tctx 39 lib/crypto/hmacmd5.c struct MD5Context tctx;
tctx 41 lib/crypto/hmacmd5.c MD5Init(&tctx);
tctx 42 lib/crypto/hmacmd5.c MD5Update(&tctx, key, key_len);
tctx 43 lib/crypto/hmacmd5.c MD5Final(tk, &tctx);
tctx 44 lib/crypto/hmacmd5test.c TALLOC_CTX *tctx = talloc_new(torture);
tctx 45 lib/crypto/hmacmd5test.c if (!tctx) { return false; };
tctx 49 lib/crypto/hmacmd5test.c testarray[0].md5 = strhex_to_data_blob(tctx, "9294727a3638bb1c13f48ef8158bfc9d");
tctx 53 lib/crypto/hmacmd5test.c testarray[1].md5 = strhex_to_data_blob(tctx, "750c783e6ab0b503eaa86e310a5db738");
tctx 57 lib/crypto/hmacmd5test.c testarray[2].md5 = strhex_to_data_blob(tctx, "56be34521d144c88dbb8c733f0e8b3f6");
tctx 59 lib/crypto/hmacmd5test.c testarray[3].key = strhex_to_data_blob(tctx, "0102030405060708090a0b0c0d0e0f10111213141516171819");
tctx 61 lib/crypto/hmacmd5test.c testarray[3].md5 = strhex_to_data_blob(tctx, "697eaf0aca3a3aea3a75164746ffaa79");
tctx 65 lib/crypto/hmacmd5test.c testarray[4].md5 = strhex_to_data_blob(tctx, "56461ef2342edc00f9bab995690efd4c");
tctx 69 lib/crypto/hmacmd5test.c testarray[5].md5 = strhex_to_data_blob(tctx, "6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd");
tctx 74 lib/crypto/hmacmd5test.c testarray[6].md5 = strhex_to_data_blob(tctx, "6f630fad67cda0ee1fb1f562db3aa53e");
tctx 99 lib/crypto/hmacmd5test.c talloc_free(tctx);
tctx 43 lib/crypto/hmacsha256.c SHA256_CTX tctx;
tctx 45 lib/crypto/hmacsha256.c SHA256_Init(&tctx);
tctx 46 lib/crypto/hmacsha256.c SHA256_Update(&tctx, key, key_len);
tctx 47 lib/crypto/hmacsha256.c SHA256_Final(tk, &tctx);
tctx 48 lib/socket_wrapper/testsuite.c static bool test_socket_wrapper_dir(struct torture_context *tctx)
tctx 53 lib/socket_wrapper/testsuite.c torture_assert_str_equal(tctx, socket_wrapper_dir(), "foo", "setting failed");
tctx 55 lib/socket_wrapper/testsuite.c torture_assert_str_equal(tctx, socket_wrapper_dir(), "foo", "setting failed");
tctx 57 lib/socket_wrapper/testsuite.c torture_assert_str_equal(tctx, socket_wrapper_dir(), NULL, "resetting failed");
tctx 64 lib/socket_wrapper/testsuite.c static bool test_swrap_socket(struct torture_context *tctx)
tctx 69 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, swrap_socket(1337, 1337, 0), -1, "unknown address family fails");
tctx 70 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, errno, EAFNOSUPPORT, "correct errno set");
tctx 71 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, swrap_socket(AF_INET, 1337, 0), -1, "unknown type fails");
tctx 72 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, errno, EPROTONOSUPPORT, "correct errno set");
tctx 73 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, swrap_socket(AF_INET, SOCK_DGRAM, 10), -1, "unknown protocol fails");
tctx 74 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, errno, EPROTONOSUPPORT, "correct errno set");
tctx 82 lib/socket_wrapper/testsuite.c static bool test_socket_wrapper_default_iface(struct torture_context *tctx)
tctx 86 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, socket_wrapper_default_iface(), 1, "unset");
tctx 88 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, socket_wrapper_default_iface(), 2, "unset");
tctx 90 lib/socket_wrapper/testsuite.c torture_assert_int_equal(tctx, socket_wrapper_default_iface(), 1, "unset");
tctx 1107 lib/talloc/testsuite.c bool torture_local_talloc(struct torture_context *tctx)
tctx 29 lib/talloc/testsuite_main.c bool torture_local_talloc(struct torture_context *tctx);
tctx 80 lib/torture/torture.c _PUBLIC_ NTSTATUS torture_temp_dir(struct torture_context *tctx,
tctx 84 lib/torture/torture.c SMB_ASSERT(tctx->outputdir != NULL);
tctx 86 lib/torture/torture.c *tempdir = talloc_asprintf(tctx, "%s/%s.XXXXXX", tctx->outputdir,
tctx 417 lib/torture/torture.h NTSTATUS torture_temp_dir(struct torture_context *tctx,
tctx 434 lib/torture/torture.h struct torture_context *torture_context_child(struct torture_context *tctx);
tctx 24 lib/util/charset/tests/charset.c static bool test_toupper_m(struct torture_context *tctx)
tctx 26 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, toupper_m('c'), 'C', "c");
tctx 27 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, toupper_m('Z'), 'Z', "z");
tctx 28 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, toupper_m(0xFFFF4565), 0xFFFF4565, "0xFFFF4565");
tctx 32 lib/util/charset/tests/charset.c static bool test_tolower_m(struct torture_context *tctx)
tctx 34 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, tolower_m('C'), 'c', "c");
tctx 35 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, tolower_m('z'), 'z', "z");
tctx 36 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, tolower_m(0xFFFF4565), 0xFFFF4565, "0xFFFF4565");
tctx 40 lib/util/charset/tests/charset.c static bool test_codepoint_cmpi(struct torture_context *tctx)
tctx 42 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, codepoint_cmpi('a', 'a'), 0, "same char");
tctx 43 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, codepoint_cmpi('A', 'a'), 0, "upcase version");
tctx 44 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, codepoint_cmpi('b', 'a'), 1, "right diff");
tctx 45 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, codepoint_cmpi('a', 'b'), -1, "right diff");
tctx 49 lib/util/charset/tests/charset.c static bool test_strcasecmp_m(struct torture_context *tctx)
tctx 51 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m("foo", "bar") != 0, "different strings");
tctx 52 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m("foo", "foo") == 0, "same case strings");
tctx 53 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m("foo", "Foo") == 0, "different case strings");
tctx 54 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m(NULL, "Foo") != 0, "one NULL");
tctx 55 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m("foo", NULL) != 0, "other NULL");
tctx 56 lib/util/charset/tests/charset.c torture_assert(tctx, strcasecmp_m(NULL, NULL) == 0, "both NULL");
tctx 61 lib/util/charset/tests/charset.c static bool test_strequal_m(struct torture_context *tctx)
tctx 63 lib/util/charset/tests/charset.c torture_assert(tctx, !strequal_m("foo", "bar"), "different strings");
tctx 64 lib/util/charset/tests/charset.c torture_assert(tctx, strequal_m("foo", "foo"), "same case strings");
tctx 65 lib/util/charset/tests/charset.c torture_assert(tctx, strequal_m("foo", "Foo"), "different case strings");
tctx 66 lib/util/charset/tests/charset.c torture_assert(tctx, !strequal_m(NULL, "Foo"), "one NULL");
tctx 67 lib/util/charset/tests/charset.c torture_assert(tctx, !strequal_m("foo", NULL), "other NULL");
tctx 68 lib/util/charset/tests/charset.c torture_assert(tctx, strequal_m(NULL, NULL), "both NULL");
tctx 72 lib/util/charset/tests/charset.c static bool test_strcsequal_m(struct torture_context *tctx)
tctx 74 lib/util/charset/tests/charset.c torture_assert(tctx, !strcsequal_m("foo", "bar"), "different strings");
tctx 75 lib/util/charset/tests/charset.c torture_assert(tctx, strcsequal_m("foo", "foo"), "same case strings");
tctx 76 lib/util/charset/tests/charset.c torture_assert(tctx, !strcsequal_m("foo", "Foo"), "different case strings");
tctx 77 lib/util/charset/tests/charset.c torture_assert(tctx, !strcsequal_m(NULL, "Foo"), "one NULL");
tctx 78 lib/util/charset/tests/charset.c torture_assert(tctx, !strcsequal_m("foo", NULL), "other NULL");
tctx 79 lib/util/charset/tests/charset.c torture_assert(tctx, strcsequal_m(NULL, NULL), "both NULL");
tctx 83 lib/util/charset/tests/charset.c static bool test_string_replace_m(struct torture_context *tctx)
tctx 87 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, data, "cla", "first char replaced");
tctx 90 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, data, "cac", "other chars replaced");
tctx 93 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, data, "cca", "other chars replaced");
tctx 96 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, data, "blala", "no chars replaced");
tctx 101 lib/util/charset/tests/charset.c static bool test_strncasecmp_m(struct torture_context *tctx)
tctx 103 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("foo", "bar", 3) != 0, "different strings");
tctx 104 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("foo", "foo", 3) == 0, "same case strings");
tctx 105 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("foo", "Foo", 3) == 0, "different case strings");
tctx 106 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("fool", "Foo", 3) == 0, "different case strings");
tctx 107 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("fool", "Fool", 40) == 0, "over size");
tctx 108 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("BLA", "Fool", 0) == 0, "empty");
tctx 109 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m(NULL, "Foo", 3) != 0, "one NULL");
tctx 110 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m("foo", NULL, 3) != 0, "other NULL");
tctx 111 lib/util/charset/tests/charset.c torture_assert(tctx, strncasecmp_m(NULL, NULL, 3) == 0, "both NULL");
tctx 115 lib/util/charset/tests/charset.c static bool test_next_token_null(struct torture_context *tctx)
tctx 118 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(NULL, buf, " ", 20), "null ptr works");
tctx 122 lib/util/charset/tests/charset.c static bool test_next_token(struct torture_context *tctx)
tctx 126 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx 127 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "foo", "token matches");
tctx 128 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "bar bla", "ptr modified correctly");
tctx 130 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx 131 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "bar", "token matches");
tctx 132 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "bla", "ptr modified correctly");
tctx 134 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx 135 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "bla", "token matches");
tctx 136 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly");
tctx 138 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(&teststr, buf, " ", 20), "finding token doesn't work");
tctx 142 lib/util/charset/tests/charset.c static bool test_next_token_implicit_sep(struct torture_context *tctx)
tctx 146 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, NULL, 20), "finding token works");
tctx 147 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "foo", "token matches");
tctx 148 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "bar\n bla", "ptr modified correctly");
tctx 150 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, NULL, 20), "finding token works");
tctx 151 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "bar", "token matches");
tctx 152 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, " bla", "ptr modified correctly");
tctx 154 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, NULL, 20), "finding token works");
tctx 155 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "bla", "token matches");
tctx 156 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly");
tctx 158 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(&teststr, buf, NULL, 20), "finding token doesn't work");
tctx 162 lib/util/charset/tests/charset.c static bool test_next_token_seps(struct torture_context *tctx)
tctx 166 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, ",", 20), "finding token works");
tctx 167 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "foo bla", "token matches");
tctx 168 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly");
tctx 170 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(&teststr, buf, ",", 20), "finding token doesn't work");
tctx 174 lib/util/charset/tests/charset.c static bool test_next_token_quotes(struct torture_context *tctx)
tctx 178 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx 179 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "foo bar", "token matches");
tctx 180 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "bla", "ptr modified correctly");
tctx 182 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx 183 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "bla", "token matches");
tctx 184 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly");
tctx 186 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(&teststr, buf, " ", 20), "finding token doesn't work");
tctx 190 lib/util/charset/tests/charset.c static bool test_next_token_quote_wrong(struct torture_context *tctx)
tctx 194 lib/util/charset/tests/charset.c torture_assert(tctx, next_token(&teststr, buf, " ", 20), "finding token works");
tctx 195 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, buf, "foo bar bla", "token matches");
tctx 196 lib/util/charset/tests/charset.c torture_assert_str_equal(tctx, teststr, "", "ptr modified correctly");
tctx 198 lib/util/charset/tests/charset.c torture_assert(tctx, !next_token(&teststr, buf, " ", 20), "finding token doesn't work");
tctx 202 lib/util/charset/tests/charset.c static bool test_strlen_m(struct torture_context *tctx)
tctx 204 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m("foo"), 3, "simple len");
tctx 205 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m("foo\x83l"), 6, "extended len");
tctx 206 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m(NULL), 0, "NULL");
tctx 210 lib/util/charset/tests/charset.c static bool test_strlen_m_term(struct torture_context *tctx)
tctx 212 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m_term("foo"), 4, "simple len");
tctx 213 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m_term("foo\x83l"), 7, "extended len");
tctx 214 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, strlen_m(NULL), 0, "NULL");
tctx 218 lib/util/charset/tests/charset.c static bool test_strhaslower(struct torture_context *tctx)
tctx 220 lib/util/charset/tests/charset.c torture_assert(tctx, strhaslower("a"), "one low char");
tctx 221 lib/util/charset/tests/charset.c torture_assert(tctx, strhaslower("aB"), "one low, one up char");
tctx 222 lib/util/charset/tests/charset.c torture_assert(tctx, !strhaslower("B"), "one up char");
tctx 223 lib/util/charset/tests/charset.c torture_assert(tctx, !strhaslower(""), "empty string");
tctx 224 lib/util/charset/tests/charset.c torture_assert(tctx, !strhaslower("3"), "one digit");
tctx 228 lib/util/charset/tests/charset.c static bool test_strhasupper(struct torture_context *tctx)
tctx 230 lib/util/charset/tests/charset.c torture_assert(tctx, strhasupper("B"), "one up char");
tctx 231 lib/util/charset/tests/charset.c torture_assert(tctx, strhasupper("aB"), "one low, one up char");
tctx 232 lib/util/charset/tests/charset.c torture_assert(tctx, !strhasupper("a"), "one low char");
tctx 233 lib/util/charset/tests/charset.c torture_assert(tctx, !strhasupper(""), "empty string");
tctx 234 lib/util/charset/tests/charset.c torture_assert(tctx, !strhasupper("3"), "one digit");
tctx 238 lib/util/charset/tests/charset.c static bool test_count_chars_m(struct torture_context *tctx)
tctx 240 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, count_chars_m("foo", 'o'), 2, "simple");
tctx 241 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, count_chars_m("", 'o'), 0, "empty");
tctx 242 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, count_chars_m("bla", 'o'), 0, "none");
tctx 243 lib/util/charset/tests/charset.c torture_assert_int_equal(tctx, count_chars_m("bla", '\0'), 0, "null");
tctx 33 lib/util/charset/tests/iconv.c static bool iconv_untestable(struct torture_context *tctx)
tctx 37 lib/util/charset/tests/iconv.c if (!lp_parm_bool(tctx->lp_ctx, NULL, "iconv", "native", true))
tctx 38 lib/util/charset/tests/iconv.c torture_skip(tctx, "system iconv disabled - skipping test");
tctx 42 lib/util/charset/tests/iconv.c torture_skip(tctx, "unable to test - system iconv library does not support UTF-16LE -> UCS-4LE");
tctx 47 lib/util/charset/tests/iconv.c torture_skip(tctx, "unable to test - system iconv library does not support UTF-16LE -> CP850\n");
tctx 285 lib/util/charset/tests/iconv.c static bool test_codepoint(struct torture_context *tctx, unsigned int codepoint)
tctx 291 lib/util/charset/tests/iconv.c size = push_codepoint(lp_iconv_convenience(tctx->lp_ctx), (char *)buf, codepoint);
tctx 292 lib/util/charset/tests/iconv.c torture_assert(tctx, size != -1 || (codepoint >= 0xd800 && codepoint <= 0x10000),
tctx 302 lib/util/charset/tests/iconv.c c = next_codepoint_convenience(lp_iconv_convenience(tctx->lp_ctx), (char *)buf, &size2);
tctx 304 lib/util/charset/tests/iconv.c torture_assert(tctx, c == codepoint,
tctx 305 lib/util/charset/tests/iconv.c talloc_asprintf(tctx,
tctx 308 lib/util/charset/tests/iconv.c torture_assert(tctx, size2 == size,
tctx 309 lib/util/charset/tests/iconv.c talloc_asprintf(tctx, "next_codepoint(%u) gave wrong size %d (should be %d)\n",
tctx 315 lib/util/charset/tests/iconv.c static bool test_next_codepoint(struct torture_context *tctx)
tctx 318 lib/util/charset/tests/iconv.c if (iconv_untestable(tctx))
tctx 322 lib/util/charset/tests/iconv.c if (!test_codepoint(tctx, codepoint))
tctx 328 lib/util/charset/tests/iconv.c static bool test_first_1m(struct torture_context *tctx)
tctx 334 lib/util/charset/tests/iconv.c if (iconv_untestable(tctx))
tctx 343 lib/util/charset/tests/iconv.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 344 lib/util/charset/tests/iconv.c torture_comment(tctx, "codepoint=%u \r", codepoint);
tctx 349 lib/util/charset/tests/iconv.c if (!test_buffer(tctx, inbuf, size, "UTF-8"))
tctx 355 lib/util/charset/tests/iconv.c static bool test_random_5m(struct torture_context *tctx)
tctx 360 lib/util/charset/tests/iconv.c if (iconv_untestable(tctx))
tctx 368 lib/util/charset/tests/iconv.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 369 lib/util/charset/tests/iconv.c torture_comment(tctx, "i=%u \r", i);
tctx 388 lib/util/charset/tests/iconv.c if (!test_buffer(tctx, inbuf, size, "UTF-8")) {
tctx 393 lib/util/charset/tests/iconv.c if (!test_buffer(tctx, inbuf, size, "CP850")) {
tctx 402 lib/util/charset/tests/iconv.c static bool test_string2key(struct torture_context *tctx)
tctx 406 lib/util/charset/tests/iconv.c TALLOC_CTX *mem_ctx = talloc_new(tctx);
tctx 419 lib/util/charset/tests/iconv.c torture_comment(tctx, "converting random buffer\n");
tctx 422 lib/util/charset/tests/iconv.c torture_fail(tctx, "Failed to convert random buffer\n");
tctx 429 lib/util/charset/tests/iconv.c torture_comment(tctx, "converting fixed buffer to UTF16\n");
tctx 432 lib/util/charset/tests/iconv.c torture_fail(tctx, "Failed to convert fixed buffer to UTF16_MUNGED\n");
tctx 435 lib/util/charset/tests/iconv.c torture_assert(tctx, ret == 20, "conversion should give 20 bytes\n");
tctx 437 lib/util/charset/tests/iconv.c torture_comment(tctx, "converting fixed buffer to UTF8\n");
tctx 440 lib/util/charset/tests/iconv.c torture_fail(tctx, "Failed to convert fixed buffer to UTF8\n");
tctx 443 lib/util/charset/tests/iconv.c torture_assert(tctx, strcmp(correct, out1) == 0, "conversion gave incorrect result\n");
tctx 25 lib/util/tests/data_blob.c static bool test_string(struct torture_context *tctx)
tctx 29 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, blob.length, 3, "blob length");
tctx 30 lib/util/tests/data_blob.c torture_assert_str_equal(tctx, (char *)blob.data, "bla", "blob data");
tctx 35 lib/util/tests/data_blob.c static bool test_string_null(struct torture_context *tctx)
tctx 39 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, blob.length, 4, "blob length");
tctx 40 lib/util/tests/data_blob.c torture_assert_str_equal(tctx, (char *)blob.data, "bla", "blob data");
tctx 45 lib/util/tests/data_blob.c static bool test_zero(struct torture_context *tctx)
tctx 48 lib/util/tests/data_blob.c DATA_BLOB z = data_blob_talloc_zero(tctx, 4);
tctx 49 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, z.length, 4, "length");
tctx 51 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, z.data[i], 0, "contents");
tctx 57 lib/util/tests/data_blob.c static bool test_clear(struct torture_context *tctx)
tctx 61 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, z.length, 6, "length");
tctx 64 lib/util/tests/data_blob.c torture_assert_int_equal(tctx, z.data[i], 0, "contents");
tctx 69 lib/util/tests/data_blob.c static bool test_cmp(struct torture_context *tctx)
tctx 73 lib/util/tests/data_blob.c torture_assert(tctx, data_blob_cmp(&a, &b) != 0, "cmp different");
tctx 74 lib/util/tests/data_blob.c torture_assert(tctx, data_blob_cmp(&a, &a) == 0, "cmp self");
tctx 78 lib/util/tests/data_blob.c static bool test_hex_string(struct torture_context *tctx)
tctx 81 lib/util/tests/data_blob.c torture_assert_str_equal(tctx, data_blob_hex_string(tctx, &a), "0C0A0F0E", "hex string");
tctx 33 lib/util/tests/file.c static bool test_file_load_save(struct torture_context *tctx)
tctx 37 lib/util/tests/file.c TALLOC_CTX *mem_ctx = tctx;
tctx 39 lib/util/tests/file.c torture_assert(tctx, file_save(TEST_FILENAME, TEST_DATA, strlen(TEST_DATA)),
tctx 42 lib/util/tests/file.c torture_assert_file_contains_text(tctx, TEST_FILENAME, TEST_DATA,
tctx 46 lib/util/tests/file.c torture_assert(tctx, data, "loading file");
tctx 48 lib/util/tests/file.c torture_assert_int_equal(tctx, len, strlen(TEST_DATA), "Length");
tctx 50 lib/util/tests/file.c torture_assert_mem_equal(tctx, data, TEST_DATA, len, "Contents");
tctx 54 lib/util/tests/file.c torture_assert_int_equal(tctx, len, 5, "Length");
tctx 56 lib/util/tests/file.c torture_assert_mem_equal(tctx, data, TEST_DATA, len, "Contents");
tctx 63 lib/util/tests/file.c static bool test_afdgets(struct torture_context *tctx)
tctx 67 lib/util/tests/file.c TALLOC_CTX *mem_ctx = tctx;
tctx 69 lib/util/tests/file.c torture_assert(tctx, file_save(TEST_FILENAME, (const void *)TEST_DATA,
tctx 75 lib/util/tests/file.c torture_assert(tctx, fd != -1, "opening file");
tctx 78 lib/util/tests/file.c torture_assert(tctx, strcmp(line, TEST_LINE1) == 0, "line 1 mismatch");
tctx 81 lib/util/tests/file.c torture_assert(tctx, strcmp(line, TEST_LINE2) == 0, "line 2 mismatch");
tctx 84 lib/util/tests/file.c torture_assert(tctx, strcmp(line, TEST_LINE3) == 0, "line 3 mismatch");
tctx 30 lib/util/tests/genrand.c static bool test_reseed_callback(struct torture_context *tctx)
tctx 36 lib/util/tests/genrand.c static bool test_check_password_quality(struct torture_context *tctx)
tctx 38 lib/util/tests/genrand.c torture_assert(tctx, !check_password_quality(""), "empty password");
tctx 39 lib/util/tests/genrand.c torture_assert(tctx, !check_password_quality("a"), "one char password");
tctx 40 lib/util/tests/genrand.c torture_assert(tctx, !check_password_quality("aaaaaaaaaaaa"), "same char password");
tctx 41 lib/util/tests/genrand.c torture_assert(tctx, !check_password_quality("BLA"), "multiple upcases password");
tctx 42 lib/util/tests/genrand.c torture_assert(tctx, !check_password_quality("123"), "digits only");
tctx 43 lib/util/tests/genrand.c torture_assert(tctx, check_password_quality("A2e"), "valid");
tctx 44 lib/util/tests/genrand.c torture_assert(tctx, check_password_quality("BA2eLi443"), "valid");
tctx 48 lib/util/tests/genrand.c static bool test_generate_random_str(struct torture_context *tctx)
tctx 52 lib/util/tests/genrand.c torture_assert_int_equal(tctx, strlen(r), 10, "right length generated");
tctx 54 lib/util/tests/genrand.c torture_assert_int_equal(tctx, strlen(r), 5, "right length generated");
tctx 25 lib/util/tests/idtree.c static bool torture_local_idtree_simple(struct torture_context *tctx)
tctx 33 lib/util/tests/idtree.c TALLOC_CTX *mem_ctx = tctx;
tctx 49 lib/util/tests/idtree.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 55 lib/util/tests/idtree.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 64 lib/util/tests/idtree.c torture_fail(tctx,
tctx 65 lib/util/tests/idtree.c talloc_asprintf(tctx,
tctx 73 lib/util/tests/idtree.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 83 lib/util/tests/idtree.c torture_comment(tctx, "done %d random ops\n", i);
tctx 88 lib/util/tests/idtree.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 98 lib/util/tests/idtree.c torture_assert(tctx, ret != -1, "idr_get_new_above failed");
tctx 102 lib/util/tests/idtree.c torture_assert_int_equal(tctx, ret, 0x10000-2, "idr_get_new_above failed");
tctx 104 lib/util/tests/idtree.c torture_assert_int_equal(tctx, ret, 0x10000-1, "idr_get_new_above failed");
tctx 106 lib/util/tests/idtree.c torture_assert_int_equal(tctx, ret, 0x10000, "idr_get_new_above failed");
tctx 108 lib/util/tests/idtree.c torture_assert_int_equal(tctx, ret, -1, "idr_get_new_above succeeded above limit");
tctx 110 lib/util/tests/idtree.c torture_assert_int_equal(tctx, ret, -1, "idr_get_new_above succeeded above limit");
tctx 112 lib/util/tests/idtree.c torture_comment(tctx, "cleaned up\n");
tctx 25 lib/util/tests/str.c static bool test_string_sub_simple(struct torture_context *tctx)
tctx 30 lib/util/tests/str.c torture_assert_str_equal(tctx, tmp, "barbar", "invalid sub");
tctx 34 lib/util/tests/str.c static bool test_string_sub_multiple(struct torture_context *tctx)
tctx 39 lib/util/tests/str.c torture_assert_str_equal(tctx, tmp, "barblabar", "invalid sub");
tctx 43 lib/util/tests/str.c static bool test_string_sub_longer(struct torture_context *tctx)
tctx 48 lib/util/tests/str.c torture_assert_str_equal(tctx, tmp, "bliebla", "invalid sub");
tctx 52 lib/util/tests/str.c static bool test_string_sub_shorter(struct torture_context *tctx)
tctx 57 lib/util/tests/str.c torture_assert_str_equal(tctx, tmp, "blbla", "invalid sub");
tctx 61 lib/util/tests/str.c static bool test_string_sub_special_char(struct torture_context *tctx)
tctx 66 lib/util/tests/str.c torture_assert_str_equal(tctx, tmp, "_b_lbla", "invalid sub");
tctx 70 lib/util/tests/str.c static bool test_string_sub_talloc_simple(struct torture_context *tctx)
tctx 74 lib/util/tests/str.c t = string_sub_talloc(tctx, "foobla", "foo", "bl");
tctx 76 lib/util/tests/str.c torture_assert_str_equal(tctx, t, "blbla", "invalid sub");
tctx 81 lib/util/tests/str.c static bool test_string_sub_talloc_multiple(struct torture_context *tctx)
tctx 85 lib/util/tests/str.c t = string_sub_talloc(tctx, "fooblafoo", "foo", "aapnootmies");
tctx 87 lib/util/tests/str.c torture_assert_str_equal(tctx, t, "aapnootmiesblaaapnootmies",
tctx 35 lib/util/tests/strlist.c static bool test_lists_shell(struct torture_context *tctx,
tctx 41 lib/util/tests/strlist.c TALLOC_CTX *mem_ctx = tctx;
tctx 62 lib/util/tests/strlist.c torture_assert(tctx, match, talloc_asprintf(tctx,
tctx 67 lib/util/tests/strlist.c static bool test_list_copy(struct torture_context *tctx)
tctx 74 lib/util/tests/strlist.c result = (const char **)str_list_copy(tctx, list);
tctx 75 lib/util/tests/strlist.c torture_assert_int_equal(tctx, str_list_length(result), 2, "list length");
tctx 76 lib/util/tests/strlist.c torture_assert_str_equal(tctx, result[0], "foo", "element 0");
tctx 77 lib/util/tests/strlist.c torture_assert_str_equal(tctx, result[1], "bar", "element 1");
tctx 78 lib/util/tests/strlist.c torture_assert_str_equal(tctx, result[2], NULL, "element 2");
tctx 80 lib/util/tests/strlist.c result = (const char **)str_list_copy(tctx, empty_list);
tctx 81 lib/util/tests/strlist.c torture_assert_int_equal(tctx, str_list_length(result), 0, "list length");
tctx 82 lib/util/tests/strlist.c torture_assert_str_equal(tctx, result[0], NULL, "element 0");
tctx 84 lib/util/tests/strlist.c result = (const char **)str_list_copy(tctx, null_list);
tctx 85 lib/util/tests/strlist.c torture_assert(tctx, result == NULL, "result NULL");
tctx 25 lib/util/tests/time.c static bool test_null_time(struct torture_context *tctx)
tctx 27 lib/util/tests/time.c torture_assert(tctx, null_time(0), "0");
tctx 28 lib/util/tests/time.c torture_assert(tctx, null_time(0xFFFFFFFF), "0xFFFFFFFF");
tctx 29 lib/util/tests/time.c torture_assert(tctx, null_time(-1), "-1");
tctx 30 lib/util/tests/time.c torture_assert(tctx, !null_time(42), "42");
tctx 34 lib/util/tests/time.c static bool test_null_nttime(struct torture_context *tctx)
tctx 36 lib/util/tests/time.c torture_assert(tctx, null_nttime(-1), "-1");
tctx 37 lib/util/tests/time.c torture_assert(tctx, null_nttime(-1), "-1");
tctx 38 lib/util/tests/time.c torture_assert(tctx, !null_nttime(42), "42");
tctx 43 lib/util/tests/time.c static bool test_http_timestring(struct torture_context *tctx)
tctx 47 lib/util/tests/time.c result = http_timestring(tctx, 42);
tctx 48 lib/util/tests/time.c torture_assert(tctx, !strncmp(start, result,
tctx 50 lib/util/tests/time.c torture_assert_str_equal(tctx, "never",
tctx 51 lib/util/tests/time.c http_timestring(tctx, get_time_t_max()), "42");
tctx 55 lib/util/tests/time.c static bool test_timestring(struct torture_context *tctx)
tctx 58 lib/util/tests/time.c char *result = timestring(tctx, 42);
tctx 59 lib/util/tests/time.c torture_assert(tctx, !strncmp(start, result, strlen(start)),
tctx 64 lib/util/tests/time.c static bool test_get_time_zone(struct torture_context *tctx)
tctx 75 lib/util/tests/time.c torture_assert_int_equal(tctx, old_offset+60*42, new_offset,
tctx 91 source3/libsmb/smbencrypt.c struct MD5Context tctx;
tctx 97 source3/libsmb/smbencrypt.c MD5Init(&tctx);
tctx 98 source3/libsmb/smbencrypt.c MD5Update(&tctx, array, 32);
tctx 99 source3/libsmb/smbencrypt.c MD5Final(hash_out, &tctx);
tctx 592 source3/libsmb/smbencrypt.c struct MD5Context tctx;
tctx 597 source3/libsmb/smbencrypt.c MD5Init(&tctx);
tctx 598 source3/libsmb/smbencrypt.c MD5Update(&tctx, &pw_buf[516], 16);
tctx 599 source3/libsmb/smbencrypt.c MD5Update(&tctx, psession_key->data, psession_key->length);
tctx 600 source3/libsmb/smbencrypt.c MD5Final(key_out, &tctx);
tctx 24 source4/auth/credentials/tests/simple.c static bool test_init(struct torture_context *tctx)
tctx 26 source4/auth/credentials/tests/simple.c struct cli_credentials *creds = cli_credentials_init(tctx);
tctx 30 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, "BLA", cli_credentials_get_domain(creds),
tctx 35 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, "someuser",
tctx 41 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, "p4ssw0rd",
tctx 48 source4/auth/credentials/tests/simple.c static bool test_init_anonymous(struct torture_context *tctx)
tctx 50 source4/auth/credentials/tests/simple.c struct cli_credentials *creds = cli_credentials_init_anon(tctx);
tctx 52 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_domain(creds),
