "num subkeys");
tctx              273 source4/lib/registry/tests/registry.c 	torture_assert_int_equal(tctx, num_values, 0, "num values");
tctx              278 source4/lib/registry/tests/registry.c static bool test_query_key_nums(struct torture_context *tctx, void *_data)
tctx              287 source4/lib/registry/tests/registry.c 	if (!create_test_key(tctx, rctx, "Berlin", &root, &subkey1))
tctx              292 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx              295 source4/lib/registry/tests/registry.c 			    data_blob_talloc(tctx, &data, sizeof(data)));
tctx              296 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "set value");
tctx              298 source4/lib/registry/tests/registry.c 	error = reg_key_get_info(tctx, subkey1, NULL, &num_subkeys,
tctx              301 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "get info key");
tctx              302 source4/lib/registry/tests/registry.c 	torture_assert_int_equal(tctx, num_subkeys, 1, "num subkeys");
tctx              303 source4/lib/registry/tests/registry.c 	torture_assert_int_equal(tctx, num_values, 1, "num values");
tctx              313 source4/lib/registry/tests/registry.c static bool test_list_subkeys(struct torture_context *tctx, void *_data)
tctx              321 source4/lib/registry/tests/registry.c 	if (!create_test_key(tctx, rctx, "Goettingen", &root, &subkey))
tctx              324 source4/lib/registry/tests/registry.c 	error = reg_key_get_subkey_by_index(tctx, root, 0, &name, &classname,
tctx              327 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "Enum keys return code");
tctx              328 source4/lib/registry/tests/registry.c 	torture_assert_str_equal(tctx, name, "Goettingen", "Enum keys data");
tctx              331 source4/lib/registry/tests/registry.c 	error = reg_key_get_subkey_by_index(tctx, root, 0, NULL, NULL, NULL);
tctx              333 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error,
tctx              336 source4/lib/registry/tests/registry.c 	error = reg_key_get_subkey_by_index(tctx, root, 1, NULL, NULL, NULL);
tctx              338 source4/lib/registry/tests/registry.c 	torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS,
tctx              341 source4/lib/registry/tests/registry.c 	error = reg_key_get_subkey_by_index(tctx, subkey, 0, NULL, NULL, NULL);
tctx              343 source4/lib/registry/tests/registry.c 	torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS,
tctx              352 source4/lib/registry/tests/registry.c static bool test_set_value(struct torture_context *tctx, void *_data)
tctx              361 source4/lib/registry/tests/registry.c 	if (!create_test_key(tctx, rctx, "Dusseldorf", &root, &subkey))
tctx              365 source4/lib/registry/tests/registry.c 			    data_blob_talloc(tctx, data, sizeof(data)));
tctx              366 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok (tctx, error, "setting value");
tctx              374 source4/lib/registry/tests/registry.c static bool test_security(struct torture_context *tctx, void *_data)
tctx              381 source4/lib/registry/tests/registry.c 	if (!create_test_key(tctx, rctx, "Düsseldorf", &root, &subkey))
tctx              384 source4/lib/registry/tests/registry.c 	osd = security_descriptor_dacl_create(tctx,
tctx              394 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "setting security descriptor");
tctx              396 source4/lib/registry/tests/registry.c 	error = reg_get_sec_desc(tctx, subkey, &nsd);
tctx              397 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok (tctx, error, "getting security descriptor");
tctx              399 source4/lib/registry/tests/registry.c 	torture_assert(tctx, security_descriptor_equal(osd, nsd),
tctx              408 source4/lib/registry/tests/registry.c static bool test_get_value(struct torture_context *tctx, void *_data)
tctx              418 source4/lib/registry/tests/registry.c 	if (!create_test_key(tctx, rctx, "Duisburg", &root, &subkey))
tctx              421 source4/lib/registry/tests/registry.c 	error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__, &type,
tctx              423 source4/lib/registry/tests/registry.c 	torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx              427 source4/lib/registry/tests/registry.c 			    data_blob_talloc(tctx, value, sizeof(value)));
tctx              428 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "setting value");
tctx              430 source4/lib/registry/tests/registry.c 	error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__, &type,
tctx              432 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "getting value");
tctx              434 source4/lib/registry/tests/registry.c 	torture_assert_int_equal(tctx, sizeof(value), data.length, "value length ok");
tctx              435 source4/lib/registry/tests/registry.c 	torture_assert_mem_equal(tctx, data.data, value, sizeof(value),
tctx              437 source4/lib/registry/tests/registry.c 	torture_assert_int_equal(tctx, REG_DWORD, type, "value type");
tctx              445 source4/lib/registry/tests/registry.c static bool test_del_value(struct torture_context *tctx, void *_data)
tctx              455 source4/lib/registry/tests/registry.c 	if (!create_test_key(tctx, rctx, "Warschau", &root, &subkey))
tctx              458 source4/lib/registry/tests/registry.c 	error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__, &type,
tctx              460 source4/lib/registry/tests/registry.c 	torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx              464 source4/lib/registry/tests/registry.c 			    data_blob_talloc(tctx, value, sizeof(value)));
tctx              465 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok (tctx, error, "setting value");
tctx              468 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok (tctx, error, "unsetting value");
tctx              470 source4/lib/registry/tests/registry.c 	error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__,
tctx              472 source4/lib/registry/tests/registry.c 	torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx              481 source4/lib/registry/tests/registry.c static bool test_list_values(struct torture_context *tctx, void *_data)
tctx              492 source4/lib/registry/tests/registry.c 	if (!create_test_key(tctx, rctx, "Bonn", &root, &subkey))
tctx              496 source4/lib/registry/tests/registry.c 			    data_blob_talloc(tctx, value, sizeof(value)));
tctx              497 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok (tctx, error, "setting value");
tctx              499 source4/lib/registry/tests/registry.c 	error = reg_key_get_value_by_index(tctx, subkey, 0, &name,
tctx              501 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "getting value");
tctx              503 source4/lib/registry/tests/registry.c 	torture_assert_str_equal(tctx, name, "bar", "value name");
tctx              504 source4/lib/registry/tests/registry.c 	torture_assert_int_equal(tctx, sizeof(value), data.length, "value length");
tctx              505 source4/lib/registry/tests/registry.c 	torture_assert_mem_equal(tctx, data.data, value, sizeof(value),
tctx              507 source4/lib/registry/tests/registry.c 	torture_assert_int_equal(tctx, REG_DWORD, type, "value type");
tctx              509 source4/lib/registry/tests/registry.c 	error = reg_key_get_value_by_index(tctx, subkey, 1, &name,
tctx              511 source4/lib/registry/tests/registry.c 	torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS,
tctx              517 source4/lib/registry/tests/registry.c static bool setup_local_registry(struct torture_context *tctx, void **data)
tctx              526 source4/lib/registry/tests/registry.c 	error = reg_open_local(tctx, &rctx);
tctx              527 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "Opening local registry failed");
tctx              529 source4/lib/registry/tests/registry.c 	status = torture_temp_dir(tctx, "registry-local", &tempdir);
tctx              530 source4/lib/registry/tests/registry.c 	torture_assert_ntstatus_ok(tctx, status, "Creating temp dir failed");
tctx              532 source4/lib/registry/tests/registry.c 	filename = talloc_asprintf(tctx, "%s/classes_root.ldb", tempdir);
tctx              533 source4/lib/registry/tests/registry.c 	error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &hive_key);
tctx              534 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "Opening classes_root file failed");
tctx              537 source4/lib/registry/tests/registry.c 	torture_assert_werr_ok(tctx, error, "Mounting hive failed");
tctx               34 source4/lib/socket/testsuite.c static bool test_udp(struct torture_context *tctx)
tctx               42 source4/lib/socket/testsuite.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               45 source4/lib/socket/testsuite.c 	load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx               48 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "creating DGRAM IP socket 1");
tctx               52 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "creating DGRAM IP socket 1");
tctx               58 source4/lib/socket/testsuite.c 	torture_assert(tctx, localhost, "Localhost not found");
tctx               61 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "listen on socket 1");
tctx               64 source4/lib/socket/testsuite.c 	torture_assert(tctx, srv_addr != NULL && 
tctx               66 source4/lib/socket/testsuite.c 				   talloc_asprintf(tctx, 
tctx               70 source4/lib/socket/testsuite.c 	torture_comment(tctx, "server port is %d\n", srv_addr->port);
tctx               78 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "sendto() on socket 2");
tctx               82 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "recvfrom() on socket 1");
tctx               84 source4/lib/socket/testsuite.c 	torture_assert_str_equal(tctx, from_addr->addr, srv_addr->addr, 
tctx               87 source4/lib/socket/testsuite.c 	torture_assert_int_equal(tctx, nread, size, "Unexpected recvfrom size");
tctx               89 source4/lib/socket/testsuite.c 	torture_assert_mem_equal(tctx, blob2.data, blob.data, size,
tctx               94 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "sendto() on socket 1");
tctx               98 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "recvfrom() on socket 2");
tctx               99 source4/lib/socket/testsuite.c 	torture_assert_str_equal(tctx, from_addr->addr, srv_addr->addr, 
tctx              102 source4/lib/socket/testsuite.c 	torture_assert_int_equal(tctx, nread, size, "Unexpected recvfrom size");
tctx              104 source4/lib/socket/testsuite.c 	torture_assert_int_equal(tctx, from_addr->port, srv_addr->port, 
tctx              107 source4/lib/socket/testsuite.c 	torture_assert_mem_equal(tctx, blob2.data, blob.data, size,
tctx              118 source4/lib/socket/testsuite.c static bool test_tcp(struct torture_context *tctx)
tctx              126 source4/lib/socket/testsuite.c 	TALLOC_CTX *mem_ctx = tctx;
tctx              127 source4/lib/socket/testsuite.c 	struct tevent_context *ev = tctx->ev;
tctx              131 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "creating IP stream socket 1");
tctx              135 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "creating IP stream socket 1");
tctx              138 source4/lib/socket/testsuite.c 	load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx              141 source4/lib/socket/testsuite.c 	torture_assert(tctx, localhost, "Localhost not found");
tctx              144 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "listen on socket 1");
tctx              147 source4/lib/socket/testsuite.c 	torture_assert(tctx, srv_addr && srv_addr->addr, 
tctx              150 source4/lib/socket/testsuite.c 	torture_assert_str_equal(tctx, srv_addr->addr, iface_best_ip(ifaces, "127.0.0.1"), 
tctx              153 source4/lib/socket/testsuite.c 	torture_comment(tctx, "server port is %d\n", srv_addr->port);
tctx              156 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "connect() on socket 2");
tctx              159 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "accept() on socket 1");
tctx              169 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "send() on socket 2");
tctx              172 source4/lib/socket/testsuite.c 	torture_assert_ntstatus_ok(tctx, status, "recv() on socket 3");
tctx              176 source4/lib/socket/testsuite.c 	torture_assert(tctx, from_addr && from_addr->addr, 
tctx              179 source4/lib/socket/testsuite.c 	torture_assert_str_equal(tctx, from_addr->addr, srv_addr->addr, 
tctx              182 source4/lib/socket/testsuite.c 	torture_assert_int_equal(tctx, nread, size, "Unexpected recvfrom size");
tctx              184 source4/lib/socket/testsuite.c 	torture_assert_mem_equal(tctx, blob2.data, blob.data, size, 
tctx               26 source4/lib/tdr/testsuite.c static bool test_push_uint8(struct torture_context *tctx)
tctx               29 source4/lib/tdr/testsuite.c 	struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx               31 source4/lib/tdr/testsuite.c 	torture_assert_ntstatus_ok(tctx, tdr_push_uint8(tdr, &v), "push failed");
tctx               32 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, tdr->data.length, 1, "length incorrect");
tctx               33 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, tdr->data.data[0], 4, "data incorrect");
tctx               37 source4/lib/tdr/testsuite.c static bool test_pull_uint8(struct torture_context *tctx)
tctx               41 source4/lib/tdr/testsuite.c 	struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx               46 source4/lib/tdr/testsuite.c 	torture_assert_ntstatus_ok(tctx, tdr_pull_uint8(tdr, tctx, &l), 
tctx               48 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, 1, tdr->offset, 
tctx               53 source4/lib/tdr/testsuite.c static bool test_push_uint16(struct torture_context *tctx)
tctx               56 source4/lib/tdr/testsuite.c 	struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx               58 source4/lib/tdr/testsuite.c 	torture_assert_ntstatus_ok(tctx, tdr_push_uint16(tdr, &v), "push failed");
tctx               59 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, tdr->data.length, 2, "length incorrect");
tctx               60 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, tdr->data.data[0], 0x32, "data incorrect");
tctx               61 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, tdr->data.data[1], 0x0F, "data incorrect");
tctx               65 source4/lib/tdr/testsuite.c static bool test_pull_uint16(struct torture_context *tctx)
tctx               69 source4/lib/tdr/testsuite.c 	struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx               74 source4/lib/tdr/testsuite.c 	torture_assert_ntstatus_ok(tctx, tdr_pull_uint16(tdr, tctx, &l), 
tctx               76 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, 2, tdr->offset, "offset invalid");
tctx               77 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, 782, l, "right int read");
tctx               81 source4/lib/tdr/testsuite.c static bool test_push_uint32(struct torture_context *tctx)
tctx               84 source4/lib/tdr/testsuite.c 	struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx               86 source4/lib/tdr/testsuite.c 	torture_assert_ntstatus_ok(tctx, tdr_push_uint32(tdr, &v), "push failed");
tctx               87 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, tdr->data.length, 4, "length incorrect");
tctx               88 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, tdr->data.data[0], 0x32, "data incorrect");
tctx               89 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, tdr->data.data[1], 0x0F, "data incorrect");
tctx               90 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, tdr->data.data[2], 0x10, "data incorrect");
tctx               91 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, tdr->data.data[3], 0x00, "data incorrect");
tctx               95 source4/lib/tdr/testsuite.c static bool test_pull_uint32(struct torture_context *tctx)
tctx               99 source4/lib/tdr/testsuite.c 	struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx              104 source4/lib/tdr/testsuite.c 	torture_assert_ntstatus_ok(tctx, tdr_pull_uint32(tdr, tctx, &l), 
tctx              106 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, 4, tdr->offset, "offset invalid");
tctx              107 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, 782, l, "right int read");
tctx              111 source4/lib/tdr/testsuite.c static bool test_pull_charset(struct torture_context *tctx)
tctx              113 source4/lib/tdr/testsuite.c 	struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx              115 source4/lib/tdr/testsuite.c 	tdr->data.data = (uint8_t *)talloc_strdup(tctx, "bla");
tctx              119 source4/lib/tdr/testsuite.c 	torture_assert_ntstatus_ok(tctx, tdr_pull_charset(tdr, tctx, &l, -1, 1, CH_DOS), 
tctx              121 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, 4, tdr->offset, "offset invalid");
tctx              122 source4/lib/tdr/testsuite.c 	torture_assert_str_equal(tctx, "bla", l, "right int read");
tctx              125 source4/lib/tdr/testsuite.c 	torture_assert_ntstatus_ok(tctx, tdr_pull_charset(tdr, tctx, &l, 2, 1, CH_UNIX), 
tctx              127 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, 2, tdr->offset, "offset invalid");
tctx              128 source4/lib/tdr/testsuite.c 	torture_assert_str_equal(tctx, "bl", l, "right int read");
tctx              133 source4/lib/tdr/testsuite.c static bool test_pull_charset_empty(struct torture_context *tctx)
tctx              135 source4/lib/tdr/testsuite.c 	struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx              137 source4/lib/tdr/testsuite.c 	tdr->data.data = (uint8_t *)talloc_strdup(tctx, "bla");
tctx              141 source4/lib/tdr/testsuite.c 	torture_assert_ntstatus_ok(tctx, tdr_pull_charset(tdr, tctx, &l, 0, 1, CH_DOS), 
tctx              143 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, 0, tdr->offset, "offset invalid");
tctx              144 source4/lib/tdr/testsuite.c 	torture_assert_str_equal(tctx, "", l, "right string read");
tctx              151 source4/lib/tdr/testsuite.c static bool test_push_charset(struct torture_context *tctx)
tctx              154 source4/lib/tdr/testsuite.c 	struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx              155 source4/lib/tdr/testsuite.c 	torture_assert_ntstatus_ok(tctx, tdr_push_charset(tdr, &l, 4, 1, CH_UTF8), 
tctx              157 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, 4, tdr->data.length, "offset invalid");
tctx              158 source4/lib/tdr/testsuite.c 	torture_assert(tctx, strcmp("bloe", (const char *)tdr->data.data) == 0, "right string push");
tctx              160 source4/lib/tdr/testsuite.c 	torture_assert_ntstatus_ok(tctx, tdr_push_charset(tdr, &l, -1, 1, CH_UTF8), 
tctx              162 source4/lib/tdr/testsuite.c 	torture_assert_int_equal(tctx, 9, tdr->data.length, "offset invalid");
tctx              163 source4/lib/tdr/testsuite.c 	torture_assert_str_equal(tctx, "bloe", (const char *)tdr->data.data+4, "right string read");
tctx               28 source4/libcli/resolve/testsuite.c static bool test_async_resolve(struct torture_context *tctx)
tctx               32 source4/libcli/resolve/testsuite.c 	int timelimit = torture_setting_int(tctx, "timelimit", 2);
tctx               33 source4/libcli/resolve/testsuite.c 	const char *host = torture_setting_string(tctx, "host", NULL);
tctx               36 source4/libcli/resolve/testsuite.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               38 source4/libcli/resolve/testsuite.c 	ev = tctx->ev;
tctx               43 source4/libcli/resolve/testsuite.c 	torture_comment(tctx, "Testing async resolve of '%s' for %d seconds\n",
tctx               48 source4/libcli/resolve/testsuite.c 		torture_assert(tctx, c != NULL, "resolve_name_host_send");
tctx               49 source4/libcli/resolve/testsuite.c 		torture_assert_ntstatus_ok(tctx, resolve_name_host_recv(c, mem_ctx, &s, NULL),
tctx               54 source4/libcli/resolve/testsuite.c 	torture_comment(tctx, "async rate of %.1f resolves/sec\n", 
tctx               62 source4/libcli/resolve/testsuite.c static bool test_sync_resolve(struct torture_context *tctx)
tctx               64 source4/libcli/resolve/testsuite.c 	int timelimit = torture_setting_int(tctx, "timelimit", 2);
tctx               67 source4/libcli/resolve/testsuite.c 	const char *host = torture_setting_string(tctx, "host", NULL);
tctx               69 source4/libcli/resolve/testsuite.c 	torture_comment(tctx, "Testing sync resolve of '%s' for %d seconds\n", 
tctx               76 source4/libcli/resolve/testsuite.c 	torture_comment(tctx, "sync rate of %.1f resolves/sec\n", 
tctx               31 source4/libcli/security/tests/sddl.c static bool test_sddl(struct torture_context *tctx, 
tctx               38 source4/libcli/security/tests/sddl.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               43 source4/libcli/security/tests/sddl.c 	torture_assert(tctx, sd != NULL, talloc_asprintf(tctx, 
tctx               47 source4/libcli/security/tests/sddl.c 	torture_assert(tctx, sddl2 != NULL, talloc_asprintf(tctx, 
tctx               51 source4/libcli/security/tests/sddl.c 	torture_assert(tctx, sd2 != NULL, talloc_asprintf(tctx, 
tctx               54 source4/libcli/security/tests/sddl.c 	torture_assert(tctx, security_descriptor_equal(sd, sd2),
tctx               55 source4/libcli/security/tests/sddl.c 		talloc_asprintf(tctx, "Failed equality test for '%s'\n", sddl));
tctx               28 source4/librpc/tests/binding_string.c static bool test_BindingString(struct torture_context *tctx,
tctx               35 source4/librpc/tests/binding_string.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               38 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(mem_ctx, binding, &b),
tctx               42 source4/librpc/tests/binding_string.c 	torture_assert(tctx, s != NULL, "Error converting binding back to string");
tctx               44 source4/librpc/tests/binding_string.c 	torture_assert_casestr_equal(tctx, binding, s, 
tctx               48 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_binding_build_tower(mem_ctx, b, &tower),
tctx               53 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_binding_from_tower(mem_ctx, &tower, &b2),
tctx               63 source4/librpc/tests/binding_string.c 	torture_assert(tctx, s != NULL, "Error converting binding back to string for (stripped down)"); 
tctx               66 source4/librpc/tests/binding_string.c 	torture_assert(tctx, s != NULL, "Error converting binding back to string"); 
tctx               69 source4/librpc/tests/binding_string.c 		torture_assert_casestr_equal(tctx, s, s2, "Mismatch while comparing original and from protocol tower generated binding strings");
tctx               99 source4/librpc/tests/binding_string.c static bool test_parse_check_results(struct torture_context *tctx)
tctx              104 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, 
tctx              108 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER", &b), "parse");
tctx              109 source4/librpc/tests/binding_string.c 	torture_assert(tctx, b->transport == NCACN_NP, "ncacn_np expected");
tctx              110 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_ip_tcp:$SERVER", &b), "parse");
tctx              111 source4/librpc/tests/binding_string.c 	torture_assert(tctx, b->transport == NCACN_IP_TCP, "ncacn_ip_tcp expected");
tctx              112 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[rpcecho]", &b), "parse");
tctx              113 source4/librpc/tests/binding_string.c 	torture_assert_str_equal(tctx, b->endpoint, "rpcecho", "endpoint");
tctx              114 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[/pipe/rpcecho]", &b), "parse");
tctx              115 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[/pipe/rpcecho,sign,seal]", &b), "parse");
tctx              116 source4/librpc/tests/binding_string.c 	torture_assert(tctx, b->flags == DCERPC_SIGN+DCERPC_SEAL, "sign+seal flags");
tctx              117 source4/librpc/tests/binding_string.c 	torture_assert_str_equal(tctx, b->endpoint, "/pipe/rpcecho", "endpoint");
tctx              118 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[,sign]", &b), "parse");
tctx              119 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_ip_tcp:$SERVER[,sign]", &b), "parse");
tctx              120 source4/librpc/tests/binding_string.c 	torture_assert(tctx, b->endpoint == NULL, "endpoint");
tctx              121 source4/librpc/tests/binding_string.c 	torture_assert(tctx, b->flags == DCERPC_SIGN, "sign flag");
tctx              122 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncalrpc:", &b), "parse");
tctx              123 source4/librpc/tests/binding_string.c 	torture_assert(tctx, b->transport == NCALRPC, "ncalrpc expected");
tctx              124 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, 
tctx              126 source4/librpc/tests/binding_string.c 	torture_assert(tctx, GUID_equal(&b->object.uuid, &uuid), "object uuid");
tctx              127 source4/librpc/tests/binding_string.c 	torture_assert_int_equal(tctx, b->object.if_version, 0, "object version");
tctx              128 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, 
tctx              134 source4/librpc/tests/binding_string.c static bool test_no_transport(struct torture_context *tctx)
tctx              141 source4/librpc/tests/binding_string.c 	torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, binding, &b),
tctx              144 source4/librpc/tests/binding_string.c 	torture_assert(tctx, b->transport == NCA_UNKNOWN, "invalid transport");
tctx              146 source4/librpc/tests/binding_string.c 	s = dcerpc_binding_string(tctx, b);
tctx              147 source4/librpc/tests/binding_string.c 	torture_assert(tctx, s != NULL, "Error converting binding back to string");
tctx              149 source4/librpc/tests/binding_string.c 	torture_assert_casestr_equal(tctx, binding, s, 
tctx               25 source4/param/tests/loadparm.c static bool test_create(struct torture_context *tctx)
tctx               27 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx               28 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_ctx != NULL, "lp_ctx");
tctx               32 source4/param/tests/loadparm.c static bool test_set_option(struct torture_context *tctx)
tctx               34 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx               35 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_set_option(lp_ctx, "workgroup=werkgroep"), "lp_set_option failed");
tctx               36 source4/param/tests/loadparm.c 	torture_assert_str_equal(tctx, "WERKGROEP", lp_workgroup(lp_ctx), "workgroup");
tctx               40 source4/param/tests/loadparm.c static bool test_set_cmdline(struct torture_context *tctx)
tctx               42 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx               43 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_set_cmdline(lp_ctx, "workgroup", "werkgroep"), "lp_set_cmdline failed");
tctx               44 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_do_global_parameter(lp_ctx, "workgroup", "barbla"), "lp_set_option failed");
tctx               45 source4/param/tests/loadparm.c 	torture_assert_str_equal(tctx, "WERKGROEP", lp_workgroup(lp_ctx), "workgroup");
tctx               49 source4/param/tests/loadparm.c static bool test_do_global_parameter(struct torture_context *tctx)
tctx               51 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx               52 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_do_global_parameter(lp_ctx, "workgroup", "werkgroep42"), 
tctx               54 source4/param/tests/loadparm.c 	torture_assert_str_equal(tctx, lp_workgroup(lp_ctx), "WERKGROEP42", "workgroup");
tctx               59 source4/param/tests/loadparm.c static bool test_do_global_parameter_var(struct torture_context *tctx)
tctx               61 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx               62 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_do_global_parameter_var(lp_ctx, "workgroup", "werk%s%d", "groep", 42), 
tctx               64 source4/param/tests/loadparm.c 	torture_assert_str_equal(tctx, lp_workgroup(lp_ctx), "WERKGROEP42", "workgroup");
tctx               69 source4/param/tests/loadparm.c static bool test_set_option_invalid(struct torture_context *tctx)
tctx               71 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx               72 source4/param/tests/loadparm.c 	torture_assert(tctx, !lp_set_option(lp_ctx, "workgroup"), "lp_set_option succeeded");
tctx               76 source4/param/tests/loadparm.c static bool test_set_option_parametric(struct torture_context *tctx)
tctx               78 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx               79 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=blaat"), "lp_set_option failed");
tctx               80 source4/param/tests/loadparm.c 	torture_assert_str_equal(tctx, lp_parm_string(lp_ctx, NULL, "some", "thing"), "blaat", 
tctx               85 source4/param/tests/loadparm.c static bool test_lp_parm_double(struct torture_context *tctx)
tctx               87 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx               88 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=3.4"), "lp_set_option failed");
tctx               89 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_parm_double(lp_ctx, NULL, "some", "thing", 2.0) == 3.4, 
tctx               91 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_parm_double(lp_ctx, NULL, "some", "bla", 2.0) == 2.0, 
tctx               96 source4/param/tests/loadparm.c static bool test_lp_parm_bool(struct torture_context *tctx)
tctx               98 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx               99 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=true"), "lp_set_option failed");
tctx              100 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_parm_bool(lp_ctx, NULL, "some", "thing", false) == true, 
tctx              102 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_parm_bool(lp_ctx, NULL, "some", "bla", true) == true, 
tctx              107 source4/param/tests/loadparm.c static bool test_lp_parm_int(struct torture_context *tctx)
tctx              109 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx              110 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=34"), "lp_set_option failed");
tctx              111 source4/param/tests/loadparm.c 	torture_assert_int_equal(tctx, lp_parm_int(lp_ctx, NULL, "some", "thing", 20), 34, 
tctx              113 source4/param/tests/loadparm.c 	torture_assert_int_equal(tctx, lp_parm_int(lp_ctx, NULL, "some", "bla", 42), 42, 
tctx              118 source4/param/tests/loadparm.c static bool test_lp_parm_bytes(struct torture_context *tctx)
tctx              120 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx              121 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=16K"), "lp_set_option failed");
tctx              122 source4/param/tests/loadparm.c 	torture_assert_int_equal(tctx, lp_parm_bytes(lp_ctx, NULL, "some", "thing", 20), 16 * 1024, 
tctx              124 source4/param/tests/loadparm.c 	torture_assert_int_equal(tctx, lp_parm_bytes(lp_ctx, NULL, "some", "bla", 42), 42, 
tctx              129 source4/param/tests/loadparm.c static bool test_lp_do_service_parameter(struct torture_context *tctx)
tctx              131 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx              133 source4/param/tests/loadparm.c 	torture_assert(tctx, lp_do_service_parameter(lp_ctx, service, 
tctx              135 source4/param/tests/loadparm.c 	torture_assert_str_equal(tctx, lp_parm_string(lp_ctx, service, "some", "thing"), "foo",
tctx              140 source4/param/tests/loadparm.c static bool test_lp_service(struct torture_context *tctx)
tctx              142 source4/param/tests/loadparm.c 	struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx              144 source4/param/tests/loadparm.c 	torture_assert(tctx, service == lp_service(lp_ctx, "foo"), "invalid service");
tctx               27 source4/param/tests/share.c static bool test_list_empty(struct torture_context *tctx, 
tctx               35 source4/param/tests/share.c 	torture_assert_ntstatus_ok(tctx, share_list_all(tctx, ctx, &count, &names),
tctx               41 source4/param/tests/share.c static bool test_create(struct torture_context *tctx, 
tctx               59 source4/param/tests/share.c 		torture_skip(tctx, "Not supported by backend");
tctx               61 source4/param/tests/share.c 	torture_assert_ntstatus_ok(tctx, status, "create_share failed");
tctx               63 source4/param/tests/share.c 	torture_assert_ntstatus_ok(tctx, share_list_all(tctx, ctx, &count, &names),
tctx               66 source4/param/tests/share.c 	torture_assert(tctx, count >= 1, "creating share failed");
tctx               73 source4/param/tests/share.c 	torture_assert(tctx, found, "created share found");
tctx               79 source4/param/tests/share.c static bool test_create_invalid(struct torture_context *tctx, 
tctx               89 source4/param/tests/share.c 		torture_skip(tctx, "Not supported by backend");
tctx               91 source4/param/tests/share.c 	torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER, 
tctx               95 source4/param/tests/share.c 	torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER, 
tctx              102 source4/param/tests/share.c static bool test_share_remove_invalid(struct torture_context *tctx, 
tctx              112 source4/param/tests/share.c 		torture_skip(tctx, "Not supported by backend");
tctx              114 source4/param/tests/share.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_UNSUCCESSFUL, "remove fails");
tctx              121 source4/param/tests/share.c static bool test_share_remove(struct torture_context *tctx, 
tctx              135 source4/param/tests/share.c 		torture_skip(tctx, "Not supported by backend");
tctx              137 source4/param/tests/share.c 	torture_assert_ntstatus_ok(tctx, status, "create_share failed");
tctx              139 source4/param/tests/share.c 	torture_assert_ntstatus_ok(tctx, share_remove(ctx, "blie"), "remove failed");
tctx              144 source4/param/tests/share.c static bool test_double_create(struct torture_context *tctx, 
tctx              158 source4/param/tests/share.c 		torture_skip(tctx, "Not supported by backend");
tctx              160 source4/param/tests/share.c 	torture_assert_ntstatus_ok(tctx, status, "create_share failed");
tctx              162 source4/param/tests/share.c 	torture_assert_ntstatus_equal(tctx, NT_STATUS_OBJECT_NAME_COLLISION,
tctx              183 source4/param/tests/share.c static bool setup_ldb(struct torture_context *tctx, void **data)
tctx              185 source4/param/tests/share.c 	return NT_STATUS_IS_OK(share_get_context_by_name(tctx, "ldb", tctx->ev, tctx->lp_ctx, (struct share_context **)data));
tctx              188 source4/param/tests/share.c static bool setup_classic(struct torture_context *tctx, void **data)
tctx              190 source4/param/tests/share.c 	return NT_STATUS_IS_OK(share_get_context_by_name(tctx, "classic", tctx->ev, tctx->lp_ctx, (struct share_context **)data));
tctx              193 source4/param/tests/share.c static bool teardown(struct torture_context *tctx, void *data)
tctx               28 source4/torture/auth/ntlmssp.c static bool torture_ntlmssp_self_check(struct torture_context *tctx)
tctx               34 source4/torture/auth/ntlmssp.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               36 source4/torture/auth/ntlmssp.c 	torture_assert_ntstatus_ok(tctx, 
tctx               38 source4/torture/auth/ntlmssp.c 				    tctx->ev, lp_gensec_settings(tctx, tctx->lp_ctx)),
tctx               46 source4/torture/auth/ntlmssp.c 	torture_assert_ntstatus_ok(tctx, 
tctx               52 source4/torture/auth/ntlmssp.c 	gensec_ntlmssp_state->session_key = strhex_to_data_blob(tctx, "0102030405060708090a0b0c0d0e0f00");
tctx               59 source4/torture/auth/ntlmssp.c 	torture_assert_ntstatus_ok(tctx,  
tctx               63 source4/torture/auth/ntlmssp.c 	data = strhex_to_data_blob(tctx, "6a43494653");
tctx               67 source4/torture/auth/ntlmssp.c 	expected_sig = strhex_to_data_blob(tctx, "01000000e37f97f2544f4d7e00000000");
tctx               72 source4/torture/auth/ntlmssp.c 	torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
tctx               74 source4/torture/auth/ntlmssp.c 	torture_assert_mem_equal(tctx, sig.data, expected_sig.data, sig.length,
tctx               77 source4/torture/auth/ntlmssp.c 	torture_assert_ntstatus_equal(tctx, 
tctx               84 source4/torture/auth/ntlmssp.c 	torture_assert_ntstatus_equal(tctx, 
tctx               91 source4/torture/auth/ntlmssp.c 	torture_assert_ntstatus_ok(tctx, 
tctx               93 source4/torture/auth/ntlmssp.c 				    tctx->ev, lp_gensec_settings(tctx, tctx->lp_ctx)),
tctx              101 source4/torture/auth/ntlmssp.c 	torture_assert_ntstatus_ok(tctx, 
tctx              107 source4/torture/auth/ntlmssp.c 	gensec_ntlmssp_state->session_key = strhex_to_data_blob(tctx, "0102030405e538b0");
tctx              114 source4/torture/auth/ntlmssp.c 	torture_assert_ntstatus_ok(tctx,  
tctx              118 source4/torture/auth/ntlmssp.c 	data = strhex_to_data_blob(tctx, "6a43494653");
tctx              122 source4/torture/auth/ntlmssp.c 	expected_sig = strhex_to_data_blob(tctx, "0100000078010900397420fe0e5a0f89");
tctx              127 source4/torture/auth/ntlmssp.c 	torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
tctx              129 source4/torture/auth/ntlmssp.c 	torture_assert_mem_equal(tctx, sig.data+8, expected_sig.data+8, sig.length-8,
tctx              132 source4/torture/auth/ntlmssp.c 	torture_assert_ntstatus_equal(tctx, 
tctx              139 source4/torture/auth/ntlmssp.c 	torture_assert_ntstatus_equal(tctx, 
tctx               33 source4/torture/auth/pac.c static bool torture_pac_self_check(struct torture_context *tctx)
tctx               57 source4/torture/auth/pac.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               59 source4/torture/auth/pac.c 	torture_assert(tctx, 0 == smb_krb5_init_context(mem_ctx, 
tctx               61 source4/torture/auth/pac.c 							tctx->lp_ctx,
tctx               72 source4/torture/auth/pac.c 	torture_assert(tctx, !ret, talloc_asprintf(tctx, 
tctx               88 source4/torture/auth/pac.c 		torture_fail(tctx, talloc_asprintf(tctx, 
tctx               93 source4/torture/auth/pac.c 	nt_status = auth_anonymous_server_info(mem_ctx, lp_netbios_name(tctx->lp_ctx), &server_info);
tctx              100 source4/torture/auth/pac.c 		torture_fail(tctx, "auth_anonymous_server_info");
tctx              112 source4/torture/auth/pac.c 		torture_fail(tctx, "krb5_parse_name_flags(norealm)");
tctx              117 source4/torture/auth/pac.c 				  lp_iconv_convenience(tctx->lp_ctx),
tctx              134 source4/torture/auth/pac.c 		torture_fail(tctx, talloc_asprintf(tctx,
tctx              144 source4/torture/auth/pac.c 					lp_iconv_convenience(tctx->lp_ctx),
tctx              161 source4/torture/auth/pac.c 		torture_fail(tctx, talloc_asprintf(tctx,
tctx              168 source4/torture/auth/pac.c 						     lp_iconv_convenience(tctx->lp_ctx),
tctx              182 source4/torture/auth/pac.c 		torture_fail(tctx,  
tctx              183 source4/torture/auth/pac.c 			     talloc_asprintf(tctx, 
tctx              192 source4/torture/auth/pac.c 					    lp_iconv_convenience(tctx->lp_ctx),
tctx              210 source4/torture/auth/pac.c 		torture_fail(tctx,  
tctx              211 source4/torture/auth/pac.c 			     talloc_asprintf(tctx, 
tctx              230 source4/torture/auth/pac.c 		torture_fail(tctx, 
tctx              231 source4/torture/auth/pac.c 			     talloc_asprintf(tctx, 
tctx              238 source4/torture/auth/pac.c 		torture_fail(tctx,  
tctx              239 source4/torture/auth/pac.c 			     talloc_asprintf(tctx, 
tctx              295 source4/torture/auth/pac.c static bool torture_pac_saved_check(struct torture_context *tctx)
tctx              318 source4/torture/auth/pac.c 	TALLOC_CTX *mem_ctx = tctx;
tctx              320 source4/torture/auth/pac.c 	torture_assert(tctx, 0 == smb_krb5_init_context(mem_ctx, NULL,
tctx              321 source4/torture/auth/pac.c 							tctx->lp_ctx,
tctx              325 source4/torture/auth/pac.c 	pac_kdc_key = torture_setting_string(tctx, "pac_kdc_key", 
tctx              328 source4/torture/auth/pac.c 	pac_member_key = torture_setting_string(tctx, "pac_member_key", 
tctx              331 source4/torture/auth/pac.c 	torture_comment(tctx, "Using pac_kdc_key '%s'\n", pac_kdc_key);
tctx              332 source4/torture/auth/pac.c 	torture_comment(tctx, "Using pac_member_key '%s'\n", pac_member_key);
tctx              342 source4/torture/auth/pac.c 			torture_fail(tctx, "(saved test) Could not interpret krbtgt key");
tctx              348 source4/torture/auth/pac.c 		torture_fail(tctx, "(saved test) Could not interpret krbsrv key");
tctx              355 source4/torture/auth/pac.c 	torture_assert(tctx, !ret,
tctx              356 source4/torture/auth/pac.c 		       talloc_asprintf(tctx,
tctx              369 source4/torture/auth/pac.c 			torture_fail(tctx, 
tctx              370 source4/torture/auth/pac.c 				     talloc_asprintf(tctx, 
tctx              380 source4/torture/auth/pac.c 	pac_file = torture_setting_string(tctx, "pac_file", NULL);
tctx              383 source4/torture/auth/pac.c 		torture_comment(tctx, "(saved test) Loaded pac of size %ld from %s\n", (long)tmp_blob.length, pac_file);
tctx              390 source4/torture/auth/pac.c 	principal_string = torture_setting_string(tctx, "pac_client_principal", 
tctx              393 source4/torture/auth/pac.c 	authtime_string = torture_setting_string(tctx, "pac_authtime", "1120440609");
tctx              403 source4/torture/auth/pac.c 		torture_fail(tctx,  
tctx              404 source4/torture/auth/pac.c 			     talloc_asprintf(tctx, 
tctx              412 source4/torture/auth/pac.c 					lp_iconv_convenience(tctx->lp_ctx),
tctx              426 source4/torture/auth/pac.c 		torture_fail(tctx, talloc_asprintf(tctx, 
tctx              433 source4/torture/auth/pac.c 						     lp_iconv_convenience(tctx->lp_ctx),
tctx              445 source4/torture/auth/pac.c 		torture_fail(tctx, talloc_asprintf(tctx, 
tctx              460 source4/torture/auth/pac.c 		torture_fail(tctx,  
tctx              461 source4/torture/auth/pac.c 			     talloc_asprintf(tctx, 
tctx              471 source4/torture/auth/pac.c 					    lp_iconv_convenience(tctx->lp_ctx),
tctx              486 source4/torture/auth/pac.c 		torture_fail(tctx,  
tctx              487 source4/torture/auth/pac.c 			     talloc_asprintf(tctx, 
tctx              504 source4/torture/auth/pac.c 		torture_fail(tctx,  
tctx              505 source4/torture/auth/pac.c 			     talloc_asprintf(tctx, 
tctx              520 source4/torture/auth/pac.c 		torture_fail(tctx,  
tctx              521 source4/torture/auth/pac.c 			     talloc_asprintf(tctx, 
tctx              528 source4/torture/auth/pac.c 		torture_comment(tctx, "skipping PAC encoding tests as non kdc key\n");
tctx              536 source4/torture/auth/pac.c 				  lp_iconv_convenience(tctx->lp_ctx),
tctx              550 source4/torture/auth/pac.c 		torture_fail(tctx, "(saved test) PAC push failed");
tctx              566 source4/torture/auth/pac.c 		torture_fail(tctx, 
tctx              567 source4/torture/auth/pac.c 			     talloc_asprintf(tctx, 
tctx              584 source4/torture/auth/pac.c 		torture_fail(tctx, talloc_asprintf(tctx, "(saved test) PAC push failed: length[%u] matches, but data does not", (unsigned)tmp_blob.length));
tctx              588 source4/torture/auth/pac.c 				  lp_iconv_convenience(tctx->lp_ctx),
tctx              603 source4/torture/auth/pac.c 		torture_fail(tctx, "(saved test) regnerated PAC create failed");
tctx              614 source4/torture/auth/pac.c 					       lp_iconv_convenience(tctx->lp_ctx), &pac_data2,
tctx              617 source4/torture/auth/pac.c 		torture_assert_ntstatus_ok(tctx, nt_status, "can't parse the PAC");
tctx              629 source4/torture/auth/pac.c 		torture_fail(tctx, talloc_asprintf(tctx, 
tctx              636 source4/torture/auth/pac.c 					       lp_iconv_convenience(tctx->lp_ctx), &pac_data2,
tctx              639 source4/torture/auth/pac.c 		torture_assert_ntstatus_ok(tctx, nt_status, "can't parse the PAC");
tctx              656 source4/torture/auth/pac.c 		torture_fail(tctx, talloc_asprintf(tctx, 
tctx              662 source4/torture/auth/pac.c 					lp_iconv_convenience(tctx->lp_ctx),
tctx              677 source4/torture/auth/pac.c 		torture_fail(tctx, "(saved test) PAC decoding DID NOT fail on broken auth time (time + 1)");
tctx              694 source4/torture/auth/pac.c 		torture_fail(tctx, talloc_asprintf(tctx, 
tctx              700 source4/torture/auth/pac.c 					lp_iconv_convenience(tctx->lp_ctx),
tctx              713 source4/torture/auth/pac.c 		torture_fail(tctx, "(saved test) PAC decoding DID NOT fail on modified principal");
tctx              720 source4/torture/auth/pac.c 					lp_iconv_convenience(tctx->lp_ctx),
tctx              733 source4/torture/auth/pac.c 		torture_fail(tctx, "(saved test) PAC decoding DID NOT fail on broken checksum");
tctx               37 source4/torture/basic/aliases.c static bool gen_aliases(struct torture_context *tctx, 
tctx               51 source4/torture/basic/aliases.c 		status = smb_raw_trans2(cli->tree, tctx, t2);
tctx               54 source4/torture/basic/aliases.c 		t2b = talloc(tctx, struct trans2_blobs);
tctx               59 source4/torture/basic/aliases.c 		torture_comment(tctx, 
tctx               66 source4/torture/basic/aliases.c 	torture_comment(tctx, "Found %d levels with success status\n", count);
tctx               73 source4/torture/basic/aliases.c 				torture_comment(tctx, 
tctx               81 source4/torture/basic/aliases.c 	torture_comment(tctx, "Found %d aliased levels\n", alias_count);
tctx               87 source4/torture/basic/aliases.c static bool qfsinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli)
tctx               99 source4/torture/basic/aliases.c 	t2.in.params = data_blob_talloc_zero(tctx, 2);
tctx              103 source4/torture/basic/aliases.c 	return gen_aliases(tctx, cli, &t2, 0);
tctx              107 source4/torture/basic/aliases.c static bool qfileinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli)
tctx              121 source4/torture/basic/aliases.c 	t2.in.params = data_blob_talloc_zero(tctx, 4);
tctx              127 source4/torture/basic/aliases.c 	torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, 
tctx              135 source4/torture/basic/aliases.c 	if (!gen_aliases(tctx, cli, &t2, 2))
tctx              146 source4/torture/basic/aliases.c static bool qpathinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli)
tctx              160 source4/torture/basic/aliases.c 	t2.in.params = data_blob_talloc_zero(tctx, 6);
tctx              166 source4/torture/basic/aliases.c 	torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, 
tctx              175 source4/torture/basic/aliases.c 	smbcli_blob_append_string(cli->session, tctx, &t2.in.params, 
tctx              178 source4/torture/basic/aliases.c 	if (!gen_aliases(tctx, cli, &t2, 0))
tctx              188 source4/torture/basic/aliases.c static bool findfirst_aliases(struct torture_context *tctx, struct smbcli_state *cli)
tctx              202 source4/torture/basic/aliases.c 	t2.in.params = data_blob_talloc_zero(tctx, 12);
tctx              208 source4/torture/basic/aliases.c 	torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, 
tctx              221 source4/torture/basic/aliases.c 	smbcli_blob_append_string(cli->session, tctx, &t2.in.params, 
tctx              224 source4/torture/basic/aliases.c 	if (!gen_aliases(tctx, cli, &t2, 6))
tctx              235 source4/torture/basic/aliases.c static bool gen_set_aliases(struct torture_context *tctx, 
tctx              254 source4/torture/basic/aliases.c 			status = smb_raw_trans2(cli->tree, tctx, t2);
tctx              274 source4/torture/basic/aliases.c 				torture_comment(tctx, "level=%d size=%d %s\n", level, dsize, nt_errstr(status));
tctx              282 source4/torture/basic/aliases.c 		t2b = talloc(tctx, struct trans2_blobs);
tctx              287 source4/torture/basic/aliases.c 		torture_comment(tctx, 
tctx              294 source4/torture/basic/aliases.c 	torture_comment(tctx, "Found %d valid levels\n", count);
tctx              302 source4/torture/basic/aliases.c static bool setfileinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli)
tctx              316 source4/torture/basic/aliases.c 	t2.in.params = data_blob_talloc_zero(tctx, 6);
tctx              322 source4/torture/basic/aliases.c 	torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, 
tctx              331 source4/torture/basic/aliases.c 	gen_set_aliases(tctx, cli, &t2, 2);
tctx              340 source4/torture/basic/aliases.c static bool setpathinfo_aliases(struct torture_context *tctx, 
tctx              355 source4/torture/basic/aliases.c 	t2.in.params = data_blob_talloc_zero(tctx, 4);
tctx              362 source4/torture/basic/aliases.c 	torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, 
tctx              371 source4/torture/basic/aliases.c 	smbcli_blob_append_string(cli->session, tctx, &t2.in.params, 
tctx              374 source4/torture/basic/aliases.c 	if (!gen_set_aliases(tctx, cli, &t2, 0))
tctx              377 source4/torture/basic/aliases.c 	torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli->tree, fname),
tctx              378 source4/torture/basic/aliases.c 		talloc_asprintf(tctx, "unlink: %s", smbcli_errstr(cli->tree)));
tctx               89 source4/torture/basic/attr.c bool torture_openattrtest(struct torture_context *tctx, 
tctx              106 source4/torture/basic/attr.c 		torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open %d (1) of %s failed (%s)", i, 
tctx              109 source4/torture/basic/attr.c 		torture_assert_ntstatus_ok(tctx, 
tctx              111 source4/torture/basic/attr.c 							talloc_asprintf(tctx, "close %d (1) of %s failed (%s)", i, fname, 
tctx              125 source4/torture/basic/attr.c 						torture_comment(tctx, "[%d] trunc open 0x%x -> 0x%x of %s failed - should have succeeded !(%s)\n",
tctx              132 source4/torture/basic/attr.c 				torture_assert_ntstatus_equal(tctx, 
tctx              134 source4/torture/basic/attr.c 					talloc_asprintf(tctx, "[%d] trunc open 0x%x -> 0x%x failed with wrong error code %s",
tctx              139 source4/torture/basic/attr.c 				torture_comment(tctx, "[%d] trunc open 0x%x -> 0x%x failed\n", k, open_attrs_table[i], open_attrs_table[j]);
tctx              145 source4/torture/basic/attr.c 			torture_assert_ntstatus_ok(tctx, 
tctx              147 source4/torture/basic/attr.c 									talloc_asprintf(tctx, "close %d (2) of %s failed (%s)", j, 
tctx              150 source4/torture/basic/attr.c 			torture_assert_ntstatus_ok(tctx, 
tctx              152 source4/torture/basic/attr.c 						talloc_asprintf(tctx, "getatr(2) failed (%s)", smbcli_errstr(cli1->tree)));
tctx              155 source4/torture/basic/attr.c 			torture_comment(tctx, "[%d] getatr check [0x%x] trunc [0x%x] got attr 0x%x\n",
tctx              164 source4/torture/basic/attr.c 						torture_comment(tctx, "[%d] getatr check failed. [0x%x] trunc [0x%x] got attr 0x%x, should be 0x%x\n",
tctx               39 source4/torture/basic/base.c static struct smbcli_state *open_nbt_connection(struct torture_context *tctx)
tctx               43 source4/torture/basic/base.c 	const char *host = torture_setting_string(tctx, "host", NULL);
tctx               46 source4/torture/basic/base.c 	make_nbt_name_client(&calling, lp_netbios_name(tctx->lp_ctx));
tctx               52 source4/torture/basic/base.c 		torture_comment(tctx, "Failed initialize smbcli_struct to connect with %s\n", host);
tctx               56 source4/torture/basic/base.c 	lp_smbcli_options(tctx->lp_ctx, &options);
tctx               58 source4/torture/basic/base.c 	if (!smbcli_socket_connect(cli, host, lp_smb_ports(tctx->lp_ctx), tctx->ev,
tctx               59 source4/torture/basic/base.c 				   lp_resolve_context(tctx->lp_ctx), &options, 
tctx               60 source4/torture/basic/base.c 				   lp_iconv_convenience(tctx->lp_ctx),
tctx               61 source4/torture/basic/base.c                    lp_socket_options(tctx->lp_ctx))) {
tctx               62 source4/torture/basic/base.c 		torture_comment(tctx, "Failed to connect with %s\n", host);
tctx               67 source4/torture/basic/base.c 		torture_comment(tctx, "%s rejected the session\n",host);
tctx               78 source4/torture/basic/base.c static bool tcon_devtest(struct torture_context *tctx, 
tctx               84 source4/torture/basic/base.c 	const char *password = torture_setting_string(tctx, "password", NULL);
tctx               89 source4/torture/basic/base.c 	torture_comment(tctx, "Trying share %s with devtype %s\n", myshare, devtype);
tctx               93 source4/torture/basic/base.c 			torture_fail(tctx, talloc_asprintf(tctx, 
tctx              101 source4/torture/basic/base.c 			torture_fail(tctx, talloc_asprintf(tctx, 
tctx              109 source4/torture/basic/base.c 				torture_fail(tctx, "Returned unexpected error");
tctx              122 source4/torture/basic/base.c static bool run_fdpasstest(struct torture_context *tctx,
tctx              132 source4/torture/basic/base.c 	torture_comment(tctx, "Opening a file on connection 1\n");
tctx              135 source4/torture/basic/base.c 	torture_assert(tctx, fnum1 != -1, 
tctx              136 source4/torture/basic/base.c 			talloc_asprintf(tctx, 
tctx              139 source4/torture/basic/base.c 	torture_comment(tctx, "writing to file on connection 1\n");
tctx              141 source4/torture/basic/base.c 	torture_assert(tctx, 
tctx              143 source4/torture/basic/base.c 		talloc_asprintf(tctx, 
tctx              151 source4/torture/basic/base.c 	torture_comment(tctx, "reading from file on connection 2\n");
tctx              153 source4/torture/basic/base.c 	torture_assert(tctx, smbcli_read(cli2->tree, fnum1, buf, 0, 13) != 13,
tctx              154 source4/torture/basic/base.c 				   talloc_asprintf(tctx,
tctx              168 source4/torture/basic/base.c static bool run_attrtest(struct torture_context *tctx, 
tctx              182 source4/torture/basic/base.c 		torture_comment(tctx, "getatr failed (%s)\n", smbcli_errstr(cli->tree));
tctx              186 source4/torture/basic/base.c 	torture_comment(tctx, "New file time is %s", ctime(&t));
tctx              189 source4/torture/basic/base.c 		torture_comment(tctx, "ERROR: SMBgetatr bug. time is %s",
tctx              197 source4/torture/basic/base.c 	torture_comment(tctx, "Setting file time to %s", ctime(&t2));
tctx              200 source4/torture/basic/base.c 		torture_comment(tctx, "setatr failed (%s)\n", smbcli_errstr(cli->tree));
tctx              205 source4/torture/basic/base.c 		torture_comment(tctx, "getatr failed (%s)\n", smbcli_errstr(cli->tree));
tctx              209 source4/torture/basic/base.c 	torture_comment(tctx, "Retrieved file time as %s", ctime(&t));
tctx              212 source4/torture/basic/base.c 		torture_comment(tctx, "ERROR: getatr/setatr bug. times are\n%s",
tctx              214 source4/torture/basic/base.c 		torture_comment(tctx, "%s", ctime(&t2));
tctx              226 source4/torture/basic/base.c static bool run_trans2test(struct torture_context *tctx, 
tctx              240 source4/torture/basic/base.c 	torture_comment(tctx, "Testing qfileinfo\n");
tctx              246 source4/torture/basic/base.c 		torture_comment(tctx, "ERROR: qfileinfo failed (%s)\n", smbcli_errstr(cli->tree));
tctx              250 source4/torture/basic/base.c 	torture_comment(tctx, "Testing NAME_INFO\n");
tctx              253 source4/torture/basic/base.c 		torture_comment(tctx, "ERROR: qfilename failed (%s)\n", smbcli_errstr(cli->tree));
tctx              258 source4/torture/basic/base.c 		torture_comment(tctx, "qfilename gave different name? [%s] [%s]\n",
tctx              269 source4/torture/basic/base.c 		torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli->tree));
tctx              274 source4/torture/basic/base.c 	torture_comment(tctx, "Checking for sticky create times\n");
tctx              277 source4/torture/basic/base.c 		torture_comment(tctx, "ERROR: qpathinfo failed (%s)\n", smbcli_errstr(cli->tree));
tctx              281 source4/torture/basic/base.c 			torture_comment(tctx, "create time=%s", ctime(&c_time));
tctx              282 source4/torture/basic/base.c 			torture_comment(tctx, "modify time=%s", ctime(&m_time));
tctx              283 source4/torture/basic/base.c 			torture_comment(tctx, "This system appears to have sticky create times\n");
tctx              286 source4/torture/basic/base.c 			torture_comment(tctx, "access time=%s", ctime(&a_time));
tctx              287 source4/torture/basic/base.c 			torture_comment(tctx, "This system appears to set a midnight access time\n");
tctx              292 source4/torture/basic/base.c 			torture_comment(tctx, "ERROR: totally incorrect times - maybe word reversed? mtime=%s", ctime(&m_time));
tctx              303 source4/torture/basic/base.c 		torture_comment(tctx, "ERROR: qpathinfo2 failed (%s)\n", smbcli_errstr(cli->tree));
tctx              307 source4/torture/basic/base.c 			torture_comment(tctx, "write time=%s", ctime(&w_time));
tctx              308 source4/torture/basic/base.c 			torture_comment(tctx, "This system appears to set a initial 0 write time\n");
tctx              319 source4/torture/basic/base.c 		torture_comment(tctx, "ERROR: mkdir failed (%s)\n", smbcli_errstr(cli->tree));
tctx              324 source4/torture/basic/base.c 		torture_comment(tctx, "ERROR: qpathinfo2 failed (%s)\n", smbcli_errstr(cli->tree));
tctx              333 source4/torture/basic/base.c 		torture_comment(tctx, "ERROR: qpathinfo2 failed (%s)\n", smbcli_errstr(cli->tree));
tctx              337 source4/torture/basic/base.c 			torture_comment(tctx, "This system does not update directory modification times\n");
tctx              348 source4/torture/basic/base.c static bool run_negprot_nowait(struct torture_context *tctx)
tctx              354 source4/torture/basic/base.c 	torture_comment(tctx, "starting negprot nowait test\n");
tctx              356 source4/torture/basic/base.c 	cli = open_nbt_connection(tctx);
tctx              361 source4/torture/basic/base.c 	torture_comment(tctx, "Filling send buffer\n");
tctx              365 source4/torture/basic/base.c 		req = smb_raw_negotiate_send(cli->transport, lp_unicode(tctx->lp_ctx), PROTOCOL_NT1);
tctx              369 source4/torture/basic/base.c 				torture_comment(tctx, "Failed to fill pipe packet[%d] - %s (ignored)\n", i+1, nt_errstr(req->status));
tctx              372 source4/torture/basic/base.c 				torture_comment(tctx, "Failed to fill pipe - %s \n", nt_errstr(req->status));
tctx              379 source4/torture/basic/base.c 	torture_comment(tctx, "Opening secondary connection\n");
tctx              380 source4/torture/basic/base.c 	if (!torture_open_connection(&cli2, tctx, 1)) {
tctx              381 source4/torture/basic/base.c 		torture_comment(tctx, "Failed to open secondary connection\n");
tctx              386 source4/torture/basic/base.c 		torture_comment(tctx, "Failed to close secondary connection\n");
tctx              399 source4/torture/basic/base.c static bool run_tcon_test(struct torture_context *tctx, struct smbcli_state *cli)
tctx              408 source4/torture/basic/base.c 	const char *host = torture_setting_string(tctx, "host", NULL);
tctx              409 source4/torture/basic/base.c 	const char *share = torture_setting_string(tctx, "share", NULL);
tctx              410 source4/torture/basic/base.c 	const char *password = torture_setting_string(tctx, "password", NULL);
tctx              413 source4/torture/basic/base.c 		torture_comment(tctx, "unlink of %s failed (%s)\n", fname, smbcli_errstr(cli->tree));
tctx              418 source4/torture/basic/base.c 		torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli->tree));
tctx              427 source4/torture/basic/base.c 		torture_comment(tctx, "initial write failed (%s)\n", smbcli_errstr(cli->tree));
tctx              433 source4/torture/basic/base.c 		torture_comment(tctx, "%s refused 2nd tree connect (%s)\n", host,
tctx              447 source4/torture/basic/base.c 		torture_comment(tctx, "* server allows write with wrong TID\n");
tctx              450 source4/torture/basic/base.c 		torture_comment(tctx, "server fails write with wrong TID : %s\n", smbcli_errstr(cli->tree));
tctx              458 source4/torture/basic/base.c 		torture_comment(tctx, "* server allows write with invalid TID\n");
tctx              461 source4/torture/basic/base.c 		torture_comment(tctx, "server fails write with invalid TID : %s\n", smbcli_errstr(cli->tree));
tctx              469 source4/torture/basic/base.c 		torture_comment(tctx, "* server allows write with invalid VUID\n");
tctx              472 source4/torture/basic/base.c 		torture_comment(tctx, "server fails write with invalid VUID : %s\n", smbcli_errstr(cli->tree));
tctx              479 source4/torture/basic/base.c 		torture_comment(tctx, "close failed (%s)\n", smbcli_errstr(cli->tree));
tctx              486 source4/torture/basic/base.c 		torture_comment(tctx, "secondary tdis failed (%s)\n", smbcli_errstr(cli->tree));
tctx              501 source4/torture/basic/base.c static bool run_tcon_devtype_test(struct torture_context *tctx, 
tctx              504 source4/torture/basic/base.c 	const char *share = torture_setting_string(tctx, "share", NULL);
tctx              506 source4/torture/basic/base.c 	if (!tcon_devtest(tctx, cli1, "IPC$", "A:", NT_STATUS_BAD_DEVICE_TYPE))
tctx              509 source4/torture/basic/base.c 	if (!tcon_devtest(tctx, cli1, "IPC$", "?????", NT_STATUS_OK))
tctx              512 source4/torture/basic/base.c 	if (!tcon_devtest(tctx, cli1, "IPC$", "LPT:", NT_STATUS_BAD_DEVICE_TYPE))
tctx              515 source4/torture/basic/base.c 	if (!tcon_devtest(tctx, cli1, "IPC$", "IPC", NT_STATUS_OK))
tctx              518 source4/torture/basic/base.c 	if (!tcon_devtest(tctx, cli1, "IPC$", "FOOBA", NT_STATUS_BAD_DEVICE_TYPE))
tctx              521 source4/torture/basic/base.c 	if (!tcon_devtest(tctx, cli1, share, "A:", NT_STATUS_OK))
tctx              524 source4/torture/basic/base.c 	if (!tcon_devtest(tctx, cli1, share, "?????", NT_STATUS_OK))
tctx              527 source4/torture/basic/base.c 	if (!tcon_devtest(tctx, cli1, share, "LPT:", NT_STATUS_BAD_DEVICE_TYPE))
tctx              530 source4/torture/basic/base.c 	if (!tcon_devtest(tctx, cli1, share, "IPC", NT_STATUS_BAD_DEVICE_TYPE))
tctx              533 source4/torture/basic/base.c 	if (!tcon_devtest(tctx, cli1, share, "FOOBA", NT_STATUS_BAD_DEVICE_TYPE))
tctx              539 source4/torture/basic/base.c static bool rw_torture2(struct torture_context *tctx,
tctx              551 source4/torture/basic/base.c 	torture_assert(tctx, smbcli_deltree(c1->tree, lockfname) != -1,
tctx              552 source4/torture/basic/base.c 				   talloc_asprintf(tctx, 
tctx              557 source4/torture/basic/base.c 	torture_assert(tctx, fnum1 != -1, 
tctx              558 source4/torture/basic/base.c 				   talloc_asprintf(tctx, 
tctx              563 source4/torture/basic/base.c 	torture_assert(tctx, fnum2 != -1, 
tctx              564 source4/torture/basic/base.c 				   talloc_asprintf(tctx, 
tctx              568 source4/torture/basic/base.c 	torture_comment(tctx, "Checking data integrity over %d ops\n", 
tctx              575 source4/torture/basic/base.c 			if (torture_setting_bool(tctx, "progress", true)) {
tctx              576 source4/torture/basic/base.c 				torture_comment(tctx, "%d\r", i); fflush(stdout);
tctx              583 source4/torture/basic/base.c 			torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(c1->tree));
tctx              584 source4/torture/basic/base.c 			torture_comment(tctx, "wrote %d, expected %d\n", (int)bytes_written, (int)buf_size); 
tctx              590 source4/torture/basic/base.c 			torture_comment(tctx, "read failed (%s)\n", smbcli_errstr(c2->tree));
tctx              591 source4/torture/basic/base.c 			torture_comment(tctx, "read %d, expected %d\n", (int)bytes_read, (int)buf_size); 
tctx              596 source4/torture/basic/base.c 		torture_assert_mem_equal(tctx, buf_rd, buf, buf_size, 
tctx              600 source4/torture/basic/base.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(c2->tree, fnum2), 
tctx              601 source4/torture/basic/base.c 		talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(c2->tree)));
tctx              602 source4/torture/basic/base.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(c1->tree, fnum1),
tctx              603 source4/torture/basic/base.c 		talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(c1->tree)));
tctx              605 source4/torture/basic/base.c 	torture_assert_ntstatus_ok(tctx, smbcli_unlink(c1->tree, lockfname),
tctx              606 source4/torture/basic/base.c 		talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(c1->tree)));
tctx              608 source4/torture/basic/base.c 	torture_comment(tctx, "\n");
tctx              615 source4/torture/basic/base.c static bool run_readwritetest(struct torture_context *tctx,
tctx              619 source4/torture/basic/base.c 	torture_comment(tctx, "Running readwritetest v1\n");
tctx              620 source4/torture/basic/base.c 	if (!rw_torture2(tctx, cli1, cli2)) 
tctx              623 source4/torture/basic/base.c 	torture_comment(tctx, "Running readwritetest v2\n");
tctx              625 source4/torture/basic/base.c 	if (!rw_torture2(tctx, cli1, cli1))
tctx              634 source4/torture/basic/base.c static bool run_deferopen(struct torture_context *tctx, struct smbcli_state *cli, int dummy)
tctx              644 source4/torture/basic/base.c 	nsec = torture_setting_int(tctx, "sharedelay", 1000000);
tctx              649 source4/torture/basic/base.c 		torture_comment(tctx, "failed to connect\n");
tctx              653 source4/torture/basic/base.c 	torture_comment(tctx, "Testing deferred open requests.\n");
tctx              672 source4/torture/basic/base.c 					torture_comment(tctx,"Timing incorrect %.2f violation 1 sec == %.2f\n",
tctx              680 source4/torture/basic/base.c 			torture_comment(tctx,"Failed to open %s, error=%s\n", fname, smbcli_errstr(cli->tree));
tctx              684 source4/torture/basic/base.c 		torture_comment(tctx, "pid %u open %d\n", (unsigned)getpid(), i);
tctx              689 source4/torture/basic/base.c 			torture_comment(tctx,"Failed to close %s, error=%s\n", fname, smbcli_errstr(cli->tree));
tctx              698 source4/torture/basic/base.c 			torture_comment(tctx, "unlink of %s failed (%s)\n", fname, smbcli_errstr(cli->tree));
tctx              703 source4/torture/basic/base.c 	torture_comment(tctx, "deferred test finished\n");
tctx              711 source4/torture/basic/base.c static bool run_vuidtest(struct torture_context *tctx, 
tctx              731 source4/torture/basic/base.c 	torture_comment(tctx, "Testing qfileinfo with wrong vuid\n");
tctx              736 source4/torture/basic/base.c 		torture_fail(tctx, "qfileinfo passed with wrong vuid");
tctx              743 source4/torture/basic/base.c 		torture_fail(tctx, talloc_asprintf(tctx, 
tctx              751 source4/torture/basic/base.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum),
tctx              752 source4/torture/basic/base.c 		talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(cli->tree)));
tctx              762 source4/torture/basic/base.c  static bool run_opentest(struct torture_context *tctx, struct smbcli_state *cli1, 
tctx              783 source4/torture/basic/base.c 			torture_comment(tctx, "Error code should be NT_STATUS_OBJECT_NAME_INVALID, was %s for file with %d char\n",
tctx              797 source4/torture/basic/base.c 		torture_comment(tctx, "Create file with control char names passed.\n");
tctx              804 source4/torture/basic/base.c 		torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx              809 source4/torture/basic/base.c 		torture_comment(tctx, "close2 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx              814 source4/torture/basic/base.c 		torture_comment(tctx, "smbcli_setatr failed (%s)\n", smbcli_errstr(cli1->tree));
tctx              821 source4/torture/basic/base.c 		torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx              831 source4/torture/basic/base.c 		torture_comment(tctx, "correct error code ERRDOS/ERRnoaccess returned\n");
tctx              834 source4/torture/basic/base.c 	torture_comment(tctx, "finished open test 1\n");
tctx              844 source4/torture/basic/base.c 		torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx              853 source4/torture/basic/base.c 		torture_comment(tctx, "correct error code ERRDOS/ERRbadshare returned\n");
tctx              857 source4/torture/basic/base.c 		torture_comment(tctx, "close2 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx              863 source4/torture/basic/base.c 	torture_comment(tctx, "finished open test 2\n");
tctx              869 source4/torture/basic/base.c 		torture_comment(tctx, "(3) open (1) of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx              878 source4/torture/basic/base.c 		torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(cli1->tree));
tctx              883 source4/torture/basic/base.c 		torture_comment(tctx, "(3) close1 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx              889 source4/torture/basic/base.c 		torture_comment(tctx, "(3) getatr failed (%s)\n", smbcli_errstr(cli1->tree));
tctx              895 source4/torture/basic/base.c 		torture_comment(tctx, "(3) file size != 20\n");
tctx              904 source4/torture/basic/base.c 		torture_comment(tctx, "(3) open (2) of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx              910 source4/torture/basic/base.c 		torture_comment(tctx, "close2 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx              916 source4/torture/basic/base.c 		torture_comment(tctx, "(3) getatr failed (%s)\n", smbcli_errstr(cli1->tree));
tctx              922 source4/torture/basic/base.c 		torture_comment(tctx, "(3) file size != 0\n");
tctx              926 source4/torture/basic/base.c 	torture_comment(tctx, "finished open test 3\n");
tctx              931 source4/torture/basic/base.c 	torture_comment(tctx, "testing ctemp\n");
tctx              934 source4/torture/basic/base.c 		torture_comment(tctx, "ctemp failed (%s)\n", smbcli_errstr(cli1->tree));
tctx              938 source4/torture/basic/base.c 	torture_comment(tctx, "ctemp gave path %s\n", tmp_path);
tctx              940 source4/torture/basic/base.c 		torture_comment(tctx, "close of temp failed (%s)\n", smbcli_errstr(cli1->tree));
tctx              943 source4/torture/basic/base.c 		torture_comment(tctx, "unlink of temp failed (%s)\n", smbcli_errstr(cli1->tree));
tctx              951 source4/torture/basic/base.c 	torture_comment(tctx, "TEST #1 testing 2 non-io opens (no delete)\n");
tctx              957 source4/torture/basic/base.c 		torture_comment(tctx, "test 1 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx              965 source4/torture/basic/base.c 		torture_comment(tctx, "test 1 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx              971 source4/torture/basic/base.c 		torture_comment(tctx, "test 1 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx              975 source4/torture/basic/base.c 		torture_comment(tctx, "test 1 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx              979 source4/torture/basic/base.c 	torture_comment(tctx, "non-io open test #1 passed.\n");
tctx              983 source4/torture/basic/base.c 	torture_comment(tctx, "TEST #2 testing 2 non-io opens (first with delete)\n");
tctx              989 source4/torture/basic/base.c 		torture_comment(tctx, "test 2 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx              998 source4/torture/basic/base.c 		torture_comment(tctx, "test 2 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx             1004 source4/torture/basic/base.c 		torture_comment(tctx, "test 1 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1008 source4/torture/basic/base.c 		torture_comment(tctx, "test 1 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1012 source4/torture/basic/base.c 	torture_comment(tctx, "non-io open test #2 passed.\n");
tctx             1016 source4/torture/basic/base.c 	torture_comment(tctx, "TEST #3 testing 2 non-io opens (second with delete)\n");
tctx             1022 source4/torture/basic/base.c 		torture_comment(tctx, "test 3 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1031 source4/torture/basic/base.c 		torture_comment(tctx, "test 3 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx             1037 source4/torture/basic/base.c 		torture_comment(tctx, "test 3 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1041 source4/torture/basic/base.c 		torture_comment(tctx, "test 3 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx             1045 source4/torture/basic/base.c 	torture_comment(tctx, "non-io open test #3 passed.\n");
tctx             1049 source4/torture/basic/base.c 	torture_comment(tctx, "TEST #4 testing 2 non-io opens (both with delete)\n");
tctx             1055 source4/torture/basic/base.c 		torture_comment(tctx, "test 4 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1064 source4/torture/basic/base.c 		torture_comment(tctx, "test 4 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx             1069 source4/torture/basic/base.c 	torture_comment(tctx, "test 4 open 2 of %s gave %s (correct error should be %s)\n", fname, smbcli_errstr(cli2->tree), "sharing violation");
tctx             1072 source4/torture/basic/base.c 		torture_comment(tctx, "test 4 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1076 source4/torture/basic/base.c 	torture_comment(tctx, "non-io open test #4 passed.\n");
tctx             1080 source4/torture/basic/base.c 	torture_comment(tctx, "TEST #5 testing 2 non-io opens (both with delete - both with file share delete)\n");
tctx             1086 source4/torture/basic/base.c 		torture_comment(tctx, "test 5 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1095 source4/torture/basic/base.c 		torture_comment(tctx, "test 5 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx             1101 source4/torture/basic/base.c 		torture_comment(tctx, "test 5 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1106 source4/torture/basic/base.c 		torture_comment(tctx, "test 5 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx             1110 source4/torture/basic/base.c 	torture_comment(tctx, "non-io open test #5 passed.\n");
tctx             1112 source4/torture/basic/base.c 	torture_comment(tctx, "TEST #6 testing 1 non-io open, one io open\n");
tctx             1120 source4/torture/basic/base.c 		torture_comment(tctx, "test 6 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1129 source4/torture/basic/base.c 		torture_comment(tctx, "test 6 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx             1135 source4/torture/basic/base.c 		torture_comment(tctx, "test 6 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1140 source4/torture/basic/base.c 		torture_comment(tctx, "test 6 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx             1144 source4/torture/basic/base.c 	torture_comment(tctx, "non-io open test #6 passed.\n");
tctx             1146 source4/torture/basic/base.c 	torture_comment(tctx, "TEST #7 testing 1 non-io open, one io open with delete\n");
tctx             1154 source4/torture/basic/base.c 		torture_comment(tctx, "test 7 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1163 source4/torture/basic/base.c 		torture_comment(tctx, "test 7 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx             1168 source4/torture/basic/base.c 	torture_comment(tctx, "test 7 open 2 of %s gave %s (correct error should be %s)\n", fname, smbcli_errstr(cli2->tree), "sharing violation");
tctx             1171 source4/torture/basic/base.c 		torture_comment(tctx, "test 7 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1175 source4/torture/basic/base.c 	torture_comment(tctx, "non-io open test #7 passed.\n");
tctx             1179 source4/torture/basic/base.c 	torture_comment(tctx, "TEST #8 testing one normal open, followed by lock, followed by open with truncate\n");
tctx             1185 source4/torture/basic/base.c 		torture_comment(tctx, "(8) open (1) of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1194 source4/torture/basic/base.c 		torture_comment(tctx, "(8) write failed (%s)\n", smbcli_errstr(cli1->tree));
tctx             1200 source4/torture/basic/base.c 		torture_comment(tctx, "(8) getatr (1) failed (%s)\n", smbcli_errstr(cli1->tree));
tctx             1206 source4/torture/basic/base.c 		torture_comment(tctx, "(8) file size != 20\n");
tctx             1213 source4/torture/basic/base.c 		torture_comment(tctx, "(8) lock1 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx             1220 source4/torture/basic/base.c 		torture_comment(tctx, "(8) open (2) of %s with truncate failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx             1226 source4/torture/basic/base.c 		torture_comment(tctx, "(8) getatr (2) failed (%s)\n", smbcli_errstr(cli1->tree));
tctx             1232 source4/torture/basic/base.c 		torture_comment(tctx, "(8) file size != 0\n");
tctx             1238 source4/torture/basic/base.c 		torture_comment(tctx, "(8) close1 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx             1243 source4/torture/basic/base.c 		torture_comment(tctx, "(8) close1 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx             1249 source4/torture/basic/base.c 	torture_comment(tctx, "open test #8 passed.\n");
tctx             1280 source4/torture/basic/base.c static bool run_xcopy(struct torture_context *tctx,
tctx             1293 source4/torture/basic/base.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, 
tctx             1300 source4/torture/basic/base.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, 
tctx             1306 source4/torture/basic/base.c static bool run_iometer(struct torture_context *tctx,
tctx             1319 source4/torture/basic/base.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx             1320 source4/torture/basic/base.c 		talloc_asprintf(tctx, "smbcli_getatr failed: %s", nt_errstr(status)));
tctx             1322 source4/torture/basic/base.c 	torture_comment(tctx, "size: %d\n", (int)filesize);
tctx             1328 source4/torture/basic/base.c 	torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, "open failed: %s", 
tctx             1346 source4/torture/basic/base.c 			torture_assert(tctx, res == sizeof(buf), 
tctx             1347 source4/torture/basic/base.c 						   talloc_asprintf(tctx, "read failed: %s",
tctx             1357 source4/torture/basic/base.c 			torture_assert(tctx, res == sizeof(buf),
tctx             1358 source4/torture/basic/base.c 						   talloc_asprintf(tctx, "read failed: %s",
tctx             1369 source4/torture/basic/base.c static bool torture_chkpath_test(struct torture_context *tctx, 
tctx             1375 source4/torture/basic/base.c 	torture_comment(tctx, "Testing valid and invalid paths\n");
tctx             1383 source4/torture/basic/base.c 		torture_comment(tctx, "mkdir1 failed : %s\n", smbcli_errstr(cli->tree));
tctx             1388 source4/torture/basic/base.c 		torture_comment(tctx, "mkdir2 failed : %s\n", smbcli_errstr(cli->tree));
tctx             1394 source4/torture/basic/base.c 		torture_comment(tctx, "open1 failed (%s)\n", smbcli_errstr(cli->tree));
tctx             1400 source4/torture/basic/base.c 		torture_comment(tctx, "chkpath1 failed: %s\n", smbcli_errstr(cli->tree));
tctx             1405 source4/torture/basic/base.c 		torture_comment(tctx, "chkpath2 failed: %s\n", smbcli_errstr(cli->tree));
tctx             1413 source4/torture/basic/base.c 		torture_comment(tctx, "* chkpath on a file should fail\n");
tctx             1421 source4/torture/basic/base.c 		torture_comment(tctx, "* chkpath on a non existent file should fail\n");
tctx             1429 source4/torture/basic/base.c 		torture_comment(tctx, "* chkpath on a non existent component should fail\n");
tctx             1444 source4/torture/basic/base.c static bool torture_samba3_errorpaths(struct torture_context *tctx)
tctx             1455 source4/torture/basic/base.c 	nt_status_support = lp_nt_status_support(tctx->lp_ctx);
tctx             1457 source4/torture/basic/base.c 	if (!lp_set_cmdline(tctx->lp_ctx, "nt status support", "yes")) {
tctx             1458 source4/torture/basic/base.c 		torture_comment(tctx, "Could not set 'nt status support = yes'\n");
tctx             1462 source4/torture/basic/base.c 	if (!torture_open_connection(&cli_nt, tctx, 0)) {
tctx             1466 source4/torture/basic/base.c 	if (!lp_set_cmdline(tctx->lp_ctx, "nt status support", "no")) {
tctx             1467 source4/torture/basic/base.c 		torture_comment(tctx, "Could not set 'nt status support = yes'\n");
tctx             1471 source4/torture/basic/base.c 	if (!torture_open_connection(&cli_dos, tctx, 1)) {
tctx             1475 source4/torture/basic/base.c 	if (!lp_set_cmdline(tctx->lp_ctx, "nt status support",
tctx             1477 source4/torture/basic/base.c 		torture_comment(tctx, "Could not reset 'nt status support = yes'");
tctx             1485 source4/torture/basic/base.c 		torture_comment(tctx, "smbcli_mkdir(%s) failed: %s\n", dname,
tctx             1503 source4/torture/basic/base.c 	status = smb_raw_open(cli_nt->tree, tctx, &io);
tctx             1505 source4/torture/basic/base.c 		torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx             1510 source4/torture/basic/base.c 	status = smb_raw_open(cli_dos->tree, tctx, &io);
tctx             1512 source4/torture/basic/base.c 		torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx             1520 source4/torture/basic/base.c 		torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx             1527 source4/torture/basic/base.c 		torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx             1544 source4/torture/basic/base.c 				tctx, "(%s) incorrect status %s should be "
tctx             1552 source4/torture/basic/base.c 			torture_comment(tctx, "(%s) incorrect status %s "
tctx             1560 source4/torture/basic/base.c 	status = smb_raw_open(cli_nt->tree, tctx, &io);
tctx             1562 source4/torture/basic/base.c 		torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx             1568 source4/torture/basic/base.c 	status = smb_raw_open(cli_dos->tree, tctx, &io);
tctx             1570 source4/torture/basic/base.c 		torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx             1582 source4/torture/basic/base.c 			torture_comment(tctx, "Open(%s) with invalid deny mode succeeded -- "
tctx             1589 source4/torture/basic/base.c 			torture_comment(tctx, "Expected DOS error ERRDOS/ERRbadaccess, "
tctx             1596 source4/torture/basic/base.c 			torture_comment(tctx, "Open(%s) with invalid deny mode succeeded -- "
tctx             1603 source4/torture/basic/base.c 			torture_comment(tctx, "Expected DOS error ERRDOS:ERRbadaccess, "
tctx             1641 source4/torture/basic/base.c 		status = smb_raw_open(cli_nt->tree, tctx, &io);
tctx             1643 source4/torture/basic/base.c 			torture_comment(tctx, "ntcreate as dir gave %s, "
tctx             1653 source4/torture/basic/base.c 		status = smb_raw_open(cli_dos->tree, tctx, &io);
tctx             1656 source4/torture/basic/base.c 			torture_comment(tctx, "ntcreate as dir gave %s, "
tctx             1670 source4/torture/basic/base.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx             1678 source4/torture/basic/base.c 		torture_comment(tctx, "Open(%s) succeeded -- expected failure\n",
tctx             1686 source4/torture/basic/base.c 		torture_comment(tctx, "Expected DOS error ERRDOS/ERRcannotopen, got %s\n",
tctx             1695 source4/torture/basic/base.c 		torture_comment(tctx, "Open(%s) succeeded -- expected failure\n",
tctx             1703 source4/torture/basic/base.c 		torture_comment(tctx, "Expected error NT_STATUS_OBJECT_NAME_NOT_FOUND, "
tctx               36 source4/torture/basic/charset.c static NTSTATUS unicode_open(struct torture_context *tctx,
tctx               59 source4/torture/basic/charset.c 	if (!convert_string_talloc_convenience(ucs_name, lp_iconv_convenience(tctx->lp_ctx), CH_UTF16, CH_UNIX, ucs_name, (1+u_name_len)*2, (void **)&fname, &i, false)) {
tctx               60 source4/torture/basic/charset.c 		torture_comment(tctx, "Failed to convert UCS2 Name into unix - convert_string_talloc() failure\n");
tctx               85 source4/torture/basic/charset.c 	status = smb_raw_open(tree, tctx, &io);
tctx               96 source4/torture/basic/charset.c static bool test_composed(struct torture_context *tctx, 
tctx              103 source4/torture/basic/charset.c 	torture_assert(tctx, torture_setup_dir(cli, BASEDIR), 
tctx              106 source4/torture/basic/charset.c 	status1 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 2);
tctx              107 source4/torture/basic/charset.c 	torture_assert_ntstatus_ok(tctx, status1, "Failed to create composed name");
tctx              109 source4/torture/basic/charset.c 	status2 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 1);
tctx              111 source4/torture/basic/charset.c 	torture_assert_ntstatus_ok(tctx, status2, "Failed to create accented character");
tctx              119 source4/torture/basic/charset.c static bool test_diacritical(struct torture_context *tctx, 
tctx              126 source4/torture/basic/charset.c 	torture_assert(tctx, torture_setup_dir(cli, BASEDIR), 
tctx              129 source4/torture/basic/charset.c 	status1 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 1);
tctx              131 source4/torture/basic/charset.c 	torture_assert_ntstatus_ok(tctx, status1, "Failed to create naked diacritical");
tctx              134 source4/torture/basic/charset.c 	status2 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 2);
tctx              136 source4/torture/basic/charset.c 	torture_assert_ntstatus_ok(tctx, status2, "Failed to create double naked diacritical");
tctx              144 source4/torture/basic/charset.c static bool test_surrogate(struct torture_context *tctx, 
tctx              152 source4/torture/basic/charset.c 	torture_assert(tctx, torture_setup_dir(cli, BASEDIR), 
tctx              155 source4/torture/basic/charset.c 	status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 1);
tctx              157 source4/torture/basic/charset.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to create partial surrogate 1");
tctx              159 source4/torture/basic/charset.c 	status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 1);
tctx              161 source4/torture/basic/charset.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to create partial surrogate 2");
tctx              163 source4/torture/basic/charset.c 	status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name3, 2);
tctx              165 source4/torture/basic/charset.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to create full surrogate");
tctx              173 source4/torture/basic/charset.c static bool test_widea(struct torture_context *tctx, 
tctx              181 source4/torture/basic/charset.c 	torture_assert(tctx, torture_setup_dir(cli, BASEDIR), 
tctx              184 source4/torture/basic/charset.c 	status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 1);
tctx              186 source4/torture/basic/charset.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to create 'a'");
tctx              188 source4/torture/basic/charset.c 	status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 1);
tctx              190 source4/torture/basic/charset.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to create wide-a");
tctx              192 source4/torture/basic/charset.c 	status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name3, 1);
tctx              194 source4/torture/basic/charset.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_COLLISION, 
tctx               35 source4/torture/basic/delaywrite.c static bool test_delayed_write_update(struct torture_context *tctx, struct smbcli_state *cli)
tctx               45 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx               50 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update\n");
tctx               58 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname);
tctx               66 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx               68 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx               70 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Initial write time %s\n", 
tctx               71 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo1.basic_info.out.write_time));
tctx               80 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, 
tctx               89 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx               96 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n", 
tctx               97 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx              101 source4/torture/basic/delaywrite.c 				torture_comment(tctx, "Server updated write_time after %.2f seconds"
tctx              108 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds"
tctx              118 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, 
tctx              132 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1(struct torture_context *tctx, struct smbcli_state *cli)
tctx              142 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx              148 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update1\n");
tctx              156 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname);
tctx              174 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx              176 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx              178 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Initial write time %s\n", 
tctx              179 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo1.all_info.out.write_time));
tctx              185 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, 
tctx              194 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx              203 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, 
tctx              210 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n",
tctx              211 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo2.all_info.out.write_time));
tctx              215 source4/torture/basic/delaywrite.c 				torture_comment(tctx, "After SMBwrite truncate "
tctx              223 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "After SMBwrite truncate "
tctx              234 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, 
tctx              243 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, 
tctx              252 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo3);
tctx              267 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n",
tctx              268 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo3.all_info.out.write_time));
tctx              272 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "server updated write_time after %.2f seconds"
tctx              282 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, 
tctx              291 source4/torture/basic/delaywrite.c 	status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4);
tctx              292 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, "pathinfo failed");
tctx              295 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL,
tctx              299 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated write time on close (correct)\n");
tctx              313 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1a(struct torture_context *tctx, struct smbcli_state *cli)
tctx              323 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx              329 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update1a\n");
tctx              337 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname);
tctx              355 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx              357 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx              359 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Initial write time %s\n", 
tctx              360 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo1.all_info.out.write_time));
tctx              366 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, "write failed - wrote %d bytes (%s)",
tctx              374 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx              377 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s", 
tctx              384 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, 
tctx              391 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n",
tctx              392 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo2.all_info.out.write_time));
tctx              396 source4/torture/basic/delaywrite.c 				torture_comment(tctx, "After SMBwrite truncate "
tctx              404 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "After SMBwrite truncate "
tctx              415 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, 
tctx              423 source4/torture/basic/delaywrite.c 	torture_assert_int_equal(tctx, written, 1, 
tctx              429 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo3);
tctx              432 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s\n", 
tctx              439 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, 
tctx              446 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n",
tctx              447 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo3.all_info.out.write_time));
tctx              451 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "server updated write_time after %.2f seconds"
tctx              461 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, 
tctx              470 source4/torture/basic/delaywrite.c 	status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4);
tctx              471 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, "pathinfo failed");
tctx              474 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, 
tctx              478 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated write time on close (correct)\n");
tctx              492 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1b(struct torture_context *tctx, struct smbcli_state *cli)
tctx              502 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx              508 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update1b\n");
tctx              516 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname);
tctx              534 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx              536 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx              538 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Initial write time %s\n",
tctx              539 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo1.all_info.out.write_time));
tctx              544 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, "SET_END_OF_FILE failed");
tctx              549 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx              558 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL,
tctx              565 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n",
tctx              566 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo2.all_info.out.write_time));
tctx              570 source4/torture/basic/delaywrite.c 				torture_result(tctx, TORTURE_FAIL, 
tctx              579 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "After SET_END_OF_FILE truncate "
tctx              590 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL,
tctx              598 source4/torture/basic/delaywrite.c 	torture_assert_int_equal(tctx, written, 1, 
tctx              604 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo3);
tctx              607 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL,
tctx              620 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n",
tctx              621 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo3.all_info.out.write_time));
tctx              625 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "server updated write_time after %.2f seconds"
tctx              635 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, "Server updated write time (wrong!)\n");
tctx              643 source4/torture/basic/delaywrite.c 	status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4);
tctx              644 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, "pathinfo failed");
tctx              647 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, "Server did not update write time on close (wrong!)\n");
tctx              650 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated write time on close (correct)\n");
tctx              663 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1c(struct torture_context *tctx, struct smbcli_state *cli)
tctx              674 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx              680 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update1c\n");
tctx              688 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname);
tctx              706 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx              708 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx              710 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Initial write time %s\n",
tctx              711 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo1.all_info.out.write_time));
tctx              720 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              726 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx              729 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s", 
tctx              736 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, 
tctx              743 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n",
tctx              744 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo2.all_info.out.write_time));
tctx              748 source4/torture/basic/delaywrite.c 				torture_comment(tctx, "After SET_ALLOCATION_INFO truncate "
tctx              756 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "After SET_ALLOCATION_INFO truncate "
tctx              767 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, 