tctx 55 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_username(creds),
tctx 58 source4/auth/credentials/tests/simple.c torture_assert(tctx, cli_credentials_get_password(creds) == NULL,
tctx 64 source4/auth/credentials/tests/simple.c static bool test_parse_string(struct torture_context *tctx)
tctx 66 source4/auth/credentials/tests/simple.c struct cli_credentials *creds = cli_credentials_init_anon(tctx);
tctx 71 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_domain(creds),
tctx 74 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_username(creds),
tctx 77 source4/auth/credentials/tests/simple.c torture_assert(tctx, cli_credentials_get_password(creds) == NULL,
tctx 84 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_domain(creds),
tctx 87 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_username(creds),
tctx 90 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_password(creds),
tctx 97 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx, cli_credentials_get_realm(creds),
tctx 100 source4/auth/credentials/tests/simple.c torture_assert_str_equal(tctx,
tctx 101 source4/auth/credentials/tests/simple.c cli_credentials_get_principal(creds, tctx),
tctx 112 source4/lib/messaging/tests/irpc.c static bool test_echodata(struct torture_context *tctx,
tctx 119 source4/lib/messaging/tests/irpc.c TALLOC_CTX *mem_ctx = tctx;
tctx 128 source4/lib/messaging/tests/irpc.c torture_assert_ntstatus_ok(tctx, status, "EchoData failed");
tctx 133 source4/lib/messaging/tests/irpc.c torture_fail(tctx, "EchoData wrong answer");
tctx 136 source4/lib/messaging/tests/irpc.c torture_comment(tctx, "Echo '%*.*s' -> '%*.*s'\n",
tctx 163 source4/lib/messaging/tests/irpc.c static bool test_speed(struct torture_context *tctx,
tctx 172 source4/lib/messaging/tests/irpc.c TALLOC_CTX *mem_ctx = tctx;
tctx 173 source4/lib/messaging/tests/irpc.c int timelimit = torture_setting_int(tctx, "timelimit", 10);
tctx 179 source4/lib/messaging/tests/irpc.c torture_comment(tctx, "Sending echo for %d seconds\n", timelimit);
tctx 186 source4/lib/messaging/tests/irpc.c torture_assert(tctx, irpc != NULL, "AddOne send failed");
tctx 198 source4/lib/messaging/tests/irpc.c torture_comment(tctx, "waiting for %d remaining replies (done %d)\n",
tctx 204 source4/lib/messaging/tests/irpc.c torture_assert_int_equal(tctx, ping_count, pong_count, "ping test failed");
tctx 206 source4/lib/messaging/tests/irpc.c torture_comment(tctx, "echo rate of %.0f messages/sec\n",
tctx 212 source4/lib/messaging/tests/irpc.c static bool irpc_setup(struct torture_context *tctx, void **_data)
tctx 216 source4/lib/messaging/tests/irpc.c *_data = data = talloc(tctx, struct irpc_test_data);
tctx 218 source4/lib/messaging/tests/irpc.c lp_set_cmdline(tctx->lp_ctx, "pid directory", "piddir.tmp");
tctx 220 source4/lib/messaging/tests/irpc.c data->ev = tctx->ev;
tctx 221 source4/lib/messaging/tests/irpc.c torture_assert(tctx, data->msg_ctx1 =
tctx 222 source4/lib/messaging/tests/irpc.c messaging_init(tctx,
tctx 223 source4/lib/messaging/tests/irpc.c lp_messaging_path(tctx, tctx->lp_ctx),
tctx 225 source4/lib/messaging/tests/irpc.c lp_iconv_convenience(tctx->lp_ctx),
tctx 229 source4/lib/messaging/tests/irpc.c torture_assert(tctx, data->msg_ctx2 =
tctx 230 source4/lib/messaging/tests/irpc.c messaging_init(tctx,
tctx 231 source4/lib/messaging/tests/irpc.c lp_messaging_path(tctx, tctx->lp_ctx),
tctx 233 source4/lib/messaging/tests/irpc.c lp_iconv_convenience(tctx->lp_ctx),
tctx 59 source4/lib/messaging/tests/messaging.c static bool test_ping_speed(struct torture_context *tctx)
tctx 67 source4/lib/messaging/tests/messaging.c int timelimit = torture_setting_int(tctx, "timelimit", 10);
tctx 70 source4/lib/messaging/tests/messaging.c lp_set_cmdline(tctx->lp_ctx, "pid directory", "piddir.tmp");
tctx 72 source4/lib/messaging/tests/messaging.c ev = tctx->ev;
tctx 74 source4/lib/messaging/tests/messaging.c msg_server_ctx = messaging_init(tctx,
tctx 75 source4/lib/messaging/tests/messaging.c lp_messaging_path(tctx, tctx->lp_ctx),
tctx 77 source4/lib/messaging/tests/messaging.c lp_iconv_convenience(tctx->lp_ctx),
tctx 80 source4/lib/messaging/tests/messaging.c torture_assert(tctx, msg_server_ctx != NULL, "Failed to init ping messaging context");
tctx 83 source4/lib/messaging/tests/messaging.c messaging_register_tmp(msg_server_ctx, tctx, exit_message, &msg_exit);
tctx 85 source4/lib/messaging/tests/messaging.c msg_client_ctx = messaging_init(tctx,
tctx 86 source4/lib/messaging/tests/messaging.c lp_messaging_path(tctx, tctx->lp_ctx),
tctx 88 source4/lib/messaging/tests/messaging.c lp_iconv_convenience(tctx->lp_ctx),
tctx 91 source4/lib/messaging/tests/messaging.c torture_assert(tctx, msg_client_ctx != NULL,
tctx 98 source4/lib/messaging/tests/messaging.c torture_comment(tctx, "Sending pings for %d seconds\n", timelimit);
tctx 109 source4/lib/messaging/tests/messaging.c torture_assert_ntstatus_ok(tctx, status1, "msg1 failed");
tctx 112 source4/lib/messaging/tests/messaging.c torture_assert_ntstatus_ok(tctx, status2, "msg2 failed");
tctx 120 source4/lib/messaging/tests/messaging.c torture_comment(tctx, "waiting for %d remaining replies (done %d)\n",
tctx 126 source4/lib/messaging/tests/messaging.c torture_comment(tctx, "sending exit\n");
tctx 129 source4/lib/messaging/tests/messaging.c torture_assert_int_equal(tctx, ping_count, pong_count, "ping test failed");
tctx 131 source4/lib/messaging/tests/messaging.c torture_comment(tctx, "ping rate of %.0f messages/sec\n",
tctx 38 source4/lib/registry/tests/diff.c static bool test_generate_diff(struct torture_context *tctx, void *tcase_data)
tctx 46 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "reg_generate_diff");
tctx 52 source4/lib/registry/tests/diff.c static bool test_diff_load(struct torture_context *tctx, void *tcase_data)
tctx 60 source4/lib/registry/tests/diff.c ic = lp_iconv_convenience(tctx->lp_ctx);
tctx 63 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "reg_diff_load");
tctx 68 source4/lib/registry/tests/diff.c static bool test_diff_apply(struct torture_context *tctx, void *tcase_data)
tctx 74 source4/lib/registry/tests/diff.c error = reg_diff_apply(td->r1_ctx, lp_iconv_convenience(tctx->lp_ctx), td->filename);
tctx 75 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "reg_diff_apply");
tctx 78 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKEY_LOCAL_MACHINE failed");
tctx 83 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\Software failed");
tctx 85 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\Software\\Microsoft failed");
tctx 87 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\Microsoft\\Windows failed");
tctx 89 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\Windows\\CurrentVersion failed");
tctx 91 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\CurrentVersion\\Policies failed");
tctx 93 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKLM\\..\\Policies\\Explorer failed");
tctx 107 source4/lib/registry/tests/diff.c static bool test_generate_diff_key_add(struct torture_context *tctx, void *tcase_data)
tctx 118 source4/lib/registry/tests/diff.c if (W_ERROR_IS_OK(reg_generate_diff_key(&rk, NULL, "bla", &cb, tctx)))
tctx 121 source4/lib/registry/tests/diff.c torture_assert_str_equal(tctx, added_key, "bla", "key added");
tctx 126 source4/lib/registry/tests/diff.c static bool test_generate_diff_key_null(struct torture_context *tctx, void *tcase_data)
tctx 153 source4/lib/registry/tests/diff.c static bool diff_setup_tcase(struct torture_context *tctx, void **data)
tctx 165 source4/lib/registry/tests/diff.c td = talloc(tctx, struct diff_tcase_data);
tctx 168 source4/lib/registry/tests/diff.c error = reg_open_local(tctx, &r1_ctx);
tctx 169 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening registry 1 for patch tests failed");
tctx 171 source4/lib/registry/tests/diff.c error = reg_open_local(tctx, &r2_ctx);
tctx 172 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening registry 2 for patch tests failed");
tctx 175 source4/lib/registry/tests/diff.c status = torture_temp_dir(tctx, "patchfile", &td->tempdir);
tctx 176 source4/lib/registry/tests/diff.c torture_assert_ntstatus_ok(tctx, status, "Creating temp dir failed");
tctx 179 source4/lib/registry/tests/diff.c filename = talloc_asprintf(tctx, "%s/r1_local_machine.ldb", td->tempdir);
tctx 180 source4/lib/registry/tests/diff.c error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r1_hklm);
tctx 181 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening local machine file failed");
tctx 184 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Mounting hive failed");
tctx 186 source4/lib/registry/tests/diff.c filename = talloc_asprintf(tctx, "%s/r1_current_user.ldb", td->tempdir);
tctx 187 source4/lib/registry/tests/diff.c error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r1_hkcu);
tctx 188 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening current user file failed");
tctx 191 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Mounting hive failed");
tctx 194 source4/lib/registry/tests/diff.c filename = talloc_asprintf(tctx, "%s/r2_local_machine.ldb", td->tempdir);
tctx 195 source4/lib/registry/tests/diff.c error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r2_hklm);
tctx 196 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening local machine file failed");
tctx 199 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Mounting hive failed");
tctx 201 source4/lib/registry/tests/diff.c filename = talloc_asprintf(tctx, "%s/r2_current_user.ldb", td->tempdir);
tctx 202 source4/lib/registry/tests/diff.c error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &r2_hkcu);
tctx 203 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening current user file failed");
tctx 206 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Mounting hive failed");
tctx 209 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKEY_CURRENT_USER failed");
tctx 211 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKCU\\Network failed");
tctx 213 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKCU\\Network\\L failed");
tctx 216 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Opening HKEY_LOCAL_MACHINE failed");
tctx 218 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\Sofware failed");
tctx 220 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\Software\\Microsoft failed");
tctx 222 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\Software\\Microsoft\\Windows failed");
tctx 224 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\..\\Windows\\CurrentVersion failed");
tctx 226 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\..\\CurrentVersion\\Policies failed");
tctx 228 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "Creating HKLM\\..\\Policies\\Explorer failed");
tctx 246 source4/lib/registry/tests/diff.c static bool diff_setup_preg_tcase (struct torture_context *tctx, void **data)
tctx 252 source4/lib/registry/tests/diff.c diff_setup_tcase(tctx, data);
tctx 255 source4/lib/registry/tests/diff.c ic = lp_iconv_convenience(tctx->lp_ctx);
tctx 257 source4/lib/registry/tests/diff.c td->filename = talloc_asprintf(tctx, "%s/test.pol", td->tempdir);
tctx 258 source4/lib/registry/tests/diff.c error = reg_preg_diff_save(tctx, td->filename, ic, &td->callbacks, &td->callback_data);
tctx 259 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "reg_preg_diff_save");
tctx 264 source4/lib/registry/tests/diff.c static bool diff_setup_dotreg_tcase (struct torture_context *tctx, void **data)
tctx 270 source4/lib/registry/tests/diff.c diff_setup_tcase(tctx, data);
tctx 273 source4/lib/registry/tests/diff.c ic = lp_iconv_convenience(tctx->lp_ctx);
tctx 275 source4/lib/registry/tests/diff.c td->filename = talloc_asprintf(tctx, "%s/test.reg", td->tempdir);
tctx 276 source4/lib/registry/tests/diff.c error = reg_dotreg_diff_save(tctx, td->filename, ic, &td->callbacks, &td->callback_data);
tctx 277 source4/lib/registry/tests/diff.c torture_assert_werr_ok(tctx, error, "reg_dotreg_diff_save");
tctx 31 source4/lib/registry/tests/hive.c static bool test_del_nonexistant_key(struct torture_context *tctx,
tctx 36 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx 42 source4/lib/registry/tests/hive.c static bool test_keyinfo_root(struct torture_context *tctx,
tctx 51 source4/lib/registry/tests/hive.c error = hive_key_get_info(tctx, root, NULL, &num_subkeys, &num_values,
tctx 53 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_num_subkeys()");
tctx 55 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, num_subkeys, 0,
tctx 58 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_num_values");
tctx 60 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, num_values, 0,
tctx 66 source4/lib/registry/tests/hive.c static bool test_keyinfo_nums(struct torture_context *tctx, void *test_data)
tctx 75 source4/lib/registry/tests/hive.c error = hive_key_add_name(tctx, root, "Nested Keyll", NULL,
tctx 77 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx 80 source4/lib/registry/tests/hive.c data_blob_talloc(tctx, data, sizeof(data)));
tctx 81 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx 85 source4/lib/registry/tests/hive.c error = hive_key_get_info(tctx, root, NULL, &num_subkeys, &num_values,
tctx 87 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_num_subkeys()");
tctx 89 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, num_subkeys, 1, "subkey count");
tctx 91 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_num_values");
tctx 93 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, num_values, 1, "value count");
tctx 98 source4/lib/registry/tests/hive.c static bool test_add_subkey(struct torture_context *tctx,
tctx 104 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx;
tctx 108 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx 111 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_del");
tctx 116 source4/lib/registry/tests/hive.c static bool test_del_recursive(struct torture_context *tctx,
tctx 123 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx;
tctx 130 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx 135 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx 140 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx 144 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_del");
tctx 149 source4/lib/registry/tests/hive.c static bool test_flush_key(struct torture_context *tctx, void *test_data)
tctx 153 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, hive_key_flush(root), "flush key");
tctx 158 source4/lib/registry/tests/hive.c static bool test_del_key(struct torture_context *tctx, const void *test_data)
tctx 163 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx;
tctx 167 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx 170 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "reg_key_del");
tctx 173 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, "reg_key_del");
tctx 178 source4/lib/registry/tests/hive.c static bool test_set_value(struct torture_context *tctx,
tctx 184 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx;
tctx 190 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx 194 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx 199 source4/lib/registry/tests/hive.c static bool test_get_value(struct torture_context *tctx, const void *test_data)
tctx 204 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx;
tctx 213 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx 216 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx 221 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx 224 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "getting value");
tctx 226 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, value.length, 4, "value length");
tctx 227 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, type, REG_DWORD, "value type");
tctx 229 source4/lib/registry/tests/hive.c torture_assert_mem_equal(tctx, &data, value.data, sizeof(uint32_t),
tctx 235 source4/lib/registry/tests/hive.c static bool test_del_value(struct torture_context *tctx, const void *test_data)
tctx 240 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx;
tctx 249 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx 253 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx 256 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "deleting value");
tctx 259 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_BADFILE, "getting value");
tctx 262 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx 268 source4/lib/registry/tests/hive.c static bool test_list_values(struct torture_context *tctx,
tctx 274 source4/lib/registry/tests/hive.c TALLOC_CTX *mem_ctx = tctx;
tctx 284 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx 288 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_set_value");
tctx 292 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "getting value");
tctx 294 source4/lib/registry/tests/hive.c torture_assert_str_equal(tctx, name, "Answer", "value name");
tctx 296 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, value.length, 4, "value length");
tctx 297 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, type, REG_DWORD, "value type");
tctx 300 source4/lib/registry/tests/hive.c torture_assert_int_equal(tctx, data_val, IVAL(value.data, 0), "value data");
tctx 304 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS,
tctx 310 source4/lib/registry/tests/hive.c static bool test_hive_security(struct torture_context *tctx, const void *_data)
tctx 317 source4/lib/registry/tests/hive.c osd = security_descriptor_dacl_create(tctx,
tctx 327 source4/lib/registry/tests/hive.c error = hive_key_add_name(tctx, root, "SecurityKey", NULL,
tctx 329 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "hive_key_add_name");
tctx 331 source4/lib/registry/tests/hive.c error = hive_get_sec_desc(tctx, subkey, &nsd);
tctx 332 source4/lib/registry/tests/hive.c torture_assert_werr_ok (tctx, error, "getting security descriptor");
tctx 334 source4/lib/registry/tests/hive.c torture_assert(tctx, security_descriptor_equal(osd, nsd),
tctx 339 source4/lib/registry/tests/hive.c osd = security_descriptor_dacl_create(tctx,
tctx 349 source4/lib/registry/tests/hive.c torture_assert_werr_ok(tctx, error, "setting security descriptor");
tctx 351 source4/lib/registry/tests/hive.c error = hive_get_sec_desc(tctx, subkey, &nsd);
tctx 352 source4/lib/registry/tests/hive.c torture_assert_werr_ok (tctx, error, "getting security descriptor");
tctx 354 source4/lib/registry/tests/hive.c torture_assert(tctx, security_descriptor_equal(osd, nsd),
tctx 391 source4/lib/registry/tests/hive.c static bool hive_setup_dir(struct torture_context *tctx, void **data)
tctx 398 source4/lib/registry/tests/hive.c status = torture_temp_dir(tctx, "hive-dir", &dirname);
tctx 404 source4/lib/registry/tests/hive.c error = reg_create_directory(tctx, dirname, &key);
tctx 415 source4/lib/registry/tests/hive.c static bool hive_setup_ldb(struct torture_context *tctx, void **data)
tctx 422 source4/lib/registry/tests/hive.c status = torture_temp_dir(tctx, "hive-ldb", &dirname);
tctx 428 source4/lib/registry/tests/hive.c error = reg_open_ldb_file(tctx, dirname, NULL, NULL, tctx->ev, tctx->lp_ctx, &key);
tctx 439 source4/lib/registry/tests/hive.c static bool hive_setup_regf(struct torture_context *tctx, void **data)
tctx 446 source4/lib/registry/tests/hive.c status = torture_temp_dir(tctx, "hive-regf", &dirname);
tctx 452 source4/lib/registry/tests/hive.c error = reg_create_regf_file(tctx, lp_iconv_convenience(tctx->lp_ctx),
tctx 464 source4/lib/registry/tests/hive.c static bool test_dir_refuses_null_location(struct torture_context *tctx)
tctx 466 source4/lib/registry/tests/hive.c torture_assert_werr_equal(tctx, WERR_INVALID_PARAM,
tctx 33 source4/lib/registry/tests/registry.c static bool test_get_predefined(struct torture_context *tctx, void *_data)
tctx 40 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error,
tctx 48 source4/lib/registry/tests/registry.c static bool test_get_predefined_unknown(struct torture_context *tctx,
tctx 56 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx 61 source4/lib/registry/tests/registry.c static bool test_predef_key_by_name(struct torture_context *tctx, void *_data)
tctx 69 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error,
tctx 74 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error,
tctx 80 source4/lib/registry/tests/registry.c static bool test_predef_key_by_name_invalid(struct torture_context *tctx,
tctx 88 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx 96 source4/lib/registry/tests/registry.c static bool test_create_subkey(struct torture_context *tctx, void *_data)
tctx 103 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error,
tctx 108 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx 109 source4/lib/registry/tests/registry.c torture_assert(tctx, newkey != NULL, "Creating new key");
tctx 117 source4/lib/registry/tests/registry.c static bool test_create_nested_subkey(struct torture_context *tctx, void *_data)
tctx 124 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error,
tctx 129 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx 130 source4/lib/registry/tests/registry.c torture_assert(tctx, newkey1 != NULL, "Creating new key");
tctx 134 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx 135 source4/lib/registry/tests/registry.c torture_assert(tctx, newkey2 != NULL, "Creating new key");
tctx 143 source4/lib/registry/tests/registry.c static bool test_key_add_abs_top(struct torture_context *tctx, void *_data)
tctx 149 source4/lib/registry/tests/registry.c error = reg_key_add_abs(tctx, rctx, "HKEY_CLASSES_ROOT", 0, NULL,
tctx 151 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_ALREADY_EXISTS,
tctx 160 source4/lib/registry/tests/registry.c static bool test_key_add_abs(struct torture_context *tctx, void *_data)
tctx 166 source4/lib/registry/tests/registry.c error = reg_key_add_abs(tctx, rctx, "HKEY_CLASSES_ROOT\\bloe", 0, NULL,
tctx 168 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "create lowest");
tctx 170 source4/lib/registry/tests/registry.c error = reg_key_add_abs(tctx, rctx, "HKEY_CLASSES_ROOT\\bloe\\bla", 0,
tctx 172 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "create nested");
tctx 175 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error,
tctx 178 source4/lib/registry/tests/registry.c error = reg_open_key(tctx, root, "bloe", &result2);
tctx 179 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "opening key");
tctx 181 source4/lib/registry/tests/registry.c error = reg_open_key(tctx, root, "bloe\\bla", &result2);
tctx 182 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "opening key");
tctx 188 source4/lib/registry/tests/registry.c static bool test_del_key(struct torture_context *tctx, void *_data)
tctx 195 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error,
tctx 200 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx 201 source4/lib/registry/tests/registry.c torture_assert(tctx, newkey != NULL, "Creating new key");
tctx 204 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Delete key");
tctx 207 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx 217 source4/lib/registry/tests/registry.c static bool create_test_key(struct torture_context *tctx,
tctx 226 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error,
tctx 230 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx 236 source4/lib/registry/tests/registry.c static bool test_flush_key(struct torture_context *tctx, void *_data)
tctx 242 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Bremen", &root, &subkey))
tctx 246 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "flush key");
tctx 248 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, reg_key_flush(NULL),
tctx 254 source4/lib/registry/tests/registry.c static bool test_query_key(struct torture_context *tctx, void *_data)
tctx 263 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Munchen", &root, &subkey))
tctx 266 source4/lib/registry/tests/registry.c error = reg_key_get_info(tctx, subkey, &classname,
tctx 270 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "get info key");
tctx 271 source4/lib/registry/tests/registry.c torture_assert(tctx, classname == NULL, "classname");
tctx 272 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, num_subkeys, 0, "num subkeys");
tctx 273 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, num_values, 0, "num values");
tctx 278 source4/lib/registry/tests/registry.c static bool test_query_key_nums(struct torture_context *tctx, void *_data)
tctx 287 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Berlin", &root, &subkey1))
tctx 292 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Creating key return code");
tctx 295 source4/lib/registry/tests/registry.c data_blob_talloc(tctx, &data, sizeof(data)));
tctx 296 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "set value");
tctx 298 source4/lib/registry/tests/registry.c error = reg_key_get_info(tctx, subkey1, NULL, &num_subkeys,
tctx 301 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "get info key");
tctx 302 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, num_subkeys, 1, "num subkeys");
tctx 303 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, num_values, 1, "num values");
tctx 313 source4/lib/registry/tests/registry.c static bool test_list_subkeys(struct torture_context *tctx, void *_data)
tctx 321 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Goettingen", &root, &subkey))
tctx 324 source4/lib/registry/tests/registry.c error = reg_key_get_subkey_by_index(tctx, root, 0, &name, &classname,
tctx 327 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Enum keys return code");
tctx 328 source4/lib/registry/tests/registry.c torture_assert_str_equal(tctx, name, "Goettingen", "Enum keys data");
tctx 331 source4/lib/registry/tests/registry.c error = reg_key_get_subkey_by_index(tctx, root, 0, NULL, NULL, NULL);
tctx 333 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error,
tctx 336 source4/lib/registry/tests/registry.c error = reg_key_get_subkey_by_index(tctx, root, 1, NULL, NULL, NULL);
tctx 338 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS,
tctx 341 source4/lib/registry/tests/registry.c error = reg_key_get_subkey_by_index(tctx, subkey, 0, NULL, NULL, NULL);
tctx 343 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS,
tctx 352 source4/lib/registry/tests/registry.c static bool test_set_value(struct torture_context *tctx, void *_data)
tctx 361 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Dusseldorf", &root, &subkey))
tctx 365 source4/lib/registry/tests/registry.c data_blob_talloc(tctx, data, sizeof(data)));
tctx 366 source4/lib/registry/tests/registry.c torture_assert_werr_ok (tctx, error, "setting value");
tctx 374 source4/lib/registry/tests/registry.c static bool test_security(struct torture_context *tctx, void *_data)
tctx 381 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Düsseldorf", &root, &subkey))
tctx 384 source4/lib/registry/tests/registry.c osd = security_descriptor_dacl_create(tctx,
tctx 394 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "setting security descriptor");
tctx 396 source4/lib/registry/tests/registry.c error = reg_get_sec_desc(tctx, subkey, &nsd);
tctx 397 source4/lib/registry/tests/registry.c torture_assert_werr_ok (tctx, error, "getting security descriptor");
tctx 399 source4/lib/registry/tests/registry.c torture_assert(tctx, security_descriptor_equal(osd, nsd),
tctx 408 source4/lib/registry/tests/registry.c static bool test_get_value(struct torture_context *tctx, void *_data)
tctx 418 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Duisburg", &root, &subkey))
tctx 421 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__, &type,
tctx 423 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx 427 source4/lib/registry/tests/registry.c data_blob_talloc(tctx, value, sizeof(value)));
tctx 428 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "setting value");
tctx 430 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__, &type,
tctx 432 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "getting value");
tctx 434 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, sizeof(value), data.length, "value length ok");
tctx 435 source4/lib/registry/tests/registry.c torture_assert_mem_equal(tctx, data.data, value, sizeof(value),
tctx 437 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, REG_DWORD, type, "value type");
tctx 445 source4/lib/registry/tests/registry.c static bool test_del_value(struct torture_context *tctx, void *_data)
tctx 455 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Warschau", &root, &subkey))
tctx 458 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__, &type,
tctx 460 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx 464 source4/lib/registry/tests/registry.c data_blob_talloc(tctx, value, sizeof(value)));
tctx 465 source4/lib/registry/tests/registry.c torture_assert_werr_ok (tctx, error, "setting value");
tctx 468 source4/lib/registry/tests/registry.c torture_assert_werr_ok (tctx, error, "unsetting value");
tctx 470 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_name(tctx, subkey, __FUNCTION__,
tctx 472 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_BADFILE,
tctx 481 source4/lib/registry/tests/registry.c static bool test_list_values(struct torture_context *tctx, void *_data)
tctx 492 source4/lib/registry/tests/registry.c if (!create_test_key(tctx, rctx, "Bonn", &root, &subkey))
tctx 496 source4/lib/registry/tests/registry.c data_blob_talloc(tctx, value, sizeof(value)));
tctx 497 source4/lib/registry/tests/registry.c torture_assert_werr_ok (tctx, error, "setting value");
tctx 499 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_index(tctx, subkey, 0, &name,
tctx 501 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "getting value");
tctx 503 source4/lib/registry/tests/registry.c torture_assert_str_equal(tctx, name, "bar", "value name");
tctx 504 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, sizeof(value), data.length, "value length");
tctx 505 source4/lib/registry/tests/registry.c torture_assert_mem_equal(tctx, data.data, value, sizeof(value),
tctx 507 source4/lib/registry/tests/registry.c torture_assert_int_equal(tctx, REG_DWORD, type, "value type");
tctx 509 source4/lib/registry/tests/registry.c error = reg_key_get_value_by_index(tctx, subkey, 1, &name,
tctx 511 source4/lib/registry/tests/registry.c torture_assert_werr_equal(tctx, error, WERR_NO_MORE_ITEMS,
tctx 517 source4/lib/registry/tests/registry.c static bool setup_local_registry(struct torture_context *tctx, void **data)
tctx 526 source4/lib/registry/tests/registry.c error = reg_open_local(tctx, &rctx);
tctx 527 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Opening local registry failed");
tctx 529 source4/lib/registry/tests/registry.c status = torture_temp_dir(tctx, "registry-local", &tempdir);
tctx 530 source4/lib/registry/tests/registry.c torture_assert_ntstatus_ok(tctx, status, "Creating temp dir failed");
tctx 532 source4/lib/registry/tests/registry.c filename = talloc_asprintf(tctx, "%s/classes_root.ldb", tempdir);
tctx 533 source4/lib/registry/tests/registry.c error = reg_open_ldb_file(tctx, filename, NULL, NULL, tctx->ev, tctx->lp_ctx, &hive_key);
tctx 534 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Opening classes_root file failed");
tctx 537 source4/lib/registry/tests/registry.c torture_assert_werr_ok(tctx, error, "Mounting hive failed");
tctx 34 source4/lib/socket/testsuite.c static bool test_udp(struct torture_context *tctx)
tctx 42 source4/lib/socket/testsuite.c TALLOC_CTX *mem_ctx = tctx;
tctx 45 source4/lib/socket/testsuite.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx 48 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "creating DGRAM IP socket 1");
tctx 52 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "creating DGRAM IP socket 1");
tctx 58 source4/lib/socket/testsuite.c torture_assert(tctx, localhost, "Localhost not found");
tctx 61 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "listen on socket 1");
tctx 64 source4/lib/socket/testsuite.c torture_assert(tctx, srv_addr != NULL &&
tctx 66 source4/lib/socket/testsuite.c talloc_asprintf(tctx,
tctx 70 source4/lib/socket/testsuite.c torture_comment(tctx, "server port is %d\n", srv_addr->port);
tctx 78 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "sendto() on socket 2");
tctx 82 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "recvfrom() on socket 1");
tctx 84 source4/lib/socket/testsuite.c torture_assert_str_equal(tctx, from_addr->addr, srv_addr->addr,
tctx 87 source4/lib/socket/testsuite.c torture_assert_int_equal(tctx, nread, size, "Unexpected recvfrom size");
tctx 89 source4/lib/socket/testsuite.c torture_assert_mem_equal(tctx, blob2.data, blob.data, size,
tctx 94 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "sendto() on socket 1");
tctx 98 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "recvfrom() on socket 2");
tctx 99 source4/lib/socket/testsuite.c torture_assert_str_equal(tctx, from_addr->addr, srv_addr->addr,
tctx 102 source4/lib/socket/testsuite.c torture_assert_int_equal(tctx, nread, size, "Unexpected recvfrom size");
tctx 104 source4/lib/socket/testsuite.c torture_assert_int_equal(tctx, from_addr->port, srv_addr->port,
tctx 107 source4/lib/socket/testsuite.c torture_assert_mem_equal(tctx, blob2.data, blob.data, size,
tctx 118 source4/lib/socket/testsuite.c static bool test_tcp(struct torture_context *tctx)
tctx 126 source4/lib/socket/testsuite.c TALLOC_CTX *mem_ctx = tctx;
tctx 127 source4/lib/socket/testsuite.c struct tevent_context *ev = tctx->ev;
tctx 131 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "creating IP stream socket 1");
tctx 135 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "creating IP stream socket 1");
tctx 138 source4/lib/socket/testsuite.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx 141 source4/lib/socket/testsuite.c torture_assert(tctx, localhost, "Localhost not found");
tctx 144 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "listen on socket 1");
tctx 147 source4/lib/socket/testsuite.c torture_assert(tctx, srv_addr && srv_addr->addr,
tctx 150 source4/lib/socket/testsuite.c torture_assert_str_equal(tctx, srv_addr->addr, iface_best_ip(ifaces, "127.0.0.1"),
tctx 153 source4/lib/socket/testsuite.c torture_comment(tctx, "server port is %d\n", srv_addr->port);
tctx 156 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "connect() on socket 2");
tctx 159 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "accept() on socket 1");
tctx 169 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "send() on socket 2");
tctx 172 source4/lib/socket/testsuite.c torture_assert_ntstatus_ok(tctx, status, "recv() on socket 3");
tctx 176 source4/lib/socket/testsuite.c torture_assert(tctx, from_addr && from_addr->addr,
tctx 179 source4/lib/socket/testsuite.c torture_assert_str_equal(tctx, from_addr->addr, srv_addr->addr,
tctx 182 source4/lib/socket/testsuite.c torture_assert_int_equal(tctx, nread, size, "Unexpected recvfrom size");
tctx 184 source4/lib/socket/testsuite.c torture_assert_mem_equal(tctx, blob2.data, blob.data, size,
tctx 26 source4/lib/tdr/testsuite.c static bool test_push_uint8(struct torture_context *tctx)
tctx 29 source4/lib/tdr/testsuite.c struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 31 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_push_uint8(tdr, &v), "push failed");
tctx 32 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.length, 1, "length incorrect");
tctx 33 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[0], 4, "data incorrect");
tctx 37 source4/lib/tdr/testsuite.c static bool test_pull_uint8(struct torture_context *tctx)
tctx 41 source4/lib/tdr/testsuite.c struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 46 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_uint8(tdr, tctx, &l),
tctx 48 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 1, tdr->offset,
tctx 53 source4/lib/tdr/testsuite.c static bool test_push_uint16(struct torture_context *tctx)
tctx 56 source4/lib/tdr/testsuite.c struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 58 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_push_uint16(tdr, &v), "push failed");
tctx 59 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.length, 2, "length incorrect");
tctx 60 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[0], 0x32, "data incorrect");
tctx 61 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[1], 0x0F, "data incorrect");
tctx 65 source4/lib/tdr/testsuite.c static bool test_pull_uint16(struct torture_context *tctx)
tctx 69 source4/lib/tdr/testsuite.c struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 74 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_uint16(tdr, tctx, &l),
tctx 76 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 2, tdr->offset, "offset invalid");
tctx 77 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 782, l, "right int read");
tctx 81 source4/lib/tdr/testsuite.c static bool test_push_uint32(struct torture_context *tctx)
tctx 84 source4/lib/tdr/testsuite.c struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 86 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_push_uint32(tdr, &v), "push failed");
tctx 87 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.length, 4, "length incorrect");
tctx 88 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[0], 0x32, "data incorrect");
tctx 89 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[1], 0x0F, "data incorrect");
tctx 90 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[2], 0x10, "data incorrect");
tctx 91 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, tdr->data.data[3], 0x00, "data incorrect");
tctx 95 source4/lib/tdr/testsuite.c static bool test_pull_uint32(struct torture_context *tctx)
tctx 99 source4/lib/tdr/testsuite.c struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 104 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_uint32(tdr, tctx, &l),
tctx 106 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 4, tdr->offset, "offset invalid");
tctx 107 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 782, l, "right int read");
tctx 111 source4/lib/tdr/testsuite.c static bool test_pull_charset(struct torture_context *tctx)
tctx 113 source4/lib/tdr/testsuite.c struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 115 source4/lib/tdr/testsuite.c tdr->data.data = (uint8_t *)talloc_strdup(tctx, "bla");
tctx 119 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_charset(tdr, tctx, &l, -1, 1, CH_DOS),
tctx 121 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 4, tdr->offset, "offset invalid");
tctx 122 source4/lib/tdr/testsuite.c torture_assert_str_equal(tctx, "bla", l, "right int read");
tctx 125 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_charset(tdr, tctx, &l, 2, 1, CH_UNIX),
tctx 127 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 2, tdr->offset, "offset invalid");
tctx 128 source4/lib/tdr/testsuite.c torture_assert_str_equal(tctx, "bl", l, "right int read");
tctx 133 source4/lib/tdr/testsuite.c static bool test_pull_charset_empty(struct torture_context *tctx)
tctx 135 source4/lib/tdr/testsuite.c struct tdr_pull *tdr = tdr_pull_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 137 source4/lib/tdr/testsuite.c tdr->data.data = (uint8_t *)talloc_strdup(tctx, "bla");
tctx 141 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_pull_charset(tdr, tctx, &l, 0, 1, CH_DOS),
tctx 143 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 0, tdr->offset, "offset invalid");
tctx 144 source4/lib/tdr/testsuite.c torture_assert_str_equal(tctx, "", l, "right string read");
tctx 151 source4/lib/tdr/testsuite.c static bool test_push_charset(struct torture_context *tctx)
tctx 154 source4/lib/tdr/testsuite.c struct tdr_push *tdr = tdr_push_init(tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 155 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_push_charset(tdr, &l, 4, 1, CH_UTF8),
tctx 157 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 4, tdr->data.length, "offset invalid");
tctx 158 source4/lib/tdr/testsuite.c torture_assert(tctx, strcmp("bloe", (const char *)tdr->data.data) == 0, "right string push");
tctx 160 source4/lib/tdr/testsuite.c torture_assert_ntstatus_ok(tctx, tdr_push_charset(tdr, &l, -1, 1, CH_UTF8),
tctx 162 source4/lib/tdr/testsuite.c torture_assert_int_equal(tctx, 9, tdr->data.length, "offset invalid");
tctx 163 source4/lib/tdr/testsuite.c torture_assert_str_equal(tctx, "bloe", (const char *)tdr->data.data+4, "right string read");
tctx 28 source4/libcli/resolve/testsuite.c static bool test_async_resolve(struct torture_context *tctx)
tctx 32 source4/libcli/resolve/testsuite.c int timelimit = torture_setting_int(tctx, "timelimit", 2);
tctx 33 source4/libcli/resolve/testsuite.c const char *host = torture_setting_string(tctx, "host", NULL);
tctx 36 source4/libcli/resolve/testsuite.c TALLOC_CTX *mem_ctx = tctx;
tctx 38 source4/libcli/resolve/testsuite.c ev = tctx->ev;
tctx 43 source4/libcli/resolve/testsuite.c torture_comment(tctx, "Testing async resolve of '%s' for %d seconds\n",
tctx 48 source4/libcli/resolve/testsuite.c torture_assert(tctx, c != NULL, "resolve_name_host_send");
tctx 49 source4/libcli/resolve/testsuite.c torture_assert_ntstatus_ok(tctx, resolve_name_host_recv(c, mem_ctx, &s, NULL),
tctx 54 source4/libcli/resolve/testsuite.c torture_comment(tctx, "async rate of %.1f resolves/sec\n",
tctx 62 source4/libcli/resolve/testsuite.c static bool test_sync_resolve(struct torture_context *tctx)
tctx 64 source4/libcli/resolve/testsuite.c int timelimit = torture_setting_int(tctx, "timelimit", 2);
tctx 67 source4/libcli/resolve/testsuite.c const char *host = torture_setting_string(tctx, "host", NULL);
tctx 69 source4/libcli/resolve/testsuite.c torture_comment(tctx, "Testing sync resolve of '%s' for %d seconds\n",
tctx 76 source4/libcli/resolve/testsuite.c torture_comment(tctx, "sync rate of %.1f resolves/sec\n",
tctx 31 source4/libcli/security/tests/sddl.c static bool test_sddl(struct torture_context *tctx,
tctx 38 source4/libcli/security/tests/sddl.c TALLOC_CTX *mem_ctx = tctx;
tctx 43 source4/libcli/security/tests/sddl.c torture_assert(tctx, sd != NULL, talloc_asprintf(tctx,
tctx 47 source4/libcli/security/tests/sddl.c torture_assert(tctx, sddl2 != NULL, talloc_asprintf(tctx,
tctx 51 source4/libcli/security/tests/sddl.c torture_assert(tctx, sd2 != NULL, talloc_asprintf(tctx,
tctx 54 source4/libcli/security/tests/sddl.c torture_assert(tctx, security_descriptor_equal(sd, sd2),
tctx 55 source4/libcli/security/tests/sddl.c talloc_asprintf(tctx, "Failed equality test for '%s'\n", sddl));
tctx 28 source4/librpc/tests/binding_string.c static bool test_BindingString(struct torture_context *tctx,
tctx 35 source4/librpc/tests/binding_string.c TALLOC_CTX *mem_ctx = tctx;
tctx 38 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(mem_ctx, binding, &b),
tctx 42 source4/librpc/tests/binding_string.c torture_assert(tctx, s != NULL, "Error converting binding back to string");
tctx 44 source4/librpc/tests/binding_string.c torture_assert_casestr_equal(tctx, binding, s,
tctx 48 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_binding_build_tower(mem_ctx, b, &tower),
tctx 53 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_binding_from_tower(mem_ctx, &tower, &b2),
tctx 63 source4/librpc/tests/binding_string.c torture_assert(tctx, s != NULL, "Error converting binding back to string for (stripped down)");
tctx 66 source4/librpc/tests/binding_string.c torture_assert(tctx, s != NULL, "Error converting binding back to string");
tctx 69 source4/librpc/tests/binding_string.c torture_assert_casestr_equal(tctx, s, s2, "Mismatch while comparing original and from protocol tower generated binding strings");
tctx 99 source4/librpc/tests/binding_string.c static bool test_parse_check_results(struct torture_context *tctx)
tctx 104 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx,
tctx 108 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER", &b), "parse");
tctx 109 source4/librpc/tests/binding_string.c torture_assert(tctx, b->transport == NCACN_NP, "ncacn_np expected");
tctx 110 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_ip_tcp:$SERVER", &b), "parse");
tctx 111 source4/librpc/tests/binding_string.c torture_assert(tctx, b->transport == NCACN_IP_TCP, "ncacn_ip_tcp expected");
tctx 112 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[rpcecho]", &b), "parse");
tctx 113 source4/librpc/tests/binding_string.c torture_assert_str_equal(tctx, b->endpoint, "rpcecho", "endpoint");
tctx 114 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[/pipe/rpcecho]", &b), "parse");
tctx 115 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[/pipe/rpcecho,sign,seal]", &b), "parse");
tctx 116 source4/librpc/tests/binding_string.c torture_assert(tctx, b->flags == DCERPC_SIGN+DCERPC_SEAL, "sign+seal flags");
tctx 117 source4/librpc/tests/binding_string.c torture_assert_str_equal(tctx, b->endpoint, "/pipe/rpcecho", "endpoint");
tctx 118 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[,sign]", &b), "parse");
tctx 119 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_ip_tcp:$SERVER[,sign]", &b), "parse");
tctx 120 source4/librpc/tests/binding_string.c torture_assert(tctx, b->endpoint == NULL, "endpoint");
tctx 121 source4/librpc/tests/binding_string.c torture_assert(tctx, b->flags == DCERPC_SIGN, "sign flag");
tctx 122 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncalrpc:", &b), "parse");
tctx 123 source4/librpc/tests/binding_string.c torture_assert(tctx, b->transport == NCALRPC, "ncalrpc expected");
tctx 124 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx,
tctx 126 source4/librpc/tests/binding_string.c torture_assert(tctx, GUID_equal(&b->object.uuid, &uuid), "object uuid");
tctx 127 source4/librpc/tests/binding_string.c torture_assert_int_equal(tctx, b->object.if_version, 0, "object version");
tctx 128 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx,
tctx 134 source4/librpc/tests/binding_string.c static bool test_no_transport(struct torture_context *tctx)
tctx 141 source4/librpc/tests/binding_string.c torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, binding, &b),
tctx 144 source4/librpc/tests/binding_string.c torture_assert(tctx, b->transport == NCA_UNKNOWN, "invalid transport");
tctx 146 source4/librpc/tests/binding_string.c s = dcerpc_binding_string(tctx, b);
tctx 147 source4/librpc/tests/binding_string.c torture_assert(tctx, s != NULL, "Error converting binding back to string");
tctx 149 source4/librpc/tests/binding_string.c torture_assert_casestr_equal(tctx, binding, s,
tctx 25 source4/param/tests/loadparm.c static bool test_create(struct torture_context *tctx)
tctx 27 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 28 source4/param/tests/loadparm.c torture_assert(tctx, lp_ctx != NULL, "lp_ctx");
tctx 32 source4/param/tests/loadparm.c static bool test_set_option(struct torture_context *tctx)
tctx 34 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 35 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "workgroup=werkgroep"), "lp_set_option failed");
tctx 36 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, "WERKGROEP", lp_workgroup(lp_ctx), "workgroup");
tctx 40 source4/param/tests/loadparm.c static bool test_set_cmdline(struct torture_context *tctx)
tctx 42 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 43 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_cmdline(lp_ctx, "workgroup", "werkgroep"), "lp_set_cmdline failed");
tctx 44 source4/param/tests/loadparm.c torture_assert(tctx, lp_do_global_parameter(lp_ctx, "workgroup", "barbla"), "lp_set_option failed");
tctx 45 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, "WERKGROEP", lp_workgroup(lp_ctx), "workgroup");
tctx 49 source4/param/tests/loadparm.c static bool test_do_global_parameter(struct torture_context *tctx)
tctx 51 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 52 source4/param/tests/loadparm.c torture_assert(tctx, lp_do_global_parameter(lp_ctx, "workgroup", "werkgroep42"),
tctx 54 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, lp_workgroup(lp_ctx), "WERKGROEP42", "workgroup");
tctx 59 source4/param/tests/loadparm.c static bool test_do_global_parameter_var(struct torture_context *tctx)
tctx 61 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 62 source4/param/tests/loadparm.c torture_assert(tctx, lp_do_global_parameter_var(lp_ctx, "workgroup", "werk%s%d", "groep", 42),
tctx 64 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, lp_workgroup(lp_ctx), "WERKGROEP42", "workgroup");
tctx 69 source4/param/tests/loadparm.c static bool test_set_option_invalid(struct torture_context *tctx)
tctx 71 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 72 source4/param/tests/loadparm.c torture_assert(tctx, !lp_set_option(lp_ctx, "workgroup"), "lp_set_option succeeded");
tctx 76 source4/param/tests/loadparm.c static bool test_set_option_parametric(struct torture_context *tctx)
tctx 78 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 79 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=blaat"), "lp_set_option failed");
tctx 80 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, lp_parm_string(lp_ctx, NULL, "some", "thing"), "blaat",
tctx 85 source4/param/tests/loadparm.c static bool test_lp_parm_double(struct torture_context *tctx)
tctx 87 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 88 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=3.4"), "lp_set_option failed");
tctx 89 source4/param/tests/loadparm.c torture_assert(tctx, lp_parm_double(lp_ctx, NULL, "some", "thing", 2.0) == 3.4,
tctx 91 source4/param/tests/loadparm.c torture_assert(tctx, lp_parm_double(lp_ctx, NULL, "some", "bla", 2.0) == 2.0,
tctx 96 source4/param/tests/loadparm.c static bool test_lp_parm_bool(struct torture_context *tctx)
tctx 98 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 99 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=true"), "lp_set_option failed");
tctx 100 source4/param/tests/loadparm.c torture_assert(tctx, lp_parm_bool(lp_ctx, NULL, "some", "thing", false) == true,
tctx 102 source4/param/tests/loadparm.c torture_assert(tctx, lp_parm_bool(lp_ctx, NULL, "some", "bla", true) == true,
tctx 107 source4/param/tests/loadparm.c static bool test_lp_parm_int(struct torture_context *tctx)
tctx 109 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 110 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=34"), "lp_set_option failed");
tctx 111 source4/param/tests/loadparm.c torture_assert_int_equal(tctx, lp_parm_int(lp_ctx, NULL, "some", "thing", 20), 34,
tctx 113 source4/param/tests/loadparm.c torture_assert_int_equal(tctx, lp_parm_int(lp_ctx, NULL, "some", "bla", 42), 42,
tctx 118 source4/param/tests/loadparm.c static bool test_lp_parm_bytes(struct torture_context *tctx)
tctx 120 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 121 source4/param/tests/loadparm.c torture_assert(tctx, lp_set_option(lp_ctx, "some:thing=16K"), "lp_set_option failed");
tctx 122 source4/param/tests/loadparm.c torture_assert_int_equal(tctx, lp_parm_bytes(lp_ctx, NULL, "some", "thing", 20), 16 * 1024,
tctx 124 source4/param/tests/loadparm.c torture_assert_int_equal(tctx, lp_parm_bytes(lp_ctx, NULL, "some", "bla", 42), 42,
tctx 129 source4/param/tests/loadparm.c static bool test_lp_do_service_parameter(struct torture_context *tctx)
tctx 131 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 133 source4/param/tests/loadparm.c torture_assert(tctx, lp_do_service_parameter(lp_ctx, service,
tctx 135 source4/param/tests/loadparm.c torture_assert_str_equal(tctx, lp_parm_string(lp_ctx, service, "some", "thing"), "foo",
tctx 140 source4/param/tests/loadparm.c static bool test_lp_service(struct torture_context *tctx)
tctx 142 source4/param/tests/loadparm.c struct loadparm_context *lp_ctx = loadparm_init(tctx);
tctx 144 source4/param/tests/loadparm.c torture_assert(tctx, service == lp_service(lp_ctx, "foo"), "invalid service");
tctx 27 source4/param/tests/share.c static bool test_list_empty(struct torture_context *tctx,
tctx 35 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, share_list_all(tctx, ctx, &count, &names),
tctx 41 source4/param/tests/share.c static bool test_create(struct torture_context *tctx,
tctx 59 source4/param/tests/share.c torture_skip(tctx, "Not supported by backend");
tctx 61 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, status, "create_share failed");
tctx 63 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, share_list_all(tctx, ctx, &count, &names),
tctx 66 source4/param/tests/share.c torture_assert(tctx, count >= 1, "creating share failed");
tctx 73 source4/param/tests/share.c torture_assert(tctx, found, "created share found");
tctx 79 source4/param/tests/share.c static bool test_create_invalid(struct torture_context *tctx,
tctx 89 source4/param/tests/share.c torture_skip(tctx, "Not supported by backend");
tctx 91 source4/param/tests/share.c torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER,
tctx 95 source4/param/tests/share.c torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER,
tctx 102 source4/param/tests/share.c static bool test_share_remove_invalid(struct torture_context *tctx,
tctx 112 source4/param/tests/share.c torture_skip(tctx, "Not supported by backend");
tctx 114 source4/param/tests/share.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_UNSUCCESSFUL, "remove fails");
tctx 121 source4/param/tests/share.c static bool test_share_remove(struct torture_context *tctx,
tctx 135 source4/param/tests/share.c torture_skip(tctx, "Not supported by backend");
tctx 137 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, status, "create_share failed");
tctx 139 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, share_remove(ctx, "blie"), "remove failed");
tctx 144 source4/param/tests/share.c static bool test_double_create(struct torture_context *tctx,
tctx 158 source4/param/tests/share.c torture_skip(tctx, "Not supported by backend");
tctx 160 source4/param/tests/share.c torture_assert_ntstatus_ok(tctx, status, "create_share failed");
tctx 162 source4/param/tests/share.c torture_assert_ntstatus_equal(tctx, NT_STATUS_OBJECT_NAME_COLLISION,
tctx 183 source4/param/tests/share.c static bool setup_ldb(struct torture_context *tctx, void **data)
tctx 185 source4/param/tests/share.c return NT_STATUS_IS_OK(share_get_context_by_name(tctx, "ldb", tctx->ev, tctx->lp_ctx, (struct share_context **)data));
tctx 188 source4/param/tests/share.c static bool setup_classic(struct torture_context *tctx, void **data)
tctx 190 source4/param/tests/share.c return NT_STATUS_IS_OK(share_get_context_by_name(tctx, "classic", tctx->ev, tctx->lp_ctx, (struct share_context **)data));
tctx 193 source4/param/tests/share.c static bool teardown(struct torture_context *tctx, void *data)
tctx 28 source4/torture/auth/ntlmssp.c static bool torture_ntlmssp_self_check(struct torture_context *tctx)
tctx 34 source4/torture/auth/ntlmssp.c TALLOC_CTX *mem_ctx = tctx;
tctx 36 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx,
tctx 38 source4/torture/auth/ntlmssp.c tctx->ev, lp_gensec_settings(tctx, tctx->lp_ctx)),
tctx 46 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx,
tctx 52 source4/torture/auth/ntlmssp.c gensec_ntlmssp_state->session_key = strhex_to_data_blob(tctx, "0102030405060708090a0b0c0d0e0f00");
tctx 59 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx,
tctx 63 source4/torture/auth/ntlmssp.c data = strhex_to_data_blob(tctx, "6a43494653");
tctx 67 source4/torture/auth/ntlmssp.c expected_sig = strhex_to_data_blob(tctx, "01000000e37f97f2544f4d7e00000000");
tctx 72 source4/torture/auth/ntlmssp.c torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
tctx 74 source4/torture/auth/ntlmssp.c torture_assert_mem_equal(tctx, sig.data, expected_sig.data, sig.length,
tctx 77 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_equal(tctx,
tctx 84 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_equal(tctx,
tctx 91 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx,
tctx 93 source4/torture/auth/ntlmssp.c tctx->ev, lp_gensec_settings(tctx, tctx->lp_ctx)),
tctx 101 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx,
tctx 107 source4/torture/auth/ntlmssp.c gensec_ntlmssp_state->session_key = strhex_to_data_blob(tctx, "0102030405e538b0");
tctx 114 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_ok(tctx,
tctx 118 source4/torture/auth/ntlmssp.c data = strhex_to_data_blob(tctx, "6a43494653");
tctx 122 source4/torture/auth/ntlmssp.c expected_sig = strhex_to_data_blob(tctx, "0100000078010900397420fe0e5a0f89");
tctx 127 source4/torture/auth/ntlmssp.c torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
tctx 129 source4/torture/auth/ntlmssp.c torture_assert_mem_equal(tctx, sig.data+8, expected_sig.data+8, sig.length-8,
tctx 132 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_equal(tctx,
tctx 139 source4/torture/auth/ntlmssp.c torture_assert_ntstatus_equal(tctx,
tctx 33 source4/torture/auth/pac.c static bool torture_pac_self_check(struct torture_context *tctx)
tctx 57 source4/torture/auth/pac.c TALLOC_CTX *mem_ctx = tctx;
tctx 59 source4/torture/auth/pac.c torture_assert(tctx, 0 == smb_krb5_init_context(mem_ctx,
tctx 61 source4/torture/auth/pac.c tctx->lp_ctx,
tctx 72 source4/torture/auth/pac.c torture_assert(tctx, !ret, talloc_asprintf(tctx,
tctx 88 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 93 source4/torture/auth/pac.c nt_status = auth_anonymous_server_info(mem_ctx, lp_netbios_name(tctx->lp_ctx), &server_info);
tctx 100 source4/torture/auth/pac.c torture_fail(tctx, "auth_anonymous_server_info");
tctx 112 source4/torture/auth/pac.c torture_fail(tctx, "krb5_parse_name_flags(norealm)");
tctx 117 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 134 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 144 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 161 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 168 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 182 source4/torture/auth/pac.c torture_fail(tctx,
tctx 183 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 192 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 210 source4/torture/auth/pac.c torture_fail(tctx,
tctx 211 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 230 source4/torture/auth/pac.c torture_fail(tctx,
tctx 231 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 238 source4/torture/auth/pac.c torture_fail(tctx,
tctx 239 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 295 source4/torture/auth/pac.c static bool torture_pac_saved_check(struct torture_context *tctx)
tctx 318 source4/torture/auth/pac.c TALLOC_CTX *mem_ctx = tctx;
tctx 320 source4/torture/auth/pac.c torture_assert(tctx, 0 == smb_krb5_init_context(mem_ctx, NULL,
tctx 321 source4/torture/auth/pac.c tctx->lp_ctx,
tctx 325 source4/torture/auth/pac.c pac_kdc_key = torture_setting_string(tctx, "pac_kdc_key",
tctx 328 source4/torture/auth/pac.c pac_member_key = torture_setting_string(tctx, "pac_member_key",
tctx 331 source4/torture/auth/pac.c torture_comment(tctx, "Using pac_kdc_key '%s'\n", pac_kdc_key);
tctx 332 source4/torture/auth/pac.c torture_comment(tctx, "Using pac_member_key '%s'\n", pac_member_key);
tctx 342 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) Could not interpret krbtgt key");
tctx 348 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) Could not interpret krbsrv key");
tctx 355 source4/torture/auth/pac.c torture_assert(tctx, !ret,
tctx 356 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 369 source4/torture/auth/pac.c torture_fail(tctx,
tctx 370 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 380 source4/torture/auth/pac.c pac_file = torture_setting_string(tctx, "pac_file", NULL);
tctx 383 source4/torture/auth/pac.c torture_comment(tctx, "(saved test) Loaded pac of size %ld from %s\n", (long)tmp_blob.length, pac_file);
tctx 390 source4/torture/auth/pac.c principal_string = torture_setting_string(tctx, "pac_client_principal",
tctx 393 source4/torture/auth/pac.c authtime_string = torture_setting_string(tctx, "pac_authtime", "1120440609");
tctx 403 source4/torture/auth/pac.c torture_fail(tctx,
tctx 404 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 412 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 426 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 433 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 445 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 460 source4/torture/auth/pac.c torture_fail(tctx,
tctx 461 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 471 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 486 source4/torture/auth/pac.c torture_fail(tctx,
tctx 487 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 504 source4/torture/auth/pac.c torture_fail(tctx,