tctx              774 source4/torture/basic/delaywrite.c 	torture_assert_int_equal(tctx, written, 1, 
tctx              780 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo3);
tctx              783 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s", 
tctx              790 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, "file not expanded");
tctx              795 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n",
tctx              796 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo3.all_info.out.write_time));
tctx              800 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "server updated write_time after %.2f seconds"
tctx              810 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, 
tctx              819 source4/torture/basic/delaywrite.c 	status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4);
tctx              820 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, "pathinfo failed");
tctx              823 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, "Server did not update write time on close (wrong!)\n");
tctx              826 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated write time on close (correct)\n");
tctx              841 source4/torture/basic/delaywrite.c static bool test_delayed_write_update2(struct torture_context *tctx, struct smbcli_state *cli, 
tctx              853 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx              859 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update2\n");
tctx              867 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Failed to open %s\n", fname);
tctx              875 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx              877 source4/torture/basic/delaywrite.c 	torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx              879 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Initial write time %s\n", 
tctx              880 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo1.basic_info.out.write_time));
tctx              907 source4/torture/basic/delaywrite.c 		torture_assert_ntstatus_ok(tctx, status, "sfileinfo failed");
tctx              912 source4/torture/basic/delaywrite.c 	status = smb_raw_pathinfo(cli2->tree, tctx, &finfo2);
tctx              918 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "write time %s\n",
tctx              919 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx              922 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated write_time (correct)\n");
tctx              924 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, "Server did not update write time (wrong!)\n");
tctx              934 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx              941 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Modified write time %s\n", 
tctx              942 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo1.basic_info.out.write_time));
tctx              945 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Doing a 10 byte write to extend the file and see if this changes the last write time.\n");
tctx              950 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write failed - wrote %d bytes (%s)\n", 
tctx              958 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Doing flush after write\n");
tctx              973 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx              980 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n", 
tctx              981 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx              984 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds"
tctx              995 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write time (correct)\n");
tctx             1000 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Failed to open %s\n", fname);
tctx             1004 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Doing a 10 byte write to extend the file via second fd and see if this changes the last write time.\n");
tctx             1009 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write failed - wrote %d bytes (%s)\n", 
tctx             1014 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx             1020 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "write time %s\n", 
tctx             1021 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx             1023 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated write_time (wrong!)\n");
tctx             1027 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Closing the first fd to see if write time updated.\n");
tctx             1031 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Doing a 10 byte write to extend the file via second fd and see if this changes the last write time.\n");
tctx             1036 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write failed - wrote %d bytes (%s)\n", 
tctx             1044 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx             1050 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "write time %s\n", 
tctx             1051 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx             1053 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated write_time (wrong!)\n");
tctx             1062 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx             1069 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n", 
tctx             1070 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx             1073 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             1084 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write time (correct)\n");
tctx             1087 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Closing second fd to see if write time updated.\n");
tctx             1094 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Failed to open %s\n", fname);
tctx             1102 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx             1109 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Second open initial write time %s\n", 
tctx             1110 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo1.basic_info.out.write_time));
tctx             1113 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Doing a 10 byte write to extend the file to see if this changes the last write time.\n");
tctx             1118 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write failed - wrote %d bytes (%s)\n", 
tctx             1126 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx             1132 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "write time %s\n", 
tctx             1133 source4/torture/basic/delaywrite.c 	       nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx             1135 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated write_time (wrong!)\n");
tctx             1143 source4/torture/basic/delaywrite.c 		status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx             1150 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "write time %s\n", 
tctx             1151 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx             1155 source4/torture/basic/delaywrite.c 				torture_comment(tctx, "Server updated write_time after %.2f seconds"
tctx             1162 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds"
tctx             1172 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, "Server did not update write time (wrong!)\n");
tctx             1200 source4/torture/basic/delaywrite.c static bool test_finfo_after_write(struct torture_context *tctx, struct smbcli_state *cli, 
tctx             1210 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx             1215 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_finfo_after_write\n");
tctx             1224 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx             1231 source4/torture/basic/delaywrite.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx             1235 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s", nt_errstr(status));
tctx             1244 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             1251 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": failed to open 2nd time - %s", 
tctx             1260 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", 
tctx             1269 source4/torture/basic/delaywrite.c 	status = smb_raw_pathinfo(cli2->tree, tctx, &finfo2);
tctx             1272 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s", 
tctx             1280 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": create_time changed");
tctx             1287 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": access_time changed");
tctx             1294 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": write_time changed:\n"
tctx             1296 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo1.basic_info.out.write_time),
tctx             1297 source4/torture/basic/delaywrite.c 		       nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx             1304 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": change_time changed");
tctx             1321 source4/torture/basic/delaywrite.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo2);
tctx             1324 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s", nt_errstr(status));
tctx             1344 source4/torture/basic/delaywrite.c 	bool strict = torture_setting_bool(tctx, "strict mode", false); \
tctx             1353 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": wrong write_time (%s)%s(%llu) %s (%s)%s(%llu)", \
tctx             1354 source4/torture/basic/delaywrite.c 				#given, nt_time_string(tctx, g), (unsigned long long)g, \
tctx             1355 source4/torture/basic/delaywrite.c 				#cmp, #correct, nt_time_string(tctx, c), (unsigned long long)c); \
tctx             1371 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": wrong access_time (%s)%s %s (%s)%s", \
tctx             1372 source4/torture/basic/delaywrite.c 				#given, nt_time_string(tctx, g), \
tctx             1373 source4/torture/basic/delaywrite.c 				#cmp, #correct, nt_time_string(tctx, c)); \
tctx             1388 source4/torture/basic/delaywrite.c 	_status = smb_raw_fileinfo(cli->tree, tctx, &finfo); \
tctx             1391 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s", \
tctx             1395 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "fileinfo: Access(%s) Write(%s)\n", \
tctx             1396 source4/torture/basic/delaywrite.c 			nt_time_string(tctx, finfo.basic_info.out.access_time), \
tctx             1397 source4/torture/basic/delaywrite.c 			nt_time_string(tctx, finfo.basic_info.out.write_time)); \
tctx             1401 source4/torture/basic/delaywrite.c 	_status = smb_raw_pathinfo(cli2->tree, tctx, &pinfo); \
tctx             1403 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": pathinfo failed: %s", \
tctx             1408 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "pathinfo: Access(%s) Write(%s)\n", \
tctx             1409 source4/torture/basic/delaywrite.c 			nt_time_string(tctx, pinfo.basic_info.out.access_time), \
tctx             1410 source4/torture/basic/delaywrite.c 			nt_time_string(tctx, pinfo.basic_info.out.write_time)); \
tctx             1430 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": setfileinfo failed: %s", \
tctx             1439 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3(struct torture_context *tctx,
tctx             1451 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx             1456 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update3\n");
tctx             1462 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Open the file handle\n");
tctx             1466 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx             1496 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a write on the file handle\n");
tctx             1499 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             1509 source4/torture/basic/delaywrite.c 				torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             1516 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             1532 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a write on the file handle\n");
tctx             1535 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             1544 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             1556 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx             1569 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Close the file handle\n");
tctx             1577 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated the write_time on close (correct)\n");
tctx             1594 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3a(struct torture_context *tctx,
tctx             1607 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx             1612 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update3a\n");
tctx             1618 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Open the file handle\n");
tctx             1622 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx             1662 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a write on the file handle\n");
tctx             1665 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             1675 source4/torture/basic/delaywrite.c 				torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             1682 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             1700 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a truncate SMBwrite [%d] on the file handle\n", i);
tctx             1703 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written);
tctx             1718 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a write on the file handle\n");
tctx             1721 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             1730 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             1742 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx             1759 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a truncate SMBwrite [%d] on the file handle\n", i);
tctx             1762 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written);
tctx             1781 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Close the file handle\n");
tctx             1789 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update the write_time on close (correct)\n");
tctx             1806 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3b(struct torture_context *tctx,
tctx             1818 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx             1823 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update3b\n");
tctx             1829 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Open the file handle\n");
tctx             1833 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx             1873 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a write on the file handle\n");
tctx             1876 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             1886 source4/torture/basic/delaywrite.c 				torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             1893 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             1909 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a write on the file handle\n");
tctx             1912 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             1921 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             1933 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx             1946 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Close the file handle\n");
tctx             1954 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated the write_time on close (correct)\n");
tctx             1973 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3c(struct torture_context *tctx,
tctx             1986 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx             1991 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update3c\n");
tctx             1997 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Open the file handle\n");
tctx             2001 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx             2039 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a truncate SMBwrite [%d] on the file handle\n", i);
tctx             2042 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written);
tctx             2056 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a write on the file handle\n");
tctx             2059 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             2068 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             2080 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx             2097 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a truncate write [%d] on the file handle\n", i);
tctx             2100 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written);
tctx             2121 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a write on the file handle\n");
tctx             2124 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             2133 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             2145 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx             2158 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Close the file handle\n");
tctx             2166 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated the write_time on close (correct)\n");
tctx             2184 source4/torture/basic/delaywrite.c static bool test_delayed_write_update4(struct torture_context *tctx,
tctx             2196 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx             2201 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update4\n");
tctx             2207 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Open the file handle\n");
tctx             2211 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx             2236 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Do a write on the file handle\n");
tctx             2239 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             2261 source4/torture/basic/delaywrite.c 				torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             2268 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             2284 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a write on the file handle\n");
tctx             2287 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             2296 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             2308 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not updatewrite_time (correct)\n");
tctx             2321 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Close the file handle\n");
tctx             2329 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated the write_time on close (correct)\n");
tctx             2345 source4/torture/basic/delaywrite.c static bool test_delayed_write_update5(struct torture_context *tctx,
tctx             2357 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx             2362 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update5\n");
tctx             2368 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Open the file handle\n");
tctx             2372 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx             2396 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Do a write on the file handle\n");
tctx             2399 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             2407 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Set write time in the future on the file handle\n");
tctx             2412 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Set write time in the past on the file handle\n");
tctx             2427 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             2439 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx             2447 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a write on the file handle\n");
tctx             2450 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             2459 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             2471 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx             2483 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Close the file handle\n");
tctx             2491 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update the write_time on close (correct)\n");
tctx             2507 source4/torture/basic/delaywrite.c static bool test_delayed_write_update5b(struct torture_context *tctx,
tctx             2519 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx             2524 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update5b\n");
tctx             2530 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Open the file handle\n");
tctx             2534 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx             2558 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Do a write on the file handle\n");
tctx             2561 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             2569 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Set write time in the future on the file handle\n");
tctx             2574 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Set write time in the past on the file handle\n");
tctx             2589 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             2601 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx             2609 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a truncate write on the file handle\n");
tctx             2612 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             2621 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             2633 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx             2645 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Close the file handle\n");
tctx             2653 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update the write_time on close (correct)\n");
tctx             2673 source4/torture/basic/delaywrite.c static bool test_delayed_write_update6(struct torture_context *tctx,
tctx             2686 source4/torture/basic/delaywrite.c 	int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx             2692 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "\nRunning test_delayed_write_update6\n");
tctx             2698 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Open the file handle\n");
tctx             2702 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx             2707 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Open the 2nd file handle on 2nd connection\n");
tctx             2711 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx             2737 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Do a write on the file handle\n");
tctx             2740 source4/torture/basic/delaywrite.c 		torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             2748 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Set write time in the future on the 2nd file handle\n");
tctx             2753 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Set write time in the past on the 2nd file handle\n");
tctx             2768 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             2780 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx             2788 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Do a write on the file handle\n");
tctx             2791 source4/torture/basic/delaywrite.c 			torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx             2800 source4/torture/basic/delaywrite.c 			torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx             2812 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx             2825 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Close the file handle\n");
tctx             2833 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server updated the write_time on close (correct)\n");
tctx             2846 source4/torture/basic/delaywrite.c 	torture_comment(tctx, "Close the 2nd file handle\n");
tctx             2854 source4/torture/basic/delaywrite.c 		torture_comment(tctx, "Server did not update the write_time on close (correct)\n");
tctx               32 source4/torture/basic/delete.c static bool check_delete_on_close(struct torture_context *tctx, 
tctx               44 source4/torture/basic/delete.c 	status = torture_single_search(cli, tctx,
tctx               50 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx               51 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "single_search failed (%s)", where));
tctx               60 source4/torture/basic/delete.c 		status = smb_raw_fileinfo(cli->tree, tctx, &io);
tctx               61 source4/torture/basic/delete.c 		torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, 
tctx               64 source4/torture/basic/delete.c 		torture_assert(tctx, expect_it == io.all_info.out.delete_pending, 
tctx               65 source4/torture/basic/delete.c 			talloc_asprintf(tctx, 
tctx               69 source4/torture/basic/delete.c 		torture_assert(tctx, nlink == io.all_info.out.nlink, 
tctx               70 source4/torture/basic/delete.c 			talloc_asprintf(tctx, 
tctx               77 source4/torture/basic/delete.c 		status = smb_raw_fileinfo(cli->tree, tctx, &io);
tctx               78 source4/torture/basic/delete.c 		torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "qpathinfo failed (%s)", where));
tctx               80 source4/torture/basic/delete.c 		torture_assert(tctx, expect_it == io.standard_info.out.delete_pending,
tctx               81 source4/torture/basic/delete.c 			talloc_asprintf(tctx, "%s - Expected del_on_close flag %d, qfileinfo/standard_info gave %d\n",
tctx               84 source4/torture/basic/delete.c 		torture_assert(tctx, nlink == io.standard_info.out.nlink,
tctx               85 source4/torture/basic/delete.c 			talloc_asprintf(tctx, "%s - Expected nlink %d, qfileinfo/standard_info gave %d",
tctx               94 source4/torture/basic/delete.c 		torture_assert_ntstatus_equal(tctx, status, NT_STATUS_DELETE_PENDING,
tctx               97 source4/torture/basic/delete.c 		torture_assert_ntstatus_ok(tctx, status, 
tctx               98 source4/torture/basic/delete.c 			talloc_asprintf(tctx, "qpathinfo failed (%s)", where));
tctx              105 source4/torture/basic/delete.c 	torture_assert_ntstatus_equal(tctx, _cli->tree->session->transport->error.e.nt_status, _expected, \
tctx              126 source4/torture/basic/delete.c static bool deltest1(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              138 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              141 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), 
tctx              142 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(cli1->tree)));
tctx              145 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail)", 
tctx              152 source4/torture/basic/delete.c static bool deltest2(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              163 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, 
tctx              164 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              167 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli1->tree, fnum1, true), 
tctx              168 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "setting delete_on_close failed (%s)", 
tctx              171 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), 
tctx              172 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close failed (%s)", 
tctx              190 source4/torture/basic/delete.c static bool deltest3(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              203 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx              215 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 == -1, 
tctx              216 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "open  - 2 of %s succeeded - should have failed.", 
tctx              227 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open  - 2 of %s failed (%s)", 
tctx              230 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, 
tctx              232 source4/torture/basic/delete.c 							   talloc_asprintf(tctx, "setting delete_on_close failed (%s)", 
tctx              235 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx              236 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close 1 failed (%s)", 
tctx              239 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum2),
tctx              240 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close 2 failed (%s)", 
tctx              260 source4/torture/basic/delete.c static bool deltest4(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              276 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              287 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open  - 2 of %s failed (%s)", 
tctx              290 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, 
tctx              292 source4/torture/basic/delete.c 		 			talloc_asprintf(tctx, "close - 1 failed (%s)", 
tctx              295 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, 
tctx              297 source4/torture/basic/delete.c 		 		talloc_asprintf(tctx, "setting delete_on_close failed (%s)", 
tctx              306 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 == -1, 
tctx              307 source4/torture/basic/delete.c 		 talloc_asprintf(tctx, "open  - 3 of %s succeeded ! Should have failed.",
tctx              312 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), 
tctx              313 source4/torture/basic/delete.c 		 talloc_asprintf(tctx, "close - 2 failed (%s)", 
tctx              320 source4/torture/basic/delete.c static bool deltest5(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              327 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              332 source4/torture/basic/delete.c 	torture_assert(tctx, !NT_STATUS_IS_OK(smbcli_nt_delete_on_close(cli1->tree, fnum1, true)),
tctx              335 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx              336 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close - 2 failed (%s)", smbcli_errstr(cli1->tree)));
tctx              342 source4/torture/basic/delete.c static bool deltest6(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              356 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              361 source4/torture/basic/delete.c 	torture_assert(tctx, 
tctx              365 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, 
tctx              367 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close - 2 failed (%s)", 
tctx              374 source4/torture/basic/delete.c static bool deltest7(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              388 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              391 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli1->tree, fnum1, true),
tctx              394 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__);
tctx              396 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, 
tctx              400 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx              402 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), 
tctx              403 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close - 2 failed (%s)", smbcli_errstr(cli1->tree)));
tctx              408 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              411 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), 
tctx              412 source4/torture/basic/delete.c 		 				       talloc_asprintf(tctx, "close - 2 failed (%s)", 
tctx              419 source4/torture/basic/delete.c static bool deltest8(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              435 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1,
tctx              436 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              447 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              450 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, 
tctx              454 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__);
tctx              455 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__);
tctx              457 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx              458 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close - 1 failed (%s)", 
tctx              461 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, -1, fname, true, __location__);
tctx              462 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__);
tctx              464 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2),
tctx              465 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close - 2 failed (%s)", smbcli_errstr(cli2->tree)));
tctx              469 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1,
tctx              470 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "open of %s succeeded should have been deleted on close !\n", fname));
tctx              476 source4/torture/basic/delete.c static bool deltest9(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              490 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, 
tctx              491 source4/torture/basic/delete.c 				   talloc_asprintf(tctx, "open of %s succeeded should have failed!", 
tctx              498 source4/torture/basic/delete.c static bool deltest10(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              512 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, 
tctx              513 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              517 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx              518 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close failed (%s)", 
tctx              523 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, 
tctx              524 source4/torture/basic/delete.c 				talloc_asprintf(tctx, "open of %s succeeded should have been deleted on close !",
tctx              530 source4/torture/basic/delete.c static bool deltest11(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              545 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              550 source4/torture/basic/delete.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_CANNOT_DELETE, 
tctx              551 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "setting delete_on_close should fail with NT_STATUS_CANNOT_DELETE. Got %s instead)", smbcli_errstr(cli1->tree)));
tctx              553 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx              554 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close failed (%s)", 
tctx              561 source4/torture/basic/delete.c static bool deltest12(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              578 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, 
tctx              579 source4/torture/basic/delete.c 		 talloc_asprintf(tctx, "open of %s succeeded. Should fail with "
tctx              583 source4/torture/basic/delete.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_CANNOT_DELETE, 
tctx              584 source4/torture/basic/delete.c 			 talloc_asprintf(tctx, "setting delete_on_close on open should "
tctx              593 source4/torture/basic/delete.c static bool deltest13(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              615 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, 
tctx              616 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx              629 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, 
tctx              633 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, 
tctx              638 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__);
tctx              639 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__);
tctx              641 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli2->tree, fnum2,
tctx              645 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx              646 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx              648 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), 
tctx              649 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "close - 1 failed (%s)", 
tctx              652 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2),
tctx              653 source4/torture/basic/delete.c 			talloc_asprintf(tctx, "close - 2 failed (%s)", 
tctx              658 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed!", 
tctx              667 source4/torture/basic/delete.c static bool deltest14(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              685 source4/torture/basic/delete.c 	torture_assert(tctx, dnum1 != -1, talloc_asprintf(tctx, "open of %s failed: %s!", 
tctx              688 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, dnum1, dname, false, __location__);
tctx              689 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli1->tree, dnum1, true),
tctx              691 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, dnum1, dname, true, __location__);
tctx              705 source4/torture/basic/delete.c 	torture_assert(tctx, dnum1 == -1, "setting delete_on_close on file succeeded !");
tctx              711 source4/torture/basic/delete.c static bool deltest15(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              735 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, 
tctx              736 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "open - 1 of %s failed (%s)", fname, smbcli_errstr(cli1->tree)));
tctx              740 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, status, "renaming failed!");
tctx              751 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, 
tctx              752 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx              757 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              765 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname_new, true, __location__);
tctx              776 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx              779 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx              793 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx              807 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, 
tctx              815 source4/torture/basic/delete.c static bool deltest16(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              841 source4/torture/basic/delete.c 	torture_assert (tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", fname, smbcli_errstr(cli1->tree)));
tctx              844 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx              847 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, -1, fname, false, __location__);
tctx              848 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, -1, fname, false, __location__);
tctx              861 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx              864 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx              865 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, -1, fname, false, __location__);
tctx              866 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx              867 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, -1, fname, false, __location__);
tctx              871 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__);
tctx              872 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, -1, fname, true, __location__);
tctx              878 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail)", 
tctx              885 source4/torture/basic/delete.c static bool deltest17(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              910 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx              926 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx              930 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx              944 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx              948 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx              949 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum2, fname, false, __location__);
tctx              954 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum2, fname, true, __location__);
tctx              960 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s failed (should succeed) - %s",
tctx              969 source4/torture/basic/delete.c static bool deltest18(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              997 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx             1006 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, dname, false, __location__);
tctx             1020 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx             1023 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, dname, false, __location__);
tctx             1024 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum2, dname, false, __location__);
tctx             1028 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum2, dname, true, __location__);
tctx             1041 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail)", 
tctx             1048 source4/torture/basic/delete.c static bool deltest19(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1072 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx             1090 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, 
tctx             1091 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "open - 1 of %s failed (%s)", fname, smbcli_errstr(cli1->tree)));
tctx             1099 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, dname, false, __location__);
tctx             1112 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx             1117 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum2, dname, true, __location__);
tctx             1133 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, 
tctx             1134 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "open of %s succeeded (should fail)", dname));
tctx             1140 source4/torture/basic/delete.c static bool deltest20(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1151 source4/torture/basic/delete.c 	if (torture_setting_bool(tctx, "samba3", false)) {
tctx             1167 source4/torture/basic/delete.c 	torture_assert(tctx, dnum1 != -1, talloc_asprintf(tctx, "open of %s failed: %s!", 
tctx             1170 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, dnum1, dname, false, __location__);
tctx             1178 source4/torture/basic/delete.c 		torture_assert(tctx, fnum1 == -1, 
tctx             1183 source4/torture/basic/delete.c 		torture_assert_ntstatus_equal(tctx, 
tctx             1190 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx             1198 source4/torture/basic/delete.c 		torture_assert(tctx, fnum1 != -1, 
tctx             1199 source4/torture/basic/delete.c 				talloc_asprintf(tctx, "smbcli_open failed: %s\n",
tctx             1206 source4/torture/basic/delete.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_DIRECTORY_NOT_EMPTY,
tctx             1214 source4/torture/basic/delete.c static bool deltest20a(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1239 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx             1252 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 2 of %s failed (%s)", 
tctx             1256 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx             1257 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx             1261 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx             1267 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail) - %s", 
tctx             1280 source4/torture/basic/delete.c static bool deltest20b(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1307 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx             1322 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", 
tctx             1335 source4/torture/basic/delete.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 2 of %s failed (%s)", 
tctx             1339 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx             1340 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx             1344 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx             1362 source4/torture/basic/delete.c 		torture_assert_ntstatus_equal(tctx,status,NT_STATUS_OK,talloc_asprintf(tctx, "rename of %s to %s failed (%s)",
tctx             1366 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli2, fnum2, fname_new, false, __location__);
tctx             1372 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail) - %s", 
tctx             1375 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail) - %s", 
tctx             1383 source4/torture/basic/delete.c static bool deltest21(struct torture_context *tctx)
tctx             1390 source4/torture/basic/delete.c 	if (!torture_open_connection(&cli1, tctx, 0))
tctx             1393 source4/torture/basic/delete.c 	if (!torture_open_connection(&cli2, tctx, 1))
tctx             1405 source4/torture/basic/delete.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)", 
tctx             1408 source4/torture/basic/delete.c 	torture_assert_ntstatus_ok(tctx, 
tctx             1410 source4/torture/basic/delete.c 				talloc_asprintf(tctx, "setting delete_on_close failed (%s)", 
tctx             1414 source4/torture/basic/delete.c 	correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__);
tctx             1421 source4/torture/basic/delete.c 	if (!torture_open_connection(&cli1, tctx, 0)) {
tctx             1450 source4/torture/basic/delete.c static bool deltest22(struct torture_context *tctx)
tctx             1457 source4/torture/basic/delete.c 	if (!torture_open_connection(&cli1, tctx, 0))
tctx             1463 source4/torture/basic/delete.c 		tctx, smbcli_mkdir(cli1->tree, dname),
tctx             1464 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "smbcli_mdir failed: (%s)\n",
tctx             1478 source4/torture/basic/delete.c 	torture_assert(tctx, dnum1 != -1,
tctx             1479 source4/torture/basic/delete.c 		       talloc_asprintf(tctx, "open of %s failed: %s!", 
tctx             1492 source4/torture/basic/delete.c 	torture_assert(tctx, dnum2 != -1,
tctx             1493 source4/torture/basic/delete.c 		       talloc_asprintf(tctx, "open of %s failed: %s!", 
tctx             1497 source4/torture/basic/delete.c 		tctx, smbcli_nt_delete_on_close(cli1->tree, dnum1, true), 
tctx             1498 source4/torture/basic/delete.c 		talloc_asprintf(tctx, "setting delete_on_close failed (%s)", 
tctx             1514 source4/torture/basic/delete.c 	torture_assert(tctx, dnum1 == -1,
tctx             1515 source4/torture/basic/delete.c 		       talloc_asprintf(tctx, "open of %s succeeded!\n",
tctx             1402 source4/torture/basic/denytest.c static void progress_bar(struct torture_context *tctx, uint_t i, uint_t total)
tctx             1404 source4/torture/basic/denytest.c 	if (torture_setting_bool(tctx, "progress", true)) {
tctx             1405 source4/torture/basic/denytest.c 		torture_comment(tctx, "%5d/%5d\r", i, total);
tctx             1413 source4/torture/basic/denytest.c bool torture_denytest1(struct torture_context *tctx, 
tctx             1423 source4/torture/basic/denytest.c 	torture_comment(tctx, "Testing deny modes with 1 connection\n");
tctx             1432 source4/torture/basic/denytest.c 	torture_comment(tctx, "testing %d entries\n", (int)ARRAY_SIZE(denytable1));
tctx             1440 source4/torture/basic/denytest.c 		progress_bar(tctx, i, ARRAY_SIZE(denytable1));
tctx             1464 source4/torture/basic/denytest.c 		if (torture_setting_bool(tctx, "showall", false) || 
tctx             1470 source4/torture/basic/denytest.c 			torture_comment(tctx, "%lld: %s %8s %10s    %8s %10s    %s (correct=%s)\n",
tctx             1495 source4/torture/basic/denytest.c 	torture_comment(tctx, "finshed denytest1 (%d failures)\n", failures);
tctx             1503 source4/torture/basic/denytest.c bool torture_denytest2(struct torture_context *tctx, 
tctx             1527 source4/torture/basic/denytest.c 		progress_bar(tctx, i, ARRAY_SIZE(denytable1));
tctx             1551 source4/torture/basic/denytest.c 		if (torture_setting_bool(tctx, "showall", false) || 
tctx             1557 source4/torture/basic/denytest.c 			torture_comment(tctx, "%lld: %s %8s %10s    %8s %10s    %s (correct=%s)\n",
tctx             1582 source4/torture/basic/denytest.c 	torture_comment(tctx, "finshed denytest2 (%d failures)\n", failures);
tctx             1591 source4/torture/basic/denytest.c bool torture_denytest3(struct torture_context *tctx, 
tctx             1606 source4/torture/basic/denytest.c 	torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2);
tctx             1617 source4/torture/basic/denytest.c 	torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2);
tctx             1724 source4/torture/basic/denytest.c static bool torture_ntdenytest(struct torture_context *tctx, 
tctx             1754 source4/torture/basic/denytest.c 	torture_comment(tctx, "format: server correct\n");
tctx             1779 source4/torture/basic/denytest.c 	torture_comment(tctx, "testing %d entries on %s\n", torture_numops, fname);
tctx             1792 source4/torture/basic/denytest.c 		progress_bar(tctx, i, torture_numops);
tctx             1856 source4/torture/basic/denytest.c 		if (torture_setting_bool(tctx, "showall", false) || 
tctx             1859 source4/torture/basic/denytest.c 			torture_comment(tctx, "\n%-20s %-70s\n%-20s %-70s %4s %4s  %s/%s\n",
tctx             1883 source4/torture/basic/denytest.c 	torture_comment(tctx, "finshed ntdenytest (%d failures)\n", failures);
tctx             1892 source4/torture/basic/denytest.c bool torture_ntdenytest1(struct torture_context *tctx, 
tctx             1899 source4/torture/basic/denytest.c 	torture_comment(tctx, "starting ntdenytest1 client %d\n", client);
tctx             1901 source4/torture/basic/denytest.c 	return torture_ntdenytest(tctx, cli, cli, client);
tctx             1917 source4/torture/basic/denytest.c 		torture_comment(tctx, "(%s) Incorrect status %s - should be %s\n", \
tctx             1925 source4/torture/basic/denytest.c 		torture_comment(tctx, "(%s) wrong value for %s  0x%x - should be 0x%x\n", \
tctx             1933 source4/torture/basic/denytest.c bool torture_denydos_sharing(struct torture_context *tctx, 
tctx             1947 source4/torture/basic/denytest.c 	torture_comment(tctx, "Checking DENY_DOS shared handle semantics\n");
tctx             1961 source4/torture/basic/denytest.c 	torture_comment(tctx, "openx twice with RDWR/DENY_DOS\n");
tctx             1970 source4/torture/basic/denytest.c 	torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2);
tctx             1978 source4/torture/basic/denytest.c 	torture_comment(tctx, "two handles should be same file handle\n");
tctx             1994 source4/torture/basic/denytest.c 	torture_comment(tctx, "openx twice with RDWR/DENY_NONE\n");
tctx             2005 source4/torture/basic/denytest.c 	torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2);
tctx             2007 source4/torture/basic/denytest.c 	torture_comment(tctx, "two handles should be separate\n");
tctx               36 source4/torture/basic/dir.c bool torture_dirtest1(struct torture_context *tctx, 
tctx               45 source4/torture/basic/dir.c 	torture_comment(tctx, "Creating %d random filenames\n", torture_numops);
tctx               62 source4/torture/basic/dir.c 	torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "a*.*", 0, list_fn, NULL));
tctx               63 source4/torture/basic/dir.c 	torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "b*.*", 0, list_fn, NULL));
tctx               64 source4/torture/basic/dir.c 	torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "xyzabc", 0, list_fn, NULL));
tctx               66 source4/torture/basic/dir.c 	torture_comment(tctx, "dirtest core %g seconds\n", timeval_elapsed(&tv));
tctx               79 source4/torture/basic/dir.c bool torture_dirtest2(struct torture_context *tctx, 
tctx               91 source4/torture/basic/dir.c 	torture_comment(tctx, "Creating %d files\n", torture_entries);
tctx              123 source4/torture/basic/dir.c 	torture_comment(tctx, "num_seen = %d\n", num_seen );
tctx              136 source4/torture/basic/dir.c 	torture_comment(tctx, "num_seen = %d\n", num_seen );
tctx              144 source4/torture/basic/dir.c 	torture_comment(tctx, "num_seen = %d\n", num_seen );
tctx              159 source4/torture/basic/dir.c 	torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "a*.*", 0, list_fn, NULL));
tctx              160 source4/torture/basic/dir.c 	torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "b*.*", 0, list_fn, NULL));
tctx              161 source4/torture/basic/dir.c 	torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "xyzabc", 0, list_fn, NULL));
tctx               40 source4/torture/basic/locking.c static bool torture_locktest1(struct torture_context *tctx, 
tctx               54 source4/torture/basic/locking.c 	torture_assert(tctx, fnum1 != -1,
tctx               55 source4/torture/basic/locking.c 				   talloc_asprintf(tctx, 
tctx               58 source4/torture/basic/locking.c 	torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, 
tctx               61 source4/torture/basic/locking.c 	torture_assert(tctx, fnum3 != -1, talloc_asprintf(tctx, 
tctx               64 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, 
tctx               66 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "lock1 failed (%s)", smbcli_errstr(cli1->tree)));
tctx               68 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx               75 source4/torture/basic/locking.c 	torture_assert(tctx,
tctx               82 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, 
tctx               84 source4/torture/basic/locking.c 		talloc_asprintf(tctx, 
tctx               87 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx               94 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx              101 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx              109 source4/torture/basic/locking.c 	torture_comment(tctx, "Testing lock timeout with timeout=%u\n", 
tctx              112 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx              121 source4/torture/basic/locking.c 		torture_fail(tctx, 
tctx              124 source4/torture/basic/locking.c 	torture_comment(tctx, "server slept for %u seconds for a %u second timeout\n",
tctx              127 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum2),
tctx              128 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli1->tree)));
tctx              130 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx              137 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx              138 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli1->tree)));
tctx              140 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum3),
tctx              141 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "close3 failed (%s)", smbcli_errstr(cli2->tree)));
tctx              143 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli1->tree, fname),
tctx              144 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(cli1->tree)));
tctx              161 source4/torture/basic/locking.c static bool torture_locktest2(struct torture_context *tctx,
tctx              171 source4/torture/basic/locking.c 	torture_comment(tctx, "Testing pid context\n");
tctx              176 source4/torture/basic/locking.c 	torture_assert(tctx, fnum1 != -1, 
tctx              177 source4/torture/basic/locking.c 		talloc_asprintf(tctx, 
tctx              181 source4/torture/basic/locking.c 	torture_assert(tctx, fnum2 != -1,
tctx              182 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "open2 of %s failed (%s)", 
tctx              188 source4/torture/basic/locking.c 	torture_assert(tctx, fnum3 != -1,
tctx              189 source4/torture/basic/locking.c 		talloc_asprintf(tctx, 
tctx              194 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, 
tctx              196 source4/torture/basic/locking.c 		talloc_asprintf(tctx, 
tctx              199 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx              206 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx              213 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx              220 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, 
tctx              222 source4/torture/basic/locking.c 		talloc_asprintf(tctx, 
tctx              227 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx              231 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx              239 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx              247 source4/torture/basic/locking.c 	torture_assert(tctx, 
tctx              255 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum1), 
tctx              256 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli->tree)));
tctx              258 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum2),
tctx              259 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli->tree)));
tctx              261 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum3),
tctx              262 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "close3 failed (%s)", smbcli_errstr(cli->tree)));
tctx              273 source4/torture/basic/locking.c static bool torture_locktest3(struct torture_context *tctx, 
tctx              284 source4/torture/basic/locking.c 	torture_comment(tctx, "Testing 32 bit offset ranges");
tctx              291 source4/torture/basic/locking.c 	torture_assert(tctx, fnum1 != -1, 
tctx              292 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)));
tctx              294 source4/torture/basic/locking.c 	torture_assert(tctx, fnum2 != -1,
tctx              295 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "open2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree)));
tctx              297 source4/torture/basic/locking.c 	torture_comment(tctx, "Establishing %d locks\n", torture_numops);
tctx              301 source4/torture/basic/locking.c 		torture_assert_ntstatus_ok(tctx, 
tctx              303 source4/torture/basic/locking.c 			talloc_asprintf(tctx, "lock1 %d failed (%s)", i, smbcli_errstr(cli1->tree)));
tctx              305 source4/torture/basic/locking.c 		torture_assert_ntstatus_ok(tctx, 
tctx              307 source4/torture/basic/locking.c 			talloc_asprintf(tctx, "lock2 %d failed (%s)", 
tctx              311 source4/torture/basic/locking.c 	torture_comment(tctx, "Testing %d locks\n", torture_numops);
tctx              316 source4/torture/basic/locking.c 		torture_assert(tctx, 
tctx              318 source4/torture/basic/locking.c 			talloc_asprintf(tctx, "error: lock1 %d succeeded!", i));
tctx              320 source4/torture/basic/locking.c 		torture_assert(tctx, 
tctx              322 source4/torture/basic/locking.c 			talloc_asprintf(tctx, "error: lock2 %d succeeded!", i));
tctx              324 source4/torture/basic/locking.c 		torture_assert(tctx, 
tctx              326 source4/torture/basic/locking.c 			talloc_asprintf(tctx, "error: lock3 %d succeeded!", i));
tctx              328 source4/torture/basic/locking.c 		torture_assert(tctx, 
tctx              330 source4/torture/basic/locking.c 			talloc_asprintf(tctx, "error: lock4 %d succeeded!", i));
tctx              333 source4/torture/basic/locking.c 	torture_comment(tctx, "Removing %d locks\n", torture_numops);
tctx              338 source4/torture/basic/locking.c 		torture_assert_ntstatus_ok(tctx, 
tctx              340 source4/torture/basic/locking.c 					talloc_asprintf(tctx, "unlock1 %d failed (%s)", 
tctx              344 source4/torture/basic/locking.c 		torture_assert_ntstatus_ok(tctx, 
tctx              346 source4/torture/basic/locking.c 			talloc_asprintf(tctx, "unlock2 %d failed (%s)", 
tctx              351 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx              352 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli1->tree)));
tctx              354 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2),
tctx              355 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli2->tree)));
tctx              357 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli1->tree, fname),
tctx              358 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(cli1->tree)));
tctx              364 source4/torture/basic/locking.c         torture_comment(tctx, "** "); correct = false; \
tctx              370 source4/torture/basic/locking.c static bool torture_locktest4(struct torture_context *tctx, 
tctx              390 source4/torture/basic/locking.c 		torture_comment(tctx, "Failed to create file\n");
tctx              398 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s set overlapping write locks\n", ret?"can":"cannot");
tctx              403 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s set overlapping read locks\n", ret?"can":"cannot");
tctx              408 source4/torture/basic/locking.c 	torture_comment(tctx, "a different connection %s set overlapping write locks\n", ret?"can":"cannot");
tctx              413 source4/torture/basic/locking.c 	torture_comment(tctx, "a different connection %s set overlapping read locks\n", ret?"can":"cannot");
tctx              418 source4/torture/basic/locking.c 	torture_comment(tctx, "a different pid %s set overlapping write locks\n", ret?"can":"cannot");
tctx              423 source4/torture/basic/locking.c 	torture_comment(tctx, "a different pid %s set overlapping read locks\n", ret?"can":"cannot");
tctx              428 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s set the same read lock twice\n", ret?"can":"cannot");
tctx              433 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s set the same write lock twice\n", ret?"can":"cannot");
tctx              438 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s overlay a read lock with a write lock\n", ret?"can":"cannot");
tctx              443 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s overlay a write lock with a read lock\n", ret?"can":"cannot");
tctx              448 source4/torture/basic/locking.c 	torture_comment(tctx, "a different pid %s overlay a write lock with a read lock\n", ret?"can":"cannot");
tctx              454 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s coalesce read locks\n", ret?"can":"cannot");
tctx              460 source4/torture/basic/locking.c 	torture_comment(tctx, "this server %s strict write locking\n", ret?"doesn't do":"does");
tctx              465 source4/torture/basic/locking.c 	torture_comment(tctx, "this server %s strict read locking\n", ret?"doesn't do":"does");
tctx              473 source4/torture/basic/locking.c 	torture_comment(tctx, "this server %s do recursive read locking\n", ret?"does":"doesn't");
tctx              483 source4/torture/basic/locking.c 	torture_comment(tctx, "this server %s do recursive lock overlays\n", ret?"does":"doesn't");
tctx              490 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s remove a read lock using write locking\n", ret?"can":"cannot");
tctx              497 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s remove a write lock using read locking\n", ret?"can":"cannot");
tctx              505 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s remove the first lock first\n", ret?"does":"doesn't");
tctx              519 source4/torture/basic/locking.c 	torture_comment(tctx, "the server %s have the NT byte range lock bug\n", !ret?"does":"doesn't");
tctx              532 source4/torture/basic/locking.c static bool torture_locktest5(struct torture_context *tctx, struct smbcli_state *cli1, 
tctx              551 source4/torture/basic/locking.c 	torture_assert(tctx, smbcli_write(cli1->tree, fnum1, 0, buf, 0, sizeof(buf)) == sizeof(buf),
tctx              561 source4/torture/basic/locking.c 	torture_comment(tctx, "this server %s the NT locking bug\n", ret ? "doesn't have" : "has");
tctx              569 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s overlay a write with a read lock\n", ret?"can":"cannot");
tctx              574 source4/torture/basic/locking.c 	torture_comment(tctx, "a different processs %s get a read lock on the first process lock stack\n", ret?"can":"cannot");
tctx              582 source4/torture/basic/locking.c 	torture_comment(tctx, "the same processs on a different fnum %s get a read lock\n", ret?"can":"cannot");
tctx              592 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s stack read locks\n", ret?"can":"cannot");
tctx              601 source4/torture/basic/locking.c 	torture_comment(tctx, "the first unlock removes the %s lock\n", ret?"WRITE":"READ");
tctx              613 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s unlock the stack of 3 locks\n", ret?"can":"cannot");
tctx              618 source4/torture/basic/locking.c 	torture_comment(tctx, "the same process %s count the lock stack\n", !ret?"can":"cannot"); 
tctx              624 source4/torture/basic/locking.c 	torture_comment(tctx, "a different processs %s get a write lock on the unlocked stack\n", ret?"can":"cannot");
tctx              627 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx              628 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli1->tree)));
tctx              630 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2),
tctx              631 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli2->tree)));
tctx              633 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum3),
tctx              634 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli2->tree)));
tctx              636 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli1->tree, fname),
tctx              637 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(cli1->tree)));
tctx              645 source4/torture/basic/locking.c static bool torture_locktest6(struct torture_context *tctx, 
tctx              658 source4/torture/basic/locking.c 		torture_comment(tctx, "Testing %s\n", fname[i]);
tctx              665 source4/torture/basic/locking.c 		torture_comment(tctx, "CHANGE_LOCKTYPE gave %s\n", nt_errstr(status));
tctx              670 source4/torture/basic/locking.c 		torture_comment(tctx, "CANCEL_LOCK gave %s\n", nt_errstr(status));
tctx              678 source4/torture/basic/locking.c static bool torture_locktest7(struct torture_context *tctx, 
tctx              688 source4/torture/basic/locking.c 	torture_assert(tctx, torture_setup_dir(cli1, BASEDIR),
tctx              689 source4/torture/basic/locking.c 				   talloc_asprintf(tctx, "Unable to set up %s", BASEDIR));
tctx              695 source4/torture/basic/locking.c 	torture_assert(tctx, smbcli_write(cli1->tree, fnum1, 0, buf, 0, sizeof(buf)) == sizeof(buf),
tctx              700 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_lock(cli1->tree, fnum1, 130, 4, 0, READ_LOCK),
tctx              701 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "Unable to apply read lock on range 130:4, error was %s", 
tctx              704 source4/torture/basic/locking.c 	torture_comment(tctx, "pid1 successfully locked range 130:4 for READ\n");
tctx              706 source4/torture/basic/locking.c 	torture_assert(tctx, smbcli_read(cli1->tree, fnum1, buf, 130, 4) == 4, 
tctx              707 source4/torture/basic/locking.c 		 	talloc_asprintf(tctx, "pid1 unable to read the range 130:4, error was %s)", 
tctx              710 source4/torture/basic/locking.c 	torture_comment(tctx, "pid1 successfully read the range 130:4\n");
tctx              713 source4/torture/basic/locking.c 		torture_comment(tctx, "pid1 unable to write to the range 130:4, error was %s\n", smbcli_errstr(cli1->tree));
tctx              714 source4/torture/basic/locking.c 		torture_assert_ntstatus_equal(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_FILE_LOCK_CONFLICT,
tctx              717 source4/torture/basic/locking.c 		torture_fail(tctx, "pid1 successfully wrote to the range 130:4 (should be denied)");
tctx              723 source4/torture/basic/locking.c 		torture_comment(tctx, "pid2 unable to read the range 130:4, error was %s\n", smbcli_errstr(cli1->tree));
tctx              725 source4/torture/basic/locking.c 		torture_comment(tctx, "pid2 successfully read the range 130:4\n");
tctx              729 source4/torture/basic/locking.c 		torture_comment(tctx, "pid2 unable to write to the range 130:4, error was %s\n", smbcli_errstr(cli1->tree));
tctx              730 source4/torture/basic/locking.c 		torture_assert_ntstatus_equal(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_FILE_LOCK_CONFLICT, 
tctx              733 source4/torture/basic/locking.c 		torture_fail(tctx, "pid2 successfully wrote to the range 130:4 (should be denied)"); 
tctx              739 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_lock(cli1->tree, fnum1, 130, 4, 0, WRITE_LOCK),
tctx              740 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "Unable to apply write lock on range 130:4, error was %s", 
tctx              742 source4/torture/basic/locking.c 	torture_comment(tctx, "pid1 successfully locked range 130:4 for WRITE\n");
tctx              744 source4/torture/basic/locking.c 	torture_assert(tctx, smbcli_read(cli1->tree, fnum1, buf, 130, 4) == 4, 
tctx              745 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "pid1 unable to read the range 130:4, error was %s", 
tctx              747 source4/torture/basic/locking.c 	torture_comment(tctx, "pid1 successfully read the range 130:4\n");
tctx              749 source4/torture/basic/locking.c 	torture_assert(tctx, smbcli_write(cli1->tree, fnum1, 0, buf, 130, 4) == 4, 
tctx              750 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "pid1 unable to write to the range 130:4, error was %s",
tctx              752 source4/torture/basic/locking.c 	torture_comment(tctx, "pid1 successfully wrote to the range 130:4\n");
tctx              757 source4/torture/basic/locking.c 		torture_comment(tctx, "pid2 unable to read the range 130:4, error was %s\n", 
tctx              759 source4/torture/basic/locking.c 		torture_assert_ntstatus_equal(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_FILE_LOCK_CONFLICT, 
tctx              762 source4/torture/basic/locking.c 		torture_fail(tctx, "pid2 successfully read the range 130:4 (should be denied)");
tctx              766 source4/torture/basic/locking.c 		torture_comment(tctx, "pid2 unable to write to the range 130:4, error was %s\n", 
tctx              769 source4/torture/basic/locking.c 			torture_comment(tctx, "Incorrect error (should be NT_STATUS_FILE_LOCK_CONFLICT) (%s)\n",
tctx              774 source4/torture/basic/locking.c 		torture_comment(tctx, "pid2 successfully wrote to the range 130:4 (should be denied) (%s)\n", 
tctx              779 source4/torture/basic/locking.c 	torture_comment(tctx, "Testing truncate of locked file.\n");
tctx              783 source4/torture/basic/locking.c 	torture_assert(tctx, fnum2 != -1, "Unable to truncate locked file");
tctx              785 source4/torture/basic/locking.c 	torture_comment(tctx, "Truncated locked file.\n");
tctx              787 source4/torture/basic/locking.c 	torture_assert_ntstatus_ok(tctx, smbcli_getatr(cli1->tree, fname, NULL, &size, NULL), 
tctx              788 source4/torture/basic/locking.c 		talloc_asprintf(tctx, "getatr failed (%s)", smbcli_errstr(cli1->tree)));
tctx              790 source4/torture/basic/locking.c 	torture_assert(tctx, size == 0, talloc_asprintf(tctx, "Unable to truncate locked file. Size was %u", (unsigned)size));
tctx               35 source4/torture/basic/mangle_test.c static bool test_one(struct torture_context *tctx ,struct smbcli_state *cli, 
tctx               64 source4/torture/basic/mangle_test.c 	name2 = talloc_asprintf(tctx, "\\mangle_test\\%s", shortname);
tctx               50 source4/torture/basic/misc.c static bool rw_torture(struct torture_context *tctx, struct smbcli_state *c)
tctx               66 source4/torture/basic/misc.c 		torture_comment(tctx, "open of %s failed (%s)\n", lockfname, smbcli_errstr(c->tree));
tctx               75 source4/torture/basic/misc.c 			if (torture_setting_bool(tctx, "progress", true)) {
tctx               76 source4/torture/basic/misc.c 				torture_comment(tctx, "%d\r", i);
tctx               88 source4/torture/basic/misc.c 			torture_comment(tctx, "open failed (%s)\n", smbcli_errstr(c->tree));
tctx               94 source4/torture/basic/misc.c 			torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(c->tree));
tctx              102 source4/torture/basic/misc.c 				torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(c->tree));
tctx              110 source4/torture/basic/misc.c 			torture_comment(tctx, "read failed (%s)\n", smbcli_errstr(c->tree));
tctx              115 source4/torture/basic/misc.c 			torture_comment(tctx, "data corruption!\n");
tctx              120 source4/torture/basic/misc.c 			torture_comment(tctx, "close failed (%s)\n", smbcli_errstr(c->tree));
tctx              125 source4/torture/basic/misc.c 			torture_comment(tctx, "unlink failed (%s)\n", smbcli_errstr(c->tree));
tctx              130 source4/torture/basic/misc.c 			torture_comment(tctx, "unlock failed (%s)\n", smbcli_errstr(c->tree));
tctx              139 source4/torture/basic/misc.c 	torture_comment(tctx, "%d\n", i);
tctx              144 source4/torture/basic/misc.c bool run_torture(struct torture_context *tctx, struct smbcli_state *cli, int dummy)
tctx              146 source4/torture/basic/misc.c 	return rw_torture(tctx, cli);
tctx              153 source4/torture/basic/misc.c bool run_pipe_number(struct torture_context *tctx, 
tctx              165 source4/torture/basic/misc.c 			torture_comment(tctx, "Open of pipe %s failed with error (%s)\n", pipe_name, smbcli_errstr(cli1->tree));
tctx              169 source4/torture/basic/misc.c 		if (torture_setting_bool(tctx, "progress", true)) {
tctx              170 source4/torture/basic/misc.c 			torture_comment(tctx, "%d\r", num_pipes);
tctx              175 source4/torture/basic/misc.c 	torture_comment(tctx, "pipe_number test - we can open %d %s pipes.\n", num_pipes, pipe_name );
tctx              187 source4/torture/basic/misc.c bool torture_holdcon(struct torture_context *tctx)
tctx              193 source4/torture/basic/misc.c 	torture_comment(tctx, "Opening %d connections\n", torture_numops);
tctx              198 source4/torture/basic/misc.c 		if (!torture_open_connection(&cli[i], tctx, i)) {
tctx              201 source4/torture/basic/misc.c 		if (torture_setting_bool(tctx, "progress", true)) {
tctx              202 source4/torture/basic/misc.c 			torture_comment(tctx, "opened %d connections\r", i);
tctx              207 source4/torture/basic/misc.c 	torture_comment(tctx, "\nStarting pings\n");
tctx              215 source4/torture/basic/misc.c 					torture_comment(tctx, "Connection %d is dead\n", i);
tctx              224 source4/torture/basic/misc.c 			torture_comment(tctx, "All connections dead - finishing\n");
tctx              228 source4/torture/basic/misc.c 		torture_comment(tctx, ".");
tctx              238 source4/torture/basic/misc.c bool run_maxfidtest(struct torture_context *tctx, struct smbcli_state *cli, int dummy)
tctx              247 source4/torture/basic/misc.c 		torture_comment(tctx, "failed to connect\n");
tctx              252 source4/torture/basic/misc.c 		torture_comment(tctx, "Failed to deltree \\maxfid - %s\n",
tctx              257 source4/torture/basic/misc.c 		torture_comment(tctx, "Failed to mkdir \\maxfid, error=%s\n", 
tctx              262 source4/torture/basic/misc.c 	torture_comment(tctx, "Testing maximum number of open files\n");
tctx              268 source4/torture/basic/misc.c 				torture_comment(tctx, "Failed to mkdir %s, error=%s\n", 
tctx              278 source4/torture/basic/misc.c 			torture_comment(tctx, "open of %s failed (%s)\n", 
tctx              280 source4/torture/basic/misc.c 			torture_comment(tctx, "maximum fnum is %d\n", i);
tctx              284 source4/torture/basic/misc.c 		if (torture_setting_bool(tctx, "progress", true)) {
tctx              285 source4/torture/basic/misc.c 			torture_comment(tctx, "%6d\r", i);
tctx              289 source4/torture/basic/misc.c 	torture_comment(tctx, "%6d\n", i);
tctx              294 source4/torture/basic/misc.c 	torture_comment(tctx, "cleaning up\n");
tctx              298 source4/torture/basic/misc.c 			torture_comment(tctx, "Close of fnum %d failed - %s\n", fnums[i], smbcli_errstr(cli->tree));
tctx              301 source4/torture/basic/misc.c 			torture_comment(tctx, "unlink of %s failed (%s)\n", 
tctx              309 source4/torture/basic/misc.c 			torture_comment(tctx, "Close of fnum %d failed - %s\n", fnums[maxfid-i], smbcli_errstr(cli->tree));
tctx              312 source4/torture/basic/misc.c 			torture_comment(tctx, "unlink of %s failed (%s)\n", 
tctx              318 source4/torture/basic/misc.c 		if (torture_setting_bool(tctx, "progress", true)) {
tctx              319 source4/torture/basic/misc.c 			torture_comment(tctx, "%6d %6d\r", i, maxfid-i);
tctx              323 source4/torture/basic/misc.c 	torture_comment(tctx, "%6d\n", 0);
tctx              326 source4/torture/basic/misc.c 		torture_comment(tctx, "Failed to deltree \\maxfid - %s\n",
tctx              331 source4/torture/basic/misc.c 	torture_comment(tctx, "maxfid test finished\n");
tctx              344 source4/torture/basic/misc.c bool torture_ioctl_test(struct torture_context *tctx, 
tctx              354 source4/torture/basic/misc.c 	mem_ctx = talloc_named_const(tctx, 0, "ioctl_test");
tctx              360 source4/torture/basic/misc.c 		torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli->tree));
tctx              368 source4/torture/basic/misc.c 	torture_comment(tctx, "ioctl job info: %s\n", smbcli_errstr(cli->tree));
tctx              371 source4/torture/basic/misc.c 		torture_comment(tctx, "testing device=0x%x\n", device);
tctx              377 source4/torture/basic/misc.c 				torture_comment(tctx, "ioctl device=0x%x function=0x%x OK : %d bytes\n", 
tctx              403 source4/torture/basic/misc.c 	struct torture_context *tctx;
tctx              434 source4/torture/basic/misc.c static int init_benchrw_params(struct torture_context *tctx,
tctx              440 source4/torture/basic/misc.c 	lpar->retry = torture_setting_int(tctx, "retry",3);
tctx              441 source4/torture/basic/misc.c 	lpar->blocksize = torture_setting_int(tctx, "blocksize",65535);
tctx              442 source4/torture/basic/misc.c 	lpar->writeblocks = torture_setting_int(tctx, "writeblocks",15);
tctx              443 source4/torture/basic/misc.c 	lpar->writeratio = torture_setting_int(tctx, "writeratio",5);
tctx              445 source4/torture/basic/misc.c 		tctx, "parallel_requests", 5);
tctx              446 source4/torture/basic/misc.c 	lpar->workgroup = lp_workgroup(tctx->lp_ctx);
tctx              448 source4/torture/basic/misc.c 	p = torture_setting_string(tctx, "unclist", NULL);
tctx              453 source4/torture/basic/misc.c 			torture_comment(tctx, "Failed to load unc names list "
tctx              458 source4/torture/basic/misc.c 		lpar->unc = talloc_array(tctx, struct unclist *,
tctx              470 source4/torture/basic/misc.c 					tctx, "Failed to parse UNC "
tctx              476 source4/torture/basic/misc.c 				talloc(tctx, struct unclist);
tctx              482 source4/torture/basic/misc.c 		lpar->unc = talloc_array(tctx, struct unclist *, 1);
tctx              483 source4/torture/basic/misc.c 		lpar->unc[0] = talloc(tctx,struct unclist);
tctx              484 source4/torture/basic/misc.c 		lpar->unc[0]->host  = torture_setting_string(tctx, "host",
tctx              486 source4/torture/basic/misc.c 		lpar->unc[0]->share = torture_setting_string(tctx, "share",
tctx              495 source4/torture/basic/misc.c static NTSTATUS benchrw_close(struct torture_context *tctx,
tctx              503 source4/torture/basic/misc.c 	torture_comment(tctx, "Close file %d (%d)\n",state->nr,state->fnum);
tctx              518 source4/torture/basic/misc.c static NTSTATUS benchrw_readwrite(struct torture_context *tctx,
tctx              525 source4/torture/basic/misc.c 	struct torture_context *tctx = state->tctx;
tctx              546 source4/torture/basic/misc.c 		benchrw_readwrite(tctx, state);
tctx              553 source4/torture/basic/misc.c static NTSTATUS benchrw_readwrite(struct torture_context *tctx,
tctx              562 source4/torture/basic/misc.c 		torture_comment(tctx, "Callback WRITE file:%d (%d/%d)\n",
tctx              575 source4/torture/basic/misc.c 		torture_comment(tctx,
tctx              607 source4/torture/basic/misc.c static NTSTATUS benchrw_open(struct torture_context *tctx,
tctx              614 source4/torture/basic/misc.c 		status = smb_raw_open_recv(req,tctx,(
tctx              620 source4/torture/basic/misc.c 		torture_comment(tctx, "File opened (%d)\n",state->fnum);
tctx              624 source4/torture/basic/misc.c 	torture_comment(tctx, "Write initial test file:%d (%d/%d)\n",state->nr,
tctx              654 source4/torture/basic/misc.c static NTSTATUS benchrw_mkdir(struct torture_context *tctx,
tctx              664 source4/torture/basic/misc.c 	torture_comment(tctx, "Open File %d/%d\n",state->nr+1,
tctx              665 source4/torture/basic/misc.c 			torture_setting_int(tctx, "nprocs", 4));
tctx              666 source4/torture/basic/misc.c 	open_parms=talloc_zero(tctx, union smb_open);
tctx              680 source4/torture/basic/misc.c 	writedata = talloc_size(tctx,state->lp_params->blocksize);
tctx              705 source4/torture/basic/misc.c 	struct torture_context *tctx = state->tctx;
tctx              716 source4/torture/basic/misc.c 		if (!NT_STATUS_IS_OK(benchrw_mkdir(tctx, req,state))) {
tctx              717 source4/torture/basic/misc.c 			torture_comment(tctx, "Failed to create the test "
tctx              726 source4/torture/basic/misc.c 		if (!NT_STATUS_IS_OK(benchrw_open(tctx, req,state))){
tctx              727 source4/torture/basic/misc.c 			torture_comment(tctx, "Failed to open/write the "
tctx              739 source4/torture/basic/misc.c 			status = benchrw_readwrite(tctx,state);
tctx              741 source4/torture/basic/misc.c 				torture_comment(tctx, "Failed to read/write "
tctx              750 source4/torture/basic/misc.c 		if (!NT_STATUS_IS_OK(benchrw_close(tctx,req,state))){
tctx              751 source4/torture/basic/misc.c 			torture_comment(tctx, "Failed to read/write/close "
tctx              759 source4/torture/basic/misc.c 		torture_comment(tctx, "File %d closed\n",state->nr);
tctx              761 source4/torture/basic/misc.c 			torture_comment(tctx, "Failed to close the "
tctx              779 source4/torture/basic/misc.c 	struct torture_context *tctx = state->tctx;
tctx              788 source4/torture/basic/misc.c 			torture_comment(tctx, "Failed to open connection: "
tctx              795 source4/torture/basic/misc.c 			torture_comment(tctx, "Failed to open connection "
tctx              808 source4/torture/basic/misc.c 				struct torture_context *tctx,
tctx              816 source4/torture/basic/misc.c 	torture_comment(tctx, "Open Connection to %s/%s\n",host,share);
tctx              819 source4/torture/basic/misc.c 	smb->in.dest_ports=lp_smb_ports(tctx->lp_ctx);
tctx              820 source4/torture/basic/misc.c 	smb->in.socket_options = lp_socket_options(tctx->lp_ctx);
tctx              825 source4/torture/basic/misc.c 	smb->in.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx);
tctx              826 source4/torture/basic/misc.c 	smb->in.gensec_settings = lp_gensec_settings(mem_ctx, tctx->lp_ctx);
tctx              828 source4/torture/basic/misc.c 	lp_smbcli_options(tctx->lp_ctx, &smb->in.options);
tctx              829 source4/torture/basic/misc.c 	lp_smbcli_session_options(tctx->lp_ctx, &smb->in.session_options);
tctx              832 source4/torture/basic/misc.c 					  lp_resolve_context(tctx->lp_ctx),ev);
tctx              835 source4/torture/basic/misc.c bool run_benchrw(struct torture_context *tctx)
tctx              848 source4/torture/basic/misc.c 	int torture_nprocs = torture_setting_int(tctx, "nprocs", 4);
tctx              850 source4/torture/basic/misc.c 	torture_comment(tctx, "Start BENCH-READWRITE num_ops=%d "
tctx              855 source4/torture/basic/misc.c 	ev = tctx->ev;
tctx              856 source4/torture/basic/misc.c 	state = talloc_array(tctx, struct benchrw_state *, torture_nprocs);
tctx              859 source4/torture/basic/misc.c 	num_unc_names = init_benchrw_params(tctx,&lpparams);
tctx              863 source4/torture/basic/misc.c 		state[i]=talloc(tctx,struct benchrw_state);
tctx              864 source4/torture/basic/misc.c 		state[i]->tctx = tctx;
tctx              869 source4/torture/basic/misc.c 		state[i]->dname=talloc_asprintf(tctx,"benchrw%d",i);
tctx              870 source4/torture/basic/misc.c 		state[i]->fname=talloc_asprintf(tctx,"%s%s",
tctx              876 source4/torture/basic/misc.c 	torture_comment(tctx, "Starting async requests\n");	
tctx              884 source4/torture/basic/misc.c 					tctx,struct smb_composite_connect) ;
tctx              888 source4/torture/basic/misc.c 					tctx, smb_con, tctx,ev,
tctx              898 source4/torture/basic/misc.c 				torture_comment(tctx, "Setup test dir %d\n",i);
tctx              903 source4/torture/basic/misc.c 						tctx,
tctx              925 source4/torture/basic/misc.c 				torture_comment(tctx, "Deleting test dir %s "
tctx              931 source4/torture/basic/misc.c 					torture_comment(tctx, "ERROR: Tree "
tctx               30 source4/torture/basic/rename.c bool torture_test_rename(struct torture_context *tctx, 
tctx               45 source4/torture/basic/rename.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "First open failed - %s", 
tctx               48 source4/torture/basic/rename.c 	torture_assert(tctx, NT_STATUS_IS_ERR(smbcli_rename(cli1->tree, fname, fname1)), 
tctx               51 source4/torture/basic/rename.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx               52 source4/torture/basic/rename.c 		talloc_asprintf(tctx, "close - 1 failed (%s)", smbcli_errstr(cli1->tree)));
tctx               62 source4/torture/basic/rename.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, 
tctx               65 source4/torture/basic/rename.c 	torture_assert_ntstatus_ok(tctx, smbcli_rename(cli1->tree, fname, fname1),
tctx               66 source4/torture/basic/rename.c 		talloc_asprintf(tctx, 
tctx               70 source4/torture/basic/rename.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx               71 source4/torture/basic/rename.c 		talloc_asprintf(tctx, 
tctx               83 source4/torture/basic/rename.c 	torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "Third open failed - %s", 
tctx               86 source4/torture/basic/rename.c 	torture_assert_ntstatus_ok(tctx, smbcli_rename(cli1->tree, fname, fname1),
tctx               87 source4/torture/basic/rename.c 		talloc_asprintf(tctx, "Third rename failed - this should have succeeded - %s", 
tctx               90 source4/torture/basic/rename.c 	torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1), 
tctx               91 source4/torture/basic/rename.c 		talloc_asprintf(tctx, "close - 3 failed (%s)", smbcli_errstr(cli1->tree)));
tctx               34 source4/torture/basic/secleak.c static bool try_failed_login(struct torture_context *tctx, struct smbcli_state *cli)
tctx               41 source4/torture/basic/secleak.c 	lp_smbcli_session_options(tctx->lp_ctx, &options);
tctx               46 source4/torture/basic/secleak.c 	setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx               48 source4/torture/basic/secleak.c 	setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx               50 source4/torture/basic/secleak.c 	cli_credentials_set_conf(setup.in.credentials, tctx->lp_ctx);
tctx               65 source4/torture/basic/secleak.c bool torture_sec_leak(struct torture_context *tctx, struct smbcli_state *cli)
tctx               68 source4/torture/basic/secleak.c 	int timelimit = torture_setting_int(tctx, "timelimit", 20);
tctx               71 source4/torture/basic/secleak.c 		if (!try_failed_login(tctx, cli)) {
tctx               36 source4/torture/basic/unlink.c bool torture_unlinktest(struct torture_context *tctx, struct smbcli_state *cli)
tctx               44 source4/torture/basic/unlink.c 	torture_assert(tctx, torture_setup_dir(cli, BASEDIR), 
tctx               45 source4/torture/basic/unlink.c 				   talloc_asprintf(tctx, "Failed setting up %s", BASEDIR));
tctx               49 source4/torture/basic/unlink.c 	torture_comment(tctx, "Opening a file\n");
tctx               52 source4/torture/basic/unlink.c 	torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, "open of %s failed (%s)", fname, smbcli_errstr(cli->tree)));
tctx               54 source4/torture/basic/unlink.c 	torture_comment(tctx, "Unlinking a open file\n");
tctx               56 source4/torture/basic/unlink.c 	torture_assert(tctx, !NT_STATUS_IS_OK(smbcli_unlink(cli->tree, fname)),
tctx               65 source4/torture/basic/unlink.c 	torture_comment(tctx, "testing unlink after ntcreatex with DELETE access\n");
tctx               81 source4/torture/basic/unlink.c 	torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "failed to open %s", fname));
tctx               83 source4/torture/basic/unlink.c 	torture_assert(tctx, !NT_STATUS_IS_OK(smbcli_unlink(cli->tree, fname)),
tctx               28 source4/torture/basic/utable.c bool torture_utable(struct torture_context *tctx, 
tctx               40 source4/torture/basic/utable.c 	torture_comment(tctx, "Generating valid character table\n");
tctx               44 source4/torture/basic/utable.c 	torture_assert(tctx, torture_setup_dir(cli, "\\utable"),
tctx               53 source4/torture/basic/utable.c 		convert_string_convenience(lp_iconv_convenience(tctx->lp_ctx), CH_UTF16, CH_UNIX, 
tctx               70 source4/torture/basic/utable.c 			torture_comment(tctx, "fname=[%s] alt_name=[%s]\n", fname, alt_name);
tctx               77 source4/torture/basic/utable.c 			if (torture_setting_bool(tctx, "progress", true)) {
tctx               78 source4/torture/basic/utable.c 				torture_comment(tctx, "%d (%d/%d)\r", c, chars_allowed, alt_allowed);
tctx               83 source4/torture/basic/utable.c 	torture_comment(tctx, "%d (%d/%d)\n", c, chars_allowed, alt_allowed);
tctx               87 source4/torture/basic/utable.c 	torture_comment(tctx, "%d chars allowed   %d alt chars allowed\n", chars_allowed, alt_allowed);
tctx               90 source4/torture/basic/utable.c 	torture_assert(tctx, fd != -1, 
tctx               91 source4/torture/basic/utable.c 		talloc_asprintf(tctx, 
tctx               95 source4/torture/basic/utable.c 	torture_comment(tctx, "wrote valid.dat\n");
tctx              119 source4/torture/basic/utable.c bool torture_casetable(struct torture_context *tctx, 
tctx              128 source4/torture/basic/utable.c 	torture_comment(tctx, "Determining upper/lower case table\n");
tctx              132 source4/torture/basic/utable.c 	torture_assert(tctx, torture_setup_dir(cli, "\\utable"),
tctx              140 source4/torture/basic/utable.c 		torture_comment(tctx, "%04x (%c)\n", c, isprint(c)?c:'.');
tctx              142 source4/torture/basic/utable.c 		fname = form_name(lp_iconv_convenience(tctx->lp_ctx), c);
tctx              153 source4/torture/basic/utable.c 		torture_assert(tctx, fnum != -1, 
tctx              154 source4/torture/basic/utable.c 					   talloc_asprintf(tctx, 
tctx              167 source4/torture/basic/utable.c 				torture_comment(tctx, "too many chars match?? size=%d c=0x%04x\n",
tctx              174 source4/torture/basic/utable.c 			torture_comment(tctx, "%04x: ", c);
tctx              177 source4/torture/basic/utable.c 				torture_comment(tctx, "%04x ", c2[i]);
tctx              180 source4/torture/basic/utable.c 			torture_comment(tctx, "\n");
tctx               45 source4/torture/ldap/basic.c static bool test_bind_sasl(struct torture_context *tctx,
tctx               53 source4/torture/ldap/basic.c 	status = torture_ldap_bind_sasl(conn, creds, tctx->lp_ctx);
tctx               32 source4/torture/ldap/cldap.c #define CHECK_STATUS(status, correct) torture_assert_ntstatus_equal(tctx, status, correct, "incorrect status")
tctx               34 source4/torture/ldap/cldap.c #define CHECK_VAL(v, correct) torture_assert_int_equal(tctx, (v), (correct), "incorrect value");
tctx               36 source4/torture/ldap/cldap.c #define CHECK_STRING(v, correct) torture_assert_str_equal(tctx, v, correct, "incorrect value");
tctx               40 source4/torture/ldap/cldap.c static bool test_cldap_netlogon(struct torture_context *tctx, const char *dest)
tctx               49 source4/torture/ldap/cldap.c 	cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx               53 source4/torture/ldap/cldap.c 	search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx               62 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx               75 source4/torture/ldap/cldap.c 		status = cldap_netlogon(cldap, tctx, &search);
tctx               83 source4/torture/ldap/cldap.c 		status = cldap_netlogon(cldap, tctx, &search);
tctx               89 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx               95 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              103 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              110 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              116 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              124 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              134 source4/torture/ldap/cldap.c 	search.in.domain_guid = GUID_string(tctx, &n1.data.nt5_ex.domain_uuid);
tctx              135 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              138 source4/torture/ldap/cldap.c 	CHECK_STRING(GUID_string(tctx, &search.out.netlogon.data.nt5_ex.domain_uuid), search.in.domain_guid);
tctx              143 source4/torture/ldap/cldap.c 	search.in.domain_guid = GUID_string(tctx, &guid);
tctx              144 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              150 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              158 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              167 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              176 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              184 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              191 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              200 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              204 source4/torture/ldap/cldap.c 	search.in.domain_guid = GUID_string(tctx, &n1.data.nt5_ex.domain_uuid);
tctx              205 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              212 source4/torture/ldap/cldap.c 	search.in.domain_guid = GUID_string(tctx, &guid);
tctx              213 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              220 source4/torture/ldap/cldap.c 	search.in.domain_guid = GUID_string(tctx, &guid);
tctx              222 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              234 source4/torture/ldap/cldap.c static bool test_cldap_netlogon_flags(struct torture_context *tctx,
tctx              243 source4/torture/ldap/cldap.c 	cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              249 source4/torture/ldap/cldap.c 	search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx              254 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              343 source4/torture/ldap/cldap.c static bool test_cldap_netlogon_flag_ds_dns_forest(struct torture_context *tctx,
tctx              354 source4/torture/ldap/cldap.c 	cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              360 source4/torture/ldap/cldap.c 	search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx              365 source4/torture/ldap/cldap.c 	status = cldap_netlogon(cldap, tctx, &search);
tctx              385 source4/torture/ldap/cldap.c 		search2.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx              391 source4/torture/ldap/cldap.c 		status = cldap_search(cldap, tctx, &search2);
tctx              417 source4/torture/ldap/cldap.c static bool test_cldap_generic(struct torture_context *tctx, const char *dest)
tctx              426 source4/torture/ldap/cldap.c 	cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              430 source4/torture/ldap/cldap.c 	search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx              434 source4/torture/ldap/cldap.c 	status = cldap_search(cldap, tctx, &search);
tctx              441 source4/torture/ldap/cldap.c 	status = cldap_search(cldap, tctx, &search);
tctx              450 source4/torture/ldap/cldap.c 	status = cldap_search(cldap, tctx, &search);
tctx              459 source4/torture/ldap/cldap.c 	status = cldap_search(cldap, tctx, &search);
tctx              468 source4/torture/ldap/cldap.c 	status = cldap_search(cldap, tctx, &search);
tctx              477 source4/torture/ldap/cldap.c 	status = cldap_search(cldap, tctx, &search);
tctx               52 source4/torture/ldap/cldapbench.c static bool bench_cldap_netlogon(struct torture_context *tctx, const char *address)
tctx               58 source4/torture/ldap/cldapbench.c 	int timelimit = torture_setting_int(tctx, "timelimit", 10);
tctx               62 source4/torture/ldap/cldapbench.c 	cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx               64 source4/torture/ldap/cldapbench.c 	state = talloc_zero(tctx, struct bench_state);
tctx               68 source4/torture/ldap/cldapbench.c 	search.in.dest_port	= lp_cldap_port(tctx->lp_ctx);
tctx               82 source4/torture/ldap/cldapbench.c 				if (torture_setting_bool(tctx, "progress", true)) {
tctx              124 source4/torture/ldap/cldapbench.c static bool bench_cldap_rootdse(struct torture_context *tctx, const char *address)
tctx              130 source4/torture/ldap/cldapbench.c 	int timelimit = torture_setting_int(tctx, "timelimit", 10);
tctx              134 source4/torture/ldap/cldapbench.c 	cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              136 source4/torture/ldap/cldapbench.c 	state = talloc_zero(tctx, struct bench_state);
tctx              140 source4/torture/ldap/cldapbench.c 	search.in.dest_port	= lp_cldap_port(tctx->lp_ctx);
tctx              155 source4/torture/ldap/cldapbench.c 				if (torture_setting_bool(tctx, "progress", true)) {
tctx              164 source4/torture/ldap/cldapbench.c 		tevent_loop_once(tctx->ev);
tctx              168 source4/torture/ldap/cldapbench.c 		tevent_loop_once(tctx->ev);
tctx               57 source4/torture/ldap/common.c NTSTATUS torture_ldap_connection(struct torture_context *tctx, 
tctx               68 source4/torture/ldap/common.c 	*conn = ldap4_new_connection(tctx, tctx->lp_ctx, tctx->ev);
tctx               80 source4/torture/ldap/common.c NTSTATUS torture_ldap_connection2(struct torture_context *tctx, struct ldap_connection **conn, 
tctx               85 source4/torture/ldap/common.c 	status = torture_ldap_connection(tctx, conn, url);