tctx 505 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 520 source4/torture/auth/pac.c torture_fail(tctx,
tctx 521 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 528 source4/torture/auth/pac.c torture_comment(tctx, "skipping PAC encoding tests as non kdc key\n");
tctx 536 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 550 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) PAC push failed");
tctx 566 source4/torture/auth/pac.c torture_fail(tctx,
tctx 567 source4/torture/auth/pac.c talloc_asprintf(tctx,
tctx 584 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx, "(saved test) PAC push failed: length[%u] matches, but data does not", (unsigned)tmp_blob.length));
tctx 588 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 603 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) regnerated PAC create failed");
tctx 614 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), &pac_data2,
tctx 617 source4/torture/auth/pac.c torture_assert_ntstatus_ok(tctx, nt_status, "can't parse the PAC");
tctx 629 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 636 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx), &pac_data2,
tctx 639 source4/torture/auth/pac.c torture_assert_ntstatus_ok(tctx, nt_status, "can't parse the PAC");
tctx 656 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 662 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 677 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) PAC decoding DID NOT fail on broken auth time (time + 1)");
tctx 694 source4/torture/auth/pac.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 700 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 713 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) PAC decoding DID NOT fail on modified principal");
tctx 720 source4/torture/auth/pac.c lp_iconv_convenience(tctx->lp_ctx),
tctx 733 source4/torture/auth/pac.c torture_fail(tctx, "(saved test) PAC decoding DID NOT fail on broken checksum");
tctx 37 source4/torture/basic/aliases.c static bool gen_aliases(struct torture_context *tctx,
tctx 51 source4/torture/basic/aliases.c status = smb_raw_trans2(cli->tree, tctx, t2);
tctx 54 source4/torture/basic/aliases.c t2b = talloc(tctx, struct trans2_blobs);
tctx 59 source4/torture/basic/aliases.c torture_comment(tctx,
tctx 66 source4/torture/basic/aliases.c torture_comment(tctx, "Found %d levels with success status\n", count);
tctx 73 source4/torture/basic/aliases.c torture_comment(tctx,
tctx 81 source4/torture/basic/aliases.c torture_comment(tctx, "Found %d aliased levels\n", alias_count);
tctx 87 source4/torture/basic/aliases.c static bool qfsinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli)
tctx 99 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 2);
tctx 103 source4/torture/basic/aliases.c return gen_aliases(tctx, cli, &t2, 0);
tctx 107 source4/torture/basic/aliases.c static bool qfileinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli)
tctx 121 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 4);
tctx 127 source4/torture/basic/aliases.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx,
tctx 135 source4/torture/basic/aliases.c if (!gen_aliases(tctx, cli, &t2, 2))
tctx 146 source4/torture/basic/aliases.c static bool qpathinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli)
tctx 160 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 6);
tctx 166 source4/torture/basic/aliases.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx,
tctx 175 source4/torture/basic/aliases.c smbcli_blob_append_string(cli->session, tctx, &t2.in.params,
tctx 178 source4/torture/basic/aliases.c if (!gen_aliases(tctx, cli, &t2, 0))
tctx 188 source4/torture/basic/aliases.c static bool findfirst_aliases(struct torture_context *tctx, struct smbcli_state *cli)
tctx 202 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 12);
tctx 208 source4/torture/basic/aliases.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx,
tctx 221 source4/torture/basic/aliases.c smbcli_blob_append_string(cli->session, tctx, &t2.in.params,
tctx 224 source4/torture/basic/aliases.c if (!gen_aliases(tctx, cli, &t2, 6))
tctx 235 source4/torture/basic/aliases.c static bool gen_set_aliases(struct torture_context *tctx,
tctx 254 source4/torture/basic/aliases.c status = smb_raw_trans2(cli->tree, tctx, t2);
tctx 274 source4/torture/basic/aliases.c torture_comment(tctx, "level=%d size=%d %s\n", level, dsize, nt_errstr(status));
tctx 282 source4/torture/basic/aliases.c t2b = talloc(tctx, struct trans2_blobs);
tctx 287 source4/torture/basic/aliases.c torture_comment(tctx,
tctx 294 source4/torture/basic/aliases.c torture_comment(tctx, "Found %d valid levels\n", count);
tctx 302 source4/torture/basic/aliases.c static bool setfileinfo_aliases(struct torture_context *tctx, struct smbcli_state *cli)
tctx 316 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 6);
tctx 322 source4/torture/basic/aliases.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx,
tctx 331 source4/torture/basic/aliases.c gen_set_aliases(tctx, cli, &t2, 2);
tctx 340 source4/torture/basic/aliases.c static bool setpathinfo_aliases(struct torture_context *tctx,
tctx 355 source4/torture/basic/aliases.c t2.in.params = data_blob_talloc_zero(tctx, 4);
tctx 362 source4/torture/basic/aliases.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx,
tctx 371 source4/torture/basic/aliases.c smbcli_blob_append_string(cli->session, tctx, &t2.in.params,
tctx 374 source4/torture/basic/aliases.c if (!gen_set_aliases(tctx, cli, &t2, 0))
tctx 377 source4/torture/basic/aliases.c torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli->tree, fname),
tctx 378 source4/torture/basic/aliases.c talloc_asprintf(tctx, "unlink: %s", smbcli_errstr(cli->tree)));
tctx 89 source4/torture/basic/attr.c bool torture_openattrtest(struct torture_context *tctx,
tctx 106 source4/torture/basic/attr.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open %d (1) of %s failed (%s)", i,
tctx 109 source4/torture/basic/attr.c torture_assert_ntstatus_ok(tctx,
tctx 111 source4/torture/basic/attr.c talloc_asprintf(tctx, "close %d (1) of %s failed (%s)", i, fname,
tctx 125 source4/torture/basic/attr.c torture_comment(tctx, "[%d] trunc open 0x%x -> 0x%x of %s failed - should have succeeded !(%s)\n",
tctx 132 source4/torture/basic/attr.c torture_assert_ntstatus_equal(tctx,
tctx 134 source4/torture/basic/attr.c talloc_asprintf(tctx, "[%d] trunc open 0x%x -> 0x%x failed with wrong error code %s",
tctx 139 source4/torture/basic/attr.c torture_comment(tctx, "[%d] trunc open 0x%x -> 0x%x failed\n", k, open_attrs_table[i], open_attrs_table[j]);
tctx 145 source4/torture/basic/attr.c torture_assert_ntstatus_ok(tctx,
tctx 147 source4/torture/basic/attr.c talloc_asprintf(tctx, "close %d (2) of %s failed (%s)", j,
tctx 150 source4/torture/basic/attr.c torture_assert_ntstatus_ok(tctx,
tctx 152 source4/torture/basic/attr.c talloc_asprintf(tctx, "getatr(2) failed (%s)", smbcli_errstr(cli1->tree)));
tctx 155 source4/torture/basic/attr.c torture_comment(tctx, "[%d] getatr check [0x%x] trunc [0x%x] got attr 0x%x\n",
tctx 164 source4/torture/basic/attr.c torture_comment(tctx, "[%d] getatr check failed. [0x%x] trunc [0x%x] got attr 0x%x, should be 0x%x\n",
tctx 39 source4/torture/basic/base.c static struct smbcli_state *open_nbt_connection(struct torture_context *tctx)
tctx 43 source4/torture/basic/base.c const char *host = torture_setting_string(tctx, "host", NULL);
tctx 46 source4/torture/basic/base.c make_nbt_name_client(&calling, lp_netbios_name(tctx->lp_ctx));
tctx 52 source4/torture/basic/base.c torture_comment(tctx, "Failed initialize smbcli_struct to connect with %s\n", host);
tctx 56 source4/torture/basic/base.c lp_smbcli_options(tctx->lp_ctx, &options);
tctx 58 source4/torture/basic/base.c if (!smbcli_socket_connect(cli, host, lp_smb_ports(tctx->lp_ctx), tctx->ev,
tctx 59 source4/torture/basic/base.c lp_resolve_context(tctx->lp_ctx), &options,
tctx 60 source4/torture/basic/base.c lp_iconv_convenience(tctx->lp_ctx),
tctx 61 source4/torture/basic/base.c lp_socket_options(tctx->lp_ctx))) {
tctx 62 source4/torture/basic/base.c torture_comment(tctx, "Failed to connect with %s\n", host);
tctx 67 source4/torture/basic/base.c torture_comment(tctx, "%s rejected the session\n",host);
tctx 78 source4/torture/basic/base.c static bool tcon_devtest(struct torture_context *tctx,
tctx 84 source4/torture/basic/base.c const char *password = torture_setting_string(tctx, "password", NULL);
tctx 89 source4/torture/basic/base.c torture_comment(tctx, "Trying share %s with devtype %s\n", myshare, devtype);
tctx 93 source4/torture/basic/base.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 101 source4/torture/basic/base.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 109 source4/torture/basic/base.c torture_fail(tctx, "Returned unexpected error");
tctx 122 source4/torture/basic/base.c static bool run_fdpasstest(struct torture_context *tctx,
tctx 132 source4/torture/basic/base.c torture_comment(tctx, "Opening a file on connection 1\n");
tctx 135 source4/torture/basic/base.c torture_assert(tctx, fnum1 != -1,
tctx 136 source4/torture/basic/base.c talloc_asprintf(tctx,
tctx 139 source4/torture/basic/base.c torture_comment(tctx, "writing to file on connection 1\n");
tctx 141 source4/torture/basic/base.c torture_assert(tctx,
tctx 143 source4/torture/basic/base.c talloc_asprintf(tctx,
tctx 151 source4/torture/basic/base.c torture_comment(tctx, "reading from file on connection 2\n");
tctx 153 source4/torture/basic/base.c torture_assert(tctx, smbcli_read(cli2->tree, fnum1, buf, 0, 13) != 13,
tctx 154 source4/torture/basic/base.c talloc_asprintf(tctx,
tctx 168 source4/torture/basic/base.c static bool run_attrtest(struct torture_context *tctx,
tctx 182 source4/torture/basic/base.c torture_comment(tctx, "getatr failed (%s)\n", smbcli_errstr(cli->tree));
tctx 186 source4/torture/basic/base.c torture_comment(tctx, "New file time is %s", ctime(&t));
tctx 189 source4/torture/basic/base.c torture_comment(tctx, "ERROR: SMBgetatr bug. time is %s",
tctx 197 source4/torture/basic/base.c torture_comment(tctx, "Setting file time to %s", ctime(&t2));
tctx 200 source4/torture/basic/base.c torture_comment(tctx, "setatr failed (%s)\n", smbcli_errstr(cli->tree));
tctx 205 source4/torture/basic/base.c torture_comment(tctx, "getatr failed (%s)\n", smbcli_errstr(cli->tree));
tctx 209 source4/torture/basic/base.c torture_comment(tctx, "Retrieved file time as %s", ctime(&t));
tctx 212 source4/torture/basic/base.c torture_comment(tctx, "ERROR: getatr/setatr bug. times are\n%s",
tctx 214 source4/torture/basic/base.c torture_comment(tctx, "%s", ctime(&t2));
tctx 226 source4/torture/basic/base.c static bool run_trans2test(struct torture_context *tctx,
tctx 240 source4/torture/basic/base.c torture_comment(tctx, "Testing qfileinfo\n");
tctx 246 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qfileinfo failed (%s)\n", smbcli_errstr(cli->tree));
tctx 250 source4/torture/basic/base.c torture_comment(tctx, "Testing NAME_INFO\n");
tctx 253 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qfilename failed (%s)\n", smbcli_errstr(cli->tree));
tctx 258 source4/torture/basic/base.c torture_comment(tctx, "qfilename gave different name? [%s] [%s]\n",
tctx 269 source4/torture/basic/base.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli->tree));
tctx 274 source4/torture/basic/base.c torture_comment(tctx, "Checking for sticky create times\n");
tctx 277 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qpathinfo failed (%s)\n", smbcli_errstr(cli->tree));
tctx 281 source4/torture/basic/base.c torture_comment(tctx, "create time=%s", ctime(&c_time));
tctx 282 source4/torture/basic/base.c torture_comment(tctx, "modify time=%s", ctime(&m_time));
tctx 283 source4/torture/basic/base.c torture_comment(tctx, "This system appears to have sticky create times\n");
tctx 286 source4/torture/basic/base.c torture_comment(tctx, "access time=%s", ctime(&a_time));
tctx 287 source4/torture/basic/base.c torture_comment(tctx, "This system appears to set a midnight access time\n");
tctx 292 source4/torture/basic/base.c torture_comment(tctx, "ERROR: totally incorrect times - maybe word reversed? mtime=%s", ctime(&m_time));
tctx 303 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qpathinfo2 failed (%s)\n", smbcli_errstr(cli->tree));
tctx 307 source4/torture/basic/base.c torture_comment(tctx, "write time=%s", ctime(&w_time));
tctx 308 source4/torture/basic/base.c torture_comment(tctx, "This system appears to set a initial 0 write time\n");
tctx 319 source4/torture/basic/base.c torture_comment(tctx, "ERROR: mkdir failed (%s)\n", smbcli_errstr(cli->tree));
tctx 324 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qpathinfo2 failed (%s)\n", smbcli_errstr(cli->tree));
tctx 333 source4/torture/basic/base.c torture_comment(tctx, "ERROR: qpathinfo2 failed (%s)\n", smbcli_errstr(cli->tree));
tctx 337 source4/torture/basic/base.c torture_comment(tctx, "This system does not update directory modification times\n");
tctx 348 source4/torture/basic/base.c static bool run_negprot_nowait(struct torture_context *tctx)
tctx 354 source4/torture/basic/base.c torture_comment(tctx, "starting negprot nowait test\n");
tctx 356 source4/torture/basic/base.c cli = open_nbt_connection(tctx);
tctx 361 source4/torture/basic/base.c torture_comment(tctx, "Filling send buffer\n");
tctx 365 source4/torture/basic/base.c req = smb_raw_negotiate_send(cli->transport, lp_unicode(tctx->lp_ctx), PROTOCOL_NT1);
tctx 369 source4/torture/basic/base.c torture_comment(tctx, "Failed to fill pipe packet[%d] - %s (ignored)\n", i+1, nt_errstr(req->status));
tctx 372 source4/torture/basic/base.c torture_comment(tctx, "Failed to fill pipe - %s \n", nt_errstr(req->status));
tctx 379 source4/torture/basic/base.c torture_comment(tctx, "Opening secondary connection\n");
tctx 380 source4/torture/basic/base.c if (!torture_open_connection(&cli2, tctx, 1)) {
tctx 381 source4/torture/basic/base.c torture_comment(tctx, "Failed to open secondary connection\n");
tctx 386 source4/torture/basic/base.c torture_comment(tctx, "Failed to close secondary connection\n");
tctx 399 source4/torture/basic/base.c static bool run_tcon_test(struct torture_context *tctx, struct smbcli_state *cli)
tctx 408 source4/torture/basic/base.c const char *host = torture_setting_string(tctx, "host", NULL);
tctx 409 source4/torture/basic/base.c const char *share = torture_setting_string(tctx, "share", NULL);
tctx 410 source4/torture/basic/base.c const char *password = torture_setting_string(tctx, "password", NULL);
tctx 413 source4/torture/basic/base.c torture_comment(tctx, "unlink of %s failed (%s)\n", fname, smbcli_errstr(cli->tree));
tctx 418 source4/torture/basic/base.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli->tree));
tctx 427 source4/torture/basic/base.c torture_comment(tctx, "initial write failed (%s)\n", smbcli_errstr(cli->tree));
tctx 433 source4/torture/basic/base.c torture_comment(tctx, "%s refused 2nd tree connect (%s)\n", host,
tctx 447 source4/torture/basic/base.c torture_comment(tctx, "* server allows write with wrong TID\n");
tctx 450 source4/torture/basic/base.c torture_comment(tctx, "server fails write with wrong TID : %s\n", smbcli_errstr(cli->tree));
tctx 458 source4/torture/basic/base.c torture_comment(tctx, "* server allows write with invalid TID\n");
tctx 461 source4/torture/basic/base.c torture_comment(tctx, "server fails write with invalid TID : %s\n", smbcli_errstr(cli->tree));
tctx 469 source4/torture/basic/base.c torture_comment(tctx, "* server allows write with invalid VUID\n");
tctx 472 source4/torture/basic/base.c torture_comment(tctx, "server fails write with invalid VUID : %s\n", smbcli_errstr(cli->tree));
tctx 479 source4/torture/basic/base.c torture_comment(tctx, "close failed (%s)\n", smbcli_errstr(cli->tree));
tctx 486 source4/torture/basic/base.c torture_comment(tctx, "secondary tdis failed (%s)\n", smbcli_errstr(cli->tree));
tctx 501 source4/torture/basic/base.c static bool run_tcon_devtype_test(struct torture_context *tctx,
tctx 504 source4/torture/basic/base.c const char *share = torture_setting_string(tctx, "share", NULL);
tctx 506 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, "IPC$", "A:", NT_STATUS_BAD_DEVICE_TYPE))
tctx 509 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, "IPC$", "?????", NT_STATUS_OK))
tctx 512 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, "IPC$", "LPT:", NT_STATUS_BAD_DEVICE_TYPE))
tctx 515 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, "IPC$", "IPC", NT_STATUS_OK))
tctx 518 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, "IPC$", "FOOBA", NT_STATUS_BAD_DEVICE_TYPE))
tctx 521 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, share, "A:", NT_STATUS_OK))
tctx 524 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, share, "?????", NT_STATUS_OK))
tctx 527 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, share, "LPT:", NT_STATUS_BAD_DEVICE_TYPE))
tctx 530 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, share, "IPC", NT_STATUS_BAD_DEVICE_TYPE))
tctx 533 source4/torture/basic/base.c if (!tcon_devtest(tctx, cli1, share, "FOOBA", NT_STATUS_BAD_DEVICE_TYPE))
tctx 539 source4/torture/basic/base.c static bool rw_torture2(struct torture_context *tctx,
tctx 551 source4/torture/basic/base.c torture_assert(tctx, smbcli_deltree(c1->tree, lockfname) != -1,
tctx 552 source4/torture/basic/base.c talloc_asprintf(tctx,
tctx 557 source4/torture/basic/base.c torture_assert(tctx, fnum1 != -1,
tctx 558 source4/torture/basic/base.c talloc_asprintf(tctx,
tctx 563 source4/torture/basic/base.c torture_assert(tctx, fnum2 != -1,
tctx 564 source4/torture/basic/base.c talloc_asprintf(tctx,
tctx 568 source4/torture/basic/base.c torture_comment(tctx, "Checking data integrity over %d ops\n",
tctx 575 source4/torture/basic/base.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 576 source4/torture/basic/base.c torture_comment(tctx, "%d\r", i); fflush(stdout);
tctx 583 source4/torture/basic/base.c torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(c1->tree));
tctx 584 source4/torture/basic/base.c torture_comment(tctx, "wrote %d, expected %d\n", (int)bytes_written, (int)buf_size);
tctx 590 source4/torture/basic/base.c torture_comment(tctx, "read failed (%s)\n", smbcli_errstr(c2->tree));
tctx 591 source4/torture/basic/base.c torture_comment(tctx, "read %d, expected %d\n", (int)bytes_read, (int)buf_size);
tctx 596 source4/torture/basic/base.c torture_assert_mem_equal(tctx, buf_rd, buf, buf_size,
tctx 600 source4/torture/basic/base.c torture_assert_ntstatus_ok(tctx, smbcli_close(c2->tree, fnum2),
tctx 601 source4/torture/basic/base.c talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(c2->tree)));
tctx 602 source4/torture/basic/base.c torture_assert_ntstatus_ok(tctx, smbcli_close(c1->tree, fnum1),
tctx 603 source4/torture/basic/base.c talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(c1->tree)));
tctx 605 source4/torture/basic/base.c torture_assert_ntstatus_ok(tctx, smbcli_unlink(c1->tree, lockfname),
tctx 606 source4/torture/basic/base.c talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(c1->tree)));
tctx 608 source4/torture/basic/base.c torture_comment(tctx, "\n");
tctx 615 source4/torture/basic/base.c static bool run_readwritetest(struct torture_context *tctx,
tctx 619 source4/torture/basic/base.c torture_comment(tctx, "Running readwritetest v1\n");
tctx 620 source4/torture/basic/base.c if (!rw_torture2(tctx, cli1, cli2))
tctx 623 source4/torture/basic/base.c torture_comment(tctx, "Running readwritetest v2\n");
tctx 625 source4/torture/basic/base.c if (!rw_torture2(tctx, cli1, cli1))
tctx 634 source4/torture/basic/base.c static bool run_deferopen(struct torture_context *tctx, struct smbcli_state *cli, int dummy)
tctx 644 source4/torture/basic/base.c nsec = torture_setting_int(tctx, "sharedelay", 1000000);
tctx 649 source4/torture/basic/base.c torture_comment(tctx, "failed to connect\n");
tctx 653 source4/torture/basic/base.c torture_comment(tctx, "Testing deferred open requests.\n");
tctx 672 source4/torture/basic/base.c torture_comment(tctx,"Timing incorrect %.2f violation 1 sec == %.2f\n",
tctx 680 source4/torture/basic/base.c torture_comment(tctx,"Failed to open %s, error=%s\n", fname, smbcli_errstr(cli->tree));
tctx 684 source4/torture/basic/base.c torture_comment(tctx, "pid %u open %d\n", (unsigned)getpid(), i);
tctx 689 source4/torture/basic/base.c torture_comment(tctx,"Failed to close %s, error=%s\n", fname, smbcli_errstr(cli->tree));
tctx 698 source4/torture/basic/base.c torture_comment(tctx, "unlink of %s failed (%s)\n", fname, smbcli_errstr(cli->tree));
tctx 703 source4/torture/basic/base.c torture_comment(tctx, "deferred test finished\n");
tctx 711 source4/torture/basic/base.c static bool run_vuidtest(struct torture_context *tctx,
tctx 731 source4/torture/basic/base.c torture_comment(tctx, "Testing qfileinfo with wrong vuid\n");
tctx 736 source4/torture/basic/base.c torture_fail(tctx, "qfileinfo passed with wrong vuid");
tctx 743 source4/torture/basic/base.c torture_fail(tctx, talloc_asprintf(tctx,
tctx 751 source4/torture/basic/base.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum),
tctx 752 source4/torture/basic/base.c talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(cli->tree)));
tctx 762 source4/torture/basic/base.c static bool run_opentest(struct torture_context *tctx, struct smbcli_state *cli1,
tctx 783 source4/torture/basic/base.c torture_comment(tctx, "Error code should be NT_STATUS_OBJECT_NAME_INVALID, was %s for file with %d char\n",
tctx 797 source4/torture/basic/base.c torture_comment(tctx, "Create file with control char names passed.\n");
tctx 804 source4/torture/basic/base.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 809 source4/torture/basic/base.c torture_comment(tctx, "close2 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 814 source4/torture/basic/base.c torture_comment(tctx, "smbcli_setatr failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 821 source4/torture/basic/base.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 831 source4/torture/basic/base.c torture_comment(tctx, "correct error code ERRDOS/ERRnoaccess returned\n");
tctx 834 source4/torture/basic/base.c torture_comment(tctx, "finished open test 1\n");
tctx 844 source4/torture/basic/base.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 853 source4/torture/basic/base.c torture_comment(tctx, "correct error code ERRDOS/ERRbadshare returned\n");
tctx 857 source4/torture/basic/base.c torture_comment(tctx, "close2 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 863 source4/torture/basic/base.c torture_comment(tctx, "finished open test 2\n");
tctx 869 source4/torture/basic/base.c torture_comment(tctx, "(3) open (1) of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 878 source4/torture/basic/base.c torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 883 source4/torture/basic/base.c torture_comment(tctx, "(3) close1 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 889 source4/torture/basic/base.c torture_comment(tctx, "(3) getatr failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 895 source4/torture/basic/base.c torture_comment(tctx, "(3) file size != 20\n");
tctx 904 source4/torture/basic/base.c torture_comment(tctx, "(3) open (2) of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 910 source4/torture/basic/base.c torture_comment(tctx, "close2 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 916 source4/torture/basic/base.c torture_comment(tctx, "(3) getatr failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 922 source4/torture/basic/base.c torture_comment(tctx, "(3) file size != 0\n");
tctx 926 source4/torture/basic/base.c torture_comment(tctx, "finished open test 3\n");
tctx 931 source4/torture/basic/base.c torture_comment(tctx, "testing ctemp\n");
tctx 934 source4/torture/basic/base.c torture_comment(tctx, "ctemp failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 938 source4/torture/basic/base.c torture_comment(tctx, "ctemp gave path %s\n", tmp_path);
tctx 940 source4/torture/basic/base.c torture_comment(tctx, "close of temp failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 943 source4/torture/basic/base.c torture_comment(tctx, "unlink of temp failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 951 source4/torture/basic/base.c torture_comment(tctx, "TEST #1 testing 2 non-io opens (no delete)\n");
tctx 957 source4/torture/basic/base.c torture_comment(tctx, "test 1 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 965 source4/torture/basic/base.c torture_comment(tctx, "test 1 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx 971 source4/torture/basic/base.c torture_comment(tctx, "test 1 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 975 source4/torture/basic/base.c torture_comment(tctx, "test 1 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx 979 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #1 passed.\n");
tctx 983 source4/torture/basic/base.c torture_comment(tctx, "TEST #2 testing 2 non-io opens (first with delete)\n");
tctx 989 source4/torture/basic/base.c torture_comment(tctx, "test 2 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 998 source4/torture/basic/base.c torture_comment(tctx, "test 2 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx 1004 source4/torture/basic/base.c torture_comment(tctx, "test 1 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1008 source4/torture/basic/base.c torture_comment(tctx, "test 1 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1012 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #2 passed.\n");
tctx 1016 source4/torture/basic/base.c torture_comment(tctx, "TEST #3 testing 2 non-io opens (second with delete)\n");
tctx 1022 source4/torture/basic/base.c torture_comment(tctx, "test 3 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1031 source4/torture/basic/base.c torture_comment(tctx, "test 3 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx 1037 source4/torture/basic/base.c torture_comment(tctx, "test 3 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1041 source4/torture/basic/base.c torture_comment(tctx, "test 3 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx 1045 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #3 passed.\n");
tctx 1049 source4/torture/basic/base.c torture_comment(tctx, "TEST #4 testing 2 non-io opens (both with delete)\n");
tctx 1055 source4/torture/basic/base.c torture_comment(tctx, "test 4 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1064 source4/torture/basic/base.c torture_comment(tctx, "test 4 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx 1069 source4/torture/basic/base.c torture_comment(tctx, "test 4 open 2 of %s gave %s (correct error should be %s)\n", fname, smbcli_errstr(cli2->tree), "sharing violation");
tctx 1072 source4/torture/basic/base.c torture_comment(tctx, "test 4 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1076 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #4 passed.\n");
tctx 1080 source4/torture/basic/base.c torture_comment(tctx, "TEST #5 testing 2 non-io opens (both with delete - both with file share delete)\n");
tctx 1086 source4/torture/basic/base.c torture_comment(tctx, "test 5 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1095 source4/torture/basic/base.c torture_comment(tctx, "test 5 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx 1101 source4/torture/basic/base.c torture_comment(tctx, "test 5 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1106 source4/torture/basic/base.c torture_comment(tctx, "test 5 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx 1110 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #5 passed.\n");
tctx 1112 source4/torture/basic/base.c torture_comment(tctx, "TEST #6 testing 1 non-io open, one io open\n");
tctx 1120 source4/torture/basic/base.c torture_comment(tctx, "test 6 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1129 source4/torture/basic/base.c torture_comment(tctx, "test 6 open 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx 1135 source4/torture/basic/base.c torture_comment(tctx, "test 6 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1140 source4/torture/basic/base.c torture_comment(tctx, "test 6 close 2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx 1144 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #6 passed.\n");
tctx 1146 source4/torture/basic/base.c torture_comment(tctx, "TEST #7 testing 1 non-io open, one io open with delete\n");
tctx 1154 source4/torture/basic/base.c torture_comment(tctx, "test 7 open 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1163 source4/torture/basic/base.c torture_comment(tctx, "test 7 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, smbcli_errstr(cli2->tree));
tctx 1168 source4/torture/basic/base.c torture_comment(tctx, "test 7 open 2 of %s gave %s (correct error should be %s)\n", fname, smbcli_errstr(cli2->tree), "sharing violation");
tctx 1171 source4/torture/basic/base.c torture_comment(tctx, "test 7 close 1 of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1175 source4/torture/basic/base.c torture_comment(tctx, "non-io open test #7 passed.\n");
tctx 1179 source4/torture/basic/base.c torture_comment(tctx, "TEST #8 testing one normal open, followed by lock, followed by open with truncate\n");
tctx 1185 source4/torture/basic/base.c torture_comment(tctx, "(8) open (1) of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1194 source4/torture/basic/base.c torture_comment(tctx, "(8) write failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 1200 source4/torture/basic/base.c torture_comment(tctx, "(8) getatr (1) failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 1206 source4/torture/basic/base.c torture_comment(tctx, "(8) file size != 20\n");
tctx 1213 source4/torture/basic/base.c torture_comment(tctx, "(8) lock1 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 1220 source4/torture/basic/base.c torture_comment(tctx, "(8) open (2) of %s with truncate failed (%s)\n", fname, smbcli_errstr(cli1->tree));
tctx 1226 source4/torture/basic/base.c torture_comment(tctx, "(8) getatr (2) failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 1232 source4/torture/basic/base.c torture_comment(tctx, "(8) file size != 0\n");