tctx               90 source4/torture/ldap/common.c 		printf("Failed a simple ldap bind - %s\n", ldap_errstr(*conn, tctx, status));
tctx               45 source4/torture/libnet/libnet_BecomeDC.c 	struct torture_context *tctx;
tctx              282 source4/torture/libnet/libnet_BecomeDC.c 	if (lp_parm_bool(s->tctx->lp_ctx, NULL, "become dc", "dump objects", false)) {
tctx              325 source4/torture/libnet/libnet_BecomeDC.c 	s->ldb = ldb_wrap_connect(s, s->tctx->ev, s->tctx->lp_ctx, sam_ldb_path,
tctx              326 source4/torture/libnet/libnet_BecomeDC.c 				  system_session(s, s->tctx->lp_ctx),
tctx              523 source4/torture/libnet/libnet_BecomeDC.c 	if (lp_parm_bool(s->tctx->lp_ctx, NULL, "become dc", "dump objects", false)) {
tctx              553 source4/torture/libnet/libnet_BecomeDC.c 		if (lp_parm_bool(s->tctx->lp_ctx, NULL, "become dc", "dump objects", false)) {
tctx              584 source4/torture/libnet/libnet_BecomeDC.c 	s->tctx = torture;
tctx              668 source4/torture/libnet/libnet_BecomeDC.c 	s->ldb = ldb_wrap_connect(s, s->tctx->ev, s->lp_ctx, sam_ldb_path,
tctx               82 source4/torture/libnet/userman.c static bool test_usermod(struct torture_context *tctx, struct dcerpc_pipe *p, 
tctx              106 source4/torture/libnet/userman.c 	torture_comment(tctx, "modifying user (%d simultaneous change(s))\n", 
tctx              109 source4/torture/libnet/userman.c 	torture_comment(tctx, "fields to change: [");
tctx              204 source4/torture/libnet/userman.c 		torture_comment(tctx, ((i < num_changes - 1) ? "%s," : "%s"), fldname);
tctx              206 source4/torture/libnet/userman.c 	torture_comment(tctx, "]\n");
tctx              209 source4/torture/libnet/userman.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to call sync libnet_rpc_usermod");
tctx              268 source4/torture/libnet/userman.c static bool test_compare(struct torture_context *tctx, 
tctx              285 source4/torture/libnet/userman.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to call sync libnet_rpc_userinfo");
tctx               32 source4/torture/libnet/utils.c bool test_opendomain(struct torture_context *tctx, 
tctx               44 source4/torture/libnet/utils.c 	torture_comment(tctx, "connecting\n");
tctx               51 source4/torture/libnet/utils.c 	torture_assert_ntstatus_ok(tctx, status, "Connect failed");
tctx               57 source4/torture/libnet/utils.c 	torture_comment(tctx, "domain lookup on %s\n", domname->string);
tctx               60 source4/torture/libnet/utils.c 	torture_assert_ntstatus_ok(tctx, status, "LookupDomain failed");
tctx               67 source4/torture/libnet/utils.c 	torture_comment(tctx, "opening domain\n");
tctx               70 source4/torture/libnet/utils.c 	torture_assert_ntstatus_ok(tctx, status, "OpenDomain failed");
tctx               78 source4/torture/libnet/utils.c bool test_user_cleanup(struct torture_context *tctx, struct dcerpc_pipe *p, 
tctx               99 source4/torture/libnet/utils.c 	torture_comment(tctx, "user account lookup '%s'\n", name);
tctx              102 source4/torture/libnet/utils.c 	torture_assert_ntstatus_ok(tctx, status, "LookupNames failed");
tctx              111 source4/torture/libnet/utils.c 	torture_comment(tctx, "opening user account\n");
tctx              114 source4/torture/libnet/utils.c 	torture_assert_ntstatus_ok(tctx, status, "OpenUser failed");
tctx              119 source4/torture/libnet/utils.c 	torture_comment(tctx, "deleting user account\n");
tctx              122 source4/torture/libnet/utils.c 	torture_assert_ntstatus_ok(tctx, status, "DeleteUser failed");
tctx              128 source4/torture/libnet/utils.c bool test_user_create(struct torture_context *tctx, 
tctx              146 source4/torture/libnet/utils.c 	torture_comment(tctx, "creating user account %s\n", name);
tctx              153 source4/torture/libnet/utils.c 			torture_comment(tctx, "User (%s) already exists - attempting to delete and recreate account again\n", name);
tctx              154 source4/torture/libnet/utils.c 			if (!test_user_cleanup(tctx, p, mem_ctx, handle, name)) {
tctx              158 source4/torture/libnet/utils.c 			torture_comment(tctx, "creating user account\n");
tctx              161 source4/torture/libnet/utils.c 			torture_assert_ntstatus_ok(tctx, status, "CreateUser failed");
tctx               22 source4/torture/libnet/utils.h bool test_opendomain(struct torture_context *tctx, 
tctx               27 source4/torture/libnet/utils.h bool test_user_create(struct torture_context *tctx, 
tctx               32 source4/torture/libnet/utils.h bool test_user_cleanup(struct torture_context *tctx, 
tctx               30 source4/torture/local/torture.c static bool test_tempdir(struct torture_context *tctx)
tctx               33 source4/torture/local/torture.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               35 source4/torture/local/torture.c 	torture_assert_ntstatus_ok(tctx, torture_temp_dir(mem_ctx, "tempdir", &location), 
tctx               38 source4/torture/local/torture.c 	torture_assert(tctx, directory_exist(location), 
tctx               43 source4/torture/local/torture.c static bool test_provision(struct torture_context *tctx)
tctx               46 source4/torture/local/torture.c 	struct provision_settings *settings = talloc_zero(tctx, struct provision_settings);
tctx               50 source4/torture/local/torture.c 	torture_assert_ntstatus_ok(tctx, torture_temp_dir(tctx, "torture_provision", &targetdir), 
tctx               67 source4/torture/local/torture.c 	status = provision_bare(settings, tctx->lp_ctx, settings, &result);
tctx               69 source4/torture/local/torture.c 	torture_assert_ntstatus_ok(tctx, status, "provision");
tctx               71 source4/torture/local/torture.c 	torture_assert_str_equal(tctx, result.domaindn, "DC=EXAMPLE,DC=COM", 
tctx               40 source4/torture/nbench/nbench.c 	for (n=0;n<=nb_max_retries && !op;n++) do_reconnect(&cli, tctx, client)
tctx               42 source4/torture/nbench/nbench.c static void do_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client)
tctx               47 source4/torture/nbench/nbench.c 		if (nb_reconnect(cli, tctx, client)) {
tctx               57 source4/torture/nbench/nbench.c static bool run_netbench(struct torture_context *tctx, struct smbcli_state *cli, int client)
tctx               59 source4/torture/nbench/nbench.c 	int torture_nprocs = torture_setting_int(tctx, "nprocs", 4);
tctx               65 source4/torture/nbench/nbench.c 	double target_rate = torture_setting_double(tctx, "targetrate", 0);	
tctx              160 source4/torture/nbench/nbio.c bool nb_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client)
tctx              168 source4/torture/nbench/nbio.c 	if (!torture_open_connection(cli, tctx, client)) {
tctx               67 source4/torture/nbt/dgram.c static bool nbt_test_netlogon(struct torture_context *tctx)
tctx               70 source4/torture/nbt/dgram.c 	struct nbt_dgram_socket *dgmsock = nbt_dgram_socket_init(tctx, tctx->ev, 
tctx               71 source4/torture/nbt/dgram.c 								 lp_iconv_convenience(tctx->lp_ctx));
tctx               87 source4/torture/nbt/dgram.c 	name.name = lp_workgroup(tctx->lp_ctx);
tctx               92 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, 
tctx               93 source4/torture/nbt/dgram.c 				   resolve_name(lp_resolve_context(tctx->lp_ctx), &name, tctx, &address, tctx->ev),
tctx               94 source4/torture/nbt/dgram.c 				   talloc_asprintf(tctx, "Failed to resolve %s", name.name));
tctx               96 source4/torture/nbt/dgram.c 	load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx              101 source4/torture/nbt/dgram.c 						     myaddress, lp_dgram_port(tctx->lp_ctx));
tctx              102 source4/torture/nbt/dgram.c 	torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx              113 source4/torture/nbt/dgram.c 		torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx              134 source4/torture/nbt/dgram.c 					   address, lp_dgram_port(tctx->lp_ctx));
tctx              135 source4/torture/nbt/dgram.c 	torture_assert(tctx, dest != NULL, "Error getting address");
tctx              140 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx              148 source4/torture/nbt/dgram.c 	torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx              150 source4/torture/nbt/dgram.c 	torture_assert(tctx, response->response_type == NETLOGON_GET_PDC, "Got incorrect type of netlogon response");
tctx              151 source4/torture/nbt/dgram.c 	torture_assert(tctx, response->data.get_pdc.command == NETLOGON_RESPONSE_FROM_PDC, "Got incorrect netlogon response command");
tctx              158 source4/torture/nbt/dgram.c static bool nbt_test_netlogon2(struct torture_context *tctx)
tctx              161 source4/torture/nbt/dgram.c 	struct nbt_dgram_socket *dgmsock = nbt_dgram_socket_init(tctx, tctx->ev,
tctx              162 source4/torture/nbt/dgram.c 								 lp_iconv_convenience(tctx->lp_ctx));
tctx              181 source4/torture/nbt/dgram.c 	name.name = lp_workgroup(tctx->lp_ctx);
tctx              186 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, 
tctx              187 source4/torture/nbt/dgram.c 				   resolve_name(lp_resolve_context(tctx->lp_ctx), &name, tctx, &address, tctx->ev),
tctx              188 source4/torture/nbt/dgram.c 				   talloc_asprintf(tctx, "Failed to resolve %s", name.name));
tctx              190 source4/torture/nbt/dgram.c 	load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx              194 source4/torture/nbt/dgram.c 						     myaddress, lp_dgram_port(tctx->lp_ctx));
tctx              195 source4/torture/nbt/dgram.c 	torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx              206 source4/torture/nbt/dgram.c 		torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx              229 source4/torture/nbt/dgram.c 					   address, lp_dgram_port(tctx->lp_ctx));
tctx              231 source4/torture/nbt/dgram.c 	torture_assert(tctx, dest != NULL, "Error getting address");
tctx              235 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx              243 source4/torture/nbt/dgram.c 	torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx              245 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx              248 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE_EX, "Got incorrect netlogon response command");
tctx              249 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.nt_version, NETLOGON_NT_VERSION_5EX_WITH_IP|NETLOGON_NT_VERSION_5EX|NETLOGON_NT_VERSION_1, "Got incorrect netlogon response command");
tctx              268 source4/torture/nbt/dgram.c 					   address, lp_dgram_port(tctx->lp_ctx));
tctx              270 source4/torture/nbt/dgram.c 	torture_assert(tctx, dest != NULL, "Error getting address");
tctx              274 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx              282 source4/torture/nbt/dgram.c 	torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx              284 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx              287 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_USER_UNKNOWN, "Got incorrect netlogon response command");
tctx              289 source4/torture/nbt/dgram.c 	torture_assert_str_equal(tctx, response->data.samlogon.data.nt5_ex.user_name, TEST_NAME"$", "Got incorrect user in netlogon response");
tctx              291 source4/torture/nbt/dgram.c 	join_ctx = torture_join_domain(tctx, TEST_NAME, 
tctx              294 source4/torture/nbt/dgram.c 	torture_assert(tctx, join_ctx != NULL,
tctx              295 source4/torture/nbt/dgram.c 		       talloc_asprintf(tctx, "Failed to join domain %s as %s\n",
tctx              296 source4/torture/nbt/dgram.c 		       		       lp_workgroup(tctx->lp_ctx), TEST_NAME));
tctx              318 source4/torture/nbt/dgram.c 					   address, lp_dgram_port(tctx->lp_ctx));
tctx              320 source4/torture/nbt/dgram.c 	torture_assert(tctx, dest != NULL, "Error getting address");
tctx              324 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx              333 source4/torture/nbt/dgram.c 	torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx              335 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx              338 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_USER_UNKNOWN, "Got incorrect netlogon response command");
tctx              359 source4/torture/nbt/dgram.c 					   address, lp_dgram_port(tctx->lp_ctx));
tctx              361 source4/torture/nbt/dgram.c 	torture_assert(tctx, dest != NULL, "Error getting address");
tctx              365 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx              374 source4/torture/nbt/dgram.c 	torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx              376 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx              379 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE, "Got incorrect netlogon response command");
tctx              398 source4/torture/nbt/dgram.c 					   address, lp_dgram_port(tctx->lp_ctx));
tctx              400 source4/torture/nbt/dgram.c 	torture_assert(tctx, dest != NULL, "Error getting address");
tctx              404 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx              413 source4/torture/nbt/dgram.c 	torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx              415 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx              418 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_USER_UNKNOWN, "Got incorrect netlogon response command");
tctx              420 source4/torture/nbt/dgram.c 	torture_leave_domain(tctx, join_ctx);
tctx              426 source4/torture/nbt/dgram.c static bool nbt_test_ntlogon(struct torture_context *tctx)
tctx              429 source4/torture/nbt/dgram.c 	struct nbt_dgram_socket *dgmsock = nbt_dgram_socket_init(tctx, tctx->ev,
tctx              430 source4/torture/nbt/dgram.c 								 lp_iconv_convenience(tctx->lp_ctx));
tctx              449 source4/torture/nbt/dgram.c 	name.name = lp_workgroup(tctx->lp_ctx);
tctx              454 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, 
tctx              455 source4/torture/nbt/dgram.c 				   resolve_name(lp_resolve_context(tctx->lp_ctx), &name, tctx, &address, tctx->ev),
tctx              456 source4/torture/nbt/dgram.c 				   talloc_asprintf(tctx, "Failed to resolve %s", name.name));
tctx              458 source4/torture/nbt/dgram.c 	load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx              462 source4/torture/nbt/dgram.c 						     myaddress, lp_dgram_port(tctx->lp_ctx));
tctx              463 source4/torture/nbt/dgram.c 	torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx              474 source4/torture/nbt/dgram.c 		torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx              479 source4/torture/nbt/dgram.c 	join_ctx = torture_join_domain(tctx, TEST_NAME, 
tctx              483 source4/torture/nbt/dgram.c 	torture_assert(tctx, join_ctx != NULL,
tctx              484 source4/torture/nbt/dgram.c 		       talloc_asprintf(tctx, "Failed to join domain %s as %s\n",
tctx              485 source4/torture/nbt/dgram.c 		       		       lp_workgroup(tctx->lp_ctx), TEST_NAME));
tctx              508 source4/torture/nbt/dgram.c 					   address, lp_dgram_port(tctx->lp_ctx));
tctx              509 source4/torture/nbt/dgram.c 	torture_assert(tctx, dest != NULL, "Error getting address");
tctx              514 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request");
tctx              522 source4/torture/nbt/dgram.c 	torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx              524 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx              527 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE, "Got incorrect netlogon response command");
tctx              529 source4/torture/nbt/dgram.c 	torture_assert_str_equal(tctx, response->data.samlogon.data.nt5_ex.user_name, TEST_NAME"$", "Got incorrect user in netlogon response");
tctx              552 source4/torture/nbt/dgram.c 					   address, lp_dgram_port(tctx->lp_ctx));
tctx              553 source4/torture/nbt/dgram.c 	torture_assert(tctx, dest != NULL, "Error getting address");
tctx              558 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request");
tctx              566 source4/torture/nbt/dgram.c 	torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx              568 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx              571 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE, "Got incorrect netlogon response command");
tctx              573 source4/torture/nbt/dgram.c 	torture_assert_str_equal(tctx, response->data.samlogon.data.nt5_ex.user_name, TEST_NAME"$", "Got incorrect user in netlogon response");
tctx              592 source4/torture/nbt/dgram.c 					   address, lp_dgram_port(tctx->lp_ctx));
tctx              593 source4/torture/nbt/dgram.c 	torture_assert(tctx, dest != NULL, "Error getting address");
tctx              598 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request");
tctx              606 source4/torture/nbt/dgram.c 	torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx              608 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->response_type, NETLOGON_GET_PDC, "Got incorrect type of ntlogon response");
tctx              609 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->data.get_pdc.command, NETLOGON_RESPONSE_FROM_PDC, "Got incorrect ntlogon response command");
tctx              611 source4/torture/nbt/dgram.c 	torture_leave_domain(tctx, join_ctx);
tctx              629 source4/torture/nbt/dgram.c 					   address, lp_dgram_port(tctx->lp_ctx));
tctx              630 source4/torture/nbt/dgram.c 	torture_assert(tctx, dest != NULL, "Error getting address");
tctx              635 source4/torture/nbt/dgram.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request");
tctx              643 source4/torture/nbt/dgram.c 	torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx              645 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->response_type, NETLOGON_GET_PDC, "Got incorrect type of ntlogon response");
tctx              646 source4/torture/nbt/dgram.c 	torture_assert_int_equal(tctx, response->data.get_pdc.command, NETLOGON_RESPONSE_FROM_PDC, "Got incorrect ntlogon response command");
tctx               28 source4/torture/nbt/nbt.c struct nbt_name_socket *torture_init_nbt_socket(struct torture_context *tctx)
tctx               30 source4/torture/nbt/nbt.c 	return nbt_name_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx               33 source4/torture/nbt/nbt.c bool torture_nbt_get_name(struct torture_context *tctx, 
tctx               37 source4/torture/nbt/nbt.c 	make_nbt_name_server(name, strupper_talloc(tctx, 
tctx               38 source4/torture/nbt/nbt.c 			     torture_setting_string(tctx, "host", NULL)));
tctx               41 source4/torture/nbt/nbt.c 	torture_assert_ntstatus_ok(tctx, 
tctx               42 source4/torture/nbt/nbt.c 				   resolve_name(lp_resolve_context(tctx->lp_ctx), name, tctx, address, tctx->ev), 
tctx               43 source4/torture/nbt/nbt.c 				   talloc_asprintf(tctx, 
tctx               48 source4/torture/nbt/query.c static bool bench_namequery(struct torture_context *tctx)
tctx               50 source4/torture/nbt/query.c 	struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx);
tctx               55 source4/torture/nbt/query.c 	int timelimit = torture_setting_int(tctx, "timelimit", 5);
tctx               60 source4/torture/nbt/query.c 	if (!torture_nbt_get_name(tctx, &name, &address))
tctx               65 source4/torture/nbt/query.c 	io.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx               70 source4/torture/nbt/query.c 	result = talloc_zero(tctx, struct result_struct);
tctx               72 source4/torture/nbt/query.c 	torture_comment(tctx, "Running for %d seconds\n", timelimit);
tctx               77 source4/torture/nbt/query.c 			torture_assert(tctx, req != NULL, "Failed to setup request!");
tctx               82 source4/torture/nbt/query.c 				if (torture_setting_bool(tctx, "progress", true)) {
tctx               83 source4/torture/nbt/query.c 					torture_comment(tctx, "%.1f queries per second (%d failures)  \r", 
tctx               98 source4/torture/nbt/query.c 	torture_comment(tctx, "%.1f queries per second (%d failures)  \n", 
tctx               31 source4/torture/nbt/register.c #define CHECK_VALUE(tctx, v, correct) \
tctx               32 source4/torture/nbt/register.c 	torture_assert_int_equal(tctx, v, correct, "Incorrect value")
tctx               34 source4/torture/nbt/register.c #define CHECK_STRING(tctx, v, correct) \
tctx               35 source4/torture/nbt/register.c 	torture_assert_casestr_equal(tctx, v, correct, "Incorrect value")
tctx               43 source4/torture/nbt/register.c static bool nbt_register_own(struct torture_context *tctx)
tctx               47 source4/torture/nbt/register.c 	struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx);
tctx               54 source4/torture/nbt/register.c 	if (!torture_nbt_get_name(tctx, &name, &address))
tctx               57 source4/torture/nbt/register.c 	load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx               61 source4/torture/nbt/register.c 	socket_address = socket_address_from_strings(tctx, nbtsock->sock->backend_name,
tctx               63 source4/torture/nbt/register.c 	torture_assert(tctx, socket_address != NULL, "Unable to get address");
tctx               66 source4/torture/nbt/register.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx               69 source4/torture/nbt/register.c 	torture_comment(tctx, "Testing name defense to name registration\n");
tctx               73 source4/torture/nbt/register.c 	io.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx               83 source4/torture/nbt/register.c 	status = nbt_name_register(nbtsock, tctx, &io);
tctx               84 source4/torture/nbt/register.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx               85 source4/torture/nbt/register.c 				talloc_asprintf(tctx, "Bad response from %s for name register",
tctx               88 source4/torture/nbt/register.c 	CHECK_STRING(tctx, io.out.name.name, name.name);
tctx               89 source4/torture/nbt/register.c 	CHECK_VALUE(tctx, io.out.name.type, name.type);
tctx               90 source4/torture/nbt/register.c 	CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT);
tctx               96 source4/torture/nbt/register.c 	status = nbt_name_register(nbtsock, tctx, &io);
tctx               98 source4/torture/nbt/register.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx               99 source4/torture/nbt/register.c 				talloc_asprintf(tctx, "Bad response from %s for name register demand", address));
tctx              101 source4/torture/nbt/register.c 	CHECK_STRING(tctx, io.out.name.name, name.name);
tctx              102 source4/torture/nbt/register.c 	CHECK_VALUE(tctx, io.out.name.type, name.type);
tctx              103 source4/torture/nbt/register.c 	CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT);
tctx              112 source4/torture/nbt/register.c static bool nbt_refresh_own(struct torture_context *tctx)
tctx              116 source4/torture/nbt/register.c 	struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx);
tctx              123 source4/torture/nbt/register.c 	if (!torture_nbt_get_name(tctx, &name, &address))
tctx              126 source4/torture/nbt/register.c 	load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx              130 source4/torture/nbt/register.c 	socket_address = socket_address_from_strings(tctx, nbtsock->sock->backend_name,
tctx              132 source4/torture/nbt/register.c 	torture_assert(tctx, socket_address != NULL, 
tctx              136 source4/torture/nbt/register.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              139 source4/torture/nbt/register.c 	torture_comment(tctx, "Testing name defense to name refresh\n");
tctx              143 source4/torture/nbt/register.c 	io.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx              151 source4/torture/nbt/register.c 	status = nbt_name_refresh(nbtsock, tctx, &io);
tctx              153 source4/torture/nbt/register.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              154 source4/torture/nbt/register.c 				talloc_asprintf(tctx, "Bad response from %s for name refresh", address));
tctx              156 source4/torture/nbt/register.c 	CHECK_STRING(tctx, io.out.name.name, name.name);
tctx              157 source4/torture/nbt/register.c 	CHECK_VALUE(tctx, io.out.name.type, name.type);
tctx              158 source4/torture/nbt/register.c 	CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT);
tctx               34 source4/torture/nbt/wins.c #define CHECK_VALUE(tctx, v, correct) \
tctx               35 source4/torture/nbt/wins.c 	torture_assert_int_equal(tctx, v, correct, "Incorrect value")
tctx               37 source4/torture/nbt/wins.c #define CHECK_STRING(tctx, v, correct) \
tctx               38 source4/torture/nbt/wins.c 	torture_assert_casestr_equal(tctx, v, correct, "Incorrect value")
tctx               40 source4/torture/nbt/wins.c #define CHECK_NAME(tctx, _name, correct) do { \
tctx               41 source4/torture/nbt/wins.c 	CHECK_STRING(tctx, (_name).name, (correct).name); \
tctx               42 source4/torture/nbt/wins.c 	CHECK_VALUE(tctx, (uint8_t)(_name).type, (uint8_t)(correct).type); \
tctx               43 source4/torture/nbt/wins.c 	CHECK_STRING(tctx, (_name).scope, (correct).scope); \
tctx               50 source4/torture/nbt/wins.c static bool nbt_test_wins_name(struct torture_context *tctx, const char *address,
tctx               61 source4/torture/nbt/wins.c 	struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx);
tctx               67 source4/torture/nbt/wins.c 	load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx               69 source4/torture/nbt/wins.c 	myaddress = talloc_strdup(tctx, iface_best_ip(ifaces, address));
tctx               71 source4/torture/nbt/wins.c 	socket_address = socket_address_from_strings(tctx, 
tctx               73 source4/torture/nbt/wins.c 						     myaddress, lp_nbt_port(tctx->lp_ctx));
tctx               74 source4/torture/nbt/wins.c 	torture_assert(tctx, socket_address != NULL, 
tctx               83 source4/torture/nbt/wins.c 		socket_address = socket_address_from_strings(tctx,
tctx               86 source4/torture/nbt/wins.c 		torture_assert(tctx, socket_address != NULL,
tctx               91 source4/torture/nbt/wins.c 		torture_assert_ntstatus_ok(tctx, status,
tctx               95 source4/torture/nbt/wins.c 	torture_comment(tctx, "Testing name registration to WINS with name %s at %s nb_flags=0x%x\n", 
tctx               96 source4/torture/nbt/wins.c 	       nbt_name_string(tctx, name), myaddress, nb_flags);
tctx               98 source4/torture/nbt/wins.c 	torture_comment(tctx, "release the name\n");
tctx              100 source4/torture/nbt/wins.c 	release.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx              108 source4/torture/nbt/wins.c 	status = nbt_name_release(nbtsock, tctx, &release);
tctx              109 source4/torture/nbt/wins.c 	torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx              110 source4/torture/nbt/wins.c 	CHECK_VALUE(tctx, release.out.rcode, 0);
tctx              115 source4/torture/nbt/wins.c 		torture_comment(tctx, "no low port - skip: register the name with a wrong address\n");
tctx              117 source4/torture/nbt/wins.c 		torture_comment(tctx, "register the name with a wrong address (makes the next request slow!)\n");
tctx              119 source4/torture/nbt/wins.c 		io.in.wins_port = lp_nbt_port(tctx->lp_ctx);
tctx              120 source4/torture/nbt/wins.c 		io.in.wins_servers = str_list_make(tctx, address, NULL);
tctx              121 source4/torture/nbt/wins.c 		io.in.addresses = str_list_make(tctx, "127.64.64.1", NULL);
tctx              125 source4/torture/nbt/wins.c 		status = nbt_name_register_wins(nbtsock, tctx, &io);
tctx              127 source4/torture/nbt/wins.c 			torture_assert_ntstatus_ok(tctx, status,
tctx              128 source4/torture/nbt/wins.c 				talloc_asprintf(tctx, "No response from %s for name register\n",
tctx              131 source4/torture/nbt/wins.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              132 source4/torture/nbt/wins.c 			talloc_asprintf(tctx, "Bad response from %s for name register\n",
tctx              135 source4/torture/nbt/wins.c 		CHECK_STRING(tctx, io.out.wins_server, address);
tctx              136 source4/torture/nbt/wins.c 		CHECK_VALUE(tctx, io.out.rcode, 0);
tctx              138 source4/torture/nbt/wins.c 		torture_comment(tctx, "register the name correct address\n");
tctx              140 source4/torture/nbt/wins.c 		name_register.in.dest_port	= lp_nbt_port(tctx->lp_ctx);
tctx              175 source4/torture/nbt/wins.c 		status = nbt_name_register_recv(req, tctx, &name_register);
tctx              177 source4/torture/nbt/wins.c 			torture_assert_ntstatus_ok(tctx, status,
tctx              178 source4/torture/nbt/wins.c 				talloc_asprintf(tctx, "No response from %s for name register\n",
tctx              181 source4/torture/nbt/wins.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              182 source4/torture/nbt/wins.c 			talloc_asprintf(tctx, "Bad response from %s for name register\n",
tctx              185 source4/torture/nbt/wins.c 		CHECK_VALUE(tctx, name_register.out.rcode, 0);
tctx              186 source4/torture/nbt/wins.c 		CHECK_STRING(tctx, name_register.out.reply_addr, myaddress);
tctx              189 source4/torture/nbt/wins.c 	torture_comment(tctx, "register the name correct address\n");
tctx              191 source4/torture/nbt/wins.c 	io.in.wins_port = lp_nbt_port(tctx->lp_ctx);
tctx              192 source4/torture/nbt/wins.c 	io.in.wins_servers = (const char **)str_list_make(tctx, address, NULL);
tctx              193 source4/torture/nbt/wins.c 	io.in.addresses = (const char **)str_list_make(tctx, myaddress, NULL);
tctx              197 source4/torture/nbt/wins.c 	status = nbt_name_register_wins(nbtsock, tctx, &io);
tctx              198 source4/torture/nbt/wins.c 	torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name register", address));
tctx              200 source4/torture/nbt/wins.c 	CHECK_STRING(tctx, io.out.wins_server, address);
tctx              201 source4/torture/nbt/wins.c 	CHECK_VALUE(tctx, io.out.rcode, 0);
tctx              207 source4/torture/nbt/wins.c 		torture_comment(tctx, "Try to register as non-group\n");
tctx              209 source4/torture/nbt/wins.c 		status = nbt_name_register_wins(nbtsock, tctx, &io);
tctx              210 source4/torture/nbt/wins.c 		torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name register\n",
tctx              212 source4/torture/nbt/wins.c 		CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT);
tctx              215 source4/torture/nbt/wins.c 	torture_comment(tctx, "query the name to make sure its there\n");
tctx              218 source4/torture/nbt/wins.c 	query.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx              224 source4/torture/nbt/wins.c 	status = nbt_name_query(nbtsock, tctx, &query);
tctx              227 source4/torture/nbt/wins.c 			  tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, 
tctx              228 source4/torture/nbt/wins.c 			  talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx              231 source4/torture/nbt/wins.c 	torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx              233 source4/torture/nbt/wins.c 	CHECK_NAME(tctx, query.out.name, *name);
tctx              234 source4/torture/nbt/wins.c 	CHECK_VALUE(tctx, query.out.num_addrs, 1);
tctx              237 source4/torture/nbt/wins.c 		CHECK_STRING(tctx, query.out.reply_addrs[0], "255.255.255.255");
tctx              239 source4/torture/nbt/wins.c 		CHECK_STRING(tctx, query.out.reply_addrs[0], myaddress);
tctx              243 source4/torture/nbt/wins.c 	query.in.name.name = strupper_talloc(tctx, name->name);
tctx              246 source4/torture/nbt/wins.c 		torture_comment(tctx, "check case sensitivity\n");
tctx              247 source4/torture/nbt/wins.c 		status = nbt_name_query(nbtsock, tctx, &query);
tctx              248 source4/torture/nbt/wins.c 		torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx              253 source4/torture/nbt/wins.c 		query.in.name.scope = strupper_talloc(tctx, name->scope);
tctx              257 source4/torture/nbt/wins.c 		torture_comment(tctx, "check case sensitivity on scope\n");
tctx              258 source4/torture/nbt/wins.c 		status = nbt_name_query(nbtsock, tctx, &query);
tctx              259 source4/torture/nbt/wins.c 		torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx              262 source4/torture/nbt/wins.c 	torture_comment(tctx, "refresh the name\n");
tctx              264 source4/torture/nbt/wins.c 	refresh.in.wins_port = lp_nbt_port(tctx->lp_ctx);
tctx              265 source4/torture/nbt/wins.c 	refresh.in.wins_servers = (const char **)str_list_make(tctx, address, NULL);
tctx              266 source4/torture/nbt/wins.c 	refresh.in.addresses = (const char **)str_list_make(tctx, myaddress, NULL);
tctx              270 source4/torture/nbt/wins.c 	status = nbt_name_refresh_wins(nbtsock, tctx, &refresh);
tctx              272 source4/torture/nbt/wins.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              273 source4/torture/nbt/wins.c 			talloc_asprintf(tctx, "No response from %s for name refresh",
tctx              276 source4/torture/nbt/wins.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              277 source4/torture/nbt/wins.c 		talloc_asprintf(tctx, "Bad response from %s for name refresh",
tctx              280 source4/torture/nbt/wins.c 	CHECK_STRING(tctx, refresh.out.wins_server, address);
tctx              281 source4/torture/nbt/wins.c 	CHECK_VALUE(tctx, refresh.out.rcode, 0);
tctx              285 source4/torture/nbt/wins.c 	release.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx              293 source4/torture/nbt/wins.c 	status = nbt_name_release(nbtsock, tctx, &release);
tctx              295 source4/torture/nbt/wins.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              296 source4/torture/nbt/wins.c 			talloc_asprintf(tctx, "No response from %s for name release",
tctx              299 source4/torture/nbt/wins.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              300 source4/torture/nbt/wins.c 		talloc_asprintf(tctx, "Bad response from %s for name release",
tctx              303 source4/torture/nbt/wins.c 	CHECK_NAME(tctx, release.out.name, *name);
tctx              304 source4/torture/nbt/wins.c 	CHECK_VALUE(tctx, release.out.rcode, 0);
tctx              309 source4/torture/nbt/wins.c 		torture_comment(tctx, "no low port - skip: register the name with a wrong address\n");
tctx              311 source4/torture/nbt/wins.c 		torture_comment(tctx, "register the name with a wrong address (makes the next request slow!)\n");
tctx              313 source4/torture/nbt/wins.c 		io.in.wins_port = lp_nbt_port(tctx->lp_ctx);
tctx              314 source4/torture/nbt/wins.c 		io.in.wins_servers = str_list_make(tctx, address, NULL);
tctx              315 source4/torture/nbt/wins.c 		io.in.addresses = str_list_make(tctx, "127.64.64.1", NULL);
tctx              319 source4/torture/nbt/wins.c 		status = nbt_name_register_wins(nbtsock, tctx, &io);
tctx              321 source4/torture/nbt/wins.c 			torture_assert_ntstatus_ok(tctx, status,
tctx              322 source4/torture/nbt/wins.c 				talloc_asprintf(tctx, "No response from %s for name register\n",
tctx              325 source4/torture/nbt/wins.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              326 source4/torture/nbt/wins.c 			talloc_asprintf(tctx, "Bad response from %s for name register\n",
tctx              329 source4/torture/nbt/wins.c 		CHECK_STRING(tctx, io.out.wins_server, address);
tctx              330 source4/torture/nbt/wins.c 		CHECK_VALUE(tctx, io.out.rcode, 0);
tctx              333 source4/torture/nbt/wins.c 	torture_comment(tctx, "refresh the name with the correct address\n");
tctx              335 source4/torture/nbt/wins.c 	refresh.in.wins_port = lp_nbt_port(tctx->lp_ctx);
tctx              336 source4/torture/nbt/wins.c 	refresh.in.wins_servers = str_list_make(tctx, address, NULL);
tctx              337 source4/torture/nbt/wins.c 	refresh.in.addresses = str_list_make(tctx, myaddress, NULL);
tctx              341 source4/torture/nbt/wins.c 	status = nbt_name_refresh_wins(nbtsock, tctx, &refresh);
tctx              343 source4/torture/nbt/wins.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              344 source4/torture/nbt/wins.c 			talloc_asprintf(tctx, "No response from %s for name refresh",
tctx              347 source4/torture/nbt/wins.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              348 source4/torture/nbt/wins.c 		talloc_asprintf(tctx, "Bad response from %s for name refresh",
tctx              351 source4/torture/nbt/wins.c 	CHECK_STRING(tctx, refresh.out.wins_server, address);
tctx              352 source4/torture/nbt/wins.c 	CHECK_VALUE(tctx, refresh.out.rcode, 0);
tctx              354 source4/torture/nbt/wins.c 	torture_comment(tctx, "release the name\n");
tctx              356 source4/torture/nbt/wins.c 	release.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx              364 source4/torture/nbt/wins.c 	status = nbt_name_release(nbtsock, tctx, &release);
tctx              365 source4/torture/nbt/wins.c 	torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx              367 source4/torture/nbt/wins.c 	CHECK_NAME(tctx, release.out.name, *name);
tctx              368 source4/torture/nbt/wins.c 	CHECK_VALUE(tctx, release.out.rcode, 0);
tctx              370 source4/torture/nbt/wins.c 	torture_comment(tctx, "release again\n");
tctx              371 source4/torture/nbt/wins.c 	status = nbt_name_release(nbtsock, tctx, &release);
tctx              372 source4/torture/nbt/wins.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              373 source4/torture/nbt/wins.c 				talloc_asprintf(tctx, "Bad response from %s for name query",
tctx              376 source4/torture/nbt/wins.c 	CHECK_NAME(tctx, release.out.name, *name);
tctx              377 source4/torture/nbt/wins.c 	CHECK_VALUE(tctx, release.out.rcode, 0);
tctx              380 source4/torture/nbt/wins.c 	torture_comment(tctx, "query the name to make sure its gone\n");
tctx              382 source4/torture/nbt/wins.c 	status = nbt_name_query(nbtsock, tctx, &query);
tctx              385 source4/torture/nbt/wins.c 		torture_assert_ntstatus_ok(tctx, status, 
tctx              388 source4/torture/nbt/wins.c 		torture_assert_ntstatus_equal(tctx, status, 
tctx              401 source4/torture/nbt/wins.c static bool nbt_test_wins(struct torture_context *tctx)
tctx              408 source4/torture/nbt/wins.c 	if (!torture_nbt_get_name(tctx, &name, &address))
tctx              411 source4/torture/nbt/wins.c 	name.name = talloc_asprintf(tctx, "_TORTURE-%5u", r);
tctx              415 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true);
tctx              418 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx              420 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false);
tctx              423 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true);
tctx              426 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false);
tctx              429 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false);
tctx              432 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true);
tctx              435 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true);
tctx              438 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx              442 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true);
tctx              446 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false);
tctx              450 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx              452 source4/torture/nbt/wins.c 	name.name = talloc_asprintf(tctx, "_T\01-%5u.foo", r);
tctx              453 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx              456 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx              458 source4/torture/nbt/wins.c 	name.name = talloc_asprintf(tctx, ".");
tctx              459 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx              461 source4/torture/nbt/wins.c 	name.name = talloc_asprintf(tctx, "%5u-\377\200\300FOO", r);
tctx              462 source4/torture/nbt/wins.c 	ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx               48 source4/torture/nbt/winsbench.c static struct nbt_name generate_name(TALLOC_CTX *tctx, int idx)
tctx               51 source4/torture/nbt/winsbench.c 	name.name       = talloc_asprintf(tctx, "WINSBench%6u", idx);
tctx              226 source4/torture/nbt/winsbench.c static bool bench_wins(struct torture_context *tctx)
tctx              228 source4/torture/nbt/winsbench.c 	struct nbt_name_socket *nbtsock = nbt_name_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              232 source4/torture/nbt/winsbench.c 	int timelimit = torture_setting_int(tctx, "timelimit", 5);
tctx              240 source4/torture/nbt/winsbench.c 	if (!torture_nbt_get_name(tctx, &name, &address))
tctx              248 source4/torture/nbt/winsbench.c 	state->wins_port = lp_nbt_port(tctx->lp_ctx);
tctx              249 source4/torture/nbt/winsbench.c 	load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx              250 source4/torture/nbt/winsbench.c 	state->my_ip = talloc_strdup(tctx, iface_best_ip(ifaces, address));
tctx              258 source4/torture/nbt/winsbench.c 	torture_comment(tctx, "Running for %d seconds\n", timelimit);
tctx              264 source4/torture/nbt/winsbench.c 				if (torture_setting_bool(tctx, "progress", true)) {
tctx              265 source4/torture/nbt/winsbench.c 					torture_comment(tctx, "%.1f queries per second (%d failures)  \r", 
tctx              280 source4/torture/nbt/winsbench.c 	torture_comment(tctx, "%.1f queries per second (%d failures)  \n", 
tctx               35 source4/torture/nbt/winsreplication.c #define CHECK_STATUS(tctx, status, correct) \
tctx               36 source4/torture/nbt/winsreplication.c 	torture_assert_ntstatus_equal(tctx, status, correct, \
tctx               39 source4/torture/nbt/winsreplication.c #define CHECK_VALUE(tctx, v, correct) \
tctx               40 source4/torture/nbt/winsreplication.c 	torture_assert(tctx, (v) == (correct), \
tctx               41 source4/torture/nbt/winsreplication.c 				   talloc_asprintf(tctx, "Incorrect value %s=%d - should be %d\n", \
tctx               44 source4/torture/nbt/winsreplication.c #define CHECK_VALUE_UINT64(tctx, v, correct) \
tctx               45 source4/torture/nbt/winsreplication.c 	torture_assert(tctx, (v) == (correct), \
tctx               46 source4/torture/nbt/winsreplication.c 		talloc_asprintf(tctx, "Incorrect value %s=%llu - should be %llu\n", \
tctx               49 source4/torture/nbt/winsreplication.c #define CHECK_VALUE_STRING(tctx, v, correct) \
tctx               50 source4/torture/nbt/winsreplication.c 	torture_assert_str_equal(tctx, v, correct, "Invalid value")
tctx               84 source4/torture/nbt/winsreplication.c static bool test_assoc_ctx1(struct torture_context *tctx)
tctx              101 source4/torture/nbt/winsreplication.c 	if (!torture_nbt_get_name(tctx, &name, &address))
tctx              104 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Test if assoc_ctx is only valid on the conection it was created on\n");
tctx              106 source4/torture/nbt/winsreplication.c 	wrepl_socket1 = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              107 source4/torture/nbt/winsreplication.c 	wrepl_socket2 = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              109 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Setup 2 wrepl connections\n");
tctx              110 source4/torture/nbt/winsreplication.c 	status = wrepl_connect(wrepl_socket1, wrepl_best_ip(tctx->lp_ctx, address), address);
tctx              111 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              113 source4/torture/nbt/winsreplication.c 	status = wrepl_connect(wrepl_socket2, wrepl_best_ip(tctx->lp_ctx, address), address);
tctx              114 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              116 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send a start association request (conn1)\n");
tctx              118 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              120 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "association context (conn1): 0x%x\n", associate1.out.assoc_ctx);
tctx              122 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send a start association request (conn2)\n");
tctx              124 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              126 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "association context (conn2): 0x%x\n", associate2.out.assoc_ctx);
tctx              128 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send a replication table query, with assoc 1 (conn2), the anwser should be on conn1\n");
tctx              137 source4/torture/nbt/winsreplication.c 	status = wrepl_request_recv(req, tctx, &rep_packet);
tctx              138 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              140 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send a association request (conn2), to make sure the last request was ignored\n");
tctx              142 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              144 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send a replication table query, with invalid assoc (conn1), receive answer from conn2\n");
tctx              147 source4/torture/nbt/winsreplication.c 	status = wrepl_request_recv(req, tctx, &rep_packet);
tctx              148 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              150 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send a association request (conn1), to make sure the last request was handled correct\n");
tctx              152 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              156 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send a association stop request (conn1), reson: %u\n", assoc_stop.in.reason);
tctx              158 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_END_OF_FILE);
tctx              162 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send a association stop request (conn2), reson: %u\n", assoc_stop.in.reason);
tctx              164 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              166 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Close 2 wrepl connections\n");
tctx              175 source4/torture/nbt/winsreplication.c static bool test_assoc_ctx2(struct torture_context *tctx)
tctx              184 source4/torture/nbt/winsreplication.c 	if (!torture_nbt_get_name(tctx, &name, &address))
tctx              187 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Test if we always get back the same assoc_ctx\n");
tctx              189 source4/torture/nbt/winsreplication.c 	wrepl_socket = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              191 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Setup wrepl connections\n");
tctx              192 source4/torture/nbt/winsreplication.c 	status = wrepl_connect(wrepl_socket, wrepl_best_ip(tctx->lp_ctx, address), address);
tctx              193 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              195 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send 1st start association request\n");
tctx              197 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              199 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "1st association context: 0x%x\n", associate.out.assoc_ctx);
tctx              201 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send 2nd start association request\n");
tctx              203 source4/torture/nbt/winsreplication.c 	torture_assert_ntstatus_ok(tctx, status, "2nd start association failed");
tctx              204 source4/torture/nbt/winsreplication.c 	torture_assert(tctx, associate.out.assoc_ctx == assoc_ctx1, 
tctx              206 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "2nd association context: 0x%x\n", associate.out.assoc_ctx);
tctx              208 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send 3rd start association request\n");
tctx              210 source4/torture/nbt/winsreplication.c 	torture_assert(tctx, associate.out.assoc_ctx == assoc_ctx1, 
tctx              212 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              213 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "3rd association context: 0x%x\n", associate.out.assoc_ctx);
tctx              215 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Close wrepl connections\n");
tctx              224 source4/torture/nbt/winsreplication.c static void display_entry(struct torture_context *tctx, struct wrepl_name *name)
tctx              228 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "%s\n", nbt_name_string(tctx, &name->name));
tctx              229 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "\tTYPE:%u STATE:%u NODE:%u STATIC:%u VERSION_ID: %llu\n",
tctx              231 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "\tRAW_FLAGS: 0x%08X OWNER: %-15s\n",
tctx              234 source4/torture/nbt/winsreplication.c 		torture_comment(tctx, "\tADDR: %-15s OWNER: %-15s\n", 
tctx              242 source4/torture/nbt/winsreplication.c static bool test_wins_replication(struct torture_context *tctx)
tctx              253 source4/torture/nbt/winsreplication.c 	if (!torture_nbt_get_name(tctx, &name, &address))
tctx              256 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Test one pull replication cycle\n");
tctx              258 source4/torture/nbt/winsreplication.c 	wrepl_socket = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              260 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Setup wrepl connections\n");
tctx              261 source4/torture/nbt/winsreplication.c 	status = wrepl_connect(wrepl_socket, wrepl_best_ip(tctx->lp_ctx, address), address);
tctx              262 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              264 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send a start association request\n");
tctx              267 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              269 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "association context: 0x%x\n", associate.out.assoc_ctx);
tctx              271 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Send a replication table query\n");
tctx              274 source4/torture/nbt/winsreplication.c 	status = wrepl_pull_table(wrepl_socket, tctx, &pull_table);
tctx              288 source4/torture/nbt/winsreplication.c 		torture_fail(tctx, "We are not a valid pull partner for the server");
tctx              290 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              292 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Found %d replication partners\n", pull_table.out.num_partners);
tctx              296 source4/torture/nbt/winsreplication.c 		torture_comment(tctx, "%s   max_version=%6llu   min_version=%6llu type=%d\n",
tctx              305 source4/torture/nbt/winsreplication.c 		status = wrepl_pull_names(wrepl_socket, tctx, &pull_names);
tctx              306 source4/torture/nbt/winsreplication.c 		CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              308 source4/torture/nbt/winsreplication.c 		torture_comment(tctx, "Received %d names\n", pull_names.out.num_names);
tctx              311 source4/torture/nbt/winsreplication.c 			display_entry(tctx, &pull_names.out.names[j]);
tctx              315 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Close wrepl connections\n");
tctx              542 source4/torture/nbt/winsreplication.c 		struct torture_context *tctx, const char *address)
tctx              552 source4/torture/nbt/winsreplication.c 	ctx = talloc_zero(tctx, struct test_wrepl_conflict_conn);
tctx              556 source4/torture/nbt/winsreplication.c 	ctx->pull	= wrepl_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              559 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Setup wrepl conflict pull connection\n");
tctx              560 source4/torture/nbt/winsreplication.c 	status = wrepl_connect(ctx->pull, wrepl_best_ip(tctx->lp_ctx, ctx->address), ctx->address);
tctx              613 source4/torture/nbt/winsreplication.c 	ctx->nbtsock = nbt_name_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              616 source4/torture/nbt/winsreplication.c 	load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx              618 source4/torture/nbt/winsreplication.c 	ctx->myaddr = socket_address_from_strings(tctx, ctx->nbtsock->sock->backend_name, iface_best_ip(ifaces, address), 0);
tctx              623 source4/torture/nbt/winsreplication.c 		ctx->myaddr2 = socket_address_from_strings(tctx, ctx->nbtsock->sock->backend_name, iface_n_ip(ifaces, i), 0);
tctx              631 source4/torture/nbt/winsreplication.c 	ctx->nbtsock_srv = nbt_name_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              635 source4/torture/nbt/winsreplication.c 	nbt_srv_addr = socket_address_from_strings(tctx, ctx->nbtsock_srv->sock->backend_name, ctx->myaddr->addr, lp_nbt_port(tctx->lp_ctx));
tctx              648 source4/torture/nbt/winsreplication.c 		ctx->nbtsock2 = nbt_name_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              654 source4/torture/nbt/winsreplication.c 		ctx->nbtsock_srv2 = nbt_name_socket_init(ctx, ctx->nbtsock_srv->event_ctx, lp_iconv_convenience(tctx->lp_ctx));
tctx              658 source4/torture/nbt/winsreplication.c 		nbt_srv_addr = socket_address_from_strings(tctx, 
tctx              661 source4/torture/nbt/winsreplication.c 							   lp_nbt_port(tctx->lp_ctx));
tctx              708 source4/torture/nbt/winsreplication.c static bool test_wrepl_update_one(struct torture_context *tctx, 
tctx              725 source4/torture/nbt/winsreplication.c 	wrepl_socket = wrepl_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              727 source4/torture/nbt/winsreplication.c 	status = wrepl_connect(wrepl_socket, wrepl_best_ip(tctx->lp_ctx, ctx->address), ctx->address);
tctx              728 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              731 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              750 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              751 source4/torture/nbt/winsreplication.c 	CHECK_VALUE(tctx, repl_recv->mess_type, WREPL_REPLICATION);
tctx              752 source4/torture/nbt/winsreplication.c 	CHECK_VALUE(tctx, repl_recv->message.replication.command, WREPL_REPL_SEND_REQUEST);
tctx              769 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              770 source4/torture/nbt/winsreplication.c 	CHECK_VALUE(tctx, repl_recv->mess_type, WREPL_STOP_ASSOCIATION);
tctx              771 source4/torture/nbt/winsreplication.c 	CHECK_VALUE(tctx, repl_recv->message.stop.reason, 0);
tctx              777 source4/torture/nbt/winsreplication.c static bool test_wrepl_is_applied(struct torture_context *tctx, 
tctx              792 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              793 source4/torture/nbt/winsreplication.c 	torture_assert(tctx, pull_names.out.num_names == (expected?1:0), 
tctx              794 source4/torture/nbt/winsreplication.c 		       talloc_asprintf(tctx, "Invalid number of records returned - expected %d got %d", expected, pull_names.out.num_names));
tctx              803 source4/torture/nbt/winsreplication.c 		CHECK_VALUE(tctx, names[0].name.type, name->name->type);
tctx              804 source4/torture/nbt/winsreplication.c 		CHECK_VALUE_STRING(tctx, names[0].name.name, name->name->name);
tctx              805 source4/torture/nbt/winsreplication.c 		CHECK_VALUE_STRING(tctx, names[0].name.scope, name->name->scope);
tctx              806 source4/torture/nbt/winsreplication.c 		CHECK_VALUE(tctx, flags, name->flags);
tctx              807 source4/torture/nbt/winsreplication.c 		CHECK_VALUE_UINT64(tctx, names[0].version_id, name->id);
tctx              810 source4/torture/nbt/winsreplication.c 			CHECK_VALUE(tctx, names[0].num_addresses,
tctx              813 source4/torture/nbt/winsreplication.c 			CHECK_VALUE(tctx, names[0].num_addresses, 1);
tctx              814 source4/torture/nbt/winsreplication.c 			CHECK_VALUE_STRING(tctx, names[0].addresses[0].address,
tctx              822 source4/torture/nbt/winsreplication.c static bool test_wrepl_mhomed_merged(struct torture_context *tctx, 
tctx              851 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              852 source4/torture/nbt/winsreplication.c 	CHECK_VALUE(tctx, pull_names.out.num_names, 1);
tctx              860 source4/torture/nbt/winsreplication.c 	CHECK_VALUE(tctx, names[0].name.type, name2->name->type);
tctx              861 source4/torture/nbt/winsreplication.c 	CHECK_VALUE_STRING(tctx, names[0].name.name, name2->name->name);
tctx              862 source4/torture/nbt/winsreplication.c 	CHECK_VALUE_STRING(tctx, names[0].name.scope, name2->name->scope);
tctx              863 source4/torture/nbt/winsreplication.c 	CHECK_VALUE(tctx, flags, name2->flags | WREPL_TYPE_MHOMED);
tctx              864 source4/torture/nbt/winsreplication.c 	CHECK_VALUE_UINT64(tctx, names[0].version_id, name2->id);
tctx              866 source4/torture/nbt/winsreplication.c 	CHECK_VALUE(tctx, names[0].num_addresses, num_ips);
tctx              876 source4/torture/nbt/winsreplication.c 				CHECK_VALUE_STRING(tctx, owner, owner2->address);
tctx              886 source4/torture/nbt/winsreplication.c 				CHECK_VALUE_STRING(tctx, owner, owner1->address);
tctx              893 source4/torture/nbt/winsreplication.c 		CHECK_VALUE_STRING(tctx, addr, "not found in address list");
tctx              899 source4/torture/nbt/winsreplication.c static bool test_wrepl_sgroup_merged(struct torture_context *tctx, 
tctx              940 source4/torture/nbt/winsreplication.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              958 source4/torture/nbt/winsreplication.c 		torture_comment(tctx, "%s: Name '%s' not found\n", __location__, nbt_name_string(ctx, name2->name));
tctx              966 source4/torture/nbt/winsreplication.c 	CHECK_VALUE(tctx, name->name.type, name2->name->type);
tctx              967 source4/torture/nbt/winsreplication.c 	CHECK_VALUE_STRING(tctx, name->name.name, name2->name->name);
tctx              968 source4/torture/nbt/winsreplication.c 	CHECK_VALUE_STRING(tctx, name->name.scope, name2->name->scope);
tctx              969 source4/torture/nbt/winsreplication.c 	CHECK_VALUE(tctx, flags, name2->flags);
tctx              971 source4/torture/nbt/winsreplication.c 	CHECK_VALUE(tctx, name->num_addresses, num_ips);
tctx              981 source4/torture/nbt/winsreplication.c 				CHECK_VALUE_STRING(tctx, owner, ips2[j].owner);
tctx              992 source4/torture/nbt/winsreplication.c 					CHECK_VALUE_STRING(tctx, owner, owner1->address);
tctx              994 source4/torture/nbt/winsreplication.c 					CHECK_VALUE_STRING(tctx, owner, ips1[j].owner);
tctx             1002 source4/torture/nbt/winsreplication.c 		CHECK_VALUE_STRING(tctx, addr, "not found in address list");
tctx             1008 source4/torture/nbt/winsreplication.c static bool test_conflict_same_owner(struct torture_context *tctx, 
tctx             1126 source4/torture/nbt/winsreplication.c 		torture_comment(tctx, "Test Replica Conflicts with same owner[%s] for %s\n",
tctx             1135 source4/torture/nbt/winsreplication.c 				torture_comment(tctx, "%s,%s%s vs. %s,%s%s with %s ip(s) => %s\n",
tctx             1160 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_update_one(tctx, ctx, &ctx->a,wins_name_cur);
tctx             1162 source4/torture/nbt/winsreplication.c 				ret &= test_wrepl_is_applied(tctx, ctx, &ctx->a, wins_name_last, false);
tctx             1163 source4/torture/nbt/winsreplication.c 				ret &= test_wrepl_is_applied(tctx, ctx, &ctx->a, wins_name_cur, false);
tctx             1165 source4/torture/nbt/winsreplication.c 				ret &= test_wrepl_is_applied(tctx, ctx, &ctx->a, wins_name_cur, true);
tctx             1172 source4/torture/nbt/winsreplication.c 				torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, __location__);
tctx             1180 source4/torture/nbt/winsreplication.c static bool test_conflict_different_owner(struct torture_context *tctx, 
tctx             4778 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Test Replica Conflicts with different owners\n");
tctx             4785 source4/torture/nbt/winsreplication.c 				torture_comment(tctx, "(%s) Programmer error, invalid record[%u]: %s\n",
tctx             4789 source4/torture/nbt/winsreplication.c 				torture_comment(tctx, "(%s) Programmer error, invalid record[%u]: %s\n",
tctx             4815 source4/torture/nbt/winsreplication.c 			torture_comment(tctx, "%s,%s%s vs. %s,%s%s %s => %s\n",
tctx             4844 source4/torture/nbt/winsreplication.c 		ret &= test_wrepl_update_one(tctx, ctx, records[i].r1.owner, wins_name_r1);
tctx             4845 source4/torture/nbt/winsreplication.c 		ret &= test_wrepl_is_applied(tctx, ctx, records[i].r1.owner,
tctx             4866 source4/torture/nbt/winsreplication.c 		ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2);
tctx             4868 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_is_applied(tctx, ctx, records[i].r1.owner,
tctx             4871 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_sgroup_merged(tctx, ctx, records[i].r2.merge_owner,
tctx             4880 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_is_applied(tctx, ctx, records[i].r1.owner,
tctx             4884 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner,
tctx             4887 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner,
tctx             4893 source4/torture/nbt/winsreplication.c 				torture_comment(tctx, "failed before sgroup_cleanup record[%u]: %s\n", i, records[i].line);
tctx             4906 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_update_one(tctx, ctx, records[i].r1.owner, wins_name_r1);
tctx             4910 source4/torture/nbt/winsreplication.c 				ret &= test_wrepl_sgroup_merged(tctx, ctx, NULL,
tctx             4927 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2);
tctx             4938 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2);
tctx             4939 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner, wins_name_r2, true);
tctx             4950 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2);
tctx             4951 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner, wins_name_r2, true);
tctx             4954 source4/torture/nbt/winsreplication.c 				torture_comment(tctx, "failed in sgroup_cleanup record[%u]: %s\n", i, records[i].line);
tctx             4963 source4/torture/nbt/winsreplication.c 			torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, records[i].line);
tctx             4971 source4/torture/nbt/winsreplication.c static bool test_conflict_owned_released_vs_replica(struct torture_context *tctx,
tctx             6525 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Test Replica records vs. owned released records\n");
tctx             6528 source4/torture/nbt/winsreplication.c 		torture_comment(tctx, "%s => %s\n", nbt_name_string(ctx, &records[i].name),
tctx             6536 source4/torture/nbt/winsreplication.c 		name_register->in.dest_port	= lp_nbt_port(tctx->lp_ctx);
tctx             6548 source4/torture/nbt/winsreplication.c 			torture_comment(tctx, "No response from %s for name register\n", ctx->address);
tctx             6552 source4/torture/nbt/winsreplication.c 			torture_comment(tctx, "Bad response from %s for name register - %s\n",
tctx             6556 source4/torture/nbt/winsreplication.c 		CHECK_VALUE(tctx, name_register->out.rcode, 0);
tctx             6557 source4/torture/nbt/winsreplication.c 		CHECK_VALUE_STRING(tctx, name_register->out.reply_from, ctx->address);
tctx             6558 source4/torture/nbt/winsreplication.c 		CHECK_VALUE(tctx, name_register->out.name.type, records[i].name.type);
tctx             6559 source4/torture/nbt/winsreplication.c 		CHECK_VALUE_STRING(tctx, name_register->out.name.name, records[i].name.name);
tctx             6560 source4/torture/nbt/winsreplication.c 		CHECK_VALUE_STRING(tctx, name_register->out.name.scope, records[i].name.scope);
tctx             6561 source4/torture/nbt/winsreplication.c 		CHECK_VALUE_STRING(tctx, name_register->out.reply_addr, records[i].wins.ips[0].ip);
tctx             6565 source4/torture/nbt/winsreplication.c 		release->in.dest_port   = lp_nbt_port(tctx->lp_ctx);
tctx             6575 source4/torture/nbt/winsreplication.c 			torture_comment(tctx, "No response from %s for name release\n", ctx->address);
tctx             6579 source4/torture/nbt/winsreplication.c 			torture_comment(tctx, "Bad response from %s for name query - %s\n",
tctx             6583 source4/torture/nbt/winsreplication.c 		CHECK_VALUE(tctx, release->out.rcode, 0);
tctx             6602 source4/torture/nbt/winsreplication.c 		ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx             6603 source4/torture/nbt/winsreplication.c 		ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name,
tctx             6615 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx             6616 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true);
tctx             6620 source4/torture/nbt/winsreplication.c 			release->in.dest_port	= lp_nbt_port(tctx->lp_ctx);
tctx             6629 source4/torture/nbt/winsreplication.c 				torture_comment(tctx, "No response from %s for name release\n", ctx->address);
tctx             6633 source4/torture/nbt/winsreplication.c 				torture_comment(tctx, "Bad response from %s for name query - %s\n",
tctx             6637 source4/torture/nbt/winsreplication.c 			CHECK_VALUE(tctx, release->out.rcode, 0);
tctx             6640 source4/torture/nbt/winsreplication.c 			torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, records[i].line);
tctx             6688 source4/torture/nbt/winsreplication.c static bool test_conflict_owned_active_vs_replica(struct torture_context *tctx,
tctx             9160 source4/torture/nbt/winsreplication.c 		torture_comment(tctx, "SKIP: Test Replica records vs. owned active records: not bound to port[%d]\n",
tctx             9161 source4/torture/nbt/winsreplication.c 			lp_nbt_port(tctx->lp_ctx));
tctx             9165 source4/torture/nbt/winsreplication.c 	torture_comment(tctx, "Test Replica records vs. owned active records\n");
tctx             9178 source4/torture/nbt/winsreplication.c 			torture_comment(tctx, "%s\n", records[i].section);
tctx             9182 source4/torture/nbt/winsreplication.c 			torture_comment(tctx, "%s => SKIPPED\n", nbt_name_string(ctx, &records[i].name));
tctx             9196 source4/torture/nbt/winsreplication.c 		torture_comment(tctx, "%s%s%s => %s\n",
tctx             9223 source4/torture/nbt/winsreplication.c 			name_register->in.dest_port     = lp_nbt_port(tctx->lp_ctx);
tctx             9255 source4/torture/nbt/winsreplication.c 				torture_comment(tctx, "No response from %s for name register\n", ctx->address);
tctx             9259 source4/torture/nbt/winsreplication.c 				torture_comment(tctx, "Bad response from %s for name register - %s\n",
tctx             9263 source4/torture/nbt/winsreplication.c 			CHECK_VALUE(tctx, name_register->out.rcode, 0);
tctx             9264 source4/torture/nbt/winsreplication.c 			CHECK_VALUE_STRING(tctx, name_register->out.reply_from, ctx->address);
tctx             9265 source4/torture/nbt/winsreplication.c 			CHECK_VALUE(tctx, name_register->out.name.type, records[i].name.type);
tctx             9266 source4/torture/nbt/winsreplication.c 			CHECK_VALUE_STRING(tctx, name_register->out.name.name, records[i].name.name);
tctx             9267 source4/torture/nbt/winsreplication.c 			CHECK_VALUE_STRING(tctx, name_register->out.name.scope, records[i].name.scope);
tctx             9268 source4/torture/nbt/winsreplication.c 			CHECK_VALUE_STRING(tctx, name_register->out.reply_addr, records[i].wins.ips[j].ip);
tctx             9299 source4/torture/nbt/winsreplication.c 		ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx             9330 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_mhomed_merged(tctx, ctx, &ctx->c,
tctx             9336 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_sgroup_merged(tctx, ctx, NULL,
tctx             9343 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name,
tctx             9357 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx             9358 source4/torture/nbt/winsreplication.c 			ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true);
tctx             9369 source4/torture/nbt/winsreplication.c 				release->in.dest_port   = lp_nbt_port(tctx->lp_ctx);
tctx             9378 source4/torture/nbt/winsreplication.c 					torture_comment(tctx, "No response from %s for name release\n", ctx->address);
tctx             9382 source4/torture/nbt/winsreplication.c 					torture_comment(tctx, "Bad response from %s for name query - %s\n",
tctx             9386 source4/torture/nbt/winsreplication.c 				CHECK_VALUE(tctx, release->out.rcode, 0);
tctx             9399 source4/torture/nbt/winsreplication.c 				ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx             9410 source4/torture/nbt/winsreplication.c 				ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx             9411 source4/torture/nbt/winsreplication.c 				ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true);
tctx             9421 source4/torture/nbt/winsreplication.c 				ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx             9422 source4/torture/nbt/winsreplication.c 				ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true);
tctx             9427 source4/torture/nbt/winsreplication.c 			torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, records[i].line);
tctx             9633 source4/torture/nbt/winsreplication.c static bool torture_nbt_winsreplication_replica(struct torture_context *tctx)
tctx             9641 source4/torture/nbt/winsreplication.c 	if (!torture_nbt_get_name(tctx, &name, &address))
tctx             9644 source4/torture/nbt/winsreplication.c 	ctx = test_create_conflict_ctx(tctx, address);
tctx             9647 source4/torture/nbt/winsreplication.c 	ret &= test_conflict_same_owner(tctx, ctx);
tctx             9648 source4/torture/nbt/winsreplication.c 	ret &= test_conflict_different_owner(tctx, ctx);
tctx             9656 source4/torture/nbt/winsreplication.c static bool torture_nbt_winsreplication_owned(struct torture_context *tctx)
tctx             9663 source4/torture/nbt/winsreplication.c 	if (torture_setting_bool(tctx, "quick", false))
tctx             9664 source4/torture/nbt/winsreplication.c 		torture_skip(tctx, 
tctx             9667 source4/torture/nbt/winsreplication.c 	if (!torture_nbt_get_name(tctx, &name, &address))
tctx             9670 source4/torture/nbt/winsreplication.c 	ctx = test_create_conflict_ctx(tctx, address);
tctx             9671 source4/torture/nbt/winsreplication.c 	torture_assert(tctx, ctx != NULL, "Creating context failed");
tctx             9673 source4/torture/nbt/winsreplication.c 	ret &= test_conflict_owned_released_vs_replica(tctx, ctx);
tctx             9674 source4/torture/nbt/winsreplication.c 	ret &= test_conflict_owned_active_vs_replica(tctx, ctx);
tctx               33 source4/torture/ndr/atsvc.c static bool jobenum_in_check(struct torture_context *tctx, 
tctx               36 source4/torture/ndr/atsvc.c 	torture_assert(tctx, r->in.servername != NULL, "servername ptr");
tctx               37 source4/torture/ndr/atsvc.c 	torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername");
tctx               38 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->in.ctr->entries_read, 0, "ctr entries read");
tctx               39 source4/torture/ndr/atsvc.c 	torture_assert(tctx, r->in.ctr->first_entry == NULL, "ctr entries first_entry");
tctx               40 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->in.preferred_max_len, -1, "preferred max len");
tctx               41 source4/torture/ndr/atsvc.c 	torture_assert(tctx, r->in.resume_handle != NULL, "resume handle ptr");
tctx               42 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, *r->in.resume_handle, 0, "resume handle");
tctx               80 source4/torture/ndr/atsvc.c static bool jobenum_out_check(struct torture_context *tctx, 
tctx               83 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->out.ctr->entries_read, 7, "entries read");
tctx               84 source4/torture/ndr/atsvc.c 	torture_assert(tctx, r->out.ctr->first_entry != NULL, "first entry");
tctx               85 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].job_id, 1, "job id");
tctx               86 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].job_time, 84600000, "job time");
tctx               87 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].days_of_week, 0x2, "days of week");
tctx               88 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].flags, 0x13, "flags");
tctx               89 source4/torture/ndr/atsvc.c 	torture_assert_str_equal(tctx, r->out.ctr->first_entry[0].command, "foo.exe", "command");
tctx               90 source4/torture/ndr/atsvc.c 	torture_assert(tctx, r->out.total_entries != NULL, "total entries ptr");
tctx               91 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, *r->out.total_entries, 7, "total entries");
tctx               92 source4/torture/ndr/atsvc.c 	torture_assert(tctx, r->out.resume_handle, "resume handle ptr");
tctx               93 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, *r->out.resume_handle, 0, "resume handle");
tctx               94 source4/torture/ndr/atsvc.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx              109 source4/torture/ndr/atsvc.c static bool jobadd_in_check(struct torture_context *tctx, 
tctx              112 source4/torture/ndr/atsvc.c 	torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername");
tctx              113 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->in.job_info->job_time, 84600000, "time");
tctx              114 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->in.job_info->days_of_month, 0, "days of month");
tctx              115 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->in.job_info->days_of_week, 0x2, "days of week");
tctx              116 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->in.job_info->flags, 17, "flags");
tctx              117 source4/torture/ndr/atsvc.c 	torture_assert_str_equal(tctx, r->in.job_info->command, "foo.exe", "command");
tctx              126 source4/torture/ndr/atsvc.c static bool jobadd_out_check(struct torture_context *tctx, 
tctx              129 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, *r->out.job_id, 14, "job id");
tctx              130 source4/torture/ndr/atsvc.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx              141 source4/torture/ndr/atsvc.c static bool jobdel_in_check(struct torture_context *tctx, 
tctx              144 source4/torture/ndr/atsvc.c 	torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername");
tctx              145 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->in.min_job_id, 14, "min job id");
tctx              146 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->in.max_job_id, 14, "max job id");
tctx              154 source4/torture/ndr/atsvc.c static bool jobdel_out_check(struct torture_context *tctx, 
tctx              168 source4/torture/ndr/atsvc.c static bool jobgetinfo_in_check(struct torture_context *tctx, 
tctx              171 source4/torture/ndr/atsvc.c 	torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername");
tctx              172 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, r->in.job_id, 1, "job id");
tctx              184 source4/torture/ndr/atsvc.c static bool jobgetinfo_out_check(struct torture_context *tctx, 
tctx              187 source4/torture/ndr/atsvc.c 	torture_assert(tctx, *r->out.job_info != NULL, "job info");
tctx              188 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, (*r->out.job_info)->job_time, 84600000, "time");
tctx              189 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, (*r->out.job_info)->days_of_month, 0, "days of month");
tctx              190 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, (*r->out.job_info)->days_of_week, 0x2, "days of week");
tctx              191 source4/torture/ndr/atsvc.c 	torture_assert_int_equal(tctx, (*r->out.job_info)->flags, 0x13, "flags");
tctx              192 source4/torture/ndr/atsvc.c 	torture_assert_str_equal(tctx, (*r->out.job_info)->command, "foo.exe", "command");
tctx               29 source4/torture/ndr/dfs.c static bool getmanagerversion_out_check(struct torture_context *tctx,
tctx               32 source4/torture/ndr/dfs.c 	torture_assert_int_equal(tctx, *r->out.version, 4, "version");
tctx               45 source4/torture/ndr/dfs.c static bool enumex_in_check300(struct torture_context *tctx,
tctx               48 source4/torture/ndr/dfs.c 	torture_assert_str_equal(tctx, r->in.dfs_name, "w2k3dc", "dfs name");
tctx               49 source4/torture/ndr/dfs.c 	torture_assert_int_equal(tctx, r->in.level, 300, "level");
tctx               50 source4/torture/ndr/dfs.c 	torture_assert(tctx, r->in.total != NULL, "total ptr");
tctx               51 source4/torture/ndr/dfs.c 	torture_assert_int_equal(tctx, *r->in.total, 0, "total");
tctx               52 source4/torture/ndr/dfs.c 	torture_assert_int_equal(tctx, r->in.bufsize, -1, "buf size");
tctx               53 source4/torture/ndr/dfs.c 	torture_assert(tctx, r->in.info != NULL, "info ptr");
tctx               54 source4/torture/ndr/dfs.c 	torture_assert_int_equal(tctx, r->in.info->level, 300, "info level");
tctx               55 source4/torture/ndr/dfs.c 	torture_assert(tctx, r->in.info->e.info300->s == NULL, "info data ptr");
tctx               84 source4/torture/ndr/dfs.c static bool enumex_out_check300(struct torture_context *tctx,
tctx               87 source4/torture/ndr/dfs.c 	torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx               88 source4/torture/ndr/dfs.c 	torture_assert(tctx, r->out.total != NULL, "total ptr");
tctx               89 source4/torture/ndr/dfs.c 	torture_assert_int_equal(tctx, *r->out.total, 3, "total");
tctx               90 source4/torture/ndr/dfs.c 	torture_assert(tctx, r->out.info != NULL, "info ptr");
tctx               91 source4/torture/ndr/dfs.c 	torture_assert_int_equal(tctx, r->out.info->level, 300, "info level");
tctx               92 source4/torture/ndr/dfs.c 	torture_assert(tctx, r->out.info->e.info300 != NULL, "info data ptr");
tctx               93 source4/torture/ndr/dfs.c 	torture_assert_int_equal(tctx, r->out.info->e.info300->count, 3, "info enum array");
tctx               94 source4/torture/ndr/dfs.c 	torture_assert_str_equal(tctx, r->out.info->e.info300->s[0].dom_root, "\\W2K3DC\\standaloneroot", "info enum array 0");
tctx               95 source4/torture/ndr/dfs.c 	torture_assert_int_equal(tctx, r->out.info->e.info300->s[0].flavor, 256, "info enum flavor 0");
tctx               96 source4/torture/ndr/dfs.c 	torture_assert_str_equal(tctx, r->out.info->e.info300->s[1].dom_root, "\\W2K3DC\\standaloneroot2", "info enum array 1");
tctx               97 source4/torture/ndr/dfs.c 	torture_assert_int_equal(tctx, r->out.info->e.info300->s[1].flavor, 256, "info enum flavor 1");
tctx               98 source4/torture/ndr/dfs.c 	torture_assert_str_equal(tctx, r->out.info->e.info300->s[2].dom_root, "\\W2K3DOM\\testdomainroot", "info enum array 2");
tctx               99 source4/torture/ndr/dfs.c 	torture_assert_int_equal(tctx, r->out.info->e.info300->s[2].flavor, 512, "info enum flavor 2");
tctx               39 source4/torture/ndr/epmap.c static bool map_in_check(struct torture_context *tctx, 
tctx               43 source4/torture/ndr/epmap.c 	torture_assert_int_equal(tctx, r->in.max_towers, 1, "max towers");
tctx               44 source4/torture/ndr/epmap.c 	torture_assert(tctx, r->in.map_tower != NULL, "map tower");
tctx               45 source4/torture/ndr/epmap.c 	torture_assert_int_equal(tctx, r->in.map_tower->tower_length, 75, "tower len");
tctx               58 source4/torture/ndr/epmap.c static bool map_out_check(struct torture_context *tctx, 
tctx               61 source4/torture/ndr/epmap.c 	torture_assert_int_equal(tctx, *r->out.num_towers, 1, "num towers");
tctx               62 source4/torture/ndr/epmap.c 	torture_assert_int_equal(tctx, r->out.result, 0x4b, "return code");
tctx              299 source4/torture/ndr/lsa.c static bool lsarlookupnames_in_check(struct torture_context *tctx, 
tctx              304 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.num_names, 100, "num names");
tctx              306 source4/torture/ndr/lsa.c 		torture_assert_str_equal(tctx, r->in.names[i].string, "Users", "names");
tctx              308 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.sids != NULL, "sids");
tctx              309 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.sids->count, 0, "sids count");
tctx              310 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.sids->sids == NULL, "sids domains");
tctx              311 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx              312 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.count != NULL, "count ptr");
tctx              313 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->in.count, 0, "count");
tctx              428 source4/torture/ndr/lsa.c static bool lsarlookupnames_out_check(struct torture_context *tctx, 
tctx              432 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.domains != NULL, "domains ptr");
tctx              433 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, domains->count, 1, "domains count");
tctx              434 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, domains->max_size, 32, "domains size");
tctx              435 source4/torture/ndr/lsa.c 	torture_assert(tctx, domains->domains != NULL, "domains domains");
tctx              436 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, domains->domains[0].name.string, "BUILTIN", "domain name");
tctx              438 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.count != NULL, "count ptr");
tctx              439 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->out.count, 100, "count");
tctx              441 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->out.sids->count, 100, "sids count");
tctx              442 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->out.sids->sids[0].sid_type, 4, "sid type");
tctx              443 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->out.sids->sids[0].rid, 0x221, "sid rid");
tctx              444 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->out.sids->sids[0].sid_index, 0, "sid index");
tctx              655 source4/torture/ndr/lsa.c static bool lsarlookupsids_in_check(struct torture_context *tctx, 
tctx              659 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.sids->num_sids, 100, "num sids");
tctx              660 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.sids->sids != NULL, "sids sids");
tctx              661 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.names->count, 0, "names count");
tctx              662 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.names->names == NULL, "names names");
tctx              663 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx              664 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.count != NULL, "count ptr");
tctx              665 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->in.count, 0, "count");
tctx             1015 source4/torture/ndr/lsa.c static bool lsarlookupsids_out_check(struct torture_context *tctx, 
tctx             1019 source4/torture/ndr/lsa.c 	torture_assert(tctx, domains != NULL, "domains");
tctx             1020 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, domains->count, 1, "domains count");
tctx             1021 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, domains->max_size, 32, "domains size");
tctx             1022 source4/torture/ndr/lsa.c 	torture_assert(tctx, domains->domains != NULL, "domains domains");
tctx             1023 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, domains->domains[0].name.string, "BUILTIN", "name");
tctx             1024 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1036 source4/torture/ndr/lsa.c static bool lsaropenpolicy2_in_check(struct torture_context *tctx, 
tctx             1039 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->in.system_name, "\\", "system name");
tctx             1040 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.attr != NULL, "attr ptr");
tctx             1041 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.attr->len, 0, "attr len");
tctx             1042 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.attr->root_dir == NULL, "attr root");
tctx             1043 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.attr->object_name == NULL, "attr object name");
tctx             1044 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.attr->attributes, 0, "attr attributes");
tctx             1045 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask");
tctx             1054 source4/torture/ndr/lsa.c static bool lsaropenpolicy2_out_check(struct torture_context *tctx, 
tctx             1058 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1069 source4/torture/ndr/lsa.c static bool lsaropenpolicy_in_check(struct torture_context *tctx, 
tctx             1072 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.system_name != NULL, "system name");
tctx             1073 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.attr != NULL, "attr ptr");
tctx             1074 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.attr->len, 0, "attr len");
tctx             1075 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.attr->root_dir == NULL, "attr root");
tctx             1076 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.attr->object_name == NULL, "attr object name");
tctx             1077 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.attr->attributes, 0, "attr attributes");
tctx             1078 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask");
tctx             1088 source4/torture/ndr/lsa.c static bool lsaropenpolicy_out_check(struct torture_context *tctx, 
tctx             1092 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1103 source4/torture/ndr/lsa.c static bool lsarcreateaccount_in_check(struct torture_context *tctx, 
tctx             1108 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask");
tctx             1117 source4/torture/ndr/lsa.c static bool lsarcreateaccount_out_check(struct torture_context *tctx, 
tctx             1121 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1130 source4/torture/ndr/lsa.c static bool lsardelete_in_check(struct torture_context *tctx, 
tctx             1141 source4/torture/ndr/lsa.c static bool lsardelete_out_check(struct torture_context *tctx, 
tctx             1144 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1159 source4/torture/ndr/lsa.c static bool lsarcreatesecret_in_check(struct torture_context *tctx,
tctx             1163 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->in.name.string, "torturesecret-852885356", "name");
tctx             1164 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask");
tctx             1173 source4/torture/ndr/lsa.c static bool lsarcreatesecret_out_check(struct torture_context *tctx,
tctx             1177 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1192 source4/torture/ndr/lsa.c static bool lsaropensecret_in_check(struct torture_context *tctx,
tctx             1196 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->in.name.string, "torturesecret-852885356", "name");
tctx             1197 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask");
tctx             1206 source4/torture/ndr/lsa.c static bool lsaropensecret_out_check(struct torture_context *tctx,
tctx             1210 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1224 source4/torture/ndr/lsa.c static bool lsarsetsecret_in_check(struct torture_context *tctx,
tctx             1228 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.new_val != NULL, "new val ptr");
tctx             1229 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.old_val == NULL, "old val ptr");
tctx             1230 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.new_val->length, 32, "new val len");
tctx             1231 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.new_val->size, 32, "new val size");
tctx             1240 source4/torture/ndr/lsa.c static bool lsarsetsecret_out_check(struct torture_context *tctx,
tctx             1243 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1254 source4/torture/ndr/lsa.c static bool lsarquerysecret_in_check(struct torture_context *tctx,
tctx             1258 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.new_val != NULL, "new val ptr");
tctx             1259 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.new_val->buf == NULL, "new val ptr ptr");
tctx             1260 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.new_mtime != NULL, "new mtime ptr");
tctx             1262 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.old_val == NULL, "old val ptr");
tctx             1263 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.old_mtime == NULL, "old mtime ptr");
tctx             1279 source4/torture/ndr/lsa.c static bool lsarquerysecret_out_check(struct torture_context *tctx,
tctx             1283 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.new_val != NULL, "new val ptr");
tctx             1284 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.new_mtime != NULL, "new mtime ptr");
tctx             1286 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.old_val == NULL, "old val ptr");
tctx             1287 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.old_mtime == NULL, "old mtime ptr");
tctx             1303 source4/torture/ndr/lsa.c static bool lsarcreatetrusteddomain_in_check(struct torture_context *tctx, 
tctx             1307 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->in.info->name.string, "torturedomain", "name");
tctx             1308 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.info->sid != NULL, "sid");
tctx             1309 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask");
tctx             1318 source4/torture/ndr/lsa.c static bool lsarcreatetrusteddomain_out_check(struct torture_context *tctx, 
tctx             1322 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1332 source4/torture/ndr/lsa.c static bool lsarenumerateaccounts_in_check(struct torture_context *tctx, 
tctx             1336 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.resume_handle != NULL, "resume handle ptr");
tctx             1337 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->in.resume_handle, 0, "resume handle");
tctx             1338 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.num_entries, 100, "num entries");
tctx             1361 source4/torture/ndr/lsa.c static bool lsarenumerateaccounts_out_check(struct torture_context *tctx, 
tctx             1364 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.resume_handle != NULL, "resume handle ptr");
tctx             1365 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->out.resume_handle, 7, "resume handle");
tctx             1366 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->out.sids->num_sids, 7, "num sids");
tctx             1367 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.sids->sids != NULL, "sids sids");
tctx             1368 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.sids->sids[0].sid != NULL, "sids sids");
tctx             1369 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1395 source4/torture/ndr/lsa.c static bool lsarlookupsids2_in_check(struct torture_context *tctx, 
tctx             1399 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.sids->num_sids, 7, "num sids");
tctx             1400 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.sids->sids != NULL, "sids sids");
tctx             1401 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.sids->sids[0].sid != NULL, "sids sids");
tctx             1402 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.names != NULL, "names ptr");
tctx             1403 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.names->count, 0, "names count");
tctx             1404 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.names->names == NULL, "names");
tctx             1405 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx             1406 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.count != NULL, "count ptr");
tctx             1407 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->in.count, 7, "count");
tctx             1408 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.unknown1, 0, "unknown 1");
tctx             1409 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.unknown2, 0, "unknown 2");
tctx             1476 source4/torture/ndr/lsa.c static bool lsarlookupsids2_out_check(struct torture_context *tctx, 
tctx             1481 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.names != NULL, "names ptr");
tctx             1482 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.domains != NULL, "domains ptr");
tctx             1483 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, domains->count, 4, "domains count");
tctx             1484 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, domains->max_size, 32, "domains size");
tctx             1485 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, domains->domains[0].name.string, "NT AUTHORITY", "trust info name");
tctx             1486 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->out.names->count, 7, "names count");
tctx             1487 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->out.names->names[0].name.string, "Account Operators", "name str 1");
tctx             1488 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->out.names->names[1].name.string, "Administrators", "name str 2");
tctx             1489 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->out.names->names[2].name.string, "SUPPORT_388945a0", "name str 3");
tctx             1490 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.count != NULL, "count ptr");
tctx             1491 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->out.count, 7, "count");
tctx             1492 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1534 source4/torture/ndr/lsa.c static bool lsarlookupnames2_in_check(struct torture_context *tctx,
tctx             1538 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.num_names, 7, "num names");
tctx             1539 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->in.names[0].string, "Account Operators", 
tctx             1541 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->in.names[1].string, "Administrators", 
tctx             1543 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx             1544 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.lookup_options, 0, "lookup_options");
tctx             1545 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.client_revision, 0, "client_revision");
tctx             1546 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->in.count, 0, "count");
tctx             1547 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.sids->count, 0, "sids count");
tctx             1548 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.sids->sids == NULL, "sids sids");
tctx             1587 source4/torture/ndr/lsa.c static bool lsarlookupnames2_out_check(struct torture_context *tctx,
tctx             1590 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->out.count, 7, "count");
tctx             1591 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->out.sids->count, 7, "sids count");
tctx             1592 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1633 source4/torture/ndr/lsa.c static bool lsarlookupnames3_in_check(struct torture_context *tctx,
tctx             1637 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.num_names, 7, "num names");
tctx             1638 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->in.names[0].string, "Account Operators", 
tctx             1640 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->in.names[1].string, "Administrators", 
tctx             1642 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx             1643 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.lookup_options, 0, "lookup_options");
tctx             1644 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.client_revision, 0, "client_revision");
tctx             1645 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->in.count, 0, "count");
tctx             1646 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.sids->count, 0, "sids count");
tctx             1647 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.sids->sids == NULL, "sids sids");
tctx             1697 source4/torture/ndr/lsa.c static bool lsarlookupnames3_out_check(struct torture_context *tctx,
tctx             1700 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->out.count, 7, "count");
tctx             1701 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->out.sids->count, 7, "sids count");
tctx             1702 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1728 source4/torture/ndr/lsa.c static bool lsarlookupsids3_in_check(struct torture_context *tctx, 
tctx             1732 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.sids->num_sids, 7, "num sids");
tctx             1733 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.sids->sids != NULL, "sids sids");
tctx             1734 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.sids->sids[0].sid != NULL, "sids sids");
tctx             1735 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.names != NULL, "names ptr");
tctx             1736 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.names->count, 0, "names count");
tctx             1737 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.names->names == NULL, "names");
tctx             1738 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx             1739 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.count != NULL, "count ptr");
tctx             1740 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->in.count, 7, "count");
tctx             1741 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.unknown1, 0, "unknown 1");
tctx             1742 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.unknown2, 0, "unknown 2");
tctx             1752 source4/torture/ndr/lsa.c static bool lsarlookupsids3_out_check(struct torture_context *tctx, 
tctx             1757 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.names != NULL, "names ptr");
tctx             1758 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.domains != NULL, "domains ptr");
tctx             1759 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, domains->count, 4, "domains count");
tctx             1760 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, domains->max_size, 32, "domains size");
tctx             1761 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, domains->domains[0].name.string, "NT AUTHORITY", "trust info name");
tctx             1762 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->out.names->count, 7, "names count");
tctx             1763 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->out.names->names[0].name.string, "Account Operators", "name str 1");
tctx             1764 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->out.names->names[1].name.string, "Administrators", "name str 2");
tctx             1765 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->out.names->names[2].name.string, "SUPPORT_388945a0", "name str 3");
tctx             1766 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.count != NULL, "count ptr");
tctx             1767 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->out.count, 7, "count");
tctx             1768 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx             1779 source4/torture/ndr/lsa.c static bool lsarenumerateprivileges_in_check(struct torture_context *tctx,
tctx             1783 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->in.resume_handle != NULL, "resume handle ptr");
tctx             1784 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->in.resume_handle, 0, "resume handle");
tctx             1785 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, r->in.max_count, 100, "max count");
tctx             1973 source4/torture/ndr/lsa.c static bool lsarenumerateprivileges_out_check(struct torture_context *tctx,
tctx             1976 source4/torture/ndr/lsa.c 	torture_assert(tctx, r->out.resume_handle != NULL, "resume handle ptr");
tctx             1977 source4/torture/ndr/lsa.c 	torture_assert_int_equal(tctx, *r->out.resume_handle, 29, "resume handle");
tctx             1978 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->out.privs->privs[0].name.string, "SeCreateTokenPrivilege", "name");
tctx             1979 source4/torture/ndr/lsa.c 	torture_assert_str_equal(tctx, r->out.privs->privs[1].name.string, "SeAssignPrimaryTokenPrivilege", "name");
tctx             1980 source4/torture/ndr/lsa.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx               35 source4/torture/ndr/ndr.c static bool wrap_ndr_pull_test(struct torture_context *tctx,
tctx               41 source4/torture/ndr/ndr.c 	void *ds = talloc_zero_size(tctx, data->struct_size);
tctx               42 source4/torture/ndr/ndr.c 	struct ndr_pull *ndr = ndr_pull_init_blob(&(data->data), tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx               46 source4/torture/ndr/ndr.c 	torture_assert_ndr_success(tctx, data->pull_fn(ndr, data->ndr_flags, ds),
tctx               49 source4/torture/ndr/ndr.c 	torture_assert(tctx, ndr->offset == ndr->data_size, 
tctx               50 source4/torture/ndr/ndr.c 				   talloc_asprintf(tctx, 
tctx               54 source4/torture/ndr/ndr.c 		return check_fn(tctx, ds);
tctx               92 source4/torture/ndr/ndr.c static bool test_check_string_terminator(struct torture_context *tctx)
tctx               96 source4/torture/ndr/ndr.c 	TALLOC_CTX *mem_ctx = tctx;
tctx               99 source4/torture/ndr/ndr.c 	blob = strhex_to_data_blob(tctx, "0000");
tctx              101 source4/torture/ndr/ndr.c 	ndr = ndr_pull_init_blob(&blob, mem_ctx, lp_iconv_convenience(tctx->lp_ctx));
tctx              103 source4/torture/ndr/ndr.c 	torture_assert_ndr_success(tctx, ndr_check_string_terminator(ndr, 1, 2),
tctx              106 source4/torture/ndr/ndr.c 	torture_assert(tctx, ndr->offset == 0,
tctx              110 source4/torture/ndr/ndr.c 		torture_fail(tctx, "check_string_terminator checked beyond string boundaries");
tctx              113 source4/torture/ndr/ndr.c 	torture_assert(tctx, ndr->offset == 0, 
tctx              118 source4/torture/ndr/ndr.c 	blob = strhex_to_data_blob(tctx, "11220000");
tctx              119 source4/torture/ndr/ndr.c 	ndr = ndr_pull_init_blob(&blob, mem_ctx, lp_iconv_convenience(tctx->lp_ctx));
tctx              121 source4/torture/ndr/ndr.c 	torture_assert_ndr_success(tctx,
tctx              125 source4/torture/ndr/ndr.c 	torture_assert_ndr_success(tctx,
tctx              130 source4/torture/ndr/ndr.c 		torture_fail(tctx, "check_string_terminator erroneously reported terminator");
tctx              133 source4/torture/ndr/ndr.c 	torture_assert(tctx, ndr->offset == 0,
tctx              138 source4/torture/ndr/ndr.c static bool test_guid_from_string_valid(struct torture_context *tctx)
tctx              144 source4/torture/ndr/ndr.c static bool test_guid_from_string_null(struct torture_context *tctx)
tctx              147 source4/torture/ndr/ndr.c 	torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER, 
tctx              153 source4/torture/ndr/ndr.c static bool test_guid_from_string_invalid(struct torture_context *tctx)
tctx              156 source4/torture/ndr/ndr.c 	torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER, 
tctx              162 source4/torture/ndr/ndr.c static bool test_guid_from_string(struct torture_context *tctx)
tctx              165 source4/torture/ndr/ndr.c 	torture_assert_ntstatus_ok(tctx,
tctx              179 source4/torture/ndr/ndr.c 	torture_assert(tctx, GUID_equal(&g1, &exp), "UUID parsed incorrectly");
tctx              180 source4/torture/ndr/ndr.c 	torture_assert_ntstatus_ok(tctx,
tctx              183 source4/torture/ndr/ndr.c 	torture_assert(tctx, GUID_equal(&g1, &exp), "UUID parsed incorrectly");
tctx              188 source4/torture/ndr/ndr.c static bool test_guid_string_valid(struct torture_context *tctx)
tctx              202 source4/torture/ndr/ndr.c 	torture_assert_str_equal(tctx, "00000001-0002-0003-0405-060708090a0b", GUID_string(tctx, &g), 
tctx              207 source4/torture/ndr/ndr.c static bool test_guid_string2_valid(struct torture_context *tctx)
tctx              221 source4/torture/ndr/ndr.c 	torture_assert_str_equal(tctx, "{00000001-0002-0003-0405-060708090a0b}", GUID_string2(tctx, &g), 
tctx              226 source4/torture/ndr/ndr.c static bool test_compare_uuid(struct torture_context *tctx)
tctx              230 source4/torture/ndr/ndr.c 	torture_assert_int_equal(tctx, 0, GUID_compare(&g1, &g2), 
tctx              233 source4/torture/ndr/ndr.c 	torture_assert_int_equal(tctx, 1, GUID_compare(&g1, &g2), 
tctx              237 source4/torture/ndr/ndr.c 	torture_assert_int_equal(tctx, 10, GUID_compare(&g1, &g2), 
tctx              242 source4/torture/ndr/ndr.c 	torture_assert_int_equal(tctx, 20, GUID_compare(&g1, &g2), 
tctx               40 source4/torture/ndr/netlogon.c static bool netrserverauthenticate3_in_check(struct torture_context *tctx,
tctx               44 source4/torture/ndr/netlogon.c 	torture_assert_str_equal(tctx, r->in.server_name, "\\\\NATIVE-DC.NATIVE.BASE", "server name");
tctx               45 source4/torture/ndr/netlogon.c 	torture_assert_str_equal(tctx, r->in.account_name, "NATIVE-2K$", "account name");
tctx               46 source4/torture/ndr/netlogon.c 	torture_assert_int_equal(tctx, r->in.secure_channel_type, 2, "secure channel type");
tctx               47 source4/torture/ndr/netlogon.c 	torture_assert_str_equal(tctx, r->in.computer_name, "NATIVE-2K", "computer name");
tctx               48 source4/torture/ndr/netlogon.c 	torture_assert_int_equal(tctx, *r->in.negotiate_flags, 0x6007ffff, "negotiate flags");
tctx               49 source4/torture/ndr/netlogon.c 	torture_assert_mem_equal(tctx, cred_expected, r->in.credentials->data, 8, "credentials");
tctx               58 source4/torture/ndr/netlogon.c static bool netrserverauthenticate3_out_check(struct torture_context *tctx,
tctx               62 source4/torture/ndr/netlogon.c 	torture_assert_mem_equal(tctx, cred_expected, r->out.return_credentials->data, 8, "return_credentials");
tctx               63 source4/torture/ndr/netlogon.c 	torture_assert_int_equal(tctx, *r->out.negotiate_flags, 0x6007ffff, "negotiate flags");
tctx               64 source4/torture/ndr/netlogon.c 	torture_assert_int_equal(tctx, *r->out.rid, 0x454, "rid");
tctx               65 source4/torture/ndr/netlogon.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx               82 source4/torture/ndr/netlogon.c static bool netrserverreqchallenge_in_check(struct torture_context *tctx,
tctx               86 source4/torture/ndr/netlogon.c 	torture_assert_str_equal(tctx, r->in.server_name, "\\\\NATIVE-DC.NATIVE.BASE", "server name");
tctx               87 source4/torture/ndr/netlogon.c 	torture_assert_str_equal(tctx, r->in.computer_name, "NATIVE-2K", "account name");
tctx               88 source4/torture/ndr/netlogon.c 	torture_assert_mem_equal(tctx, cred_expected, r->in.credentials->data, 8, "credentials");
tctx               97 source4/torture/ndr/netlogon.c static bool netrserverreqchallenge_out_check(struct torture_context *tctx,
tctx              101 source4/torture/ndr/netlogon.c 	torture_assert_mem_equal(tctx, cred_expected, r->out.return_credentials->data, 8, "return_credentials");
tctx              102 source4/torture/ndr/netlogon.c 	torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx               32 source4/torture/ndr/winreg.c static bool closekey_in_check(struct torture_context *tctx, 
tctx               35 source4/torture/ndr/winreg.c 	torture_assert(tctx, ck->in.handle != NULL, "handle invalid");
tctx               36 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, ck->in.handle->handle_type, 0, "handle type");
tctx               45 source4/torture/ndr/winreg.c static bool closekey_out_check(struct torture_context *tctx, 
tctx               48 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, ck->out.handle->handle_type, 0, "handle type");
tctx               49 source4/torture/ndr/winreg.c 	torture_assert_werr_ok(tctx, ck->out.result, "return code");
tctx               57 source4/torture/ndr/winreg.c static bool openhklm_in_check(struct torture_context *tctx, 
tctx               60 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.system_name != NULL, "system name pointer");
tctx               61 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->in.system_name, 34016, "system name");
tctx               62 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask");
tctx               71 source4/torture/ndr/winreg.c static bool openhklm_out_check(struct torture_context *tctx, 
tctx               74 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->out.handle != NULL, "handle pointer");
tctx               75 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->out.handle->handle_type, 0, "handle_type");
tctx               76 source4/torture/ndr/winreg.c 	torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx               91 source4/torture/ndr/winreg.c static bool createkey_in_check(struct torture_context *tctx, 
tctx               94 source4/torture/ndr/winreg.c 	torture_assert_str_equal(tctx, r->in.name.name, "spottyfoot", "name");
tctx               95 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.keyclass.name == NULL, "keyclass");
tctx               96 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.options, 0, "option");
tctx               97 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask");
tctx               98 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.secdesc == NULL, "secdesc");
tctx               99 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.action_taken == NULL, "action_taken");
tctx              110 source4/torture/ndr/winreg.c static bool createkey_out_check(struct torture_context *tctx, 
tctx              113 source4/torture/ndr/winreg.c 	torture_assert(tctx, GUID_all_zero(&r->out.new_handle->uuid), "new_handle");
tctx              114 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->out.action_taken == NULL, "action_taken pointer");
tctx              115 source4/torture/ndr/winreg.c 	torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, 
tctx              131 source4/torture/ndr/winreg.c static bool enumvalue_in_check(struct torture_context *tctx, 
tctx              134 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.enum_index, 5, "enum index");
tctx              135 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.type != NULL, "type pointer");
tctx              136 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->in.type, 0, "type");
tctx              137 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->in.size, 65535, "size");
tctx              138 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->in.length, 0, "length");
tctx              139 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.name->size, 512, "name size");
tctx              140 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.name->length, 0, "name length");
tctx              162 source4/torture/ndr/winreg.c static bool enumvalue_out_check(struct torture_context *tctx, 
tctx              165 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->out.name->size, 512, "name size");
tctx              166 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->out.name->length, 18, "name length");
tctx              167 source4/torture/ndr/winreg.c 	torture_assert_str_equal(tctx, r->out.name->name, "HOMEPATH", "name");
tctx              168 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->out.type, 1, "type");
tctx              169 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->out.size, 76, "size");
tctx              170 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->out.length, 76, "length");
tctx              171 source4/torture/ndr/winreg.c 	torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx              197 source4/torture/ndr/winreg.c static bool queryvalue_in_check(struct torture_context *tctx, 
tctx              200 source4/torture/ndr/winreg.c 	torture_assert_str_equal(tctx, r->in.value_name->name, "HOMEPATH", "name");
tctx              201 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->in.type, 0, "type");
tctx              202 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->in.data_size, 4095, "size");
tctx              203 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->in.data_length, 0, "length");
tctx              204 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.data == NULL, "data pointer");
tctx              215 source4/torture/ndr/winreg.c static bool queryvalue_out_check(struct torture_context *tctx, 
tctx              218 source4/torture/ndr/winreg.c 	torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx              219 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->out.type, 1, "type");
tctx              220 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->out.data == NULL, "data pointer");
tctx              221 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->out.data_size, 76, "size");
tctx              222 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->out.data_length, 0, "length");
tctx              242 source4/torture/ndr/winreg.c static bool querymultiplevalues_in_check(struct torture_context *tctx, 
tctx              245 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.num_values, 1, "num values");
tctx              246 source4/torture/ndr/winreg.c 	torture_assert_str_equal(tctx, r->in.values[0].name->name, "HOMEPATH", 
tctx              249 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.values[0].type, 0, "type");
tctx              250 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.values[0].offset, 0, "offset");
tctx              251 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.values[0].length, 0, "length");
tctx              252 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->in.buffer_size, 76, "buffer size");
tctx              274 source4/torture/ndr/winreg.c static bool querymultiplevalues_out_check(struct torture_context *tctx, 
tctx              277 source4/torture/ndr/winreg.c 	torture_assert_str_equal(tctx, r->out.values[0].name->name, "HOMEPATH", 
tctx              280 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->out.values[0].type, 0, "type");
tctx              281 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->out.values[0].offset, 0, "offset");
tctx              282 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->out.values[0].length, 0, "length");
tctx              284 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->out.buffer_size, 76, "buffer size");
tctx              285 source4/torture/ndr/winreg.c 	torture_assert_werr_equal(tctx, r->out.result, WERR_MORE_DATA, 
tctx              296 source4/torture/ndr/winreg.c static bool flushkey_in_check(struct torture_context *tctx, 
tctx              299 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.handle->handle_type, 0, "handle type");
tctx              307 source4/torture/ndr/winreg.c static bool flushkey_out_check(struct torture_context *tctx, 
tctx              310 source4/torture/ndr/winreg.c 	torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx              324 source4/torture/ndr/winreg.c static bool openkey_in_check(struct torture_context *tctx, struct winreg_OpenKey *r)
tctx              326 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.unknown, 0, "unknown");
tctx              327 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask");
tctx              328 source4/torture/ndr/winreg.c 	torture_assert_str_equal(tctx, r->in.keyname.name, "spottyfoot", "keyname");
tctx              338 source4/torture/ndr/winreg.c static bool openkey_out_check(struct torture_context *tctx, struct winreg_OpenKey *r)
tctx              340 source4/torture/ndr/winreg.c 	torture_assert(tctx, GUID_all_zero(&r->out.handle->uuid), "handle");
tctx              341 source4/torture/ndr/winreg.c 	torture_assert_werr_equal(tctx, r->out.result, WERR_BADFILE, "return code");
tctx              354 source4/torture/ndr/winreg.c static bool deletekey_in_check(struct torture_context *tctx, struct winreg_DeleteKey *r)
tctx              357 source4/torture/ndr/winreg.c 	torture_assert_str_equal(tctx, r->in.key.name, "spottyfoot", "key name");
tctx              365 source4/torture/ndr/winreg.c static bool deletekey_out_check(struct torture_context *tctx, struct winreg_DeleteKey *r)
tctx              367 source4/torture/ndr/winreg.c 	torture_assert_werr_equal(tctx, r->out.result, WERR_BADFILE, "return code");
tctx              376 source4/torture/ndr/winreg.c static bool getversion_in_check(struct torture_context *tctx, struct winreg_GetVersion *r)
tctx              386 source4/torture/ndr/winreg.c static bool getversion_out_check(struct torture_context *tctx, struct winreg_GetVersion *r)
tctx              388 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->out.version, 5, "version");
tctx              389 source4/torture/ndr/winreg.c 	torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx              399 source4/torture/ndr/winreg.c static bool queryinfokey_in_check(struct torture_context *tctx, struct winreg_QueryInfoKey *r)
tctx              402 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.classname->name == NULL, "class in");
tctx              413 source4/torture/ndr/winreg.c static bool queryinfokey_out_check(struct torture_context *tctx, struct winreg_QueryInfoKey *r)
tctx              415 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->out.classname != NULL, "class out");
tctx              416 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->out.classname->name != NULL, "class out name");
tctx              417 source4/torture/ndr/winreg.c 	torture_assert_str_equal(tctx, r->out.classname->name, "", "class out name");
tctx              418 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->out.num_subkeys, 0, "num subkeys");
tctx              419 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->out.max_subkeylen, 0, "subkey length");
tctx              420 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, *r->out.max_classlen, 140, "subkey size");
tctx              421 source4/torture/ndr/winreg.c 	torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx              433 source4/torture/ndr/winreg.c static bool notifychangekeyvalue_in_check(struct torture_context *tctx, struct winreg_NotifyChangeKeyValue *r)
tctx              435 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.watch_subtree, 1, "watch subtree");
tctx              436 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.notify_filter, 0, "notify filter");
tctx              437 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.unknown, 0, "unknown");
tctx              438 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.string1.name == NULL, "string1");
tctx              439 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.string2.name == NULL, "string2");
tctx              440 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.unknown2, 0, "unknown2");
tctx              448 source4/torture/ndr/winreg.c static bool notifychangekeyvalue_out_check(struct torture_context *tctx, struct winreg_NotifyChangeKeyValue *r)
tctx              450 source4/torture/ndr/winreg.c 	torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, "notify change key value");
tctx              460 source4/torture/ndr/winreg.c static bool getkeysecurity_in_check(struct torture_context *tctx, 
tctx              464 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.sec_info, 2, "sec info");
tctx              465 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.sd->size, 65536, "sd size");
tctx              466 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.sd->len, 0, "sd len");
tctx              467 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.sd->data == NULL, "sd data");
tctx              478 source4/torture/ndr/winreg.c static bool getkeysecurity_out_check(struct torture_context *tctx, 
tctx              481 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.sd->size, 20, "sd size");
tctx              482 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.sd->len, 20, "sd len");
tctx              483 source4/torture/ndr/winreg.c 	torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx              496 source4/torture/ndr/winreg.c static bool enumkey_in_check(struct torture_context *tctx, struct winreg_EnumKey *r)
tctx              498 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.enum_index, 0, "enum index");
tctx              499 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.name->size, 1044, "name size");
tctx              500 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->in.name->length, 0, "name len");
tctx              501 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.keyclass != NULL, "keyclass pointer");
tctx              502 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.keyclass->name == NULL, "keyclass");
tctx              503 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->in.last_changed_time != NULL, "last_changed_time != NULL");
tctx              515 source4/torture/ndr/winreg.c static bool enumkey_out_check(struct torture_context *tctx, struct winreg_EnumKey *r)
tctx              517 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->out.name->size, 1044, "name size");
tctx              518 source4/torture/ndr/winreg.c 	torture_assert_int_equal(tctx, r->out.name->length, 8, "name len");
tctx              519 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->out.keyclass != NULL, "keyclass pointer");
tctx              520 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->out.keyclass->name == NULL, "keyclass");
tctx              521 source4/torture/ndr/winreg.c 	torture_assert(tctx, r->out.last_changed_time != NULL, "last_changed_time pointer");
tctx              318 source4/torture/rap/rap.c static bool test_netshareenum(struct torture_context *tctx, 
tctx              327 source4/torture/rap/rap.c 	torture_assert_ntstatus_ok(tctx, 
tctx              328 source4/torture/rap/rap.c 		smbcli_rap_netshareenum(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), "");
tctx              415 source4/torture/rap/rap.c static bool test_netserverenum(struct torture_context *tctx, 
tctx              427 source4/torture/rap/rap.c 	torture_assert_ntstatus_ok(tctx, 
tctx              428 source4/torture/rap/rap.c 		   smbcli_rap_netserverenum2(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), "");
tctx              506 source4/torture/rap/rap.c static bool test_netservergetinfo(struct torture_context *tctx, 
tctx              515 source4/torture/rap/rap.c 	torture_assert_ntstatus_ok(tctx, smbcli_rap_netservergetinfo(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), "");
tctx              517 source4/torture/rap/rap.c 	torture_assert_ntstatus_ok(tctx, smbcli_rap_netservergetinfo(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), "");
tctx               43 source4/torture/raw/acls.c static bool test_sd(struct torture_context *tctx, 
tctx               73 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx               83 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx               89 source4/torture/raw/acls.c 	test_sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-5432");
tctx              107 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              127 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              148 source4/torture/raw/acls.c static bool test_nttrans_create(struct torture_context *tctx, 
tctx              182 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              194 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              202 source4/torture/raw/acls.c 	test_sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-54321");
tctx              215 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              220 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              241 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &_q); \
tctx              254 source4/torture/raw/acls.c static bool test_nttrans_create_null_dacl(struct torture_context *tctx,
tctx              264 source4/torture/raw/acls.c 	struct security_descriptor *sd = security_descriptor_initialise(tctx);
tctx              287 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              298 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              334 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              351 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              359 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              367 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              375 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              383 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              409 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              432 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              440 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              445 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              450 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              455 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              476 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              499 source4/torture/raw/acls.c static bool test_creator_sid(struct torture_context *tctx, 
tctx              528 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              536 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              540 source4/torture/raw/acls.c 	owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx              543 source4/torture/raw/acls.c 	sd = security_descriptor_dacl_create(tctx,
tctx              561 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              566 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              571 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              576 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              580 source4/torture/raw/acls.c 	sd = security_descriptor_dacl_create(tctx,
tctx              596 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              609 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              614 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              623 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              628 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              635 source4/torture/raw/acls.c 	sd = security_descriptor_dacl_create(tctx,
tctx              648 source4/torture/raw/acls.c 	sd2 = security_descriptor_dacl_create(tctx,
tctx              656 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              670 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              675 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              684 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              689 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              711 source4/torture/raw/acls.c static bool test_generic_bits(struct torture_context *tctx, 
tctx              767 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              775 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              779 source4/torture/raw/acls.c 	owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx              813 source4/torture/raw/acls.c 		sd = security_descriptor_dacl_create(tctx,
tctx              829 source4/torture/raw/acls.c 		sd2 = security_descriptor_dacl_create(tctx,
tctx              837 source4/torture/raw/acls.c 		status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              849 source4/torture/raw/acls.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx              861 source4/torture/raw/acls.c 		sd = security_descriptor_dacl_create(tctx,
tctx              877 source4/torture/raw/acls.c 		sd2 = security_descriptor_dacl_create(tctx,
tctx              885 source4/torture/raw/acls.c 		status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              897 source4/torture/raw/acls.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx              932 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              940 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx              944 source4/torture/raw/acls.c 	owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx              978 source4/torture/raw/acls.c 		sd = security_descriptor_dacl_create(tctx,
tctx              994 source4/torture/raw/acls.c 		sd2 = security_descriptor_dacl_create(tctx,
tctx             1002 source4/torture/raw/acls.c 		status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx             1014 source4/torture/raw/acls.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx             1026 source4/torture/raw/acls.c 		sd = security_descriptor_dacl_create(tctx,
tctx             1042 source4/torture/raw/acls.c 		sd2 = security_descriptor_dacl_create(tctx,
tctx             1050 source4/torture/raw/acls.c 		status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx             1062 source4/torture/raw/acls.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx             1086 source4/torture/raw/acls.c static bool test_owner_bits(struct torture_context *tctx, 
tctx             1121 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1129 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx             1133 source4/torture/raw/acls.c 	owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx             1153 source4/torture/raw/acls.c 	sd = security_descriptor_dacl_create(tctx,
tctx             1174 source4/torture/raw/acls.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx             1209 source4/torture/raw/acls.c static bool test_inheritance(struct torture_context *tctx, 
tctx             1349 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1357 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx             1361 source4/torture/raw/acls.c 	owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx             1365 source4/torture/raw/acls.c 	sd_def = security_descriptor_dacl_create(tctx,
tctx             1377 source4/torture/raw/acls.c 	creator_owner = dom_sid_parse_talloc(tctx, SID_CREATOR_OWNER);
tctx             1380 source4/torture/raw/acls.c 		sd = security_descriptor_dacl_create(tctx,
tctx             1400 source4/torture/raw/acls.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx             1405 source4/torture/raw/acls.c 		status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx             1445 source4/torture/raw/acls.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx             1450 source4/torture/raw/acls.c 		status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx             1517 source4/torture/raw/acls.c 	sd = security_descriptor_dacl_create(tctx,
tctx             1539 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1546 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx             1550 source4/torture/raw/acls.c 	sd2 = security_descriptor_dacl_create(tctx,
tctx             1568 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1582 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1588 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1592 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1609 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1613 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1637 source4/torture/raw/acls.c static bool test_inheritance_dynamic(struct torture_context *tctx, 
tctx             1670 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1678 source4/torture/raw/acls.c 	status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx             1682 source4/torture/raw/acls.c 	owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx             1686 source4/torture/raw/acls.c 	sd = security_descriptor_dacl_create(tctx,
tctx             1707 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1715 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1722 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1726 source4/torture/raw/acls.c 	sd = security_descriptor_dacl_create(tctx,
tctx             1741 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1749 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1803 source4/torture/raw/acls.c static bool test_sd_get_set(struct torture_context *tctx, 
tctx             1841 source4/torture/raw/acls.c 	sd = security_descriptor_dacl_create(tctx,
tctx             1864 source4/torture/raw/acls.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1884 source4/torture/raw/acls.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx             1891 source4/torture/raw/acls.c 		status = smb_raw_fileinfo(cli->tree, tctx, &fi);
tctx             1900 source4/torture/raw/acls.c 		status = smb_raw_fileinfo(cli->tree, tctx, &fi);
tctx             1919 source4/torture/raw/acls.c 		status = smb_raw_fileinfo(cli->tree, tctx, &fi);
tctx             1938 source4/torture/raw/acls.c 		status = smb_raw_fileinfo(cli->tree, tctx, &fi);
tctx             1957 source4/torture/raw/acls.c 		status = smb_raw_fileinfo(cli->tree, tctx, &fi);
tctx             1989 source4/torture/raw/acls.c bool torture_raw_acls(struct torture_context *tctx, struct smbcli_state *cli)
tctx             1997 source4/torture/raw/acls.c 	ret &= test_sd(tctx, cli);
tctx             1998 source4/torture/raw/acls.c 	ret &= test_nttrans_create(tctx, cli);
tctx             1999 source4/torture/raw/acls.c 	ret &= test_nttrans_create_null_dacl(tctx, cli);
tctx             2000 source4/torture/raw/acls.c 	ret &= test_creator_sid(tctx, cli);
tctx             2001 source4/torture/raw/acls.c 	ret &= test_generic_bits(tctx, cli);
tctx             2002 source4/torture/raw/acls.c 	ret &= test_owner_bits(tctx, cli);
tctx             2003 source4/torture/raw/acls.c 	ret &= test_inheritance(tctx, cli);
tctx             2004 source4/torture/raw/acls.c 	ret &= test_inheritance_dynamic(tctx, cli);
tctx             2005 source4/torture/raw/acls.c 	ret &= test_sd_get_set(tctx, cli);
tctx               59 source4/torture/raw/chkpath.c static bool test_path_ex(struct smbcli_state *cli, struct torture_context *tctx,
tctx               99 source4/torture/raw/chkpath.c 		if (tctx && torture_setting_bool(tctx, "samba4", false)) {
tctx              120 source4/torture/raw/chkpath.c static bool test_chkpath(struct smbcli_state *cli, struct torture_context *tctx)
tctx              135 source4/torture/raw/chkpath.c 	fnum = create_complex_file(cli, tctx, BASEDIR "\\test.txt..");
tctx              150 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, BASEDIR, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx              151 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR) + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx              152 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\\\") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx              153 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\foo\\..") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx              154 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\f\\o\\o\\..\\..\\..") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx              155 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\foo\\\\..\\\\") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx              156 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, BASEDIR"\\", BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx              157 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, BASEDIR"\\\\..\\"BASEDIR, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx              158 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, BASEDIR"\\\\\\", BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx              159 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, "\\\\\\\\"BASEDIR"\\\\\\\\", BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx              160 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, "\\\\\\\\"BASEDIR, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx              161 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, BASEDIR "\\foo\\..\\test.txt..", BASEDIR "\\test.txt..",
tctx              163 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, "", "\\", NT_STATUS_OK, NT_STATUS_OK);
tctx              182 source4/torture/raw/chkpath.c 	status = single_search(cli, tctx, "\\.\\\\\\\\\\\\.");
tctx              224 source4/torture/raw/chkpath.c 	ret &= test_path_ex(cli, tctx, BASEDIR "\\..", "\\", NT_STATUS_OK,NT_STATUS_OK);
tctx              243 source4/torture/raw/chkpath.c 	status = single_search(cli, tctx, BASEDIR".\\.\\.\\.\\foo\\..\\.\\");
tctx              271 source4/torture/raw/chkpath.c static bool test_chkpath_names(struct smbcli_state *cli, struct torture_context *tctx)
tctx              289 source4/torture/raw/chkpath.c 		char *path = talloc_asprintf(tctx, "%s\\File0x%02X%c",
tctx              309 source4/torture/raw/chkpath.c 			    torture_setting_bool(tctx, "samba3", false)) {
tctx               47 source4/torture/raw/composite.c static bool test_loadfile(struct smbcli_state *cli, struct torture_context *tctx)
tctx               58 source4/torture/raw/composite.c 	int *count = talloc_zero(tctx, int);
tctx               60 source4/torture/raw/composite.c 	data = talloc_array(tctx, uint8_t, len);
tctx               80 source4/torture/raw/composite.c 	c = talloc_array(tctx, struct composite_context *, num_ops);
tctx               91 source4/torture/raw/composite.c 		if (torture_setting_bool(tctx, "progress", true)) {
tctx               99 source4/torture/raw/composite.c 		status = smb_composite_loadfile_recv(c[i], tctx);
tctx              125 source4/torture/raw/composite.c static bool test_fetchfile(struct smbcli_state *cli, struct torture_context *tctx)
tctx              137 source4/torture/raw/composite.c 	int *count = talloc_zero(tctx, int);
tctx              140 source4/torture/raw/composite.c 	data = talloc_array(tctx, uint8_t, len);
tctx              156 source4/torture/raw/composite.c 	io2.in.dest_host = torture_setting_string(tctx, "host", NULL);
tctx              157 source4/torture/raw/composite.c 	io2.in.ports = lp_smb_ports(tctx->lp_ctx);
tctx              158 source4/torture/raw/composite.c 	io2.in.called_name = torture_setting_string(tctx, "host", NULL);
tctx              159 source4/torture/raw/composite.c 	io2.in.service = torture_setting_string(tctx, "share", NULL);
tctx              163 source4/torture/raw/composite.c 	io2.in.workgroup  = lp_workgroup(tctx->lp_ctx);
tctx              165 source4/torture/raw/composite.c 	io2.in.resolve_ctx = lp_resolve_context(tctx->lp_ctx);
tctx              166 source4/torture/raw/composite.c 	io2.in.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx);
tctx              167 source4/torture/raw/composite.c 	io2.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx              168 source4/torture/raw/composite.c 	lp_smbcli_options(tctx->lp_ctx, &io2.in.options);
tctx              169 source4/torture/raw/composite.c 	lp_smbcli_session_options(tctx->lp_ctx, &io2.in.session_options);
tctx              174 source4/torture/raw/composite.c 	c = talloc_array(tctx, struct composite_context *, torture_numops);
tctx              186 source4/torture/raw/composite.c 		if (torture_setting_bool(tctx, "progress", true)) {
tctx              194 source4/torture/raw/composite.c 		status = smb_composite_fetchfile_recv(c[i], tctx);
tctx              223 source4/torture/raw/composite.c static bool test_appendacl(struct smbcli_state *cli, struct torture_context *tctx)
tctx              235 source4/torture/raw/composite.c 	int *count = talloc_zero(tctx, int);
tctx              241 source4/torture/raw/composite.c 	io_orig = talloc_array(tctx, struct smb_composite_appendacl *, num_ops);
tctx              269 source4/torture/raw/composite.c 	test_sd = security_descriptor_initialise(tctx);
tctx              270 source4/torture/raw/composite.c 	test_sid = dom_sid_parse_talloc (tctx, "S-1-5-32-1234-5432");
tctx              272 source4/torture/raw/composite.c 	ace = talloc_zero(tctx, struct security_ace);
tctx              289 source4/torture/raw/composite.c 	c = talloc_array(tctx, struct composite_context *, num_ops);
tctx              290 source4/torture/raw/composite.c 	io = talloc_array(tctx, struct  smb_composite_appendacl *, num_ops);
tctx              302 source4/torture/raw/composite.c 	event_ctx = tctx->ev;
tctx              306 source4/torture/raw/composite.c 		if (torture_setting_bool(tctx, "progress", true)) {
tctx              336 source4/torture/raw/composite.c static bool test_fsinfo(struct smbcli_state *cli, struct torture_context *tctx)
tctx              346 source4/torture/raw/composite.c 	int *count = talloc_zero(tctx, int);
tctx              349 source4/torture/raw/composite.c 	io1.in.dest_host = torture_setting_string(tctx, "host", NULL);
tctx              350 source4/torture/raw/composite.c 	io1.in.dest_ports = lp_smb_ports(tctx->lp_ctx);
tctx              351 source4/torture/raw/composite.c 	io1.in.socket_options = lp_socket_options(tctx->lp_ctx);
tctx              352 source4/torture/raw/composite.c 	io1.in.called_name = torture_setting_string(tctx, "host", NULL);
tctx              353 source4/torture/raw/composite.c 	io1.in.service = torture_setting_string(tctx, "share", NULL);
tctx              356 source4/torture/raw/composite.c 	io1.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx              358 source4/torture/raw/composite.c 	io1.in.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx);
tctx              359 source4/torture/raw/composite.c 	io1.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx              363 source4/torture/raw/composite.c 	event_ctx = tctx->ev;
tctx              364 source4/torture/raw/composite.c 	c = talloc_array(tctx, struct composite_context *, torture_numops);
tctx              367 source4/torture/raw/composite.c 		c[i] = smb_composite_fsinfo_send(cli->tree, &io1, lp_resolve_context(tctx->lp_ctx));
tctx              376 source4/torture/raw/composite.c 		if (torture_setting_bool(tctx, "progress", true)) {
tctx              384 source4/torture/raw/composite.c 		status = smb_composite_fsinfo_recv(c[i], tctx);
tctx              399 source4/torture/raw/composite.c 		guid=GUID_string(tctx, &io1.out.fsinfo->objectid_information.out.guid);
tctx              412 source4/torture/raw/composite.c bool torture_raw_composite(struct torture_context *tctx, 
tctx              421 source4/torture/raw/composite.c 	ret &= test_fetchfile(cli, tctx);
tctx              422 source4/torture/raw/composite.c 	ret &= test_loadfile(cli, tctx);
tctx              423 source4/torture/raw/composite.c  	ret &= test_appendacl(cli, tctx);
tctx              424 source4/torture/raw/composite.c 	ret &= test_fsinfo(cli, tctx);
tctx               63 source4/torture/raw/context.c static bool test_session(struct smbcli_state *cli, struct torture_context *tctx)
tctx               95 source4/torture/raw/context.c 	lp_smbcli_session_options(tctx->lp_ctx, &options);
tctx               96 source4/torture/raw/context.c 	gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx               98 source4/torture/raw/context.c 	session = smbcli_session_init(cli->transport, tctx, false, options);
tctx              102 source4/torture/raw/context.c 	setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx              113 source4/torture/raw/context.c 	session2 = smbcli_session_init(cli->transport, tctx, false, options);
tctx              118 source4/torture/raw/context.c 	setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx              140 source4/torture/raw/context.c 		session3 = smbcli_session_init(cli->transport, tctx, false, options);
tctx              145 source4/torture/raw/context.c 		setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx              153 source4/torture/raw/context.c 		session4 = smbcli_session_init(cli->transport, tctx, false, options);
tctx              158 source4/torture/raw/context.c 		setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx              160 source4/torture/raw/context.c 		anon_creds = cli_credentials_init(tctx);
tctx              161 source4/torture/raw/context.c 		cli_credentials_set_conf(anon_creds, tctx->lp_ctx);
tctx              173 source4/torture/raw/context.c 	tree = smbcli_tree_init(session, tctx, false);
tctx              189 source4/torture/raw/context.c 	status = smb_raw_open(tree, tctx, &io);
tctx              235 source4/torture/raw/context.c 		setups[i].in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx              240 source4/torture/raw/context.c 		sessions[i] = smbcli_session_init(cli->transport, tctx, false, options);
tctx              268 source4/torture/raw/context.c static bool test_tree(struct smbcli_state *cli, struct torture_context *tctx)
tctx              288 source4/torture/raw/context.c 	share = torture_setting_string(tctx, "share", NULL);
tctx              289 source4/torture/raw/context.c 	host  = torture_setting_string(tctx, "host", NULL);
tctx              292 source4/torture/raw/context.c 	tree = smbcli_tree_init(cli->session, tctx, false);
tctx              297 source4/torture/raw/context.c 	tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share);
tctx              299 source4/torture/raw/context.c 	status = smb_raw_tcon(tree, tctx, &tcon);
tctx              308 source4/torture/raw/context.c 	status = smb_raw_tcon(tree, tctx, &tcon);
tctx              325 source4/torture/raw/context.c 	status = smb_raw_open(tree, tctx, &io);
tctx              373 source4/torture/raw/context.c static bool test_tree_ulogoff(struct smbcli_state *cli, struct torture_context *tctx)
tctx              397 source4/torture/raw/context.c 	share = torture_setting_string(tctx, "share", NULL);
tctx              398 source4/torture/raw/context.c 	host  = torture_setting_string(tctx, "host", NULL);
tctx              400 source4/torture/raw/context.c 	lp_smbcli_session_options(tctx->lp_ctx, &options);
tctx              403 source4/torture/raw/context.c 	session1 = smbcli_session_init(cli->transport, tctx, false, options);
tctx              406 source4/torture/raw/context.c 	setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx              408 source4/torture/raw/context.c 	setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx              415 source4/torture/raw/context.c 	tree = smbcli_tree_init(session1, tctx, false);
tctx              419 source4/torture/raw/context.c 	tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share);
tctx              421 source4/torture/raw/context.c 	status = smb_raw_tcon(tree, tctx, &tcon);
tctx              439 source4/torture/raw/context.c 	status = smb_raw_open(tree, tctx, &io);
tctx              460 source4/torture/raw/context.c 	session2 = smbcli_session_init(cli->transport, tctx, false, options);
tctx              463 source4/torture/raw/context.c 	setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx              465 source4/torture/raw/context.c 	setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx              487 source4/torture/raw/context.c 	status = smb_raw_open(tree, tctx, &io);
tctx              636 source4/torture/raw/context.c static bool test_pid_2sess(struct smbcli_state *cli, struct torture_context *tctx)
tctx              657 source4/torture/raw/context.c 	lp_smbcli_session_options(tctx->lp_ctx, &options);
tctx              660 source4/torture/raw/context.c 	session = smbcli_session_init(cli->transport, tctx, false, options);
tctx              664 source4/torture/raw/context.c 	setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx              666 source4/torture/raw/context.c 	setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx              691 source4/torture/raw/context.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              743 source4/torture/raw/context.c static bool test_pid_2tcon(struct smbcli_state *cli, struct torture_context *tctx)
tctx              765 source4/torture/raw/context.c 	share = torture_setting_string(tctx, "share", NULL);
tctx              766 source4/torture/raw/context.c 	host  = torture_setting_string(tctx, "host", NULL);
tctx              769 source4/torture/raw/context.c 	tree = smbcli_tree_init(cli->session, tctx, false);
tctx              774 source4/torture/raw/context.c 	tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share);
tctx              776 source4/torture/raw/context.c 	status = smb_raw_tcon(tree, tctx, &tcon);
tctx              799 source4/torture/raw/context.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              830 source4/torture/raw/context.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              885 source4/torture/raw/context.c static bool torture_raw_context_int(struct torture_context *tctx, 
tctx              890 source4/torture/raw/context.c 	ret &= test_session(cli, tctx);
tctx              891 source4/torture/raw/context.c 	ret &= test_tree(cli, tctx);
tctx              892 source4/torture/raw/context.c 	ret &= test_tree_ulogoff(cli, tctx);
tctx              893 source4/torture/raw/context.c 	ret &= test_pid_exit_only_sees_open(cli, tctx);
tctx              894 source4/torture/raw/context.c 	ret &= test_pid_2sess(cli, tctx);
tctx              895 source4/torture/raw/context.c 	ret &= test_pid_2tcon(cli, tctx);
tctx              231 source4/torture/raw/eas.c static bool test_max_eas(struct smbcli_state *cli, struct torture_context *tctx)
tctx              249 source4/torture/raw/eas.c 	maxeasize  = torture_setting_int(tctx, "maxeasize", 65536);
tctx              250 source4/torture/raw/eas.c 	maxeanames = torture_setting_int(tctx, "maxeanames", 101);
tctx              251 source4/torture/raw/eas.c 	maxeastart = torture_setting_int(tctx, "maxeastart", 1);
tctx              252 source4/torture/raw/eas.c 	maxeadebug = torture_setting_int(tctx, "maxeadebug", 0);
tctx              298 source4/torture/raw/eas.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              302 source4/torture/raw/eas.c 	eablob = data_blob_talloc(tctx, NULL, maxeasize);
tctx              338 source4/torture/raw/eas.c 		eaname = talloc_asprintf(tctx, "MAX%d", i);
tctx               73 source4/torture/raw/lock.c static bool test_lock(struct torture_context *tctx, struct smbcli_state *cli)
tctx              208 source4/torture/raw/lock.c static bool test_lockx(struct torture_context *tctx, struct smbcli_state *cli)
tctx              366 source4/torture/raw/lock.c 	if (TARGET_IS_WIN7(tctx))
tctx              378 source4/torture/raw/lock.c 	if (TARGET_IS_WIN7(tctx))
tctx              396 source4/torture/raw/lock.c static bool test_pidhigh(struct torture_context *tctx, 
tctx              476 source4/torture/raw/lock.c static bool test_async(struct torture_context *tctx, 
tctx              498 source4/torture/raw/lock.c 	lp_smbcli_session_options(tctx->lp_ctx, &options);
tctx              629 source4/torture/raw/lock.c 	session = smbcli_session_init(cli->transport, tctx, false, options);
tctx              632 source4/torture/raw/lock.c 	setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx              634 source4/torture/raw/lock.c 	setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx              640 source4/torture/raw/lock.c 	share = torture_setting_string(tctx, "share", NULL);
tctx              641 source4/torture/raw/lock.c 	host  = torture_setting_string(tctx, "host", NULL);
tctx              642 source4/torture/raw/lock.c 	tree = smbcli_tree_init(session, tctx, false);
tctx              646 source4/torture/raw/lock.c 	tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share);
tctx              648 source4/torture/raw/lock.c 	status = smb_raw_tcon(tree, tctx, &tcon);
tctx              813 source4/torture/raw/lock.c static bool test_errorcode(struct torture_context *tctx, 
tctx              857 source4/torture/raw/lock.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx              861 source4/torture/raw/lock.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx             1295 source4/torture/raw/lock.c static bool test_changetype(struct torture_context *tctx, 
tctx             1397 source4/torture/raw/lock.c static bool test_zerobytelocks(struct torture_context *tctx, struct smbcli_state *cli)
tctx             1487 source4/torture/raw/lock.c static bool test_unlock(struct torture_context *tctx, struct smbcli_state *cli)
tctx             1641 source4/torture/raw/lock.c 	if (TARGET_IS_WIN7(tctx))
tctx             1654 source4/torture/raw/lock.c         if (TARGET_IS_WIN7(tctx))
tctx             1672 source4/torture/raw/lock.c static bool test_multiple_unlock(struct torture_context *tctx, struct smbcli_state *cli)
tctx             1789 source4/torture/raw/lock.c static bool test_stacking(struct torture_context *tctx, struct smbcli_state *cli)
tctx               47 source4/torture/raw/lockbench.c 	struct torture_context *tctx;
tctx              184 source4/torture/raw/lockbench.c 	if (!torture_get_conn_index(state->client_num, state->mem_ctx, state->tctx, &host, &share)) {
tctx              191 source4/torture/raw/lockbench.c 	io->in.gensec_settings = lp_gensec_settings(state->mem_ctx, state->tctx->lp_ctx);
tctx              192 source4/torture/raw/lockbench.c 	io->in.socket_options = lp_socket_options(state->tctx->lp_ctx);
tctx              198 source4/torture/raw/lockbench.c 	io->in.workgroup    = lp_workgroup(state->tctx->lp_ctx);
tctx              199 source4/torture/raw/lockbench.c 	io->in.iconv_convenience = lp_iconv_convenience(state->tctx->lp_ctx);
tctx              200 source4/torture/raw/lockbench.c 	lp_smbcli_options(state->tctx->lp_ctx, &io->in.options);
tctx              201 source4/torture/raw/lockbench.c 	lp_smbcli_session_options(state->tctx->lp_ctx, &io->in.session_options);
tctx              208 source4/torture/raw/lockbench.c 					 lp_resolve_context(state->tctx->lp_ctx),
tctx              336 source4/torture/raw/lockbench.c 		state[i].tctx = torture;
tctx               40 source4/torture/raw/mkdir.c static bool test_mkdir(struct smbcli_state *cli, struct torture_context *tctx)
tctx               78 source4/torture/raw/mkdir.c 	smbcli_close(cli->tree, create_complex_file(cli, tctx, path));
tctx              110 source4/torture/raw/mkdir.c 	md.t2mkdir.in.path = talloc_asprintf(tctx, "%s\\bad_path\\bad_path",
tctx              121 source4/torture/raw/mkdir.c 	md.t2mkdir.in.eas = talloc_array(tctx, struct ea_struct, md.t2mkdir.in.num_eas);
tctx              124 source4/torture/raw/mkdir.c 	md.t2mkdir.in.eas[0].value = data_blob_talloc(tctx, "blah", 4);
tctx              127 source4/torture/raw/mkdir.c 	md.t2mkdir.in.eas[1].value = data_blob_talloc(tctx, "foo bar", 7);
tctx              130 source4/torture/raw/mkdir.c 	md.t2mkdir.in.eas[2].value = data_blob_talloc(tctx, "xx1", 3);
tctx              133 source4/torture/raw/mkdir.c 	if (torture_setting_bool(tctx, "samba3", false)
tctx              547 source4/torture/raw/notify.c static bool test_notify_mask(struct smbcli_state *cli, struct torture_context *tctx)
tctx              590 source4/torture/raw/notify.c 		status = smb_raw_open(cli->tree, tctx, &io); \
tctx              599 source4/torture/raw/notify.c 		status = smb_raw_changenotify_recv(req, tctx, &notify); \
tctx              711 source4/torture/raw/notify.c 		fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx              717 source4/torture/raw/notify.c 	if (torture_setting_bool(tctx, "samba3", false)) {
tctx              724 source4/torture/raw/notify.c 			fnum2 = create_complex_file(cli, tctx,
tctx              735 source4/torture/raw/notify.c 		fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx              743 source4/torture/raw/notify.c 		fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx              751 source4/torture/raw/notify.c 		fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx              760 source4/torture/raw/notify.c 		fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx              768 source4/torture/raw/notify.c 		fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx              842 source4/torture/raw/notify.c static bool test_notify_tdis(struct torture_context *tctx)
tctx              854 source4/torture/raw/notify.c 	if (!torture_open_connection(&cli, tctx, 0)) {
tctx              874 source4/torture/raw/notify.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              892 source4/torture/raw/notify.c 	status = smb_raw_changenotify_recv(req, tctx, &notify);
tctx              904 source4/torture/raw/notify.c static bool test_notify_exit(struct torture_context *tctx)
tctx              916 source4/torture/raw/notify.c 	if (!torture_open_connection(&cli, tctx, 0)) {
tctx              936 source4/torture/raw/notify.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              953 source4/torture/raw/notify.c 	status = smb_raw_changenotify_recv(req, tctx, &notify);
tctx              965 source4/torture/raw/notify.c static bool test_notify_ulogoff(struct torture_context *tctx)
tctx              977 source4/torture/raw/notify.c 	if (!torture_open_connection(&cli, tctx, 0)) {
tctx              997 source4/torture/raw/notify.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1014 source4/torture/raw/notify.c 	status = smb_raw_changenotify_recv(req, tctx, &notify);
tctx             1033 source4/torture/raw/notify.c static bool test_notify_tcp_dis(struct torture_context *tctx)
tctx             1045 source4/torture/raw/notify.c 	if (!torture_open_connection(&cli, tctx, 0)) {
tctx             1065 source4/torture/raw/notify.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1081 source4/torture/raw/notify.c 	status = smb_raw_changenotify_recv(req, tctx, &notify);
tctx             1438 source4/torture/raw/notify.c 					  struct torture_context *tctx)
tctx             1445 source4/torture/raw/notify.c 	share = torture_setting_string(tctx, "share", NULL);
tctx             1446 source4/torture/raw/notify.c 	host  = torture_setting_string(tctx, "host", NULL);
tctx             1449 source4/torture/raw/notify.c 	tree = smbcli_tree_init(cli->session, tctx, false);
tctx             1454 source4/torture/raw/notify.c 	tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share);
tctx             1456 source4/torture/raw/notify.c 	status = smb_raw_tcon(tree, tctx, &tcon);
tctx               56 source4/torture/raw/offline.c 	struct torture_context *tctx;
tctx              410 source4/torture/raw/offline.c 		state[i].tctx = torture;
tctx              424 source4/torture/raw/offline.c 		state[i].tctx = torture;
tctx               75 source4/torture/raw/open.c 	fnum = create_complex_file(cli, tctx, fname); \
tctx               94 source4/torture/raw/open.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \
tctx              101 source4/torture/raw/open.c 		       timestring(tctx, t1), \
tctx              102 source4/torture/raw/open.c 		       timestring(tctx, t2)); \
tctx              103 source4/torture/raw/open.c 		dump_all_info(tctx, &finfo); \
tctx              111 source4/torture/raw/open.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \
tctx              117 source4/torture/raw/open.c 		       nt_time_string(tctx, t), \
tctx              118 source4/torture/raw/open.c 		       nt_time_string(tctx, t2)); \
tctx              119 source4/torture/raw/open.c 		dump_all_info(tctx, &finfo); \
tctx              126 source4/torture/raw/open.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \
tctx              131 source4/torture/raw/open.c 		dump_all_info(tctx, &finfo); \
tctx              157 source4/torture/raw/open.c static bool test_open(struct smbcli_state *cli, struct torture_context *tctx)
tctx              172 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              180 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              185 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              198 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              205 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              212 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              220 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              231 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              235 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              248 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              268 source4/torture/raw/open.c static bool test_openx(struct smbcli_state *cli, struct torture_context *tctx)
tctx              314 source4/torture/raw/open.c 			fnum = create_complex_file(cli, tctx, fname);
tctx              323 source4/torture/raw/open.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx              342 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              359 source4/torture/raw/open.c 	fnum2 = create_complex_file(cli, tctx, fname);
tctx              367 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              383 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              388 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              399 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              401 source4/torture/raw/open.c 	if (torture_setting_bool(tctx, "samba3", false)) {
tctx              417 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              424 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              444 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              451 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              457 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              464 source4/torture/raw/open.c 	fnum = create_complex_file(cli, tctx, fname_exe);
tctx              476 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              498 source4/torture/raw/open.c static bool test_t2open(struct smbcli_state *cli, struct torture_context *tctx)
tctx              528 source4/torture/raw/open.c 	fnum = create_complex_file(cli, tctx, fname1);
tctx              549 source4/torture/raw/open.c 	io.t2open.in.eas = talloc_array(tctx, struct ea_struct, io.t2open.in.num_eas);
tctx              552 source4/torture/raw/open.c 	io.t2open.in.eas[0].value = data_blob_talloc(tctx, "first value", 11);
tctx              555 source4/torture/raw/open.c 	io.t2open.in.eas[1].value = data_blob_talloc(tctx, "foo", 3);
tctx              558 source4/torture/raw/open.c 	io.t2open.in.eas[2].value = data_blob_talloc(tctx, "xy", 2);
tctx              569 source4/torture/raw/open.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx              572 source4/torture/raw/open.c 		    && torture_setting_bool(tctx, "samba3", false)) {
tctx              597 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              627 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              631 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              641 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              649 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              663 source4/torture/raw/open.c static bool test_ntcreatex(struct smbcli_state *cli, struct torture_context *tctx)
tctx              722 source4/torture/raw/open.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx              738 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              757 source4/torture/raw/open.c 	fnum = create_complex_file(cli, tctx, fname);
tctx              765 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              802 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              836 source4/torture/raw/open.c static bool test_nttrans_create(struct smbcli_state *cli, struct torture_context *tctx)
tctx              899 source4/torture/raw/open.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx              915 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              934 source4/torture/raw/open.c 	fnum = create_complex_file(cli, tctx, fname);
tctx              942 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              961 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              985 source4/torture/raw/open.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx             1023 source4/torture/raw/open.c 		status = smb_raw_open(cli->tree, tctx, &io);
tctx             1066 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1104 source4/torture/raw/open.c static bool test_ntcreatex_brlocked(struct smbcli_state *cli, struct torture_context *tctx)
tctx             1130 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1161 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io1);
tctx             1174 source4/torture/raw/open.c static bool test_mknew(struct smbcli_state *cli, struct torture_context *tctx)
tctx             1190 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1194 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1202 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1212 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1229 source4/torture/raw/open.c static bool test_create(struct smbcli_state *cli, struct torture_context *tctx)
tctx             1245 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1249 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1258 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1268 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1285 source4/torture/raw/open.c static bool test_ctemp(struct smbcli_state *cli, TALLOC_CTX *tctx)
tctx             1301 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1309 source4/torture/raw/open.c 	status = smb_raw_fileinfo(cli->tree, tctx, &finfo);
tctx             1328 source4/torture/raw/open.c static bool test_chained(struct smbcli_state *cli, TALLOC_CTX *tctx)
tctx             1341 source4/torture/raw/open.c 	fnum = create_complex_file(cli, tctx, fname);
tctx             1364 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1385 source4/torture/raw/open.c static bool test_no_leading_slash(struct smbcli_state *cli, TALLOC_CTX *tctx)
tctx             1398 source4/torture/raw/open.c 	fnum = create_complex_file(cli, tctx, fname);
tctx             1414 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1431 source4/torture/raw/open.c static bool test_openx_over_dir(struct smbcli_state *cli, TALLOC_CTX *tctx)
tctx             1459 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1473 source4/torture/raw/open.c static bool test_raw_open_multi(struct torture_context *tctx)
tctx             1484 source4/torture/raw/open.c 	const char *host = torture_setting_string(tctx, "host", NULL);
tctx             1485 source4/torture/raw/open.c 	const char *share = torture_setting_string(tctx, "share", NULL);
tctx             1493 source4/torture/raw/open.c 	if ((tctx->ev == NULL) || (clients == NULL) || (requests == NULL) ||
tctx             1499 source4/torture/raw/open.c 	if (!torture_open_connection_share(mem_ctx, &cli, tctx, host, share, tctx->ev)) {
tctx             1507 source4/torture/raw/open.c 						   tctx, host, share, tctx->ev)) {
tctx             1576 source4/torture/raw/open.c 		if (event_loop_once(tctx->ev) != 0) {
tctx             1596 source4/torture/raw/open.c static bool test_open_for_delete(struct smbcli_state *cli, struct torture_context *tctx)
tctx             1623 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx             1638 source4/torture/raw/open.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx               47 source4/torture/raw/openbench.c 	struct torture_context *tctx;
tctx              126 source4/torture/raw/openbench.c 	if (!torture_get_conn_index(state->client_num, state->mem_ctx, state->tctx, &host, &share)) {
tctx              133 source4/torture/raw/openbench.c 	io->in.socket_options = lp_socket_options(state->tctx->lp_ctx);
tctx              139 source4/torture/raw/openbench.c 	io->in.workgroup    = lp_workgroup(state->tctx->lp_ctx);
tctx              140 source4/torture/raw/openbench.c 	io->in.gensec_settings = lp_gensec_settings(state->mem_ctx, state->tctx->lp_ctx);
tctx              141 source4/torture/raw/openbench.c 	lp_smbcli_options(state->tctx->lp_ctx, &io->in.options);
tctx              142 source4/torture/raw/openbench.c 	lp_smbcli_session_options(state->tctx->lp_ctx, &io->in.session_options);
tctx              151 source4/torture/raw/openbench.c 					 lp_resolve_context(state->tctx->lp_ctx), 
tctx              389 source4/torture/raw/openbench.c 		state[i].tctx = torture;
tctx               34 source4/torture/raw/oplock.c 		torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got 0x%x - should be 0x%x\n", \
tctx               41 source4/torture/raw/oplock.c 		torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got %d - should be between %d and %d\n", \
tctx               48 source4/torture/raw/oplock.c 		torture_result(tctx, TORTURE_FAIL,  "(%s): wrong value for %s got '%s' - should be '%s'\n", \
tctx               54 source4/torture/raw/oplock.c #define CHECK_STATUS(tctx, status, correct) do { \
tctx               56 source4/torture/raw/oplock.c 		torture_result(tctx, TORTURE_FAIL, __location__": Incorrect status %s - should be %s", \
tctx              174 source4/torture/raw/oplock.c static bool open_connection_no_level2_oplocks(struct torture_context *tctx,
tctx              181 source4/torture/raw/oplock.c 	lp_smbcli_options(tctx->lp_ctx, &options);
tctx              182 source4/torture/raw/oplock.c 	lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx              186 source4/torture/raw/oplock.c 	status = smbcli_full_connection(tctx, c,
tctx              187 source4/torture/raw/oplock.c 					torture_setting_string(tctx, "host", NULL),
tctx              188 source4/torture/raw/oplock.c 					lp_smb_ports(tctx->lp_ctx),
tctx              189 source4/torture/raw/oplock.c 					torture_setting_string(tctx, "share", NULL),
tctx              190 source4/torture/raw/oplock.c 					NULL, lp_socket_options(tctx->lp_ctx), cmdline_credentials,
tctx              191 source4/torture/raw/oplock.c 					lp_resolve_context(tctx->lp_ctx),
tctx              192 source4/torture/raw/oplock.c 					tctx->ev, &options, &session_options,
tctx              193 source4/torture/raw/oplock.c 					lp_iconv_convenience(tctx->lp_ctx),
tctx              194 source4/torture/raw/oplock.c 					lp_gensec_settings(tctx, tctx->lp_ctx));
tctx              203 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive1(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              236 source4/torture/raw/oplock.c 	torture_comment(tctx, "EXCLUSIVE1: open a file with an exclusive oplock (share mode: none)\n");
tctx              240 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx              241 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              245 source4/torture/raw/oplock.c 	torture_comment(tctx, "a 2nd open should not cause a break\n");
tctx              246 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx              247 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx              251 source4/torture/raw/oplock.c 	torture_comment(tctx, "unlink it - should also be no break\n");
tctx              255 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx              268 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive2(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              301 source4/torture/raw/oplock.c 	torture_comment(tctx, "EXCLUSIVE2: open a file with an exclusive oplock (share mode: all)\n");
tctx              308 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx              309 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              313 source4/torture/raw/oplock.c 	torture_comment(tctx, "a 2nd open should cause a break to level 2\n");
tctx              314 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx              315 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              325 source4/torture/raw/oplock.c 	torture_comment(tctx, "try to unlink it - should not cause a break, but a sharing violation\n");
tctx              329 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx              333 source4/torture/raw/oplock.c 	torture_comment(tctx, "close 1st handle\n");
tctx              336 source4/torture/raw/oplock.c 	torture_comment(tctx, "try to unlink it - should not cause a break, but a sharing violation\n");
tctx              340 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx              344 source4/torture/raw/oplock.c 	torture_comment(tctx, "close 1st handle\n");
tctx              347 source4/torture/raw/oplock.c 	torture_comment(tctx, "unlink it\n");
tctx              351 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              362 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive3(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              395 source4/torture/raw/oplock.c 	torture_comment(tctx, "EXCLUSIVE3: open a file with an exclusive oplock (share mode: none)\n");
tctx              400 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx              401 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              405 source4/torture/raw/oplock.c 	torture_comment(tctx, "setpathinfo EOF should trigger a break to none\n");
tctx              413 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              427 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive4(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              459 source4/torture/raw/oplock.c 	torture_comment(tctx, "EXCLUSIVE4: open with exclusive oplock\n");
tctx              464 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx              465 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              470 source4/torture/raw/oplock.c 	torture_comment(tctx, "second open with attributes only shouldn't cause oplock break\n");
tctx              474 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx              475 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              491 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive5(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              524 source4/torture/raw/oplock.c 	torture_comment(tctx, "EXCLUSIVE5: open with exclusive oplock\n");
tctx              533 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx              534 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              540 source4/torture/raw/oplock.c 	torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_OVERWRITE_IF dispostion causes oplock break\n");
tctx              545 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx              546 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              562 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive6(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              597 source4/torture/raw/oplock.c 	torture_comment(tctx, "EXCLUSIVE6: open a file with an exclusive oplock (share mode: none)\n");
tctx              601 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx              602 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              606 source4/torture/raw/oplock.c 	torture_comment(tctx, "rename should not generate a break but get a sharing violation\n");
tctx              616 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx              629 source4/torture/raw/oplock.c static bool test_raw_oplock_batch1(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              666 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH1: open with batch oplock\n");
tctx              671 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx              672 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              676 source4/torture/raw/oplock.c 	torture_comment(tctx, "unlink should generate a break\n");
tctx              680 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx              687 source4/torture/raw/oplock.c 	torture_comment(tctx, "2nd unlink should not generate a break\n");
tctx              690 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx              694 source4/torture/raw/oplock.c 	torture_comment(tctx, "writing should generate a self break to none\n");
tctx              713 source4/torture/raw/oplock.c static bool test_raw_oplock_batch2(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              747 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH2: open with batch oplock\n");
tctx              752 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx              753 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              757 source4/torture/raw/oplock.c 	torture_comment(tctx, "unlink should generate a break, which we ack as break to none\n");
tctx              762 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx              769 source4/torture/raw/oplock.c 	torture_comment(tctx, "2nd unlink should not generate a break\n");
tctx              772 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx              776 source4/torture/raw/oplock.c 	torture_comment(tctx, "writing should not generate a break\n");
tctx              792 source4/torture/raw/oplock.c static bool test_raw_oplock_batch3(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              825 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH3: if we close on break then the unlink can succeed\n");
tctx              831 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx              832 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              840 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              856 source4/torture/raw/oplock.c static bool test_raw_oplock_batch4(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              889 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH4: a self read should not cause a break\n");
tctx              896 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx              897 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              907 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              920 source4/torture/raw/oplock.c static bool test_raw_oplock_batch5(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx              952 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH5: a 2nd open should give a break\n");
tctx              959 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx              960 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx              967 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx              968 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx              984 source4/torture/raw/oplock.c static bool test_raw_oplock_batch6(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1017 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH6: a 2nd open should give a break to level II if the first open allowed shared read\n");
tctx             1027 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1028 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1034 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             1035 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1045 source4/torture/raw/oplock.c 	torture_comment(tctx, "write should trigger a break to none on both\n");
tctx             1065 source4/torture/raw/oplock.c static bool test_raw_oplock_batch7(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1097 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH7: a 2nd open should get an oplock when we close instead of ack\n");
tctx             1106 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1107 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1116 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             1117 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1135 source4/torture/raw/oplock.c static bool test_raw_oplock_batch8(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1167 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH8: open with batch oplock\n");
tctx             1174 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1175 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1180 source4/torture/raw/oplock.c 	torture_comment(tctx, "second open with attributes only shouldn't cause oplock break\n");
tctx             1186 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             1187 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1203 source4/torture/raw/oplock.c static bool test_raw_oplock_batch9(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1236 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH9: open with attributes only can create file\n");
tctx             1243 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1244 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1248 source4/torture/raw/oplock.c 	torture_comment(tctx, "Subsequent normal open should break oplock on attribute only open to level II\n");
tctx             1258 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             1259 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1268 source4/torture/raw/oplock.c 	torture_comment(tctx, "third oplocked open should grant level2 without break\n");
tctx             1277 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             1278 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1286 source4/torture/raw/oplock.c 	torture_comment(tctx, "write should trigger a break to none on both\n");
tctx             1309 source4/torture/raw/oplock.c static bool test_raw_oplock_batch10(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1341 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH10: Open with oplock after a non-oplock open should grant level2\n");
tctx             1348 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1349 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1365 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             1366 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1372 source4/torture/raw/oplock.c 	torture_comment(tctx, "write should trigger a break to none\n");
tctx             1382 source4/torture/raw/oplock.c 		CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1399 source4/torture/raw/oplock.c 		CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1417 source4/torture/raw/oplock.c static bool test_raw_oplock_batch11(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1451 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH11: Test if setpathinfo set EOF breaks oplocks.\n");
tctx             1464 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1465 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1478 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1492 source4/torture/raw/oplock.c static bool test_raw_oplock_batch12(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1526 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH12: Test if setpathinfo allocation size breaks oplocks.\n");
tctx             1539 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1540 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1553 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1567 source4/torture/raw/oplock.c static bool test_raw_oplock_batch13(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1600 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH13: open with batch oplock\n");
tctx             1611 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1612 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1618 source4/torture/raw/oplock.c 	torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_OVERWRITE dispostion causes oplock break\n");
tctx             1628 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             1629 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1645 source4/torture/raw/oplock.c static bool test_raw_oplock_batch14(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1677 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH14: open with batch oplock\n");
tctx             1687 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1688 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1694 source4/torture/raw/oplock.c 	torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_SUPERSEDE dispostion causes oplock break\n");
tctx             1704 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             1705 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1720 source4/torture/raw/oplock.c static bool test_raw_oplock_batch15(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1754 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH15: Test if qpathinfo all info breaks a batch oplock (should not).\n");
tctx             1768 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1769 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1779 source4/torture/raw/oplock.c 	status = smb_raw_pathinfo(cli2->tree, tctx, &qfi);
tctx             1781 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1793 source4/torture/raw/oplock.c static bool test_raw_oplock_batch16(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1826 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH16: open with batch oplock\n");
tctx             1837 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1838 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1844 source4/torture/raw/oplock.c 	torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_OVERWRITE_IF dispostion causes oplock break\n");
tctx             1854 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             1855 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1871 source4/torture/raw/oplock.c static bool test_raw_oplock_batch17(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1906 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH17: open a file with an batch oplock (share mode: none)\n");
tctx             1913 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1914 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1918 source4/torture/raw/oplock.c 	torture_comment(tctx, "rename should trigger a break\n");
tctx             1928 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx             1942 source4/torture/raw/oplock.c static bool test_raw_oplock_batch18(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             1977 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH18: open a file with an batch oplock (share mode: none)\n");
tctx             1984 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             1985 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             1989 source4/torture/raw/oplock.c 	torture_comment(tctx, "ntrename should trigger a break\n");
tctx             1999 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx             2013 source4/torture/raw/oplock.c static bool test_raw_oplock_batch19(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             2051 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH19: open a file with an batch oplock (share mode: none)\n");
tctx             2056 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             2057 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2061 source4/torture/raw/oplock.c 	torture_comment(tctx, "setpathinfo rename info should not trigger a break nor a violation\n");
tctx             2071 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2078 source4/torture/raw/oplock.c 	status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx             2079 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2082 source4/torture/raw/oplock.c 	torture_comment(tctx, "setfileinfo rename info should not trigger a break nor a violation\n");
tctx             2091 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2098 source4/torture/raw/oplock.c 	status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx             2099 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2116 source4/torture/raw/oplock.c bool test_trans2rename(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             2154 source4/torture/raw/oplock.c 	torture_comment(tctx, "open a file with an exclusive oplock (share mode: none)\n");
tctx             2158 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             2159 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2163 source4/torture/raw/oplock.c 	torture_comment(tctx, "setpathinfo rename info should not trigger a break nor a violation\n");
tctx             2173 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2180 source4/torture/raw/oplock.c 	status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx             2181 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2184 source4/torture/raw/oplock.c 	torture_comment(tctx, "setfileinfo rename info should not trigger a break nor a violation\n");
tctx             2193 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2200 source4/torture/raw/oplock.c 	status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx             2201 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2218 source4/torture/raw/oplock.c bool test_nttransrename(struct torture_context *tctx, struct smbcli_state *cli1)
tctx             2254 source4/torture/raw/oplock.c 	torture_comment(tctx, "nttrans_rename: open a file with an exclusive oplock (share mode: none)\n");
tctx             2258 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             2259 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2263 source4/torture/raw/oplock.c 	torture_comment(tctx, "nttrans_rename: should not trigger a break nor a share mode violation\n");
tctx             2272 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2276 source4/torture/raw/oplock.c 	torture_comment(tctx, "nttrans_rename: the server should have done nothing\n");
tctx             2281 source4/torture/raw/oplock.c 	status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx             2282 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2289 source4/torture/raw/oplock.c 	status = smb_raw_pathinfo(cli1->tree, tctx, &qpi);
tctx             2290 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2297 source4/torture/raw/oplock.c 	status = smb_raw_pathinfo(cli1->tree, tctx, &qpi);
tctx             2298 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND);
tctx             2300 source4/torture/raw/oplock.c 	torture_comment(tctx, "nttrans_rename: after closing the file the file is still not renamed\n");
tctx             2302 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2308 source4/torture/raw/oplock.c 	status = smb_raw_pathinfo(cli1->tree, tctx, &qpi);
tctx             2309 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2316 source4/torture/raw/oplock.c 	status = smb_raw_pathinfo(cli1->tree, tctx, &qpi);
tctx             2317 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND);
tctx             2319 source4/torture/raw/oplock.c 	torture_comment(tctx, "nttrans_rename: rename with an invalid handle gives NT_STATUS_INVALID_HANDLE\n");
tctx             2328 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_INVALID_HANDLE);
tctx             2337 source4/torture/raw/oplock.c static bool test_raw_oplock_batch20(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             2375 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH20: open a file with an batch oplock (share mode: all)\n");
tctx             2383 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             2384 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2388 source4/torture/raw/oplock.c 	torture_comment(tctx, "setpathinfo rename info should not trigger a break nor a violation\n");
tctx             2398 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2405 source4/torture/raw/oplock.c 	status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx             2406 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2409 source4/torture/raw/oplock.c 	torture_comment(tctx, "open a file with the new name an batch oplock (share mode: all)\n");
tctx             2418 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             2419 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2426 source4/torture/raw/oplock.c 	torture_comment(tctx, "setfileinfo rename info should not trigger a break nor a violation\n");
tctx             2435 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2444 source4/torture/raw/oplock.c 	status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx             2445 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2452 source4/torture/raw/oplock.c 	status = smb_raw_fileinfo(cli2->tree, tctx, &qfi);
tctx             2453 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2465 source4/torture/raw/oplock.c static bool test_raw_oplock_batch21(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             2503 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH21: open with batch oplock\n");
tctx             2508 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             2509 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2513 source4/torture/raw/oplock.c 	torture_comment(tctx, "writing should not generate a break\n");
tctx             2516 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_OK);
tctx             2521 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2534 source4/torture/raw/oplock.c static bool test_raw_oplock_batch22(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             2542 source4/torture/raw/oplock.c 	int timeout = torture_setting_int(tctx, "oplocktimeout", 30);
tctx             2545 source4/torture/raw/oplock.c 	if (torture_setting_bool(tctx, "samba3", false)) {
tctx             2546 source4/torture/raw/oplock.c 		torture_skip(tctx, "BATCH22 disabled against samba3\n");
tctx             2576 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH22: open with batch oplock\n");
tctx             2584 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             2585 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2589 source4/torture/raw/oplock.c 	torture_comment(tctx, "a 2nd open shoud not succeed after the oplock break timeout\n");
tctx             2592 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             2593 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx             2603 source4/torture/raw/oplock.c 	torture_comment(tctx, "a 2nd open shoud succeed after the oplock release without break\n");
tctx             2606 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             2607 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2626 source4/torture/raw/oplock.c static bool test_raw_oplock_batch23(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             2644 source4/torture/raw/oplock.c 	ret = open_connection_no_level2_oplocks(tctx, &cli3);
tctx             2662 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH23: a open and ask for a batch oplock\n");
tctx             2673 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             2674 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2680 source4/torture/raw/oplock.c 	torture_comment(tctx, "a 2nd open without level2 oplock support should generate a break to level2\n");
tctx             2681 source4/torture/raw/oplock.c 	status = smb_raw_open(cli3->tree, tctx, &io);
tctx             2682 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2693 source4/torture/raw/oplock.c 	torture_comment(tctx, "a 3rd open with level2 oplock support should not generate a break\n");
tctx             2694 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             2695 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2713 source4/torture/raw/oplock.c static bool test_raw_oplock_batch24(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx             2731 source4/torture/raw/oplock.c 	ret = open_connection_no_level2_oplocks(tctx, &cli3);
tctx             2749 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH24: a open without level support and ask for a batch oplock\n");
tctx             2760 source4/torture/raw/oplock.c 	status = smb_raw_open(cli3->tree, tctx, &io);
tctx             2761 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2767 source4/torture/raw/oplock.c 	torture_comment(tctx, "a 2nd open with level2 oplock support should generate a break to none\n");
tctx             2768 source4/torture/raw/oplock.c 	status = smb_raw_open(cli2->tree, tctx, &io);
tctx             2769 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2789 source4/torture/raw/oplock.c static bool test_raw_oplock_batch25(struct torture_context *tctx,
tctx             2824 source4/torture/raw/oplock.c 	torture_comment(tctx, "BATCH25: open a file with an batch oplock "
tctx             2831 source4/torture/raw/oplock.c 	status = smb_raw_open(cli1->tree, tctx, &io);
tctx             2832 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx             2836 source4/torture/raw/oplock.c 	torture_comment(tctx, "setpathinfo attribute info should not trigger "