tctx 1238 source4/torture/basic/base.c torture_comment(tctx, "(8) close1 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 1243 source4/torture/basic/base.c torture_comment(tctx, "(8) close1 failed (%s)\n", smbcli_errstr(cli1->tree));
tctx 1249 source4/torture/basic/base.c torture_comment(tctx, "open test #8 passed.\n");
tctx 1280 source4/torture/basic/base.c static bool run_xcopy(struct torture_context *tctx,
tctx 1293 source4/torture/basic/base.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx,
tctx 1300 source4/torture/basic/base.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx,
tctx 1306 source4/torture/basic/base.c static bool run_iometer(struct torture_context *tctx,
tctx 1319 source4/torture/basic/base.c torture_assert_ntstatus_ok(tctx, status,
tctx 1320 source4/torture/basic/base.c talloc_asprintf(tctx, "smbcli_getatr failed: %s", nt_errstr(status)));
tctx 1322 source4/torture/basic/base.c torture_comment(tctx, "size: %d\n", (int)filesize);
tctx 1328 source4/torture/basic/base.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, "open failed: %s",
tctx 1346 source4/torture/basic/base.c torture_assert(tctx, res == sizeof(buf),
tctx 1347 source4/torture/basic/base.c talloc_asprintf(tctx, "read failed: %s",
tctx 1357 source4/torture/basic/base.c torture_assert(tctx, res == sizeof(buf),
tctx 1358 source4/torture/basic/base.c talloc_asprintf(tctx, "read failed: %s",
tctx 1369 source4/torture/basic/base.c static bool torture_chkpath_test(struct torture_context *tctx,
tctx 1375 source4/torture/basic/base.c torture_comment(tctx, "Testing valid and invalid paths\n");
tctx 1383 source4/torture/basic/base.c torture_comment(tctx, "mkdir1 failed : %s\n", smbcli_errstr(cli->tree));
tctx 1388 source4/torture/basic/base.c torture_comment(tctx, "mkdir2 failed : %s\n", smbcli_errstr(cli->tree));
tctx 1394 source4/torture/basic/base.c torture_comment(tctx, "open1 failed (%s)\n", smbcli_errstr(cli->tree));
tctx 1400 source4/torture/basic/base.c torture_comment(tctx, "chkpath1 failed: %s\n", smbcli_errstr(cli->tree));
tctx 1405 source4/torture/basic/base.c torture_comment(tctx, "chkpath2 failed: %s\n", smbcli_errstr(cli->tree));
tctx 1413 source4/torture/basic/base.c torture_comment(tctx, "* chkpath on a file should fail\n");
tctx 1421 source4/torture/basic/base.c torture_comment(tctx, "* chkpath on a non existent file should fail\n");
tctx 1429 source4/torture/basic/base.c torture_comment(tctx, "* chkpath on a non existent component should fail\n");
tctx 1444 source4/torture/basic/base.c static bool torture_samba3_errorpaths(struct torture_context *tctx)
tctx 1455 source4/torture/basic/base.c nt_status_support = lp_nt_status_support(tctx->lp_ctx);
tctx 1457 source4/torture/basic/base.c if (!lp_set_cmdline(tctx->lp_ctx, "nt status support", "yes")) {
tctx 1458 source4/torture/basic/base.c torture_comment(tctx, "Could not set 'nt status support = yes'\n");
tctx 1462 source4/torture/basic/base.c if (!torture_open_connection(&cli_nt, tctx, 0)) {
tctx 1466 source4/torture/basic/base.c if (!lp_set_cmdline(tctx->lp_ctx, "nt status support", "no")) {
tctx 1467 source4/torture/basic/base.c torture_comment(tctx, "Could not set 'nt status support = yes'\n");
tctx 1471 source4/torture/basic/base.c if (!torture_open_connection(&cli_dos, tctx, 1)) {
tctx 1475 source4/torture/basic/base.c if (!lp_set_cmdline(tctx->lp_ctx, "nt status support",
tctx 1477 source4/torture/basic/base.c torture_comment(tctx, "Could not reset 'nt status support = yes'");
tctx 1485 source4/torture/basic/base.c torture_comment(tctx, "smbcli_mkdir(%s) failed: %s\n", dname,
tctx 1503 source4/torture/basic/base.c status = smb_raw_open(cli_nt->tree, tctx, &io);
tctx 1505 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx 1510 source4/torture/basic/base.c status = smb_raw_open(cli_dos->tree, tctx, &io);
tctx 1512 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx 1520 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx 1527 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx 1544 source4/torture/basic/base.c tctx, "(%s) incorrect status %s should be "
tctx 1552 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s "
tctx 1560 source4/torture/basic/base.c status = smb_raw_open(cli_nt->tree, tctx, &io);
tctx 1562 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx 1568 source4/torture/basic/base.c status = smb_raw_open(cli_dos->tree, tctx, &io);
tctx 1570 source4/torture/basic/base.c torture_comment(tctx, "(%s) incorrect status %s should be %s\n",
tctx 1582 source4/torture/basic/base.c torture_comment(tctx, "Open(%s) with invalid deny mode succeeded -- "
tctx 1589 source4/torture/basic/base.c torture_comment(tctx, "Expected DOS error ERRDOS/ERRbadaccess, "
tctx 1596 source4/torture/basic/base.c torture_comment(tctx, "Open(%s) with invalid deny mode succeeded -- "
tctx 1603 source4/torture/basic/base.c torture_comment(tctx, "Expected DOS error ERRDOS:ERRbadaccess, "
tctx 1641 source4/torture/basic/base.c status = smb_raw_open(cli_nt->tree, tctx, &io);
tctx 1643 source4/torture/basic/base.c torture_comment(tctx, "ntcreate as dir gave %s, "
tctx 1653 source4/torture/basic/base.c status = smb_raw_open(cli_dos->tree, tctx, &io);
tctx 1656 source4/torture/basic/base.c torture_comment(tctx, "ntcreate as dir gave %s, "
tctx 1670 source4/torture/basic/base.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 1678 source4/torture/basic/base.c torture_comment(tctx, "Open(%s) succeeded -- expected failure\n",
tctx 1686 source4/torture/basic/base.c torture_comment(tctx, "Expected DOS error ERRDOS/ERRcannotopen, got %s\n",
tctx 1695 source4/torture/basic/base.c torture_comment(tctx, "Open(%s) succeeded -- expected failure\n",
tctx 1703 source4/torture/basic/base.c torture_comment(tctx, "Expected error NT_STATUS_OBJECT_NAME_NOT_FOUND, "
tctx 36 source4/torture/basic/charset.c static NTSTATUS unicode_open(struct torture_context *tctx,
tctx 59 source4/torture/basic/charset.c if (!convert_string_talloc_convenience(ucs_name, lp_iconv_convenience(tctx->lp_ctx), CH_UTF16, CH_UNIX, ucs_name, (1+u_name_len)*2, (void **)&fname, &i, false)) {
tctx 60 source4/torture/basic/charset.c torture_comment(tctx, "Failed to convert UCS2 Name into unix - convert_string_talloc() failure\n");
tctx 85 source4/torture/basic/charset.c status = smb_raw_open(tree, tctx, &io);
tctx 96 source4/torture/basic/charset.c static bool test_composed(struct torture_context *tctx,
tctx 103 source4/torture/basic/charset.c torture_assert(tctx, torture_setup_dir(cli, BASEDIR),
tctx 106 source4/torture/basic/charset.c status1 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 2);
tctx 107 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status1, "Failed to create composed name");
tctx 109 source4/torture/basic/charset.c status2 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 1);
tctx 111 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status2, "Failed to create accented character");
tctx 119 source4/torture/basic/charset.c static bool test_diacritical(struct torture_context *tctx,
tctx 126 source4/torture/basic/charset.c torture_assert(tctx, torture_setup_dir(cli, BASEDIR),
tctx 129 source4/torture/basic/charset.c status1 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 1);
tctx 131 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status1, "Failed to create naked diacritical");
tctx 134 source4/torture/basic/charset.c status2 = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 2);
tctx 136 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status2, "Failed to create double naked diacritical");
tctx 144 source4/torture/basic/charset.c static bool test_surrogate(struct torture_context *tctx,
tctx 152 source4/torture/basic/charset.c torture_assert(tctx, torture_setup_dir(cli, BASEDIR),
tctx 155 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 1);
tctx 157 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status, "Failed to create partial surrogate 1");
tctx 159 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 1);
tctx 161 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status, "Failed to create partial surrogate 2");
tctx 163 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name3, 2);
tctx 165 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status, "Failed to create full surrogate");
tctx 173 source4/torture/basic/charset.c static bool test_widea(struct torture_context *tctx,
tctx 181 source4/torture/basic/charset.c torture_assert(tctx, torture_setup_dir(cli, BASEDIR),
tctx 184 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name1, 1);
tctx 186 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status, "Failed to create 'a'");
tctx 188 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name2, 1);
tctx 190 source4/torture/basic/charset.c torture_assert_ntstatus_ok(tctx, status, "Failed to create wide-a");
tctx 192 source4/torture/basic/charset.c status = unicode_open(tctx, cli->tree, tctx, NTCREATEX_DISP_CREATE, name3, 1);
tctx 194 source4/torture/basic/charset.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_COLLISION,
tctx 35 source4/torture/basic/delaywrite.c static bool test_delayed_write_update(struct torture_context *tctx, struct smbcli_state *cli)
tctx 45 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 50 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update\n");
tctx 58 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname);
tctx 66 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx 68 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx 70 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n",
tctx 71 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.basic_info.out.write_time));
tctx 80 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 89 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx 96 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 97 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx 101 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds"
tctx 108 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds"
tctx 118 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 132 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1(struct torture_context *tctx, struct smbcli_state *cli)
tctx 142 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 148 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update1\n");
tctx 156 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname);
tctx 174 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx 176 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx 178 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n",
tctx 179 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.all_info.out.write_time));
tctx 185 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 194 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx 203 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 210 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 211 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.all_info.out.write_time));
tctx 215 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SMBwrite truncate "
tctx 223 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SMBwrite truncate "
tctx 234 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 243 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 252 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo3);
tctx 267 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 268 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo3.all_info.out.write_time));
tctx 272 source4/torture/basic/delaywrite.c torture_comment(tctx, "server updated write_time after %.2f seconds"
tctx 282 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 291 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4);
tctx 292 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "pathinfo failed");
tctx 295 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 299 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write time on close (correct)\n");
tctx 313 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1a(struct torture_context *tctx, struct smbcli_state *cli)
tctx 323 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 329 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update1a\n");
tctx 337 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname);
tctx 355 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx 357 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx 359 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n",
tctx 360 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.all_info.out.write_time));
tctx 366 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "write failed - wrote %d bytes (%s)",
tctx 374 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx 377 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s",
tctx 384 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 391 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 392 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.all_info.out.write_time));
tctx 396 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SMBwrite truncate "
tctx 404 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SMBwrite truncate "
tctx 415 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 423 source4/torture/basic/delaywrite.c torture_assert_int_equal(tctx, written, 1,
tctx 429 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo3);
tctx 432 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s\n",
tctx 439 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 446 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 447 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo3.all_info.out.write_time));
tctx 451 source4/torture/basic/delaywrite.c torture_comment(tctx, "server updated write_time after %.2f seconds"
tctx 461 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 470 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4);
tctx 471 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "pathinfo failed");
tctx 474 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 478 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write time on close (correct)\n");
tctx 492 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1b(struct torture_context *tctx, struct smbcli_state *cli)
tctx 502 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 508 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update1b\n");
tctx 516 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname);
tctx 534 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx 536 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx 538 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n",
tctx 539 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.all_info.out.write_time));
tctx 544 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "SET_END_OF_FILE failed");
tctx 549 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx 558 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 565 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 566 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.all_info.out.write_time));
tctx 570 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 579 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SET_END_OF_FILE truncate "
tctx 590 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 598 source4/torture/basic/delaywrite.c torture_assert_int_equal(tctx, written, 1,
tctx 604 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo3);
tctx 607 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 620 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 621 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo3.all_info.out.write_time));
tctx 625 source4/torture/basic/delaywrite.c torture_comment(tctx, "server updated write_time after %.2f seconds"
tctx 635 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Server updated write time (wrong!)\n");
tctx 643 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4);
tctx 644 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "pathinfo failed");
tctx 647 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Server did not update write time on close (wrong!)\n");
tctx 650 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write time on close (correct)\n");
tctx 663 source4/torture/basic/delaywrite.c static bool test_delayed_write_update1c(struct torture_context *tctx, struct smbcli_state *cli)
tctx 674 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 680 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update1c\n");
tctx 688 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Failed to open %s", fname);
tctx 706 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx 708 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx 710 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n",
tctx 711 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.all_info.out.write_time));
tctx 720 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status,
tctx 726 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx 729 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s",
tctx 736 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 743 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 744 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.all_info.out.write_time));
tctx 748 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SET_ALLOCATION_INFO truncate "
tctx 756 source4/torture/basic/delaywrite.c torture_comment(tctx, "After SET_ALLOCATION_INFO truncate "
tctx 767 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 774 source4/torture/basic/delaywrite.c torture_assert_int_equal(tctx, written, 1,
tctx 780 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo3);
tctx 783 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "fileinfo failed: %s",
tctx 790 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "file not expanded");
tctx 795 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 796 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo3.all_info.out.write_time));
tctx 800 source4/torture/basic/delaywrite.c torture_comment(tctx, "server updated write_time after %.2f seconds"
tctx 810 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL,
tctx 819 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli->tree, tctx, &pinfo4);
tctx 820 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "pathinfo failed");
tctx 823 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Server did not update write time on close (wrong!)\n");
tctx 826 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write time on close (correct)\n");
tctx 841 source4/torture/basic/delaywrite.c static bool test_delayed_write_update2(struct torture_context *tctx, struct smbcli_state *cli,
tctx 853 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 859 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update2\n");
tctx 867 source4/torture/basic/delaywrite.c torture_comment(tctx, "Failed to open %s\n", fname);
tctx 875 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx 877 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "fileinfo failed");
tctx 879 source4/torture/basic/delaywrite.c torture_comment(tctx, "Initial write time %s\n",
tctx 880 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.basic_info.out.write_time));
tctx 907 source4/torture/basic/delaywrite.c torture_assert_ntstatus_ok(tctx, status, "sfileinfo failed");
tctx 912 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli2->tree, tctx, &finfo2);
tctx 918 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 919 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx 922 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time (correct)\n");
tctx 924 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Server did not update write time (wrong!)\n");
tctx 934 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx 941 source4/torture/basic/delaywrite.c torture_comment(tctx, "Modified write time %s\n",
tctx 942 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.basic_info.out.write_time));
tctx 945 source4/torture/basic/delaywrite.c torture_comment(tctx, "Doing a 10 byte write to extend the file and see if this changes the last write time.\n");
tctx 950 source4/torture/basic/delaywrite.c torture_comment(tctx, "write failed - wrote %d bytes (%s)\n",
tctx 958 source4/torture/basic/delaywrite.c torture_comment(tctx, "Doing flush after write\n");
tctx 973 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx 980 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 981 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx 984 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds"
tctx 995 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write time (correct)\n");
tctx 1000 source4/torture/basic/delaywrite.c torture_comment(tctx, "Failed to open %s\n", fname);
tctx 1004 source4/torture/basic/delaywrite.c torture_comment(tctx, "Doing a 10 byte write to extend the file via second fd and see if this changes the last write time.\n");
tctx 1009 source4/torture/basic/delaywrite.c torture_comment(tctx, "write failed - wrote %d bytes (%s)\n",
tctx 1014 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx 1020 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 1021 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx 1023 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time (wrong!)\n");
tctx 1027 source4/torture/basic/delaywrite.c torture_comment(tctx, "Closing the first fd to see if write time updated.\n");
tctx 1031 source4/torture/basic/delaywrite.c torture_comment(tctx, "Doing a 10 byte write to extend the file via second fd and see if this changes the last write time.\n");
tctx 1036 source4/torture/basic/delaywrite.c torture_comment(tctx, "write failed - wrote %d bytes (%s)\n",
tctx 1044 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx 1050 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 1051 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx 1053 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time (wrong!)\n");
tctx 1062 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx 1069 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 1070 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx 1073 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 1084 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write time (correct)\n");
tctx 1087 source4/torture/basic/delaywrite.c torture_comment(tctx, "Closing second fd to see if write time updated.\n");
tctx 1094 source4/torture/basic/delaywrite.c torture_comment(tctx, "Failed to open %s\n", fname);
tctx 1102 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx 1109 source4/torture/basic/delaywrite.c torture_comment(tctx, "Second open initial write time %s\n",
tctx 1110 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.basic_info.out.write_time));
tctx 1113 source4/torture/basic/delaywrite.c torture_comment(tctx, "Doing a 10 byte write to extend the file to see if this changes the last write time.\n");
tctx 1118 source4/torture/basic/delaywrite.c torture_comment(tctx, "write failed - wrote %d bytes (%s)\n",
tctx 1126 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx 1132 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 1133 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx 1135 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time (wrong!)\n");
tctx 1143 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo2);
tctx 1150 source4/torture/basic/delaywrite.c torture_comment(tctx, "write time %s\n",
tctx 1151 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx 1155 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds"
tctx 1162 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds"
tctx 1172 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, "Server did not update write time (wrong!)\n");
tctx 1200 source4/torture/basic/delaywrite.c static bool test_finfo_after_write(struct torture_context *tctx, struct smbcli_state *cli,
tctx 1210 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 1215 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_finfo_after_write\n");
tctx 1224 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx 1231 source4/torture/basic/delaywrite.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo1);
tctx 1235 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s", nt_errstr(status));
tctx 1244 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 1251 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": failed to open 2nd time - %s",
tctx 1260 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1",
tctx 1269 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli2->tree, tctx, &finfo2);
tctx 1272 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s",
tctx 1280 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": create_time changed");
tctx 1287 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": access_time changed");
tctx 1294 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": write_time changed:\n"
tctx 1296 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo1.basic_info.out.write_time),
tctx 1297 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo2.basic_info.out.write_time));
tctx 1304 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": change_time changed");
tctx 1321 source4/torture/basic/delaywrite.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo2);
tctx 1324 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s", nt_errstr(status));
tctx 1344 source4/torture/basic/delaywrite.c bool strict = torture_setting_bool(tctx, "strict mode", false); \
tctx 1353 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": wrong write_time (%s)%s(%llu) %s (%s)%s(%llu)", \
tctx 1354 source4/torture/basic/delaywrite.c #given, nt_time_string(tctx, g), (unsigned long long)g, \
tctx 1355 source4/torture/basic/delaywrite.c #cmp, #correct, nt_time_string(tctx, c), (unsigned long long)c); \
tctx 1371 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": wrong access_time (%s)%s %s (%s)%s", \
tctx 1372 source4/torture/basic/delaywrite.c #given, nt_time_string(tctx, g), \
tctx 1373 source4/torture/basic/delaywrite.c #cmp, #correct, nt_time_string(tctx, c)); \
tctx 1388 source4/torture/basic/delaywrite.c _status = smb_raw_fileinfo(cli->tree, tctx, &finfo); \
tctx 1391 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": fileinfo failed: %s", \
tctx 1395 source4/torture/basic/delaywrite.c torture_comment(tctx, "fileinfo: Access(%s) Write(%s)\n", \
tctx 1396 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo.basic_info.out.access_time), \
tctx 1397 source4/torture/basic/delaywrite.c nt_time_string(tctx, finfo.basic_info.out.write_time)); \
tctx 1401 source4/torture/basic/delaywrite.c _status = smb_raw_pathinfo(cli2->tree, tctx, &pinfo); \
tctx 1403 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": pathinfo failed: %s", \
tctx 1408 source4/torture/basic/delaywrite.c torture_comment(tctx, "pathinfo: Access(%s) Write(%s)\n", \
tctx 1409 source4/torture/basic/delaywrite.c nt_time_string(tctx, pinfo.basic_info.out.access_time), \
tctx 1410 source4/torture/basic/delaywrite.c nt_time_string(tctx, pinfo.basic_info.out.write_time)); \
tctx 1430 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": setfileinfo failed: %s", \
tctx 1439 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3(struct torture_context *tctx,
tctx 1451 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 1456 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update3\n");
tctx 1462 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n");
tctx 1466 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx 1496 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 1499 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 1509 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 1516 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 1532 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 1535 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 1544 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 1556 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx 1569 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n");
tctx 1577 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated the write_time on close (correct)\n");
tctx 1594 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3a(struct torture_context *tctx,
tctx 1607 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 1612 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update3a\n");
tctx 1618 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n");
tctx 1622 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx 1662 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 1665 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 1675 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 1682 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 1700 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a truncate SMBwrite [%d] on the file handle\n", i);
tctx 1703 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written);
tctx 1718 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 1721 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 1730 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 1742 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx 1759 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a truncate SMBwrite [%d] on the file handle\n", i);
tctx 1762 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written);
tctx 1781 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n");
tctx 1789 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update the write_time on close (correct)\n");
tctx 1806 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3b(struct torture_context *tctx,
tctx 1818 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 1823 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update3b\n");
tctx 1829 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n");
tctx 1833 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx 1873 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 1876 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 1886 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 1893 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 1909 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 1912 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 1921 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 1933 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx 1946 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n");