tctx             2846 source4/torture/raw/oplock.c 	CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx               85 source4/torture/raw/read.c static bool test_read(struct torture_context *tctx, struct smbcli_state *cli)
tctx               97 source4/torture/raw/read.c 	buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx              211 source4/torture/raw/read.c static bool test_lockread(struct torture_context *tctx, 
tctx              224 source4/torture/raw/read.c 	buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx              357 source4/torture/raw/read.c static bool test_readx(struct torture_context *tctx, struct smbcli_state *cli)
tctx              369 source4/torture/raw/read.c 	buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx              502 source4/torture/raw/read.c 	if (torture_setting_bool(tctx, "samba3", false)) {
tctx              546 source4/torture/raw/read.c 		if (torture_setting_bool(tctx, "samba3", false)) {
tctx              556 source4/torture/raw/read.c 		if (torture_setting_bool(tctx, "samba3", false)) {
tctx              612 source4/torture/raw/read.c static bool test_readbraw(struct torture_context *tctx, 
tctx              625 source4/torture/raw/read.c 	buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx              785 source4/torture/raw/read.c static bool test_read_for_execute(struct torture_context *tctx, 
tctx              799 source4/torture/raw/read.c 	buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx              819 source4/torture/raw/read.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx              850 source4/torture/raw/read.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx              897 source4/torture/raw/read.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx               46 source4/torture/raw/rename.c static bool test_mv(struct torture_context *tctx, 
tctx               82 source4/torture/raw/rename.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx              102 source4/torture/raw/rename.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx              123 source4/torture/raw/rename.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx              191 source4/torture/raw/rename.c static bool test_osxrename(struct torture_context *tctx,
tctx              223 source4/torture/raw/rename.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx              242 source4/torture/raw/rename.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx              263 source4/torture/raw/rename.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx              277 source4/torture/raw/rename.c static bool test_ntrename(struct torture_context *tctx, 
tctx              296 source4/torture/raw/rename.c 	fnum = create_complex_file(cli, tctx, fname1);
tctx              356 source4/torture/raw/rename.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx              362 source4/torture/raw/rename.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx              372 source4/torture/raw/rename.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx              387 source4/torture/raw/rename.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx              394 source4/torture/raw/rename.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx              403 source4/torture/raw/rename.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx              409 source4/torture/raw/rename.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx              419 source4/torture/raw/rename.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx              522 source4/torture/raw/rename.c static bool test_dir_rename(struct torture_context *tctx, struct smbcli_state *cli)
tctx              556 source4/torture/raw/rename.c         status = smb_raw_open(cli->tree, tctx, &io);
tctx              580 source4/torture/raw/rename.c         status = smb_raw_open(cli->tree, tctx, &io);
tctx              611 source4/torture/raw/rename.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              632 source4/torture/raw/rename.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              654 source4/torture/raw/rename.c extern bool test_trans2rename(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2);
tctx              655 source4/torture/raw/rename.c extern bool test_nttransrename(struct torture_context *tctx, struct smbcli_state *cli1);
tctx              277 source4/torture/raw/samba3hide.c bool torture_samba3_closeerr(struct torture_context *tctx)
tctx              286 source4/torture/raw/samba3hide.c 	if (!torture_open_connection(&cli, tctx, 0)) {
tctx              293 source4/torture/raw/samba3hide.c 		tctx, smbcli_mkdir(cli->tree, dname),
tctx              294 source4/torture/raw/samba3hide.c 		talloc_asprintf(tctx, "smbcli_mdir failed: (%s)\n",
tctx              299 source4/torture/raw/samba3hide.c 	torture_assert(tctx, fnum != -1, 
tctx              300 source4/torture/raw/samba3hide.c 		       talloc_asprintf(tctx, "smbcli_open failed: %s\n",
tctx              310 source4/torture/raw/samba3hide.c 	torture_assert(tctx, fnum != -1, 
tctx              311 source4/torture/raw/samba3hide.c 		       talloc_asprintf(tctx, "smbcli_open failed: %s\n",
tctx              316 source4/torture/raw/samba3hide.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              321 source4/torture/raw/samba3hide.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              329 source4/torture/raw/samba3hide.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_ACCESS_DENIED,
tctx              680 source4/torture/raw/samba3misc.c bool torture_samba3_posixtimedlock(struct torture_context *tctx)
tctx              699 source4/torture/raw/samba3misc.c 	if (!torture_open_connection(&cli, tctx, 0)) {
tctx              708 source4/torture/raw/samba3misc.c 		torture_warning(tctx, "smbcli_mkdir failed: %s\n",
tctx              714 source4/torture/raw/samba3misc.c 	if (!(fpath = talloc_asprintf(tctx, "%s\\%s", dirname, fname))) {
tctx              715 source4/torture/raw/samba3misc.c 		torture_warning(tctx, "talloc failed\n");
tctx              721 source4/torture/raw/samba3misc.c 		torture_warning(tctx, "Could not create file %s: %s\n", fpath,
tctx              727 source4/torture/raw/samba3misc.c 	if (!(localdir = torture_setting_string(tctx, "localdir", NULL))) {
tctx              728 source4/torture/raw/samba3misc.c 		torture_warning(tctx, "Need 'localdir' setting\n");
tctx              733 source4/torture/raw/samba3misc.c 	if (!(localname = talloc_asprintf(tctx, "%s/%s/%s", localdir, dirname,
tctx              735 source4/torture/raw/samba3misc.c 		torture_warning(tctx, "talloc failed\n");
tctx              746 source4/torture/raw/samba3misc.c 		torture_warning(tctx, "open(%s) failed: %s\n",
tctx              757 source4/torture/raw/samba3misc.c 		torture_warning(tctx, "fcntl failed: %s\n", strerror(errno));
tctx              797 source4/torture/raw/samba3misc.c 		torture_warning(tctx, "smb_raw_lock_send failed\n");
tctx              825 source4/torture/raw/samba3misc.c bool torture_samba3_rootdirfid(struct torture_context *tctx)
tctx              834 source4/torture/raw/samba3misc.c 	if (!torture_open_connection(&cli, tctx, 0)) {
tctx              856 source4/torture/raw/samba3misc.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              878 source4/torture/raw/samba3misc.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx              895 source4/torture/raw/samba3misc.c bool torture_samba3_oplock_logoff(struct torture_context *tctx)
tctx              906 source4/torture/raw/samba3misc.c 	if (!torture_open_connection(&cli, tctx, 0)) {
tctx              926 source4/torture/raw/samba3misc.c 	status = smb_raw_open(cli->tree, tctx, &io);
tctx               47 source4/torture/raw/search.c 			       TALLOC_CTX *tctx,
tctx               83 source4/torture/raw/search.c 	status = smb_raw_search_first(cli->tree, tctx,
tctx              235 source4/torture/raw/search.c static bool test_one_file(struct torture_context *tctx, 
tctx              247 source4/torture/raw/search.c 	fnum = create_complex_file(cli, tctx, fname);
tctx              259 source4/torture/raw/search.c 		torture_comment(tctx, "testing %s\n", levels[i].name);
tctx              261 source4/torture/raw/search.c 		levels[i].status = torture_single_search(cli, tctx, fname, 
tctx              282 source4/torture/raw/search.c 		status = torture_single_search(cli, tctx, fname2, 
tctx              306 source4/torture/raw/search.c 	status = smb_raw_pathinfo(cli->tree, tctx, &all_info);
tctx              307 source4/torture/raw/search.c 	torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_ALL_INFO failed");
tctx              311 source4/torture/raw/search.c 	status = smb_raw_pathinfo(cli->tree, tctx, &alt_info);
tctx              312 source4/torture/raw/search.c 	torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_ALT_NAME_INFO failed");
tctx              316 source4/torture/raw/search.c 	status = smb_raw_pathinfo(cli->tree, tctx, &internal_info);
tctx              317 source4/torture/raw/search.c 	torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_INTERNAL_INFORMATION failed");
tctx              321 source4/torture/raw/search.c 	status = smb_raw_pathinfo(cli->tree, tctx, &name_info);
tctx              322 source4/torture/raw/search.c 	torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_NAME_INFO failed");
tctx              342 source4/torture/raw/search.c 				#sname1, #field1, timestring(tctx, s->sname1.field1), \
tctx              343 source4/torture/raw/search.c 				#sname2, #field2, nt_time_string(tctx, v.sname2.out.field2)); \
tctx              354 source4/torture/raw/search.c 				#sname1, #field1, nt_time_string(tctx, s->sname1.field1), \
tctx              355 source4/torture/raw/search.c 				#sname2, #field2, nt_time_string(tctx, v.sname2.out.field2)); \
tctx              505 source4/torture/raw/search.c 	TALLOC_CTX *tctx;
tctx              519 source4/torture/raw/search.c 	data->list = talloc_realloc(data->tctx,
tctx              535 source4/torture/raw/search.c 				TALLOC_CTX *tctx,
tctx              567 source4/torture/raw/search.c 	status = smb_raw_search_first(cli->tree, tctx,
tctx              608 source4/torture/raw/search.c 		status = smb_raw_search_next(cli->tree, tctx,
tctx              626 source4/torture/raw/search.c #define CHECK_STATUS(status, correct) torture_assert_ntstatus_equal(tctx, status, correct, "incorrect status")
tctx              628 source4/torture/raw/search.c #define CHECK_VALUE(v, correct) torture_assert_int_equal(tctx, (v), (correct), "incorrect value");
tctx              630 source4/torture/raw/search.c #define CHECK_STRING(v, correct) torture_assert_casestr_equal(tctx, v, correct, "incorrect value");
tctx              656 source4/torture/raw/search.c static bool test_many_files(struct torture_context *tctx, 
tctx              699 source4/torture/raw/search.c 	torture_comment(tctx, "Testing with %d files\n", num_files);
tctx              704 source4/torture/raw/search.c 		torture_assert(tctx, fnum != -1, "Failed to create");
tctx              715 source4/torture/raw/search.c 		    torture_setting_bool(tctx, "samba3", false)) {
tctx              716 source4/torture/raw/search.c 			torture_comment(tctx,
tctx              722 source4/torture/raw/search.c 		result.tctx = talloc_new(tctx);
tctx              724 source4/torture/raw/search.c 		torture_comment(tctx,
tctx              727 source4/torture/raw/search.c 		status = multiple_search(cli, tctx, BASEDIR "\\*.*", 
tctx              732 source4/torture/raw/search.c 		torture_assert_ntstatus_ok(tctx, status, "search failed");
tctx              750 source4/torture/raw/search.c 			torture_assert_str_equal(tctx, fname, s, "Incorrect name");
tctx              753 source4/torture/raw/search.c 		talloc_free(result.tctx);
tctx              798 source4/torture/raw/search.c static bool test_modify_search(struct torture_context *tctx, 
tctx              831 source4/torture/raw/search.c 	result.tctx = talloc_new(tctx);
tctx              841 source4/torture/raw/search.c 	status = smb_raw_search_first(cli->tree, tctx,
tctx              855 source4/torture/raw/search.c 	status = smb_raw_search_next(cli->tree, tctx,
tctx              865 source4/torture/raw/search.c 	fnum = create_complex_file(cli, tctx, BASEDIR "\\T013-13.txt.3");
tctx              885 source4/torture/raw/search.c 	status = smb_raw_search_next(cli->tree, tctx,
tctx              905 source4/torture/raw/search.c 			       attrib_string(tctx, result.list[i].both_directory_info.attrib),
tctx              921 source4/torture/raw/search.c static bool test_sorted(struct torture_context *tctx, struct smbcli_state *cli)
tctx              937 source4/torture/raw/search.c 		fname = talloc_asprintf(cli, BASEDIR "\\%s.txt", generate_random_str_list(tctx, 10, "abcdefgh"));
tctx              950 source4/torture/raw/search.c 	result.tctx = tctx;
tctx              952 source4/torture/raw/search.c 	status = multiple_search(cli, tctx, BASEDIR "\\*.*", 
tctx              984 source4/torture/raw/search.c static bool test_many_dirs(struct torture_context *tctx, 
tctx             1026 source4/torture/raw/search.c 	file  = talloc_zero_array(tctx, union smb_search_data, num_dirs);
tctx             1027 source4/torture/raw/search.c 	file2 = talloc_zero_array(tctx, union smb_search_data, num_dirs);
tctx             1028 source4/torture/raw/search.c 	file3 = talloc_zero_array(tctx, union smb_search_data, num_dirs);
tctx             1038 source4/torture/raw/search.c 		io.search_first.in.pattern = talloc_asprintf(tctx, BASEDIR "\\d%d\\*.txt", i);
tctx             1039 source4/torture/raw/search.c 		fname = talloc_asprintf(tctx, "f%d-", i);
tctx             1043 source4/torture/raw/search.c 		status = smb_raw_search_first(cli->tree, tctx,
tctx             1072 source4/torture/raw/search.c 		fname = talloc_asprintf(tctx, "f%d-", i);
tctx             1076 source4/torture/raw/search.c 		status = smb_raw_search_next(cli->tree, tctx,
tctx             1106 source4/torture/raw/search.c 		fname = talloc_asprintf(tctx, "f%d-", i);
tctx             1109 source4/torture/raw/search.c 		status = smb_raw_search_next(cli->tree, tctx,
tctx             1148 source4/torture/raw/search.c static bool test_os2_delete(struct torture_context *tctx, 
tctx             1182 source4/torture/raw/search.c 	result.tctx = tctx;
tctx             1192 source4/torture/raw/search.c 	status = smb_raw_search_first(cli->tree, tctx,
tctx             1214 source4/torture/raw/search.c 		result.tctx = tctx;
tctx             1216 source4/torture/raw/search.c 		status = smb_raw_search_next(cli->tree, tctx,
tctx             1260 source4/torture/raw/search.c static bool test_ea_list(struct torture_context *tctx, 
tctx             1289 source4/torture/raw/search.c 	setfile.ea_set.in.eas = talloc_array(tctx, struct ea_struct, 2);
tctx             1305 source4/torture/raw/search.c 	result.tctx = tctx;
tctx             1315 source4/torture/raw/search.c 	io.t2ffirst.in.ea_names = talloc_array(tctx, struct ea_name, 2);
tctx             1319 source4/torture/raw/search.c 	status = smb_raw_search_first(cli->tree, tctx,
tctx             1332 source4/torture/raw/search.c 	nxt.t2fnext.in.ea_names = talloc_array(tctx, struct ea_name, 2);
tctx             1336 source4/torture/raw/search.c 	status = smb_raw_search_next(cli->tree, tctx,
tctx              209 source4/torture/raw/streams.c static bool test_stream_dir(struct torture_context *tctx,
tctx              279 source4/torture/raw/streams.c static bool test_stream_io(struct torture_context *tctx,
tctx              363 source4/torture/raw/streams.c 	if (!torture_setting_bool(tctx, "samba4", false)) {
tctx              396 source4/torture/raw/streams.c 	if (!torture_setting_bool(tctx, "samba4", false)) {
tctx              420 source4/torture/raw/streams.c static bool test_stream_sharemodes(struct torture_context *tctx,
tctx              509 source4/torture/raw/streams.c static bool test_stream_delete(struct torture_context *tctx,
tctx              650 source4/torture/raw/streams.c static bool test_stream_names(struct torture_context *tctx,
tctx              777 source4/torture/raw/streams.c 	if (torture_setting_bool(tctx, "samba4", true)) {
tctx              791 source4/torture/raw/streams.c 		char *path = talloc_asprintf(tctx, "%s%s",
tctx              822 source4/torture/raw/streams.c 		if (!torture_setting_bool(tctx, "samba3", false)) {
tctx              847 source4/torture/raw/streams.c 		if (!torture_setting_bool(tctx, "samba3", false)) {
tctx              877 source4/torture/raw/streams.c 		if (!torture_setting_bool(tctx, "samba3", false)) {
tctx              956 source4/torture/raw/streams.c static bool test_stream_names2(struct torture_context *tctx,
tctx              985 source4/torture/raw/streams.c 		char *path = talloc_asprintf(tctx, "%s:Stream%c0x%02X:$DATA",
tctx             1034 source4/torture/raw/streams.c         status2 = smb_raw_fileinfo(cli->tree, tctx, &finfo1); \
tctx             1043 source4/torture/raw/streams.c static bool test_stream_rename(struct torture_context *tctx,
tctx             1116 source4/torture/raw/streams.c static bool test_stream_rename2(struct torture_context *tctx,
tctx             1285 source4/torture/raw/streams.c 	if (torture_setting_bool(tctx, "samba3", false) ||
tctx             1286 source4/torture/raw/streams.c 	    torture_setting_bool(tctx, "samba4", false)) {
tctx             1309 source4/torture/raw/streams.c static bool create_file_with_stream(struct torture_context *tctx,
tctx             1343 source4/torture/raw/streams.c static bool test_stream_create_disposition(struct torture_context *tctx,
tctx             1362 source4/torture/raw/streams.c 	if (!create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx             1410 source4/torture/raw/streams.c 	if (!create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx             1428 source4/torture/raw/streams.c 	if (!create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx             1447 source4/torture/raw/streams.c 	if (!create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx             1466 source4/torture/raw/streams.c 	if (!create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx             1496 source4/torture/raw/streams.c static bool test_stream_large_streaminfo(struct torture_context *tctx,
tctx             1520 source4/torture/raw/streams.c 		ret = create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx             1539 source4/torture/raw/streams.c static bool test_stream_attributes(struct torture_context *tctx,
tctx             1559 source4/torture/raw/streams.c 	ret = create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx               62 source4/torture/raw/tconrate.c static int fork_tcon_client(struct torture_context *tctx,
tctx               73 source4/torture/raw/tconrate.c 	lp_smbcli_options(tctx->lp_ctx, &options);
tctx               74 source4/torture/raw/tconrate.c 	lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx              101 source4/torture/raw/tconrate.c 				host, lp_smb_ports(tctx->lp_ctx), share,
tctx              102 source4/torture/raw/tconrate.c 				NULL, lp_socket_options(tctx->lp_ctx), cmdline_credentials,
tctx              103 source4/torture/raw/tconrate.c 				lp_resolve_context(tctx->lp_ctx),
tctx              104 source4/torture/raw/tconrate.c 				tctx->ev, &options, &session_options,
tctx              105 source4/torture/raw/tconrate.c 				lp_iconv_convenience(tctx->lp_ctx),
tctx              106 source4/torture/raw/tconrate.c 				lp_gensec_settings(tctx, tctx->lp_ctx));
tctx              151 source4/torture/raw/tconrate.c bool torture_bench_treeconnect(struct torture_context *tctx)
tctx              153 source4/torture/raw/tconrate.c 	const char *host = torture_setting_string(tctx, "host", NULL);
tctx              154 source4/torture/raw/tconrate.c 	const char *share = torture_setting_string(tctx, "share", NULL);
tctx              156 source4/torture/raw/tconrate.c 	int timelimit = torture_setting_int(tctx, "timelimit",
tctx              158 source4/torture/raw/tconrate.c 	int nprocs = torture_setting_int(tctx, "nprocs", 4);
tctx              166 source4/torture/raw/tconrate.c 	torture_assert(tctx, nprocs > 0, "bad proc count");
tctx              167 source4/torture/raw/tconrate.c 	torture_assert(tctx, timelimit > 0, "bad timelimit");
tctx              168 source4/torture/raw/tconrate.c 	torture_assert(tctx, curr_counts, "allocation failure");
tctx              169 source4/torture/raw/tconrate.c 	torture_assert(tctx, last_counts, "allocation failure");
tctx              173 source4/torture/raw/tconrate.c 		fork_tcon_client(tctx, &curr_counts[i], timelimit, host, share);
tctx               41 source4/torture/raw/unlink.c static bool test_unlink(struct torture_context *tctx, struct smbcli_state *cli)
tctx              132 source4/torture/raw/unlink.c 	if (torture_setting_bool(tctx, "samba3", false)) {
tctx              160 source4/torture/raw/unlink.c 	if (torture_setting_bool(tctx, "samba3", false)) {
tctx              172 source4/torture/raw/unlink.c 	if (torture_setting_bool(tctx, "samba3", false)) {
tctx              182 source4/torture/raw/unlink.c 	if (torture_setting_bool(tctx, "samba3", false)) {
tctx              203 source4/torture/raw/unlink.c static bool test_delete_on_close(struct torture_context *tctx, 
tctx              229 source4/torture/raw/unlink.c 	fnum = create_complex_file(cli, tctx, fname);
tctx              243 source4/torture/raw/unlink.c 	fnum = create_complex_file(cli, tctx, fname);
tctx              285 source4/torture/raw/unlink.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx              295 source4/torture/raw/unlink.c 		fnum2 = create_complex_file(cli, tctx, inside);
tctx              326 source4/torture/raw/unlink.c 	fnum2 = create_complex_file(cli, tctx, inside);
tctx              342 source4/torture/raw/unlink.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx              358 source4/torture/raw/unlink.c 	fnum2 = create_complex_file(cli, tctx, inside);
tctx              374 source4/torture/raw/unlink.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx              391 source4/torture/raw/unlink.c 	fnum = create_complex_file(cli, tctx, inside);
tctx              409 source4/torture/raw/unlink.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx              415 source4/torture/raw/unlink.c 	status = smb_raw_open(cli->tree, tctx, &op);
tctx               55 source4/torture/raw/write.c 	status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \
tctx               60 source4/torture/raw/write.c 		dump_all_info(tctx, &finfo); \
tctx               99 source4/torture/raw/write.c static bool test_write(struct torture_context *tctx, 
tctx              112 source4/torture/raw/write.c 	buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx              227 source4/torture/raw/write.c static bool test_writex(struct torture_context *tctx, 
tctx              241 source4/torture/raw/write.c 	if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx              243 source4/torture/raw/write.c 		torture_comment(tctx, "dangerous not set - limiting range of test to 2^%d\n", max_bits);
tctx              246 source4/torture/raw/write.c 	buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx              415 source4/torture/raw/write.c static bool test_writeunlock(struct torture_context *tctx, 
tctx              428 source4/torture/raw/write.c 	buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx              558 source4/torture/raw/write.c static bool test_writeclose(struct torture_context *tctx, 
tctx              571 source4/torture/raw/write.c 	buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx               26 source4/torture/rpc/atsvc.c static bool test_JobGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx, uint32_t job_id)
tctx               30 source4/torture/rpc/atsvc.c 	struct atsvc_JobInfo *info = talloc(tctx, struct atsvc_JobInfo);
tctx               39 source4/torture/rpc/atsvc.c 	status = dcerpc_atsvc_JobGetInfo(p, tctx, &r);
tctx               41 source4/torture/rpc/atsvc.c 	torture_assert_ntstatus_ok(tctx, status, "JobGetInfo failed");
tctx               46 source4/torture/rpc/atsvc.c static bool test_JobDel(struct dcerpc_pipe *p, struct torture_context *tctx, uint32_t min_job_id,
tctx               56 source4/torture/rpc/atsvc.c 	status = dcerpc_atsvc_JobDel(p, tctx, &r);
tctx               58 source4/torture/rpc/atsvc.c 	torture_assert_ntstatus_ok(tctx, status, "JobDel failed");
tctx               63 source4/torture/rpc/atsvc.c static bool test_JobEnum(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx               80 source4/torture/rpc/atsvc.c 	status = dcerpc_atsvc_JobEnum(p, tctx, &r);
tctx               82 source4/torture/rpc/atsvc.c 	torture_assert_ntstatus_ok(tctx, status, "JobEnum failed");
tctx               85 source4/torture/rpc/atsvc.c 		if (!test_JobGetInfo(p, tctx, r.out.ctr->first_entry[i].job_id)) {
tctx               93 source4/torture/rpc/atsvc.c static bool test_JobAdd(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx              107 source4/torture/rpc/atsvc.c 	status = dcerpc_atsvc_JobAdd(p, tctx, &r);
tctx              109 source4/torture/rpc/atsvc.c 	torture_assert_ntstatus_ok(tctx, status, "JobAdd failed");
tctx              113 source4/torture/rpc/atsvc.c 	if (!test_JobEnum(tctx, p)) {
tctx              117 source4/torture/rpc/atsvc.c 	if (!test_JobGetInfo(p, tctx, *r.out.job_id)) {
tctx              121 source4/torture/rpc/atsvc.c 	if (!test_JobDel(p, tctx, *r.out.job_id, *r.out.job_id)) {
tctx               91 source4/torture/rpc/autoidl.c static void reopen(struct torture_context *tctx, 
tctx               99 source4/torture/rpc/autoidl.c 	status = torture_rpc_connection(tctx, p, iface);
tctx              114 source4/torture/rpc/autoidl.c static void test_ptr_scan(struct torture_context *tctx, const struct ndr_interface_table *iface, 
tctx              117 source4/torture/rpc/autoidl.c static void try_expand(struct torture_context *tctx, const struct ndr_interface_table *iface, 
tctx              125 source4/torture/rpc/autoidl.c 	reopen(tctx, &p, iface);
tctx              134 source4/torture/rpc/autoidl.c 		status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out);
tctx              140 source4/torture/rpc/autoidl.c 				test_ptr_scan(tctx, iface, opnum, &stub_in, 
tctx              147 source4/torture/rpc/autoidl.c 			printf("expand by %d gives fault %s\n", n, dcerpc_errstr(tctx, p->last_fault_code));
tctx              151 source4/torture/rpc/autoidl.c 			reopen(tctx, &p, iface);
tctx              159 source4/torture/rpc/autoidl.c static void test_ptr_scan(struct torture_context *tctx, const struct ndr_interface_table *iface, 
tctx              167 source4/torture/rpc/autoidl.c 	reopen(tctx, &p, iface);
tctx              175 source4/torture/rpc/autoidl.c 		status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out);
tctx              180 source4/torture/rpc/autoidl.c 			       ofs-min_ofs, dcerpc_errstr(tctx, p->last_fault_code));
tctx              182 source4/torture/rpc/autoidl.c 				reopen(tctx, &p, iface);
tctx              185 source4/torture/rpc/autoidl.c 				try_expand(tctx, iface, opnum, &stub_in, ofs+4, depth+1);
tctx              187 source4/torture/rpc/autoidl.c 				try_expand(tctx, iface, opnum, &stub_in, max_ofs, depth+1);
tctx              199 source4/torture/rpc/autoidl.c static void test_scan_call(struct torture_context *tctx, const struct ndr_interface_table *iface, int opnum)
tctx              207 source4/torture/rpc/autoidl.c 	reopen(tctx, &p, iface);
tctx              209 source4/torture/rpc/autoidl.c 	get_policy_handle(p, tctx, &handle);
tctx              217 source4/torture/rpc/autoidl.c 		status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out);
tctx              224 source4/torture/rpc/autoidl.c 			test_ptr_scan(tctx, iface, opnum, &stub_in, 0, stub_in.length, 0);
tctx              228 source4/torture/rpc/autoidl.c 		fill_blob_handle(&stub_in, tctx, &handle);
tctx              230 source4/torture/rpc/autoidl.c 		status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out);
tctx              237 source4/torture/rpc/autoidl.c 			test_ptr_scan(tctx, iface, opnum, &stub_in, 0, stub_in.length, 0);
tctx              242 source4/torture/rpc/autoidl.c 			printf("opnum %d  size %d fault %s\n", opnum, i, dcerpc_errstr(tctx, p->last_fault_code));
tctx              244 source4/torture/rpc/autoidl.c 				reopen(tctx, &p, iface);
tctx              257 source4/torture/rpc/autoidl.c static void test_auto_scan(struct torture_context *tctx, const struct ndr_interface_table *iface)
tctx              259 source4/torture/rpc/autoidl.c 	test_scan_call(tctx, iface, 2);
tctx              101 source4/torture/rpc/bench.c static bool bench_NetShareEnumAll(struct torture_context *tctx, struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx)
tctx              105 source4/torture/rpc/bench.c 	int timelimit = torture_setting_int(tctx, "timelimit", 10);
tctx              115 source4/torture/rpc/bench.c 			if (torture_setting_bool(tctx, "progress", true)) {
tctx               27 source4/torture/rpc/browser.c bool test_BrowserrQueryOtherDomains(struct torture_context *tctx,
tctx               39 source4/torture/rpc/browser.c 	torture_comment(tctx, "dcerpc_BrowserrQueryOtherDomains\n");
tctx               49 source4/torture/rpc/browser.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx               57 source4/torture/rpc/browser.c 	status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx               58 source4/torture/rpc/browser.c 	torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx               59 source4/torture/rpc/browser.c 	torture_assert_werr_ok(tctx, r.out.result, "BrowserrQueryOtherDomains failed");
tctx               60 source4/torture/rpc/browser.c 	torture_assert_int_equal(tctx, *r.out.total_entries, 0, "BrowserrQueryOtherDomains");
tctx               66 source4/torture/rpc/browser.c 	status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx               67 source4/torture/rpc/browser.c 	torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx               68 source4/torture/rpc/browser.c 	torture_assert_werr_ok(tctx, r.out.result, "BrowserrQueryOtherDomains failed");
tctx               69 source4/torture/rpc/browser.c 	torture_assert_int_equal(tctx, *r.out.total_entries, 0, "BrowserrQueryOtherDomains");
tctx               72 source4/torture/rpc/browser.c 	status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx               73 source4/torture/rpc/browser.c 	torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx               74 source4/torture/rpc/browser.c 	torture_assert_werr_equal(tctx, WERR_INVALID_PARAM, r.out.result,
tctx               80 source4/torture/rpc/browser.c 	status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx               81 source4/torture/rpc/browser.c 	torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx               82 source4/torture/rpc/browser.c 	torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result,
tctx               89 source4/torture/rpc/browser.c 	status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx               90 source4/torture/rpc/browser.c 	torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx               91 source4/torture/rpc/browser.c 	torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result,
tctx               95 source4/torture/rpc/browser.c 	status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx               96 source4/torture/rpc/browser.c 	torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx               97 source4/torture/rpc/browser.c 	torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result,
tctx              101 source4/torture/rpc/browser.c 	status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx              102 source4/torture/rpc/browser.c 	torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx              103 source4/torture/rpc/browser.c 	torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result,
tctx              107 source4/torture/rpc/browser.c 	status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx              108 source4/torture/rpc/browser.c 	torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx              109 source4/torture/rpc/browser.c 	torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result,
tctx               33 source4/torture/rpc/countcalls.c bool count_calls(struct torture_context *tctx,
tctx               41 source4/torture/rpc/countcalls.c 	NTSTATUS status = torture_rpc_connection(tctx, &p, iface);
tctx               47 source4/torture/rpc/dfs.c 			     struct torture_context *tctx,
tctx               59 source4/torture/rpc/dfs.c 	if (!(libnetctx = libnet_context_init(tctx->ev, tctx->lp_ctx))) {
tctx               89 source4/torture/rpc/dfs.c 			     struct torture_context *tctx,
tctx               99 source4/torture/rpc/dfs.c 	if (!(libnetctx = libnet_context_init(tctx->ev, tctx->lp_ctx))) {
tctx              120 source4/torture/rpc/dfs.c 			   struct torture_context *tctx,
tctx              127 source4/torture/rpc/dfs.c 	if (!torture_open_connection_share(mem_ctx, cli, tctx, host, share, tctx->ev)) {
tctx              486 source4/torture/rpc/dfs.c 				 struct torture_context *tctx,
tctx              496 source4/torture/rpc/dfs.c 	test_NetShareDel(mem_ctx, tctx, host, sharename);
tctx              497 source4/torture/rpc/dfs.c 	torture_open_connection_share(mem_ctx, &cli, tctx, host, "C$", tctx->ev);
tctx              504 source4/torture/rpc/dfs.c 			 struct torture_context *tctx,
tctx              515 source4/torture/rpc/dfs.c 	test_cleanup_stdroot(p, mem_ctx, tctx, host, sharename, dir);
tctx              517 source4/torture/rpc/dfs.c 	ret &= test_CreateDir(mem_ctx, &cli, tctx, host, "C$", dir);
tctx              518 source4/torture/rpc/dfs.c 	ret &= test_NetShareAdd(mem_ctx, tctx, host, sharename, path);
tctx              522 source4/torture/rpc/dfs.c 	ret &= test_NetShareDel(mem_ctx, tctx, host, sharename);
tctx               32 source4/torture/rpc/drsuapi.c bool test_DsBind(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx               44 source4/torture/rpc/drsuapi.c 	torture_comment(tctx, "testing DsBind\n");
tctx               46 source4/torture/rpc/drsuapi.c 	status = dcerpc_drsuapi_DsBind(p, tctx, &r);
tctx               50 source4/torture/rpc/drsuapi.c 			errstr = dcerpc_errstr(tctx, p->last_fault_code);
tctx               52 source4/torture/rpc/drsuapi.c 		torture_fail(tctx, "dcerpc_drsuapi_DsBind failed");
tctx               54 source4/torture/rpc/drsuapi.c 		torture_fail(tctx, "DsBind failed");
tctx              252 source4/torture/rpc/drsuapi.c static bool test_DsReplicaGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              330 source4/torture/rpc/drsuapi.c 	if (torture_setting_bool(tctx, "samba4", false)) {
tctx              367 source4/torture/rpc/drsuapi.c 		status = dcerpc_drsuapi_DsReplicaGetInfo(p, tctx, &r);
tctx              371 source4/torture/rpc/drsuapi.c 				errstr = dcerpc_errstr(tctx, p->last_fault_code);
tctx              389 source4/torture/rpc/drsuapi.c static bool test_DsReplicaSync(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              407 source4/torture/rpc/drsuapi.c 	if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx              412 source4/torture/rpc/drsuapi.c 	if (torture_setting_bool(tctx, "samba4", false)) {
tctx              440 source4/torture/rpc/drsuapi.c 		status = dcerpc_drsuapi_DsReplicaSync(p, tctx, &r);
tctx              444 source4/torture/rpc/drsuapi.c 				errstr = dcerpc_errstr(tctx, p->last_fault_code);
tctx              457 source4/torture/rpc/drsuapi.c static bool test_DsReplicaUpdateRefs(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              475 source4/torture/rpc/drsuapi.c 	if (torture_setting_bool(tctx, "samba4", false)) {
tctx              497 source4/torture/rpc/drsuapi.c 			r.in.req.req1.dest_dsa_dns_name	= talloc_asprintf(tctx, "__some_dest_dsa_guid_string._msdn.%s",
tctx              504 source4/torture/rpc/drsuapi.c 		status = dcerpc_drsuapi_DsReplicaUpdateRefs(p, tctx, &r);
tctx              508 source4/torture/rpc/drsuapi.c 				errstr = dcerpc_errstr(tctx, p->last_fault_code);
tctx              521 source4/torture/rpc/drsuapi.c static bool test_DsGetNCChanges(struct dcerpc_pipe *p, struct torture_context *tctx, 
tctx              545 source4/torture/rpc/drsuapi.c 	if (torture_setting_bool(tctx, "samba4", false)) {
tctx              577 source4/torture/rpc/drsuapi.c 			if (lp_parm_bool(tctx->lp_ctx, NULL, "drsuapi","compression", false)) {
tctx              600 source4/torture/rpc/drsuapi.c 			if (lp_parm_bool(tctx->lp_ctx, NULL, "drsuapi", "compression", false)) {
tctx              603 source4/torture/rpc/drsuapi.c 			if (lp_parm_bool(tctx->lp_ctx, NULL, "drsuapi", "neighbour_writeable", true)) {
tctx              623 source4/torture/rpc/drsuapi.c 		status = dcerpc_drsuapi_DsGetNCChanges(p, tctx, &r);
tctx              627 source4/torture/rpc/drsuapi.c 				errstr = dcerpc_errstr(tctx, p->last_fault_code);
tctx              215 source4/torture/rpc/drsuapi_cracknames.c bool test_DsCrackNames(struct torture_context *tctx,
tctx              343 source4/torture/rpc/drsuapi_cracknames.c 	ldb = ldb_init(mem_ctx, tctx->ev);
tctx              608 source4/torture/rpc/drsuapi_cracknames.c 				.skip = torture_setting_bool(tctx, "samba4", false)
tctx               28 source4/torture/rpc/dssetup.c bool test_DsRoleGetPrimaryDomainInformation_ext(struct torture_context *tctx, 
tctx               38 source4/torture/rpc/dssetup.c 		torture_comment(tctx, "dcerpc_dssetup_DsRoleGetPrimaryDomainInformation level %d\n", i);
tctx               40 source4/torture/rpc/dssetup.c 		status = dcerpc_dssetup_DsRoleGetPrimaryDomainInformation(p, tctx, &r);
tctx               41 source4/torture/rpc/dssetup.c 		torture_assert_ntstatus_equal(tctx, ext_status, status, "DsRoleGetPrimaryDomainInformation failed");
tctx               43 source4/torture/rpc/dssetup.c 			torture_assert_werr_ok(tctx, r.out.result, "DsRoleGetPrimaryDomainInformation failed");
tctx               50 source4/torture/rpc/dssetup.c bool test_DsRoleGetPrimaryDomainInformation(struct torture_context *tctx, 
tctx               53 source4/torture/rpc/dssetup.c 	return test_DsRoleGetPrimaryDomainInformation_ext(tctx, p, NT_STATUS_OK);
tctx               83 source4/torture/rpc/dssync.c static struct DsSyncTest *test_create_context(struct torture_context *tctx)
tctx               89 source4/torture/rpc/dssync.c 	const char *binding = torture_setting_string(tctx, "binding", NULL);
tctx               90 source4/torture/rpc/dssync.c 	ctx = talloc_zero(tctx, struct DsSyncTest);
tctx              154 source4/torture/rpc/dssync.c 	if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "xpress", false)) {
tctx              178 source4/torture/rpc/dssync.c static bool _test_DsBind(struct torture_context *tctx,
tctx              187 source4/torture/rpc/dssync.c 				       credentials, tctx->ev, tctx->lp_ctx);
tctx              240 source4/torture/rpc/dssync.c static bool test_LDAPBind(struct torture_context *tctx, struct DsSyncTest *ctx, 
tctx              246 source4/torture/rpc/dssync.c 	status = torture_ldap_connection(tctx, &l->conn, ctx->ldap_url);
tctx              254 source4/torture/rpc/dssync.c 	status = torture_ldap_bind_sasl(l->conn, credentials, tctx->lp_ctx);
tctx              264 source4/torture/rpc/dssync.c static bool test_GetInfo(struct torture_context *tctx, struct DsSyncTest *ctx)
tctx              276 source4/torture/rpc/dssync.c 	cldap = cldap_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx              288 source4/torture/rpc/dssync.c 	names[0].str = talloc_asprintf(ctx, "%s\\", lp_workgroup(tctx->lp_ctx));
tctx              310 source4/torture/rpc/dssync.c 	search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx              326 source4/torture/rpc/dssync.c 		struct ldb_context *ldb = ldb_init(ctx, tctx->ev);
tctx              449 source4/torture/rpc/dssync.c static void test_analyse_objects(struct torture_context *tctx, 
tctx              457 source4/torture/rpc/dssync.c 	if (!lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "print_pwd_blobs", false)) {
tctx              461 source4/torture/rpc/dssync.c 	save_values_dir = lp_parm_string(tctx->lp_ctx, NULL, "dssync", "save_pwd_blobs_dir");
tctx              578 source4/torture/rpc/dssync.c 								       lp_iconv_convenience(tctx->lp_ctx), ptr,
tctx              594 source4/torture/rpc/dssync.c static bool test_FetchData(struct torture_context *tctx, struct DsSyncTest *ctx)
tctx              624 source4/torture/rpc/dssync.c 	partition = lp_parm_string(tctx->lp_ctx, NULL, "dssync", "partition");
tctx              630 source4/torture/rpc/dssync.c 	highest_usn = lp_parm_int(tctx->lp_ctx, NULL, "dssync", "highest_usn", 0);
tctx              632 source4/torture/rpc/dssync.c 	array[0].level = lp_parm_int(tctx->lp_ctx, NULL, "dssync", "get_nc_changes_level", array[0].level);
tctx              634 source4/torture/rpc/dssync.c 	if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "print_pwd_blobs", false)) {
tctx              670 source4/torture/rpc/dssync.c 			if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "compression", false)) {
tctx              673 source4/torture/rpc/dssync.c 			if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "neighbour_writeable", true)) {
tctx              702 source4/torture/rpc/dssync.c 			if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "compression", false)) {
tctx              705 source4/torture/rpc/dssync.c 			if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "neighbour_writeable", true)) {
tctx              775 source4/torture/rpc/dssync.c 				test_analyse_objects(tctx, ctx, &gensec_skey, ctr1->first_object);
tctx              805 source4/torture/rpc/dssync.c 				test_analyse_objects(tctx, ctx, &gensec_skey, ctr6->first_object);
tctx              820 source4/torture/rpc/dssync.c static bool test_FetchNT4Data(struct torture_context *tctx, 
tctx              843 source4/torture/rpc/dssync.c 	req.req1.unknown1	= lp_parm_int(tctx->lp_ctx, NULL, "dssync", "nt4-1", 3);
tctx              844 source4/torture/rpc/dssync.c 	req.req1.unknown2	= lp_parm_int(tctx->lp_ctx, NULL, "dssync", "nt4-2", 0x00004000);
tctx               33 source4/torture/rpc/echo.c #define TEST_ADDONE(tctx, value) do { \
tctx               37 source4/torture/rpc/echo.c 	status = dcerpc_echo_AddOne(p, tctx, &r); \
tctx               38 source4/torture/rpc/echo.c 	torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "AddOne(%d) failed", i)); \
tctx               39 source4/torture/rpc/echo.c 	torture_assert (tctx, n == i+1, talloc_asprintf(tctx, "%d + 1 != %u (should be %u)\n", i, n, i+1)); \
tctx               40 source4/torture/rpc/echo.c 	torture_comment (tctx, "%d + 1 = %u\n", i, n); \
tctx               43 source4/torture/rpc/echo.c static bool test_addone(struct torture_context *tctx, 
tctx               52 source4/torture/rpc/echo.c 		TEST_ADDONE(tctx, i);
tctx               55 source4/torture/rpc/echo.c 	TEST_ADDONE(tctx, 0x7FFFFFFE);
tctx               56 source4/torture/rpc/echo.c 	TEST_ADDONE(tctx, 0xFFFFFFFE);
tctx               57 source4/torture/rpc/echo.c 	TEST_ADDONE(tctx, 0xFFFFFFFF);
tctx               58 source4/torture/rpc/echo.c 	TEST_ADDONE(tctx, random() & 0xFFFFFFFF);
tctx               65 source4/torture/rpc/echo.c static bool test_echodata(struct torture_context *tctx,
tctx               74 source4/torture/rpc/echo.c 	if (torture_setting_bool(tctx, "quick", false) &&
tctx               81 source4/torture/rpc/echo.c 	data_in = talloc_array(tctx, uint8_t, len);
tctx               82 source4/torture/rpc/echo.c 	data_out = talloc_array(tctx, uint8_t, len);
tctx               90 source4/torture/rpc/echo.c 	status = dcerpc_echo_EchoData(p, tctx, &r);
tctx               91 source4/torture/rpc/echo.c 	torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, 
tctx               98 source4/torture/rpc/echo.c 			torture_comment(tctx, "Bad data returned for len %d at offset %d\n", 
tctx              100 source4/torture/rpc/echo.c 			torture_comment(tctx, "in:\n");
tctx              102 source4/torture/rpc/echo.c 			torture_comment(tctx, "out:\n");
tctx              113 source4/torture/rpc/echo.c static bool test_sourcedata(struct torture_context *tctx,
tctx              121 source4/torture/rpc/echo.c 	if (torture_setting_bool(tctx, "quick", false) &&
tctx              130 source4/torture/rpc/echo.c 	status = dcerpc_echo_SourceData(p, tctx, &r);
tctx              131 source4/torture/rpc/echo.c 	torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, 
tctx              136 source4/torture/rpc/echo.c 		torture_assert(tctx, v[i] == (i & 0xFF),
tctx              137 source4/torture/rpc/echo.c 			talloc_asprintf(tctx, 
tctx              146 source4/torture/rpc/echo.c static bool test_sinkdata(struct torture_context *tctx, 
tctx              155 source4/torture/rpc/echo.c 	if (torture_setting_bool(tctx, "quick", false) &&
tctx              162 source4/torture/rpc/echo.c 	data_in = talloc_array(tctx, uint8_t, len);
tctx              170 source4/torture/rpc/echo.c 	status = dcerpc_echo_SinkData(p, tctx, &r);
tctx              171 source4/torture/rpc/echo.c 	torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, 
tctx              175 source4/torture/rpc/echo.c 	torture_comment(tctx, "sunk %d bytes\n", len);
tctx              183 source4/torture/rpc/echo.c static bool test_testcall(struct torture_context *tctx,
tctx              193 source4/torture/rpc/echo.c 	status = dcerpc_echo_TestCall(p, tctx, &r);
tctx              194 source4/torture/rpc/echo.c 	torture_assert_ntstatus_ok(tctx, status, "TestCall failed");
tctx              196 source4/torture/rpc/echo.c 	torture_assert_str_equal(tctx, s, "input string", "Didn't receive back same string");
tctx              204 source4/torture/rpc/echo.c static bool test_testcall2(struct torture_context *tctx,
tctx              213 source4/torture/rpc/echo.c 		r.out.info = talloc(tctx, union echo_Info);
tctx              215 source4/torture/rpc/echo.c 		torture_comment(tctx, "Testing TestCall2 level %d\n", i);
tctx              216 source4/torture/rpc/echo.c 		status = dcerpc_echo_TestCall2(p, tctx, &r);
tctx              217 source4/torture/rpc/echo.c 		torture_assert_ntstatus_ok(tctx, status, "TestCall2 failed");
tctx              225 source4/torture/rpc/echo.c static bool test_sleep(struct torture_context *tctx,
tctx              240 source4/torture/rpc/echo.c 	if (torture_setting_bool(tctx, "quick", false)) {
tctx              241 source4/torture/rpc/echo.c 		torture_skip(tctx, "TestSleep disabled - use \"torture:quick=no\" to enable\n");
tctx              243 source4/torture/rpc/echo.c 	torture_comment(tctx, "Testing TestSleep - use \"torture:quick=yes\" to disable\n");
tctx              250 source4/torture/rpc/echo.c 		req[i] = dcerpc_echo_TestSleep_send(p, tctx, &r[i]);
tctx              251 source4/torture/rpc/echo.c 		torture_assert(tctx, req[i], "Failed to send async sleep request\n");
tctx              256 source4/torture/rpc/echo.c 		torture_assert(tctx, event_loop_once(ctx) == 0, 
tctx              267 source4/torture/rpc/echo.c 				torture_comment(tctx, "rounded_tdiff=%d\n", rounded_tdiff);
tctx              268 source4/torture/rpc/echo.c 				torture_assert_ntstatus_ok(tctx, status, 
tctx              269 source4/torture/rpc/echo.c 							talloc_asprintf(tctx, "TestSleep(%d) failed", i));
tctx              270 source4/torture/rpc/echo.c 				torture_assert(tctx, r[i].out.result == r[i].in.seconds,
tctx              271 source4/torture/rpc/echo.c 					talloc_asprintf(tctx, "Failed - Asked to sleep for %u seconds (server replied with %u seconds and the reply takes only %u seconds)", 
tctx              273 source4/torture/rpc/echo.c 				torture_assert(tctx, r[i].out.result <= rounded_tdiff, 
tctx              274 source4/torture/rpc/echo.c 					talloc_asprintf(tctx, "Failed - Slept for %u seconds (but reply takes only %u.%06u seconds)", 
tctx              277 source4/torture/rpc/echo.c 					torture_comment(tctx, "Slept for %u seconds (but reply takes %u.%06u seconds - busy server?)\n", 
tctx              280 source4/torture/rpc/echo.c 					torture_comment(tctx, "Slept for %u seconds (reply takes %u.%06u seconds - ok)\n", 
tctx              283 source4/torture/rpc/echo.c 						torture_comment(tctx, "(Failed) - Not async - Slept for %u seconds (but reply takes %u.%06u seconds)", 
tctx              290 source4/torture/rpc/echo.c 	torture_comment(tctx, "\n");
tctx              297 source4/torture/rpc/echo.c static bool test_enum(struct torture_context *tctx,
tctx              317 source4/torture/rpc/echo.c 	status = dcerpc_echo_TestEnum(p, tctx, &r);
tctx              318 source4/torture/rpc/echo.c 	torture_assert_ntstatus_ok(tctx, status, "TestEnum failed");
tctx              325 source4/torture/rpc/echo.c static bool test_surrounding(struct torture_context *tctx,
tctx              332 source4/torture/rpc/echo.c 	r.in.data = talloc(tctx, struct echo_Surrounding);
tctx              335 source4/torture/rpc/echo.c 	r.in.data->surrounding = talloc_zero_array(tctx, uint16_t, r.in.data->x);
tctx              337 source4/torture/rpc/echo.c 	r.out.data = talloc(tctx, struct echo_Surrounding);
tctx              339 source4/torture/rpc/echo.c 	status = dcerpc_echo_TestSurrounding(p, tctx, &r);
tctx              340 source4/torture/rpc/echo.c 	torture_assert_ntstatus_ok(tctx, status, "TestSurrounding failed");
tctx              342 source4/torture/rpc/echo.c 	torture_assert(tctx, r.out.data->x == 2 * r.in.data->x,
tctx              351 source4/torture/rpc/echo.c static bool test_doublepointer(struct torture_context *tctx,
tctx              363 source4/torture/rpc/echo.c 	status = dcerpc_echo_TestDoublePointer(p, tctx, &r);
tctx              364 source4/torture/rpc/echo.c 	torture_assert_ntstatus_ok(tctx, status, "TestDoublePointer failed");
tctx              366 source4/torture/rpc/echo.c 	torture_assert_int_equal(tctx, value, r.out.result, 
tctx              375 source4/torture/rpc/echo.c static bool test_timeout(struct torture_context *tctx,
tctx              383 source4/torture/rpc/echo.c 	if (torture_setting_bool(tctx, "quick", false)) {
tctx              384 source4/torture/rpc/echo.c 		torture_skip(tctx, "timeout testing disabled - use \"torture:quick=no\" to enable\n");
tctx              387 source4/torture/rpc/echo.c 	torture_comment(tctx, "testing request timeouts\n");
tctx              391 source4/torture/rpc/echo.c 	req = dcerpc_echo_TestSleep_send(p, tctx, &r);
tctx              393 source4/torture/rpc/echo.c 		torture_comment(tctx, "Failed to send async sleep request\n");
tctx              399 source4/torture/rpc/echo.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_IO_TIMEOUT, 
tctx              402 source4/torture/rpc/echo.c 	torture_comment(tctx, "testing request destruction\n");
tctx              403 source4/torture/rpc/echo.c 	req = dcerpc_echo_TestSleep_send(p, tctx, &r);
tctx              405 source4/torture/rpc/echo.c 		torture_comment(tctx, "Failed to send async sleep request\n");
tctx              410 source4/torture/rpc/echo.c 	req = dcerpc_echo_TestSleep_send(p, tctx, &r);
tctx              412 source4/torture/rpc/echo.c 		torture_comment(tctx, "Failed to send async sleep request\n");
tctx              417 source4/torture/rpc/echo.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_IO_TIMEOUT, 
tctx              422 source4/torture/rpc/echo.c 	return test_addone(tctx, p);
tctx              138 source4/torture/rpc/epmapper.c static bool test_Lookup(struct torture_context *tctx, 
tctx              165 source4/torture/rpc/epmapper.c 		status = dcerpc_epm_Lookup(p, tctx, &r);
tctx              171 source4/torture/rpc/epmapper.c 		       *r.out.num_ents, GUID_string(tctx, &handle.uuid));
tctx              175 source4/torture/rpc/epmapper.c 			display_tower(tctx, &r.out.entries[i].tower->tower);
tctx              177 source4/torture/rpc/epmapper.c 				test_Map(p, tctx, r.out.entries[i].tower);
tctx              185 source4/torture/rpc/epmapper.c 	torture_assert_ntstatus_ok(tctx, status, "Lookup failed");
tctx              212 source4/torture/rpc/epmapper.c static bool test_Insert(struct torture_context *tctx, 
tctx              221 source4/torture/rpc/epmapper.c 	r.in.entries = talloc_array(tctx, struct epm_entry_t, 1);
tctx              224 source4/torture/rpc/epmapper.c 	status = dcerpc_parse_binding(tctx, "ncalrpc:[SMBTORTURE]", &bd);
tctx              225 source4/torture/rpc/epmapper.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              228 source4/torture/rpc/epmapper.c 	r.in.entries[0].tower = talloc(tctx, struct epm_twr_t);
tctx              230 source4/torture/rpc/epmapper.c 	status = dcerpc_binding_build_tower(tctx, bd, &r.in.entries[0].tower->tower);
tctx              231 source4/torture/rpc/epmapper.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              236 source4/torture/rpc/epmapper.c 	status = dcerpc_epm_Insert(p, tctx, &r);
tctx              237 source4/torture/rpc/epmapper.c 	torture_assert_ntstatus_ok(tctx, status, "Insert failed");
tctx              239 source4/torture/rpc/epmapper.c 	torture_assert(tctx, r.out.result == 0, "Insert failed");
tctx              241 source4/torture/rpc/epmapper.c 	if (!test_Delete(p, tctx, r.in.entries)) {
tctx              248 source4/torture/rpc/epmapper.c static bool test_InqObject(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx              253 source4/torture/rpc/epmapper.c 	r.in.epm_object = talloc(tctx, struct GUID);
tctx              256 source4/torture/rpc/epmapper.c 	status = dcerpc_epm_InqObject(p, tctx, &r);
tctx              257 source4/torture/rpc/epmapper.c 	torture_assert_ntstatus_ok(tctx, status, "InqObject failed");
tctx               40 source4/torture/rpc/eventlog.c static bool get_policy_handle(struct torture_context *tctx,
tctx               60 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx               61 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_OpenEventLogW(p, tctx, &r),
tctx               64 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx, r.out.result, "OpenEventLog failed");
tctx               71 source4/torture/rpc/eventlog.c static bool test_GetNumRecords(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx               78 source4/torture/rpc/eventlog.c 	if (!get_policy_handle(tctx, p, &handle))
tctx               85 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx               86 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_GetNumRecords(p, tctx, &r),
tctx               89 source4/torture/rpc/eventlog.c 	torture_comment(tctx, "%d records\n", *r.out.number);
tctx               93 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx               94 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx               99 source4/torture/rpc/eventlog.c static bool test_ReadEventLog(struct torture_context *tctx,
tctx              110 source4/torture/rpc/eventlog.c 	if (!get_policy_handle(tctx, p, &handle))
tctx              121 source4/torture/rpc/eventlog.c 	status = dcerpc_eventlog_ReadEventLogW(p, tctx, &r);
tctx              123 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_INVALID_PARAMETER,
tctx              141 source4/torture/rpc/eventlog.c 		status = dcerpc_eventlog_ReadEventLogW(p, tctx, &r);
tctx              148 source4/torture/rpc/eventlog.c 		torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_BUFFER_TOO_SMALL,
tctx              154 source4/torture/rpc/eventlog.c 		r.out.data = talloc_array(tctx, uint8_t, r.in.number_of_bytes);
tctx              156 source4/torture/rpc/eventlog.c 		status = dcerpc_eventlog_ReadEventLogW(p, tctx, &r);
tctx              158 source4/torture/rpc/eventlog.c 		torture_assert_ntstatus_ok(tctx, status, "ReadEventLog failed");
tctx              168 source4/torture/rpc/eventlog.c 			ndr_err = ndr_pull_struct_blob_all(&blob, tctx,
tctx              169 source4/torture/rpc/eventlog.c 				lp_iconv_convenience(tctx->lp_ctx), &rec,
tctx              173 source4/torture/rpc/eventlog.c 				torture_assert_ntstatus_ok(tctx, status,
tctx              188 source4/torture/rpc/eventlog.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              196 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx              197 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx              203 source4/torture/rpc/eventlog.c static bool test_ReportEventLog(struct torture_context *tctx,
tctx              214 source4/torture/rpc/eventlog.c 	if (!get_policy_handle(tctx, p, &handle))
tctx              219 source4/torture/rpc/eventlog.c 	strings = talloc_array(tctx, struct lsa_String, 1);
tctx              239 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx              240 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_ReportEventW(p, tctx, &r),
tctx              243 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx, r.out.result, "ReportEventW failed");
tctx              247 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx              248 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx              253 source4/torture/rpc/eventlog.c static bool test_FlushEventLog(struct torture_context *tctx,
tctx              260 source4/torture/rpc/eventlog.c 	if (!get_policy_handle(tctx, p, &handle))
tctx              266 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_equal(tctx,
tctx              267 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_FlushEventLog(p, tctx, &r),
tctx              273 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx              274 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx              280 source4/torture/rpc/eventlog.c static bool test_ClearEventLog(struct torture_context *tctx,
tctx              287 source4/torture/rpc/eventlog.c 	if (!get_policy_handle(tctx, p, &handle))
tctx              293 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx              294 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_ClearEventLogW(p, tctx, &r),
tctx              299 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx              300 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx              306 source4/torture/rpc/eventlog.c static bool test_GetLogInformation(struct torture_context *tctx,
tctx              315 source4/torture/rpc/eventlog.c 	if (!get_policy_handle(tctx, p, &handle))
tctx              324 source4/torture/rpc/eventlog.c 	status = dcerpc_eventlog_GetLogInformation(p, tctx, &r);
tctx              326 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_LEVEL,
tctx              331 source4/torture/rpc/eventlog.c 	status = dcerpc_eventlog_GetLogInformation(p, tctx, &r);
tctx              333 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_BUFFER_TOO_SMALL,
tctx              337 source4/torture/rpc/eventlog.c 	r.out.buffer = talloc_array(tctx, uint8_t, bytes_needed);
tctx              339 source4/torture/rpc/eventlog.c 	status = dcerpc_eventlog_GetLogInformation(p, tctx, &r);
tctx              341 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx, status, "GetLogInformation failed");
tctx              345 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx              346 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx              353 source4/torture/rpc/eventlog.c static bool test_OpenEventLog(struct torture_context *tctx,
tctx              359 source4/torture/rpc/eventlog.c 	if (!get_policy_handle(tctx, p, &handle))
tctx              364 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx              365 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx              371 source4/torture/rpc/eventlog.c static bool test_BackupLog(struct torture_context *tctx,
tctx              383 source4/torture/rpc/eventlog.c 	if (!get_policy_handle(tctx, p, &handle))
tctx              386 source4/torture/rpc/eventlog.c 	tmp = talloc_asprintf(tctx, "C:\\%s", TEST_BACKUP_NAME);
tctx              392 source4/torture/rpc/eventlog.c 	status = dcerpc_eventlog_BackupEventLogW(p, tctx, &r);
tctx              393 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_equal(tctx, status,
tctx              396 source4/torture/rpc/eventlog.c 	tmp = talloc_asprintf(tctx, "\\??\\C:\\%s", TEST_BACKUP_NAME);
tctx              402 source4/torture/rpc/eventlog.c 	status = dcerpc_eventlog_BackupEventLogW(p, tctx, &r);
tctx              403 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx, status, "BackupEventLogW failed");
tctx              405 source4/torture/rpc/eventlog.c 	status = dcerpc_eventlog_BackupEventLogW(p, tctx, &r);
tctx              406 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_equal(tctx, status,
tctx              411 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx              412 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx              424 source4/torture/rpc/eventlog.c 	status = dcerpc_eventlog_OpenBackupEventLogW(p, tctx, &b);
tctx              426 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx, status, "OpenBackupEventLogW failed");
tctx              430 source4/torture/rpc/eventlog.c 	torture_assert_ntstatus_ok(tctx,
tctx              431 source4/torture/rpc/eventlog.c 			dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx               29 source4/torture/rpc/frsapi.c static bool test_GetDsPollingIntervalW(struct torture_context *tctx,
tctx               43 source4/torture/rpc/frsapi.c 	torture_assert_ntstatus_ok(tctx,
tctx               44 source4/torture/rpc/frsapi.c 		dcerpc_frsapi_GetDsPollingIntervalW(p, tctx, &r),
tctx               47 source4/torture/rpc/frsapi.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx               53 source4/torture/rpc/frsapi.c static bool test_SetDsPollingIntervalW(struct torture_context *tctx,
tctx               67 source4/torture/rpc/frsapi.c 	torture_assert_ntstatus_ok(tctx,
tctx               68 source4/torture/rpc/frsapi.c 		dcerpc_frsapi_SetDsPollingIntervalW(p, tctx, &r),
tctx               71 source4/torture/rpc/frsapi.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx               77 source4/torture/rpc/frsapi.c static bool test_DsPollingIntervalW(struct torture_context *tctx,
tctx               83 source4/torture/rpc/frsapi.c 	if (!test_GetDsPollingIntervalW(tctx, p, &i1, &i2, &i3)) {
tctx               87 source4/torture/rpc/frsapi.c 	if (!test_SetDsPollingIntervalW(tctx, p, i1, i2, i3)) {
tctx               94 source4/torture/rpc/frsapi.c 	if (!test_SetDsPollingIntervalW(tctx, p, k1, k2, k3)) {
tctx               98 source4/torture/rpc/frsapi.c 	if (!test_GetDsPollingIntervalW(tctx, p, &k1, &k2, &k3)) {
tctx              109 source4/torture/rpc/frsapi.c static bool test_IsPathReplicated_err(struct torture_context *tctx,
tctx              128 source4/torture/rpc/frsapi.c 	torture_assert_ntstatus_ok(tctx,
tctx              129 source4/torture/rpc/frsapi.c 		dcerpc_frsapi_IsPathReplicated(p, tctx, &r),
tctx              132 source4/torture/rpc/frsapi.c 	torture_assert_werr_equal(tctx, r.out.result, werr,
tctx              138 source4/torture/rpc/frsapi.c static bool _test_IsPathReplicated(struct torture_context *tctx,
tctx              143 source4/torture/rpc/frsapi.c 	return test_IsPathReplicated_err(tctx, p, path, type, WERR_OK);
tctx              146 source4/torture/rpc/frsapi.c static bool test_IsPathReplicated(struct torture_context *tctx,
tctx              156 source4/torture/rpc/frsapi.c 	if (!test_IsPathReplicated_err(tctx, p, NULL, 0,
tctx              162 source4/torture/rpc/frsapi.c 		if (!_test_IsPathReplicated(tctx, p, dcerpc_server_name(p),
tctx              169 source4/torture/rpc/frsapi.c 		const char *path = talloc_asprintf(tctx, "\\\\%s\\SYSVOL",
tctx              171 source4/torture/rpc/frsapi.c 		if (!_test_IsPathReplicated(tctx, p, path, lvls[i])) {
tctx              177 source4/torture/rpc/frsapi.c 		if (!_test_IsPathReplicated(tctx, p,
tctx              187 source4/torture/rpc/frsapi.c static bool test_ForceReplication(struct torture_context *tctx,
tctx              196 source4/torture/rpc/frsapi.c 	r.in.replica_set = talloc_asprintf(tctx, "%s",
tctx              197 source4/torture/rpc/frsapi.c 					   lp_realm(tctx->lp_ctx));
tctx              200 source4/torture/rpc/frsapi.c 	torture_assert_ntstatus_ok(tctx,
tctx              201 source4/torture/rpc/frsapi.c 		dcerpc_frsapi_ForceReplication(p, tctx, &r),
tctx              204 source4/torture/rpc/frsapi.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              210 source4/torture/rpc/frsapi.c static bool test_InfoW(struct torture_context *tctx,
tctx              224 source4/torture/rpc/frsapi.c 		info = talloc_zero(tctx, struct frsapi_Info);
tctx              235 source4/torture/rpc/frsapi.c 		torture_assert_ntstatus_ok(tctx,
tctx              236 source4/torture/rpc/frsapi.c 			dcerpc_frsapi_InfoW(p, tctx, &r),
tctx              239 source4/torture/rpc/frsapi.c 		torture_assert_werr_ok(tctx, r.out.result, "InfoW failed");
tctx               33 source4/torture/rpc/initshutdown.c static bool test_Abort(struct torture_context *tctx, 
tctx               42 source4/torture/rpc/initshutdown.c 	status = dcerpc_initshutdown_Abort(p, tctx, &r);
tctx               44 source4/torture/rpc/initshutdown.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx               47 source4/torture/rpc/initshutdown.c 	torture_assert_werr_ok(tctx, r.out.result, "initshutdown_Abort failed");
tctx               52 source4/torture/rpc/initshutdown.c static bool test_Init(struct torture_context *tctx, 
tctx               60 source4/torture/rpc/initshutdown.c 	r.in.message = talloc(tctx, struct lsa_StringLarge);
tctx               66 source4/torture/rpc/initshutdown.c 	status = dcerpc_initshutdown_Init(p, tctx, &r);
tctx               68 source4/torture/rpc/initshutdown.c 	torture_assert_ntstatus_ok(tctx, status, "initshutdown_Init failed");
tctx               69 source4/torture/rpc/initshutdown.c 	torture_assert_werr_ok(tctx, r.out.result, "initshutdown_Init failed");
tctx               71 source4/torture/rpc/initshutdown.c 	return test_Abort(tctx, p);
tctx               74 source4/torture/rpc/initshutdown.c static bool test_InitEx(struct torture_context *tctx, 
tctx               82 source4/torture/rpc/initshutdown.c 	r.in.message = talloc(tctx, struct lsa_StringLarge);
tctx               89 source4/torture/rpc/initshutdown.c 	status = dcerpc_initshutdown_InitEx(p, tctx, &r);
tctx               91 source4/torture/rpc/initshutdown.c 	torture_assert_ntstatus_ok(tctx, status, "initshutdown_InitEx failed");
tctx               93 source4/torture/rpc/initshutdown.c 	torture_assert_werr_ok(tctx, r.out.result, "initshutdown_InitEx failed");
tctx               95 source4/torture/rpc/initshutdown.c 	return test_Abort(tctx, p);
tctx               41 source4/torture/rpc/lsa.c 			    struct torture_context *tctx)
tctx               69 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_OpenPolicy(p, tctx, &r);
tctx               85 source4/torture/rpc/lsa.c 			  struct torture_context *tctx,
tctx               95 source4/torture/rpc/lsa.c 	*handle = talloc(tctx, struct policy_handle);
tctx              117 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_OpenPolicy2(p, tctx, &r);
tctx              152 source4/torture/rpc/lsa.c 			     struct torture_context *tctx,
tctx              169 source4/torture/rpc/lsa.c 	names = talloc_array(tctx, struct lsa_String, tnames->count);
tctx              184 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_LookupNames(p, tctx, &r);
tctx              219 source4/torture/rpc/lsa.c 				   struct torture_context *tctx,
tctx              243 source4/torture/rpc/lsa.c 	names = talloc_array(tctx, struct lsa_String, tnames.count);
tctx              258 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_LookupNames(p, tctx, &r);
tctx              270 source4/torture/rpc/lsa.c 				       struct torture_context *tctx,
tctx              283 source4/torture/rpc/lsa.c 	ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx              287 source4/torture/rpc/lsa.c 	ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx              291 source4/torture/rpc/lsa.c 	ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx              295 source4/torture/rpc/lsa.c 	ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx              298 source4/torture/rpc/lsa.c 	ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx              303 source4/torture/rpc/lsa.c 	ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx              307 source4/torture/rpc/lsa.c 	ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx              311 source4/torture/rpc/lsa.c 	ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx              315 source4/torture/rpc/lsa.c 	ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx              320 source4/torture/rpc/lsa.c 			      struct torture_context *tctx,
tctx              338 source4/torture/rpc/lsa.c 	names = talloc_array(tctx, struct lsa_String, tnames->count);
tctx              355 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_LookupNames2(p, tctx, &r);
tctx              362 source4/torture/rpc/lsa.c 		torture_assert_int_equal(tctx, count, sids.count,
tctx              365 source4/torture/rpc/lsa.c 			torture_assert(tctx, sids.sids, "invalid sid buffer");
tctx              376 source4/torture/rpc/lsa.c 			      struct torture_context *tctx,
tctx              394 source4/torture/rpc/lsa.c 	names = talloc_array(tctx, struct lsa_String, tnames->count);
tctx              411 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_LookupNames3(p, tctx, &r);
tctx              418 source4/torture/rpc/lsa.c 		torture_assert_int_equal(tctx, count, sids.count,
tctx              421 source4/torture/rpc/lsa.c 			torture_assert(tctx, sids.sids, "invalid sid buffer");
tctx              431 source4/torture/rpc/lsa.c 			      struct torture_context *tctx,
tctx              448 source4/torture/rpc/lsa.c 	names = talloc_array(tctx, struct lsa_String, tnames->count);
tctx              464 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_LookupNames4(p, tctx, &r);
tctx              471 source4/torture/rpc/lsa.c 		torture_assert_int_equal(tctx, count, sids.count,
tctx              474 source4/torture/rpc/lsa.c 			torture_assert(tctx, sids.sids, "invalid sid buffer");
tctx              485 source4/torture/rpc/lsa.c 			    struct torture_context *tctx,
tctx              509 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_LookupSids(p, tctx, &r);
tctx              517 source4/torture/rpc/lsa.c 	if (!test_LookupNames(p, tctx, handle, &names)) {
tctx              526 source4/torture/rpc/lsa.c 			    struct torture_context *tctx,
tctx              552 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_LookupSids2(p, tctx, &r);
tctx              560 source4/torture/rpc/lsa.c 	if (!test_LookupNames2(p, tctx, handle, &names, false)) {
tctx              564 source4/torture/rpc/lsa.c 	if (!test_LookupNames3(p, tctx, handle, &names, false)) {
tctx              572 source4/torture/rpc/lsa.c 			    struct torture_context *tctx,
tctx              596 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_LookupSids3(p, tctx, &r);
tctx              610 source4/torture/rpc/lsa.c 	if (!test_LookupNames4(p, tctx, &names, false)) {
tctx              618 source4/torture/rpc/lsa.c 			  struct torture_context *tctx,
tctx              630 source4/torture/rpc/lsa.c 	sids.sids = talloc_array(tctx, struct lsa_SidPtr, sids.num_sids);
tctx              634 source4/torture/rpc/lsa.c 		sids.sids[i].sid = dom_sid_parse_talloc(tctx, sidstr);
tctx              655 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_LookupSids(p, tctx, &r);
tctx              663 source4/torture/rpc/lsa.c 		if (!test_LookupNames(p, tctx, handle, &names)) {
tctx              687 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_LookupSids3(p, tctx, &r);
tctx              698 source4/torture/rpc/lsa.c 		if (!test_LookupNames4(p, tctx, &names, false)) {
tctx              727 source4/torture/rpc/lsa.c 				  struct torture_context *tctx,
tctx              741 source4/torture/rpc/lsa.c 	count = talloc_array(tctx, uint32_t, num_async_requests);
tctx              742 source4/torture/rpc/lsa.c 	names = talloc_array(tctx, struct lsa_TransNameArray, num_async_requests);
tctx              743 source4/torture/rpc/lsa.c 	r = talloc_array(tctx, struct lsa_LookupSids, num_async_requests);
tctx              747 source4/torture/rpc/lsa.c 	req = talloc_array(tctx, struct rpc_request *, num_async_requests);
tctx              751 source4/torture/rpc/lsa.c 	sidptr.sid = dom_sid_parse_talloc(tctx, "S-1-5-32-545");
tctx              793 source4/torture/rpc/lsa.c 				 struct torture_context *tctx,
tctx              805 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_LookupPrivValue(p, tctx, &r);
tctx              815 source4/torture/rpc/lsa.c 				struct torture_context *tctx,
tctx              827 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_LookupPrivName(p, tctx, &r);
tctx              837 source4/torture/rpc/lsa.c 					     struct torture_context *tctx,
tctx              855 source4/torture/rpc/lsa.c 	privs.set = talloc_array(tctx, struct lsa_LUIDAttribute, 1);
tctx              859 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_RemovePrivilegesFromAccount(p, tctx, &r);
tctx              869 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_LookupPrivName(p, tctx, &r_name);
tctx              889 source4/torture/rpc/lsa.c 					struct torture_context *tctx,
tctx              905 source4/torture/rpc/lsa.c 	privs.set = talloc_array(tctx, struct lsa_LUIDAttribute, 1);
tctx              909 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_AddPrivilegesToAccount(p, tctx, &r);
tctx              919 source4/torture/rpc/lsa.c 				  struct torture_context *tctx,
tctx              933 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_EnumPrivsAccount(p, tctx, &r);
tctx              942 source4/torture/rpc/lsa.c 			test_LookupPrivName(p, tctx, handle,
tctx              946 source4/torture/rpc/lsa.c 		ret &= test_RemovePrivilegesFromAccount(p, tctx, handle, acct_handle,
tctx              948 source4/torture/rpc/lsa.c 		ret &= test_AddPrivilegesToAccount(p, tctx, acct_handle,
tctx              956 source4/torture/rpc/lsa.c 					struct torture_context *tctx,
tctx              969 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_GetSystemAccessAccount(p, tctx, &r);
tctx             1010 source4/torture/rpc/lsa.c 			struct torture_context *tctx,
tctx             1019 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_Delete(p, tctx, &r);
tctx             1029 source4/torture/rpc/lsa.c 			      struct torture_context *tctx,
tctx             1039 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_DeleteObject(p, tctx, &r);
tctx             1050 source4/torture/rpc/lsa.c 			       struct torture_context *tctx,
tctx             1058 source4/torture/rpc/lsa.c 	newsid = dom_sid_parse_talloc(tctx, "S-1-5-12349876-4321-2854");
tctx             1067 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_CreateAccount(p, tctx, &r);
tctx             1075 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_OpenAccount(p, tctx, &r_o);
tctx             1085 source4/torture/rpc/lsa.c 	if (!test_Delete(p, tctx, &acct_handle)) {
tctx             1089 source4/torture/rpc/lsa.c 	if (!test_DeleteObject(p, tctx, &acct_handle)) {
tctx             1097 source4/torture/rpc/lsa.c 				     struct torture_context *tctx,
tctx             1110 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_OpenTrustedDomainByName(p, tctx, &r);
tctx             1116 source4/torture/rpc/lsa.c 	if (!test_Delete(p, tctx, &trustdom_handle)) {
tctx             1120 source4/torture/rpc/lsa.c 	if (!test_DeleteObject(p, tctx, &trustdom_handle)) {
tctx             1128 source4/torture/rpc/lsa.c 					  struct torture_context *tctx,
tctx             1138 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_DeleteTrustedDomain(p, tctx, &r);
tctx             1149 source4/torture/rpc/lsa.c 			      struct torture_context *tctx,
tctx             1182 source4/torture/rpc/lsa.c 	secname[LOCAL] = talloc_asprintf(tctx, "torturesecret-%u", (uint_t)random());
tctx             1183 source4/torture/rpc/lsa.c 	secname[GLOBAL] = talloc_asprintf(tctx, "G$torturesecret-%u", (uint_t)random());
tctx             1194 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_CreateSecret(p, tctx, &r);
tctx             1204 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_CreateSecret(p, tctx, &r);
tctx             1217 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_OpenSecret(p, tctx, &r2);
tctx             1240 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_SetSecret(p, tctx, &r3);
tctx             1258 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_SetSecret(p, tctx, &r3);
tctx             1279 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_QuerySecret(p, tctx, &r4);
tctx             1291 source4/torture/rpc/lsa.c 				blob2 = data_blob_talloc(tctx, NULL, blob1.length);
tctx             1293 source4/torture/rpc/lsa.c 				secret2 = sess_decrypt_string(tctx,
tctx             1317 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_SetSecret(p, tctx, &r5);
tctx             1338 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_QuerySecret(p, tctx, &r6);
tctx             1354 source4/torture/rpc/lsa.c 				blob2 = data_blob_talloc(tctx, NULL, blob1.length);
tctx             1356 source4/torture/rpc/lsa.c 				secret4 = sess_decrypt_string(tctx,
tctx             1367 source4/torture/rpc/lsa.c 				blob2 = data_blob_talloc(tctx, NULL, blob1.length);
tctx             1369 source4/torture/rpc/lsa.c 				secret2 = sess_decrypt_string(tctx,
tctx             1381 source4/torture/rpc/lsa.c 					       nt_time_string(tctx, *r6.out.old_mtime),
tctx             1382 source4/torture/rpc/lsa.c 					       nt_time_string(tctx, *r6.out.new_mtime));
tctx             1399 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_SetSecret(p, tctx, &r7);
tctx             1417 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_QuerySecret(p, tctx, &r8);
tctx             1438 source4/torture/rpc/lsa.c 				blob2 = data_blob_talloc(tctx, NULL, blob1.length);
tctx             1440 source4/torture/rpc/lsa.c 				secret6 = sess_decrypt_string(tctx,
tctx             1451 source4/torture/rpc/lsa.c 					       nt_time_string(tctx, *r8.out.old_mtime),
tctx             1452 source4/torture/rpc/lsa.c 					       nt_time_string(tctx, *r8.out.new_mtime));
tctx             1458 source4/torture/rpc/lsa.c 		if (!test_Delete(p, tctx, &sec_handle)) {
tctx             1462 source4/torture/rpc/lsa.c 		if (!test_DeleteObject(p, tctx, &sec_handle)) {
tctx             1468 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_DeleteObject(p, tctx, &d_o);
tctx             1476 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_OpenSecret(p, tctx, &r2);
tctx             1490 source4/torture/rpc/lsa.c 				   struct torture_context *tctx,
tctx             1504 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_EnumAccountRights(p, tctx, &r);
tctx             1507 source4/torture/rpc/lsa.c 		       dom_sid_string(tctx, sid), nt_errstr(status));
tctx             1516 source4/torture/rpc/lsa.c 			     struct torture_context *tctx,
tctx             1524 source4/torture/rpc/lsa.c 	if (torture_setting_bool(tctx, "samba4", false)) {
tctx             1535 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_QuerySecurity(p, tctx, &r);
tctx             1545 source4/torture/rpc/lsa.c 			     struct torture_context *tctx,
tctx             1560 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_OpenAccount(p, tctx, &r);
tctx             1566 source4/torture/rpc/lsa.c 	if (!test_EnumPrivsAccount(p, tctx, handle, &acct_handle)) {
tctx             1570 source4/torture/rpc/lsa.c 	if (!test_GetSystemAccessAccount(p, tctx, handle, &acct_handle)) {
tctx             1574 source4/torture/rpc/lsa.c 	if (!test_QuerySecurity(p, tctx, handle, &acct_handle)) {
tctx             1582 source4/torture/rpc/lsa.c 			      struct torture_context *tctx,
tctx             1602 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_EnumAccounts(p, tctx, &r);
tctx             1611 source4/torture/rpc/lsa.c 		if (!test_LookupSids(p, tctx, handle, &sids1)) {
tctx             1615 source4/torture/rpc/lsa.c 		if (!test_LookupSids2(p, tctx, handle, &sids1)) {
tctx             1625 source4/torture/rpc/lsa.c 			ret &= test_OpenAccount(p, tctx, handle, sids1.sids[i].sid);
tctx             1626 source4/torture/rpc/lsa.c 			ret &= test_EnumAccountRights(p, tctx, handle, sids1.sids[i].sid);
tctx             1640 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_EnumAccounts(p, tctx, &r);
tctx             1655 source4/torture/rpc/lsa.c 				       struct torture_context *tctx,
tctx             1676 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_LookupPrivDisplayName(p, tctx, &r);
tctx             1689 source4/torture/rpc/lsa.c 					   struct torture_context *tctx,
tctx             1705 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_EnumAccountsWithUserRight(p, tctx, &r);
tctx             1722 source4/torture/rpc/lsa.c 			   struct torture_context *tctx,
tctx             1741 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_EnumPrivs(p, tctx, &r);
tctx             1748 source4/torture/rpc/lsa.c 		test_LookupPrivDisplayName(p, tctx, handle, (struct lsa_String *)&privs1.privs[i].name);
tctx             1749 source4/torture/rpc/lsa.c 		test_LookupPrivValue(p, tctx, handle, (struct lsa_String *)&privs1.privs[i].name);
tctx             1750 source4/torture/rpc/lsa.c 		if (!test_EnumAccountsWithUserRight(p, tctx, handle, (struct lsa_String *)&privs1.privs[i].name)) {
tctx             1759 source4/torture/rpc/lsa.c 					     struct torture_context *tctx,
tctx             1771 source4/torture/rpc/lsa.c 	if (torture_setting_bool(tctx, "samba4", false)) {
tctx             1789 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_lsaRQueryForestTrustInformation(p, tctx, &r);
tctx             1800 source4/torture/rpc/lsa.c 				       struct torture_context *tctx,
tctx             1810 source4/torture/rpc/lsa.c 			ret &= test_QueryForestTrustInformation(p, tctx, handle,
tctx             1819 source4/torture/rpc/lsa.c 				     struct torture_context *tctx,
tctx             1844 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_OpenTrustedDomain(p, tctx, &trust);
tctx             1863 source4/torture/rpc/lsa.c 				status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q);
tctx             1875 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_CloseTrustedDomainEx(p, tctx, &c_trust);
tctx             1884 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_Close(p, tctx, &c);
tctx             1903 source4/torture/rpc/lsa.c 				status = dcerpc_lsa_QueryTrustedDomainInfoBySid(p, tctx, &q);
tctx             1921 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_OpenTrustedDomainByName(p, tctx, &trust_by_name);
tctx             1934 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q);
tctx             1949 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_Close(p, tctx, &c);
tctx             1966 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_QueryTrustedDomainInfoByName(p, tctx, &q);
tctx             1982 source4/torture/rpc/lsa.c 			      struct torture_context *tctx,
tctx             2001 source4/torture/rpc/lsa.c 	enum_status = dcerpc_lsa_EnumTrustDom(p, tctx, &r);
tctx             2023 source4/torture/rpc/lsa.c 		enum_status = dcerpc_lsa_EnumTrustDom(p, tctx, &r);
tctx             2051 source4/torture/rpc/lsa.c 		ret &= test_query_each_TrustDom(p, tctx, handle, &domains);
tctx             2063 source4/torture/rpc/lsa.c 	enum_status = dcerpc_lsa_EnumTrustedDomainsEx(p, tctx, &r_ex);
tctx             2078 source4/torture/rpc/lsa.c 		enum_status = dcerpc_lsa_EnumTrustedDomainsEx(p, tctx, &r_ex);
tctx             2107 source4/torture/rpc/lsa.c 		ret &= test_query_each_TrustDomEx(p, tctx, handle, &domains_ex);
tctx             2115 source4/torture/rpc/lsa.c 				     struct torture_context *tctx,
tctx             2130 source4/torture/rpc/lsa.c 	if (!test_EnumTrustDom(p, tctx, handle)) {
tctx             2135 source4/torture/rpc/lsa.c 		char *trust_name = talloc_asprintf(tctx, "torturedom%02d", i);
tctx             2136 source4/torture/rpc/lsa.c 		char *trust_sid = talloc_asprintf(tctx, "S-1-5-21-97398-379795-100%02d", i);
tctx             2138 source4/torture/rpc/lsa.c 		domsid[i] = dom_sid_parse_talloc(tctx, trust_sid);
tctx             2148 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_CreateTrustedDomain(p, tctx, &r);
tctx             2150 source4/torture/rpc/lsa.c 			test_DeleteTrustedDomain(p, tctx, handle, trustinfo.name);
tctx             2151 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_CreateTrustedDomain(p, tctx, &r);
tctx             2161 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q);
tctx             2193 source4/torture/rpc/lsa.c 	if (!test_EnumTrustDom(p, tctx, handle)) {
tctx             2198 source4/torture/rpc/lsa.c 		if (!test_DeleteTrustedDomainBySid(p, tctx, handle, domsid[i])) {
tctx             2207 source4/torture/rpc/lsa.c 					struct torture_context *tctx,
tctx             2234 source4/torture/rpc/lsa.c 		char *trust_name = talloc_asprintf(tctx, "torturedom%02d", i);
tctx             2235 source4/torture/rpc/lsa.c 		char *trust_name_dns = talloc_asprintf(tctx, "torturedom%02d.samba.example.com", i);
tctx             2236 source4/torture/rpc/lsa.c 		char *trust_sid = talloc_asprintf(tctx, "S-1-5-21-97398-379795-100%02d", i);
tctx             2238 source4/torture/rpc/lsa.c 		domsid[i] = dom_sid_parse_talloc(tctx, trust_sid);
tctx             2263 source4/torture/rpc/lsa.c 		ndr_err = ndr_push_struct_blob(&auth_blob, tctx, lp_iconv_convenience(tctx->lp_ctx), &auth_struct,
tctx             2281 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_CreateTrustedDomainEx2(p, tctx, &r);
tctx             2283 source4/torture/rpc/lsa.c 			test_DeleteTrustedDomain(p, tctx, handle, trustinfo.netbios_name);
tctx             2284 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_CreateTrustedDomainEx2(p, tctx, &r);
tctx             2294 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q);
tctx             2327 source4/torture/rpc/lsa.c 	if (!test_EnumTrustDom(p, tctx, handle)) {
tctx             2333 source4/torture/rpc/lsa.c 		if (!test_DeleteTrustedDomainBySid(p, tctx, handle, domsid[i])) {
tctx             2343 source4/torture/rpc/lsa.c 				 struct torture_context *tctx,
tctx             2361 source4/torture/rpc/lsa.c 		status = dcerpc_lsa_QueryDomainInformationPolicy(p, tctx, &r);
tctx             2379 source4/torture/rpc/lsa.c 					struct torture_context *tctx,
tctx             2406 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_QueryInfoPolicy2(p, tctx,
tctx             2409 source4/torture/rpc/lsa.c 			status = dcerpc_lsa_QueryInfoPolicy(p, tctx, &r);
tctx             2440 source4/torture/rpc/lsa.c 			if (torture_setting_bool(tctx, "samba4", false)) {
tctx             2465 source4/torture/rpc/lsa.c 			tnames.names = talloc_zero_array(tctx, struct lsa_TranslatedName, tnames.count);
tctx             2470 source4/torture/rpc/lsa.c 			tnames.names[2].name.string = talloc_asprintf(tctx, "%s\\", info->dns.name.string);
tctx             2472 source4/torture/rpc/lsa.c 			tnames.names[3].name.string = talloc_asprintf(tctx, "%s\\", info->dns.dns_domain.string);
tctx             2474 source4/torture/rpc/lsa.c 			tnames.names[4].name.string = talloc_asprintf(tctx, "%s\\guest", info->dns.name.string);
tctx             2476 source4/torture/rpc/lsa.c 			tnames.names[5].name.string = talloc_asprintf(tctx, "%s\\krbtgt", info->dns.name.string);
tctx             2478 source4/torture/rpc/lsa.c 			tnames.names[6].name.string = talloc_asprintf(tctx, "%s\\guest", info->dns.dns_domain.string);
tctx             2480 source4/torture/rpc/lsa.c 			tnames.names[7].name.string = talloc_asprintf(tctx, "%s\\krbtgt", info->dns.dns_domain.string);
tctx             2482 source4/torture/rpc/lsa.c 			tnames.names[8].name.string = talloc_asprintf(tctx, "krbtgt@%s", info->dns.name.string);
tctx             2484 source4/torture/rpc/lsa.c 			tnames.names[9].name.string = talloc_asprintf(tctx, "krbtgt@%s", info->dns.dns_domain.string);
tctx             2486 source4/torture/rpc/lsa.c 			tnames.names[10].name.string = talloc_asprintf(tctx, "%s\\"TEST_MACHINENAME "$", info->dns.name.string);
tctx             2488 source4/torture/rpc/lsa.c 			tnames.names[11].name.string = talloc_asprintf(tctx, "%s\\"TEST_MACHINENAME "$", info->dns.dns_domain.string);
tctx             2490 source4/torture/rpc/lsa.c 			tnames.names[12].name.string = talloc_asprintf(tctx, TEST_MACHINENAME "$@%s", info->dns.name.string);
tctx             2492 source4/torture/rpc/lsa.c 			tnames.names[13].name.string = talloc_asprintf(tctx, TEST_MACHINENAME "$@%s", info->dns.dns_domain.string);
tctx             2494 source4/torture/rpc/lsa.c 			ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx             2503 source4/torture/rpc/lsa.c 				 struct torture_context *tctx,
tctx             2506 source4/torture/rpc/lsa.c 	return test_QueryInfoPolicyCalls(false, p, tctx, handle);
tctx             2510 source4/torture/rpc/lsa.c 				  struct torture_context *tctx,
tctx             2513 source4/torture/rpc/lsa.c 	return test_QueryInfoPolicyCalls(true, p, tctx, handle);
tctx             2517 source4/torture/rpc/lsa.c 			     struct torture_context *tctx)
tctx             2532 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_GetUserName(p, tctx, &r);
tctx             2544 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_GetUserName(p, tctx, &r);
tctx             2555 source4/torture/rpc/lsa.c 		    struct torture_context *tctx,
tctx             2567 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_Close(p, tctx, &r);
tctx             2573 source4/torture/rpc/lsa.c 	status = dcerpc_lsa_Close(p, tctx, &r);
tctx             2585 source4/torture/rpc/lsa.c bool torture_rpc_lsa(struct torture_context *tctx)
tctx             2594 source4/torture/rpc/lsa.c 	status = torture_rpc_connection(tctx, &p, &ndr_table_lsarpc);
tctx             2599 source4/torture/rpc/lsa.c 	if (!test_OpenPolicy(p, tctx)) {
tctx             2603 source4/torture/rpc/lsa.c 	if (!test_lsa_OpenPolicy2(p, tctx, &handle)) {
tctx             2608 source4/torture/rpc/lsa.c 		join = torture_join_domain(tctx, TEST_MACHINENAME, ACB_WSTRUST, &machine_creds);
tctx             2612 source4/torture/rpc/lsa.c 		if (!test_LookupNames_wellknown(p, tctx, handle)) {
tctx             2616 source4/torture/rpc/lsa.c 		if (!test_LookupNames_bogus(p, tctx, handle)) {
tctx             2620 source4/torture/rpc/lsa.c 		if (!test_LookupSids_async(p, tctx, handle)) {
tctx             2624 source4/torture/rpc/lsa.c 		if (!test_QueryDomainInfoPolicy(p, tctx, handle)) {
tctx             2628 source4/torture/rpc/lsa.c 		if (!test_CreateAccount(p, tctx, handle)) {
tctx             2632 source4/torture/rpc/lsa.c 		if (!test_CreateSecret(p, tctx, handle)) {
tctx             2635 source4/torture/rpc/lsa.c 		if (!test_CreateTrustedDomain(p, tctx, handle)) {
tctx             2639 source4/torture/rpc/lsa.c 		if (!test_CreateTrustedDomainEx2(p, tctx, handle)) {
tctx             2643 source4/torture/rpc/lsa.c 		if (!test_EnumAccounts(p, tctx, handle)) {
tctx             2647 source4/torture/rpc/lsa.c 		if (!test_EnumPrivs(p, tctx, handle)) {
tctx             2651 source4/torture/rpc/lsa.c 		if (!test_QueryInfoPolicy(p, tctx, handle)) {
tctx             2655 source4/torture/rpc/lsa.c 		if (!test_QueryInfoPolicy2(p, tctx, handle)) {
tctx             2659 source4/torture/rpc/lsa.c 		if (!test_Delete(p, tctx, handle)) {
tctx             2663 source4/torture/rpc/lsa.c 		if (!test_many_LookupSids(p, tctx, handle)) {
tctx             2667 source4/torture/rpc/lsa.c 		if (!test_lsa_Close(p, tctx, handle)) {
tctx             2671 source4/torture/rpc/lsa.c 		torture_leave_domain(tctx, join);
tctx             2674 source4/torture/rpc/lsa.c 		if (!test_many_LookupSids(p, tctx, handle)) {
tctx             2679 source4/torture/rpc/lsa.c 	if (!test_GetUserName(p, tctx)) {
tctx             2686 source4/torture/rpc/lsa.c bool torture_rpc_lsa_get_user(struct torture_context *tctx)
tctx             2692 source4/torture/rpc/lsa.c 	status = torture_rpc_connection(tctx, &p, &ndr_table_lsarpc);
tctx             2697 source4/torture/rpc/lsa.c 	if (!test_GetUserName(p, tctx)) {
tctx             2704 source4/torture/rpc/lsa.c static bool testcase_LookupNames(struct torture_context *tctx,
tctx             2712 source4/torture/rpc/lsa.c 	if (!test_OpenPolicy(p, tctx)) {
tctx             2716 source4/torture/rpc/lsa.c 	if (!test_lsa_OpenPolicy2(p, tctx, &handle)) {
tctx             2725 source4/torture/rpc/lsa.c 	tnames.names = talloc_array(tctx, struct lsa_TranslatedName, tnames.count);
tctx             2730 source4/torture/rpc/lsa.c 	if (!test_LookupNames(p, tctx, handle, &tnames)) {
tctx             2735 source4/torture/rpc/lsa.c 	tnames2.names = talloc_array(tctx, struct lsa_TranslatedName2, tnames2.count);
tctx             2740 source4/torture/rpc/lsa.c 	if (!test_LookupNames2(p, tctx, handle, &tnames2, true)) {
tctx             2744 source4/torture/rpc/lsa.c 	if (!test_LookupNames3(p, tctx, handle, &tnames2, true)) {
tctx             2748 source4/torture/rpc/lsa.c 	if (!test_lsa_Close(p, tctx, handle)) {
tctx              172 source4/torture/rpc/lsa_lookup.c static bool get_downleveltrust(struct torture_context *tctx, struct dcerpc_pipe *p,
tctx              188 source4/torture/rpc/lsa_lookup.c 	status = dcerpc_lsa_EnumTrustDom(p, tctx, &r);
tctx              191 source4/torture/rpc/lsa_lookup.c 		torture_fail(tctx, "no trusts");
tctx              194 source4/torture/rpc/lsa_lookup.c 		torture_fail(tctx, "no trusts");
tctx              209 source4/torture/rpc/lsa_lookup.c 		status = dcerpc_lsa_QueryTrustedDomainInfoBySid(p, tctx, &q);
tctx              219 source4/torture/rpc/lsa_lookup.c 	torture_fail(tctx, "I need a AD DC with an outgoing trust to NT4");
tctx              328 source4/torture/rpc/lsa_lookup.c static bool test_LookupSidsReply(struct torture_context *tctx,
tctx              347 source4/torture/rpc/lsa_lookup.c 	if (!open_policy(tctx, p, &handle)) {
tctx              351 source4/torture/rpc/lsa_lookup.c 	dom_admin_sid = talloc_asprintf(tctx, "%s-%d", dom_sid, 512);
tctx              353 source4/torture/rpc/lsa_lookup.c 	sids = talloc_array(tctx, struct dom_sid *, num_sids);
tctx              355 source4/torture/rpc/lsa_lookup.c 	sids[0] = dom_sid_parse_talloc(tctx, dom_admin_sid);
tctx              361 source4/torture/rpc/lsa_lookup.c 	sidarray.sids = talloc_array(tctx, struct lsa_SidPtr, num_sids);
tctx              376 source4/torture/rpc/lsa_lookup.c 	status = dcerpc_lsa_LookupSids(p, tctx, &r);
tctx              378 source4/torture/rpc/lsa_lookup.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NONE_MAPPED,
tctx              381 source4/torture/rpc/lsa_lookup.c 	torture_assert_int_equal(tctx, names.count, num_sids,
tctx              383 source4/torture/rpc/lsa_lookup.c 	torture_assert(tctx, names.names,
tctx              385 source4/torture/rpc/lsa_lookup.c 	torture_assert_str_equal(tctx, names.names[0].name.string, dom_admin_sid,
tctx              390 source4/torture/rpc/lsa_lookup.c 	torture_assert_int_equal(tctx, domains->count, num_sids,
tctx              392 source4/torture/rpc/lsa_lookup.c 	torture_assert(tctx, domains->domains,
tctx              394 source4/torture/rpc/lsa_lookup.c 	torture_assert_str_equal(tctx, dom_sid_string(tctx, domains->domains[0].sid), dom_sid,
tctx               34 source4/torture/rpc/mgmt.c bool test_inq_if_ids(struct torture_context *tctx, 
tctx               76 source4/torture/rpc/mgmt.c 			per_id_test(tctx, priv, mem_ctx, id);
tctx               42 source4/torture/rpc/netlogon.c static bool test_LogonUasLogon(struct torture_context *tctx, 
tctx               54 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_LogonUasLogon(p, tctx, &r);
tctx               55 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "LogonUasLogon");
tctx               60 source4/torture/rpc/netlogon.c static bool test_LogonUasLogoff(struct torture_context *tctx,
tctx               72 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_LogonUasLogoff(p, tctx, &r);
tctx               73 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "LogonUasLogoff");
tctx               78 source4/torture/rpc/netlogon.c bool test_SetupCredentials(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx               90 source4/torture/rpc/netlogon.c 	mach_password = cli_credentials_get_nt_hash(credentials, tctx);
tctx               93 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing ServerReqChallenge\n");
tctx               95 source4/torture/rpc/netlogon.c 	creds = talloc(tctx, struct creds_CredentialState);
tctx               96 source4/torture/rpc/netlogon.c 	torture_assert(tctx, creds != NULL, "memory allocation");
tctx              105 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerReqChallenge(p, tctx, &r);
tctx              106 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge");
tctx              109 source4/torture/rpc/netlogon.c 	a.in.account_name = talloc_asprintf(tctx, "%s$", machine_name);
tctx              119 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing ServerAuthenticate\n");
tctx              121 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerAuthenticate(p, tctx, &a);
tctx              125 source4/torture/rpc/netlogon.c 		return test_SetupCredentials2(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS, 
tctx              129 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerAuthenticate");
tctx              131 source4/torture/rpc/netlogon.c 	torture_assert(tctx, creds_client_check(creds, &credentials3), 
tctx              138 source4/torture/rpc/netlogon.c bool test_SetupCredentials2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              152 source4/torture/rpc/netlogon.c 	mach_password = cli_credentials_get_nt_hash(machine_credentials, tctx);
tctx              155 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing ServerReqChallenge\n");
tctx              157 source4/torture/rpc/netlogon.c 	creds = talloc(tctx, struct creds_CredentialState);
tctx              158 source4/torture/rpc/netlogon.c 	torture_assert(tctx, creds != NULL, "memory allocation");
tctx              167 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerReqChallenge(p, tctx, &r);
tctx              168 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge");
tctx              171 source4/torture/rpc/netlogon.c 	a.in.account_name = talloc_asprintf(tctx, "%s$", machine_name);
tctx              183 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing ServerAuthenticate2\n");
tctx              185 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerAuthenticate2(p, tctx, &a);
tctx              186 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerAuthenticate2");
tctx              188 source4/torture/rpc/netlogon.c 	torture_assert(tctx, creds_client_check(creds, &credentials3), 
tctx              191 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "negotiate_flags=0x%08x\n", negotiate_flags);