tctx 1954 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated the write_time on close (correct)\n");
tctx 1973 source4/torture/basic/delaywrite.c static bool test_delayed_write_update3c(struct torture_context *tctx,
tctx 1986 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 1991 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update3c\n");
tctx 1997 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n");
tctx 2001 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx 2039 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a truncate SMBwrite [%d] on the file handle\n", i);
tctx 2042 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written);
tctx 2056 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 2059 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 2068 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 2080 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx 2097 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a truncate write [%d] on the file handle\n", i);
tctx 2100 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 0", (int)written);
tctx 2121 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 2124 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 2133 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 2145 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx 2158 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n");
tctx 2166 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated the write_time on close (correct)\n");
tctx 2184 source4/torture/basic/delaywrite.c static bool test_delayed_write_update4(struct torture_context *tctx,
tctx 2196 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 2201 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update4\n");
tctx 2207 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n");
tctx 2211 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx 2236 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 2239 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 2261 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 2268 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 2284 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 2287 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 2296 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 2308 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not updatewrite_time (correct)\n");
tctx 2321 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n");
tctx 2329 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated the write_time on close (correct)\n");
tctx 2345 source4/torture/basic/delaywrite.c static bool test_delayed_write_update5(struct torture_context *tctx,
tctx 2357 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 2362 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update5\n");
tctx 2368 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n");
tctx 2372 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx 2396 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 2399 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 2407 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the future on the file handle\n");
tctx 2412 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the past on the file handle\n");
tctx 2427 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 2439 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx 2447 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 2450 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 2459 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 2471 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx 2483 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n");
tctx 2491 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update the write_time on close (correct)\n");
tctx 2507 source4/torture/basic/delaywrite.c static bool test_delayed_write_update5b(struct torture_context *tctx,
tctx 2519 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 2524 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update5b\n");
tctx 2530 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n");
tctx 2534 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx 2558 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 2561 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 2569 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the future on the file handle\n");
tctx 2574 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the past on the file handle\n");
tctx 2589 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 2601 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx 2609 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a truncate write on the file handle\n");
tctx 2612 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 2621 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 2633 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx 2645 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n");
tctx 2653 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update the write_time on close (correct)\n");
tctx 2673 source4/torture/basic/delaywrite.c static bool test_delayed_write_update6(struct torture_context *tctx,
tctx 2686 source4/torture/basic/delaywrite.c int used_delay = torture_setting_int(tctx, "writetimeupdatedelay", 2000000);
tctx 2692 source4/torture/basic/delaywrite.c torture_comment(tctx, "\nRunning test_delayed_write_update6\n");
tctx 2698 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the file handle\n");
tctx 2702 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx 2707 source4/torture/basic/delaywrite.c torture_comment(tctx, "Open the 2nd file handle on 2nd connection\n");
tctx 2711 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": unable to open %s", fname);
tctx 2737 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 2740 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 2748 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the future on the 2nd file handle\n");
tctx 2753 source4/torture/basic/delaywrite.c torture_comment(tctx, "Set write time in the past on the 2nd file handle\n");
tctx 2768 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 2780 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx 2788 source4/torture/basic/delaywrite.c torture_comment(tctx, "Do a write on the file handle\n");
tctx 2791 source4/torture/basic/delaywrite.c torture_result(tctx, TORTURE_FAIL, __location__": written gave %d - should have been 1", (int)written);
tctx 2800 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated write_time after %.2f seconds "
tctx 2812 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update write_time (correct)\n");
tctx 2825 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the file handle\n");
tctx 2833 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server updated the write_time on close (correct)\n");
tctx 2846 source4/torture/basic/delaywrite.c torture_comment(tctx, "Close the 2nd file handle\n");
tctx 2854 source4/torture/basic/delaywrite.c torture_comment(tctx, "Server did not update the write_time on close (correct)\n");
tctx 32 source4/torture/basic/delete.c static bool check_delete_on_close(struct torture_context *tctx,
tctx 44 source4/torture/basic/delete.c status = torture_single_search(cli, tctx,
tctx 50 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status,
tctx 51 source4/torture/basic/delete.c talloc_asprintf(tctx, "single_search failed (%s)", where));
tctx 60 source4/torture/basic/delete.c status = smb_raw_fileinfo(cli->tree, tctx, &io);
tctx 61 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx,
tctx 64 source4/torture/basic/delete.c torture_assert(tctx, expect_it == io.all_info.out.delete_pending,
tctx 65 source4/torture/basic/delete.c talloc_asprintf(tctx,
tctx 69 source4/torture/basic/delete.c torture_assert(tctx, nlink == io.all_info.out.nlink,
tctx 70 source4/torture/basic/delete.c talloc_asprintf(tctx,
tctx 77 source4/torture/basic/delete.c status = smb_raw_fileinfo(cli->tree, tctx, &io);
tctx 78 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "qpathinfo failed (%s)", where));
tctx 80 source4/torture/basic/delete.c torture_assert(tctx, expect_it == io.standard_info.out.delete_pending,
tctx 81 source4/torture/basic/delete.c talloc_asprintf(tctx, "%s - Expected del_on_close flag %d, qfileinfo/standard_info gave %d\n",
tctx 84 source4/torture/basic/delete.c torture_assert(tctx, nlink == io.standard_info.out.nlink,
tctx 85 source4/torture/basic/delete.c talloc_asprintf(tctx, "%s - Expected nlink %d, qfileinfo/standard_info gave %d",
tctx 94 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_DELETE_PENDING,
tctx 97 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status,
tctx 98 source4/torture/basic/delete.c talloc_asprintf(tctx, "qpathinfo failed (%s)", where));
tctx 105 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, _cli->tree->session->transport->error.e.nt_status, _expected, \
tctx 126 source4/torture/basic/delete.c static bool deltest1(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 138 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 141 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 142 source4/torture/basic/delete.c talloc_asprintf(tctx, "close failed (%s)", smbcli_errstr(cli1->tree)));
tctx 145 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail)",
tctx 152 source4/torture/basic/delete.c static bool deltest2(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 163 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1,
tctx 164 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 167 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli1->tree, fnum1, true),
tctx 168 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close failed (%s)",
tctx 171 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 172 source4/torture/basic/delete.c talloc_asprintf(tctx, "close failed (%s)",
tctx 190 source4/torture/basic/delete.c static bool deltest3(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 203 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 215 source4/torture/basic/delete.c torture_assert(tctx, fnum2 == -1,
tctx 216 source4/torture/basic/delete.c talloc_asprintf(tctx, "open - 2 of %s succeeded - should have failed.",
tctx 227 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 2 of %s failed (%s)",
tctx 230 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx,
tctx 232 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close failed (%s)",
tctx 235 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 236 source4/torture/basic/delete.c talloc_asprintf(tctx, "close 1 failed (%s)",
tctx 239 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum2),
tctx 240 source4/torture/basic/delete.c talloc_asprintf(tctx, "close 2 failed (%s)",
tctx 260 source4/torture/basic/delete.c static bool deltest4(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 276 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 287 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 2 of %s failed (%s)",
tctx 290 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx,
tctx 292 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 1 failed (%s)",
tctx 295 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx,
tctx 297 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close failed (%s)",
tctx 306 source4/torture/basic/delete.c torture_assert(tctx, fnum2 == -1,
tctx 307 source4/torture/basic/delete.c talloc_asprintf(tctx, "open - 3 of %s succeeded ! Should have failed.",
tctx 312 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 313 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)",
tctx 320 source4/torture/basic/delete.c static bool deltest5(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 327 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 332 source4/torture/basic/delete.c torture_assert(tctx, !NT_STATUS_IS_OK(smbcli_nt_delete_on_close(cli1->tree, fnum1, true)),
tctx 335 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 336 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)", smbcli_errstr(cli1->tree)));
tctx 342 source4/torture/basic/delete.c static bool deltest6(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 356 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 361 source4/torture/basic/delete.c torture_assert(tctx,
tctx 365 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx,
tctx 367 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)",
tctx 374 source4/torture/basic/delete.c static bool deltest7(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 388 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 391 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli1->tree, fnum1, true),
tctx 394 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__);
tctx 396 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx,
tctx 400 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx 402 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 403 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)", smbcli_errstr(cli1->tree)));
tctx 408 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 411 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 412 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)",
tctx 419 source4/torture/basic/delete.c static bool deltest8(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 435 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1,
tctx 436 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 447 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 450 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx,
tctx 454 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__);
tctx 455 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__);
tctx 457 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 458 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 1 failed (%s)",
tctx 461 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, -1, fname, true, __location__);
tctx 462 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__);
tctx 464 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2),
tctx 465 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)", smbcli_errstr(cli2->tree)));
tctx 469 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1,
tctx 470 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded should have been deleted on close !\n", fname));
tctx 476 source4/torture/basic/delete.c static bool deltest9(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 490 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1,
tctx 491 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded should have failed!",
tctx 498 source4/torture/basic/delete.c static bool deltest10(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 512 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1,
tctx 513 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 517 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 518 source4/torture/basic/delete.c talloc_asprintf(tctx, "close failed (%s)",
tctx 523 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1,
tctx 524 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded should have been deleted on close !",
tctx 530 source4/torture/basic/delete.c static bool deltest11(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 545 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 550 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_CANNOT_DELETE,
tctx 551 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close should fail with NT_STATUS_CANNOT_DELETE. Got %s instead)", smbcli_errstr(cli1->tree)));
tctx 553 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 554 source4/torture/basic/delete.c talloc_asprintf(tctx, "close failed (%s)",
tctx 561 source4/torture/basic/delete.c static bool deltest12(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 578 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1,
tctx 579 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded. Should fail with "
tctx 583 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_CANNOT_DELETE,
tctx 584 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close on open should "
tctx 593 source4/torture/basic/delete.c static bool deltest13(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 615 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1,
tctx 616 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 629 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx,
tctx 633 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx,
tctx 638 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__);
tctx 639 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__);
tctx 641 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli2->tree, fnum2,
tctx 645 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx 646 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx 648 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 649 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 1 failed (%s)",
tctx 652 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2),
tctx 653 source4/torture/basic/delete.c talloc_asprintf(tctx, "close - 2 failed (%s)",
tctx 658 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed!",
tctx 667 source4/torture/basic/delete.c static bool deltest14(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 685 source4/torture/basic/delete.c torture_assert(tctx, dnum1 != -1, talloc_asprintf(tctx, "open of %s failed: %s!",
tctx 688 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, dnum1, dname, false, __location__);
tctx 689 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, smbcli_nt_delete_on_close(cli1->tree, dnum1, true),
tctx 691 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, dnum1, dname, true, __location__);
tctx 705 source4/torture/basic/delete.c torture_assert(tctx, dnum1 == -1, "setting delete_on_close on file succeeded !");
tctx 711 source4/torture/basic/delete.c static bool deltest15(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 735 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1,
tctx 736 source4/torture/basic/delete.c talloc_asprintf(tctx, "open - 1 of %s failed (%s)", fname, smbcli_errstr(cli1->tree)));
tctx 740 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status, "renaming failed!");
tctx 751 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1,
tctx 752 source4/torture/basic/delete.c talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 757 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status,
tctx 765 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname_new, true, __location__);
tctx 776 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 779 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx 793 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 807 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1,
tctx 815 source4/torture/basic/delete.c static bool deltest16(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 841 source4/torture/basic/delete.c torture_assert (tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)", fname, smbcli_errstr(cli1->tree)));
tctx 844 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx 847 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, -1, fname, false, __location__);
tctx 848 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, -1, fname, false, __location__);
tctx 861 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 864 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx 865 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, -1, fname, false, __location__);
tctx 866 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx 867 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, -1, fname, false, __location__);
tctx 871 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, true, __location__);
tctx 872 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, -1, fname, true, __location__);
tctx 878 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail)",
tctx 885 source4/torture/basic/delete.c static bool deltest17(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 910 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 926 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 930 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx 944 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 948 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx 949 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum2, fname, false, __location__);
tctx 954 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum2, fname, true, __location__);
tctx 960 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s failed (should succeed) - %s",
tctx 969 source4/torture/basic/delete.c static bool deltest18(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 997 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 1006 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, dname, false, __location__);
tctx 1020 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 1023 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, dname, false, __location__);
tctx 1024 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum2, dname, false, __location__);
tctx 1028 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum2, dname, true, __location__);
tctx 1041 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail)",
tctx 1048 source4/torture/basic/delete.c static bool deltest19(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1072 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 1090 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1,
tctx 1091 source4/torture/basic/delete.c talloc_asprintf(tctx, "open - 1 of %s failed (%s)", fname, smbcli_errstr(cli1->tree)));
tctx 1099 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, dname, false, __location__);
tctx 1112 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 1117 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum2, dname, true, __location__);
tctx 1133 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1,
tctx 1134 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded (should fail)", dname));
tctx 1140 source4/torture/basic/delete.c static bool deltest20(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1151 source4/torture/basic/delete.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 1167 source4/torture/basic/delete.c torture_assert(tctx, dnum1 != -1, talloc_asprintf(tctx, "open of %s failed: %s!",
tctx 1170 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, dnum1, dname, false, __location__);
tctx 1178 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1,
tctx 1183 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx,
tctx 1190 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx, status,
tctx 1198 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1,
tctx 1199 source4/torture/basic/delete.c talloc_asprintf(tctx, "smbcli_open failed: %s\n",
tctx 1206 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_DIRECTORY_NOT_EMPTY,
tctx 1214 source4/torture/basic/delete.c static bool deltest20a(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1239 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 1252 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 2 of %s failed (%s)",
tctx 1256 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx 1257 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx 1261 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx 1267 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail) - %s",
tctx 1280 source4/torture/basic/delete.c static bool deltest20b(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1307 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 1322 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open - 1 of %s failed (%s)",
tctx 1335 source4/torture/basic/delete.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx, "open - 2 of %s failed (%s)",
tctx 1339 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, false, __location__);
tctx 1340 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx 1344 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname, false, __location__);
tctx 1362 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx,status,NT_STATUS_OK,talloc_asprintf(tctx, "rename of %s to %s failed (%s)",
tctx 1366 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli2, fnum2, fname_new, false, __location__);
tctx 1372 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail) - %s",
tctx 1375 source4/torture/basic/delete.c torture_assert(tctx, fnum1 == -1, talloc_asprintf(tctx, "open of %s succeeded (should fail) - %s",
tctx 1383 source4/torture/basic/delete.c static bool deltest21(struct torture_context *tctx)
tctx 1390 source4/torture/basic/delete.c if (!torture_open_connection(&cli1, tctx, 0))
tctx 1393 source4/torture/basic/delete.c if (!torture_open_connection(&cli2, tctx, 1))
tctx 1405 source4/torture/basic/delete.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "open of %s failed (%s)",
tctx 1408 source4/torture/basic/delete.c torture_assert_ntstatus_ok(tctx,
tctx 1410 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close failed (%s)",
tctx 1414 source4/torture/basic/delete.c correct &= check_delete_on_close(tctx, cli1, fnum1, fname, true, __location__);
tctx 1421 source4/torture/basic/delete.c if (!torture_open_connection(&cli1, tctx, 0)) {
tctx 1450 source4/torture/basic/delete.c static bool deltest22(struct torture_context *tctx)
tctx 1457 source4/torture/basic/delete.c if (!torture_open_connection(&cli1, tctx, 0))
tctx 1463 source4/torture/basic/delete.c tctx, smbcli_mkdir(cli1->tree, dname),
tctx 1464 source4/torture/basic/delete.c talloc_asprintf(tctx, "smbcli_mdir failed: (%s)\n",
tctx 1478 source4/torture/basic/delete.c torture_assert(tctx, dnum1 != -1,
tctx 1479 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed: %s!",
tctx 1492 source4/torture/basic/delete.c torture_assert(tctx, dnum2 != -1,
tctx 1493 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s failed: %s!",
tctx 1497 source4/torture/basic/delete.c tctx, smbcli_nt_delete_on_close(cli1->tree, dnum1, true),
tctx 1498 source4/torture/basic/delete.c talloc_asprintf(tctx, "setting delete_on_close failed (%s)",
tctx 1514 source4/torture/basic/delete.c torture_assert(tctx, dnum1 == -1,
tctx 1515 source4/torture/basic/delete.c talloc_asprintf(tctx, "open of %s succeeded!\n",
tctx 1402 source4/torture/basic/denytest.c static void progress_bar(struct torture_context *tctx, uint_t i, uint_t total)
tctx 1404 source4/torture/basic/denytest.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 1405 source4/torture/basic/denytest.c torture_comment(tctx, "%5d/%5d\r", i, total);
tctx 1413 source4/torture/basic/denytest.c bool torture_denytest1(struct torture_context *tctx,
tctx 1423 source4/torture/basic/denytest.c torture_comment(tctx, "Testing deny modes with 1 connection\n");
tctx 1432 source4/torture/basic/denytest.c torture_comment(tctx, "testing %d entries\n", (int)ARRAY_SIZE(denytable1));
tctx 1440 source4/torture/basic/denytest.c progress_bar(tctx, i, ARRAY_SIZE(denytable1));
tctx 1464 source4/torture/basic/denytest.c if (torture_setting_bool(tctx, "showall", false) ||
tctx 1470 source4/torture/basic/denytest.c torture_comment(tctx, "%lld: %s %8s %10s %8s %10s %s (correct=%s)\n",
tctx 1495 source4/torture/basic/denytest.c torture_comment(tctx, "finshed denytest1 (%d failures)\n", failures);
tctx 1503 source4/torture/basic/denytest.c bool torture_denytest2(struct torture_context *tctx,
tctx 1527 source4/torture/basic/denytest.c progress_bar(tctx, i, ARRAY_SIZE(denytable1));
tctx 1551 source4/torture/basic/denytest.c if (torture_setting_bool(tctx, "showall", false) ||
tctx 1557 source4/torture/basic/denytest.c torture_comment(tctx, "%lld: %s %8s %10s %8s %10s %s (correct=%s)\n",
tctx 1582 source4/torture/basic/denytest.c torture_comment(tctx, "finshed denytest2 (%d failures)\n", failures);
tctx 1591 source4/torture/basic/denytest.c bool torture_denytest3(struct torture_context *tctx,
tctx 1606 source4/torture/basic/denytest.c torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2);
tctx 1617 source4/torture/basic/denytest.c torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2);
tctx 1724 source4/torture/basic/denytest.c static bool torture_ntdenytest(struct torture_context *tctx,
tctx 1754 source4/torture/basic/denytest.c torture_comment(tctx, "format: server correct\n");
tctx 1779 source4/torture/basic/denytest.c torture_comment(tctx, "testing %d entries on %s\n", torture_numops, fname);
tctx 1792 source4/torture/basic/denytest.c progress_bar(tctx, i, torture_numops);
tctx 1856 source4/torture/basic/denytest.c if (torture_setting_bool(tctx, "showall", false) ||
tctx 1859 source4/torture/basic/denytest.c torture_comment(tctx, "\n%-20s %-70s\n%-20s %-70s %4s %4s %s/%s\n",
tctx 1883 source4/torture/basic/denytest.c torture_comment(tctx, "finshed ntdenytest (%d failures)\n", failures);
tctx 1892 source4/torture/basic/denytest.c bool torture_ntdenytest1(struct torture_context *tctx,
tctx 1899 source4/torture/basic/denytest.c torture_comment(tctx, "starting ntdenytest1 client %d\n", client);
tctx 1901 source4/torture/basic/denytest.c return torture_ntdenytest(tctx, cli, cli, client);
tctx 1917 source4/torture/basic/denytest.c torture_comment(tctx, "(%s) Incorrect status %s - should be %s\n", \
tctx 1925 source4/torture/basic/denytest.c torture_comment(tctx, "(%s) wrong value for %s 0x%x - should be 0x%x\n", \
tctx 1933 source4/torture/basic/denytest.c bool torture_denydos_sharing(struct torture_context *tctx,
tctx 1947 source4/torture/basic/denytest.c torture_comment(tctx, "Checking DENY_DOS shared handle semantics\n");
tctx 1961 source4/torture/basic/denytest.c torture_comment(tctx, "openx twice with RDWR/DENY_DOS\n");
tctx 1970 source4/torture/basic/denytest.c torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2);
tctx 1978 source4/torture/basic/denytest.c torture_comment(tctx, "two handles should be same file handle\n");
tctx 1994 source4/torture/basic/denytest.c torture_comment(tctx, "openx twice with RDWR/DENY_NONE\n");
tctx 2005 source4/torture/basic/denytest.c torture_comment(tctx, "fnum1=%d fnum2=%d\n", fnum1, fnum2);
tctx 2007 source4/torture/basic/denytest.c torture_comment(tctx, "two handles should be separate\n");
tctx 36 source4/torture/basic/dir.c bool torture_dirtest1(struct torture_context *tctx,
tctx 45 source4/torture/basic/dir.c torture_comment(tctx, "Creating %d random filenames\n", torture_numops);
tctx 62 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "a*.*", 0, list_fn, NULL));
tctx 63 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "b*.*", 0, list_fn, NULL));
tctx 64 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "xyzabc", 0, list_fn, NULL));
tctx 66 source4/torture/basic/dir.c torture_comment(tctx, "dirtest core %g seconds\n", timeval_elapsed(&tv));
tctx 79 source4/torture/basic/dir.c bool torture_dirtest2(struct torture_context *tctx,
tctx 91 source4/torture/basic/dir.c torture_comment(tctx, "Creating %d files\n", torture_entries);
tctx 123 source4/torture/basic/dir.c torture_comment(tctx, "num_seen = %d\n", num_seen );
tctx 136 source4/torture/basic/dir.c torture_comment(tctx, "num_seen = %d\n", num_seen );
tctx 144 source4/torture/basic/dir.c torture_comment(tctx, "num_seen = %d\n", num_seen );
tctx 159 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "a*.*", 0, list_fn, NULL));
tctx 160 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "b*.*", 0, list_fn, NULL));
tctx 161 source4/torture/basic/dir.c torture_comment(tctx, "Matched %d\n", smbcli_list(cli->tree, "xyzabc", 0, list_fn, NULL));
tctx 40 source4/torture/basic/locking.c static bool torture_locktest1(struct torture_context *tctx,
tctx 54 source4/torture/basic/locking.c torture_assert(tctx, fnum1 != -1,
tctx 55 source4/torture/basic/locking.c talloc_asprintf(tctx,
tctx 58 source4/torture/basic/locking.c torture_assert(tctx, fnum2 != -1, talloc_asprintf(tctx,
tctx 61 source4/torture/basic/locking.c torture_assert(tctx, fnum3 != -1, talloc_asprintf(tctx,
tctx 64 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx,
tctx 66 source4/torture/basic/locking.c talloc_asprintf(tctx, "lock1 failed (%s)", smbcli_errstr(cli1->tree)));
tctx 68 source4/torture/basic/locking.c torture_assert(tctx,
tctx 75 source4/torture/basic/locking.c torture_assert(tctx,
tctx 82 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx,
tctx 84 source4/torture/basic/locking.c talloc_asprintf(tctx,
tctx 87 source4/torture/basic/locking.c torture_assert(tctx,
tctx 94 source4/torture/basic/locking.c torture_assert(tctx,
tctx 101 source4/torture/basic/locking.c torture_assert(tctx,
tctx 109 source4/torture/basic/locking.c torture_comment(tctx, "Testing lock timeout with timeout=%u\n",
tctx 112 source4/torture/basic/locking.c torture_assert(tctx,
tctx 121 source4/torture/basic/locking.c torture_fail(tctx,
tctx 124 source4/torture/basic/locking.c torture_comment(tctx, "server slept for %u seconds for a %u second timeout\n",
tctx 127 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum2),
tctx 128 source4/torture/basic/locking.c talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli1->tree)));
tctx 130 source4/torture/basic/locking.c torture_assert(tctx,
tctx 137 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 138 source4/torture/basic/locking.c talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli1->tree)));
tctx 140 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum3),
tctx 141 source4/torture/basic/locking.c talloc_asprintf(tctx, "close3 failed (%s)", smbcli_errstr(cli2->tree)));
tctx 143 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli1->tree, fname),
tctx 144 source4/torture/basic/locking.c talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(cli1->tree)));
tctx 161 source4/torture/basic/locking.c static bool torture_locktest2(struct torture_context *tctx,
tctx 171 source4/torture/basic/locking.c torture_comment(tctx, "Testing pid context\n");
tctx 176 source4/torture/basic/locking.c torture_assert(tctx, fnum1 != -1,
tctx 177 source4/torture/basic/locking.c talloc_asprintf(tctx,
tctx 181 source4/torture/basic/locking.c torture_assert(tctx, fnum2 != -1,
tctx 182 source4/torture/basic/locking.c talloc_asprintf(tctx, "open2 of %s failed (%s)",
tctx 188 source4/torture/basic/locking.c torture_assert(tctx, fnum3 != -1,
tctx 189 source4/torture/basic/locking.c talloc_asprintf(tctx,
tctx 194 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx,
tctx 196 source4/torture/basic/locking.c talloc_asprintf(tctx,
tctx 199 source4/torture/basic/locking.c torture_assert(tctx,
tctx 206 source4/torture/basic/locking.c torture_assert(tctx,
tctx 213 source4/torture/basic/locking.c torture_assert(tctx,
tctx 220 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx,
tctx 222 source4/torture/basic/locking.c talloc_asprintf(tctx,
tctx 227 source4/torture/basic/locking.c torture_assert(tctx,
tctx 231 source4/torture/basic/locking.c torture_assert(tctx,
tctx 239 source4/torture/basic/locking.c torture_assert(tctx,
tctx 247 source4/torture/basic/locking.c torture_assert(tctx,
tctx 255 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum1),
tctx 256 source4/torture/basic/locking.c talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli->tree)));
tctx 258 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum2),
tctx 259 source4/torture/basic/locking.c talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli->tree)));
tctx 261 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli->tree, fnum3),
tctx 262 source4/torture/basic/locking.c talloc_asprintf(tctx, "close3 failed (%s)", smbcli_errstr(cli->tree)));
tctx 273 source4/torture/basic/locking.c static bool torture_locktest3(struct torture_context *tctx,
tctx 284 source4/torture/basic/locking.c torture_comment(tctx, "Testing 32 bit offset ranges");
tctx 291 source4/torture/basic/locking.c torture_assert(tctx, fnum1 != -1,
tctx 292 source4/torture/basic/locking.c talloc_asprintf(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli1->tree)));
tctx 294 source4/torture/basic/locking.c torture_assert(tctx, fnum2 != -1,
tctx 295 source4/torture/basic/locking.c talloc_asprintf(tctx, "open2 of %s failed (%s)\n", fname, smbcli_errstr(cli2->tree)));
tctx 297 source4/torture/basic/locking.c torture_comment(tctx, "Establishing %d locks\n", torture_numops);
tctx 301 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx,
tctx 303 source4/torture/basic/locking.c talloc_asprintf(tctx, "lock1 %d failed (%s)", i, smbcli_errstr(cli1->tree)));
tctx 305 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx,
tctx 307 source4/torture/basic/locking.c talloc_asprintf(tctx, "lock2 %d failed (%s)",
tctx 311 source4/torture/basic/locking.c torture_comment(tctx, "Testing %d locks\n", torture_numops);
tctx 316 source4/torture/basic/locking.c torture_assert(tctx,
tctx 318 source4/torture/basic/locking.c talloc_asprintf(tctx, "error: lock1 %d succeeded!", i));
tctx 320 source4/torture/basic/locking.c torture_assert(tctx,
tctx 322 source4/torture/basic/locking.c talloc_asprintf(tctx, "error: lock2 %d succeeded!", i));
tctx 324 source4/torture/basic/locking.c torture_assert(tctx,
tctx 326 source4/torture/basic/locking.c talloc_asprintf(tctx, "error: lock3 %d succeeded!", i));
tctx 328 source4/torture/basic/locking.c torture_assert(tctx,
tctx 330 source4/torture/basic/locking.c talloc_asprintf(tctx, "error: lock4 %d succeeded!", i));
tctx 333 source4/torture/basic/locking.c torture_comment(tctx, "Removing %d locks\n", torture_numops);
tctx 338 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx,
tctx 340 source4/torture/basic/locking.c talloc_asprintf(tctx, "unlock1 %d failed (%s)",
tctx 344 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx,
tctx 346 source4/torture/basic/locking.c talloc_asprintf(tctx, "unlock2 %d failed (%s)",
tctx 351 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 352 source4/torture/basic/locking.c talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli1->tree)));
tctx 354 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2),
tctx 355 source4/torture/basic/locking.c talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli2->tree)));
tctx 357 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli1->tree, fname),
tctx 358 source4/torture/basic/locking.c talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(cli1->tree)));
tctx 364 source4/torture/basic/locking.c torture_comment(tctx, "** "); correct = false; \
tctx 370 source4/torture/basic/locking.c static bool torture_locktest4(struct torture_context *tctx,
tctx 390 source4/torture/basic/locking.c torture_comment(tctx, "Failed to create file\n");
tctx 398 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s set overlapping write locks\n", ret?"can":"cannot");
tctx 403 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s set overlapping read locks\n", ret?"can":"cannot");
tctx 408 source4/torture/basic/locking.c torture_comment(tctx, "a different connection %s set overlapping write locks\n", ret?"can":"cannot");
tctx 413 source4/torture/basic/locking.c torture_comment(tctx, "a different connection %s set overlapping read locks\n", ret?"can":"cannot");
tctx 418 source4/torture/basic/locking.c torture_comment(tctx, "a different pid %s set overlapping write locks\n", ret?"can":"cannot");
tctx 423 source4/torture/basic/locking.c torture_comment(tctx, "a different pid %s set overlapping read locks\n", ret?"can":"cannot");
tctx 428 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s set the same read lock twice\n", ret?"can":"cannot");
tctx 433 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s set the same write lock twice\n", ret?"can":"cannot");
tctx 438 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s overlay a read lock with a write lock\n", ret?"can":"cannot");
tctx 443 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s overlay a write lock with a read lock\n", ret?"can":"cannot");
tctx 448 source4/torture/basic/locking.c torture_comment(tctx, "a different pid %s overlay a write lock with a read lock\n", ret?"can":"cannot");
tctx 454 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s coalesce read locks\n", ret?"can":"cannot");
tctx 460 source4/torture/basic/locking.c torture_comment(tctx, "this server %s strict write locking\n", ret?"doesn't do":"does");
tctx 465 source4/torture/basic/locking.c torture_comment(tctx, "this server %s strict read locking\n", ret?"doesn't do":"does");
tctx 473 source4/torture/basic/locking.c torture_comment(tctx, "this server %s do recursive read locking\n", ret?"does":"doesn't");
tctx 483 source4/torture/basic/locking.c torture_comment(tctx, "this server %s do recursive lock overlays\n", ret?"does":"doesn't");
tctx 490 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s remove a read lock using write locking\n", ret?"can":"cannot");
tctx 497 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s remove a write lock using read locking\n", ret?"can":"cannot");
tctx 505 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s remove the first lock first\n", ret?"does":"doesn't");
tctx 519 source4/torture/basic/locking.c torture_comment(tctx, "the server %s have the NT byte range lock bug\n", !ret?"does":"doesn't");
tctx 532 source4/torture/basic/locking.c static bool torture_locktest5(struct torture_context *tctx, struct smbcli_state *cli1,
tctx 551 source4/torture/basic/locking.c torture_assert(tctx, smbcli_write(cli1->tree, fnum1, 0, buf, 0, sizeof(buf)) == sizeof(buf),
tctx 561 source4/torture/basic/locking.c torture_comment(tctx, "this server %s the NT locking bug\n", ret ? "doesn't have" : "has");
tctx 569 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s overlay a write with a read lock\n", ret?"can":"cannot");
tctx 574 source4/torture/basic/locking.c torture_comment(tctx, "a different processs %s get a read lock on the first process lock stack\n", ret?"can":"cannot");
tctx 582 source4/torture/basic/locking.c torture_comment(tctx, "the same processs on a different fnum %s get a read lock\n", ret?"can":"cannot");
tctx 592 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s stack read locks\n", ret?"can":"cannot");
tctx 601 source4/torture/basic/locking.c torture_comment(tctx, "the first unlock removes the %s lock\n", ret?"WRITE":"READ");
tctx 613 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s unlock the stack of 3 locks\n", ret?"can":"cannot");
tctx 618 source4/torture/basic/locking.c torture_comment(tctx, "the same process %s count the lock stack\n", !ret?"can":"cannot");
tctx 624 source4/torture/basic/locking.c torture_comment(tctx, "a different processs %s get a write lock on the unlocked stack\n", ret?"can":"cannot");
tctx 627 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 628 source4/torture/basic/locking.c talloc_asprintf(tctx, "close1 failed (%s)", smbcli_errstr(cli1->tree)));
tctx 630 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli2->tree, fnum2),
tctx 631 source4/torture/basic/locking.c talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli2->tree)));
tctx 633 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum3),
tctx 634 source4/torture/basic/locking.c talloc_asprintf(tctx, "close2 failed (%s)", smbcli_errstr(cli2->tree)));
tctx 636 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_unlink(cli1->tree, fname),
tctx 637 source4/torture/basic/locking.c talloc_asprintf(tctx, "unlink failed (%s)", smbcli_errstr(cli1->tree)));
tctx 645 source4/torture/basic/locking.c static bool torture_locktest6(struct torture_context *tctx,
tctx 658 source4/torture/basic/locking.c torture_comment(tctx, "Testing %s\n", fname[i]);
tctx 665 source4/torture/basic/locking.c torture_comment(tctx, "CHANGE_LOCKTYPE gave %s\n", nt_errstr(status));
tctx 670 source4/torture/basic/locking.c torture_comment(tctx, "CANCEL_LOCK gave %s\n", nt_errstr(status));
tctx 678 source4/torture/basic/locking.c static bool torture_locktest7(struct torture_context *tctx,
tctx 688 source4/torture/basic/locking.c torture_assert(tctx, torture_setup_dir(cli1, BASEDIR),
tctx 689 source4/torture/basic/locking.c talloc_asprintf(tctx, "Unable to set up %s", BASEDIR));
tctx 695 source4/torture/basic/locking.c torture_assert(tctx, smbcli_write(cli1->tree, fnum1, 0, buf, 0, sizeof(buf)) == sizeof(buf),
tctx 700 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_lock(cli1->tree, fnum1, 130, 4, 0, READ_LOCK),
tctx 701 source4/torture/basic/locking.c talloc_asprintf(tctx, "Unable to apply read lock on range 130:4, error was %s",
tctx 704 source4/torture/basic/locking.c torture_comment(tctx, "pid1 successfully locked range 130:4 for READ\n");
tctx 706 source4/torture/basic/locking.c torture_assert(tctx, smbcli_read(cli1->tree, fnum1, buf, 130, 4) == 4,
tctx 707 source4/torture/basic/locking.c talloc_asprintf(tctx, "pid1 unable to read the range 130:4, error was %s)",
tctx 710 source4/torture/basic/locking.c torture_comment(tctx, "pid1 successfully read the range 130:4\n");
tctx 713 source4/torture/basic/locking.c torture_comment(tctx, "pid1 unable to write to the range 130:4, error was %s\n", smbcli_errstr(cli1->tree));
tctx 714 source4/torture/basic/locking.c torture_assert_ntstatus_equal(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_FILE_LOCK_CONFLICT,
tctx 717 source4/torture/basic/locking.c torture_fail(tctx, "pid1 successfully wrote to the range 130:4 (should be denied)");
tctx 723 source4/torture/basic/locking.c torture_comment(tctx, "pid2 unable to read the range 130:4, error was %s\n", smbcli_errstr(cli1->tree));
tctx 725 source4/torture/basic/locking.c torture_comment(tctx, "pid2 successfully read the range 130:4\n");
tctx 729 source4/torture/basic/locking.c torture_comment(tctx, "pid2 unable to write to the range 130:4, error was %s\n", smbcli_errstr(cli1->tree));
tctx 730 source4/torture/basic/locking.c torture_assert_ntstatus_equal(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_FILE_LOCK_CONFLICT,
tctx 733 source4/torture/basic/locking.c torture_fail(tctx, "pid2 successfully wrote to the range 130:4 (should be denied)");
tctx 739 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_lock(cli1->tree, fnum1, 130, 4, 0, WRITE_LOCK),
tctx 740 source4/torture/basic/locking.c talloc_asprintf(tctx, "Unable to apply write lock on range 130:4, error was %s",
tctx 742 source4/torture/basic/locking.c torture_comment(tctx, "pid1 successfully locked range 130:4 for WRITE\n");
tctx 744 source4/torture/basic/locking.c torture_assert(tctx, smbcli_read(cli1->tree, fnum1, buf, 130, 4) == 4,
tctx 745 source4/torture/basic/locking.c talloc_asprintf(tctx, "pid1 unable to read the range 130:4, error was %s",
tctx 747 source4/torture/basic/locking.c torture_comment(tctx, "pid1 successfully read the range 130:4\n");
tctx 749 source4/torture/basic/locking.c torture_assert(tctx, smbcli_write(cli1->tree, fnum1, 0, buf, 130, 4) == 4,
tctx 750 source4/torture/basic/locking.c talloc_asprintf(tctx, "pid1 unable to write to the range 130:4, error was %s",
tctx 752 source4/torture/basic/locking.c torture_comment(tctx, "pid1 successfully wrote to the range 130:4\n");
tctx 757 source4/torture/basic/locking.c torture_comment(tctx, "pid2 unable to read the range 130:4, error was %s\n",
tctx 759 source4/torture/basic/locking.c torture_assert_ntstatus_equal(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_FILE_LOCK_CONFLICT,
tctx 762 source4/torture/basic/locking.c torture_fail(tctx, "pid2 successfully read the range 130:4 (should be denied)");
tctx 766 source4/torture/basic/locking.c torture_comment(tctx, "pid2 unable to write to the range 130:4, error was %s\n",
tctx 769 source4/torture/basic/locking.c torture_comment(tctx, "Incorrect error (should be NT_STATUS_FILE_LOCK_CONFLICT) (%s)\n",
tctx 774 source4/torture/basic/locking.c torture_comment(tctx, "pid2 successfully wrote to the range 130:4 (should be denied) (%s)\n",
tctx 779 source4/torture/basic/locking.c torture_comment(tctx, "Testing truncate of locked file.\n");
tctx 783 source4/torture/basic/locking.c torture_assert(tctx, fnum2 != -1, "Unable to truncate locked file");
tctx 785 source4/torture/basic/locking.c torture_comment(tctx, "Truncated locked file.\n");
tctx 787 source4/torture/basic/locking.c torture_assert_ntstatus_ok(tctx, smbcli_getatr(cli1->tree, fname, NULL, &size, NULL),
tctx 788 source4/torture/basic/locking.c talloc_asprintf(tctx, "getatr failed (%s)", smbcli_errstr(cli1->tree)));
tctx 790 source4/torture/basic/locking.c torture_assert(tctx, size == 0, talloc_asprintf(tctx, "Unable to truncate locked file. Size was %u", (unsigned)size));
tctx 35 source4/torture/basic/mangle_test.c static bool test_one(struct torture_context *tctx ,struct smbcli_state *cli,
tctx 64 source4/torture/basic/mangle_test.c name2 = talloc_asprintf(tctx, "\\mangle_test\\%s", shortname);
tctx 50 source4/torture/basic/misc.c static bool rw_torture(struct torture_context *tctx, struct smbcli_state *c)
tctx 66 source4/torture/basic/misc.c torture_comment(tctx, "open of %s failed (%s)\n", lockfname, smbcli_errstr(c->tree));
tctx 75 source4/torture/basic/misc.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 76 source4/torture/basic/misc.c torture_comment(tctx, "%d\r", i);
tctx 88 source4/torture/basic/misc.c torture_comment(tctx, "open failed (%s)\n", smbcli_errstr(c->tree));
tctx 94 source4/torture/basic/misc.c torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(c->tree));
tctx 102 source4/torture/basic/misc.c torture_comment(tctx, "write failed (%s)\n", smbcli_errstr(c->tree));
tctx 110 source4/torture/basic/misc.c torture_comment(tctx, "read failed (%s)\n", smbcli_errstr(c->tree));
tctx 115 source4/torture/basic/misc.c torture_comment(tctx, "data corruption!\n");
tctx 120 source4/torture/basic/misc.c torture_comment(tctx, "close failed (%s)\n", smbcli_errstr(c->tree));
tctx 125 source4/torture/basic/misc.c torture_comment(tctx, "unlink failed (%s)\n", smbcli_errstr(c->tree));
tctx 130 source4/torture/basic/misc.c torture_comment(tctx, "unlock failed (%s)\n", smbcli_errstr(c->tree));
tctx 139 source4/torture/basic/misc.c torture_comment(tctx, "%d\n", i);
tctx 144 source4/torture/basic/misc.c bool run_torture(struct torture_context *tctx, struct smbcli_state *cli, int dummy)
tctx 146 source4/torture/basic/misc.c return rw_torture(tctx, cli);
tctx 153 source4/torture/basic/misc.c bool run_pipe_number(struct torture_context *tctx,
tctx 165 source4/torture/basic/misc.c torture_comment(tctx, "Open of pipe %s failed with error (%s)\n", pipe_name, smbcli_errstr(cli1->tree));
tctx 169 source4/torture/basic/misc.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 170 source4/torture/basic/misc.c torture_comment(tctx, "%d\r", num_pipes);
tctx 175 source4/torture/basic/misc.c torture_comment(tctx, "pipe_number test - we can open %d %s pipes.\n", num_pipes, pipe_name );
tctx 187 source4/torture/basic/misc.c bool torture_holdcon(struct torture_context *tctx)
tctx 193 source4/torture/basic/misc.c torture_comment(tctx, "Opening %d connections\n", torture_numops);
tctx 198 source4/torture/basic/misc.c if (!torture_open_connection(&cli[i], tctx, i)) {
tctx 201 source4/torture/basic/misc.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 202 source4/torture/basic/misc.c torture_comment(tctx, "opened %d connections\r", i);
tctx 207 source4/torture/basic/misc.c torture_comment(tctx, "\nStarting pings\n");
tctx 215 source4/torture/basic/misc.c torture_comment(tctx, "Connection %d is dead\n", i);
tctx 224 source4/torture/basic/misc.c torture_comment(tctx, "All connections dead - finishing\n");
tctx 228 source4/torture/basic/misc.c torture_comment(tctx, ".");
tctx 238 source4/torture/basic/misc.c bool run_maxfidtest(struct torture_context *tctx, struct smbcli_state *cli, int dummy)
tctx 247 source4/torture/basic/misc.c torture_comment(tctx, "failed to connect\n");
tctx 252 source4/torture/basic/misc.c torture_comment(tctx, "Failed to deltree \\maxfid - %s\n",
tctx 257 source4/torture/basic/misc.c torture_comment(tctx, "Failed to mkdir \\maxfid, error=%s\n",
tctx 262 source4/torture/basic/misc.c torture_comment(tctx, "Testing maximum number of open files\n");
tctx 268 source4/torture/basic/misc.c torture_comment(tctx, "Failed to mkdir %s, error=%s\n",
tctx 278 source4/torture/basic/misc.c torture_comment(tctx, "open of %s failed (%s)\n",
tctx 280 source4/torture/basic/misc.c torture_comment(tctx, "maximum fnum is %d\n", i);
tctx 284 source4/torture/basic/misc.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 285 source4/torture/basic/misc.c torture_comment(tctx, "%6d\r", i);
tctx 289 source4/torture/basic/misc.c torture_comment(tctx, "%6d\n", i);
tctx 294 source4/torture/basic/misc.c torture_comment(tctx, "cleaning up\n");
tctx 298 source4/torture/basic/misc.c torture_comment(tctx, "Close of fnum %d failed - %s\n", fnums[i], smbcli_errstr(cli->tree));
tctx 301 source4/torture/basic/misc.c torture_comment(tctx, "unlink of %s failed (%s)\n",
tctx 309 source4/torture/basic/misc.c torture_comment(tctx, "Close of fnum %d failed - %s\n", fnums[maxfid-i], smbcli_errstr(cli->tree));
tctx 312 source4/torture/basic/misc.c torture_comment(tctx, "unlink of %s failed (%s)\n",
tctx 318 source4/torture/basic/misc.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 319 source4/torture/basic/misc.c torture_comment(tctx, "%6d %6d\r", i, maxfid-i);
tctx 323 source4/torture/basic/misc.c torture_comment(tctx, "%6d\n", 0);
tctx 326 source4/torture/basic/misc.c torture_comment(tctx, "Failed to deltree \\maxfid - %s\n",
tctx 331 source4/torture/basic/misc.c torture_comment(tctx, "maxfid test finished\n");
tctx 344 source4/torture/basic/misc.c bool torture_ioctl_test(struct torture_context *tctx,
tctx 354 source4/torture/basic/misc.c mem_ctx = talloc_named_const(tctx, 0, "ioctl_test");
tctx 360 source4/torture/basic/misc.c torture_comment(tctx, "open of %s failed (%s)\n", fname, smbcli_errstr(cli->tree));
tctx 368 source4/torture/basic/misc.c torture_comment(tctx, "ioctl job info: %s\n", smbcli_errstr(cli->tree));
tctx 371 source4/torture/basic/misc.c torture_comment(tctx, "testing device=0x%x\n", device);
tctx 377 source4/torture/basic/misc.c torture_comment(tctx, "ioctl device=0x%x function=0x%x OK : %d bytes\n",
tctx 403 source4/torture/basic/misc.c struct torture_context *tctx;
tctx 434 source4/torture/basic/misc.c static int init_benchrw_params(struct torture_context *tctx,
tctx 440 source4/torture/basic/misc.c lpar->retry = torture_setting_int(tctx, "retry",3);
tctx 441 source4/torture/basic/misc.c lpar->blocksize = torture_setting_int(tctx, "blocksize",65535);
tctx 442 source4/torture/basic/misc.c lpar->writeblocks = torture_setting_int(tctx, "writeblocks",15);
tctx 443 source4/torture/basic/misc.c lpar->writeratio = torture_setting_int(tctx, "writeratio",5);
tctx 445 source4/torture/basic/misc.c tctx, "parallel_requests", 5);
tctx 446 source4/torture/basic/misc.c lpar->workgroup = lp_workgroup(tctx->lp_ctx);
tctx 448 source4/torture/basic/misc.c p = torture_setting_string(tctx, "unclist", NULL);
tctx 453 source4/torture/basic/misc.c torture_comment(tctx, "Failed to load unc names list "
tctx 458 source4/torture/basic/misc.c lpar->unc = talloc_array(tctx, struct unclist *,
tctx 470 source4/torture/basic/misc.c tctx, "Failed to parse UNC "
tctx 476 source4/torture/basic/misc.c talloc(tctx, struct unclist);
tctx 482 source4/torture/basic/misc.c lpar->unc = talloc_array(tctx, struct unclist *, 1);
tctx 483 source4/torture/basic/misc.c lpar->unc[0] = talloc(tctx,struct unclist);
tctx 484 source4/torture/basic/misc.c lpar->unc[0]->host = torture_setting_string(tctx, "host",
tctx 486 source4/torture/basic/misc.c lpar->unc[0]->share = torture_setting_string(tctx, "share",
tctx 495 source4/torture/basic/misc.c static NTSTATUS benchrw_close(struct torture_context *tctx,
tctx 503 source4/torture/basic/misc.c torture_comment(tctx, "Close file %d (%d)\n",state->nr,state->fnum);
tctx 518 source4/torture/basic/misc.c static NTSTATUS benchrw_readwrite(struct torture_context *tctx,
tctx 525 source4/torture/basic/misc.c struct torture_context *tctx = state->tctx;
tctx 546 source4/torture/basic/misc.c benchrw_readwrite(tctx, state);
tctx 553 source4/torture/basic/misc.c static NTSTATUS benchrw_readwrite(struct torture_context *tctx,
tctx 562 source4/torture/basic/misc.c torture_comment(tctx, "Callback WRITE file:%d (%d/%d)\n",
tctx 575 source4/torture/basic/misc.c torture_comment(tctx,
tctx 607 source4/torture/basic/misc.c static NTSTATUS benchrw_open(struct torture_context *tctx,
tctx 614 source4/torture/basic/misc.c status = smb_raw_open_recv(req,tctx,(
tctx 620 source4/torture/basic/misc.c torture_comment(tctx, "File opened (%d)\n",state->fnum);
tctx 624 source4/torture/basic/misc.c torture_comment(tctx, "Write initial test file:%d (%d/%d)\n",state->nr,
tctx 654 source4/torture/basic/misc.c static NTSTATUS benchrw_mkdir(struct torture_context *tctx,
tctx 664 source4/torture/basic/misc.c torture_comment(tctx, "Open File %d/%d\n",state->nr+1,
tctx 665 source4/torture/basic/misc.c torture_setting_int(tctx, "nprocs", 4));
tctx 666 source4/torture/basic/misc.c open_parms=talloc_zero(tctx, union smb_open);
tctx 680 source4/torture/basic/misc.c writedata = talloc_size(tctx,state->lp_params->blocksize);
tctx 705 source4/torture/basic/misc.c struct torture_context *tctx = state->tctx;
tctx 716 source4/torture/basic/misc.c if (!NT_STATUS_IS_OK(benchrw_mkdir(tctx, req,state))) {
tctx 717 source4/torture/basic/misc.c torture_comment(tctx, "Failed to create the test "
tctx 726 source4/torture/basic/misc.c if (!NT_STATUS_IS_OK(benchrw_open(tctx, req,state))){
tctx 727 source4/torture/basic/misc.c torture_comment(tctx, "Failed to open/write the "
tctx 739 source4/torture/basic/misc.c status = benchrw_readwrite(tctx,state);
tctx 741 source4/torture/basic/misc.c torture_comment(tctx, "Failed to read/write "
tctx 750 source4/torture/basic/misc.c if (!NT_STATUS_IS_OK(benchrw_close(tctx,req,state))){
tctx 751 source4/torture/basic/misc.c torture_comment(tctx, "Failed to read/write/close "
tctx 759 source4/torture/basic/misc.c torture_comment(tctx, "File %d closed\n",state->nr);
tctx 761 source4/torture/basic/misc.c torture_comment(tctx, "Failed to close the "
tctx 779 source4/torture/basic/misc.c struct torture_context *tctx = state->tctx;
tctx 788 source4/torture/basic/misc.c torture_comment(tctx, "Failed to open connection: "
tctx 795 source4/torture/basic/misc.c torture_comment(tctx, "Failed to open connection "
tctx 808 source4/torture/basic/misc.c struct torture_context *tctx,
tctx 816 source4/torture/basic/misc.c torture_comment(tctx, "Open Connection to %s/%s\n",host,share);
tctx 819 source4/torture/basic/misc.c smb->in.dest_ports=lp_smb_ports(tctx->lp_ctx);
tctx 820 source4/torture/basic/misc.c smb->in.socket_options = lp_socket_options(tctx->lp_ctx);
tctx 825 source4/torture/basic/misc.c smb->in.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx);
tctx 826 source4/torture/basic/misc.c smb->in.gensec_settings = lp_gensec_settings(mem_ctx, tctx->lp_ctx);
tctx 828 source4/torture/basic/misc.c lp_smbcli_options(tctx->lp_ctx, &smb->in.options);
tctx 829 source4/torture/basic/misc.c lp_smbcli_session_options(tctx->lp_ctx, &smb->in.session_options);
tctx 832 source4/torture/basic/misc.c lp_resolve_context(tctx->lp_ctx),ev);
tctx 835 source4/torture/basic/misc.c bool run_benchrw(struct torture_context *tctx)
tctx 848 source4/torture/basic/misc.c int torture_nprocs = torture_setting_int(tctx, "nprocs", 4);
tctx 850 source4/torture/basic/misc.c torture_comment(tctx, "Start BENCH-READWRITE num_ops=%d "
tctx 855 source4/torture/basic/misc.c ev = tctx->ev;
tctx 856 source4/torture/basic/misc.c state = talloc_array(tctx, struct benchrw_state *, torture_nprocs);
tctx 859 source4/torture/basic/misc.c num_unc_names = init_benchrw_params(tctx,&lpparams);
tctx 863 source4/torture/basic/misc.c state[i]=talloc(tctx,struct benchrw_state);
tctx 864 source4/torture/basic/misc.c state[i]->tctx = tctx;
tctx 869 source4/torture/basic/misc.c state[i]->dname=talloc_asprintf(tctx,"benchrw%d",i);
tctx 870 source4/torture/basic/misc.c state[i]->fname=talloc_asprintf(tctx,"%s%s",
tctx 876 source4/torture/basic/misc.c torture_comment(tctx, "Starting async requests\n");
tctx 884 source4/torture/basic/misc.c tctx,struct smb_composite_connect) ;
tctx 888 source4/torture/basic/misc.c tctx, smb_con, tctx,ev,
tctx 898 source4/torture/basic/misc.c torture_comment(tctx, "Setup test dir %d\n",i);
tctx 903 source4/torture/basic/misc.c tctx,
tctx 925 source4/torture/basic/misc.c torture_comment(tctx, "Deleting test dir %s "
tctx 931 source4/torture/basic/misc.c torture_comment(tctx, "ERROR: Tree "
tctx 30 source4/torture/basic/rename.c bool torture_test_rename(struct torture_context *tctx,
tctx 45 source4/torture/basic/rename.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "First open failed - %s",