tctx              198 source4/torture/rpc/netlogon.c static bool test_SetupCredentials3(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              216 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing ServerReqChallenge\n");
tctx              218 source4/torture/rpc/netlogon.c 	creds = talloc(tctx, struct creds_CredentialState);
tctx              219 source4/torture/rpc/netlogon.c 	torture_assert(tctx, creds != NULL, "memory allocation");
tctx              228 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerReqChallenge(p, tctx, &r);
tctx              229 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge");
tctx              234 source4/torture/rpc/netlogon.c 	a.in.account_name = talloc_asprintf(tctx, "%s$", machine_name);
tctx              247 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing ServerAuthenticate3\n");
tctx              249 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerAuthenticate3(p, tctx, &a);
tctx              250 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerAuthenticate3");
tctx              251 source4/torture/rpc/netlogon.c 	torture_assert(tctx, creds_client_check(creds, &credentials3), "Credential chaining failed");
tctx              253 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "negotiate_flags=0x%08x\n", negotiate_flags);
tctx              256 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerReqChallenge(p, tctx, &r);
tctx              257 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge");
tctx              266 source4/torture/rpc/netlogon.c static bool test_SetPassword(struct torture_context *tctx, 
tctx              277 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx              281 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              282 source4/torture/rpc/netlogon.c 	r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME);
tctx              289 source4/torture/rpc/netlogon.c 	password = generate_random_str(tctx, 8);
tctx              294 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing ServerPasswordSet on machine account\n");
tctx              295 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Changing machine account password to '%s'\n", 
tctx              300 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerPasswordSet(p, tctx, &r);
tctx              301 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet");
tctx              304 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Credential chaining failed\n");
tctx              311 source4/torture/rpc/netlogon.c 	torture_comment(tctx, 
tctx              313 source4/torture/rpc/netlogon.c 	torture_comment(tctx, 
tctx              318 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerPasswordSet(p, tctx, &r);
tctx              319 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet (2)");
tctx              322 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Credential chaining failed\n");
tctx              327 source4/torture/rpc/netlogon.c 	torture_assert(tctx, 
tctx              328 source4/torture/rpc/netlogon.c 		test_SetupCredentials(p, tctx, machine_credentials, &creds), 
tctx              355 source4/torture/rpc/netlogon.c static bool test_SetPassword2(struct torture_context *tctx, 
tctx              369 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx              373 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              374 source4/torture/rpc/netlogon.c 	r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME);
tctx              381 source4/torture/rpc/netlogon.c 	password = generate_random_str(tctx, 8);
tctx              388 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing ServerPasswordSet2 on machine account\n");
tctx              389 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Changing machine account password to '%s'\n", password);
tctx              393 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r);
tctx              394 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet2");
tctx              397 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Credential chaining failed\n");
tctx              402 source4/torture/rpc/netlogon.c 	if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx              403 source4/torture/rpc/netlogon.c 		torture_comment(tctx, 
tctx              418 source4/torture/rpc/netlogon.c 		torture_comment(tctx, 
tctx              420 source4/torture/rpc/netlogon.c 		torture_comment(tctx, 
tctx              425 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r);
tctx              426 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet2");
tctx              429 source4/torture/rpc/netlogon.c 			torture_comment(tctx, "Credential chaining failed\n");
tctx              435 source4/torture/rpc/netlogon.c 	torture_assert(tctx, test_SetupCredentials(p, tctx, machine_credentials, &creds), 
tctx              439 source4/torture/rpc/netlogon.c 	password = generate_random_str(tctx, 8);
tctx              446 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing second ServerPasswordSet2 on machine account\n");
tctx              447 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Changing machine account password to '%s'\n", password);
tctx              451 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r);
tctx              452 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet2 (2)");
tctx              455 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Credential chaining failed\n");
tctx              462 source4/torture/rpc/netlogon.c 	torture_comment(tctx, 
tctx              464 source4/torture/rpc/netlogon.c 	torture_comment(tctx, 
tctx              469 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r);
tctx              470 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet (3)");
tctx              473 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Credential chaining failed\n");
tctx              478 source4/torture/rpc/netlogon.c 	torture_assert (tctx, 
tctx              479 source4/torture/rpc/netlogon.c 		test_SetupCredentials(p, tctx, machine_credentials, &creds), 
tctx              482 source4/torture/rpc/netlogon.c 	new_random_pass = netlogon_very_rand_pass(tctx, 128);
tctx              492 source4/torture/rpc/netlogon.c 	torture_comment(tctx, 
tctx              497 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r);
tctx              498 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet (3)");
tctx              501 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Credential chaining failed\n");
tctx              509 source4/torture/rpc/netlogon.c 	torture_assert (tctx, 
tctx              510 source4/torture/rpc/netlogon.c 		test_SetupCredentials(p, tctx, machine_credentials, &creds), 
tctx              516 source4/torture/rpc/netlogon.c static bool test_GetPassword(struct torture_context *tctx,
tctx              527 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx              533 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              534 source4/torture/rpc/netlogon.c 	r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME);
tctx              541 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerPasswordGet(p, tctx, &r);
tctx              542 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerPasswordGet");
tctx              547 source4/torture/rpc/netlogon.c static bool test_GetTrustPasswords(struct torture_context *tctx,
tctx              558 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx              564 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              565 source4/torture/rpc/netlogon.c 	r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME);
tctx              573 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerTrustPasswordsGet(p, tctx, &r);
tctx              574 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "ServerTrustPasswordsGet");
tctx              582 source4/torture/rpc/netlogon.c bool test_netlogon_ops(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              596 source4/torture/rpc/netlogon.c 	if (lp_client_lanman_auth(tctx->lp_ctx)) {
tctx              600 source4/torture/rpc/netlogon.c 	if (lp_client_ntlmv2_auth(tctx->lp_ctx)) {
tctx              604 source4/torture/rpc/netlogon.c 	cli_credentials_get_ntlm_username_domain(cmdline_credentials, tctx, 
tctx              613 source4/torture/rpc/netlogon.c 	names_blob = NTLMv2_generate_names_blob(tctx, cli_credentials_get_workstation(credentials), 
tctx              616 source4/torture/rpc/netlogon.c 	status = cli_credentials_get_ntlm_response(cmdline_credentials, tctx, 
tctx              622 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "cli_credentials_get_ntlm_response failed");
tctx              637 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              654 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx              655 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed");
tctx              657 source4/torture/rpc/netlogon.c 		torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred), 
tctx              667 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing SamLogon with validation level %d and a NULL credential\n", i);
tctx              669 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx              670 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_PARAMETER, 
tctx              681 source4/torture/rpc/netlogon.c static bool test_SamLogon(struct torture_context *tctx, 
tctx              687 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials(p, tctx, credentials, &creds)) {
tctx              691 source4/torture/rpc/netlogon.c 	return test_netlogon_ops(p, tctx, credentials, creds);
tctx              700 source4/torture/rpc/netlogon.c static bool test_DatabaseSync(struct torture_context *tctx, 
tctx              712 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx              718 source4/torture/rpc/netlogon.c 	r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              733 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing DatabaseSync of id %d\n", r.in.database_id);
tctx              740 source4/torture/rpc/netlogon.c 			status = dcerpc_netr_DatabaseSync(p, tctx, &r);
tctx              748 source4/torture/rpc/netlogon.c 			torture_assert_ntstatus_ok(tctx, status, "DatabaseSync");
tctx              751 source4/torture/rpc/netlogon.c 				torture_comment(tctx, "Credential chaining failed\n");
tctx              760 source4/torture/rpc/netlogon.c 				torture_comment(tctx, "\tsequence_nums[%d]=%llu\n",
tctx              774 source4/torture/rpc/netlogon.c static bool test_DatabaseDeltas(struct torture_context *tctx, 
tctx              787 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx              791 source4/torture/rpc/netlogon.c 	r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              806 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing DatabaseDeltas of id %d at %llu\n", 
tctx              812 source4/torture/rpc/netlogon.c 			status = dcerpc_netr_DatabaseDeltas(p, tctx, &r);
tctx              815 source4/torture/rpc/netlogon.c 				torture_comment(tctx, "not considering %s to be an error\n",
tctx              822 source4/torture/rpc/netlogon.c 			torture_assert_ntstatus_ok(tctx, status, "DatabaseDeltas");
tctx              825 source4/torture/rpc/netlogon.c 				torture_comment(tctx, "Credential chaining failed\n");
tctx              835 source4/torture/rpc/netlogon.c static bool test_DatabaseRedo(struct torture_context *tctx,
tctx              851 source4/torture/rpc/netlogon.c 	sid = dom_sid_parse_talloc(tctx, "S-1-5-21-1111111111-2222222222-333333333-500");
tctx             1086 source4/torture/rpc/netlogon.c 			.sid			= *dom_sid_parse_talloc(tctx, "S-1-5-32-544"),
tctx             1098 source4/torture/rpc/netlogon.c 			.sid			= *dom_sid_parse_talloc(tctx, "S-1-5-32-544"),
tctx             1111 source4/torture/rpc/netlogon.c 			.sid			= *dom_sid_parse_talloc(tctx, "S-1-5-32-544"),
tctx             1172 source4/torture/rpc/netlogon.c 			.sid			= *dom_sid_parse_talloc(tctx, "S-1-5-32"),
tctx             1195 source4/torture/rpc/netlogon.c 			.sid			= *dom_sid_parse_talloc(tctx, "S-1-1-0"),
tctx             1208 source4/torture/rpc/netlogon.c 			.sid			= *dom_sid_parse_talloc(tctx, "S-1-1-0"),
tctx             1221 source4/torture/rpc/netlogon.c 			.sid			= *dom_sid_parse_talloc(tctx, "S-1-1-0"),
tctx             1267 source4/torture/rpc/netlogon.c 	r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1291 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing DatabaseRedo\n");
tctx             1293 source4/torture/rpc/netlogon.c 		if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx             1327 source4/torture/rpc/netlogon.c 			torture_comment(tctx, "Testing DatabaseRedo with database %s and %s\n",
tctx             1330 source4/torture/rpc/netlogon.c 			status = dcerpc_netr_DatabaseRedo(p, tctx, &r);
tctx             1335 source4/torture/rpc/netlogon.c 			torture_assert_ntstatus_equal(tctx, status, changes[i].expected_error, changes[i].comment);
tctx             1337 source4/torture/rpc/netlogon.c 				torture_assert_int_equal(tctx,
tctx             1342 source4/torture/rpc/netlogon.c 					torture_assert_int_equal(tctx,
tctx             1348 source4/torture/rpc/netlogon.c 					torture_assert_int_equal(tctx,
tctx             1356 source4/torture/rpc/netlogon.c 				torture_comment(tctx, "Credential chaining failed\n");
tctx             1357 source4/torture/rpc/netlogon.c 				if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx             1371 source4/torture/rpc/netlogon.c static bool test_AccountDeltas(struct torture_context *tctx, 
tctx             1385 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx             1391 source4/torture/rpc/netlogon.c 	r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1406 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_AccountDeltas(p, tctx, &r);
tctx             1407 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "AccountDeltas");
tctx             1415 source4/torture/rpc/netlogon.c static bool test_AccountSync(struct torture_context *tctx, struct dcerpc_pipe *p, 
tctx             1432 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx             1436 source4/torture/rpc/netlogon.c 	r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1452 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_AccountSync(p, tctx, &r);
tctx             1453 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "AccountSync");
tctx             1461 source4/torture/rpc/netlogon.c static bool test_GetDcName(struct torture_context *tctx, 
tctx             1468 source4/torture/rpc/netlogon.c 	r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1469 source4/torture/rpc/netlogon.c 	r.in.domainname = lp_workgroup(tctx->lp_ctx);
tctx             1472 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_GetDcName(p, tctx, &r);
tctx             1473 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "GetDcName");
tctx             1474 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "GetDcName");
tctx             1476 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "\tDC is at '%s'\n", dcname);
tctx             1484 source4/torture/rpc/netlogon.c static bool test_LogonControl(struct torture_context *tctx, 
tctx             1492 source4/torture/rpc/netlogon.c 	r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1499 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing LogonControl level %d\n", i);
tctx             1501 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_LogonControl(p, tctx, &r);
tctx             1502 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx             1512 source4/torture/rpc/netlogon.c static bool test_GetAnyDCName(struct torture_context *tctx, 
tctx             1519 source4/torture/rpc/netlogon.c 	r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1520 source4/torture/rpc/netlogon.c 	r.in.domainname = lp_workgroup(tctx->lp_ctx);
tctx             1523 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_GetAnyDCName(p, tctx, &r);
tctx             1524 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "GetAnyDCName");
tctx             1525 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "GetAnyDCName");
tctx             1528 source4/torture/rpc/netlogon.c 	    torture_comment(tctx, "\tDC is at '%s'\n", dcname);
tctx             1538 source4/torture/rpc/netlogon.c static bool test_LogonControl2(struct torture_context *tctx, 
tctx             1547 source4/torture/rpc/netlogon.c 	data.domain = lp_workgroup(tctx->lp_ctx);
tctx             1549 source4/torture/rpc/netlogon.c 	r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1558 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing LogonControl2 level %d function %d\n", 
tctx             1561 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_LogonControl2(p, tctx, &r);
tctx             1562 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx             1565 source4/torture/rpc/netlogon.c 	data.domain = lp_workgroup(tctx->lp_ctx);
tctx             1573 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing LogonControl2 level %d function %d\n", 
tctx             1576 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_LogonControl2(p, tctx, &r);
tctx             1577 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx             1580 source4/torture/rpc/netlogon.c 	data.domain = lp_workgroup(tctx->lp_ctx);
tctx             1588 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing LogonControl2 level %d function %d\n", 
tctx             1591 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_LogonControl2(p, tctx, &r);
tctx             1592 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx             1603 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing LogonControl2 level %d function %d\n", 
tctx             1606 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_LogonControl2(p, tctx, &r);
tctx             1607 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx             1616 source4/torture/rpc/netlogon.c static bool test_DatabaseSync2(struct torture_context *tctx, 
tctx             1629 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials2(p, tctx, NETLOGON_NEG_AUTH2_FLAGS, 
tctx             1637 source4/torture/rpc/netlogon.c 	r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1653 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing DatabaseSync2 of id %d\n", r.in.database_id);
tctx             1660 source4/torture/rpc/netlogon.c 			status = dcerpc_netr_DatabaseSync2(p, tctx, &r);
tctx             1669 source4/torture/rpc/netlogon.c 			torture_assert_ntstatus_ok(tctx, status, "DatabaseSync2");
tctx             1672 source4/torture/rpc/netlogon.c 				torture_comment(tctx, "Credential chaining failed\n");
tctx             1685 source4/torture/rpc/netlogon.c static bool test_LogonControl2Ex(struct torture_context *tctx, 
tctx             1694 source4/torture/rpc/netlogon.c 	data.domain = lp_workgroup(tctx->lp_ctx);
tctx             1696 source4/torture/rpc/netlogon.c 	r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1705 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n", 
tctx             1708 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_LogonControl2Ex(p, tctx, &r);
tctx             1709 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx             1712 source4/torture/rpc/netlogon.c 	data.domain = lp_workgroup(tctx->lp_ctx);
tctx             1720 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n", 
tctx             1723 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_LogonControl2Ex(p, tctx, &r);
tctx             1724 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx             1727 source4/torture/rpc/netlogon.c 	data.domain = lp_workgroup(tctx->lp_ctx);
tctx             1735 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n", 
tctx             1738 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_LogonControl2Ex(p, tctx, &r);
tctx             1739 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx             1750 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n", 
tctx             1753 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_LogonControl2Ex(p, tctx, &r);
tctx             1754 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx             1760 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetForestTrustInformation(struct torture_context *tctx, 
tctx             1769 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1774 source4/torture/rpc/netlogon.c 	torture_comment(tctx ,"Testing netr_DsRGetForestTrustInformation\n");
tctx             1776 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_DsRGetForestTrustInformation(p, tctx, &r);
tctx             1777 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "DsRGetForestTrustInformation");
tctx             1778 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "DsRGetForestTrustInformation");
tctx             1786 source4/torture/rpc/netlogon.c static bool test_DsrEnumerateDomainTrusts(struct torture_context *tctx, 
tctx             1794 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1798 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_DsrEnumerateDomainTrusts(p, tctx, &r);
tctx             1799 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "DsrEnumerateDomaintrusts");
tctx             1800 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "DsrEnumerateDomaintrusts");
tctx             1807 source4/torture/rpc/netlogon.c 		if (!test_netr_DsRGetForestTrustInformation(tctx, p, NULL)) {
tctx             1817 source4/torture/rpc/netlogon.c 			if (!test_netr_DsRGetForestTrustInformation(tctx, p, 
tctx             1827 source4/torture/rpc/netlogon.c static bool test_netr_NetrEnumerateTrustedDomains(struct torture_context *tctx,
tctx             1834 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1837 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_NetrEnumerateTrustedDomains(p, tctx, &r);
tctx             1838 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "netr_NetrEnumerateTrustedDomains");
tctx             1839 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "NetrEnumerateTrustedDomains");
tctx             1844 source4/torture/rpc/netlogon.c static bool test_netr_NetrEnumerateTrustedDomainsEx(struct torture_context *tctx,
tctx             1851 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1854 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_NetrEnumerateTrustedDomainsEx(p, tctx, &r);
tctx             1855 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "netr_NetrEnumerateTrustedDomainsEx");
tctx             1856 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "NetrEnumerateTrustedDomainsEx");
tctx             1862 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetSiteName(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1870 source4/torture/rpc/netlogon.c 	if (torture_setting_bool(tctx, "samba4", false))
tctx             1871 source4/torture/rpc/netlogon.c 		torture_skip(tctx, "skipping DsRGetSiteName test against Samba4");
tctx             1875 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing netr_DsRGetSiteName\n");
tctx             1877 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_DsRGetSiteName(p, tctx, &r);
tctx             1878 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "DsRGetSiteName");
tctx             1879 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "DsRGetSiteName");
tctx             1880 source4/torture/rpc/netlogon.c 	torture_assert_str_equal(tctx, expected_site, site, "netr_DsRGetSiteName");
tctx             1882 source4/torture/rpc/netlogon.c 	r.in.computer_name		= talloc_asprintf(tctx, "\\\\%s", computer_name);
tctx             1883 source4/torture/rpc/netlogon.c 	torture_comment(tctx, 
tctx             1886 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_DsRGetSiteName(p, tctx, &r);
tctx             1887 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "DsRGetSiteName");
tctx             1888 source4/torture/rpc/netlogon.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_COMPUTERNAME, "netr_DsRGetSiteName");
tctx             1896 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetDCName(struct torture_context *tctx, 
tctx             1903 source4/torture/rpc/netlogon.c 	r.in.server_unc		= talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1904 source4/torture/rpc/netlogon.c 	r.in.domain_name	= talloc_asprintf(tctx, "%s", lp_realm(tctx->lp_ctx));
tctx             1910 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_DsRGetDCName(p, tctx, &r);
tctx             1911 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "DsRGetDCName");
tctx             1912 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "DsRGetDCName");
tctx             1913 source4/torture/rpc/netlogon.c 	return test_netr_DsRGetSiteName(p, tctx, 
tctx             1921 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetDCNameEx(struct torture_context *tctx, 
tctx             1928 source4/torture/rpc/netlogon.c 	r.in.server_unc		= talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1929 source4/torture/rpc/netlogon.c 	r.in.domain_name	= talloc_asprintf(tctx, "%s", lp_realm(tctx->lp_ctx));
tctx             1935 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_DsRGetDCNameEx(p, tctx, &r);
tctx             1936 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "netr_DsRGetDCNameEx");
tctx             1937 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "netr_DsRGetDCNameEx");
tctx             1939 source4/torture/rpc/netlogon.c 	return test_netr_DsRGetSiteName(p, tctx, info->dc_unc,
tctx             1946 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetDCNameEx2(struct torture_context *tctx, 
tctx             1953 source4/torture/rpc/netlogon.c 	r.in.server_unc		= talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1956 source4/torture/rpc/netlogon.c 	r.in.domain_name	= talloc_asprintf(tctx, "%s", lp_realm(tctx->lp_ctx));
tctx             1962 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing netr_DsRGetDCNameEx2 without client account\n");
tctx             1964 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_DsRGetDCNameEx2(p, tctx, &r);
tctx             1965 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "netr_DsRGetDCNameEx2");
tctx             1966 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "netr_DsRGetDCNameEx2");
tctx             1968 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing netr_DsRGetDCNameEx2 with client acount\n");
tctx             1974 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_DsRGetDCNameEx2(p, tctx, &r);
tctx             1975 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "netr_DsRGetDCNameEx2");
tctx             1976 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "netr_DsRGetDCNameEx2");
tctx             1977 source4/torture/rpc/netlogon.c 	return test_netr_DsRGetSiteName(p, tctx, info->dc_unc,
tctx             1981 source4/torture/rpc/netlogon.c static bool test_netr_DsrGetDcSiteCoverageW(struct torture_context *tctx, 
tctx             1988 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1991 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_DsrGetDcSiteCoverageW(p, tctx, &r);
tctx             1992 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "failed");
tctx             1993 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "failed");
tctx             1998 source4/torture/rpc/netlogon.c static bool test_netr_DsRAddressToSitenamesW(struct torture_context *tctx,
tctx             2006 source4/torture/rpc/netlogon.c 	ctr = talloc(tctx, struct netr_DsRAddressToSitenamesWCtr);
tctx             2009 source4/torture/rpc/netlogon.c 	addr.buffer = talloc_zero_array(tctx, uint8_t, addr.size);
tctx             2017 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             2019 source4/torture/rpc/netlogon.c 	r.in.addresses = talloc_zero_array(tctx, struct netr_DsRAddress, r.in.count);
tctx             2023 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_DsRAddressToSitenamesW(p, tctx, &r);
tctx             2024 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "failed");
tctx             2025 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "failed");
tctx             2030 source4/torture/rpc/netlogon.c static bool test_netr_DsRAddressToSitenamesExW(struct torture_context *tctx,
tctx             2038 source4/torture/rpc/netlogon.c 	ctr = talloc(tctx, struct netr_DsRAddressToSitenamesExWCtr);
tctx             2041 source4/torture/rpc/netlogon.c 	addr.buffer = talloc_zero_array(tctx, uint8_t, addr.size);
tctx             2049 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             2051 source4/torture/rpc/netlogon.c 	r.in.addresses = talloc_zero_array(tctx, struct	netr_DsRAddress, r.in.count);
tctx             2055 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_DsRAddressToSitenamesExW(p, tctx, &r);
tctx             2056 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "failed");
tctx             2057 source4/torture/rpc/netlogon.c 	torture_assert_werr_ok(tctx, r.out.result, "failed");
tctx             2062 source4/torture/rpc/netlogon.c static bool test_netr_ServerGetTrustInfo(struct torture_context *tctx,
tctx             2077 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials3(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS,
tctx             2084 source4/torture/rpc/netlogon.c 	r.in.server_name		= talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             2085 source4/torture/rpc/netlogon.c 	r.in.account_name		= talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME);
tctx             2095 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_ServerGetTrustInfo(p, tctx, &r);
tctx             2096 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "failed");
tctx             2097 source4/torture/rpc/netlogon.c 	torture_assert(tctx, creds_client_check(creds, &return_authenticator.cred), "Credential chaining failed");
tctx             2103 source4/torture/rpc/netlogon.c static bool test_GetDomainInfo(struct torture_context *tctx, 
tctx             2114 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials3(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS, 
tctx             2123 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             2142 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing netr_LogonGetDomainInfo\n");
tctx             2144 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_LogonGetDomainInfo(p, tctx, &r);
tctx             2145 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "netr_LogonGetDomainInfo");
tctx             2146 source4/torture/rpc/netlogon.c 	torture_assert(tctx, creds_client_check(creds, &a.cred), "Credential chaining failed");
tctx             2148 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing netr_LogonGetDomainInfo 2nd call\n");
tctx             2151 source4/torture/rpc/netlogon.c 	status = dcerpc_netr_LogonGetDomainInfo(p, tctx, &r);
tctx             2152 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "netr_LogonGetDomainInfo");
tctx             2153 source4/torture/rpc/netlogon.c 	torture_assert(tctx, creds_client_check(creds, &a.cred), "Credential chaining failed");
tctx             2167 source4/torture/rpc/netlogon.c static bool test_GetDomainInfo_async(struct torture_context *tctx, 
tctx             2180 source4/torture/rpc/netlogon.c 	int *async_counter = talloc(tctx, int);
tctx             2183 source4/torture/rpc/netlogon.c 	if (!test_SetupCredentials3(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS, 
tctx             2189 source4/torture/rpc/netlogon.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             2208 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Testing netr_LogonGetDomainInfo - async count %d\n", ASYNC_COUNT);
tctx             2216 source4/torture/rpc/netlogon.c 		req[i] = dcerpc_netr_LogonGetDomainInfo_send(p, tctx, &r);
tctx             2223 source4/torture/rpc/netlogon.c 		torture_assert_int_equal(tctx, event_loop_once(dcerpc_event_context(p)), 0, 
tctx             2230 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "netr_LogonGetDomainInfo_async");
tctx             2231 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, r.out.result, "netr_LogonGetDomainInfo_async"); 
tctx             2233 source4/torture/rpc/netlogon.c 		torture_assert(tctx, creds_client_check(creds_async[i], &a.cred), 
tctx             2237 source4/torture/rpc/netlogon.c 	torture_comment(tctx, 
tctx             2240 source4/torture/rpc/netlogon.c 	torture_assert_int_equal(tctx, (*async_counter), ASYNC_COUNT, "int");
tctx             2245 source4/torture/rpc/netlogon.c static bool test_ManyGetDCName(struct torture_context *tctx, 
tctx             2267 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Torturing GetDCName\n");
tctx             2270 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to create secondary connection");
tctx             2273 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to create bind on secondary connection");
tctx             2292 source4/torture/rpc/netlogon.c 	status = dcerpc_lsa_OpenPolicy2(p2, tctx, &o);
tctx             2293 source4/torture/rpc/netlogon.c 	torture_assert_ntstatus_ok(tctx, status, "OpenPolicy2 failed");
tctx             2301 source4/torture/rpc/netlogon.c 	status = dcerpc_lsa_EnumTrustDom(p2, tctx, &t);
tctx             2305 source4/torture/rpc/netlogon.c 		torture_fail(tctx, "Could not list domains");
tctx             2309 source4/torture/rpc/netlogon.c 	d.in.logon_server = talloc_asprintf(tctx, "\\\\%s",
tctx             2319 source4/torture/rpc/netlogon.c 		status = dcerpc_netr_GetAnyDCName(p, tctx, &d);
tctx             2320 source4/torture/rpc/netlogon.c 		torture_assert_ntstatus_ok(tctx, status, "GetAnyDCName");
tctx             2322 source4/torture/rpc/netlogon.c 		torture_comment(tctx, "\tDC for domain %s is %s\n", info->name.string,
tctx                2 source4/torture/rpc/netlogon.h bool test_SetupCredentials2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx               29 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetVersion(struct torture_context *tctx,
tctx               38 source4/torture/rpc/ntsvcs.c 	status = dcerpc_PNP_GetVersion(p, tctx, &r);
tctx               40 source4/torture/rpc/ntsvcs.c 	torture_assert_ntstatus_ok(tctx, status, "PNP_GetVersion");
tctx               41 source4/torture/rpc/ntsvcs.c 	torture_assert_werr_ok(tctx, r.out.result, "PNP_GetVersion");
tctx               42 source4/torture/rpc/ntsvcs.c 	torture_assert_int_equal(tctx, version, 0x400, "invalid version");
tctx               47 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetDeviceListSize(struct torture_context *tctx,
tctx               57 source4/torture/rpc/ntsvcs.c 	torture_assert_ntstatus_ok(tctx,
tctx               58 source4/torture/rpc/ntsvcs.c 		dcerpc_PNP_GetDeviceListSize(p, tctx, &r),
tctx               60 source4/torture/rpc/ntsvcs.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_CM_INVALID_POINTER,
tctx               65 source4/torture/rpc/ntsvcs.c 	torture_assert_ntstatus_ok(tctx,
tctx               66 source4/torture/rpc/ntsvcs.c 		dcerpc_PNP_GetDeviceListSize(p, tctx, &r),
tctx               68 source4/torture/rpc/ntsvcs.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx               74 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetDeviceList(struct torture_context *tctx,
tctx               81 source4/torture/rpc/ntsvcs.c 	buffer = talloc_array(tctx, uint16_t, 0);
tctx               89 source4/torture/rpc/ntsvcs.c 	torture_assert_ntstatus_ok(tctx,
tctx               90 source4/torture/rpc/ntsvcs.c 		dcerpc_PNP_GetDeviceList(p, tctx, &r),
tctx               92 source4/torture/rpc/ntsvcs.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_CM_INVALID_POINTER,
tctx               97 source4/torture/rpc/ntsvcs.c 	torture_assert_ntstatus_ok(tctx,
tctx               98 source4/torture/rpc/ntsvcs.c 		dcerpc_PNP_GetDeviceList(p, tctx, &r),
tctx              108 source4/torture/rpc/ntsvcs.c 		torture_assert_ntstatus_ok(tctx,
tctx              109 source4/torture/rpc/ntsvcs.c 			dcerpc_PNP_GetDeviceListSize(p, tctx, &s),
tctx              111 source4/torture/rpc/ntsvcs.c 		torture_assert_werr_ok(tctx, s.out.result,
tctx              115 source4/torture/rpc/ntsvcs.c 	buffer = talloc_array(tctx, uint16_t, length);
tctx              121 source4/torture/rpc/ntsvcs.c 	torture_assert_ntstatus_ok(tctx,
tctx              122 source4/torture/rpc/ntsvcs.c 		dcerpc_PNP_GetDeviceList(p, tctx, &r),
tctx              125 source4/torture/rpc/ntsvcs.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              131 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetDeviceRegProp(struct torture_context *tctx,
tctx              142 source4/torture/rpc/ntsvcs.c 	buffer = talloc(tctx, uint8_t);
tctx              155 source4/torture/rpc/ntsvcs.c 	status = dcerpc_PNP_GetDeviceRegProp(p, tctx, &r);
tctx              156 source4/torture/rpc/ntsvcs.c 	torture_assert_ntstatus_ok(tctx, status, "PNP_GetDeviceRegProp");
tctx              160 source4/torture/rpc/ntsvcs.c 		buffer = talloc_array(tctx, uint8_t, needed);
tctx              163 source4/torture/rpc/ntsvcs.c 		status = dcerpc_PNP_GetDeviceRegProp(p, tctx, &r);
tctx              164 source4/torture/rpc/ntsvcs.c 		torture_assert_ntstatus_ok(tctx, status, "PNP_GetDeviceRegProp");
tctx               34 source4/torture/rpc/oxidresolve.c static bool test_RemoteActivation(struct torture_context *tctx, 
tctx               43 source4/torture/rpc/oxidresolve.c 	status = torture_rpc_connection(tctx, &p, 
tctx               64 source4/torture/rpc/oxidresolve.c 	status = dcerpc_RemoteActivation(p, tctx, &r);
tctx               88 source4/torture/rpc/oxidresolve.c static bool test_SimplePing(struct torture_context *tctx, 
tctx               97 source4/torture/rpc/oxidresolve.c 	status = dcerpc_SimplePing(p, tctx, &r);
tctx               98 source4/torture/rpc/oxidresolve.c 	torture_assert_ntstatus_ok(tctx, status, "SimplePing");
tctx               99 source4/torture/rpc/oxidresolve.c 	torture_assert_werr_ok(tctx, r.out.result, "SimplePing");
tctx              104 source4/torture/rpc/oxidresolve.c static bool test_ComplexPing(struct torture_context *tctx, 
tctx              113 source4/torture/rpc/oxidresolve.c 	if (!test_RemoteActivation(tctx, &oxid, &oid))
tctx              124 source4/torture/rpc/oxidresolve.c 	status = dcerpc_ComplexPing(p, tctx, &r);
tctx              140 source4/torture/rpc/oxidresolve.c static bool test_ServerAlive(struct torture_context *tctx, 
tctx              146 source4/torture/rpc/oxidresolve.c 	status = dcerpc_ServerAlive(p, tctx, &r);
tctx              147 source4/torture/rpc/oxidresolve.c 	torture_assert_ntstatus_ok(tctx, status, "ServerAlive");
tctx              148 source4/torture/rpc/oxidresolve.c 	torture_assert_werr_ok(tctx, r.out.result, "ServerAlive");
tctx              153 source4/torture/rpc/oxidresolve.c static bool test_ResolveOxid(struct torture_context *tctx, 
tctx              162 source4/torture/rpc/oxidresolve.c 	if (!test_RemoteActivation(tctx, &oxid, &oid))
tctx              169 source4/torture/rpc/oxidresolve.c 	status = dcerpc_ResolveOxid(p, tctx, &r);
tctx              170 source4/torture/rpc/oxidresolve.c 	torture_assert_ntstatus_ok(tctx, status, "ResolveOxid");
tctx              171 source4/torture/rpc/oxidresolve.c 	torture_assert_werr_ok(tctx, r.out.result, "ResolveOxid");
tctx              176 source4/torture/rpc/oxidresolve.c static bool test_ResolveOxid2(struct torture_context *tctx, 
tctx              185 source4/torture/rpc/oxidresolve.c 	if (!test_RemoteActivation(tctx, &oxid, &oid))
tctx              192 source4/torture/rpc/oxidresolve.c 	status = dcerpc_ResolveOxid2(p, tctx, &r);
tctx              193 source4/torture/rpc/oxidresolve.c 	torture_assert_ntstatus_ok(tctx, status, "ResolveOxid2");
tctx              195 source4/torture/rpc/oxidresolve.c 	torture_assert_werr_ok(tctx, r.out.result, "ResolveOxid2");
tctx              197 source4/torture/rpc/oxidresolve.c 	torture_comment(tctx, "Remote server versions: %d, %d\n", r.out.ComVersion->MajorVersion, r.out.ComVersion->MinorVersion);
tctx              202 source4/torture/rpc/oxidresolve.c static bool test_ServerAlive2(struct torture_context *tctx, 
tctx              208 source4/torture/rpc/oxidresolve.c 	status = dcerpc_ServerAlive2(p, tctx, &r);
tctx              209 source4/torture/rpc/oxidresolve.c 	torture_assert_ntstatus_ok(tctx, status, "ServerAlive2");
tctx              210 source4/torture/rpc/oxidresolve.c 	torture_assert_werr_ok(tctx, r.out.result, "ServerAlive2");
tctx               31 source4/torture/rpc/remact.c static bool test_RemoteActivation(struct torture_context *tctx, 
tctx               51 source4/torture/rpc/remact.c 	status = dcerpc_RemoteActivation(p, tctx, &r);
tctx               52 source4/torture/rpc/remact.c 	torture_assert_ntstatus_ok(tctx, status, "RemoteActivation");
tctx               54 source4/torture/rpc/remact.c 	torture_assert_werr_ok(tctx, r.out.result, "RemoteActivation");
tctx               56 source4/torture/rpc/remact.c 	torture_assert_werr_ok(tctx, *r.out.hr, "RemoteActivation");
tctx               58 source4/torture/rpc/remact.c 	torture_assert_werr_ok(tctx, r.out.results[0], "RemoteActivation");
tctx               64 source4/torture/rpc/remact.c 	status = dcerpc_RemoteActivation(p, tctx, &r);
tctx               65 source4/torture/rpc/remact.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx               68 source4/torture/rpc/remact.c 	torture_assert_werr_ok(tctx, r.out.result, 
tctx               71 source4/torture/rpc/remact.c 	torture_assert_werr_ok(tctx, *r.out.hr, "RemoteActivation(GetClassObject)");
tctx               73 source4/torture/rpc/remact.c 	torture_assert_werr_ok(tctx, r.out.results[0], 
tctx               43 source4/torture/rpc/remote_pac.c static bool test_PACVerify(struct torture_context *tctx, 
tctx               73 source4/torture/rpc/remote_pac.c 	TALLOC_CTX *tmp_ctx = talloc_new(tctx);
tctx               75 source4/torture/rpc/remote_pac.c 	torture_assert(tctx, tmp_ctx != NULL, "talloc_new() failed");
tctx               77 source4/torture/rpc/remote_pac.c 	if (!test_SetupCredentials2(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS, 
tctx               83 source4/torture/rpc/remote_pac.c 	status = torture_temp_dir(tctx, "PACVerify", &tmp_dir);
tctx               84 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_ok(tctx, status, "torture_temp_dir failed");
tctx               86 source4/torture/rpc/remote_pac.c 	status = gensec_client_start(tctx, &gensec_client_context, tctx->ev, 
tctx               87 source4/torture/rpc/remote_pac.c 				     lp_gensec_settings(tctx, tctx->lp_ctx));
tctx               88 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_ok(tctx, status, "gensec_client_start (client) failed");
tctx               93 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_ok(tctx, status, "gensec_set_credentials (client) failed");
tctx               96 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_ok(tctx, status, "gensec_start_mech_by_sasl_name (client) failed");
tctx               98 source4/torture/rpc/remote_pac.c 	status = gensec_server_start(tctx, tctx->ev, 
tctx               99 source4/torture/rpc/remote_pac.c 				     lp_gensec_settings(tctx, tctx->lp_ctx), 
tctx              101 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_ok(tctx, status, "gensec_server_start (server) failed");
tctx              104 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_ok(tctx, status, "gensec_set_credentials (server) failed");
tctx              107 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_ok(tctx, status, "gensec_start_mech_by_sasl_name (server) failed");
tctx              115 source4/torture/rpc/remote_pac.c 			torture_assert_ntstatus_ok(tctx, status, "gensec_update (client) failed");
tctx              120 source4/torture/rpc/remote_pac.c 			torture_assert_ntstatus_ok(tctx, status, "gensec_update (server) failed");
tctx              131 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_ok(tctx, status, "gensec_session_info failed");
tctx              147 source4/torture/rpc/remote_pac.c 	ndr_err = ndr_push_struct_blob(&pac_wrapped, tmp_ctx, lp_iconv_convenience(tctx->lp_ctx), &pac_wrapped_struct,
tctx              149 source4/torture/rpc/remote_pac.c 	torture_assert(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), "ndr_push_struct_blob of PACValidate structure failed");
tctx              151 source4/torture/rpc/remote_pac.c 	torture_assert(tctx, (creds->negotiate_flags & NETLOGON_NEG_ARCFOUR), "not willing to even try a PACValidate without RC4 encryption");
tctx              176 source4/torture/rpc/remote_pac.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              183 source4/torture/rpc/remote_pac.c 	status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx              185 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed");
tctx              198 source4/torture/rpc/remote_pac.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              202 source4/torture/rpc/remote_pac.c 	status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx              204 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_LOGON_FAILURE, "LogonSamLogon failed");
tctx              206 source4/torture/rpc/remote_pac.c 	torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred), 
tctx              220 source4/torture/rpc/remote_pac.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              224 source4/torture/rpc/remote_pac.c 	status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx              226 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_PARAMETER, "LogonSamLogon failed");
tctx              228 source4/torture/rpc/remote_pac.c 	torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred), 
tctx              249 source4/torture/rpc/remote_pac.c 	ndr_err = ndr_push_struct_blob(&pac_wrapped, tmp_ctx, lp_iconv_convenience(tctx->lp_ctx), &pac_wrapped_struct,
tctx              251 source4/torture/rpc/remote_pac.c 	torture_assert(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), "ndr_push_struct_blob of PACValidate structure failed");
tctx              253 source4/torture/rpc/remote_pac.c 	torture_assert(tctx, (creds->negotiate_flags & NETLOGON_NEG_ARCFOUR), "not willing to even try a PACValidate without RC4 encryption");
tctx              267 source4/torture/rpc/remote_pac.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              271 source4/torture/rpc/remote_pac.c 	status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx              273 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_LOGON_FAILURE, "LogonSamLogon failed");
tctx              275 source4/torture/rpc/remote_pac.c 	torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred), 
tctx              296 source4/torture/rpc/remote_pac.c 	ndr_err = ndr_push_struct_blob(&pac_wrapped, tmp_ctx, lp_iconv_convenience(tctx->lp_ctx), &pac_wrapped_struct,
tctx              298 source4/torture/rpc/remote_pac.c 	torture_assert(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), "ndr_push_struct_blob of PACValidate structure failed");
tctx              300 source4/torture/rpc/remote_pac.c 	torture_assert(tctx, (creds->negotiate_flags & NETLOGON_NEG_ARCFOUR), "not willing to even try a PACValidate without RC4 encryption");
tctx              314 source4/torture/rpc/remote_pac.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              318 source4/torture/rpc/remote_pac.c 	status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx              320 source4/torture/rpc/remote_pac.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_PARAMETER, "LogonSamLogon failed");
tctx              322 source4/torture/rpc/remote_pac.c 	torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred), 
tctx               47 source4/torture/rpc/rpc.c NTSTATUS torture_rpc_binding(struct torture_context *tctx,
tctx               51 source4/torture/rpc/rpc.c 	const char *binding_string = torture_setting_string(tctx, "binding", 
tctx               55 source4/torture/rpc/rpc.c 		torture_comment(tctx, 
tctx               60 source4/torture/rpc/rpc.c 	status = dcerpc_parse_binding(tctx, binding_string, binding);
tctx               73 source4/torture/rpc/rpc.c _PUBLIC_ NTSTATUS torture_rpc_connection(struct torture_context *tctx,
tctx               80 source4/torture/rpc/rpc.c 	dcerpc_init(tctx->lp_ctx);
tctx               82 source4/torture/rpc/rpc.c 	status = torture_rpc_binding(tctx, &binding);
tctx               86 source4/torture/rpc/rpc.c 	status = dcerpc_pipe_connect_b(tctx, 
tctx               88 source4/torture/rpc/rpc.c 				     cmdline_credentials, tctx->ev, tctx->lp_ctx);
tctx               92 source4/torture/rpc/rpc.c 			   dcerpc_binding_string(tctx, binding), nt_errstr(status));
tctx              101 source4/torture/rpc/rpc.c NTSTATUS torture_rpc_connection_transport(struct torture_context *tctx, 
tctx              110 source4/torture/rpc/rpc.c 	status = torture_rpc_binding(tctx, &binding);
tctx              117 source4/torture/rpc/rpc.c 	status = dcerpc_pipe_connect_b(tctx, p, binding, table,
tctx              118 source4/torture/rpc/rpc.c 				       cmdline_credentials, tctx->ev, tctx->lp_ctx);
tctx              127 source4/torture/rpc/rpc.c static bool torture_rpc_setup_machine(struct torture_context *tctx,
tctx              132 source4/torture/rpc/rpc.c 	struct torture_rpc_tcase *tcase = talloc_get_type(tctx->active_tcase, 
tctx              136 source4/torture/rpc/rpc.c 	status = torture_rpc_binding(tctx, &binding);
tctx              140 source4/torture/rpc/rpc.c 	*data = tcase_data = talloc_zero(tctx, struct torture_rpc_tcase_data);
tctx              142 source4/torture/rpc/rpc.c 	tcase_data->join_ctx = torture_join_domain(tctx, tcase->machine_name,
tctx              146 source4/torture/rpc/rpc.c 	    torture_fail(tctx, "Failed to join as BDC");
tctx              148 source4/torture/rpc/rpc.c 	status = dcerpc_pipe_connect_b(tctx, 
tctx              152 source4/torture/rpc/rpc.c 				tcase_data->credentials, tctx->ev, tctx->lp_ctx);
tctx              154 source4/torture/rpc/rpc.c 	torture_assert_ntstatus_ok(tctx, status, "Error connecting to server");
tctx              190 source4/torture/rpc/rpc.c static bool torture_rpc_setup_anonymous(struct torture_context *tctx, 
tctx              196 source4/torture/rpc/rpc.c 	struct torture_rpc_tcase *tcase = talloc_get_type(tctx->active_tcase, 
tctx              199 source4/torture/rpc/rpc.c 	status = torture_rpc_binding(tctx, &binding);
tctx              203 source4/torture/rpc/rpc.c 	*data = tcase_data = talloc_zero(tctx, struct torture_rpc_tcase_data);
tctx              204 source4/torture/rpc/rpc.c 	tcase_data->credentials = cli_credentials_init_anon(tctx);
tctx              206 source4/torture/rpc/rpc.c 	status = dcerpc_pipe_connect_b(tctx, 
tctx              210 source4/torture/rpc/rpc.c 				tcase_data->credentials, tctx->ev, tctx->lp_ctx);
tctx              212 source4/torture/rpc/rpc.c 	torture_assert_ntstatus_ok(tctx, status, "Error connecting to server");
tctx              217 source4/torture/rpc/rpc.c static bool torture_rpc_setup (struct torture_context *tctx, void **data)
tctx              221 source4/torture/rpc/rpc.c 						tctx->active_tcase, struct torture_rpc_tcase);
tctx              224 source4/torture/rpc/rpc.c 	*data = tcase_data = talloc_zero(tctx, struct torture_rpc_tcase_data);
tctx              227 source4/torture/rpc/rpc.c 	status = torture_rpc_connection(tctx, 
tctx              231 source4/torture/rpc/rpc.c 	torture_assert_ntstatus_ok(tctx, status, "Error connecting to server");
tctx              267 source4/torture/rpc/rpc.c static bool torture_rpc_wrap_test(struct torture_context *tctx, 
tctx              277 source4/torture/rpc/rpc.c 	return fn(tctx, tcase_data->pipe);
tctx              280 source4/torture/rpc/rpc.c static bool torture_rpc_wrap_test_ex(struct torture_context *tctx, 
tctx              290 source4/torture/rpc/rpc.c 	return fn(tctx, tcase_data->pipe, test->data);
tctx              294 source4/torture/rpc/rpc.c static bool torture_rpc_wrap_test_creds(struct torture_context *tctx, 
tctx              304 source4/torture/rpc/rpc.c 	return fn(tctx, tcase_data->pipe, tcase_data->credentials);
tctx               44 source4/torture/rpc/rpc.h NTSTATUS torture_rpc_connection(struct torture_context *tctx,
tctx               48 source4/torture/rpc/rpc.h struct test_join *torture_join_domain(struct torture_context *tctx,
tctx               53 source4/torture/rpc/rpc.h void torture_leave_domain(struct torture_context *tctx, struct test_join *join);
tctx             1347 source4/torture/rpc/samba3rpc.c static bool test_join3(struct torture_context *tctx,
tctx             1360 source4/torture/rpc/samba3rpc.c 	lp_smbcli_options(tctx->lp_ctx, &options);
tctx             1361 source4/torture/rpc/samba3rpc.c 	lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx             1363 source4/torture/rpc/samba3rpc.c 	status = smbcli_full_connection(tctx, &cli,
tctx             1364 source4/torture/rpc/samba3rpc.c 					torture_setting_string(tctx, "host", NULL),
tctx             1365 source4/torture/rpc/samba3rpc.c 					lp_smb_ports(tctx->lp_ctx),
tctx             1366 source4/torture/rpc/samba3rpc.c 					"IPC$", NULL, lp_socket_options(tctx->lp_ctx),
tctx             1367 source4/torture/rpc/samba3rpc.c 					smb_creds, lp_resolve_context(tctx->lp_ctx),
tctx             1368 source4/torture/rpc/samba3rpc.c 					tctx->ev, &options, &session_options,
tctx             1369 source4/torture/rpc/samba3rpc.c 					lp_iconv_convenience(tctx->lp_ctx),
tctx             1370 source4/torture/rpc/samba3rpc.c 					lp_gensec_settings(tctx, tctx->lp_ctx));
tctx             1383 source4/torture/rpc/samba3rpc.c 	cli_credentials_set_conf(wks_creds, tctx->lp_ctx);
tctx             1391 source4/torture/rpc/samba3rpc.c 	if (!join3(cli, tctx->lp_ctx, use_level25, samr_creds, wks_creds)) {
tctx             1400 source4/torture/rpc/samba3rpc.c 	if (!auth2(cli, tctx->lp_ctx, wks_creds)) {
tctx             1405 source4/torture/rpc/samba3rpc.c 	if (!leave(cli, tctx->lp_ctx, samr_creds, wks_creds)) {
tctx             1316 source4/torture/rpc/samlogon.c 			  struct torture_context *tctx,
tctx             1348 source4/torture/rpc/samlogon.c 	samlogon_state.workgroup = lp_workgroup(tctx->lp_ctx);
tctx             1349 source4/torture/rpc/samlogon.c 	samlogon_state.netbios_name = lp_netbios_name(tctx->lp_ctx);
tctx             1356 source4/torture/rpc/samlogon.c 	samlogon_state.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx);
tctx               58 source4/torture/rpc/samr.c 			       struct torture_context *tctx,
tctx               62 source4/torture/rpc/samr.c 				struct torture_context *tctx,
tctx               66 source4/torture/rpc/samr.c 				struct torture_context *tctx,
tctx               70 source4/torture/rpc/samr.c 				struct torture_context *tctx,
tctx               91 source4/torture/rpc/samr.c bool test_samr_handle_Close(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              100 source4/torture/rpc/samr.c 	status = dcerpc_samr_Close(p, tctx, &r);
tctx              101 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "Close");
tctx              106 source4/torture/rpc/samr.c static bool test_Shutdown(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              112 source4/torture/rpc/samr.c 	if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx              113 source4/torture/rpc/samr.c 		torture_skip(tctx, "samr_Shutdown disabled - enable dangerous tests to use\n");
tctx              119 source4/torture/rpc/samr.c 	torture_comment(tctx, "testing samr_Shutdown\n");
tctx              121 source4/torture/rpc/samr.c 	status = dcerpc_samr_Shutdown(p, tctx, &r);
tctx              122 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "samr_Shutdown");
tctx              127 source4/torture/rpc/samr.c static bool test_SetDsrmPassword(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              135 source4/torture/rpc/samr.c 	if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx              136 source4/torture/rpc/samr.c 		torture_skip(tctx, "samr_SetDsrmPassword disabled - enable dangerous tests to use");
tctx              147 source4/torture/rpc/samr.c 	torture_comment(tctx, "testing samr_SetDsrmPassword\n");
tctx              149 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetDsrmPassword(p, tctx, &r);
tctx              150 source4/torture/rpc/samr.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_SUPPORTED, "samr_SetDsrmPassword");
tctx              157 source4/torture/rpc/samr.c 			       struct torture_context *tctx,
tctx              169 source4/torture/rpc/samr.c 	status = dcerpc_samr_QuerySecurity(p, tctx, &r);
tctx              170 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "QuerySecurity");
tctx              172 source4/torture/rpc/samr.c 	torture_assert(tctx, sdbuf != NULL, "sdbuf is NULL");
tctx              178 source4/torture/rpc/samr.c 	if (torture_setting_bool(tctx, "samba4", false)) {
tctx              179 source4/torture/rpc/samr.c 		torture_skip(tctx, "skipping SetSecurity test against Samba4\n");
tctx              182 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetSecurity(p, tctx, &s);
tctx              183 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "SetSecurity");
tctx              185 source4/torture/rpc/samr.c 	status = dcerpc_samr_QuerySecurity(p, tctx, &r);
tctx              186 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "QuerySecurity");
tctx              192 source4/torture/rpc/samr.c static bool test_SetUserInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              208 source4/torture/rpc/samr.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx              226 source4/torture/rpc/samr.c 		status = dcerpc_samr_ ##call(p, tctx, &r); \
tctx              228 source4/torture/rpc/samr.c 			torture_comment(tctx, #call " level %u failed - %s (%s)\n", \
tctx              236 source4/torture/rpc/samr.c 			torture_comment(tctx, "Failed to set %s to '%s' (%s)\n", \
tctx              244 source4/torture/rpc/samr.c 			torture_comment(tctx, "Failed to set %s to '%s' (%s)\n", \
tctx              252 source4/torture/rpc/samr.c 			torture_comment(tctx, "Failed to set %s to 0x%llx - got 0x%llx (%s)\n", \
tctx              259 source4/torture/rpc/samr.c 		torture_comment(tctx, "field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \
tctx              283 source4/torture/rpc/samr.c 		torture_comment(tctx, "field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \
tctx              307 source4/torture/rpc/samr.c 		torture_comment(tctx, "field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \
tctx              343 source4/torture/rpc/samr.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx              350 source4/torture/rpc/samr.c 	test_account_name = talloc_asprintf(tctx, "%sxx7-1", base_account_name);
tctx              352 source4/torture/rpc/samr.c 	test_account_name = talloc_asprintf(tctx, "%sxx7-3", base_account_name);
tctx              354 source4/torture/rpc/samr.c 	test_account_name = talloc_asprintf(tctx, "%sxx7-5", base_account_name);
tctx              356 source4/torture/rpc/samr.c 	test_account_name = talloc_asprintf(tctx, "%sxx7-6", base_account_name);
tctx              358 source4/torture/rpc/samr.c 	test_account_name = talloc_asprintf(tctx, "%sxx7-7", base_account_name);
tctx              360 source4/torture/rpc/samr.c 	test_account_name = talloc_asprintf(tctx, "%sxx7-21", base_account_name);
tctx              445 source4/torture/rpc/samr.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx              460 source4/torture/rpc/samr.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx              524 source4/torture/rpc/samr.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx              609 source4/torture/rpc/samr.c static bool test_SetUserPass(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              624 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx              628 source4/torture/rpc/samr.c 	newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx              646 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing SetUserInfo level 24 (set password)\n");
tctx              648 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx              661 source4/torture/rpc/samr.c static bool test_SetUserPass_23(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              677 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx              681 source4/torture/rpc/samr.c 	newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx              702 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing SetUserInfo level 23 (set password)\n");
tctx              704 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx              726 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing SetUserInfo level 23 (set password) with wrong password\n");
tctx              728 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx              739 source4/torture/rpc/samr.c static bool test_SetUserPassEx(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              748 source4/torture/rpc/samr.c 	DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16);
tctx              758 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx              763 source4/torture/rpc/samr.c 		newpass = samr_rand_pass_fixed_len(tctx, policy_min_pw_len - 1);
tctx              765 source4/torture/rpc/samr.c 		newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx              792 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing SetUserInfo level 26 (set password ex)\n");
tctx              794 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx              809 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing SetUserInfo level 26 (set password ex) with wrong session key\n");
tctx              811 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx              823 source4/torture/rpc/samr.c static bool test_SetUserPass_25(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              832 source4/torture/rpc/samr.c 	DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16);
tctx              842 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx              846 source4/torture/rpc/samr.c 	newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx              875 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing SetUserInfo level 25 (set password ex)\n");
tctx              877 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx              892 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing SetUserInfo level 25 (set password ex) with wrong session key\n");
tctx              894 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx              904 source4/torture/rpc/samr.c static bool test_SetUserPass_18(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              921 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx              925 source4/torture/rpc/samr.c 	newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx              949 source4/torture/rpc/samr.c 		out = data_blob_talloc_zero(tctx, 16);
tctx              956 source4/torture/rpc/samr.c 		out = data_blob_talloc_zero(tctx, 16);
tctx              961 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing SetUserInfo level 18 (set password hash)\n");
tctx              963 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx              975 source4/torture/rpc/samr.c static bool test_SetUserPass_21(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              993 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx              997 source4/torture/rpc/samr.c 	newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx             1035 source4/torture/rpc/samr.c 		out = data_blob_talloc_zero(tctx, 16);
tctx             1044 source4/torture/rpc/samr.c 		out = data_blob_talloc_zero(tctx, 16);
tctx             1049 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing SetUserInfo level 21 (set password hash)\n");
tctx             1051 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx             1065 source4/torture/rpc/samr.c 		status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx             1078 source4/torture/rpc/samr.c 		status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx             1091 source4/torture/rpc/samr.c 				      struct torture_context *tctx,
tctx             1106 source4/torture/rpc/samr.c 	DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16);
tctx             1119 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx             1123 source4/torture/rpc/samr.c 	newpass = samr_rand_pass_silent(tctx, policy_min_pw_len);
tctx             1136 source4/torture/rpc/samr.c 		comment = talloc_asprintf(tctx, "comment: %ld\n", time(NULL));
tctx             1226 source4/torture/rpc/samr.c 			out = data_blob_talloc_zero(tctx, 16);
tctx             1233 source4/torture/rpc/samr.c 			out = data_blob_talloc_zero(tctx, 16);
tctx             1244 source4/torture/rpc/samr.c 			out = data_blob_talloc_zero(tctx, 16);
tctx             1252 source4/torture/rpc/samr.c 			out = data_blob_talloc_zero(tctx, 16);
tctx             1274 source4/torture/rpc/samr.c 		status = dcerpc_samr_SetUserInfo2(p, tctx, &s2);
tctx             1276 source4/torture/rpc/samr.c 		status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx             1290 source4/torture/rpc/samr.c 			torture_assert_ntstatus_equal(tctx,
tctx             1294 source4/torture/rpc/samr.c 			torture_assert_ntstatus_equal(tctx,
tctx             1313 source4/torture/rpc/samr.c static bool test_SetAliasInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1329 source4/torture/rpc/samr.c 		torture_comment(tctx, "Testing SetAliasInfo level %u\n", levels[i]);
tctx             1333 source4/torture/rpc/samr.c 		r.in.info  = talloc(tctx, union samr_AliasInfo);
tctx             1341 source4/torture/rpc/samr.c 		status = dcerpc_samr_SetAliasInfo(p, tctx, &r);
tctx             1352 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryAliasInfo(p, tctx, &q);
tctx             1363 source4/torture/rpc/samr.c static bool test_GetGroupsForUser(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1370 source4/torture/rpc/samr.c 	torture_comment(tctx, "testing GetGroupsForUser\n");
tctx             1375 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetGroupsForUser(p, tctx, &r);
tctx             1376 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "GetGroupsForUser");
tctx             1382 source4/torture/rpc/samr.c static bool test_GetDomPwInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1392 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
tctx             1394 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
tctx             1395 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
tctx             1397 source4/torture/rpc/samr.c 	r.in.domain_name->string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1398 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
tctx             1400 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
tctx             1401 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
tctx             1404 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
tctx             1406 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
tctx             1407 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
tctx             1410 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
tctx             1412 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
tctx             1413 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
tctx             1418 source4/torture/rpc/samr.c static bool test_GetUserPwInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1425 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing GetUserPwInfo\n");
tctx             1430 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetUserPwInfo(p, tctx, &r);
tctx             1431 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "GetUserPwInfo");
tctx             1436 source4/torture/rpc/samr.c static NTSTATUS test_LookupName(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1452 source4/torture/rpc/samr.c 	status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx             1461 source4/torture/rpc/samr.c 	status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx             1471 source4/torture/rpc/samr.c 	status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx             1479 source4/torture/rpc/samr.c 	status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx             1491 source4/torture/rpc/samr.c 	status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx             1504 source4/torture/rpc/samr.c 				     struct torture_context *tctx,
tctx             1512 source4/torture/rpc/samr.c 	status = test_LookupName(p, tctx, domain_handle, name, &rid);
tctx             1521 source4/torture/rpc/samr.c 	status = dcerpc_samr_OpenUser(p, tctx, &r);
tctx             1531 source4/torture/rpc/samr.c 				   struct torture_context *tctx,
tctx             1544 source4/torture/rpc/samr.c 	status = test_OpenUser_byname(p, tctx, handle, "testuser", &user_handle);
tctx             1578 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx             1584 source4/torture/rpc/samr.c 	if (!test_samr_handle_Close(p, tctx, &user_handle)) {
tctx             1592 source4/torture/rpc/samr.c static bool test_ChangePasswordUser(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1611 source4/torture/rpc/samr.c 	status = test_OpenUser_byname(p, tctx, handle, acct_name, &user_handle);
tctx             1618 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx             1622 source4/torture/rpc/samr.c 	newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx             1624 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing ChangePasswordUser\n");
tctx             1626 source4/torture/rpc/samr.c 	torture_assert(tctx, *password != NULL,
tctx             1657 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx             1658 source4/torture/rpc/samr.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_WRONG_PASSWORD,
tctx             1678 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx             1679 source4/torture/rpc/samr.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_WRONG_PASSWORD,
tctx             1699 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx             1722 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx             1752 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx             1762 source4/torture/rpc/samr.c 	newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx             1790 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx             1800 source4/torture/rpc/samr.c 	newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx             1828 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx             1852 source4/torture/rpc/samr.c 		status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx             1862 source4/torture/rpc/samr.c 	if (!test_samr_handle_Close(p, tctx, &user_handle)) {
tctx             1870 source4/torture/rpc/samr.c static bool test_OemChangePasswordUser2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1894 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing OemChangePasswordUser2\n");
tctx             1896 source4/torture/rpc/samr.c 	torture_assert(tctx, *password != NULL,
tctx             1901 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetDomPwInfo(p, tctx, &dom_pw_info);
tctx             1906 source4/torture/rpc/samr.c 	newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx             1908 source4/torture/rpc/samr.c 	server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1926 source4/torture/rpc/samr.c 	status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx             1948 source4/torture/rpc/samr.c 	status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx             1965 source4/torture/rpc/samr.c 	status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx             1978 source4/torture/rpc/samr.c 	status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx             1992 source4/torture/rpc/samr.c 	status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx             2006 source4/torture/rpc/samr.c 	status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx             2026 source4/torture/rpc/samr.c 	status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx             2040 source4/torture/rpc/samr.c static bool test_ChangePasswordUser2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             2064 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing ChangePasswordUser2 on %s\n", acct_name);
tctx             2066 source4/torture/rpc/samr.c 	torture_assert(tctx, *password != NULL,
tctx             2072 source4/torture/rpc/samr.c 		status = dcerpc_samr_GetDomPwInfo(p, tctx, &dom_pw_info);
tctx             2077 source4/torture/rpc/samr.c 		newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx             2080 source4/torture/rpc/samr.c 	server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             2105 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser2(p, tctx, &r);
tctx             2119 source4/torture/rpc/samr.c bool test_ChangePasswordUser3(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             2140 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing ChangePasswordUser3\n");
tctx             2145 source4/torture/rpc/samr.c 				newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx             2147 source4/torture/rpc/samr.c 				newpass = samr_rand_pass_fixed_len(tctx, policy_min_pw_len);
tctx             2151 source4/torture/rpc/samr.c 		torture_comment(tctx, "Using password '%s'\n", newpass);
tctx             2154 source4/torture/rpc/samr.c 	torture_assert(tctx, *password != NULL,
tctx             2158 source4/torture/rpc/samr.c 	server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             2189 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx             2220 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx             2229 source4/torture/rpc/samr.c 	init_lsa_String(&account_bad, talloc_asprintf(tctx, "%sXX", account_string));
tctx             2232 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx             2266 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx             2329 source4/torture/rpc/samr.c 			return test_ChangePasswordUser3(p, tctx, account_string,
tctx             2344 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status, "ChangePasswordUser3");
tctx             2345 source4/torture/rpc/samr.c 		*password = talloc_strdup(tctx, newpass);
tctx             2351 source4/torture/rpc/samr.c bool test_ChangePasswordRandomBytes(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             2361 source4/torture/rpc/samr.c 	DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16);
tctx             2377 source4/torture/rpc/samr.c 	new_random_pass = samr_very_rand_pass(tctx, 128);
tctx             2379 source4/torture/rpc/samr.c 	torture_assert(tctx, *password != NULL,
tctx             2383 source4/torture/rpc/samr.c 	server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             2413 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing SetUserInfo level 25 (set password ex) with a password made up of only random bytes\n");
tctx             2415 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx             2422 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing ChangePasswordUser3 with a password made up of only random bytes\n");
tctx             2426 source4/torture/rpc/samr.c 	new_random_pass = samr_very_rand_pass(tctx, 128);
tctx             2447 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx             2462 source4/torture/rpc/samr.c 	newpass = samr_rand_pass(tctx, 128);
tctx             2485 source4/torture/rpc/samr.c 	status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx             2496 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status, "ChangePasswordUser3 (on second random password)");
tctx             2497 source4/torture/rpc/samr.c 		*password = talloc_strdup(tctx, newpass);
tctx             2504 source4/torture/rpc/samr.c static bool test_GetMembersInAlias(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             2511 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing GetMembersInAlias\n");
tctx             2516 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetMembersInAlias(p, tctx, &r);
tctx             2517 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "GetMembersInAlias");
tctx             2522 source4/torture/rpc/samr.c static bool test_AddMemberToAlias(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             2531 source4/torture/rpc/samr.c 	sid = dom_sid_add_rid(tctx, domain_sid, 512);
tctx             2533 source4/torture/rpc/samr.c 	torture_comment(tctx, "testing AddAliasMember\n");
tctx             2537 source4/torture/rpc/samr.c 	status = dcerpc_samr_AddAliasMember(p, tctx, &r);
tctx             2538 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "AddAliasMember");
tctx             2543 source4/torture/rpc/samr.c 	status = dcerpc_samr_DeleteAliasMember(p, tctx, &d);
tctx             2544 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "DelAliasMember");
tctx             2549 source4/torture/rpc/samr.c static bool test_AddMultipleMembersToAlias(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             2557 source4/torture/rpc/samr.c 	torture_comment(tctx, "testing AddMultipleMembersToAlias\n");
tctx             2562 source4/torture/rpc/samr.c 	sids.sids = talloc_array(tctx, struct lsa_SidPtr, 3);
tctx             2564 source4/torture/rpc/samr.c 	sids.sids[0].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-1");
tctx             2565 source4/torture/rpc/samr.c 	sids.sids[1].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-2");
tctx             2566 source4/torture/rpc/samr.c 	sids.sids[2].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-3");
tctx             2568 source4/torture/rpc/samr.c 	status = dcerpc_samr_AddMultipleMembersToAlias(p, tctx, &a);
tctx             2569 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "AddMultipleMembersToAlias");
tctx             2572 source4/torture/rpc/samr.c 	torture_comment(tctx, "testing RemoveMultipleMembersFromAlias\n");
tctx             2576 source4/torture/rpc/samr.c 	status = dcerpc_samr_RemoveMultipleMembersFromAlias(p, tctx, &r);
tctx             2577 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "RemoveMultipleMembersFromAlias");
tctx             2580 source4/torture/rpc/samr.c 	status = dcerpc_samr_RemoveMultipleMembersFromAlias(p, tctx, &r);
tctx             2581 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "RemoveMultipleMembersFromAlias");
tctx             2584 source4/torture/rpc/samr.c 	sids.sids[2].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-4");
tctx             2586 source4/torture/rpc/samr.c 	status = dcerpc_samr_RemoveMultipleMembersFromAlias(p, tctx, &r);
tctx             2587 source4/torture/rpc/samr.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, "RemoveMultipleMembersFromAlias");
tctx             2592 source4/torture/rpc/samr.c static bool test_TestPrivateFunctionsUser(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             2598 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing TestPrivateFunctionsUser\n");
tctx             2602 source4/torture/rpc/samr.c 	status = dcerpc_samr_TestPrivateFunctionsUser(p, tctx, &r);
tctx             2603 source4/torture/rpc/samr.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "TestPrivateFunctionsUser");
tctx             2609 source4/torture/rpc/samr.c 					  struct torture_context *tctx,
tctx             2621 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing QueryUserInfo%s level 5 and 21 call ",
tctx             2634 source4/torture/rpc/samr.c 			status = dcerpc_samr_QueryUserInfo2(p, tctx, &r2);
tctx             2640 source4/torture/rpc/samr.c 			status = dcerpc_samr_QueryUserInfo(p, tctx, &r);
tctx             2666 source4/torture/rpc/samr.c 	torture_assert_int_equal(tctx, pwdlastset5, pwdlastset21,
tctx             2671 source4/torture/rpc/samr.c 	torture_comment(tctx, "(pwdlastset: %lld)\n", *pwdlastset);
tctx             2676 source4/torture/rpc/samr.c static bool test_SamLogon_Creds(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             2692 source4/torture/rpc/samr.c 	if (lp_client_lanman_auth(tctx->lp_ctx)) {
tctx             2696 source4/torture/rpc/samr.c 	if (lp_client_ntlmv2_auth(tctx->lp_ctx)) {
tctx             2700 source4/torture/rpc/samr.c 	cli_credentials_get_ntlm_username_domain(test_credentials, tctx,
tctx             2709 source4/torture/rpc/samr.c 	names_blob = NTLMv2_generate_names_blob(tctx, cli_credentials_get_workstation(machine_credentials),
tctx             2712 source4/torture/rpc/samr.c 	status = cli_credentials_get_ntlm_response(test_credentials, tctx,
tctx             2718 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "cli_credentials_get_ntlm_response failed");
tctx             2735 source4/torture/rpc/samr.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             2751 source4/torture/rpc/samr.c 	status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx             2753 source4/torture/rpc/samr.c 		torture_assert_ntstatus_equal(tctx, status, expected_result, "LogonSamLogon failed");
tctx             2756 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed");
tctx             2759 source4/torture/rpc/samr.c 	torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred),
tctx             2765 source4/torture/rpc/samr.c static bool test_SamLogon(struct torture_context *tctx,
tctx             2773 source4/torture/rpc/samr.c 	if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx             2777 source4/torture/rpc/samr.c 	return test_SamLogon_Creds(p, tctx, machine_credentials, test_credentials,
tctx             2781 source4/torture/rpc/samr.c static bool test_SamLogon_with_creds(struct torture_context *tctx,
tctx             2791 source4/torture/rpc/samr.c 	test_credentials = cli_credentials_init(tctx);
tctx             2796 source4/torture/rpc/samr.c 				   lp_workgroup(tctx->lp_ctx), CRED_SPECIFIED);
tctx             2806 source4/torture/rpc/samr.c 	if (!test_SamLogon(tctx, p, machine_creds, test_credentials,
tctx             2808 source4/torture/rpc/samr.c 		torture_warning(tctx, "new password did not work\n");
tctx             2817 source4/torture/rpc/samr.c 				   struct torture_context *tctx,
tctx             2838 source4/torture/rpc/samr.c 		fields = talloc_asprintf(tctx, "(fields_present: 0x%08x)",
tctx             2845 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing SetUserInfo%s level %d call "
tctx             2850 source4/torture/rpc/samr.c 	if (!test_SetUserPass_level_ex(p, tctx, handle, level,
tctx             2859 source4/torture/rpc/samr.c 	if (!test_QueryUserInfo_pwdlastset(p, tctx, handle,
tctx             2869 source4/torture/rpc/samr.c 	if (!test_SamLogon_with_creds(tctx, np,
tctx             2881 source4/torture/rpc/samr.c 					struct torture_context *tctx,
tctx             2912 source4/torture/rpc/samr.c 	if (torture_setting_bool(tctx, "samba3", false)) {
tctx             2918 source4/torture/rpc/samr.c 	status = torture_rpc_connection(tctx, &np, &ndr_table_netlogon);
tctx             2944 source4/torture/rpc/samr.c 		torture_comment(tctx, "------------------------------\n"
tctx             2966 source4/torture/rpc/samr.c 		if (!test_SetPassword_level(p, np, tctx, handle,
tctx             2995 source4/torture/rpc/samr.c 				torture_comment(tctx, "not considering a non-0 "
tctx             3003 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdLastSet test failed: "
tctx             3019 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdlastset not increasing\n");
tctx             3026 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdlastset not increasing\n");
tctx             3039 source4/torture/rpc/samr.c 		if (!test_SetPassword_level(p, np, tctx, handle,
tctx             3070 source4/torture/rpc/samr.c 				torture_assert_int_equal(tctx, pwdlastset_old,
tctx             3076 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdLastSet test failed: "
tctx             3082 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdLastSet test failed: "
tctx             3097 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdlastset not increasing\n");
tctx             3104 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdlastset not increasing\n");
tctx             3119 source4/torture/rpc/samr.c 		if (!test_SetPassword_level(p, np, tctx, handle,
tctx             3148 source4/torture/rpc/samr.c 				torture_assert_int_equal(tctx, pwdlastset_old,
tctx             3154 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdLastSet test failed: "
tctx             3160 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdLastSet test failed: "
tctx             3172 source4/torture/rpc/samr.c 		if (!test_SetPassword_level(p, np, tctx, handle,
tctx             3196 source4/torture/rpc/samr.c 				torture_comment(tctx, "not considering a non-0 "
tctx             3211 source4/torture/rpc/samr.c 				torture_assert_int_equal(tctx, pwdlastset_old,
tctx             3218 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdLastSet test failed: "
tctx             3225 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdLastSet test failed: "
tctx             3241 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdlastset not increasing\n");
tctx             3248 source4/torture/rpc/samr.c 				torture_warning(tctx, "pwdlastset not increasing\n");
tctx             3283 source4/torture/rpc/samr.c 				       struct torture_context *tctx,
tctx             3297 source4/torture/rpc/samr.c 	user_sid = dom_sid_add_rid(tctx, domain_sid, rid);
tctx             3309 source4/torture/rpc/samr.c 		status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r);
tctx             3310 source4/torture/rpc/samr.c 		torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND,
tctx             3331 source4/torture/rpc/samr.c 		status = dcerpc_lsa_AddAccountRights(lp, tctx, &r);
tctx             3332 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3351 source4/torture/rpc/samr.c 		status = dcerpc_lsa_EnumAccounts(lp, tctx, &r);
tctx             3352 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3361 source4/torture/rpc/samr.c 		torture_assert(tctx, found_sid,
tctx             3375 source4/torture/rpc/samr.c 		status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r);
tctx             3376 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3380 source4/torture/rpc/samr.c 			torture_warning(tctx, "failed to find newly added rights");
tctx             3395 source4/torture/rpc/samr.c 		status = dcerpc_lsa_OpenAccount(lp, tctx, &r);
tctx             3396 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3409 source4/torture/rpc/samr.c 		status = dcerpc_lsa_GetSystemAccessAccount(lp, tctx, &r);
tctx             3410 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3422 source4/torture/rpc/samr.c 		status = dcerpc_lsa_Close(lp, tctx, &r);
tctx             3423 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3435 source4/torture/rpc/samr.c 		status = dcerpc_samr_DeleteUser(p, tctx, &r);
tctx             3436 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status, "Delete User failed");
tctx             3454 source4/torture/rpc/samr.c 		status = dcerpc_lsa_EnumAccounts(lp, tctx, &r);
tctx             3455 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3464 source4/torture/rpc/samr.c 		torture_assert(tctx, found_sid,
tctx             3478 source4/torture/rpc/samr.c 		status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r);
tctx             3479 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3483 source4/torture/rpc/samr.c 			torture_warning(tctx, "failed to find newly added rights");
tctx             3498 source4/torture/rpc/samr.c 		status = dcerpc_lsa_OpenAccount(lp, tctx, &r);
tctx             3499 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3512 source4/torture/rpc/samr.c 		status = dcerpc_lsa_GetSystemAccessAccount(lp, tctx, &r);
tctx             3513 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3525 source4/torture/rpc/samr.c 		status = dcerpc_lsa_DeleteObject(lp, tctx, &r);
tctx             3526 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3545 source4/torture/rpc/samr.c 		status = dcerpc_lsa_EnumAccounts(lp, tctx, &r);
tctx             3546 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             3555 source4/torture/rpc/samr.c 		torture_assert(tctx, !found_sid,
tctx             3569 source4/torture/rpc/samr.c 		status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r);
tctx             3570 source4/torture/rpc/samr.c 		torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND,
tctx             3578 source4/torture/rpc/samr.c 			  struct torture_context *tctx,
tctx             3601 source4/torture/rpc/samr.c 	status = test_LookupName(p, tctx, domain_handle, base_acct_name, &rid);
tctx             3608 source4/torture/rpc/samr.c 		if (!test_QuerySecurity(p, tctx, user_handle)) {
tctx             3612 source4/torture/rpc/samr.c 		if (!test_QueryUserInfo(p, tctx, user_handle)) {
tctx             3616 source4/torture/rpc/samr.c 		if (!test_QueryUserInfo2(p, tctx, user_handle)) {
tctx             3620 source4/torture/rpc/samr.c 		if (!test_SetUserInfo(p, tctx, user_handle, base_acct_flags,
tctx             3625 source4/torture/rpc/samr.c 		if (!test_GetUserPwInfo(p, tctx, user_handle)) {
tctx             3629 source4/torture/rpc/samr.c 		if (!test_TestPrivateFunctionsUser(p, tctx, user_handle)) {
tctx             3633 source4/torture/rpc/samr.c 		if (!test_SetUserPass(p, tctx, user_handle, &password)) {
tctx             3640 source4/torture/rpc/samr.c 			char *v = generate_random_str(tctx, 1);
tctx             3648 source4/torture/rpc/samr.c 			if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) {
tctx             3652 source4/torture/rpc/samr.c 			if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, simple_pass, false)) {
tctx             3657 source4/torture/rpc/samr.c 			if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) {
tctx             3662 source4/torture/rpc/samr.c 			if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, samr_rand_pass(tctx, 4), false)) {
tctx             3667 source4/torture/rpc/samr.c 			if (!test_ChangePasswordRandomBytes(p, tctx, base_acct_name, user_handle, &password)) {
tctx             3673 source4/torture/rpc/samr.c 			if (!test_SetUserPass_23(p, tctx, user_handle, password_fields[i], &password)) {
tctx             3678 source4/torture/rpc/samr.c 			if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
tctx             3684 source4/torture/rpc/samr.c 			if (!test_SetUserPass_25(p, tctx, user_handle, password_fields[i], &password)) {
tctx             3689 source4/torture/rpc/samr.c 			if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
tctx             3694 source4/torture/rpc/samr.c 		if (!test_SetUserPassEx(p, tctx, user_handle, false, &password)) {
tctx             3698 source4/torture/rpc/samr.c 		if (!test_ChangePassword(p, tctx, base_acct_name, domain_handle, &password)) {
tctx             3702 source4/torture/rpc/samr.c 		if (torture_setting_bool(tctx, "samba4", false)) {
tctx             3706 source4/torture/rpc/samr.c 			if (!test_SetUserPass_18(p, tctx, user_handle, &password)) {
tctx             3710 source4/torture/rpc/samr.c 			if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
tctx             3722 source4/torture/rpc/samr.c 				if (!test_SetUserPass_21(p, tctx, user_handle, password_fields[i], &password)) {
tctx             3727 source4/torture/rpc/samr.c 				if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
tctx             3737 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryUserInfo(p, tctx, &q);
tctx             3749 source4/torture/rpc/samr.c 				if (!torture_setting_bool(tctx, "samba3", false)) {
tctx             3765 source4/torture/rpc/samr.c 		if (!test_SetPassword_pwdlastset(p, tctx, base_acct_flags,
tctx             3773 source4/torture/rpc/samr.c 			torture_comment(tctx, "pwdLastSet test succeeded\n");
tctx             3775 source4/torture/rpc/samr.c 			torture_warning(tctx, "pwdLastSet test failed\n");
tctx             3785 source4/torture/rpc/samr.c 		status = torture_rpc_connection(tctx, &lp, &ndr_table_lsarpc);
tctx             3786 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status, "Failed to open LSA pipe");
tctx             3788 source4/torture/rpc/samr.c 		if (!test_lsa_OpenPolicy2(lp, tctx, &lsa_handle)) {
tctx             3792 source4/torture/rpc/samr.c 		if (!test_DeleteUser_with_privs(p, lp, tctx,
tctx             3799 source4/torture/rpc/samr.c 		if (!test_lsa_Close(lp, tctx, lsa_handle)) {
tctx             3804 source4/torture/rpc/samr.c 			torture_warning(tctx, "privileged user delete test failed\n");
tctx             3816 source4/torture/rpc/samr.c static bool test_alias_ops(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             3822 source4/torture/rpc/samr.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx             3823 source4/torture/rpc/samr.c 		if (!test_QuerySecurity(p, tctx, alias_handle)) {
tctx             3828 source4/torture/rpc/samr.c 	if (!test_QueryAliasInfo(p, tctx, alias_handle)) {
tctx             3832 source4/torture/rpc/samr.c 	if (!test_SetAliasInfo(p, tctx, alias_handle)) {
tctx             3836 source4/torture/rpc/samr.c 	if (!test_AddMemberToAlias(p, tctx, alias_handle, domain_sid)) {
tctx             3840 source4/torture/rpc/samr.c 	if (torture_setting_bool(tctx, "samba4", false)) {
tctx             3845 source4/torture/rpc/samr.c 	if (!test_AddMultipleMembersToAlias(p, tctx, alias_handle)) {
tctx             3853 source4/torture/rpc/samr.c static bool test_DeleteUser(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             3858 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing DeleteUser\n");
tctx             3863 source4/torture/rpc/samr.c 	status = dcerpc_samr_DeleteUser(p, tctx, &d);
tctx             3864 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "DeleteUser");
tctx             3870 source4/torture/rpc/samr.c 			    struct torture_context *tctx,
tctx             3878 source4/torture/rpc/samr.c 	status = test_LookupName(p, tctx, handle, name, &rid);
tctx             3883 source4/torture/rpc/samr.c 	status = test_OpenUser_byname(p, tctx, handle, name, &user_handle);
tctx             3890 source4/torture/rpc/samr.c 	status = dcerpc_samr_DeleteUser(p, tctx, &d);
tctx             3904 source4/torture/rpc/samr.c 				    struct torture_context *tctx,
tctx             3913 source4/torture/rpc/samr.c 	status = test_LookupName(p, tctx, handle, name, &rid);
tctx             3922 source4/torture/rpc/samr.c 	status = dcerpc_samr_OpenGroup(p, tctx, &r);
tctx             3929 source4/torture/rpc/samr.c 	status = dcerpc_samr_DeleteDomainGroup(p, tctx, &d);
tctx             3943 source4/torture/rpc/samr.c 				    struct torture_context *tctx,
tctx             3955 source4/torture/rpc/samr.c 	status = test_LookupName(p, tctx, domain_handle, name, &rid);
tctx             3964 source4/torture/rpc/samr.c 	status = dcerpc_samr_OpenAlias(p, tctx, &r);
tctx             3971 source4/torture/rpc/samr.c 	status = dcerpc_samr_DeleteDomAlias(p, tctx, &d);
tctx             3984 source4/torture/rpc/samr.c 			     struct torture_context *tctx,
tctx             3995 source4/torture/rpc/samr.c 	status = dcerpc_samr_DeleteDomAlias(p, tctx, &d);
tctx             4004 source4/torture/rpc/samr.c static bool test_CreateAlias(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             4026 source4/torture/rpc/samr.c 	status = dcerpc_samr_CreateDomAlias(p, tctx, &r);
tctx             4028 source4/torture/rpc/samr.c 	if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) {
tctx             4040 source4/torture/rpc/samr.c 		if (!test_DeleteAlias_byname(p, tctx, domain_handle, r.in.alias_name->string)) {
tctx             4043 source4/torture/rpc/samr.c 		status = dcerpc_samr_CreateDomAlias(p, tctx, &r);
tctx             4055 source4/torture/rpc/samr.c 	if (!test_alias_ops(p, tctx, alias_handle, domain_sid)) {
tctx             4063 source4/torture/rpc/samr.c 				struct torture_context *tctx,
tctx             4073 source4/torture/rpc/samr.c 	if (!test_ChangePasswordUser(p, tctx, acct_name, domain_handle, password)) {
tctx             4077 source4/torture/rpc/samr.c 	if (!test_ChangePasswordUser2(p, tctx, acct_name, password, 0, true)) {
tctx             4081 source4/torture/rpc/samr.c 	if (!test_OemChangePasswordUser2(p, tctx, acct_name, domain_handle, password)) {
tctx             4086 source4/torture/rpc/samr.c 	if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, *password, 0, true)) {
tctx             4092 source4/torture/rpc/samr.c 		char *v = generate_random_str(tctx, 1);
tctx             4098 source4/torture/rpc/samr.c 		if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, simple_pass, 0, true)) {
tctx             4120 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryDomainInfo(p, tctx, &r);
tctx             4140 source4/torture/rpc/samr.c 		status = dcerpc_samr_SetDomainInfo(p, tctx, &s);
tctx             4147 source4/torture/rpc/samr.c 		if (!test_ChangePasswordUser3(p, tctx, acct_name, len - 1, password, NULL, 0, true)) {
tctx             4156 source4/torture/rpc/samr.c 		status = dcerpc_samr_SetDomainInfo(p, tctx, &s);
tctx             4174 source4/torture/rpc/samr.c 		n.in.names = talloc_array(tctx, struct lsa_String, 1);
tctx             4179 source4/torture/rpc/samr.c 		status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx             4190 source4/torture/rpc/samr.c 		status = dcerpc_samr_OpenUser(p, tctx, &r);
tctx             4200 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryUserInfo(p, tctx, &q);
tctx             4208 source4/torture/rpc/samr.c 		if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL,
tctx             4216 source4/torture/rpc/samr.c 	if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) {
tctx             4220 source4/torture/rpc/samr.c 	if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) {
tctx             4227 source4/torture/rpc/samr.c static bool test_CreateUser(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             4252 source4/torture/rpc/samr.c 	user_ctx = talloc_named(tctx, 0, "test_CreateUser2 per-user context");
tctx             4265 source4/torture/rpc/samr.c 	if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) {
tctx             4316 source4/torture/rpc/samr.c 		if (!test_user_ops(p, tctx, &user_handle, domain_handle,
tctx             4345 source4/torture/rpc/samr.c static bool test_CreateUser2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             4388 source4/torture/rpc/samr.c 		user_ctx = talloc_named(tctx, 0, "test_CreateUser2 per-user context");
tctx             4403 source4/torture/rpc/samr.c 		if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) {
tctx             4476 source4/torture/rpc/samr.c 			if (!test_user_ops(p, tctx, &user_handle, domain_handle,
tctx             4502 source4/torture/rpc/samr.c 				struct torture_context *tctx,
tctx             4519 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryAliasInfo(p, tctx, &r);
tctx             4531 source4/torture/rpc/samr.c 				struct torture_context *tctx,
tctx             4548 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryGroupInfo(p, tctx, &r);
tctx             4560 source4/torture/rpc/samr.c 				  struct torture_context *tctx,
tctx             4573 source4/torture/rpc/samr.c 	status = dcerpc_samr_QueryGroupMember(p, tctx, &r);
tctx             4584 source4/torture/rpc/samr.c 			      struct torture_context *tctx,
tctx             4603 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryGroupInfo(p, tctx, &r);
tctx             4630 source4/torture/rpc/samr.c 		status = dcerpc_samr_SetGroupInfo(p, tctx, &s);
tctx             4652 source4/torture/rpc/samr.c 			       struct torture_context *tctx,
tctx             4670 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryUserInfo(p, tctx, &r);
tctx             4682 source4/torture/rpc/samr.c 				struct torture_context *tctx,
tctx             4700 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryUserInfo2(p, tctx, &r);
tctx             4712 source4/torture/rpc/samr.c 			  struct torture_context *tctx,
tctx             4727 source4/torture/rpc/samr.c 	status = dcerpc_samr_OpenUser(p, tctx, &r);
tctx             4733 source4/torture/rpc/samr.c 	if (!test_QuerySecurity(p, tctx, &user_handle)) {
tctx             4737 source4/torture/rpc/samr.c 	if (!test_QueryUserInfo(p, tctx, &user_handle)) {
tctx             4741 source4/torture/rpc/samr.c 	if (!test_QueryUserInfo2(p, tctx, &user_handle)) {
tctx             4745 source4/torture/rpc/samr.c 	if (!test_GetUserPwInfo(p, tctx, &user_handle)) {
tctx             4749 source4/torture/rpc/samr.c 	if (!test_GetGroupsForUser(p,tctx, &user_handle)) {
tctx             4753 source4/torture/rpc/samr.c 	if (!test_samr_handle_Close(p, tctx, &user_handle)) {
tctx             4761 source4/torture/rpc/samr.c 			   struct torture_context *tctx,
tctx             4776 source4/torture/rpc/samr.c 	status = dcerpc_samr_OpenGroup(p, tctx, &r);
tctx             4782 source4/torture/rpc/samr.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx             4783 source4/torture/rpc/samr.c 		if (!test_QuerySecurity(p, tctx, &group_handle)) {
tctx             4788 source4/torture/rpc/samr.c 	if (!test_QueryGroupInfo(p, tctx, &group_handle)) {
tctx             4792 source4/torture/rpc/samr.c 	if (!test_QueryGroupMember(p, tctx, &group_handle)) {
tctx             4796 source4/torture/rpc/samr.c 	if (!test_samr_handle_Close(p, tctx, &group_handle)) {
tctx             4803 source4/torture/rpc/samr.c static bool test_OpenAlias(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             4811 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing OpenAlias(%u)\n", rid);
tctx             4818 source4/torture/rpc/samr.c 	status = dcerpc_samr_OpenAlias(p, tctx, &r);
tctx             4824 source4/torture/rpc/samr.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx             4825 source4/torture/rpc/samr.c 		if (!test_QuerySecurity(p, tctx, &alias_handle)) {
tctx             4830 source4/torture/rpc/samr.c 	if (!test_QueryAliasInfo(p, tctx, &alias_handle)) {
tctx             4834 source4/torture/rpc/samr.c 	if (!test_GetMembersInAlias(p, tctx, &alias_handle)) {
tctx             4838 source4/torture/rpc/samr.c 	if (!test_samr_handle_Close(p, tctx, &alias_handle)) {
tctx             4845 source4/torture/rpc/samr.c static bool check_mask(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             4856 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing OpenUser(%u)\n", rid);
tctx             4863 source4/torture/rpc/samr.c 	status = dcerpc_samr_OpenUser(p, tctx, &r);
tctx             4873 source4/torture/rpc/samr.c 	status = dcerpc_samr_QueryUserInfo(p, tctx, &q);
tctx             4886 source4/torture/rpc/samr.c 	if (!test_samr_handle_Close(p, tctx, &user_handle)) {
tctx             4894 source4/torture/rpc/samr.c 				     struct torture_context *tctx,
tctx             4925 source4/torture/rpc/samr.c 		status = dcerpc_samr_EnumDomainUsers(p, tctx, &r);
tctx             4932 source4/torture/rpc/samr.c 		torture_assert(tctx, sam, "EnumDomainUsers failed: r.out.sam unexpectedly NULL");
tctx             4940 source4/torture/rpc/samr.c 				if (!check_mask(p, tctx, handle, sam->entries[i].idx, mask)) {
tctx             4943 source4/torture/rpc/samr.c 			} else if (!test_OpenUser(p, tctx, handle, sam->entries[i].idx)) {
tctx             4952 source4/torture/rpc/samr.c 	n.in.names = talloc_array(tctx, struct lsa_String, sam->count);
tctx             4958 source4/torture/rpc/samr.c 	status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx             4968 source4/torture/rpc/samr.c 	lr.in.rids = talloc_array(tctx, uint32_t, sam->count);
tctx             4974 source4/torture/rpc/samr.c 	status = dcerpc_samr_LookupRids(p, tctx, &lr);
tctx             4975 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "LookupRids");
tctx             4983 source4/torture/rpc/samr.c static bool test_EnumDomainUsers_async(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             4993 source4/torture/rpc/samr.c 	if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx             4994 source4/torture/rpc/samr.c 		torture_skip(tctx, "samr async test disabled - enable dangerous tests to use\n");
tctx             4997 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing EnumDomainUsers_async\n");
tctx             5006 source4/torture/rpc/samr.c 		req[i] = dcerpc_samr_EnumDomainUsers_send(p, tctx, &r);
tctx             5018 source4/torture/rpc/samr.c 	torture_comment(tctx, "%d async requests OK\n", i);
tctx             5024 source4/torture/rpc/samr.c 				      struct torture_context *tctx,
tctx             5044 source4/torture/rpc/samr.c 	status = dcerpc_samr_EnumDomainGroups(p, tctx, &r);
tctx             5055 source4/torture/rpc/samr.c 		if (!test_OpenGroup(p, tctx, handle, sam->entries[i].idx)) {
tctx             5064 source4/torture/rpc/samr.c 				       struct torture_context *tctx,
tctx             5084 source4/torture/rpc/samr.c 	status = dcerpc_samr_EnumDomainAliases(p, tctx, &r);
tctx             5095 source4/torture/rpc/samr.c 		if (!test_OpenAlias(p, tctx, handle, sam->entries[i].idx)) {
tctx             5104 source4/torture/rpc/samr.c 					    struct torture_context *tctx,
tctx             5126 source4/torture/rpc/samr.c 		status = dcerpc_samr_GetDisplayEnumerationIndex(p, tctx, &r);
tctx             5138 source4/torture/rpc/samr.c 		status = dcerpc_samr_GetDisplayEnumerationIndex(p, tctx, &r);
tctx             5151 source4/torture/rpc/samr.c 					     struct torture_context *tctx,
tctx             5173 source4/torture/rpc/samr.c 		status = dcerpc_samr_GetDisplayEnumerationIndex2(p, tctx, &r);
tctx             5184 source4/torture/rpc/samr.c 		status = dcerpc_samr_GetDisplayEnumerationIndex2(p, tctx, &r);
tctx             5211 source4/torture/rpc/samr.c 				       struct torture_context *tctx,
tctx             5250 source4/torture/rpc/samr.c 			status = dcerpc_samr_OpenUser(p, tctx, &r);
tctx             5260 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryUserInfo(p, tctx, &q);
tctx             5309 source4/torture/rpc/samr.c 		if (!test_samr_handle_Close(p, tctx, &user_handle)) {
tctx             5317 source4/torture/rpc/samr.c 				  struct torture_context *tctx,
tctx             5347 source4/torture/rpc/samr.c 			status = dcerpc_samr_QueryDisplayInfo(p, tctx, &r);
tctx             5355 source4/torture/rpc/samr.c 				if (!test_each_DisplayInfo_user(p, tctx, &r, &seen_testuser)) {
tctx             5361 source4/torture/rpc/samr.c 				if (!test_each_DisplayInfo_user(p, tctx, &r, NULL)) {
tctx             5382 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryDomainInfo(p, tctx, &dom_info);
tctx             5400 source4/torture/rpc/samr.c 				if (NT_STATUS_IS_OK(test_OpenUser_byname(p, tctx, handle, TEST_ACCOUNT_NAME, &user_handle))) {
tctx             5404 source4/torture/rpc/samr.c 					test_samr_handle_Close(p, tctx, &user_handle);
tctx             5426 source4/torture/rpc/samr.c 				   struct torture_context *tctx,
tctx             5450 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryDisplayInfo2(p, tctx, &r);
tctx             5461 source4/torture/rpc/samr.c static bool test_QueryDisplayInfo3(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             5474 source4/torture/rpc/samr.c 		torture_comment(tctx, "Testing QueryDisplayInfo3 level %u\n", levels[i]);
tctx             5485 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryDisplayInfo3(p, tctx, &r);
tctx             5498 source4/torture/rpc/samr.c 					   struct torture_context *tctx,
tctx             5520 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryDisplayInfo(p, tctx, &r);
tctx             5544 source4/torture/rpc/samr.c static bool test_QueryDomainInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             5555 source4/torture/rpc/samr.c 	const char *domain_comment = talloc_asprintf(tctx,
tctx             5557 source4/torture/rpc/samr.c 				  timestring(tctx, time(NULL)));
tctx             5561 source4/torture/rpc/samr.c 	s.in.info = talloc(tctx, union samr_DomainInfo);
tctx             5564 source4/torture/rpc/samr.c 	status = dcerpc_samr_SetDomainInfo(p, tctx, &s);
tctx             5572 source4/torture/rpc/samr.c 		torture_comment(tctx, "Testing QueryDomainInfo level %u\n", levels[i]);
tctx             5578 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryDomainInfo(p, tctx, &r);
tctx             5627 source4/torture/rpc/samr.c 		torture_comment(tctx, "Testing SetDomainInfo level %u\n", levels[i]);
tctx             5633 source4/torture/rpc/samr.c 		status = dcerpc_samr_SetDomainInfo(p, tctx, &s);
tctx             5650 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryDomainInfo(p, tctx, &r);
tctx             5663 source4/torture/rpc/samr.c static bool test_QueryDomainInfo2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             5680 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryDomainInfo2(p, tctx, &r);
tctx             5694 source4/torture/rpc/samr.c static bool test_GroupList(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             5712 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing coherency of querydispinfo vs enumdomgroups\n");
tctx             5723 source4/torture/rpc/samr.c 		status = dcerpc_samr_EnumDomainGroups(p, tctx, &q1);
tctx             5730 source4/torture/rpc/samr.c 			add_string_to_array(tctx,
tctx             5736 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "EnumDomainGroups");
tctx             5738 source4/torture/rpc/samr.c 	torture_assert(tctx, sam, "EnumDomainGroups failed to return sam");
tctx             5751 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryDisplayInfo(p, tctx, &q2);
tctx             5797 source4/torture/rpc/samr.c static bool test_DeleteDomainGroup(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             5803 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing DeleteDomainGroup\n");
tctx             5808 source4/torture/rpc/samr.c 	status = dcerpc_samr_DeleteDomainGroup(p, tctx, &d);
tctx             5809 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "DeleteDomainGroup");
tctx             5814 source4/torture/rpc/samr.c static bool test_TestPrivateFunctionsDomain(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             5821 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing TestPrivateFunctionsDomain\n");
tctx             5825 source4/torture/rpc/samr.c 	status = dcerpc_samr_TestPrivateFunctionsDomain(p, tctx, &r);
tctx             5826 source4/torture/rpc/samr.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "TestPrivateFunctionsDomain");
tctx             5831 source4/torture/rpc/samr.c static bool test_RidToSid(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             5843 source4/torture/rpc/samr.c 		torture_comment(tctx, "Testing RidToSid\n");
tctx             5845 source4/torture/rpc/samr.c 		calc_sid = dom_sid_dup(tctx, domain_sid);
tctx             5850 source4/torture/rpc/samr.c 		status = dcerpc_samr_RidToSid(p, tctx, &r);
tctx             5859 source4/torture/rpc/samr.c 				       dom_sid_string(tctx, out_sid),
tctx             5860 source4/torture/rpc/samr.c 				       dom_sid_string(tctx, calc_sid));
tctx             5869 source4/torture/rpc/samr.c static bool test_GetBootKeyInformation(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             5877 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing GetBootKeyInformation\n");
tctx             5882 source4/torture/rpc/samr.c 	status = dcerpc_samr_GetBootKeyInformation(p, tctx, &r);
tctx             5885 source4/torture/rpc/samr.c 		torture_comment(tctx, "GetBootKeyInformation (ignored) - %s\n", nt_errstr(status));
tctx             5891 source4/torture/rpc/samr.c static bool test_AddGroupMember(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             5903 source4/torture/rpc/samr.c 	status = test_LookupName(p, tctx, domain_handle, TEST_ACCOUNT_NAME, &rid);
tctx             5904 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "test_AddGroupMember looking up name " TEST_ACCOUNT_NAME);
tctx             5910 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing AddGroupMember and DeleteGroupMember\n");
tctx             5915 source4/torture/rpc/samr.c 	status = dcerpc_samr_DeleteGroupMember(p, tctx, &d);
tctx             5916 source4/torture/rpc/samr.c 	torture_assert_ntstatus_equal(tctx, NT_STATUS_MEMBER_NOT_IN_GROUP, status, "DeleteGroupMember");
tctx             5918 source4/torture/rpc/samr.c 	status = dcerpc_samr_AddGroupMember(p, tctx, &r);
tctx             5919 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "AddGroupMember");
tctx             5921 source4/torture/rpc/samr.c 	status = dcerpc_samr_AddGroupMember(p, tctx, &r);
tctx             5922 source4/torture/rpc/samr.c 	torture_assert_ntstatus_equal(tctx, NT_STATUS_MEMBER_IN_GROUP, status, "AddGroupMember");
tctx             5924 source4/torture/rpc/samr.c 	if (torture_setting_bool(tctx, "samba4", false) ||
tctx             5925 source4/torture/rpc/samr.c 	    torture_setting_bool(tctx, "samba3", false)) {
tctx             5926 source4/torture/rpc/samr.c 		torture_comment(tctx, "skipping SetMemberAttributesOfGroup test against Samba4\n");
tctx             5935 source4/torture/rpc/samr.c 		status = dcerpc_samr_SetMemberAttributesOfGroup(p, tctx, &s);
tctx             5936 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status, "SetMemberAttributesOfGroup");
tctx             5942 source4/torture/rpc/samr.c 	status = dcerpc_samr_QueryGroupMember(p, tctx, &q);
tctx             5943 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "QueryGroupMember");
tctx             5945 source4/torture/rpc/samr.c 	status = dcerpc_samr_DeleteGroupMember(p, tctx, &d);
tctx             5946 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "DeleteGroupMember");
tctx             5948 source4/torture/rpc/samr.c 	status = dcerpc_samr_AddGroupMember(p, tctx, &r);
tctx             5949 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "AddGroupMember");
tctx             5956 source4/torture/rpc/samr.c 				   struct torture_context *tctx,
tctx             5979 source4/torture/rpc/samr.c 	status = dcerpc_samr_CreateDomainGroup(p, tctx, &r);
tctx             5981 source4/torture/rpc/samr.c 	if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) {
tctx             5983 source4/torture/rpc/samr.c 			torture_comment(tctx, "Server correctly refused create of '%s'\n", r.in.name->string);
tctx             5993 source4/torture/rpc/samr.c 		if (!test_DeleteGroup_byname(p, tctx, domain_handle, r.in.name->string)) {
tctx             5998 source4/torture/rpc/samr.c 		status = dcerpc_samr_CreateDomainGroup(p, tctx, &r);
tctx             6001 source4/torture/rpc/samr.c 		if (!test_DeleteUser_byname(p, tctx, domain_handle, r.in.name->string)) {
tctx             6007 source4/torture/rpc/samr.c 		status = dcerpc_samr_CreateDomainGroup(p, tctx, &r);
tctx             6009 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "CreateDomainGroup");
tctx             6015 source4/torture/rpc/samr.c 	if (!test_AddGroupMember(p, tctx, domain_handle, group_handle)) {
tctx             6020 source4/torture/rpc/samr.c 	if (!test_SetGroupInfo(p, tctx, group_handle)) {
tctx             6032 source4/torture/rpc/samr.c 					       struct torture_context *tctx,
tctx             6039 source4/torture/rpc/samr.c 	r.in.sid = dom_sid_parse_talloc(tctx, "S-1-5-32-12-34-56-78");
tctx             6041 source4/torture/rpc/samr.c 	status = dcerpc_samr_RemoveMemberFromForeignDomain(p, tctx, &r);
tctx             6042 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "RemoveMemberFromForeignDomain");
tctx             6048 source4/torture/rpc/samr.c 				 struct torture_context *tctx,
tctx             6071 source4/torture/rpc/samr.c 		status = dcerpc_samr_EnumDomainUsers(p, tctx, &r);
tctx             6073 source4/torture/rpc/samr.c 			torture_assert_ntstatus_ok(tctx, status,
tctx             6088 source4/torture/rpc/samr.c 				  struct torture_context *tctx,
tctx             6110 source4/torture/rpc/samr.c 		status = dcerpc_samr_EnumDomainGroups(p, tctx, &r);
tctx             6112 source4/torture/rpc/samr.c 			torture_assert_ntstatus_ok(tctx, status,
tctx             6127 source4/torture/rpc/samr.c 				   struct torture_context *tctx,
tctx             6149 source4/torture/rpc/samr.c 		status = dcerpc_samr_EnumDomainAliases(p, tctx, &r);
tctx             6151 source4/torture/rpc/samr.c 			torture_assert_ntstatus_ok(tctx, status,
tctx             6166 source4/torture/rpc/samr.c 			     struct torture_context *tctx,
tctx             6189 source4/torture/rpc/samr.c 		status = dcerpc_samr_QueryDomainInfo2(p, tctx, &r);
tctx             6190 source4/torture/rpc/samr.c 		torture_assert_ntstatus_ok(tctx, status,
tctx             6219 source4/torture/rpc/samr.c 			name = talloc_asprintf(tctx, "%s%04d", TEST_ACCOUNT_NAME, i);
tctx             6220 source4/torture/rpc/samr.c 			ret &= test_CreateUser(p, tctx, domain_handle, name, &handle, domain_sid, 0, NULL, false);
tctx             6223 source4/torture/rpc/samr.c 			name = talloc_asprintf(tctx, "%s%04d", TEST_GROUPNAME, i);
tctx             6224 source4/torture/rpc/samr.c 			ret &= test_CreateDomainGroup(p, tctx, domain_handle, name, &handle, domain_sid, false);
tctx             6227 source4/torture/rpc/samr.c 			name = talloc_asprintf(tctx, "%s%04d", TEST_ALIASNAME, i);
tctx             6228 source4/torture/rpc/samr.c 			ret &= test_CreateAlias(p, tctx, domain_handle, name, &handle, domain_sid, false);
tctx             6234 source4/torture/rpc/samr.c 			ret &= test_samr_handle_Close(p, tctx, &handle);
tctx             6243 source4/torture/rpc/samr.c 		ret &= test_EnumDomainUsers(p, tctx, domain_handle, &num_enum);
tctx             6246 source4/torture/rpc/samr.c 		ret &= test_EnumDomainGroups(p, tctx, domain_handle, &num_enum);
tctx             6249 source4/torture/rpc/samr.c 		ret &= test_EnumDomainAliases(p, tctx, domain_handle, &num_enum);
tctx             6255 source4/torture/rpc/samr.c 	torture_assert_int_equal(tctx, num_enum, num_anounced + num_created,
tctx             6271 source4/torture/rpc/samr.c 	torture_assert_int_equal(tctx, num_disp, num_anounced + num_created,
tctx             6277 source4/torture/rpc/samr.c static bool test_Connect(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             6280 source4/torture/rpc/samr.c static bool test_OpenDomain(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             6298 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing OpenDomain of %s\n", dom_sid_string(tctx, sid));
tctx             6305 source4/torture/rpc/samr.c 	status = dcerpc_samr_OpenDomain(p, tctx, &r);
tctx             6306 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "OpenDomain");
tctx             6310 source4/torture/rpc/samr.c 	ret &= test_samr_handle_Close(p, tctx, handle);
tctx             6316 source4/torture/rpc/samr.c 		if (!torture_setting_bool(tctx, "samba3", false)) {
tctx             6317 source4/torture/rpc/samr.c 			ret &= test_CreateUser2(p, tctx, &domain_handle, sid, which_ops, NULL);
tctx             6319 source4/torture/rpc/samr.c 		ret &= test_CreateUser(p, tctx, &domain_handle, TEST_ACCOUNT_NAME, &user_handle, sid, which_ops, NULL, true);
tctx             6321 source4/torture/rpc/samr.c 		ret &= test_QueryDisplayInfo(p, tctx, &domain_handle);
tctx             6323 source4/torture/rpc/samr.c 			printf("Testing PASSWORDS or ATTRIBUTES on domain %s failed!\n", dom_sid_string(tctx, sid));
tctx             6327 source4/torture/rpc/samr.c 		if (!torture_setting_bool(tctx, "samba3", false)) {
tctx             6328 source4/torture/rpc/samr.c 			ret &= test_CreateUser2(p, tctx, &domain_handle, sid, which_ops, machine_credentials);
tctx             6330 source4/torture/rpc/samr.c 		ret &= test_CreateUser(p, tctx, &domain_handle, TEST_ACCOUNT_NAME, &user_handle, sid, which_ops, machine_credentials, true);
tctx             6332 source4/torture/rpc/samr.c 			printf("Testing PASSWORDS PWDLASTSET on domain %s failed!\n", dom_sid_string(tctx, sid));
tctx             6338 source4/torture/rpc/samr.c 		ret &= test_ManyObjects(p, tctx, &domain_handle, sid, which_ops);
tctx             6341 source4/torture/rpc/samr.c 		ret &= test_CreateUser(p, tctx, &domain_handle, TEST_ACCOUNT_NAME, &user_handle, sid, which_ops, NULL, true);
tctx             6343 source4/torture/rpc/samr.c 			printf("Failed to CreateUser in SAMR-OTHER on domain %s!\n", dom_sid_string(tctx, sid));
tctx             6345 source4/torture/rpc/samr.c 		if (!torture_setting_bool(tctx, "samba3", false)) {
tctx             6346 source4/torture/rpc/samr.c 			ret &= test_QuerySecurity(p, tctx, &domain_handle);
tctx             6348 source4/torture/rpc/samr.c 		ret &= test_RemoveMemberFromForeignDomain(p, tctx, &domain_handle);
tctx             6349 source4/torture/rpc/samr.c 		ret &= test_CreateAlias(p, tctx, &domain_handle, TEST_ALIASNAME, &alias_handle, sid, true);
tctx             6350 source4/torture/rpc/samr.c 		ret &= test_CreateDomainGroup(p, tctx, &domain_handle, TEST_GROUPNAME, &group_handle, sid, true);
tctx             6351 source4/torture/rpc/samr.c 		ret &= test_QueryDomainInfo(p, tctx, &domain_handle);
tctx             6352 source4/torture/rpc/samr.c 		ret &= test_QueryDomainInfo2(p, tctx, &domain_handle);
tctx             6353 source4/torture/rpc/samr.c 		ret &= test_EnumDomainUsers_all(p, tctx, &domain_handle);
tctx             6354 source4/torture/rpc/samr.c 		ret &= test_EnumDomainUsers_async(p, tctx, &domain_handle);
tctx             6355 source4/torture/rpc/samr.c 		ret &= test_EnumDomainGroups_all(p, tctx, &domain_handle);
tctx             6356 source4/torture/rpc/samr.c 		ret &= test_EnumDomainAliases_all(p, tctx, &domain_handle);
tctx             6357 source4/torture/rpc/samr.c 		ret &= test_QueryDisplayInfo2(p, tctx, &domain_handle);
tctx             6358 source4/torture/rpc/samr.c 		ret &= test_QueryDisplayInfo3(p, tctx, &domain_handle);
tctx             6359 source4/torture/rpc/samr.c 		ret &= test_QueryDisplayInfo_continue(p, tctx, &domain_handle);
tctx             6361 source4/torture/rpc/samr.c 		if (torture_setting_bool(tctx, "samba4", false)) {
tctx             6362 source4/torture/rpc/samr.c 			torture_comment(tctx, "skipping GetDisplayEnumerationIndex test against Samba4\n");
tctx             6364 source4/torture/rpc/samr.c 			ret &= test_GetDisplayEnumerationIndex(p, tctx, &domain_handle);
tctx             6365 source4/torture/rpc/samr.c 			ret &= test_GetDisplayEnumerationIndex2(p, tctx, &domain_handle);
tctx             6367 source4/torture/rpc/samr.c 		ret &= test_GroupList(p, tctx, &domain_handle);
tctx             6368 source4/torture/rpc/samr.c 		ret &= test_TestPrivateFunctionsDomain(p, tctx, &domain_handle);
tctx             6369 source4/torture/rpc/samr.c 		ret &= test_RidToSid(p, tctx, sid, &domain_handle);
tctx             6370 source4/torture/rpc/samr.c 		ret &= test_GetBootKeyInformation(p, tctx, &domain_handle);
tctx             6372 source4/torture/rpc/samr.c 			torture_comment(tctx, "Testing SAMR-OTHER on domain %s failed!\n", dom_sid_string(tctx, sid));
tctx             6378 source4/torture/rpc/samr.c 	    !test_DeleteUser(p, tctx, &user_handle)) {
tctx             6383 source4/torture/rpc/samr.c 	    !test_DeleteAlias(p, tctx, &alias_handle)) {
tctx             6388 source4/torture/rpc/samr.c 	    !test_DeleteDomainGroup(p, tctx, &group_handle)) {
tctx             6392 source4/torture/rpc/samr.c 	ret &= test_samr_handle_Close(p, tctx, &domain_handle);
tctx             6395 source4/torture/rpc/samr.c 	ret &= test_Connect(p, tctx, handle);
tctx             6398 source4/torture/rpc/samr.c 		printf("Testing domain %s failed!\n", dom_sid_string(tctx, sid));
tctx             6404 source4/torture/rpc/samr.c static bool test_LookupDomain(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             6416 source4/torture/rpc/samr.c 	torture_comment(tctx, "Testing LookupDomain(%s)\n", domain);
tctx             6424 source4/torture/rpc/samr.c 	status = dcerpc_samr_LookupDomain(p, tctx, &r);
tctx             6425 source4/torture/rpc/samr.c 	torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER, status, "LookupDomain expected NT_STATUS_INVALID_PARAMETER");
tctx             6429 source4/torture/rpc/samr.c 	status = dcerpc_samr_LookupDomain(p, tctx, &r);
tctx             6430 source4/torture/rpc/samr.c 	torture_assert_ntstatus_equal(tctx, NT_STATUS_NO_SUCH_DOMAIN, status, "LookupDomain expected NT_STATUS_NO_SUCH_DOMAIN");
tctx             6437 source4/torture/rpc/samr.c 	status = dcerpc_samr_LookupDomain(p, tctx, &r);
tctx             6438 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "LookupDomain");
tctx             6440 source4/torture/rpc/samr.c 	if (!test_GetDomPwInfo(p, tctx, &n1)) {
tctx             6444 source4/torture/rpc/samr.c 	if (!test_OpenDomain(p, tctx, handle, *r.out.sid, which_ops,
tctx             6453 source4/torture/rpc/samr.c static bool test_EnumDomains(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             6472 source4/torture/rpc/samr.c 	status = dcerpc_samr_EnumDomains(p, tctx, &r);
tctx             6473 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "EnumDomains");
tctx             6480 source4/torture/rpc/samr.c 		if (!test_LookupDomain(p, tctx, handle,
tctx             6487 source4/torture/rpc/samr.c 	status = dcerpc_samr_EnumDomains(p, tctx, &r);
tctx             6488 source4/torture/rpc/samr.c 	torture_assert_ntstatus_ok(tctx, status, "EnumDomains");
tctx             6494 source4/torture/rpc/samr.c static bool test_Connect(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             6508 source4/torture/rpc/samr.c 	torture_comment(tctx, "testing samr_Connect\n");
tctx             6514 source4/torture/rpc/samr.c 	status = dcerpc_samr_Connect(p, tctx, &r);
tctx             6516 source4/torture/rpc/samr.c 		torture_comment(tctx, "Connect failed - %s\n", nt_errstr(status));
tctx             6523 source4/torture/rpc/samr.c 	torture_comment(tctx, "testing samr_Connect2\n");
tctx             6529 source4/torture/rpc/samr.c 	status = dcerpc_samr_Connect2(p, tctx, &r2);
tctx             6531 source4/torture/rpc/samr.c 		torture_comment(tctx, "Connect2 failed - %s\n", nt_errstr(status));
tctx             6535 source4/torture/rpc/samr.c 			test_samr_handle_Close(p, tctx, handle);
tctx             6541 source4/torture/rpc/samr.c 	torture_comment(tctx, "testing samr_Connect3\n");
tctx             6548 source4/torture/rpc/samr.c 	status = dcerpc_samr_Connect3(p, tctx, &r3);
tctx             6554 source4/torture/rpc/samr.c 			test_samr_handle_Close(p, tctx, handle);
tctx             6560 source4/torture/rpc/samr.c 	torture_comment(tctx, "testing samr_Connect4\n");
tctx             6567 source4/torture/rpc/samr.c 	status = dcerpc_samr_Connect4(p, tctx, &r4);
tctx             6573 source4/torture/rpc/samr.c 			test_samr_handle_Close(p, tctx, handle);
tctx             6579 source4/torture/rpc/samr.c 	torture_comment(tctx, "testing samr_Connect5\n");
tctx             6592 source4/torture/rpc/samr.c 	status = dcerpc_samr_Connect5(p, tctx, &r5);
tctx             6598 source4/torture/rpc/samr.c 			test_samr_handle_Close(p, tctx, handle);
tctx               34 source4/torture/rpc/samr_accessmask.c static NTSTATUS torture_samr_Close(struct torture_context *tctx,
tctx               43 source4/torture/rpc/samr_accessmask.c 	status = dcerpc_samr_Close(p, tctx, &cl);
tctx               48 source4/torture/rpc/samr_accessmask.c static NTSTATUS torture_samr_Connect5(struct torture_context *tctx,
tctx               67 source4/torture/rpc/samr_accessmask.c 	status = dcerpc_samr_Connect5(p, tctx, &r5);
tctx               73 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_Connect5(struct torture_context *tctx,
tctx               85 source4/torture/rpc/samr_accessmask.c 		status = torture_samr_Connect5(tctx, p, mask, &h);
tctx              121 source4/torture/rpc/samr_accessmask.c 			status = torture_samr_Close(tctx, p, &h);
tctx              143 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_EnumDomains(struct torture_context *tctx,
tctx              159 source4/torture/rpc/samr_accessmask.c 		status = torture_samr_Connect5(tctx, p, mask, &ch);
tctx              180 source4/torture/rpc/samr_accessmask.c 			status = dcerpc_samr_EnumDomains(p, tctx, &ed);
tctx              186 source4/torture/rpc/samr_accessmask.c 			status = torture_samr_Close(tctx, p, &ch);
tctx              207 source4/torture/rpc/samr_accessmask.c 			status = dcerpc_samr_EnumDomains(p, tctx, &ed);
tctx              213 source4/torture/rpc/samr_accessmask.c 			status = torture_samr_Close(tctx, p, &ch);
tctx              234 source4/torture/rpc/samr_accessmask.c static bool test_samr_connect_user_acl(struct torture_context *tctx,
tctx              251 source4/torture/rpc/samr_accessmask.c 	const char *binding = torture_setting_string(tctx, "binding", NULL);
tctx              256 source4/torture/rpc/samr_accessmask.c 	status = torture_samr_Connect5(tctx, p, SEC_FLAG_MAXIMUM_ALLOWED, &ch);
tctx              267 source4/torture/rpc/samr_accessmask.c 	status = dcerpc_samr_QuerySecurity(p, tctx, &qs);
tctx              294 source4/torture/rpc/samr_accessmask.c 	status = dcerpc_samr_SetSecurity(p, tctx, &ss);
tctx              302 source4/torture/rpc/samr_accessmask.c 	status = dcerpc_pipe_connect(tctx,
tctx              304 source4/torture/rpc/samr_accessmask.c 			     test_credentials, tctx->ev, tctx->lp_ctx);
tctx              311 source4/torture/rpc/samr_accessmask.c 	status = torture_samr_Connect5(tctx, test_p, SEC_FLAG_MAXIMUM_ALLOWED, &uch);
tctx              323 source4/torture/rpc/samr_accessmask.c 	status = dcerpc_samr_QuerySecurity(p, tctx, &qs);
tctx              334 source4/torture/rpc/samr_accessmask.c 	status = torture_samr_Close(tctx, p, &ch);
tctx              354 source4/torture/rpc/samr_accessmask.c static bool test_samr_connect_user_acl_enforced(struct torture_context *tctx,
tctx              364 source4/torture/rpc/samr_accessmask.c 	const char *binding = torture_setting_string(tctx, "binding", NULL);
tctx              369 source4/torture/rpc/samr_accessmask.c 	status = dcerpc_pipe_connect(tctx,
tctx              371 source4/torture/rpc/samr_accessmask.c 			     test_credentials, tctx->ev, tctx->lp_ctx);
tctx              378 source4/torture/rpc/samr_accessmask.c 	status = torture_samr_Connect5(tctx, test_p, SAMR_ACCESS_SHUTDOWN_SERVER, &uch);
tctx              400 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_LookupDomain(struct torture_context *tctx,
tctx              415 source4/torture/rpc/samr_accessmask.c 		status = torture_samr_Connect5(tctx, p, mask, &ch);
tctx              432 source4/torture/rpc/samr_accessmask.c 			dn.string            = lp_workgroup(tctx->lp_ctx);
tctx              434 source4/torture/rpc/samr_accessmask.c 			status = dcerpc_samr_LookupDomain(p, tctx, &ld);
tctx              440 source4/torture/rpc/samr_accessmask.c 			status = torture_samr_Close(tctx, p, &ch);
tctx              457 source4/torture/rpc/samr_accessmask.c 			dn.string            = lp_workgroup(tctx->lp_ctx);
tctx              459 source4/torture/rpc/samr_accessmask.c 			status = dcerpc_samr_LookupDomain(p, tctx, &ld);
tctx              465 source4/torture/rpc/samr_accessmask.c 			status = torture_samr_Close(tctx, p, &ch);
tctx              487 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_OpenDomain(struct torture_context *tctx,
tctx              502 source4/torture/rpc/samr_accessmask.c 	status = torture_samr_Connect5(tctx, p, SEC_FLAG_MAXIMUM_ALLOWED, &ch);
tctx              511 source4/torture/rpc/samr_accessmask.c 	dn.string            = lp_workgroup(tctx->lp_ctx);
tctx              512 source4/torture/rpc/samr_accessmask.c 	status = dcerpc_samr_LookupDomain(p, tctx, &ld);
tctx              524 source4/torture/rpc/samr_accessmask.c 		status = torture_samr_Connect5(tctx, p, mask, &ch);
tctx              543 source4/torture/rpc/samr_accessmask.c 			status = dcerpc_samr_OpenDomain(p, tctx, &od);
tctx              549 source4/torture/rpc/samr_accessmask.c 			status = torture_samr_Close(tctx, p, &dh);
tctx              555 source4/torture/rpc/samr_accessmask.c 			status = torture_samr_Close(tctx, p, &ch);
tctx              569 source4/torture/rpc/samr_accessmask.c 			status = torture_samr_Close(tctx, p, &ch);
tctx              582 source4/torture/rpc/samr_accessmask.c static bool test_samr_connect(struct torture_context *tctx,
tctx              591 source4/torture/rpc/samr_accessmask.c 	if (torture_setting_bool(tctx, "samba3", false)) {
tctx              592 source4/torture/rpc/samr_accessmask.c 		torture_skip(tctx, "Skipping test against Samba 3");
tctx              596 source4/torture/rpc/samr_accessmask.c 	testuser = torture_create_testuser(tctx, TEST_USER_NAME, lp_workgroup(tctx->lp_ctx),
tctx              602 source4/torture/rpc/samr_accessmask.c 	test_credentials = cli_credentials_init(tctx);
tctx              604 source4/torture/rpc/samr_accessmask.c 	cli_credentials_set_domain(test_credentials, lp_workgroup(tctx->lp_ctx),
tctx              614 source4/torture/rpc/samr_accessmask.c 	if (!test_samr_connect_user_acl(tctx, p, test_credentials, test_sid)) {
tctx              628 source4/torture/rpc/samr_accessmask.c 	if (!test_samr_connect_user_acl_enforced(tctx, p, test_credentials, test_sid)) {
tctx              633 source4/torture/rpc/samr_accessmask.c 	torture_leave_domain(tctx, testuser);
tctx              427 source4/torture/rpc/samsync.c static bool samsync_handle_user(struct torture_context *tctx, TALLOC_CTX *mem_ctx, struct samsync_state *samsync_state,
tctx              582 source4/torture/rpc/samsync.c 		ndr_err = ndr_pull_struct_blob(&data, mem_ctx, lp_iconv_convenience(tctx->lp_ctx), &keys, (ndr_pull_flags_fn_t)ndr_pull_netr_USER_KEYS);
tctx             1147 source4/torture/rpc/samsync.c static bool test_DatabaseSync(struct torture_context *tctx, 
tctx             1221 source4/torture/rpc/samsync.c 					if (!samsync_handle_user(tctx, delta_ctx, samsync_state, 
tctx               33 source4/torture/rpc/scanner.c static bool test_num_calls(struct torture_context *tctx, 
tctx               50 source4/torture/rpc/scanner.c 	status = torture_rpc_connection(tctx, &p, iface);
tctx               44 source4/torture/rpc/schannel.c bool test_netlogon_ex_ops(struct dcerpc_pipe *p, struct torture_context *tctx, 
tctx               58 source4/torture/rpc/schannel.c 	if (lp_client_lanman_auth(tctx->lp_ctx)) {
tctx               62 source4/torture/rpc/schannel.c 	if (lp_client_ntlmv2_auth(tctx->lp_ctx)) {
tctx               66 source4/torture/rpc/schannel.c 	cli_credentials_get_ntlm_username_domain(cmdline_credentials, tctx, 
tctx               75 source4/torture/rpc/schannel.c 	names_blob = NTLMv2_generate_names_blob(tctx, cli_credentials_get_workstation(credentials), 
tctx               78 source4/torture/rpc/schannel.c 	status = cli_credentials_get_ntlm_response(cmdline_credentials, tctx, 
tctx               84 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              100 source4/torture/rpc/schannel.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              109 source4/torture/rpc/schannel.c 	torture_comment(tctx, 
tctx              116 source4/torture/rpc/schannel.c 		status = dcerpc_netr_LogonSamLogonEx(p, tctx, &r);
tctx              117 source4/torture/rpc/schannel.c 		torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed");
tctx              126 source4/torture/rpc/schannel.c static bool test_samr_ops(struct torture_context *tctx,
tctx              139 source4/torture/rpc/schannel.c 	name.string = lp_workgroup(tctx->lp_ctx);
tctx              149 source4/torture/rpc/schannel.c 	status = dcerpc_samr_Connect(p, tctx, &connect_r);
tctx              161 source4/torture/rpc/schannel.c 		opendom.in.sid = dom_sid_parse_talloc(tctx, "S-1-5-32");
tctx              164 source4/torture/rpc/schannel.c 		status = dcerpc_samr_OpenDomain(p, tctx, &opendom);
tctx              175 source4/torture/rpc/schannel.c 		status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
tctx              191 source4/torture/rpc/schannel.c static bool test_lsa_ops(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx              207 source4/torture/rpc/schannel.c 	status = dcerpc_lsa_GetUserName(p, tctx, &r);
tctx              225 source4/torture/rpc/schannel.c 			if (!torture_setting_bool(tctx, "samba3", false)) {
tctx              237 source4/torture/rpc/schannel.c 			if (!torture_setting_bool(tctx, "samba3", false)) {
tctx              242 source4/torture/rpc/schannel.c 	if (!test_many_LookupSids(p, tctx, NULL)) {
tctx              254 source4/torture/rpc/schannel.c static bool test_schannel(struct torture_context *tctx,
tctx              260 source4/torture/rpc/schannel.c 	const char *binding = torture_setting_string(tctx, "binding", NULL);
tctx              271 source4/torture/rpc/schannel.c 	join_ctx = torture_join_domain(tctx, 
tctx              272 source4/torture/rpc/schannel.c 				       talloc_asprintf(tctx, "%s%d", TEST_MACHINE_NAME, i), 
tctx              274 source4/torture/rpc/schannel.c 	torture_assert(tctx, join_ctx != NULL, "Failed to join domain");
tctx              276 source4/torture/rpc/schannel.c 	status = dcerpc_parse_binding(tctx, binding, &b);
tctx              277 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "Bad binding string");
tctx              282 source4/torture/rpc/schannel.c 	status = dcerpc_pipe_connect_b(tctx, &p, b, &ndr_table_samr,
tctx              283 source4/torture/rpc/schannel.c 				       credentials, tctx->ev, tctx->lp_ctx);
tctx              284 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              287 source4/torture/rpc/schannel.c 	torture_assert(tctx, test_samr_ops(tctx, p), 
tctx              295 source4/torture/rpc/schannel.c 	status = dcerpc_epm_map_binding(tctx, b, &ndr_table_netlogon, tctx->ev, tctx->lp_ctx);
tctx              296 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "epm map");
tctx              300 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "seconday connection");
tctx              303 source4/torture/rpc/schannel.c 				  credentials, lp_gensec_settings(tctx, tctx->lp_ctx),
tctx              308 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "bind auth");
tctx              310 source4/torture/rpc/schannel.c 	status = dcerpc_schannel_creds(p_netlogon->conn->security_state.generic_state, tctx, &creds);
tctx              311 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "schannel creds");
tctx              314 source4/torture/rpc/schannel.c 	torture_assert(tctx, test_netlogon_ops(p_netlogon, tctx, credentials, creds),
tctx              317 source4/torture/rpc/schannel.c 	torture_assert(tctx, test_netlogon_ex_ops(p_netlogon, tctx, credentials, creds),
tctx              321 source4/torture/rpc/schannel.c 	status = dcerpc_epm_map_binding(tctx, b, &ndr_table_lsarpc, tctx->ev, tctx->lp_ctx);
tctx              322 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "epm map");
tctx              327 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "seconday connection");
tctx              330 source4/torture/rpc/schannel.c 				  credentials, lp_gensec_settings(tctx, tctx->lp_ctx),
tctx              335 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "bind auth");
tctx              337 source4/torture/rpc/schannel.c 	torture_assert(tctx, test_lsa_ops(tctx, p_lsa), 
tctx              346 source4/torture/rpc/schannel.c 	status = dcerpc_parse_binding(tctx, binding, &b);
tctx              347 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "Bad binding string");
tctx              352 source4/torture/rpc/schannel.c 	status = dcerpc_pipe_connect_b(tctx, &p_samr2, b, &ndr_table_samr,
tctx              353 source4/torture/rpc/schannel.c 				       credentials, tctx->ev, tctx->lp_ctx);
tctx              354 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              358 source4/torture/rpc/schannel.c 	torture_assert (tctx, test_samr_ops(tctx, p_samr2), 
tctx              362 source4/torture/rpc/schannel.c 	status = dcerpc_epm_map_binding(tctx, b, &ndr_table_netlogon, tctx->ev, tctx->lp_ctx);
tctx              363 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "epm");
tctx              367 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "seconday connection");
tctx              371 source4/torture/rpc/schannel.c 				  credentials, lp_gensec_settings(tctx, tctx->lp_ctx),
tctx              376 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "auth failed");
tctx              379 source4/torture/rpc/schannel.c 	torture_assert(tctx, test_netlogon_ex_ops(p_netlogon2, tctx, credentials, creds), 
tctx              385 source4/torture/rpc/schannel.c 	torture_assert(tctx, test_netlogon_ops(p_netlogon2, tctx, credentials, creds),
tctx              394 source4/torture/rpc/schannel.c 	status = dcerpc_pipe_connect_b(tctx, &p_netlogon3, b, &ndr_table_netlogon,
tctx              395 source4/torture/rpc/schannel.c 				       credentials, tctx->ev, tctx->lp_ctx);
tctx              396 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to connect without schannel");
tctx              398 source4/torture/rpc/schannel.c 	torture_assert(tctx, !test_netlogon_ex_ops(p_netlogon3, tctx, credentials, creds),
tctx              402 source4/torture/rpc/schannel.c 	tctx->last_result = TORTURE_OK;
tctx              403 source4/torture/rpc/schannel.c 	tctx->last_reason = NULL;
tctx              405 source4/torture/rpc/schannel.c 	torture_assert(tctx, test_netlogon_ops(p_netlogon3, tctx, credentials, creds),
tctx              408 source4/torture/rpc/schannel.c 	torture_leave_domain(tctx, join_ctx);
tctx              524 source4/torture/rpc/schannel.c 	struct torture_context *tctx;
tctx              551 source4/torture/rpc/schannel.c 	torture_comment(s->tctx, "conn[%u]: %s\n", conn->index, nt_errstr(s->error));
tctx              574 source4/torture/rpc/schannel.c 	if (lp_client_lanman_auth(s->tctx->lp_ctx)) {
tctx              578 source4/torture/rpc/schannel.c 	if (lp_client_ntlmv2_auth(s->tctx->lp_ctx)) {
tctx              606 source4/torture/rpc/schannel.c 	torture_assert_ntstatus_ok(s->tctx, status,
tctx              632 source4/torture/rpc/schannel.c 	torture_assert(s->tctx, req, "Failed to setup LogonSamLogonEx request");
tctx              681 source4/torture/rpc/schannel.c 	s->tctx = torture;
tctx              690 source4/torture/rpc/schannel.c 	tmp = torture_setting_string(s->tctx, "extra_user1", NULL);
tctx              697 source4/torture/rpc/schannel.c 	tmp = torture_setting_string(s->tctx, "extra_user2", NULL);
tctx              702 source4/torture/rpc/schannel.c 	s->join_ctx1 = torture_join_domain(s->tctx, talloc_asprintf(s, "%sb", TEST_MACHINE_NAME),
tctx              706 source4/torture/rpc/schannel.c 	s->join_ctx2 = torture_join_domain(s->tctx, talloc_asprintf(s, "%sc", TEST_MACHINE_NAME),
tctx               37 source4/torture/rpc/session_key.c 				    struct torture_context *tctx,
tctx               56 source4/torture/rpc/session_key.c 	secname = talloc_asprintf(tctx, "torturesecret-%u", (uint_t)random());
tctx               58 source4/torture/rpc/session_key.c 	torture_comment(tctx, "Testing CreateSecret of %s\n", secname);
tctx               66 source4/torture/rpc/session_key.c 	status = dcerpc_lsa_CreateSecret(p, tctx, &r);
tctx               67 source4/torture/rpc/session_key.c 	torture_assert_ntstatus_ok(tctx, status, "CreateSecret failed");
tctx               70 source4/torture/rpc/session_key.c 	torture_assert_ntstatus_ok(tctx, status, "dcerpc_fetch_session_key failed");
tctx               81 source4/torture/rpc/session_key.c 	torture_comment(tctx, "Testing SetSecret\n");
tctx               83 source4/torture/rpc/session_key.c 	status = dcerpc_lsa_SetSecret(p, tctx, &r3);
tctx               84 source4/torture/rpc/session_key.c 	torture_assert_ntstatus_ok(tctx, status, "SetSecret failed");
tctx               96 source4/torture/rpc/session_key.c 	torture_comment(tctx, "Testing SetSecret with broken key\n");
tctx               98 source4/torture/rpc/session_key.c 	status = dcerpc_lsa_SetSecret(p, tctx, &r3);
tctx               99 source4/torture/rpc/session_key.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_UNKNOWN_REVISION, 
tctx              116 source4/torture/rpc/session_key.c 	torture_comment(tctx, "Testing QuerySecret\n");
tctx              117 source4/torture/rpc/session_key.c 	status = dcerpc_lsa_QuerySecret(p, tctx, &r4);
tctx              118 source4/torture/rpc/session_key.c 	torture_assert_ntstatus_ok(tctx, status, "QuerySecret failed");
tctx              120 source4/torture/rpc/session_key.c 		torture_fail(tctx, "No secret buffer returned");
tctx              124 source4/torture/rpc/session_key.c 	blob2 = data_blob_talloc(tctx, NULL, blob1.length);
tctx              126 source4/torture/rpc/session_key.c 	secret2 = sess_decrypt_string(tctx, &blob1, &session_key);
tctx              128 source4/torture/rpc/session_key.c 	torture_assert_str_equal(tctx, secret1, secret2, "Returned secret invalid");
tctx              132 source4/torture/rpc/session_key.c 	status = dcerpc_lsa_DeleteObject(p, tctx, &d);
tctx              133 source4/torture/rpc/session_key.c 	torture_assert_ntstatus_ok(tctx, status, "delete should have returned OKINVALID_HANDLE");
tctx               53 source4/torture/rpc/spoolss.c #define COMPARE_STRING(tctx, c,r,e) \
tctx               54 source4/torture/rpc/spoolss.c 	torture_assert_str_equal(tctx, c.e, r.e, "invalid value")
tctx               60 source4/torture/rpc/spoolss.c 		torture_fail(tctx, #c "." #e "field is not " #type "\n"); \
tctx               63 source4/torture/rpc/spoolss.c 		torture_fail(tctx, #r "." #e "field is not " #type "\n"); \
tctx               70 source4/torture/rpc/spoolss.c #define COMPARE_UINT32(tctx, c, r, e) do {\
tctx               72 source4/torture/rpc/spoolss.c 	torture_assert_int_equal(tctx, c.e, r.e, "invalid value"); \
tctx               75 source4/torture/rpc/spoolss.c #define COMPARE_STRING_ARRAY(tctx, c,r,e)
tctx               77 source4/torture/rpc/spoolss.c static bool test_OpenPrinter_server(struct torture_context *tctx, struct dcerpc_pipe *p, struct test_spoolss_context *ctx)
tctx               88 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing OpenPrinter(%s)\n", op.in.printername);
tctx               91 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_OpenPrinter failed");
tctx               92 source4/torture/rpc/spoolss.c 	torture_assert_werr_ok(tctx, op.out.result, "dcerpc_spoolss_OpenPrinter failed"); 
tctx               97 source4/torture/rpc/spoolss.c static bool test_EnumPorts(struct torture_context *tctx, 
tctx              121 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing EnumPorts level %u\n", r.in.level);
tctx              124 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPorts failed");
tctx              129 source4/torture/rpc/spoolss.c 		torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, 
tctx              138 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPorts failed");
tctx              140 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "EnumPorts failed");
tctx              142 source4/torture/rpc/spoolss.c 		torture_assert(tctx, info, "EnumPorts returned no info");
tctx              151 source4/torture/rpc/spoolss.c 		torture_assert_int_equal(tctx, ctx->port_count[level], ctx->port_count[old_level], 
tctx              163 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info1, ref->info2, port_name);
tctx              175 source4/torture/rpc/spoolss.c static bool test_GetPrintProcessorDirectory(struct torture_context *tctx,
tctx              215 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing GetPrintProcessorDirectory level %u\n", r.in.level);
tctx              218 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              220 source4/torture/rpc/spoolss.c 		torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER,
tctx              229 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_GetPrintProcessorDirectory failed");
tctx              231 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "GetPrintProcessorDirectory failed");
tctx              238 source4/torture/rpc/spoolss.c static bool test_GetPrinterDriverDirectory(struct torture_context *tctx, 
tctx              278 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing GetPrinterDriverDirectory level %u\n", r.in.level);
tctx              281 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, 
tctx              283 source4/torture/rpc/spoolss.c 		torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, 
tctx              292 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_GetPrinterDriverDirectory failed");
tctx              294 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "GetPrinterDriverDirectory failed");
tctx              300 source4/torture/rpc/spoolss.c static bool test_EnumPrinterDrivers(struct torture_context *tctx, 
tctx              320 source4/torture/rpc/spoolss.c 		r.in.server		= talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              329 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing EnumPrinterDrivers level %u\n", r.in.level);
tctx              332 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, 
tctx              345 source4/torture/rpc/spoolss.c 			torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrinterDrivers failed");
tctx              348 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "EnumPrinterDrivers failed");
tctx              357 source4/torture/rpc/spoolss.c 		torture_assert_int_equal(tctx, ctx->driver_count[level], ctx->driver_count[old_level],
tctx              368 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info1, ref->info6, driver_name);
tctx              371 source4/torture/rpc/spoolss.c 				COMPARE_UINT32(tctx, cur->info2, ref->info6, version);
tctx              372 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info2, ref->info6, driver_name);
tctx              373 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info2, ref->info6, architecture);
tctx              374 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info2, ref->info6, driver_path);
tctx              375 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info2, ref->info6, data_file);
tctx              376 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info2, ref->info6, config_file);
tctx              379 source4/torture/rpc/spoolss.c 				COMPARE_UINT32(tctx, cur->info3, ref->info6, version);
tctx              380 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info3, ref->info6, driver_name);
tctx              381 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info3, ref->info6, architecture);
tctx              382 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info3, ref->info6, driver_path);
tctx              383 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info3, ref->info6, data_file);
tctx              384 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info3, ref->info6, config_file);
tctx              385 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info3, ref->info6, help_file);
tctx              386 source4/torture/rpc/spoolss.c 				COMPARE_STRING_ARRAY(tctx, cur->info3, ref->info6, dependent_files);
tctx              387 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info3, ref->info6, monitor_name);
tctx              388 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info3, ref->info6, default_datatype);
tctx              391 source4/torture/rpc/spoolss.c 				COMPARE_UINT32(tctx, cur->info4, ref->info6, version);
tctx              392 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info4, ref->info6, driver_name);
tctx              393 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info4, ref->info6, architecture);
tctx              394 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info4, ref->info6, driver_path);
tctx              395 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info4, ref->info6, data_file);
tctx              396 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info4, ref->info6, config_file);
tctx              397 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info4, ref->info6, help_file);
tctx              398 source4/torture/rpc/spoolss.c 				COMPARE_STRING_ARRAY(tctx, cur->info4, ref->info6, dependent_files);
tctx              399 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info4, ref->info6, monitor_name);
tctx              400 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info4, ref->info6, default_datatype);
tctx              401 source4/torture/rpc/spoolss.c 				COMPARE_STRING_ARRAY(tctx, cur->info4, ref->info6, previous_names);
tctx              404 source4/torture/rpc/spoolss.c 				COMPARE_UINT32(tctx, cur->info5, ref->info6, version);
tctx              405 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info5, ref->info6, driver_name);
tctx              406 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info5, ref->info6, architecture);
tctx              407 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info5, ref->info6, driver_path);
tctx              408 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info5, ref->info6, data_file);
tctx              409 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info5, ref->info6, config_file);
tctx              424 source4/torture/rpc/spoolss.c static bool test_EnumMonitors(struct torture_context *tctx, 
tctx              448 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing EnumMonitors level %u\n", r.in.level);
tctx              451 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumMonitors failed");
tctx              456 source4/torture/rpc/spoolss.c 		torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, 
tctx              465 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumMonitors failed");
tctx              467 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "EnumMonitors failed");
tctx              476 source4/torture/rpc/spoolss.c 		torture_assert_int_equal(tctx, ctx->monitor_count[level], ctx->monitor_count[old_level], 
tctx              487 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info1, ref->info2, monitor_name);
tctx              499 source4/torture/rpc/spoolss.c static bool test_EnumPrintProcessors(struct torture_context *tctx, 
tctx              524 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing EnumPrintProcessors level %u\n", r.in.level);
tctx              527 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcessors failed");
tctx              532 source4/torture/rpc/spoolss.c 		torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, 
tctx              541 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcessors failed");
tctx              543 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "EnumPrintProcessors failed");
tctx              552 source4/torture/rpc/spoolss.c 		torture_assert_int_equal(tctx, ctx->print_processor_count[level], ctx->print_processor_count[old_level],
tctx              574 source4/torture/rpc/spoolss.c static bool test_EnumPrintProcDataTypes(struct torture_context *tctx,
tctx              599 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing EnumPrintProcDataTypes level %u\n", r.in.level);
tctx              602 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcDataType failed");
tctx              607 source4/torture/rpc/spoolss.c 		torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER,
tctx              616 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcDataTypes failed");
tctx              618 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "EnumPrintProcDataTypes failed");
tctx              625 source4/torture/rpc/spoolss.c static bool test_EnumPrinters(struct torture_context *tctx, 
tctx              650 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing EnumPrinters level %u\n", r.in.level);
tctx              653 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrinters failed");
tctx              658 source4/torture/rpc/spoolss.c 		torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER, 
tctx              667 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrinters failed");
tctx              669 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "EnumPrinters failed");
tctx              678 source4/torture/rpc/spoolss.c 		torture_assert_int_equal(tctx, ctx->printer_count[level], ctx->printer_count[old_level],
tctx              689 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info0, ref->info2, printername);
tctx              690 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info0, ref->info2, servername);
tctx              691 source4/torture/rpc/spoolss.c 				COMPARE_UINT32(tctx, cur->info0, ref->info2, cjobs);
tctx              710 source4/torture/rpc/spoolss.c 				COMPARE_UINT32(tctx, cur->info0, ref->info2, status);
tctx              723 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info1, ref->info2, comment);
tctx              729 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info4, ref->info2, printername);
tctx              730 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info4, ref->info2, servername);
tctx              731 source4/torture/rpc/spoolss.c 				COMPARE_UINT32(tctx, cur->info4, ref->info2, attributes);
tctx              734 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info5, ref->info2, printername);
tctx              735 source4/torture/rpc/spoolss.c 				COMPARE_STRING(tctx, cur->info5, ref->info2, portname);
tctx              736 source4/torture/rpc/spoolss.c 				COMPARE_UINT32(tctx, cur->info5, ref->info2, attributes);
tctx              751 source4/torture/rpc/spoolss.c static bool test_GetPrinter(struct torture_context *tctx, 
tctx              768 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing GetPrinter level %u\n", r.in.level);
tctx              770 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_GetPrinter(p, tctx, &r);
tctx              771 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed");
tctx              774 source4/torture/rpc/spoolss.c 			DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx              778 source4/torture/rpc/spoolss.c 			status = dcerpc_spoolss_GetPrinter(p, tctx, &r);
tctx              781 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed");
tctx              783 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "GetPrinter failed");
tctx              790 source4/torture/rpc/spoolss.c static bool test_ClosePrinter(struct torture_context *tctx, 
tctx              800 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing ClosePrinter\n");
tctx              802 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_ClosePrinter(p, tctx, &r);
tctx              803 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed");
tctx              808 source4/torture/rpc/spoolss.c static bool test_GetForm(struct torture_context *tctx, 
tctx              825 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing GetForm level %d\n", r.in.level);
tctx              827 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_GetForm(p, tctx, &r);
tctx              828 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "GetForm failed");
tctx              831 source4/torture/rpc/spoolss.c 		DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx              835 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_GetForm(p, tctx, &r);
tctx              836 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "GetForm failed");
tctx              838 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "GetForm failed");
tctx              840 source4/torture/rpc/spoolss.c 		torture_assert(tctx, r.out.info, "No form info returned");
tctx              843 source4/torture/rpc/spoolss.c 	torture_assert_werr_ok(tctx, r.out.result, "GetForm failed");
tctx              848 source4/torture/rpc/spoolss.c static bool test_EnumForms(struct torture_context *tctx, 
tctx              872 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing EnumForms level %d\n", levels[i]);
tctx              874 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_EnumForms(p, tctx, &r);
tctx              875 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "EnumForms failed");
tctx              882 source4/torture/rpc/spoolss.c 			torture_fail(tctx, "EnumForms on the PrintServer isn't supported by test server (NT4)");
tctx              886 source4/torture/rpc/spoolss.c 			DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx              891 source4/torture/rpc/spoolss.c 			status = dcerpc_spoolss_EnumForms(p, tctx, &r);
tctx              893 source4/torture/rpc/spoolss.c 			torture_assert(tctx, info, "No forms returned");
tctx              897 source4/torture/rpc/spoolss.c 					ret &= test_GetForm(tctx, p, handle, info[j].info1.form_name, levels[i]);
tctx              901 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "EnumForms failed");
tctx              903 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "EnumForms failed");
tctx              909 source4/torture/rpc/spoolss.c static bool test_DeleteForm(struct torture_context *tctx, 
tctx              920 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_DeleteForm(p, tctx, &r);
tctx              922 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "DeleteForm failed");
tctx              924 source4/torture/rpc/spoolss.c 	torture_assert_werr_ok(tctx, r.out.result, "DeleteForm failed");
tctx              929 source4/torture/rpc/spoolss.c static bool test_AddForm(struct torture_context *tctx, 
tctx              951 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_AddForm(p, tctx, &r);
tctx              953 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "AddForm failed");
tctx              955 source4/torture/rpc/spoolss.c 	torture_assert_werr_ok(tctx, r.out.result, "AddForm failed");
tctx              957 source4/torture/rpc/spoolss.c 	if (!print_server) ret &= test_GetForm(tctx, p, handle, form_name, 1);
tctx              974 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_SetForm(p, tctx, &sf);
tctx              976 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "SetForm failed");
tctx              978 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "SetForm failed");
tctx              981 source4/torture/rpc/spoolss.c 	if (!print_server) ret &= test_GetForm(tctx, p, handle, form_name, 1);
tctx              983 source4/torture/rpc/spoolss.c 	if (!test_DeleteForm(tctx, p, handle, form_name)) {
tctx              990 source4/torture/rpc/spoolss.c static bool test_EnumPorts_old(struct torture_context *tctx, 
tctx              999 source4/torture/rpc/spoolss.c 	r.in.servername = talloc_asprintf(tctx, "\\\\%s", 
tctx             1008 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing EnumPorts\n");
tctx             1010 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_EnumPorts(p, tctx, &r);
tctx             1012 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "EnumPorts failed");
tctx             1015 source4/torture/rpc/spoolss.c 		DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx             1020 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_EnumPorts(p, tctx, &r);
tctx             1021 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "EnumPorts failed");
tctx             1023 source4/torture/rpc/spoolss.c 		torture_assert(tctx, info, "No ports returned");
tctx             1029 source4/torture/rpc/spoolss.c static bool test_AddPort(struct torture_context *tctx, 
tctx             1035 source4/torture/rpc/spoolss.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", 
tctx             1040 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing AddPort\n");
tctx             1042 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_AddPort(p, tctx, &r);
tctx             1044 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "AddPort failed");
tctx             1060 source4/torture/rpc/spoolss.c static bool test_GetJob(struct torture_context *tctx, 
tctx             1077 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing GetJob level %d\n", r.in.level);
tctx             1079 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_GetJob(p, tctx, &r);
tctx             1080 source4/torture/rpc/spoolss.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_UNKNOWN_LEVEL, "Unexpected return code");
tctx             1084 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing GetJob level %d\n", r.in.level);
tctx             1089 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_GetJob(p, tctx, &r);
tctx             1090 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "GetJob failed");
tctx             1093 source4/torture/rpc/spoolss.c 			DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx             1098 source4/torture/rpc/spoolss.c 			status = dcerpc_spoolss_GetJob(p, tctx, &r);
tctx             1099 source4/torture/rpc/spoolss.c 			torture_assert_ntstatus_ok(tctx, status, "GetJob failed");
tctx             1102 source4/torture/rpc/spoolss.c 		torture_assert(tctx, r.out.info, "No job info returned");
tctx             1103 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "GetJob failed");
tctx             1109 source4/torture/rpc/spoolss.c static bool test_SetJob(struct torture_context *tctx, 
tctx             1124 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_PAUSE\n");
tctx             1127 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RESUME\n");
tctx             1130 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_CANCEL\n");
tctx             1133 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RESTART\n");
tctx             1136 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_DELETE\n");
tctx             1139 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_SEND_TO_PRINTER\n");
tctx             1142 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_LAST_PAGE_EJECTED\n");
tctx             1145 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RETAIN\n");
tctx             1148 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RELEASE\n");
tctx             1151 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing SetJob\n");
tctx             1155 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_SetJob(p, tctx, &r);
tctx             1156 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "SetJob failed");
tctx             1157 source4/torture/rpc/spoolss.c 	torture_assert_werr_ok(tctx, r.out.result, "SetJob failed");
tctx             1162 source4/torture/rpc/spoolss.c static bool test_AddJob(struct torture_context *tctx,
tctx             1176 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing AddJob\n");
tctx             1178 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_AddJob(p, tctx, &r);
tctx             1179 source4/torture/rpc/spoolss.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_UNKNOWN_LEVEL, "AddJob failed");
tctx             1183 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_AddJob(p, tctx, &r);
tctx             1184 source4/torture/rpc/spoolss.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM, "AddJob failed");
tctx             1190 source4/torture/rpc/spoolss.c static bool test_EnumJobs(struct torture_context *tctx, 
tctx             1210 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing EnumJobs\n");
tctx             1212 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_EnumJobs(p, tctx, &r);
tctx             1214 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "EnumJobs failed");
tctx             1218 source4/torture/rpc/spoolss.c 		DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx             1223 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_EnumJobs(p, tctx, &r);
tctx             1225 source4/torture/rpc/spoolss.c 		torture_assert(tctx, info, "No jobs returned");
tctx             1229 source4/torture/rpc/spoolss.c 			test_GetJob(tctx, p, handle, info[j].info1.job_id);
tctx             1232 source4/torture/rpc/spoolss.c 			if (!torture_setting_bool(tctx, "samba3", false)) {
tctx             1233 source4/torture/rpc/spoolss.c 				test_SetJob(tctx, p, handle, info[j].info1.job_id, SPOOLSS_JOB_CONTROL_PAUSE);
tctx             1234 source4/torture/rpc/spoolss.c 				test_SetJob(tctx, p, handle, info[j].info1.job_id, SPOOLSS_JOB_CONTROL_RESUME);
tctx             1239 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "EnumJobs failed");
tctx             1245 source4/torture/rpc/spoolss.c static bool test_DoPrintTest(struct torture_context *tctx, 
tctx             1261 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing StartDocPrinter\n");
tctx             1271 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_StartDocPrinter(p, tctx, &s);
tctx             1272 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_StartDocPrinter failed");
tctx             1273 source4/torture/rpc/spoolss.c 	torture_assert_werr_ok(tctx, s.out.result, "StartDocPrinter failed");
tctx             1276 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing StartPagePrinter: Page[%d]\n", i);
tctx             1280 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_StartPagePrinter(p, tctx, &sp);
tctx             1281 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, 
tctx             1283 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, sp.out.result, "StartPagePrinter failed");
tctx             1285 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing WritePrinter: Page[%d]\n", i);
tctx             1288 source4/torture/rpc/spoolss.c 		w.in.data		= data_blob_string_const(talloc_asprintf(tctx,"TortureTestPage: %d\nData\n",i));
tctx             1291 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_WritePrinter(p, tctx, &w);
tctx             1292 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_WritePrinter failed");
tctx             1293 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, w.out.result, "WritePrinter failed");
tctx             1295 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing EndPagePrinter: Page[%d]\n", i);
tctx             1299 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_EndPagePrinter(p, tctx, &ep);
tctx             1300 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EndPagePrinter failed");
tctx             1301 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, ep.out.result, "EndPagePrinter failed");
tctx             1304 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing EndDocPrinter\n");
tctx             1308 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_EndDocPrinter(p, tctx, &e);
tctx             1309 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EndDocPrinter failed");
tctx             1310 source4/torture/rpc/spoolss.c 	torture_assert_werr_ok(tctx, e.out.result, "EndDocPrinter failed");
tctx             1312 source4/torture/rpc/spoolss.c 	ret &= test_AddJob(tctx, p, handle);
tctx             1313 source4/torture/rpc/spoolss.c 	ret &= test_EnumJobs(tctx, p, handle);
tctx             1315 source4/torture/rpc/spoolss.c 	ret &= test_SetJob(tctx, p, handle, job_id, SPOOLSS_JOB_CONTROL_DELETE);
tctx             1320 source4/torture/rpc/spoolss.c static bool test_PausePrinter(struct torture_context *tctx, 
tctx             1342 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing SetPrinter: SPOOLSS_PRINTER_CONTROL_PAUSE\n");
tctx             1344 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_SetPrinter(p, tctx, &r);
tctx             1346 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "SetPrinter failed");
tctx             1348 source4/torture/rpc/spoolss.c 	torture_assert_werr_ok(tctx, r.out.result, "SetPrinter failed");
tctx             1353 source4/torture/rpc/spoolss.c static bool test_ResumePrinter(struct torture_context *tctx, 
tctx             1375 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing SetPrinter: SPOOLSS_PRINTER_CONTROL_RESUME\n");
tctx             1377 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_SetPrinter(p, tctx, &r);
tctx             1379 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "SetPrinter failed");
tctx             1381 source4/torture/rpc/spoolss.c 	torture_assert_werr_ok(tctx, r.out.result, "SetPrinter failed");
tctx             1386 source4/torture/rpc/spoolss.c static bool test_GetPrinterData(struct torture_context *tctx, 
tctx             1404 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing GetPrinterData\n");
tctx             1406 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_GetPrinterData(p, tctx, &r);
tctx             1407 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "GetPrinterData failed");
tctx             1412 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_GetPrinterData(p, tctx, &r);
tctx             1413 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "GetPrinterData failed");
tctx             1415 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "GetPrinterData failed");
tctx             1421 source4/torture/rpc/spoolss.c static bool test_GetPrinterDataEx(struct torture_context *tctx, 
tctx             1440 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing GetPrinterDataEx\n");
tctx             1442 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_GetPrinterDataEx(p, tctx, &r);
tctx             1446 source4/torture/rpc/spoolss.c 			torture_skip(tctx, "GetPrinterDataEx not supported by server\n");
tctx             1448 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "GetPrinterDataEx failed");
tctx             1453 source4/torture/rpc/spoolss.c 		r.out.buffer = talloc_array(tctx, uint8_t, needed);
tctx             1455 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_GetPrinterDataEx(p, tctx, &r);
tctx             1456 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "GetPrinterDataEx failed");
tctx             1458 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result,  "GetPrinterDataEx failed");
tctx             1464 source4/torture/rpc/spoolss.c static bool test_EnumPrinterData(struct torture_context *tctx, struct dcerpc_pipe *p, 
tctx             1485 source4/torture/rpc/spoolss.c 		r.out.data = talloc_zero_array(tctx, uint8_t, 0);
tctx             1487 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing EnumPrinterData\n");
tctx             1489 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_EnumPrinterData(p, tctx, &r);
tctx             1491 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "EnumPrinterData failed");
tctx             1494 source4/torture/rpc/spoolss.c 		r.out.value_name = talloc_zero_array(tctx, const char, value_size);
tctx             1496 source4/torture/rpc/spoolss.c 		r.out.data = talloc_zero_array(tctx, uint8_t, data_size);
tctx             1498 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_EnumPrinterData(p, tctx, &r);
tctx             1500 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "EnumPrinterData failed");
tctx             1502 source4/torture/rpc/spoolss.c 		test_GetPrinterData(tctx, p, handle, r.out.value_name);
tctx             1504 source4/torture/rpc/spoolss.c 		test_GetPrinterDataEx(tctx, 
tctx             1515 source4/torture/rpc/spoolss.c static bool test_EnumPrinterDataEx(struct torture_context *tctx, 
tctx             1532 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing EnumPrinterDataEx\n");
tctx             1534 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &r);
tctx             1535 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDataEx failed");
tctx             1539 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &r);
tctx             1541 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDataEx failed");
tctx             1547 source4/torture/rpc/spoolss.c static bool test_DeletePrinterData(struct torture_context *tctx, 
tctx             1558 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing DeletePrinterData\n");
tctx             1560 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_DeletePrinterData(p, tctx, &r);
tctx             1562 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "DeletePrinterData failed");
tctx             1567 source4/torture/rpc/spoolss.c static bool test_SetPrinterData(struct torture_context *tctx, 
tctx             1580 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing SetPrinterData\n");
tctx             1582 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_SetPrinterData(p, tctx, &r);
tctx             1584 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "SetPrinterData failed");
tctx             1586 source4/torture/rpc/spoolss.c 	if (!test_GetPrinterData(tctx, p, handle, value_name)) {
tctx             1590 source4/torture/rpc/spoolss.c 	if (!test_DeletePrinterData(tctx, p, handle, value_name)) {
tctx             1597 source4/torture/rpc/spoolss.c static bool test_SecondaryClosePrinter(struct torture_context *tctx, 
tctx             1611 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "testing close on secondary pipe\n");
tctx             1613 source4/torture/rpc/spoolss.c 	status = dcerpc_parse_binding(tctx, p->conn->binding_string, &b);
tctx             1614 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to parse dcerpc binding");
tctx             1617 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to create secondary connection");
tctx             1620 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "Failed to create bind on secondary connection");
tctx             1625 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_ClosePrinter(p2, tctx, &cp);
tctx             1626 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NET_WRITE_FAULT,
tctx             1629 source4/torture/rpc/spoolss.c 	torture_assert_int_equal(tctx, p2->last_fault_code, DCERPC_FAULT_CONTEXT_MISMATCH, 
tctx             1637 source4/torture/rpc/spoolss.c static bool test_OpenPrinter_badname(struct torture_context *tctx, 
tctx             1652 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "\nTesting OpenPrinter(%s) with bad name\n", op.in.printername);
tctx             1654 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_OpenPrinter(p, tctx, &op);
tctx             1655 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "OpenPrinter failed");
tctx             1657 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "OpenPrinter(%s) unexpected result[%s] should be WERR_INVALID_PRINTER_NAME\n",
tctx             1662 source4/torture/rpc/spoolss.c 		ret &=test_ClosePrinter(tctx, p, &handle);
tctx             1673 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing OpenPrinterEx(%s) with bad name\n", opEx.in.printername);
tctx             1675 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &opEx);
tctx             1676 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "OpenPrinterEx failed");
tctx             1678 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "OpenPrinterEx(%s) unexpected result[%s] should be WERR_INVALID_PARAM\n",
tctx             1683 source4/torture/rpc/spoolss.c 		ret &=test_ClosePrinter(tctx, p, &handle);
tctx             1689 source4/torture/rpc/spoolss.c static bool test_OpenPrinter(struct torture_context *tctx, 
tctx             1698 source4/torture/rpc/spoolss.c 	r.in.printername	= talloc_asprintf(tctx, "\\\\%s\\%s", dcerpc_server_name(p), name);
tctx             1704 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing OpenPrinter(%s)\n", r.in.printername);
tctx             1706 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_OpenPrinter(p, tctx, &r);
tctx             1708 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "OpenPrinter failed");
tctx             1710 source4/torture/rpc/spoolss.c 	torture_assert_werr_ok(tctx, r.out.result, "OpenPrinter failed");
tctx             1712 source4/torture/rpc/spoolss.c 	if (!test_GetPrinter(tctx, p, &handle)) {
tctx             1716 source4/torture/rpc/spoolss.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx             1717 source4/torture/rpc/spoolss.c 		if (!test_SecondaryClosePrinter(tctx, p, &handle)) {
tctx             1722 source4/torture/rpc/spoolss.c 	if (!test_ClosePrinter(tctx, p, &handle)) {
tctx             1729 source4/torture/rpc/spoolss.c static bool call_OpenPrinterEx(struct torture_context *tctx, 
tctx             1738 source4/torture/rpc/spoolss.c 		r.in.printername = talloc_asprintf(tctx, "\\\\%s\\%s", 
tctx             1741 source4/torture/rpc/spoolss.c 		r.in.printername = talloc_asprintf(tctx, "\\\\%s", 
tctx             1760 source4/torture/rpc/spoolss.c 	torture_comment(tctx, "Testing OpenPrinterEx(%s)\n", r.in.printername);
tctx             1762 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &r);
tctx             1764 source4/torture/rpc/spoolss.c 	torture_assert_ntstatus_ok(tctx, status, "OpenPrinterEx failed");
tctx             1766 source4/torture/rpc/spoolss.c 	torture_assert_werr_ok(tctx, r.out.result, "OpenPrinterEx failed");
tctx             1771 source4/torture/rpc/spoolss.c static bool test_OpenPrinterEx(struct torture_context *tctx, 
tctx             1778 source4/torture/rpc/spoolss.c 	if (!call_OpenPrinterEx(tctx, p, name, &handle)) {
tctx             1782 source4/torture/rpc/spoolss.c 	if (!test_GetPrinter(tctx, p, &handle)) {
tctx             1786 source4/torture/rpc/spoolss.c 	if (!test_EnumForms(tctx, p, &handle, false)) {
tctx             1790 source4/torture/rpc/spoolss.c 	if (!test_AddForm(tctx, p, &handle, false)) {
tctx             1794 source4/torture/rpc/spoolss.c 	if (!test_EnumPrinterData(tctx, p, &handle)) {
tctx             1798 source4/torture/rpc/spoolss.c 	if (!test_EnumPrinterDataEx(tctx, p, &handle)) {
tctx             1802 source4/torture/rpc/spoolss.c 	if (!test_PausePrinter(tctx, p, &handle)) {
tctx             1806 source4/torture/rpc/spoolss.c 	if (!test_DoPrintTest(tctx, p, &handle)) {
tctx             1810 source4/torture/rpc/spoolss.c 	if (!test_ResumePrinter(tctx, p, &handle)) {
tctx             1814 source4/torture/rpc/spoolss.c 	if (!test_SetPrinterData(tctx, p, &handle)) {
tctx             1818 source4/torture/rpc/spoolss.c 	if (!torture_setting_bool(tctx, "samba3", false)) {
tctx             1819 source4/torture/rpc/spoolss.c 		if (!test_SecondaryClosePrinter(tctx, p, &handle)) {
tctx             1824 source4/torture/rpc/spoolss.c 	if (!test_ClosePrinter(tctx, p, &handle)) {
tctx             1831 source4/torture/rpc/spoolss.c static bool test_EnumPrinters_old(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx             1854 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing EnumPrinters level %u\n", r.in.level);
tctx             1856 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_EnumPrinters(p, tctx, &r);
tctx             1857 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "EnumPrinters failed");
tctx             1860 source4/torture/rpc/spoolss.c 			DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx             1864 source4/torture/rpc/spoolss.c 			status = dcerpc_spoolss_EnumPrinters(p, tctx, &r);
tctx             1867 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "EnumPrinters failed");
tctx             1869 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "EnumPrinters failed");
tctx             1872 source4/torture/rpc/spoolss.c 			torture_comment(tctx, "No printers returned\n");
tctx             1878 source4/torture/rpc/spoolss.c 				char *unc = talloc_strdup(tctx, info[j].info1.name);
tctx             1889 source4/torture/rpc/spoolss.c 				if (!test_OpenPrinter(tctx, p, name)) {
tctx             1892 source4/torture/rpc/spoolss.c 				if (!test_OpenPrinterEx(tctx, p, name)) {
tctx             1926 source4/torture/rpc/spoolss.c 	status = dcerpc_spoolss_GetPrinterDriver2(p, tctx, &r);
tctx             1934 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_GetPrinterDriver2(p, tctx, &r);
tctx             1953 source4/torture/rpc/spoolss.c static bool test_EnumPrinterDrivers_old(struct torture_context *tctx, 
tctx             1967 source4/torture/rpc/spoolss.c 		r.in.server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1976 source4/torture/rpc/spoolss.c 		torture_comment(tctx, "Testing EnumPrinterDrivers level %u\n", r.in.level);
tctx             1978 source4/torture/rpc/spoolss.c 		status = dcerpc_spoolss_EnumPrinterDrivers(p, tctx, &r);
tctx             1980 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDrivers failed");
tctx             1983 source4/torture/rpc/spoolss.c 			DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx             1987 source4/torture/rpc/spoolss.c 			status = dcerpc_spoolss_EnumPrinterDrivers(p, tctx, &r);
tctx             1990 source4/torture/rpc/spoolss.c 		torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDrivers failed");
tctx             1992 source4/torture/rpc/spoolss.c 		torture_assert_werr_ok(tctx, r.out.result, "EnumPrinterDrivers failed");
tctx             1995 source4/torture/rpc/spoolss.c 			torture_comment(tctx, "No printer drivers returned\n");
tctx              185 source4/torture/rpc/spoolss_notify.c static bool test_RFFPCNEx(struct torture_context *tctx, 
tctx              203 source4/torture/rpc/spoolss_notify.c 	ntvfs_init(tctx->lp_ctx);
tctx              207 source4/torture/rpc/spoolss_notify.c 	q.in.printername	= talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              213 source4/torture/rpc/spoolss_notify.c 	torture_comment(tctx, "Testing OpenPrinter(%s)\n", q.in.printername);
tctx              215 source4/torture/rpc/spoolss_notify.c 	status = dcerpc_spoolss_OpenPrinter(p, tctx, &q);
tctx              217 source4/torture/rpc/spoolss_notify.c 	torture_assert_ntstatus_ok(tctx, status, "OpenPrinter failed");
tctx              219 source4/torture/rpc/spoolss_notify.c 	torture_assert_werr_ok(tctx, q.out.result, "OpenPrinter failed");
tctx              232 source4/torture/rpc/spoolss_notify.c 	torture_assert_ntstatus_ok(tctx, dcerpc_register_ep_server(&ep_server),
tctx              235 source4/torture/rpc/spoolss_notify.c 	lp_set_cmdline(tctx->lp_ctx, "dcerpc endpoint servers", "spoolss");
tctx              237 source4/torture/rpc/spoolss_notify.c 	load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx              239 source4/torture/rpc/spoolss_notify.c 	torture_comment(tctx, "Listening for callbacks on %s\n", address);
tctx              240 source4/torture/rpc/spoolss_notify.c 	status = smbsrv_add_socket(p->conn->event_ctx, tctx->lp_ctx, &single_ops, address);
tctx              241 source4/torture/rpc/spoolss_notify.c 	torture_assert_ntstatus_ok(tctx, status, "starting smb server");
tctx              243 source4/torture/rpc/spoolss_notify.c 	status = dcesrv_init_context(tctx, tctx->lp_ctx, endpoints, &dce_ctx);
tctx              244 source4/torture/rpc/spoolss_notify.c 	torture_assert_ntstatus_ok(tctx, status, 
tctx              248 source4/torture/rpc/spoolss_notify.c 	r.in.local_machine = talloc_asprintf(tctx, "\\\\%s", address);
tctx              254 source4/torture/rpc/spoolss_notify.c 	t1.types = talloc_zero_array(tctx, struct spoolss_NotifyOptionType, 2);
tctx              268 source4/torture/rpc/spoolss_notify.c 	status = dcerpc_spoolss_RemoteFindFirstPrinterChangeNotifyEx(p, tctx, &r);
tctx              270 source4/torture/rpc/spoolss_notify.c 	torture_assert_ntstatus_ok(tctx, status, "FFPCNEx failed");
tctx              272 source4/torture/rpc/spoolss_notify.c 	torture_assert_werr_ok(tctx, r.out.result, "error return code for FFPCNEx");
tctx              277 source4/torture/rpc/spoolss_notify.c 	torture_comment(tctx, "Testing ClosePrinter\n");
tctx              279 source4/torture/rpc/spoolss_notify.c 	status = dcerpc_spoolss_ClosePrinter(p, tctx, &cp);
tctx              280 source4/torture/rpc/spoolss_notify.c 	torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed");
tctx              283 source4/torture/rpc/spoolss_notify.c 	torture_assert(tctx, received_packets != NULL, "no packets received");
tctx              284 source4/torture/rpc/spoolss_notify.c 	torture_assert_int_equal(tctx, received_packets->opnum, 58, "invalid opnum");
tctx              295 source4/torture/rpc/spoolss_notify.c static bool test_ReplyOpenPrinter(struct torture_context *tctx,
tctx              309 source4/torture/rpc/spoolss_notify.c 	torture_assert_ntstatus_ok(tctx,
tctx              310 source4/torture/rpc/spoolss_notify.c 			dcerpc_spoolss_ReplyOpenPrinter(pipe, tctx, &r),
tctx              313 source4/torture/rpc/spoolss_notify.c 	torture_assert_werr_ok(tctx, r.out.result, "error return code");
tctx              318 source4/torture/rpc/spoolss_notify.c 	torture_assert_ntstatus_ok(tctx,
tctx              319 source4/torture/rpc/spoolss_notify.c 			dcerpc_spoolss_ReplyClosePrinter(pipe, tctx, &s),
tctx              322 source4/torture/rpc/spoolss_notify.c 	torture_assert_werr_ok(tctx, r.out.result, "error return code");
tctx               42 source4/torture/rpc/spoolss_win.c static bool test_OpenPrinterEx(struct torture_context *tctx,
tctx               52 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Opening printer '%s'\n", printer_name);
tctx               54 source4/torture/rpc/spoolss_win.c 	op.in.printername		= talloc_strdup(tctx, printer_name);
tctx               70 source4/torture/rpc/spoolss_win.c 	status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &op);
tctx               71 source4/torture/rpc/spoolss_win.c 	torture_assert_ntstatus_ok(tctx, status, "OpenPrinterEx failed");
tctx               72 source4/torture/rpc/spoolss_win.c 	torture_assert_werr_ok(tctx, op.out.result, "OpenPrinterEx failed");
tctx               77 source4/torture/rpc/spoolss_win.c static bool test_OpenPrinterAsAdmin(struct torture_context *tctx,
tctx               95 source4/torture/rpc/spoolss_win.c 	op.in.printername		= talloc_strdup(tctx, printername);
tctx              106 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Testing OpenPrinterEx(%s) with admin rights\n",
tctx              109 source4/torture/rpc/spoolss_win.c 	status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &op);
tctx              112 source4/torture/rpc/spoolss_win.c 		status = dcerpc_spoolss_ClosePrinter(p, tctx, &cp);
tctx              113 source4/torture/rpc/spoolss_win.c 		torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed");
tctx              120 source4/torture/rpc/spoolss_win.c static bool test_ClosePrinter(struct torture_context *tctx,
tctx              125 source4/torture/rpc/spoolss_win.c static bool test_OpenPrinterSequence(struct torture_context *tctx,
tctx              130 source4/torture/rpc/spoolss_win.c 	char *printername = talloc_asprintf(tctx, "\\\\%s",
tctx              134 source4/torture/rpc/spoolss_win.c 	ret = test_OpenPrinterEx(tctx, p, handle, printername, 0);
tctx              135 source4/torture/rpc/spoolss_win.c 	torture_assert(tctx, ret == true, "OpenPrinterEx failed.");
tctx              137 source4/torture/rpc/spoolss_win.c 	ret = test_ClosePrinter(tctx, p, handle);
tctx              138 source4/torture/rpc/spoolss_win.c 	torture_assert(tctx, ret, "ClosePrinter failed");
tctx              141 source4/torture/rpc/spoolss_win.c 	ret = test_OpenPrinterAsAdmin(tctx, p, printername);
tctx              142 source4/torture/rpc/spoolss_win.c 	torture_assert(tctx, ret == true,
tctx              145 source4/torture/rpc/spoolss_win.c 	ret = test_OpenPrinterEx(tctx, p, handle, printername, SERVER_EXECUTE);
tctx              146 source4/torture/rpc/spoolss_win.c 	torture_assert(tctx, ret == true, "OpenPrinterEx failed.");
tctx              151 source4/torture/rpc/spoolss_win.c static bool test_GetPrinterData(struct torture_context *tctx,
tctx              164 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Testing GetPrinterData(%s).\n", value_name);
tctx              172 source4/torture/rpc/spoolss_win.c 	status = dcerpc_spoolss_GetPrinterData(p, tctx, &gpd);
tctx              173 source4/torture/rpc/spoolss_win.c 	torture_assert_ntstatus_ok(tctx, status, "GetPrinterData failed.");
tctx              174 source4/torture/rpc/spoolss_win.c 	torture_assert_werr_equal(tctx, gpd.out.result, expected_werr,
tctx              178 source4/torture/rpc/spoolss_win.c 		torture_assert_int_equal(tctx, data.value,
tctx              185 source4/torture/rpc/spoolss_win.c static bool test_EnumPrinters(struct torture_context *tctx,
tctx              198 source4/torture/rpc/spoolss_win.c 	ep.in.server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              207 source4/torture/rpc/spoolss_win.c 	torture_assert_ntstatus_ok(tctx, status, "EnumPrinters failed.");
tctx              214 source4/torture/rpc/spoolss_win.c 		torture_assert_ntstatus_ok(tctx, status,"EnumPrinters failed.");
tctx              217 source4/torture/rpc/spoolss_win.c 	torture_assert_werr_ok(tctx, ep.out.result, "EnumPrinters failed.");
tctx              222 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Found %d printer(s).\n", ctx->printer_count);
tctx              227 source4/torture/rpc/spoolss_win.c static bool test_GetPrinter(struct torture_context *tctx,
tctx              239 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Test GetPrinter level %d\n", level);
tctx              247 source4/torture/rpc/spoolss_win.c 	status = dcerpc_spoolss_GetPrinter(p, tctx, &gp);
tctx              248 source4/torture/rpc/spoolss_win.c 	torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed");
tctx              254 source4/torture/rpc/spoolss_win.c 		status = dcerpc_spoolss_GetPrinter(p, tctx, &gp);
tctx              255 source4/torture/rpc/spoolss_win.c 		torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed");
tctx              258 source4/torture/rpc/spoolss_win.c 	torture_assert_werr_ok(tctx, gp.out.result, "GetPrinter failed");
tctx              270 source4/torture/rpc/spoolss_win.c static bool test_EnumJobs(struct torture_context *tctx,
tctx              276 source4/torture/rpc/spoolss_win.c 	DATA_BLOB blob = data_blob_talloc_zero(tctx, 1024);
tctx              281 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Test EnumJobs\n");
tctx              291 source4/torture/rpc/spoolss_win.c 	status = dcerpc_spoolss_EnumJobs(p, tctx, &ej);
tctx              292 source4/torture/rpc/spoolss_win.c 	torture_assert_ntstatus_ok(tctx, status, "EnumJobs failed");
tctx              294 source4/torture/rpc/spoolss_win.c 		blob = data_blob_talloc_zero(tctx, needed);
tctx              297 source4/torture/rpc/spoolss_win.c 		status = dcerpc_spoolss_EnumJobs(p, tctx, &ej);
tctx              298 source4/torture/rpc/spoolss_win.c 		torture_assert_ntstatus_ok(tctx, status, "EnumJobs failed");
tctx              300 source4/torture/rpc/spoolss_win.c 	torture_assert_werr_ok(tctx, ej.out.result, "EnumJobs failed");
tctx              305 source4/torture/rpc/spoolss_win.c static bool test_GetPrinterDriver2(struct torture_context *tctx,
tctx              312 source4/torture/rpc/spoolss_win.c 	DATA_BLOB blob = data_blob_talloc_zero(tctx, 87424);
tctx              317 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Testing GetPrinterDriver2\n");
tctx              330 source4/torture/rpc/spoolss_win.c 	status = dcerpc_spoolss_GetPrinterDriver2(p, tctx, &gpd2);
tctx              331 source4/torture/rpc/spoolss_win.c 	torture_assert_ntstatus_ok(tctx, status, "GetPrinterDriver2 failed");
tctx              334 source4/torture/rpc/spoolss_win.c 		torture_assert_werr_ok(tctx, gpd2.out.result,
tctx              341 source4/torture/rpc/spoolss_win.c static bool test_EnumForms(struct torture_context *tctx,
tctx              348 source4/torture/rpc/spoolss_win.c 	DATA_BLOB blob = data_blob_talloc_zero(tctx, initial_blob_size);
tctx              353 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Testing EnumForms\n");
tctx              363 source4/torture/rpc/spoolss_win.c 	status = dcerpc_spoolss_EnumForms(p, tctx, &ef);
tctx              364 source4/torture/rpc/spoolss_win.c 	torture_assert_ntstatus_ok(tctx, status, "EnumForms failed");
tctx              367 source4/torture/rpc/spoolss_win.c 		blob = data_blob_talloc_zero(tctx, needed);
tctx              370 source4/torture/rpc/spoolss_win.c 		status = dcerpc_spoolss_EnumForms(p, tctx, &ef);
tctx              371 source4/torture/rpc/spoolss_win.c 		torture_assert_ntstatus_ok(tctx, status, "EnumForms failed");
tctx              374 source4/torture/rpc/spoolss_win.c 	torture_assert_werr_ok(tctx, ef.out.result, "EnumForms failed");
tctx              379 source4/torture/rpc/spoolss_win.c static bool test_EnumPrinterKey(struct torture_context *tctx,
tctx              390 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Testing EnumPrinterKey(%s)\n", key);
tctx              393 source4/torture/rpc/spoolss_win.c 	epk.in.key_name = talloc_strdup(tctx, key);
tctx              398 source4/torture/rpc/spoolss_win.c 	status = dcerpc_spoolss_EnumPrinterKey(p, tctx, &epk);
tctx              399 source4/torture/rpc/spoolss_win.c 	torture_assert_ntstatus_ok(tctx, status, "EnumPrinterKey failed");
tctx              404 source4/torture/rpc/spoolss_win.c 		status = dcerpc_spoolss_EnumPrinterKey(p, tctx, &epk);
tctx              405 source4/torture/rpc/spoolss_win.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              409 source4/torture/rpc/spoolss_win.c 	torture_assert_werr_ok(tctx, epk.out.result, "EnumPrinterKey failed");
tctx              416 source4/torture/rpc/spoolss_win.c static bool test_EnumPrinterDataEx(struct torture_context *tctx,
tctx              429 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Testing EnumPrinterDataEx(%s)\n", key);
tctx              432 source4/torture/rpc/spoolss_win.c 	epde.in.key_name = talloc_strdup(tctx, key);
tctx              438 source4/torture/rpc/spoolss_win.c 	status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &epde);
tctx              439 source4/torture/rpc/spoolss_win.c 	torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDataEx failed.");
tctx              442 source4/torture/rpc/spoolss_win.c 		status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &epde);
tctx              443 source4/torture/rpc/spoolss_win.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              447 source4/torture/rpc/spoolss_win.c 	torture_assert_werr_equal(tctx, epde.out.result, expected_error,
tctx              453 source4/torture/rpc/spoolss_win.c static bool test_ClosePrinter(struct torture_context *tctx,
tctx              463 source4/torture/rpc/spoolss_win.c 	status = dcerpc_spoolss_ClosePrinter(p, tctx, &cp);
tctx              464 source4/torture/rpc/spoolss_win.c 	torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed");
tctx              469 source4/torture/rpc/spoolss_win.c static bool test_WinXP(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx              480 source4/torture/rpc/spoolss_win.c 	ntvfs_init(tctx->lp_ctx);
tctx              482 source4/torture/rpc/spoolss_win.c 	ctx = talloc_zero(tctx, struct test_spoolss_win_context);
tctx              483 source4/torture/rpc/spoolss_win.c 	tmp_ctx = talloc_zero(tctx, struct test_spoolss_win_context);
tctx              485 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterSequence(tctx, p, &handle01);
tctx              486 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinterData(tctx, p, &handle01,"UISingleJobStatusString",
tctx              488 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Skip RemoteFindNextPrinterChangeNotifyEx test\n");
tctx              491 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &unused_handle1, server_name, 0);
tctx              493 source4/torture/rpc/spoolss_win.c 	ret &= test_EnumPrinters(tctx, p, ctx, 1024);
tctx              495 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &handle02, server_name, 0);
tctx              496 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinterData(tctx, p, &handle02, "MajorVersion", WERR_OK,
tctx              498 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &handle02);
tctx              505 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &handle02,
tctx              508 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinter(tctx, p, &handle02, ctx, 2, 0);
tctx              510 source4/torture/rpc/spoolss_win.c 	torture_assert_str_equal(tctx, ctx->current_info->info2.printername,
tctx              515 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &handle03,
tctx              517 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinter(tctx, p, &handle03, ctx, 0, 1164);
tctx              518 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinter(tctx, p, &handle03, ctx, 2, 0);
tctx              520 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &handle04,
tctx              522 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinter(tctx, p, &handle04, ctx, 2, 0);
tctx              523 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &handle04);
tctx              525 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &handle04,
tctx              527 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinter(tctx, p, &handle04, ctx, 2, 4096);
tctx              528 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &handle04);
tctx              530 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterAsAdmin(tctx, p,
tctx              533 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &handle04,
tctx              535 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinterData(tctx, p, &handle04,"UISingleJobStatusString",
tctx              537 source4/torture/rpc/spoolss_win.c 	torture_comment(tctx, "Skip RemoteFindNextPrinterChangeNotifyEx test\n");
tctx              539 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx              542 source4/torture/rpc/spoolss_win.c 	ret &= test_EnumJobs(tctx, p, &handle04);
tctx              543 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinter(tctx, p, &handle04, ctx, 2, 4096);
tctx              545 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx              546 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &handle04);
tctx              548 source4/torture/rpc/spoolss_win.c 	ret &= test_EnumPrinters(tctx, p, ctx, 1556);
tctx              549 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinterDriver2(tctx, p, ctx, &handle03);
tctx              550 source4/torture/rpc/spoolss_win.c 	ret &= test_EnumForms(tctx, p, &handle03, 0);
tctx              552 source4/torture/rpc/spoolss_win.c 	ret &= test_EnumPrinterKey(tctx, p, &handle03, "", ctx);
tctx              556 source4/torture/rpc/spoolss_win.c 		ret &= test_EnumPrinterKey(tctx, p, &handle03,
tctx              559 source4/torture/rpc/spoolss_win.c 		ret &= test_EnumPrinterDataEx(tctx, p, &handle03,
tctx              564 source4/torture/rpc/spoolss_win.c 	ret &= test_EnumPrinterDataEx(tctx, p, &handle03, "", 0,
tctx              567 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinter(tctx, p, &handle03, tmp_ctx, 2, 0);
tctx              569 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx              571 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx              573 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinter(tctx, p, &handle03, tmp_ctx, 2, 2556);
tctx              575 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx              577 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx              579 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx              581 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx              583 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinter(tctx, p, &handle03, tmp_ctx, 7, 0);
tctx              585 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx              587 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx              589 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &handle03);
tctx              591 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx              593 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx              595 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &handle03, server_name, 0);
tctx              596 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinterData(tctx, p, &handle03, "W3SvcInstalled",
tctx              598 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &handle03);
tctx              600 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &unused_handle1);
tctx              601 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &handle02);
tctx              603 source4/torture/rpc/spoolss_win.c 	ret &= test_OpenPrinterEx(tctx, p, &handle02,
tctx              605 source4/torture/rpc/spoolss_win.c 	ret &= test_GetPrinter(tctx, p, &handle02, tmp_ctx, 2, 0);
tctx              606 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &handle02);
tctx              609 source4/torture/rpc/spoolss_win.c 	ret &= test_ClosePrinter(tctx, p, &handle01);
tctx               30 source4/torture/rpc/srvsvc.c static bool test_NetCharDevGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx               39 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx               45 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetCharDevGetInfo level %u on device '%s'\n",
tctx               47 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetCharDevGetInfo(p, tctx, &r);
tctx               48 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetCharDevGetInfo failed");
tctx               49 source4/torture/rpc/srvsvc.c 		torture_assert_werr_ok(tctx, r.out.result, "NetCharDevGetInfo failed");
tctx               55 source4/torture/rpc/srvsvc.c static bool test_NetCharDevControl(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx               63 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx               69 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetCharDevControl opcode %u on device '%s'\n", 
tctx               71 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetCharDevControl(p, tctx, &r);
tctx               72 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetCharDevControl failed");
tctx               73 source4/torture/rpc/srvsvc.c 		torture_assert_werr_ok(tctx, r.out.result, "NetCharDevControl failed");
tctx               79 source4/torture/rpc/srvsvc.c static bool test_NetCharDevEnum(struct torture_context *tctx, 
tctx               93 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx              116 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetCharDevEnum level %u\n", info_ctr.level);
tctx              117 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetCharDevEnum(p, tctx, &r);
tctx              118 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetCharDevEnum failed");
tctx              120 source4/torture/rpc/srvsvc.c 			torture_comment(tctx, "NetCharDevEnum failed: %s\n", win_errstr(r.out.result));
tctx              129 source4/torture/rpc/srvsvc.c 				if (!test_NetCharDevGetInfo(p, tctx, device)) {
tctx              132 source4/torture/rpc/srvsvc.c 				if (!test_NetCharDevControl(p, tctx, device)) {
tctx              145 source4/torture/rpc/srvsvc.c static bool test_NetCharDevQGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              154 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx              156 source4/torture/rpc/srvsvc.c 	r.in.user = talloc_asprintf(tctx,"Administrator");
tctx              161 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetCharDevQGetInfo level %u on devicequeue '%s'\n",
tctx              163 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetCharDevQGetInfo(p, tctx, &r);
tctx              164 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetCharDevQGetInfo failed");
tctx              165 source4/torture/rpc/srvsvc.c 		torture_assert_werr_ok(tctx, r.out.result, "NetCharDevQGetInfo failed");
tctx              226 source4/torture/rpc/srvsvc.c static bool test_NetCharDevQEnum(struct torture_context *tctx, 
tctx              240 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx              241 source4/torture/rpc/srvsvc.c 	r.in.user = talloc_asprintf(tctx,"%s","Administrator");
tctx              263 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetCharDevQEnum level %u\n", info_ctr.level);
tctx              264 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetCharDevQEnum(p, tctx, &r);
tctx              265 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetCharDevQEnum failed");
tctx              267 source4/torture/rpc/srvsvc.c 			torture_comment(tctx, "NetCharDevQEnum failed: %s\n", win_errstr(r.out.result));
tctx              276 source4/torture/rpc/srvsvc.c 				if (!test_NetCharDevQGetInfo(p, tctx, device)) {
tctx              289 source4/torture/rpc/srvsvc.c static bool test_NetConnEnum(struct torture_context *tctx,
tctx              303 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx              304 source4/torture/rpc/srvsvc.c 	r.in.path = talloc_asprintf(tctx,"%s","ADMIN$");
tctx              325 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetConnEnum level %u\n", info_ctr.level);
tctx              326 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetConnEnum(p, tctx, &r);
tctx              327 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetConnEnum failed");
tctx              329 source4/torture/rpc/srvsvc.c 			torture_comment(tctx, "NetConnEnum failed: %s\n", win_errstr(r.out.result));
tctx              339 source4/torture/rpc/srvsvc.c static bool test_NetFileEnum(struct torture_context *tctx,
tctx              353 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx              375 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetFileEnum level %u\n", info_ctr.level);
tctx              376 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetFileEnum(p, tctx, &r);
tctx              377 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetFileEnum failed");
tctx              379 source4/torture/rpc/srvsvc.c 			torture_comment(tctx, "NetFileEnum failed: %s\n", win_errstr(r.out.result));
tctx              389 source4/torture/rpc/srvsvc.c static bool test_NetSessEnum(struct torture_context *tctx,
tctx              406 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx              441 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetSessEnum level %u\n", info_ctr.level);
tctx              442 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetSessEnum(p, tctx, &r);
tctx              443 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetSessEnum failed");
tctx              445 source4/torture/rpc/srvsvc.c 			torture_comment(tctx, "NetSessEnum failed: %s\n", win_errstr(r.out.result));
tctx              455 source4/torture/rpc/srvsvc.c static bool test_NetShareCheck(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              462 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              466 source4/torture/rpc/srvsvc.c 	torture_comment(tctx, 
tctx              469 source4/torture/rpc/srvsvc.c 	status = dcerpc_srvsvc_NetShareCheck(p, tctx, &r);
tctx              470 source4/torture/rpc/srvsvc.c 	torture_assert_ntstatus_ok(tctx, status, "dcerpc_srvsvc_NetShareCheck failed");
tctx              471 source4/torture/rpc/srvsvc.c 	torture_assert_werr_ok(tctx, r.out.result, "NetShareCheck failed");
tctx              476 source4/torture/rpc/srvsvc.c static bool test_NetShareGetInfo(struct torture_context *tctx, 
tctx              497 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              508 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetShareGetInfo level %u on share '%s'\n", 
tctx              511 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetShareGetInfo(p, tctx, &r);
tctx              512 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed");
tctx              513 source4/torture/rpc/srvsvc.c 		torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareGetInfo failed");
tctx              517 source4/torture/rpc/srvsvc.c 		if (!test_NetShareCheck(p, tctx, r.out.info->info2->path)) {
tctx              525 source4/torture/rpc/srvsvc.c static bool test_NetShareGetInfoAdminFull(struct torture_context *tctx, 
tctx              528 source4/torture/rpc/srvsvc.c 	return test_NetShareGetInfo(tctx, p, "ADMIN$", true);
tctx              531 source4/torture/rpc/srvsvc.c static bool test_NetShareGetInfoAdminAnon(struct torture_context *tctx, 
tctx              534 source4/torture/rpc/srvsvc.c 	return test_NetShareGetInfo(tctx, p, "ADMIN$", false);
tctx              537 source4/torture/rpc/srvsvc.c static bool test_NetShareAddSetDel(struct torture_context *tctx, 
tctx              565 source4/torture/rpc/srvsvc.c 		talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              566 source4/torture/rpc/srvsvc.c 	r.in.share_name = talloc_strdup(tctx, "testshare");
tctx              568 source4/torture/rpc/srvsvc.c 	info.info2 = talloc(tctx, struct srvsvc_NetShareInfo2);
tctx              571 source4/torture/rpc/srvsvc.c 	info.info2->comment = talloc_strdup(tctx, "test comment");
tctx              575 source4/torture/rpc/srvsvc.c 	info.info2->path = talloc_strdup(tctx, "C:\\");
tctx              582 source4/torture/rpc/srvsvc.c 	status = dcerpc_srvsvc_NetShareAdd(p, tctx, &a);
tctx              583 source4/torture/rpc/srvsvc.c 	torture_assert_ntstatus_ok(tctx, status, "NetShareAdd level 2 on share 'testshare' failed");
tctx              584 source4/torture/rpc/srvsvc.c 	torture_assert_werr_ok(tctx, a.out.result, "NetShareAdd level 2 on share 'testshare' failed");
tctx              595 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetShareSetInfo level %u on share '%s'\n", 
tctx              600 source4/torture/rpc/srvsvc.c 			info.info0 = talloc(tctx, struct srvsvc_NetShareInfo0);
tctx              604 source4/torture/rpc/srvsvc.c 			info.info1 = talloc(tctx, struct srvsvc_NetShareInfo1);
tctx              607 source4/torture/rpc/srvsvc.c 			info.info1->comment = talloc_strdup(tctx, "test comment 1");
tctx              610 source4/torture/rpc/srvsvc.c 			info.info2 = talloc(tctx, struct srvsvc_NetShareInfo2);
tctx              613 source4/torture/rpc/srvsvc.c 			info.info2->comment = talloc_strdup(tctx, "test comment 2");
tctx              617 source4/torture/rpc/srvsvc.c 			info.info2->path = talloc_strdup(tctx, "::BLaH::"); /* "C:\\"); */
tctx              621 source4/torture/rpc/srvsvc.c 			info.info501 = talloc(tctx, struct srvsvc_NetShareInfo501);
tctx              624 source4/torture/rpc/srvsvc.c 			info.info501->comment = talloc_strdup(tctx, "test comment 501");
tctx              629 source4/torture/rpc/srvsvc.c 			info.info502 = talloc(tctx, struct srvsvc_NetShareInfo502);
tctx              632 source4/torture/rpc/srvsvc.c 			info.info502->comment = talloc_strdup(tctx, "test comment 502");
tctx              636 source4/torture/rpc/srvsvc.c 			info.info502->path = talloc_strdup(tctx, "C:\\");
tctx              641 source4/torture/rpc/srvsvc.c 			info.info1004 = talloc(tctx, struct srvsvc_NetShareInfo1004);
tctx              642 source4/torture/rpc/srvsvc.c 			info.info1004->comment = talloc_strdup(tctx, "test comment 1004");
tctx              645 source4/torture/rpc/srvsvc.c 			info.info1005 = talloc(tctx, struct srvsvc_NetShareInfo1005);
tctx              649 source4/torture/rpc/srvsvc.c 			info.info1006 = talloc(tctx, struct srvsvc_NetShareInfo1006);
tctx              659 source4/torture/rpc/srvsvc.c 			info.info1501 = talloc_zero(tctx, struct sec_desc_buf);
tctx              665 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetShareSetInfo(p, tctx, &r);
tctx              666 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed");
tctx              667 source4/torture/rpc/srvsvc.c 		torture_assert_werr_equal(tctx, r.out.result, levels[i].expected, "NetShareSetInfo failed");
tctx              672 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetShareGetInfo(p, tctx, &q);
tctx              673 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed");
tctx              674 source4/torture/rpc/srvsvc.c 		torture_assert_werr_ok(tctx, q.out.result, "NetShareGetInfo failed");
tctx              676 source4/torture/rpc/srvsvc.c 		torture_assert_str_equal(tctx, q.out.info->info502->name, r.in.share_name,
tctx              683 source4/torture/rpc/srvsvc.c 			torture_assert_str_equal(tctx, q.out.info->info502->comment, "test comment 1", "comment");
tctx              686 source4/torture/rpc/srvsvc.c 			torture_assert_str_equal(tctx, q.out.info->info2->comment, "test comment 2", "comment");
tctx              687 source4/torture/rpc/srvsvc.c 			torture_assert_int_equal(tctx, q.out.info->info2->max_users, 2, "max users");
tctx              688 source4/torture/rpc/srvsvc.c 			torture_assert_str_equal(tctx, q.out.info->info2->path, "C:\\", "path");
tctx              691 source4/torture/rpc/srvsvc.c 			torture_assert_str_equal(tctx, q.out.info->info501->comment, "test comment 501", "comment");
tctx              694 source4/torture/rpc/srvsvc.c 			torture_assert_str_equal(tctx, q.out.info->info502->comment, "test comment 502", "comment");
tctx              695 source4/torture/rpc/srvsvc.c 			torture_assert_int_equal(tctx, q.out.info->info502->max_users, 502, "max users");
tctx              696 source4/torture/rpc/srvsvc.c 			torture_assert_str_equal(tctx, q.out.info->info502->path, "C:\\", "path");
tctx              699 source4/torture/rpc/srvsvc.c 			torture_assert_str_equal(tctx, q.out.info->info1004->comment, "test comment 1004",
tctx              705 source4/torture/rpc/srvsvc.c 			torture_assert_int_equal(tctx, q.out.info->info1006->max_users, 1006, "Max users");
tctx              718 source4/torture/rpc/srvsvc.c 	status = dcerpc_srvsvc_NetShareDel(p, tctx, &d);
tctx              719 source4/torture/rpc/srvsvc.c 	torture_assert_ntstatus_ok(tctx, status, "NetShareDel on share 'testshare502' failed");
tctx              720 source4/torture/rpc/srvsvc.c 	torture_assert_werr_ok(tctx, a.out.result, "NetShareDel on share 'testshare502' failed");
tctx              728 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAll(struct torture_context *tctx, 
tctx              757 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx              800 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetShareEnumAll level %u\n", info_ctr.level);
tctx              801 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetShareEnumAll(p, tctx, &r);
tctx              802 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetShareEnumAll failed");
tctx              803 source4/torture/rpc/srvsvc.c 		torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareEnumAll failed");
tctx              810 source4/torture/rpc/srvsvc.c 				if (!test_NetShareGetInfo(tctx, p, name, admin)) {
tctx              820 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAllFull(struct torture_context *tctx,
tctx              823 source4/torture/rpc/srvsvc.c 	return test_NetShareEnumAll(tctx, p, true);
tctx              826 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAllAnon(struct torture_context *tctx,
tctx              829 source4/torture/rpc/srvsvc.c 	return test_NetShareEnumAll(tctx, p, false);
tctx              832 source4/torture/rpc/srvsvc.c static bool test_NetShareEnum(struct torture_context *tctx,
tctx              857 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx              895 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetShareEnum level %u\n", info_ctr.level);
tctx              896 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetShareEnum(p, tctx, &r);
tctx              897 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetShareEnum failed");
tctx              898 source4/torture/rpc/srvsvc.c 		torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareEnum failed");
tctx              904 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumFull(struct torture_context *tctx,
tctx              907 source4/torture/rpc/srvsvc.c 	return test_NetShareEnum(tctx, p, true);
tctx              910 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAnon(struct torture_context *tctx,
tctx              913 source4/torture/rpc/srvsvc.c 	return test_NetShareEnum(tctx, p, false);
tctx              919 source4/torture/rpc/srvsvc.c static bool test_NetSrvGetInfo(struct torture_context *tctx, 
tctx              928 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx              933 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetSrvGetInfo level %u\n", r.in.level);
tctx              934 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetSrvGetInfo(p, tctx, &r);
tctx              935 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetSrvGetInfo failed");
tctx              937 source4/torture/rpc/srvsvc.c 			torture_comment(tctx, "NetSrvGetInfo failed: %s\n", win_errstr(r.out.result));
tctx              947 source4/torture/rpc/srvsvc.c static bool test_NetDiskEnum(struct torture_context *tctx, 
tctx              970 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetDiskEnum level %u\n", r.in.level);
tctx              971 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetDiskEnum(p, tctx, &r);
tctx              972 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetDiskEnum failed");
tctx              973 source4/torture/rpc/srvsvc.c 		torture_assert_werr_ok(tctx, r.out.result, "NetDiskEnum failed");
tctx              982 source4/torture/rpc/srvsvc.c static bool test_NetTransportEnum(struct torture_context *tctx, 
tctx              997 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s", dcerpc_server_name(p));
tctx             1016 source4/torture/rpc/srvsvc.c 		torture_comment(tctx, "testing NetTransportEnum level %u\n", transports.level);
tctx             1017 source4/torture/rpc/srvsvc.c 		status = dcerpc_srvsvc_NetTransportEnum(p, tctx, &r);
tctx             1018 source4/torture/rpc/srvsvc.c 		torture_assert_ntstatus_ok(tctx, status, "NetTransportEnum failed");
tctx             1020 source4/torture/rpc/srvsvc.c 			torture_comment(tctx, "unexpected result: %s\n", win_errstr(r.out.result));
tctx             1030 source4/torture/rpc/srvsvc.c static bool test_NetRemoteTOD(struct torture_context *tctx, 
tctx             1037 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx             1040 source4/torture/rpc/srvsvc.c 	torture_comment(tctx, "testing NetRemoteTOD\n");
tctx             1041 source4/torture/rpc/srvsvc.c 	status = dcerpc_srvsvc_NetRemoteTOD(p, tctx, &r);
tctx             1042 source4/torture/rpc/srvsvc.c 	torture_assert_ntstatus_ok(tctx, status, "NetRemoteTOD failed");
tctx             1043 source4/torture/rpc/srvsvc.c 	torture_assert_werr_ok(tctx, r.out.result, "NetRemoteTOD failed");
tctx             1052 source4/torture/rpc/srvsvc.c static bool test_NetNameValidate(struct torture_context *tctx, 
tctx             1061 source4/torture/rpc/srvsvc.c 	r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx             1071 source4/torture/rpc/srvsvc.c 		r.in.name = name = talloc_array(tctx, char, 4097);
tctx             1084 source4/torture/rpc/srvsvc.c 			status = dcerpc_srvsvc_NetNameValidate(p, tctx, &r);
tctx             1111 source4/torture/rpc/srvsvc.c 		invalidc = talloc_strdup(tctx, "");
tctx             1114 source4/torture/rpc/srvsvc.c 			r.in.name = name = talloc_asprintf(tctx, "%c", (char)n);
tctx             1116 source4/torture/rpc/srvsvc.c 			status = dcerpc_srvsvc_NetNameValidate(p, tctx, &r);
tctx               31 source4/torture/rpc/svcctl.c static bool test_OpenSCManager(struct dcerpc_pipe *p, struct torture_context *tctx, struct policy_handle *h)
tctx               40 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx,
tctx               41 source4/torture/rpc/svcctl.c 				   dcerpc_svcctl_OpenSCManagerW(p, tctx, &r),
tctx               47 source4/torture/rpc/svcctl.c static bool test_CloseServiceHandle(struct dcerpc_pipe *p, struct torture_context *tctx, struct policy_handle *h)
tctx               53 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx,
tctx               54 source4/torture/rpc/svcctl.c 				   dcerpc_svcctl_CloseServiceHandle(p, tctx, &r),
tctx               60 source4/torture/rpc/svcctl.c static bool test_OpenService(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx               70 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx,
tctx               71 source4/torture/rpc/svcctl.c 				   dcerpc_svcctl_OpenServiceW(p, tctx, &r),
tctx               73 source4/torture/rpc/svcctl.c 	torture_assert_werr_ok(tctx, r.out.result, "OpenServiceW failed!");
tctx               79 source4/torture/rpc/svcctl.c static bool test_QueryServiceStatus(struct torture_context *tctx,
tctx               87 source4/torture/rpc/svcctl.c 	if (!test_OpenSCManager(p, tctx, &h))
tctx               90 source4/torture/rpc/svcctl.c 	if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx               96 source4/torture/rpc/svcctl.c 	status = dcerpc_svcctl_QueryServiceStatus(p, tctx, &r);
tctx               97 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx, status, "QueryServiceStatus failed!");
tctx               98 source4/torture/rpc/svcctl.c 	torture_assert_werr_ok(tctx, r.out.result, "QueryServiceStatus failed!");
tctx              100 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &s))
tctx              103 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &h))
tctx              109 source4/torture/rpc/svcctl.c static bool test_QueryServiceStatusEx(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx              120 source4/torture/rpc/svcctl.c 	if (!test_OpenSCManager(p, tctx, &h))
tctx              123 source4/torture/rpc/svcctl.c 	if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx              126 source4/torture/rpc/svcctl.c 	buffer = talloc(tctx, uint8_t);
tctx              134 source4/torture/rpc/svcctl.c 	status = dcerpc_svcctl_QueryServiceStatusEx(p, tctx, &r);
tctx              135 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx, status, "QueryServiceStatusEx failed!");
tctx              139 source4/torture/rpc/svcctl.c 		buffer = talloc_array(tctx, uint8_t, needed);
tctx              142 source4/torture/rpc/svcctl.c 		status = dcerpc_svcctl_QueryServiceStatusEx(p, tctx, &r);
tctx              143 source4/torture/rpc/svcctl.c 		torture_assert_ntstatus_ok(tctx, status, "QueryServiceStatusEx failed!");
tctx              144 source4/torture/rpc/svcctl.c 		torture_assert_werr_ok(tctx, r.out.result, "QueryServiceStatusEx failed!");
tctx              147 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &s))
tctx              150 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &h))
tctx              156 source4/torture/rpc/svcctl.c static bool test_QueryServiceConfigW(struct torture_context *tctx,
tctx              167 source4/torture/rpc/svcctl.c 	if (!test_OpenSCManager(p, tctx, &h))
tctx              170 source4/torture/rpc/svcctl.c 	if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx              178 source4/torture/rpc/svcctl.c 	status = dcerpc_svcctl_QueryServiceConfigW(p, tctx, &r);
tctx              179 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfigW failed!");
tctx              183 source4/torture/rpc/svcctl.c 		status = dcerpc_svcctl_QueryServiceConfigW(p, tctx, &r);
tctx              184 source4/torture/rpc/svcctl.c 		torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfigW failed!");
tctx              187 source4/torture/rpc/svcctl.c 	torture_assert_werr_ok(tctx, r.out.result, "QueryServiceConfigW failed!");
tctx              189 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &s))
tctx              192 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &h))
tctx              198 source4/torture/rpc/svcctl.c static bool test_QueryServiceConfig2W(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx              209 source4/torture/rpc/svcctl.c 	if (!test_OpenSCManager(p, tctx, &h))
tctx              212 source4/torture/rpc/svcctl.c 	if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx              215 source4/torture/rpc/svcctl.c 	buffer = talloc(tctx, uint8_t);
tctx              223 source4/torture/rpc/svcctl.c 	status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r);
tctx              224 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!");
tctx              228 source4/torture/rpc/svcctl.c 		buffer = talloc_array(tctx, uint8_t, needed);
tctx              231 source4/torture/rpc/svcctl.c 		status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r);
tctx              232 source4/torture/rpc/svcctl.c 		torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!");
tctx              233 source4/torture/rpc/svcctl.c 		torture_assert_werr_ok(tctx, r.out.result, "QueryServiceConfig2W failed!");
tctx              241 source4/torture/rpc/svcctl.c 	status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r);
tctx              242 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!");
tctx              246 source4/torture/rpc/svcctl.c 		buffer = talloc_array(tctx, uint8_t, needed);
tctx              249 source4/torture/rpc/svcctl.c 		status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r);
tctx              250 source4/torture/rpc/svcctl.c 		torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!");
tctx              251 source4/torture/rpc/svcctl.c 		torture_assert_werr_ok(tctx, r.out.result, "QueryServiceConfig2W failed!");
tctx              254 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &s))
tctx              257 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &h))
tctx              263 source4/torture/rpc/svcctl.c static bool test_QueryServiceObjectSecurity(struct torture_context *tctx,
tctx              272 source4/torture/rpc/svcctl.c 	if (!test_OpenSCManager(p, tctx, &h))
tctx              275 source4/torture/rpc/svcctl.c 	if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx              284 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx,
tctx              285 source4/torture/rpc/svcctl.c 		dcerpc_svcctl_QueryServiceObjectSecurity(p, tctx, &r),
tctx              287 source4/torture/rpc/svcctl.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
tctx              292 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx,
tctx              293 source4/torture/rpc/svcctl.c 		dcerpc_svcctl_QueryServiceObjectSecurity(p, tctx, &r),
tctx              298 source4/torture/rpc/svcctl.c 		buffer = talloc_array(tctx, uint8_t, needed);
tctx              300 source4/torture/rpc/svcctl.c 		torture_assert_ntstatus_ok(tctx,
tctx              301 source4/torture/rpc/svcctl.c 			dcerpc_svcctl_QueryServiceObjectSecurity(p, tctx, &r),
tctx              305 source4/torture/rpc/svcctl.c 	torture_assert_werr_ok(tctx, r.out.result, "QueryServiceObjectSecurity failed!");
tctx              307 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &s))
tctx              310 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &h))
tctx              316 source4/torture/rpc/svcctl.c static bool test_StartServiceW(struct torture_context *tctx,
tctx              322 source4/torture/rpc/svcctl.c 	if (!test_OpenSCManager(p, tctx, &h))
tctx              325 source4/torture/rpc/svcctl.c 	if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx              332 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx,
tctx              333 source4/torture/rpc/svcctl.c 		dcerpc_svcctl_StartServiceW(p, tctx, &r),
tctx              335 source4/torture/rpc/svcctl.c 	torture_assert_werr_equal(tctx, r.out.result,
tctx              339 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &s))
tctx              342 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &h))
tctx              348 source4/torture/rpc/svcctl.c static bool test_ControlService(struct torture_context *tctx,
tctx              355 source4/torture/rpc/svcctl.c 	if (!test_OpenSCManager(p, tctx, &h))
tctx              358 source4/torture/rpc/svcctl.c 	if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx              365 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx,
tctx              366 source4/torture/rpc/svcctl.c 		dcerpc_svcctl_ControlService(p, tctx, &r),
tctx              368 source4/torture/rpc/svcctl.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
tctx              371 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &s))
tctx              374 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &h))
tctx              380 source4/torture/rpc/svcctl.c static bool test_EnumServicesStatus(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx              391 source4/torture/rpc/svcctl.c 	if (!test_OpenSCManager(p, tctx, &h))
tctx              404 source4/torture/rpc/svcctl.c 	status = dcerpc_svcctl_EnumServicesStatusW(p, tctx, &r);
tctx              406 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx, status, "EnumServicesStatus failed!");
tctx              410 source4/torture/rpc/svcctl.c 		r.out.service = talloc_array(tctx, uint8_t, needed);
tctx              412 source4/torture/rpc/svcctl.c 		status = dcerpc_svcctl_EnumServicesStatusW(p, tctx, &r);
tctx              414 source4/torture/rpc/svcctl.c 		torture_assert_ntstatus_ok(tctx, status, "EnumServicesStatus failed!");
tctx              415 source4/torture/rpc/svcctl.c 		torture_assert_werr_ok(tctx, r.out.result, "EnumServicesStatus failed");
tctx              425 source4/torture/rpc/svcctl.c 		blob.data = talloc_steal(tctx, r.out.service);
tctx              427 source4/torture/rpc/svcctl.c 		ndr = ndr_pull_init_blob(&blob, tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx              429 source4/torture/rpc/svcctl.c 		service = talloc_array(tctx, struct ENUM_SERVICE_STATUSW, services_returned);
tctx              443 source4/torture/rpc/svcctl.c 		torture_assert(tctx, service[i].service_name,
tctx              451 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &h))
tctx              457 source4/torture/rpc/svcctl.c static bool test_EnumDependentServicesW(struct torture_context *tctx,
tctx              469 source4/torture/rpc/svcctl.c 	if (!test_OpenSCManager(p, tctx, &h))
tctx              472 source4/torture/rpc/svcctl.c 	if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx              482 source4/torture/rpc/svcctl.c 	torture_assert_ntstatus_ok(tctx,
tctx              483 source4/torture/rpc/svcctl.c 		dcerpc_svcctl_EnumDependentServicesW(p, tctx, &r),
tctx              486 source4/torture/rpc/svcctl.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
tctx              493 source4/torture/rpc/svcctl.c 		torture_assert_ntstatus_ok(tctx,
tctx              494 source4/torture/rpc/svcctl.c 			dcerpc_svcctl_EnumDependentServicesW(p, tctx, &r),
tctx              499 source4/torture/rpc/svcctl.c 			r.out.service_status = talloc_array(tctx, uint8_t, needed);
tctx              501 source4/torture/rpc/svcctl.c 			torture_assert_ntstatus_ok(tctx,
tctx              502 source4/torture/rpc/svcctl.c 				dcerpc_svcctl_EnumDependentServicesW(p, tctx, &r),
tctx              507 source4/torture/rpc/svcctl.c 		torture_assert_werr_ok(tctx, r.out.result,
tctx              511 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &s))
tctx              514 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &h))
tctx              520 source4/torture/rpc/svcctl.c static bool test_SCManager(struct torture_context *tctx,
tctx              525 source4/torture/rpc/svcctl.c 	if (!test_OpenSCManager(p, tctx, &h))
tctx              528 source4/torture/rpc/svcctl.c 	if (!test_CloseServiceHandle(p, tctx, &h))
tctx              309 source4/torture/rpc/testjoin.c _PUBLIC_ struct test_join *torture_join_domain(struct torture_context *tctx,
tctx              321 source4/torture/rpc/testjoin.c 	tj = talloc(tctx, struct test_join);
tctx              330 source4/torture/rpc/testjoin.c 	libnet_ctx = libnet_context_init(tctx->ev, tctx->lp_ctx);	
tctx              339 source4/torture/rpc/testjoin.c 	libnet_r->in.binding = torture_setting_string(tctx, "binding", NULL);
tctx              341 source4/torture/rpc/testjoin.c 		libnet_r->in.binding = talloc_asprintf(libnet_r, "ncacn_np:%s", torture_setting_string(tctx, "host", NULL));
tctx              394 source4/torture/rpc/testjoin.c 						      lp_netbios_name(tctx->lp_ctx), timestring(tj, time(NULL)));
tctx              402 source4/torture/rpc/testjoin.c 	cli_credentials_set_conf(*machine_credentials, tctx->lp_ctx);
tctx               30 source4/torture/rpc/unixinfo.c static bool test_sidtouid(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx               37 source4/torture/rpc/unixinfo.c 	sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-5432");
tctx               41 source4/torture/rpc/unixinfo.c 	status = dcerpc_unixinfo_SidToUid(p, tctx, &r);
tctx               43 source4/torture/rpc/unixinfo.c 	} else torture_assert_ntstatus_ok(tctx, status, "SidToUid failed");
tctx               51 source4/torture/rpc/unixinfo.c static bool test_uidtosid(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx               59 source4/torture/rpc/unixinfo.c 	torture_assert_ntstatus_ok(tctx, dcerpc_unixinfo_UidToSid(p, tctx, &r), 
tctx               65 source4/torture/rpc/unixinfo.c static bool test_getpwuid(struct torture_context *tctx, 
tctx               81 source4/torture/rpc/unixinfo.c 	r.out.infos = talloc_array(tctx, struct unixinfo_GetPWUidInfo, num_uids);
tctx               83 source4/torture/rpc/unixinfo.c 	result = dcerpc_unixinfo_GetPWUid(p, tctx, &r);
tctx               85 source4/torture/rpc/unixinfo.c 	torture_assert_ntstatus_ok(tctx, result, "GetPWUid failed");
tctx               93 source4/torture/rpc/unixinfo.c static bool test_sidtogid(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx              100 source4/torture/rpc/unixinfo.c 	sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-5432");
tctx              104 source4/torture/rpc/unixinfo.c 	status = dcerpc_unixinfo_SidToGid(p, tctx, &r);
tctx              106 source4/torture/rpc/unixinfo.c 	} else torture_assert_ntstatus_ok(tctx, status, "SidToGid failed");
tctx              114 source4/torture/rpc/unixinfo.c static bool test_gidtosid(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx              122 source4/torture/rpc/unixinfo.c 	torture_assert_ntstatus_ok(tctx, dcerpc_unixinfo_GidToSid(p, tctx, &r), 
tctx               59 source4/torture/rpc/winreg.c 			    struct torture_context *tctx,
tctx               69 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx, dcerpc_winreg_GetVersion(p, tctx, &r),
tctx               72 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx, r.out.result, "GetVersion failed");
tctx               78 source4/torture/rpc/winreg.c 				      struct torture_context *tctx,
tctx               91 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx,
tctx               92 source4/torture/rpc/winreg.c 				   dcerpc_winreg_NotifyChangeKeyValue(p, tctx, &r),
tctx               96 source4/torture/rpc/winreg.c 		torture_comment(tctx,
tctx              105 source4/torture/rpc/winreg.c static bool test_CreateKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              123 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx, dcerpc_winreg_CreateKey(p, tctx, &r),
tctx              126 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx,  r.out.result, "CreateKey failed");
tctx              136 source4/torture/rpc/winreg.c 			      struct torture_context *tctx,
tctx              147 source4/torture/rpc/winreg.c 	sd = security_descriptor_dacl_create(tctx,
tctx              157 source4/torture/rpc/winreg.c 	torture_assert_ndr_success(tctx,
tctx              158 source4/torture/rpc/winreg.c 		ndr_push_struct_blob(&sdblob, tctx, NULL, sd,
tctx              178 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx, dcerpc_winreg_CreateKey(p, tctx, &r),
tctx              181 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx, r.out.result, "CreateKey with sd failed");
tctx              187 source4/torture/rpc/winreg.c 				 struct torture_context *tctx,
tctx              208 source4/torture/rpc/winreg.c 	r.in.sd = r.out.sd = talloc_zero(tctx, struct KeySecurityData);
tctx              211 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx,
tctx              212 source4/torture/rpc/winreg.c 				   dcerpc_winreg_GetKeySecurity(p, tctx, &r),
tctx              215 source4/torture/rpc/winreg.c 	torture_assert_werr_equal(tctx, r.out.result, get_werr,
tctx              221 source4/torture/rpc/winreg.c 	sd = talloc_zero(tctx, struct security_descriptor);
tctx              223 source4/torture/rpc/winreg.c 	torture_assert_ndr_success(tctx,
tctx              224 source4/torture/rpc/winreg.c 		ndr_pull_struct_blob(&sdblob, tctx, NULL, sd,
tctx              242 source4/torture/rpc/winreg.c 				struct torture_context *tctx,
tctx              246 source4/torture/rpc/winreg.c 	return _test_GetKeySecurity(p, tctx, handle, NULL, WERR_OK, sd_out);
tctx              250 source4/torture/rpc/winreg.c 				 struct torture_context *tctx,
tctx              267 source4/torture/rpc/winreg.c 	torture_assert_ndr_success(tctx,
tctx              268 source4/torture/rpc/winreg.c 		ndr_push_struct_blob(&sdblob, tctx, NULL, sd,
tctx              272 source4/torture/rpc/winreg.c 	sdata = talloc_zero(tctx, struct KeySecurityData);
tctx              300 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx,
tctx              301 source4/torture/rpc/winreg.c 				   dcerpc_winreg_SetKeySecurity(p, tctx, &r),
tctx              304 source4/torture/rpc/winreg.c 	torture_assert_werr_equal(tctx, r.out.result, werr,
tctx              311 source4/torture/rpc/winreg.c 				struct torture_context *tctx,
tctx              315 source4/torture/rpc/winreg.c 	return _test_SetKeySecurity(p, tctx, handle, NULL, sd, WERR_OK);
tctx              318 source4/torture/rpc/winreg.c static bool test_CloseKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              326 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx, dcerpc_winreg_CloseKey(p, tctx, &r),
tctx              329 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx, r.out.result, "CloseKey failed");
tctx              334 source4/torture/rpc/winreg.c static bool test_FlushKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              342 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx, dcerpc_winreg_FlushKey(p, tctx, &r),
tctx              345 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx, r.out.result, "FlushKey failed");
tctx              350 source4/torture/rpc/winreg.c static bool _test_OpenKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              366 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx, dcerpc_winreg_OpenKey(p, tctx, &r),
tctx              369 source4/torture/rpc/winreg.c 	torture_assert_werr_equal(tctx, r.out.result, open_werr,
tctx              379 source4/torture/rpc/winreg.c static bool test_OpenKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              383 source4/torture/rpc/winreg.c 	return _test_OpenKey(p, tctx, hive_handle, keyname,
tctx              388 source4/torture/rpc/winreg.c static bool test_Cleanup(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx              397 source4/torture/rpc/winreg.c 	dcerpc_winreg_DeleteKey(p, tctx, &r);
tctx              403 source4/torture/rpc/winreg.c 					   struct torture_context *tctx,
tctx              410 source4/torture/rpc/winreg.c 	if (!_test_GetKeySecurity(p, tctx, handle, NULL, get_werr, &sd)) {
tctx              414 source4/torture/rpc/winreg.c 	if (!_test_SetKeySecurity(p, tctx, handle, NULL, sd, set_werr)) {
tctx              422 source4/torture/rpc/winreg.c 				    struct torture_context *tctx,
tctx              429 source4/torture/rpc/winreg.c 	torture_comment(tctx, "SecurityDescriptor get & set\n");
tctx              431 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx              435 source4/torture/rpc/winreg.c 	if (!_test_GetSetSecurityDescriptor(p, tctx, &new_handle,
tctx              440 source4/torture/rpc/winreg.c 	if (!test_CloseKey(p, tctx, &new_handle)) {
tctx              448 source4/torture/rpc/winreg.c 				     struct torture_context *tctx,
tctx              460 source4/torture/rpc/winreg.c 	if (!_test_OpenKey(p, tctx, handle, key, access_mask, &new_handle,
tctx              469 source4/torture/rpc/winreg.c 	if (!_test_GetSetSecurityDescriptor(p, tctx, &new_handle,
tctx              474 source4/torture/rpc/winreg.c 	if (!test_CloseKey(p, tctx, &new_handle)) {
tctx              482 source4/torture/rpc/winreg.c 				      struct torture_context *tctx,
tctx              489 source4/torture/rpc/winreg.c 	if (!test_GetKeySecurity(p, tctx, handle, &sd)) {
tctx              507 source4/torture/rpc/winreg.c 				       struct torture_context *tctx,
tctx              515 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx              519 source4/torture/rpc/winreg.c 	ret = test_dacl_trustee_present(p, tctx, &new_handle, sid);
tctx              521 source4/torture/rpc/winreg.c 	test_CloseKey(p, tctx, &new_handle);
tctx              527 source4/torture/rpc/winreg.c 				      struct torture_context *tctx,
tctx              535 source4/torture/rpc/winreg.c 	if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) {
tctx              553 source4/torture/rpc/winreg.c 				       struct torture_context *tctx,
tctx              561 source4/torture/rpc/winreg.c 	if (!_test_OpenKey(p, tctx, handle, key, SEC_FLAG_SYSTEM_SECURITY,
tctx              566 source4/torture/rpc/winreg.c 	ret = test_sacl_trustee_present(p, tctx, &new_handle, sid);
tctx              568 source4/torture/rpc/winreg.c 	test_CloseKey(p, tctx, &new_handle);
tctx              574 source4/torture/rpc/winreg.c 			       struct torture_context *tctx,
tctx              581 source4/torture/rpc/winreg.c 	if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) {
tctx              593 source4/torture/rpc/winreg.c 				struct torture_context *tctx,
tctx              601 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx              605 source4/torture/rpc/winreg.c 	ret = test_owner_present(p, tctx, &new_handle, sid);
tctx              607 source4/torture/rpc/winreg.c 	test_CloseKey(p, tctx, &new_handle);
tctx              613 source4/torture/rpc/winreg.c 			       struct torture_context *tctx,
tctx              620 source4/torture/rpc/winreg.c 	if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) {
tctx              632 source4/torture/rpc/winreg.c 				struct torture_context *tctx,
tctx              640 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx              644 source4/torture/rpc/winreg.c 	ret = test_group_present(p, tctx, &new_handle, sid);
tctx              646 source4/torture/rpc/winreg.c 	test_CloseKey(p, tctx, &new_handle);
tctx              652 source4/torture/rpc/winreg.c 					    struct torture_context *tctx,
tctx              660 source4/torture/rpc/winreg.c 	if (!test_GetKeySecurity(p, tctx, handle, &sd)) {
tctx              679 source4/torture/rpc/winreg.c 				  struct torture_context *tctx,
tctx              686 source4/torture/rpc/winreg.c 	if (!test_GetKeySecurity(p, tctx, handle, &sd)) {
tctx              704 source4/torture/rpc/winreg.c 				 struct torture_context *tctx,
tctx              712 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx              716 source4/torture/rpc/winreg.c 	if (!test_SetKeySecurity(p, tctx, &new_handle, sd)) {
tctx              720 source4/torture/rpc/winreg.c 	if (!test_CloseKey(p, tctx, &new_handle)) {
tctx              728 source4/torture/rpc/winreg.c 				struct torture_context *tctx,
tctx              736 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx              740 source4/torture/rpc/winreg.c 	if (!test_GetKeySecurity(p, tctx, &new_handle, sd)) {
tctx              744 source4/torture/rpc/winreg.c 	if (!test_CloseKey(p, tctx, &new_handle)) {
tctx              752 source4/torture/rpc/winreg.c 					       struct torture_context *tctx,
tctx              779 source4/torture/rpc/winreg.c 	torture_comment(tctx, "SecurityDescriptor inheritance\n");
tctx              781 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx              785 source4/torture/rpc/winreg.c 	if (!_test_GetKeySecurity(p, tctx, &new_handle, NULL, WERR_OK, &sd)) {
tctx              789 source4/torture/rpc/winreg.c 	sd_orig = security_descriptor_copy(tctx, sd);
tctx              794 source4/torture/rpc/winreg.c 	ace = security_ace_create(tctx,
tctx              810 source4/torture/rpc/winreg.c 	if (!test_SetKeySecurity(p, tctx, &new_handle, sd)) {
tctx              814 source4/torture/rpc/winreg.c 	if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx              819 source4/torture/rpc/winreg.c 	if (!test_CloseKey(p, tctx, &new_handle)) {
tctx              823 source4/torture/rpc/winreg.c 	if (!test_CreateKey(p, tctx, handle, TEST_SUBKEY_SD, NULL)) {
tctx              828 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, TEST_SUBKEY_SD, &new_handle)) {
tctx              833 source4/torture/rpc/winreg.c 	if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx              839 source4/torture/rpc/winreg.c 	test_CloseKey(p, tctx, &new_handle);
tctx              840 source4/torture/rpc/winreg.c 	if (!test_CreateKey(p, tctx, handle, TEST_SUBSUBKEY_SD, NULL)) {
tctx              845 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, TEST_SUBSUBKEY_SD, &new_handle)) {
tctx              850 source4/torture/rpc/winreg.c 	if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx              857 source4/torture/rpc/winreg.c 	test_CloseKey(p, tctx, &new_handle);
tctx              858 source4/torture/rpc/winreg.c 	test_Cleanup(p, tctx, handle, TEST_SUBKEY_SD);
tctx              859 source4/torture/rpc/winreg.c 	test_RestoreSecurity(p, tctx, handle, key, sd_orig);
tctx              865 source4/torture/rpc/winreg.c 						    struct torture_context *tctx,
tctx              891 source4/torture/rpc/winreg.c 	torture_comment(tctx, "SecurityDescriptor inheritance block\n");
tctx              893 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx              897 source4/torture/rpc/winreg.c 	if (!_test_GetKeySecurity(p, tctx, &new_handle, NULL, WERR_OK, &sd)) {
tctx              901 source4/torture/rpc/winreg.c 	sd_orig = security_descriptor_copy(tctx, sd);
tctx              906 source4/torture/rpc/winreg.c 	ace = security_ace_create(tctx,
tctx              919 source4/torture/rpc/winreg.c 	if (!_test_SetKeySecurity(p, tctx, &new_handle, NULL, sd, WERR_OK)) {
tctx              923 source4/torture/rpc/winreg.c 	if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx              928 source4/torture/rpc/winreg.c 	if (!test_CloseKey(p, tctx, &new_handle)) {
tctx              932 source4/torture/rpc/winreg.c 	if (!test_CreateKey(p, tctx, handle, TEST_SUBSUBKEY_SD, NULL)) {
tctx              936 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, TEST_SUBSUBKEY_SD, &new_handle)) {
tctx              941 source4/torture/rpc/winreg.c 	if (test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx              947 source4/torture/rpc/winreg.c 	sid = dom_sid_parse_talloc(tctx, TEST_SID);
tctx              952 source4/torture/rpc/winreg.c 	if (test_dacl_trustee_present(p, tctx, &new_handle, sid)) {
tctx              958 source4/torture/rpc/winreg.c 	test_CloseKey(p, tctx, &new_handle);
tctx              960 source4/torture/rpc/winreg.c 	if (!test_OpenKey(p, tctx, handle, TEST_SUBKEY_SD, &new_handle)) {
tctx              965 source4/torture/rpc/winreg.c 	if (test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx              971 source4/torture/rpc/winreg.c 	if (!test_dacl_trustee_flags_present(p, tctx, &new_handle, sid, ace_flags)) {
tctx              979 source4/torture/rpc/winreg.c 	test_CloseKey(p, tctx, &new_handle);
tctx              980 source4/torture/rpc/winreg.c 	test_Cleanup(p, tctx, handle, TEST_SUBKEY_SD);
tctx              981 source4/torture/rpc/winreg.c 	test_RestoreSecurity(p, tctx, handle, key, sd_orig);
tctx              987 source4/torture/rpc/winreg.c 					  struct torture_context *tctx,
tctx             1019 source4/torture/rpc/winreg.c 		torture_comment(tctx,
tctx             1022 source4/torture/rpc/winreg.c 		torture_comment(tctx,
tctx             1028 source4/torture/rpc/winreg.c 		if (_test_SecurityDescriptor(p, tctx, handle,
tctx             1047 source4/torture/rpc/winreg.c 					       struct torture_context *tctx,
tctx             1066 source4/torture/rpc/winreg.c 	torture_comment(tctx, "SecurityDescriptor (%s) sets for secinfo: "
tctx             1070 source4/torture/rpc/winreg.c 	if (!_test_OpenKey(p, tctx, handle, key,
tctx             1080 source4/torture/rpc/winreg.c 		test_CloseKey(p, tctx, &new_handle);
tctx             1084 source4/torture/rpc/winreg.c 	if (!_test_SetKeySecurity(p, tctx, &new_handle, &sec_info,
tctx             1087 source4/torture/rpc/winreg.c 		torture_warning(tctx,
tctx             1091 source4/torture/rpc/winreg.c 		test_CloseKey(p, tctx, &new_handle);
tctx             1095 source4/torture/rpc/winreg.c 	test_CloseKey(p, tctx, &new_handle);
tctx             1099 source4/torture/rpc/winreg.c 		present = fn(p, tctx, handle, key, sid);
tctx             1101 source4/torture/rpc/winreg.c 			torture_warning(tctx,
tctx             1107 source4/torture/rpc/winreg.c 			torture_warning(tctx,
tctx             1118 source4/torture/rpc/winreg.c 					    struct torture_context *tctx,
tctx             1128 source4/torture/rpc/winreg.c 		security_descriptor_dacl_create(tctx,
tctx             1133 source4/torture/rpc/winreg.c 		security_descriptor_dacl_create(tctx,
tctx             1138 source4/torture/rpc/winreg.c 		security_descriptor_dacl_create(tctx,
tctx             1152 source4/torture/rpc/winreg.c 		security_descriptor_sacl_create(tctx,
tctx             1231 source4/torture/rpc/winreg.c 	sid = dom_sid_parse_talloc(tctx, TEST_SID);
tctx             1236 source4/torture/rpc/winreg.c 	if (!test_BackupSecurity(p, tctx, handle, key, &sd_orig)) {
tctx             1246 source4/torture/rpc/winreg.c 			if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle,
tctx             1270 source4/torture/rpc/winreg.c 			if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle,
tctx             1294 source4/torture/rpc/winreg.c 			if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle,
tctx             1318 source4/torture/rpc/winreg.c 			if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle,
tctx             1337 source4/torture/rpc/winreg.c 	test_RestoreSecurity(p, tctx, handle, key, sd_orig);
tctx             1343 source4/torture/rpc/winreg.c 				     struct torture_context *tctx,
tctx             1349 source4/torture/rpc/winreg.c 	if (!test_SecurityDescriptor(p, tctx, handle, key)) {
tctx             1354 source4/torture/rpc/winreg.c 	if (!test_SecurityDescriptorInheritance(p, tctx, handle, key)) {
tctx             1359 source4/torture/rpc/winreg.c 	if (!test_SecurityDescriptorBlockInheritance(p, tctx, handle, key)) {
tctx             1364 source4/torture/rpc/winreg.c 	if (!test_SecurityDescriptorsSecInfo(p, tctx, handle, key)) {
tctx             1369 source4/torture/rpc/winreg.c 	if (!test_SecurityDescriptorsMasks(p, tctx, handle, key)) {
tctx             1377 source4/torture/rpc/winreg.c static bool test_DeleteKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1386 source4/torture/rpc/winreg.c 	status = dcerpc_winreg_DeleteKey(p, tctx, &r);
tctx             1388 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx, status, "DeleteKey failed");
tctx             1389 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx, r.out.result, "DeleteKey failed");
tctx             1395 source4/torture/rpc/winreg.c 			      struct torture_context *tctx,
tctx             1415 source4/torture/rpc/winreg.c 	r.out.classname = talloc(tctx, struct winreg_String);
tctx             1417 source4/torture/rpc/winreg.c 	r.in.classname = talloc(tctx, struct winreg_String);
tctx             1420 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx,
tctx             1421 source4/torture/rpc/winreg.c 				   dcerpc_winreg_QueryInfoKey(p, tctx, &r),
tctx             1424 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx, r.out.result, "QueryInfoKey failed");
tctx             1429 source4/torture/rpc/winreg.c static bool test_key(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1433 source4/torture/rpc/winreg.c static bool test_EnumKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1457 source4/torture/rpc/winreg.c 		status = dcerpc_winreg_EnumKey(p, tctx, &r);
tctx             1462 source4/torture/rpc/winreg.c 			torture_comment(tctx, "EnumKey: %d: %s\n",
tctx             1466 source4/torture/rpc/winreg.c 			if (!test_OpenKey(p, tctx, handle, r.out.name->name,
tctx             1469 source4/torture/rpc/winreg.c 				test_key(p, tctx, &key_handle,
tctx             1478 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx, status, "EnumKey failed");
tctx             1482 source4/torture/rpc/winreg.c 		torture_fail(tctx, "EnumKey failed");
tctx             1489 source4/torture/rpc/winreg.c 				     struct torture_context *tctx,
tctx             1499 source4/torture/rpc/winreg.c 	r.in.values = r.out.values = talloc_array(tctx, struct QueryMultipleValue, 1);
tctx             1500 source4/torture/rpc/winreg.c 	r.in.values[0].name = talloc(tctx, struct winreg_String);
tctx             1507 source4/torture/rpc/winreg.c 	r.in.buffer_size = r.out.buffer_size = talloc(tctx, uint32_t);
tctx             1511 source4/torture/rpc/winreg.c 		r.in.buffer = r.out.buffer = talloc_zero_array(tctx, uint8_t,
tctx             1514 source4/torture/rpc/winreg.c 		status = dcerpc_winreg_QueryMultipleValues(p, tctx, &r);
tctx             1517 source4/torture/rpc/winreg.c 			torture_fail(tctx, "QueryMultipleValues failed");
tctx             1523 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx, r.out.result, "QueryMultipleValues failed");
tctx             1529 source4/torture/rpc/winreg.c 			    struct torture_context *tctx,
tctx             1542 source4/torture/rpc/winreg.c 	r.in.value_name = talloc_zero(tctx, struct winreg_String);
tctx             1548 source4/torture/rpc/winreg.c 	status = dcerpc_winreg_QueryValue(p, tctx, &r);
tctx             1550 source4/torture/rpc/winreg.c 		torture_fail(tctx, "QueryValue failed");
tctx             1553 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx, r.out.result, "QueryValue failed");
tctx             1558 source4/torture/rpc/winreg.c static bool test_EnumValue(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1583 source4/torture/rpc/winreg.c 		torture_assert_ntstatus_ok(tctx,
tctx             1584 source4/torture/rpc/winreg.c 					   dcerpc_winreg_EnumValue(p, tctx, &r),
tctx             1588 source4/torture/rpc/winreg.c 			ret &= test_QueryValue(p, tctx, handle,
tctx             1590 source4/torture/rpc/winreg.c 			ret &= test_QueryMultipleValues(p, tctx, handle,
tctx             1597 source4/torture/rpc/winreg.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_NO_MORE_ITEMS,
tctx             1604 source4/torture/rpc/winreg.c 				     struct torture_context *tctx)
tctx             1612 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx,
tctx             1613 source4/torture/rpc/winreg.c 				   dcerpc_winreg_AbortSystemShutdown(p, tctx, &r),
tctx             1616 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx             1622 source4/torture/rpc/winreg.c static bool test_InitiateSystemShutdown(struct torture_context *tctx,
tctx             1630 source4/torture/rpc/winreg.c 	r.in.message = talloc(tctx, struct lsa_StringLarge);
tctx             1636 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx,
tctx             1637 source4/torture/rpc/winreg.c 				   dcerpc_winreg_InitiateSystemShutdown(p, tctx, &r),
tctx             1640 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx             1643 source4/torture/rpc/winreg.c 	return test_AbortSystemShutdown(p, tctx);
tctx             1647 source4/torture/rpc/winreg.c static bool test_InitiateSystemShutdownEx(struct torture_context *tctx,
tctx             1655 source4/torture/rpc/winreg.c 	r.in.message = talloc(tctx, struct lsa_StringLarge);
tctx             1662 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx,
tctx             1663 source4/torture/rpc/winreg.c 		dcerpc_winreg_InitiateSystemShutdownEx(p, tctx, &r),
tctx             1666 source4/torture/rpc/winreg.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx             1669 source4/torture/rpc/winreg.c 	return test_AbortSystemShutdown(p, tctx);
tctx             1673 source4/torture/rpc/winreg.c static bool test_key(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx             1680 source4/torture/rpc/winreg.c 	if (!test_QueryInfoKey(p, tctx, handle, NULL)) {
tctx             1683 source4/torture/rpc/winreg.c 	if (!test_NotifyChangeKeyValue(p, tctx, handle)) {
tctx             1686 source4/torture/rpc/winreg.c 	if (test_security && !test_GetKeySecurity(p, tctx, handle, NULL)) {
tctx             1689 source4/torture/rpc/winreg.c 	if (!test_EnumKey(p, tctx, handle, depth, test_security)) {
tctx             1692 source4/torture/rpc/winreg.c 	if (!test_EnumValue(p, tctx, handle, 0xFF, 0xFFFF)) {
tctx             1695 source4/torture/rpc/winreg.c 	test_CloseKey(p, tctx, handle);
tctx             1702 source4/torture/rpc/winreg.c static bool test_Open_Security(struct torture_context *tctx,
tctx             1717 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx, open_fn(p, tctx, &r),
tctx             1720 source4/torture/rpc/winreg.c 	test_Cleanup(p, tctx, &handle, TEST_KEY_BASE);
tctx             1722 source4/torture/rpc/winreg.c 	if (!test_CreateKey(p, tctx, &handle, TEST_KEY_BASE, NULL)) {
tctx             1723 source4/torture/rpc/winreg.c 		torture_comment(tctx,
tctx             1727 source4/torture/rpc/winreg.c 	if (test_CreateKey_sd(p, tctx, &handle, TEST_KEY2,
tctx             1732 source4/torture/rpc/winreg.c 	if (created2 && !test_CloseKey(p, tctx, &newhandle)) {
tctx             1737 source4/torture/rpc/winreg.c 	if (test_CreateKey_sd(p, tctx, &handle, TEST_KEY4, NULL, &newhandle)) {
tctx             1741 source4/torture/rpc/winreg.c 	if (created4 && !test_CloseKey(p, tctx, &newhandle)) {
tctx             1746 source4/torture/rpc/winreg.c 	if (created4 && !test_SecurityDescriptors(p, tctx, &handle, TEST_KEY4)) {
tctx             1750 source4/torture/rpc/winreg.c 	if (created4 && !test_DeleteKey(p, tctx, &handle, TEST_KEY4)) {
tctx             1755 source4/torture/rpc/winreg.c 	if (created2 && !test_DeleteKey(p, tctx, &handle, TEST_KEY2)) {
tctx             1762 source4/torture/rpc/winreg.c 		if(!test_key(p, tctx, &handle, MAX_DEPTH - 1, true)) {
tctx             1766 source4/torture/rpc/winreg.c 		if (!test_key(p, tctx, &handle, 0, true)) {
tctx             1771 source4/torture/rpc/winreg.c 	test_Cleanup(p, tctx, &handle, TEST_KEY_BASE);
tctx             1776 source4/torture/rpc/winreg.c static bool test_Open(struct torture_context *tctx, struct dcerpc_pipe *p,
tctx             1791 source4/torture/rpc/winreg.c 	torture_assert_ntstatus_ok(tctx, open_fn(p, tctx, &r),
tctx             1794 source4/torture/rpc/winreg.c 	test_Cleanup(p, tctx, &handle, TEST_KEY_BASE);
tctx             1796 source4/torture/rpc/winreg.c 	if (!test_CreateKey(p, tctx, &handle, TEST_KEY_BASE, NULL)) {
tctx             1797 source4/torture/rpc/winreg.c 		torture_comment(tctx,
tctx             1801 source4/torture/rpc/winreg.c 	if (!test_CreateKey(p, tctx, &handle, TEST_KEY1, NULL)) {
tctx             1802 source4/torture/rpc/winreg.c 		torture_comment(tctx,
tctx             1808 source4/torture/rpc/winreg.c 	if (created && !test_FlushKey(p, tctx, &handle)) {
tctx             1809 source4/torture/rpc/winreg.c 		torture_comment(tctx, "FlushKey failed\n");
tctx             1813 source4/torture/rpc/winreg.c 	if (created && !test_OpenKey(p, tctx, &handle, TEST_KEY1, &newhandle))
tctx             1814 source4/torture/rpc/winreg.c 		torture_fail(tctx,
tctx             1817 source4/torture/rpc/winreg.c 	if (created && !test_CloseKey(p, tctx, &newhandle))
tctx             1818 source4/torture/rpc/winreg.c 		torture_fail(tctx,
tctx             1821 source4/torture/rpc/winreg.c 	if (created && !test_DeleteKey(p, tctx, &handle, TEST_KEY1)) {
tctx             1822 source4/torture/rpc/winreg.c 		torture_comment(tctx, "DeleteKey failed\n");
tctx             1828 source4/torture/rpc/winreg.c 	if (created && !test_FlushKey(p, tctx, &handle)) {
tctx             1829 source4/torture/rpc/winreg.c 		torture_comment(tctx, "FlushKey failed\n");
tctx             1834 source4/torture/rpc/winreg.c 	    !_test_OpenKey(p, tctx, &handle, TEST_KEY1,
tctx             1837 source4/torture/rpc/winreg.c 		torture_comment(tctx,
tctx             1843 source4/torture/rpc/winreg.c 	if (!test_GetVersion(p, tctx, &handle)) {
tctx             1844 source4/torture/rpc/winreg.c 		torture_comment(tctx, "GetVersion failed\n");
tctx             1848 source4/torture/rpc/winreg.c 	if (created && test_CreateKey(p, tctx, &handle, TEST_KEY3, NULL)) {
tctx             1853 source4/torture/rpc/winreg.c 	    test_CreateKey(p, tctx, &handle, TEST_SUBKEY, NULL)) {
tctx             1858 source4/torture/rpc/winreg.c 	    !test_DeleteKey(p, tctx, &handle, TEST_KEY3)) {
tctx             1865 source4/torture/rpc/winreg.c 		if(!test_key(p, tctx, &handle, MAX_DEPTH - 1, false)) {
tctx             1869 source4/torture/rpc/winreg.c 		if (!test_key(p, tctx, &handle, 0, false)) {
tctx             1874 source4/torture/rpc/winreg.c 	test_Cleanup(p, tctx, &handle, TEST_KEY_BASE);
tctx               37 source4/torture/rpc/wkssvc.c static bool test_NetWkstaGetInfo(struct torture_context *tctx,
tctx               51 source4/torture/rpc/wkssvc.c 		torture_comment(tctx, "testing NetWkstaGetInfo level %u\n",
tctx               53 source4/torture/rpc/wkssvc.c 		status = dcerpc_wkssvc_NetWkstaGetInfo(p, tctx, &r);
tctx               54 source4/torture/rpc/wkssvc.c 		torture_assert_ntstatus_ok(tctx, status,
tctx               55 source4/torture/rpc/wkssvc.c 			talloc_asprintf(tctx, "NetWkstaGetInfo level %u failed",
tctx               57 source4/torture/rpc/wkssvc.c 		torture_assert_werr_ok(tctx, r.out.result,
tctx               58 source4/torture/rpc/wkssvc.c 			talloc_asprintf(tctx, "NetWkstaGetInfo level %u failed",
tctx               65 source4/torture/rpc/wkssvc.c static bool test_NetWkstaTransportEnum(struct torture_context *tctx,
tctx               90 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetWkstaTransportEnum level 0\n");
tctx               92 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetWkstaTransportEnum(p, tctx, &r);
tctx               93 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx               95 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result, talloc_asprintf(tctx,
tctx              102 source4/torture/rpc/wkssvc.c static bool test_NetrWkstaTransportAdd(struct torture_context *tctx,
tctx              123 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrWkstaTransportAdd level 0\n");
tctx              125 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrWkstaTransportAdd(p, tctx, &r);
tctx              126 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              128 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result,
tctx              135 source4/torture/rpc/wkssvc.c static bool test_NetrWkstaTransportDel(struct torture_context *tctx,
tctx              145 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrWkstaTransportDel\n");
tctx              147 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrWkstaTransportDel(p, tctx, &r);
tctx              148 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              150 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              156 source4/torture/rpc/wkssvc.c static bool test_NetWkstaEnumUsers(struct torture_context *tctx,
tctx              176 source4/torture/rpc/wkssvc.c 			user0 = talloc_zero(tctx,
tctx              181 source4/torture/rpc/wkssvc.c 			user1 = talloc_zero(tctx,
tctx              196 source4/torture/rpc/wkssvc.c 		torture_comment(tctx, "testing NetWkstaEnumUsers level %u\n",
tctx              199 source4/torture/rpc/wkssvc.c 		status = dcerpc_wkssvc_NetWkstaEnumUsers(p, tctx, &r);
tctx              200 source4/torture/rpc/wkssvc.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              202 source4/torture/rpc/wkssvc.c 		torture_assert_werr_ok(tctx, r.out.result,
tctx              209 source4/torture/rpc/wkssvc.c static bool test_NetrWkstaUserGetInfo(struct torture_context *tctx,
tctx              215 source4/torture/rpc/wkssvc.c 	const char *dom = lp_workgroup(tctx->lp_ctx);
tctx              241 source4/torture/rpc/wkssvc.c 		torture_comment(tctx, "testing NetrWkstaUserGetInfo level %u\n",
tctx              244 source4/torture/rpc/wkssvc.c 		status = dcerpc_wkssvc_NetrWkstaUserGetInfo(p, tctx, &r);
tctx              245 source4/torture/rpc/wkssvc.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              247 source4/torture/rpc/wkssvc.c 		torture_assert_werr_equal(tctx, r.out.result,
tctx              255 source4/torture/rpc/wkssvc.c static bool test_NetrUseEnum(struct torture_context *tctx,
tctx              276 source4/torture/rpc/wkssvc.c 			use0 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr0);
tctx              280 source4/torture/rpc/wkssvc.c 			use1 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr1);
tctx              284 source4/torture/rpc/wkssvc.c 			use2 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr2);
tctx              291 source4/torture/rpc/wkssvc.c 		r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              298 source4/torture/rpc/wkssvc.c 		torture_comment(tctx, "testing NetrUseEnum level %u\n",
tctx              301 source4/torture/rpc/wkssvc.c 		status = dcerpc_wkssvc_NetrUseEnum(p, tctx, &r);
tctx              302 source4/torture/rpc/wkssvc.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              304 source4/torture/rpc/wkssvc.c 		torture_assert_werr_ok(tctx, r.out.result,
tctx              311 source4/torture/rpc/wkssvc.c static bool test_NetrUseAdd(struct torture_context *tctx,
tctx              321 source4/torture/rpc/wkssvc.c 	ctr = talloc(tctx, union wkssvc_NetrUseGetInfoCtr);
tctx              330 source4/torture/rpc/wkssvc.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              335 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrUseAdd level %u\n",
tctx              338 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrUseAdd(p, tctx, &r);
tctx              339 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              341 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_UNKNOWN_LEVEL,
tctx              353 source4/torture/rpc/wkssvc.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              358 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrUseAdd level %u\n",
tctx              361 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrUseAdd(p, tctx, &r);
tctx              362 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              364 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              370 source4/torture/rpc/wkssvc.c static bool test_NetrUseDel(struct torture_context *tctx,
tctx              376 source4/torture/rpc/wkssvc.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              380 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrUseDel\n");
tctx              382 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrUseDel(p, tctx, &r);
tctx              383 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              385 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              390 source4/torture/rpc/wkssvc.c static bool test_NetrUseGetInfo_level(struct torture_context *tctx,
tctx              402 source4/torture/rpc/wkssvc.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              406 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrUseGetInfo(p, tctx, &r);
tctx              408 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              410 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result, werr,
tctx              415 source4/torture/rpc/wkssvc.c static bool test_NetrUseGetInfo(struct torture_context *tctx,
tctx              431 source4/torture/rpc/wkssvc.c 	use0 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr0);
tctx              434 source4/torture/rpc/wkssvc.c 	r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              440 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrUseEnum(p, tctx, &r);
tctx              441 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              443 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              452 source4/torture/rpc/wkssvc.c 			if (!test_NetrUseGetInfo_level(tctx, p, use_name,
tctx              466 source4/torture/rpc/wkssvc.c 			if (!test_NetrUseGetInfo_level(tctx, p, use_name,
tctx              480 source4/torture/rpc/wkssvc.c static bool test_NetrLogonDomainNameAdd(struct torture_context *tctx,
tctx              486 source4/torture/rpc/wkssvc.c 	r.in.domain_name = lp_workgroup(tctx->lp_ctx);
tctx              488 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrLogonDomainNameAdd\n");
tctx              490 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrLogonDomainNameAdd(p, tctx, &r);
tctx              491 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              493 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED,
tctx              498 source4/torture/rpc/wkssvc.c static bool test_NetrLogonDomainNameDel(struct torture_context *tctx,
tctx              504 source4/torture/rpc/wkssvc.c 	r.in.domain_name = lp_workgroup(tctx->lp_ctx);
tctx              506 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrLogonDomainNameDel\n");
tctx              508 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrLogonDomainNameDel(p, tctx, &r);
tctx              509 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              511 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED,
tctx              516 source4/torture/rpc/wkssvc.c static bool test_NetrEnumerateComputerNames_level(struct torture_context *tctx,
tctx              527 source4/torture/rpc/wkssvc.c 	ctr = talloc_zero(tctx, struct wkssvc_ComputerNamesCtr);
tctx              534 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrEnumerateComputerNames level %u\n",
tctx              537 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrEnumerateComputerNames(p, tctx, &r);
tctx              538 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              540 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              544 source4/torture/rpc/wkssvc.c 		torture_comment(tctx,
tctx              554 source4/torture/rpc/wkssvc.c 			if (!add_string_to_array(tctx,
tctx              567 source4/torture/rpc/wkssvc.c static bool test_NetrEnumerateComputerNames(struct torture_context *tctx,
tctx              575 source4/torture/rpc/wkssvc.c 		if (!test_NetrEnumerateComputerNames_level(tctx,
tctx              587 source4/torture/rpc/wkssvc.c static bool test_NetrValidateName(struct torture_context *tctx,
tctx              597 source4/torture/rpc/wkssvc.c 		r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              598 source4/torture/rpc/wkssvc.c 		r.in.name = lp_workgroup(tctx->lp_ctx);
tctx              603 source4/torture/rpc/wkssvc.c 		torture_comment(tctx, "testing NetrValidateName level %u\n",
tctx              606 source4/torture/rpc/wkssvc.c 		status = dcerpc_wkssvc_NetrValidateName(p, tctx, &r);
tctx              607 source4/torture/rpc/wkssvc.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              609 source4/torture/rpc/wkssvc.c 		torture_assert_werr_equal(tctx, r.out.result,
tctx              617 source4/torture/rpc/wkssvc.c static bool test_NetrValidateName2(struct torture_context *tctx,
tctx              627 source4/torture/rpc/wkssvc.c 		r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx              628 source4/torture/rpc/wkssvc.c 		r.in.name = lp_workgroup(tctx->lp_ctx);
tctx              633 source4/torture/rpc/wkssvc.c 		torture_comment(tctx, "testing NetrValidateName2 level %u\n",
tctx              636 source4/torture/rpc/wkssvc.c 		status = dcerpc_wkssvc_NetrValidateName2(p, tctx, &r);
tctx              637 source4/torture/rpc/wkssvc.c 		torture_assert_ntstatus_ok(tctx, status,
tctx              639 source4/torture/rpc/wkssvc.c 		torture_assert_werr_equal(tctx, r.out.result,
tctx              647 source4/torture/rpc/wkssvc.c static bool test_NetrAddAlternateComputerName(struct torture_context *tctx,
tctx              662 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrAddAlternateComputerName\n");
tctx              664 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrAddAlternateComputerName(p, tctx, &r);
tctx              665 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              667 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              670 source4/torture/rpc/wkssvc.c 	if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx              683 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "new alternate name not set\n");
tctx              688 source4/torture/rpc/wkssvc.c static bool test_NetrRemoveAlternateComputerName(struct torture_context *tctx,
tctx              703 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrRemoveAlternateComputerName\n");
tctx              705 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrRemoveAlternateComputerName(p, tctx, &r);
tctx              706 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              708 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              711 source4/torture/rpc/wkssvc.c 	if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx              727 source4/torture/rpc/wkssvc.c static bool test_NetrSetPrimaryComputername_name(struct torture_context *tctx,
tctx              740 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrSetPrimaryComputername(p, tctx, &r);
tctx              741 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              743 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              749 source4/torture/rpc/wkssvc.c static bool test_NetrSetPrimaryComputername(struct torture_context *tctx,
tctx              767 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrSetPrimaryComputername\n");
tctx              769 source4/torture/rpc/wkssvc.c 	if (!test_NetrAddAlternateComputerName(tctx, p)) {
tctx              773 source4/torture/rpc/wkssvc.c 	if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx              784 source4/torture/rpc/wkssvc.c 	if (!test_NetrSetPrimaryComputername_name(tctx, p,
tctx              790 source4/torture/rpc/wkssvc.c 	if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx              802 source4/torture/rpc/wkssvc.c 		torture_comment(tctx,
tctx              808 source4/torture/rpc/wkssvc.c 	if (!test_NetrSetPrimaryComputername_name(tctx, p,
tctx              814 source4/torture/rpc/wkssvc.c 	if (!test_NetrRemoveAlternateComputerName(tctx, p)) {
tctx              822 source4/torture/rpc/wkssvc.c static bool test_NetrRenameMachineInDomain(struct torture_context *tctx,
tctx              834 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrRenameMachineInDomain\n");
tctx              836 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrRenameMachineInDomain(p, tctx, &r);
tctx              837 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              839 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED,
tctx              844 source4/torture/rpc/wkssvc.c static bool test_NetrRenameMachineInDomain2_name(struct torture_context *tctx,
tctx              857 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrRenameMachineInDomain2(p, tctx, &r);
tctx              858 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              860 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              865 source4/torture/rpc/wkssvc.c static bool test_NetrRenameMachineInDomain2(struct torture_context *tctx,
tctx              871 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrRenameMachineInDomain2\n");
tctx              873 source4/torture/rpc/wkssvc.c 	if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx              884 source4/torture/rpc/wkssvc.c 	if (!test_NetrRenameMachineInDomain2_name(tctx, p,
tctx              890 source4/torture/rpc/wkssvc.c 	if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx              902 source4/torture/rpc/wkssvc.c 		test_NetrRenameMachineInDomain2_name(tctx, p, names_o[0]);
tctx              907 source4/torture/rpc/wkssvc.c 		test_NetrRenameMachineInDomain2_name(tctx, p, names_o[0]);
tctx              911 source4/torture/rpc/wkssvc.c 	if (!test_NetrRenameMachineInDomain2_name(tctx, p, names_o[0]))
tctx              916 source4/torture/rpc/wkssvc.c 	if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx              934 source4/torture/rpc/wkssvc.c static bool test_NetrWorkstationStatisticsGet(struct torture_context *tctx,
tctx              943 source4/torture/rpc/wkssvc.c 	info = talloc_zero(tctx, struct wkssvc_NetrWorkstationStatistics);
tctx              948 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrWorkstationStatisticsGet\n");
tctx              950 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrWorkstationStatisticsGet(p, tctx, &r);
tctx              951 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              953 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              960 source4/torture/rpc/wkssvc.c static bool test_NetrMessageBufferSend(struct torture_context *tctx,
tctx              969 source4/torture/rpc/wkssvc.c 	push_ucs2_talloc(tctx, (void **)&msg, message, &size);
tctx              977 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrMessageBufferSend\n");
tctx              979 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrMessageBufferSend(p, tctx, &r);
tctx              980 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx              982 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx              987 source4/torture/rpc/wkssvc.c static bool test_NetrGetJoinInformation(struct torture_context *tctx,
tctx              999 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrGetJoinInformation\n");
tctx             1001 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrGetJoinInformation(p, tctx, &r);
tctx             1002 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx             1004 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx             1009 source4/torture/rpc/wkssvc.c static bool test_GetJoinInformation(struct torture_context *tctx,
tctx             1023 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrGetJoinInformation(p, tctx, &r);
tctx             1024 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx             1026 source4/torture/rpc/wkssvc.c 	torture_assert_werr_ok(tctx, r.out.result,
tctx             1034 source4/torture/rpc/wkssvc.c 		*name = talloc_strdup(tctx, name_buffer);
tctx             1041 source4/torture/rpc/wkssvc.c static bool test_NetrGetJoinableOus(struct torture_context *tctx,
tctx             1050 source4/torture/rpc/wkssvc.c 	r.in.domain_name = lp_workgroup(tctx->lp_ctx);
tctx             1056 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrGetJoinableOus\n");
tctx             1058 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrGetJoinableOus(p, tctx, &r);
tctx             1059 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status, "NetrGetJoinableOus failed");
tctx             1060 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result,
tctx             1067 source4/torture/rpc/wkssvc.c static bool test_NetrGetJoinableOus2(struct torture_context *tctx,
tctx             1076 source4/torture/rpc/wkssvc.c 	r.in.domain_name = lp_workgroup(tctx->lp_ctx);
tctx             1082 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrGetJoinableOus2\n");
tctx             1084 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrGetJoinableOus2(p, tctx, &r);
tctx             1085 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status, "NetrGetJoinableOus2 failed");
tctx             1086 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result,
tctx             1093 source4/torture/rpc/wkssvc.c static bool test_NetrUnjoinDomain(struct torture_context *tctx,
tctx             1102 source4/torture/rpc/wkssvc.c 	admin_account = talloc_asprintf(tctx, "%s\\%s",
tctx             1103 source4/torture/rpc/wkssvc.c 					lp_workgroup(tctx->lp_ctx),
tctx             1111 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrUnjoinDomain\n");
tctx             1113 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrUnjoinDomain(p, tctx, &r);
tctx             1114 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx             1116 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED,
tctx             1121 source4/torture/rpc/wkssvc.c static bool test_NetrJoinDomain(struct torture_context *tctx,
tctx             1130 source4/torture/rpc/wkssvc.c 	admin_account = talloc_asprintf(tctx, "%s\\%s",
tctx             1131 source4/torture/rpc/wkssvc.c 					lp_workgroup(tctx->lp_ctx),
tctx             1135 source4/torture/rpc/wkssvc.c 	r.in.domain_name = lp_realm(tctx->lp_ctx);
tctx             1141 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrJoinDomain\n");
tctx             1143 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrJoinDomain(p, tctx, &r);
tctx             1144 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx             1146 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED,
tctx             1197 source4/torture/rpc/wkssvc.c static bool test_NetrJoinDomain2(struct torture_context *tctx,
tctx             1214 source4/torture/rpc/wkssvc.c 	if (!test_GetJoinInformation(tctx, p, &join_status, &join_name))
tctx             1231 source4/torture/rpc/wkssvc.c 	domain_admin_account = torture_setting_string(tctx, "domain_admin_account", NULL);
tctx             1233 source4/torture/rpc/wkssvc.c 	domain_admin_password = torture_setting_string(tctx, "domain_admin_password", NULL);
tctx             1235 source4/torture/rpc/wkssvc.c 	domain_name = torture_setting_string(tctx, "domain_name", NULL);
tctx             1240 source4/torture/rpc/wkssvc.c 		torture_comment(tctx, "not enough input parameter\n");
tctx             1249 source4/torture/rpc/wkssvc.c 	encode_wkssvc_join_password_buffer(tctx, domain_admin_password,
tctx             1260 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrJoinDomain2 (assuming non-DC)\n");
tctx             1262 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrJoinDomain2(p, tctx, &r);
tctx             1263 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx             1265 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result, expected_err,
tctx             1268 source4/torture/rpc/wkssvc.c 	if (!test_GetJoinInformation(tctx, p, &join_status, &join_name))
tctx             1274 source4/torture/rpc/wkssvc.c 		torture_comment(tctx,
tctx             1282 source4/torture/rpc/wkssvc.c static bool test_NetrUnjoinDomain2(struct torture_context *tctx,
tctx             1298 source4/torture/rpc/wkssvc.c 	if (!test_GetJoinInformation(tctx, p, &join_status, &join_name))
tctx             1315 source4/torture/rpc/wkssvc.c 	domain_admin_account = torture_setting_string(tctx, "domain_admin_account", NULL);
tctx             1317 source4/torture/rpc/wkssvc.c 	domain_admin_password = torture_setting_string(tctx, "domain_admin_password", NULL);
tctx             1321 source4/torture/rpc/wkssvc.c 		torture_comment(tctx, "not enough input parameter\n");
tctx             1330 source4/torture/rpc/wkssvc.c 	encode_wkssvc_join_password_buffer(tctx, domain_admin_password,
tctx             1338 source4/torture/rpc/wkssvc.c 	torture_comment(tctx, "testing NetrUnjoinDomain2 (assuming non-DC)\n");
tctx             1340 source4/torture/rpc/wkssvc.c 	status = dcerpc_wkssvc_NetrUnjoinDomain2(p, tctx, &r);
tctx             1341 source4/torture/rpc/wkssvc.c 	torture_assert_ntstatus_ok(tctx, status,
tctx             1343 source4/torture/rpc/wkssvc.c 	torture_assert_werr_equal(tctx, r.out.result, expected_err,
tctx             1346 source4/torture/rpc/wkssvc.c 	if (!test_GetJoinInformation(tctx, p, &join_status, &join_name))
tctx             1358 source4/torture/rpc/wkssvc.c 			torture_comment(tctx,
tctx               67 source4/torture/smb2/connect.c static NTSTATUS torture_smb2_write(struct torture_context *tctx, struct smb2_tree *tree, struct smb2_handle handle)
tctx               76 source4/torture/smb2/connect.c 	if (torture_setting_bool(tctx, "dangerous", false)) {
tctx               78 source4/torture/smb2/connect.c 	} else if (torture_setting_bool(tctx, "samba4", false)) {
tctx               80 source4/torture/smb2/getinfo.c static bool torture_smb2_fileinfo(struct torture_context *tctx, struct smb2_tree *tree)
tctx               34 source4/torture/smb2/maxwrite.c static NTSTATUS torture_smb2_write(struct torture_context *tctx,
tctx               46 source4/torture/smb2/maxwrite.c 		TALLOC_CTX *tmp_ctx = talloc_new(tctx);
tctx               31 source4/torture/smb2/oplocks.c 		torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got 0x%x - should be 0x%x\n", \
tctx               38 source4/torture/smb2/oplocks.c 		torture_result(tctx, TORTURE_FAIL, __location__": Incorrect status %s - should be %s", \
tctx              106 source4/torture/smb2/oplocks.c bool torture_smb2_oplock_batch1(struct torture_context *tctx,
tctx              109 source4/torture/smb2/oplocks.c 	TALLOC_CTX *mem_ctx = talloc_new(tctx);
tctx               31 source4/torture/smb2/persistent_handles.c 		torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got 0x%x - should be 0x%x\n", \
tctx               38 source4/torture/smb2/persistent_handles.c 		torture_result(tctx, TORTURE_FAIL, __location__": Incorrect status %s - should be %s", \
tctx               48 source4/torture/smb2/persistent_handles.c bool torture_smb2_persistent_handles1(struct torture_context *tctx,
tctx               52 source4/torture/smb2/persistent_handles.c 	TALLOC_CTX *mem_ctx = talloc_new(tctx);
tctx              113 source4/torture/smb2/persistent_handles.c 	torture_comment(tctx, "position: %llu\n",
tctx              130 source4/torture/smb2/persistent_handles.c 	torture_comment(tctx, "position: %llu\n",
tctx              145 source4/torture/smb2/persistent_handles.c 	b = data_blob_talloc(tctx, NULL, 16);
tctx              173 source4/torture/smb2/persistent_handles.c 	torture_comment(tctx, "position: %llu\n",
tctx              267 source4/torture/smb2/util.c bool torture_smb2_connection(struct torture_context *tctx, struct smb2_tree **tree)
tctx              270 source4/torture/smb2/util.c 	const char *host = torture_setting_string(tctx, "host", NULL);
tctx              271 source4/torture/smb2/util.c 	const char *share = torture_setting_string(tctx, "share", NULL);
tctx              275 source4/torture/smb2/util.c 	lp_smbcli_options(tctx->lp_ctx, &options);
tctx              277 source4/torture/smb2/util.c 	status = smb2_connect(tctx, host, 
tctx              278 source4/torture/smb2/util.c 						  lp_smb_ports(tctx->lp_ctx),
tctx              280 source4/torture/smb2/util.c 			      lp_resolve_context(tctx->lp_ctx),
tctx              282 source4/torture/smb2/util.c 			      tctx->ev, &options,
tctx              283 source4/torture/smb2/util.c 				  lp_socket_options(tctx->lp_ctx),
tctx              284 source4/torture/smb2/util.c 				  lp_gensec_settings(tctx, tctx->lp_ctx)
tctx              208 source4/torture/smbiconv.c 	cd = smb_iconv_open_ex(tctx, to, from, lp_parm_bool(tctx->lp_ctx, NULL, "iconv", "native", true));
tctx              404 source4/torture/smbtorture.c static void run_shell(struct torture_context *tctx)
tctx              430 source4/torture/smbtorture.c 				lp_set_cmdline(tctx->lp_ctx, name, argv[2]);
tctx              443 source4/torture/smbtorture.c 				run_test(tctx, argv[1]);
tctx               51 source4/torture/unix/unix_info2.c static struct smbcli_state *connect_to_server(struct torture_context *tctx)
tctx               56 source4/torture/unix/unix_info2.c 	const char *host = torture_setting_string(tctx, "host", NULL);
tctx               57 source4/torture/unix/unix_info2.c 	const char *share = torture_setting_string(tctx, "share", NULL);
tctx               61 source4/torture/unix/unix_info2.c 	lp_smbcli_options(tctx->lp_ctx, &options);
tctx               62 source4/torture/unix/unix_info2.c 	lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx               64 source4/torture/unix/unix_info2.c 	status = smbcli_full_connection(tctx, &cli, host, 
tctx               65 source4/torture/unix/unix_info2.c 					lp_smb_ports(tctx->lp_ctx),
tctx               66 source4/torture/unix/unix_info2.c 					share, NULL, lp_socket_options(tctx->lp_ctx),
tctx               68 source4/torture/unix/unix_info2.c 					lp_resolve_context(tctx->lp_ctx),
tctx               69 source4/torture/unix/unix_info2.c 					tctx->ev, &options, &session_options,
tctx               70 source4/torture/unix/unix_info2.c 					lp_iconv_convenience(tctx->lp_ctx),
tctx               71 source4/torture/unix/unix_info2.c 					lp_gensec_settings(tctx, tctx->lp_ctx));
tctx               71 source4/torture/unix/whoami.c static struct smbcli_state *connect_to_server(struct torture_context *tctx,
tctx               77 source4/torture/unix/whoami.c 	const char *host = torture_setting_string(tctx, "host", NULL);
tctx               78 source4/torture/unix/whoami.c 	const char *share = torture_setting_string(tctx, "share", NULL);
tctx               82 source4/torture/unix/whoami.c 	lp_smbcli_options(tctx->lp_ctx, &options);
tctx               83 source4/torture/unix/whoami.c 	lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx               85 source4/torture/unix/whoami.c 	status = smbcli_full_connection(tctx, &cli, host, 
tctx               86 source4/torture/unix/whoami.c 					lp_smb_ports(tctx->lp_ctx),
tctx               87 source4/torture/unix/whoami.c 					share, NULL, lp_socket_options(tctx->lp_ctx),
tctx               88 source4/torture/unix/whoami.c 					creds, lp_resolve_context(tctx->lp_ctx),
tctx               89 source4/torture/unix/whoami.c 					tctx->ev, &options, &session_options,
tctx               90 source4/torture/unix/whoami.c 					lp_iconv_convenience(tctx->lp_ctx),
tctx               91 source4/torture/unix/whoami.c 					lp_gensec_settings(tctx, tctx->lp_ctx));
tctx               56 source4/torture/util.h 				   struct torture_context *tctx,
tctx               62 source4/torture/util.h 				     struct torture_context *tctx,
tctx               66 source4/torture/util.h 					 struct torture_context *tctx,
tctx               68 source4/torture/util.h _PUBLIC_ bool torture_open_connection(struct smbcli_state **c, struct torture_context *tctx, int conn_index);
tctx               72 source4/torture/util.h double torture_create_procs(struct torture_context *tctx, 
tctx              470 source4/torture/util_smb.c 				   struct torture_context *tctx,
tctx              480 source4/torture/util_smb.c 	lp_smbcli_options(tctx->lp_ctx, &options);
tctx              481 source4/torture/util_smb.c 	lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx              483 source4/torture/util_smb.c 	options.use_oplocks = torture_setting_bool(tctx, "use_oplocks", true);
tctx              484 source4/torture/util_smb.c 	options.use_level2_oplocks = torture_setting_bool(tctx, "use_level2_oplocks", true);
tctx              487 source4/torture/util_smb.c 					lp_smb_ports(tctx->lp_ctx),
tctx              489 source4/torture/util_smb.c 					lp_socket_options(tctx->lp_ctx),
tctx              491 source4/torture/util_smb.c 					lp_resolve_context(tctx->lp_ctx),
tctx              493 source4/torture/util_smb.c 					lp_iconv_convenience(tctx->lp_ctx),
tctx              494 source4/torture/util_smb.c 					lp_gensec_settings(tctx, tctx->lp_ctx));
tctx              505 source4/torture/util_smb.c 				     struct torture_context *tctx,
tctx              512 source4/torture/util_smb.c 	(*host) = talloc_strdup(mem_ctx, torture_setting_string(tctx, "host", NULL));
tctx              513 source4/torture/util_smb.c 	(*share) = talloc_strdup(mem_ctx, torture_setting_string(tctx, "share", NULL));
tctx              515 source4/torture/util_smb.c 	p = torture_setting_string(tctx, "unclist", NULL);
tctx              541 source4/torture/util_smb.c 					 struct torture_context *tctx,
tctx              547 source4/torture/util_smb.c 	if (!torture_get_conn_index(conn_index, ev, tctx, &host, &share)) {
tctx              551 source4/torture/util_smb.c 	ret = torture_open_connection_share(NULL, c, tctx, host, share, ev);
tctx              558 source4/torture/util_smb.c _PUBLIC_ bool torture_open_connection(struct smbcli_state **c, struct torture_context *tctx, int conn_index)
tctx              560 source4/torture/util_smb.c 	return torture_open_connection_ev(c, conn_index, tctx, tctx->ev);
tctx              614 source4/torture/util_smb.c double torture_create_procs(struct torture_context *tctx, 
tctx              622 source4/torture/util_smb.c 	int torture_nprocs = torture_setting_int(tctx, "nprocs", 4);
tctx              663 source4/torture/util_smb.c 			lp_set_cmdline(tctx->lp_ctx, "netbios name", myname);
tctx              668 source4/torture/util_smb.c 				if (torture_open_connection(&current_cli, tctx, i)) {
tctx              688 source4/torture/util_smb.c 			child_status_out[i] = fn(tctx, current_cli, i);