tctx 48 source4/torture/basic/rename.c torture_assert(tctx, NT_STATUS_IS_ERR(smbcli_rename(cli1->tree, fname, fname1)),
tctx 51 source4/torture/basic/rename.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 52 source4/torture/basic/rename.c talloc_asprintf(tctx, "close - 1 failed (%s)", smbcli_errstr(cli1->tree)));
tctx 62 source4/torture/basic/rename.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx,
tctx 65 source4/torture/basic/rename.c torture_assert_ntstatus_ok(tctx, smbcli_rename(cli1->tree, fname, fname1),
tctx 66 source4/torture/basic/rename.c talloc_asprintf(tctx,
tctx 70 source4/torture/basic/rename.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 71 source4/torture/basic/rename.c talloc_asprintf(tctx,
tctx 83 source4/torture/basic/rename.c torture_assert(tctx, fnum1 != -1, talloc_asprintf(tctx, "Third open failed - %s",
tctx 86 source4/torture/basic/rename.c torture_assert_ntstatus_ok(tctx, smbcli_rename(cli1->tree, fname, fname1),
tctx 87 source4/torture/basic/rename.c talloc_asprintf(tctx, "Third rename failed - this should have succeeded - %s",
tctx 90 source4/torture/basic/rename.c torture_assert_ntstatus_ok(tctx, smbcli_close(cli1->tree, fnum1),
tctx 91 source4/torture/basic/rename.c talloc_asprintf(tctx, "close - 3 failed (%s)", smbcli_errstr(cli1->tree)));
tctx 34 source4/torture/basic/secleak.c static bool try_failed_login(struct torture_context *tctx, struct smbcli_state *cli)
tctx 41 source4/torture/basic/secleak.c lp_smbcli_session_options(tctx->lp_ctx, &options);
tctx 46 source4/torture/basic/secleak.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 48 source4/torture/basic/secleak.c setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx 50 source4/torture/basic/secleak.c cli_credentials_set_conf(setup.in.credentials, tctx->lp_ctx);
tctx 65 source4/torture/basic/secleak.c bool torture_sec_leak(struct torture_context *tctx, struct smbcli_state *cli)
tctx 68 source4/torture/basic/secleak.c int timelimit = torture_setting_int(tctx, "timelimit", 20);
tctx 71 source4/torture/basic/secleak.c if (!try_failed_login(tctx, cli)) {
tctx 36 source4/torture/basic/unlink.c bool torture_unlinktest(struct torture_context *tctx, struct smbcli_state *cli)
tctx 44 source4/torture/basic/unlink.c torture_assert(tctx, torture_setup_dir(cli, BASEDIR),
tctx 45 source4/torture/basic/unlink.c talloc_asprintf(tctx, "Failed setting up %s", BASEDIR));
tctx 49 source4/torture/basic/unlink.c torture_comment(tctx, "Opening a file\n");
tctx 52 source4/torture/basic/unlink.c torture_assert(tctx, fnum != -1, talloc_asprintf(tctx, "open of %s failed (%s)", fname, smbcli_errstr(cli->tree)));
tctx 54 source4/torture/basic/unlink.c torture_comment(tctx, "Unlinking a open file\n");
tctx 56 source4/torture/basic/unlink.c torture_assert(tctx, !NT_STATUS_IS_OK(smbcli_unlink(cli->tree, fname)),
tctx 65 source4/torture/basic/unlink.c torture_comment(tctx, "testing unlink after ntcreatex with DELETE access\n");
tctx 81 source4/torture/basic/unlink.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "failed to open %s", fname));
tctx 83 source4/torture/basic/unlink.c torture_assert(tctx, !NT_STATUS_IS_OK(smbcli_unlink(cli->tree, fname)),
tctx 28 source4/torture/basic/utable.c bool torture_utable(struct torture_context *tctx,
tctx 40 source4/torture/basic/utable.c torture_comment(tctx, "Generating valid character table\n");
tctx 44 source4/torture/basic/utable.c torture_assert(tctx, torture_setup_dir(cli, "\\utable"),
tctx 53 source4/torture/basic/utable.c convert_string_convenience(lp_iconv_convenience(tctx->lp_ctx), CH_UTF16, CH_UNIX,
tctx 70 source4/torture/basic/utable.c torture_comment(tctx, "fname=[%s] alt_name=[%s]\n", fname, alt_name);
tctx 77 source4/torture/basic/utable.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 78 source4/torture/basic/utable.c torture_comment(tctx, "%d (%d/%d)\r", c, chars_allowed, alt_allowed);
tctx 83 source4/torture/basic/utable.c torture_comment(tctx, "%d (%d/%d)\n", c, chars_allowed, alt_allowed);
tctx 87 source4/torture/basic/utable.c torture_comment(tctx, "%d chars allowed %d alt chars allowed\n", chars_allowed, alt_allowed);
tctx 90 source4/torture/basic/utable.c torture_assert(tctx, fd != -1,
tctx 91 source4/torture/basic/utable.c talloc_asprintf(tctx,
tctx 95 source4/torture/basic/utable.c torture_comment(tctx, "wrote valid.dat\n");
tctx 119 source4/torture/basic/utable.c bool torture_casetable(struct torture_context *tctx,
tctx 128 source4/torture/basic/utable.c torture_comment(tctx, "Determining upper/lower case table\n");
tctx 132 source4/torture/basic/utable.c torture_assert(tctx, torture_setup_dir(cli, "\\utable"),
tctx 140 source4/torture/basic/utable.c torture_comment(tctx, "%04x (%c)\n", c, isprint(c)?c:'.');
tctx 142 source4/torture/basic/utable.c fname = form_name(lp_iconv_convenience(tctx->lp_ctx), c);
tctx 153 source4/torture/basic/utable.c torture_assert(tctx, fnum != -1,
tctx 154 source4/torture/basic/utable.c talloc_asprintf(tctx,
tctx 167 source4/torture/basic/utable.c torture_comment(tctx, "too many chars match?? size=%d c=0x%04x\n",
tctx 174 source4/torture/basic/utable.c torture_comment(tctx, "%04x: ", c);
tctx 177 source4/torture/basic/utable.c torture_comment(tctx, "%04x ", c2[i]);
tctx 180 source4/torture/basic/utable.c torture_comment(tctx, "\n");
tctx 45 source4/torture/ldap/basic.c static bool test_bind_sasl(struct torture_context *tctx,
tctx 53 source4/torture/ldap/basic.c status = torture_ldap_bind_sasl(conn, creds, tctx->lp_ctx);
tctx 32 source4/torture/ldap/cldap.c #define CHECK_STATUS(status, correct) torture_assert_ntstatus_equal(tctx, status, correct, "incorrect status")
tctx 34 source4/torture/ldap/cldap.c #define CHECK_VAL(v, correct) torture_assert_int_equal(tctx, (v), (correct), "incorrect value");
tctx 36 source4/torture/ldap/cldap.c #define CHECK_STRING(v, correct) torture_assert_str_equal(tctx, v, correct, "incorrect value");
tctx 40 source4/torture/ldap/cldap.c static bool test_cldap_netlogon(struct torture_context *tctx, const char *dest)
tctx 49 source4/torture/ldap/cldap.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 53 source4/torture/ldap/cldap.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx 62 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 75 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 83 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 89 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 95 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 103 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 110 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 116 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 124 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 134 source4/torture/ldap/cldap.c search.in.domain_guid = GUID_string(tctx, &n1.data.nt5_ex.domain_uuid);
tctx 135 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 138 source4/torture/ldap/cldap.c CHECK_STRING(GUID_string(tctx, &search.out.netlogon.data.nt5_ex.domain_uuid), search.in.domain_guid);
tctx 143 source4/torture/ldap/cldap.c search.in.domain_guid = GUID_string(tctx, &guid);
tctx 144 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 150 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 158 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 167 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 176 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 184 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 191 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 200 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 204 source4/torture/ldap/cldap.c search.in.domain_guid = GUID_string(tctx, &n1.data.nt5_ex.domain_uuid);
tctx 205 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 212 source4/torture/ldap/cldap.c search.in.domain_guid = GUID_string(tctx, &guid);
tctx 213 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 220 source4/torture/ldap/cldap.c search.in.domain_guid = GUID_string(tctx, &guid);
tctx 222 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 234 source4/torture/ldap/cldap.c static bool test_cldap_netlogon_flags(struct torture_context *tctx,
tctx 243 source4/torture/ldap/cldap.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 249 source4/torture/ldap/cldap.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx 254 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 343 source4/torture/ldap/cldap.c static bool test_cldap_netlogon_flag_ds_dns_forest(struct torture_context *tctx,
tctx 354 source4/torture/ldap/cldap.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 360 source4/torture/ldap/cldap.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx 365 source4/torture/ldap/cldap.c status = cldap_netlogon(cldap, tctx, &search);
tctx 385 source4/torture/ldap/cldap.c search2.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx 391 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search2);
tctx 417 source4/torture/ldap/cldap.c static bool test_cldap_generic(struct torture_context *tctx, const char *dest)
tctx 426 source4/torture/ldap/cldap.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 430 source4/torture/ldap/cldap.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx 434 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search);
tctx 441 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search);
tctx 450 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search);
tctx 459 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search);
tctx 468 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search);
tctx 477 source4/torture/ldap/cldap.c status = cldap_search(cldap, tctx, &search);
tctx 52 source4/torture/ldap/cldapbench.c static bool bench_cldap_netlogon(struct torture_context *tctx, const char *address)
tctx 58 source4/torture/ldap/cldapbench.c int timelimit = torture_setting_int(tctx, "timelimit", 10);
tctx 62 source4/torture/ldap/cldapbench.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 64 source4/torture/ldap/cldapbench.c state = talloc_zero(tctx, struct bench_state);
tctx 68 source4/torture/ldap/cldapbench.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx 82 source4/torture/ldap/cldapbench.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 124 source4/torture/ldap/cldapbench.c static bool bench_cldap_rootdse(struct torture_context *tctx, const char *address)
tctx 130 source4/torture/ldap/cldapbench.c int timelimit = torture_setting_int(tctx, "timelimit", 10);
tctx 134 source4/torture/ldap/cldapbench.c cldap = cldap_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 136 source4/torture/ldap/cldapbench.c state = talloc_zero(tctx, struct bench_state);
tctx 140 source4/torture/ldap/cldapbench.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx 155 source4/torture/ldap/cldapbench.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 164 source4/torture/ldap/cldapbench.c tevent_loop_once(tctx->ev);
tctx 168 source4/torture/ldap/cldapbench.c tevent_loop_once(tctx->ev);
tctx 57 source4/torture/ldap/common.c NTSTATUS torture_ldap_connection(struct torture_context *tctx,
tctx 68 source4/torture/ldap/common.c *conn = ldap4_new_connection(tctx, tctx->lp_ctx, tctx->ev);
tctx 80 source4/torture/ldap/common.c NTSTATUS torture_ldap_connection2(struct torture_context *tctx, struct ldap_connection **conn,
tctx 85 source4/torture/ldap/common.c status = torture_ldap_connection(tctx, conn, url);
tctx 90 source4/torture/ldap/common.c printf("Failed a simple ldap bind - %s\n", ldap_errstr(*conn, tctx, status));
tctx 45 source4/torture/libnet/libnet_BecomeDC.c struct torture_context *tctx;
tctx 282 source4/torture/libnet/libnet_BecomeDC.c if (lp_parm_bool(s->tctx->lp_ctx, NULL, "become dc", "dump objects", false)) {
tctx 325 source4/torture/libnet/libnet_BecomeDC.c s->ldb = ldb_wrap_connect(s, s->tctx->ev, s->tctx->lp_ctx, sam_ldb_path,
tctx 326 source4/torture/libnet/libnet_BecomeDC.c system_session(s, s->tctx->lp_ctx),
tctx 523 source4/torture/libnet/libnet_BecomeDC.c if (lp_parm_bool(s->tctx->lp_ctx, NULL, "become dc", "dump objects", false)) {
tctx 553 source4/torture/libnet/libnet_BecomeDC.c if (lp_parm_bool(s->tctx->lp_ctx, NULL, "become dc", "dump objects", false)) {
tctx 584 source4/torture/libnet/libnet_BecomeDC.c s->tctx = torture;
tctx 668 source4/torture/libnet/libnet_BecomeDC.c s->ldb = ldb_wrap_connect(s, s->tctx->ev, s->lp_ctx, sam_ldb_path,
tctx 82 source4/torture/libnet/userman.c static bool test_usermod(struct torture_context *tctx, struct dcerpc_pipe *p,
tctx 106 source4/torture/libnet/userman.c torture_comment(tctx, "modifying user (%d simultaneous change(s))\n",
tctx 109 source4/torture/libnet/userman.c torture_comment(tctx, "fields to change: [");
tctx 204 source4/torture/libnet/userman.c torture_comment(tctx, ((i < num_changes - 1) ? "%s," : "%s"), fldname);
tctx 206 source4/torture/libnet/userman.c torture_comment(tctx, "]\n");
tctx 209 source4/torture/libnet/userman.c torture_assert_ntstatus_ok(tctx, status, "Failed to call sync libnet_rpc_usermod");
tctx 268 source4/torture/libnet/userman.c static bool test_compare(struct torture_context *tctx,
tctx 285 source4/torture/libnet/userman.c torture_assert_ntstatus_ok(tctx, status, "Failed to call sync libnet_rpc_userinfo");
tctx 32 source4/torture/libnet/utils.c bool test_opendomain(struct torture_context *tctx,
tctx 44 source4/torture/libnet/utils.c torture_comment(tctx, "connecting\n");
tctx 51 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "Connect failed");
tctx 57 source4/torture/libnet/utils.c torture_comment(tctx, "domain lookup on %s\n", domname->string);
tctx 60 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "LookupDomain failed");
tctx 67 source4/torture/libnet/utils.c torture_comment(tctx, "opening domain\n");
tctx 70 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "OpenDomain failed");
tctx 78 source4/torture/libnet/utils.c bool test_user_cleanup(struct torture_context *tctx, struct dcerpc_pipe *p,
tctx 99 source4/torture/libnet/utils.c torture_comment(tctx, "user account lookup '%s'\n", name);
tctx 102 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "LookupNames failed");
tctx 111 source4/torture/libnet/utils.c torture_comment(tctx, "opening user account\n");
tctx 114 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "OpenUser failed");
tctx 119 source4/torture/libnet/utils.c torture_comment(tctx, "deleting user account\n");
tctx 122 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "DeleteUser failed");
tctx 128 source4/torture/libnet/utils.c bool test_user_create(struct torture_context *tctx,
tctx 146 source4/torture/libnet/utils.c torture_comment(tctx, "creating user account %s\n", name);
tctx 153 source4/torture/libnet/utils.c torture_comment(tctx, "User (%s) already exists - attempting to delete and recreate account again\n", name);
tctx 154 source4/torture/libnet/utils.c if (!test_user_cleanup(tctx, p, mem_ctx, handle, name)) {
tctx 158 source4/torture/libnet/utils.c torture_comment(tctx, "creating user account\n");
tctx 161 source4/torture/libnet/utils.c torture_assert_ntstatus_ok(tctx, status, "CreateUser failed");
tctx 22 source4/torture/libnet/utils.h bool test_opendomain(struct torture_context *tctx,
tctx 27 source4/torture/libnet/utils.h bool test_user_create(struct torture_context *tctx,
tctx 32 source4/torture/libnet/utils.h bool test_user_cleanup(struct torture_context *tctx,
tctx 30 source4/torture/local/torture.c static bool test_tempdir(struct torture_context *tctx)
tctx 33 source4/torture/local/torture.c TALLOC_CTX *mem_ctx = tctx;
tctx 35 source4/torture/local/torture.c torture_assert_ntstatus_ok(tctx, torture_temp_dir(mem_ctx, "tempdir", &location),
tctx 38 source4/torture/local/torture.c torture_assert(tctx, directory_exist(location),
tctx 43 source4/torture/local/torture.c static bool test_provision(struct torture_context *tctx)
tctx 46 source4/torture/local/torture.c struct provision_settings *settings = talloc_zero(tctx, struct provision_settings);
tctx 50 source4/torture/local/torture.c torture_assert_ntstatus_ok(tctx, torture_temp_dir(tctx, "torture_provision", &targetdir),
tctx 67 source4/torture/local/torture.c status = provision_bare(settings, tctx->lp_ctx, settings, &result);
tctx 69 source4/torture/local/torture.c torture_assert_ntstatus_ok(tctx, status, "provision");
tctx 71 source4/torture/local/torture.c torture_assert_str_equal(tctx, result.domaindn, "DC=EXAMPLE,DC=COM",
tctx 40 source4/torture/nbench/nbench.c for (n=0;n<=nb_max_retries && !op;n++) do_reconnect(&cli, tctx, client)
tctx 42 source4/torture/nbench/nbench.c static void do_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client)
tctx 47 source4/torture/nbench/nbench.c if (nb_reconnect(cli, tctx, client)) {
tctx 57 source4/torture/nbench/nbench.c static bool run_netbench(struct torture_context *tctx, struct smbcli_state *cli, int client)
tctx 59 source4/torture/nbench/nbench.c int torture_nprocs = torture_setting_int(tctx, "nprocs", 4);
tctx 65 source4/torture/nbench/nbench.c double target_rate = torture_setting_double(tctx, "targetrate", 0);
tctx 160 source4/torture/nbench/nbio.c bool nb_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client)
tctx 168 source4/torture/nbench/nbio.c if (!torture_open_connection(cli, tctx, client)) {
tctx 67 source4/torture/nbt/dgram.c static bool nbt_test_netlogon(struct torture_context *tctx)
tctx 70 source4/torture/nbt/dgram.c struct nbt_dgram_socket *dgmsock = nbt_dgram_socket_init(tctx, tctx->ev,
tctx 71 source4/torture/nbt/dgram.c lp_iconv_convenience(tctx->lp_ctx));
tctx 87 source4/torture/nbt/dgram.c name.name = lp_workgroup(tctx->lp_ctx);
tctx 92 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx,
tctx 93 source4/torture/nbt/dgram.c resolve_name(lp_resolve_context(tctx->lp_ctx), &name, tctx, &address, tctx->ev),
tctx 94 source4/torture/nbt/dgram.c talloc_asprintf(tctx, "Failed to resolve %s", name.name));
tctx 96 source4/torture/nbt/dgram.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx 101 source4/torture/nbt/dgram.c myaddress, lp_dgram_port(tctx->lp_ctx));
tctx 102 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx 113 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx 134 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx));
tctx 135 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address");
tctx 140 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx 148 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx 150 source4/torture/nbt/dgram.c torture_assert(tctx, response->response_type == NETLOGON_GET_PDC, "Got incorrect type of netlogon response");
tctx 151 source4/torture/nbt/dgram.c torture_assert(tctx, response->data.get_pdc.command == NETLOGON_RESPONSE_FROM_PDC, "Got incorrect netlogon response command");
tctx 158 source4/torture/nbt/dgram.c static bool nbt_test_netlogon2(struct torture_context *tctx)
tctx 161 source4/torture/nbt/dgram.c struct nbt_dgram_socket *dgmsock = nbt_dgram_socket_init(tctx, tctx->ev,
tctx 162 source4/torture/nbt/dgram.c lp_iconv_convenience(tctx->lp_ctx));
tctx 181 source4/torture/nbt/dgram.c name.name = lp_workgroup(tctx->lp_ctx);
tctx 186 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx,
tctx 187 source4/torture/nbt/dgram.c resolve_name(lp_resolve_context(tctx->lp_ctx), &name, tctx, &address, tctx->ev),
tctx 188 source4/torture/nbt/dgram.c talloc_asprintf(tctx, "Failed to resolve %s", name.name));
tctx 190 source4/torture/nbt/dgram.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx 194 source4/torture/nbt/dgram.c myaddress, lp_dgram_port(tctx->lp_ctx));
tctx 195 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx 206 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx 229 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx));
tctx 231 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address");
tctx 235 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx 243 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx 245 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx 248 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE_EX, "Got incorrect netlogon response command");
tctx 249 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.nt_version, NETLOGON_NT_VERSION_5EX_WITH_IP|NETLOGON_NT_VERSION_5EX|NETLOGON_NT_VERSION_1, "Got incorrect netlogon response command");
tctx 268 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx));
tctx 270 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address");
tctx 274 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx 282 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx 284 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx 287 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_USER_UNKNOWN, "Got incorrect netlogon response command");
tctx 289 source4/torture/nbt/dgram.c torture_assert_str_equal(tctx, response->data.samlogon.data.nt5_ex.user_name, TEST_NAME"$", "Got incorrect user in netlogon response");
tctx 291 source4/torture/nbt/dgram.c join_ctx = torture_join_domain(tctx, TEST_NAME,
tctx 294 source4/torture/nbt/dgram.c torture_assert(tctx, join_ctx != NULL,
tctx 295 source4/torture/nbt/dgram.c talloc_asprintf(tctx, "Failed to join domain %s as %s\n",
tctx 296 source4/torture/nbt/dgram.c lp_workgroup(tctx->lp_ctx), TEST_NAME));
tctx 318 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx));
tctx 320 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address");
tctx 324 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx 333 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx 335 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx 338 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_USER_UNKNOWN, "Got incorrect netlogon response command");
tctx 359 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx));
tctx 361 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address");
tctx 365 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx 374 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx 376 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx 379 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE, "Got incorrect netlogon response command");
tctx 398 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx));
tctx 400 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address");
tctx 404 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send netlogon request");
tctx 413 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx 415 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx 418 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_USER_UNKNOWN, "Got incorrect netlogon response command");
tctx 420 source4/torture/nbt/dgram.c torture_leave_domain(tctx, join_ctx);
tctx 426 source4/torture/nbt/dgram.c static bool nbt_test_ntlogon(struct torture_context *tctx)
tctx 429 source4/torture/nbt/dgram.c struct nbt_dgram_socket *dgmsock = nbt_dgram_socket_init(tctx, tctx->ev,
tctx 430 source4/torture/nbt/dgram.c lp_iconv_convenience(tctx->lp_ctx));
tctx 449 source4/torture/nbt/dgram.c name.name = lp_workgroup(tctx->lp_ctx);
tctx 454 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx,
tctx 455 source4/torture/nbt/dgram.c resolve_name(lp_resolve_context(tctx->lp_ctx), &name, tctx, &address, tctx->ev),
tctx 456 source4/torture/nbt/dgram.c talloc_asprintf(tctx, "Failed to resolve %s", name.name));
tctx 458 source4/torture/nbt/dgram.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx 462 source4/torture/nbt/dgram.c myaddress, lp_dgram_port(tctx->lp_ctx));
tctx 463 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx 474 source4/torture/nbt/dgram.c torture_assert(tctx, socket_address != NULL, "Error getting address");
tctx 479 source4/torture/nbt/dgram.c join_ctx = torture_join_domain(tctx, TEST_NAME,
tctx 483 source4/torture/nbt/dgram.c torture_assert(tctx, join_ctx != NULL,
tctx 484 source4/torture/nbt/dgram.c talloc_asprintf(tctx, "Failed to join domain %s as %s\n",
tctx 485 source4/torture/nbt/dgram.c lp_workgroup(tctx->lp_ctx), TEST_NAME));
tctx 508 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx));
tctx 509 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address");
tctx 514 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request");
tctx 522 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx 524 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx 527 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE, "Got incorrect netlogon response command");
tctx 529 source4/torture/nbt/dgram.c torture_assert_str_equal(tctx, response->data.samlogon.data.nt5_ex.user_name, TEST_NAME"$", "Got incorrect user in netlogon response");
tctx 552 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx));
tctx 553 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address");
tctx 558 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request");
tctx 566 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx 568 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_SAMLOGON, "Got incorrect type of netlogon response");
tctx 571 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.samlogon.data.nt5_ex.command, LOGON_SAM_LOGON_RESPONSE, "Got incorrect netlogon response command");
tctx 573 source4/torture/nbt/dgram.c torture_assert_str_equal(tctx, response->data.samlogon.data.nt5_ex.user_name, TEST_NAME"$", "Got incorrect user in netlogon response");
tctx 592 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx));
tctx 593 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address");
tctx 598 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request");
tctx 606 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx 608 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_GET_PDC, "Got incorrect type of ntlogon response");
tctx 609 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.get_pdc.command, NETLOGON_RESPONSE_FROM_PDC, "Got incorrect ntlogon response command");
tctx 611 source4/torture/nbt/dgram.c torture_leave_domain(tctx, join_ctx);
tctx 629 source4/torture/nbt/dgram.c address, lp_dgram_port(tctx->lp_ctx));
tctx 630 source4/torture/nbt/dgram.c torture_assert(tctx, dest != NULL, "Error getting address");
tctx 635 source4/torture/nbt/dgram.c torture_assert_ntstatus_ok(tctx, status, "Failed to send ntlogon request");
tctx 643 source4/torture/nbt/dgram.c torture_assert(tctx, response != NULL, "Failed to receive a netlogon reply packet");
tctx 645 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->response_type, NETLOGON_GET_PDC, "Got incorrect type of ntlogon response");
tctx 646 source4/torture/nbt/dgram.c torture_assert_int_equal(tctx, response->data.get_pdc.command, NETLOGON_RESPONSE_FROM_PDC, "Got incorrect ntlogon response command");
tctx 28 source4/torture/nbt/nbt.c struct nbt_name_socket *torture_init_nbt_socket(struct torture_context *tctx)
tctx 30 source4/torture/nbt/nbt.c return nbt_name_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 33 source4/torture/nbt/nbt.c bool torture_nbt_get_name(struct torture_context *tctx,
tctx 37 source4/torture/nbt/nbt.c make_nbt_name_server(name, strupper_talloc(tctx,
tctx 38 source4/torture/nbt/nbt.c torture_setting_string(tctx, "host", NULL)));
tctx 41 source4/torture/nbt/nbt.c torture_assert_ntstatus_ok(tctx,
tctx 42 source4/torture/nbt/nbt.c resolve_name(lp_resolve_context(tctx->lp_ctx), name, tctx, address, tctx->ev),
tctx 43 source4/torture/nbt/nbt.c talloc_asprintf(tctx,
tctx 48 source4/torture/nbt/query.c static bool bench_namequery(struct torture_context *tctx)
tctx 50 source4/torture/nbt/query.c struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx);
tctx 55 source4/torture/nbt/query.c int timelimit = torture_setting_int(tctx, "timelimit", 5);
tctx 60 source4/torture/nbt/query.c if (!torture_nbt_get_name(tctx, &name, &address))
tctx 65 source4/torture/nbt/query.c io.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 70 source4/torture/nbt/query.c result = talloc_zero(tctx, struct result_struct);
tctx 72 source4/torture/nbt/query.c torture_comment(tctx, "Running for %d seconds\n", timelimit);
tctx 77 source4/torture/nbt/query.c torture_assert(tctx, req != NULL, "Failed to setup request!");
tctx 82 source4/torture/nbt/query.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 83 source4/torture/nbt/query.c torture_comment(tctx, "%.1f queries per second (%d failures) \r",
tctx 98 source4/torture/nbt/query.c torture_comment(tctx, "%.1f queries per second (%d failures) \n",
tctx 31 source4/torture/nbt/register.c #define CHECK_VALUE(tctx, v, correct) \
tctx 32 source4/torture/nbt/register.c torture_assert_int_equal(tctx, v, correct, "Incorrect value")
tctx 34 source4/torture/nbt/register.c #define CHECK_STRING(tctx, v, correct) \
tctx 35 source4/torture/nbt/register.c torture_assert_casestr_equal(tctx, v, correct, "Incorrect value")
tctx 43 source4/torture/nbt/register.c static bool nbt_register_own(struct torture_context *tctx)
tctx 47 source4/torture/nbt/register.c struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx);
tctx 54 source4/torture/nbt/register.c if (!torture_nbt_get_name(tctx, &name, &address))
tctx 57 source4/torture/nbt/register.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx 61 source4/torture/nbt/register.c socket_address = socket_address_from_strings(tctx, nbtsock->sock->backend_name,
tctx 63 source4/torture/nbt/register.c torture_assert(tctx, socket_address != NULL, "Unable to get address");
tctx 66 source4/torture/nbt/register.c torture_assert_ntstatus_ok(tctx, status,
tctx 69 source4/torture/nbt/register.c torture_comment(tctx, "Testing name defense to name registration\n");
tctx 73 source4/torture/nbt/register.c io.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 83 source4/torture/nbt/register.c status = nbt_name_register(nbtsock, tctx, &io);
tctx 84 source4/torture/nbt/register.c torture_assert_ntstatus_ok(tctx, status,
tctx 85 source4/torture/nbt/register.c talloc_asprintf(tctx, "Bad response from %s for name register",
tctx 88 source4/torture/nbt/register.c CHECK_STRING(tctx, io.out.name.name, name.name);
tctx 89 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.name.type, name.type);
tctx 90 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT);
tctx 96 source4/torture/nbt/register.c status = nbt_name_register(nbtsock, tctx, &io);
tctx 98 source4/torture/nbt/register.c torture_assert_ntstatus_ok(tctx, status,
tctx 99 source4/torture/nbt/register.c talloc_asprintf(tctx, "Bad response from %s for name register demand", address));
tctx 101 source4/torture/nbt/register.c CHECK_STRING(tctx, io.out.name.name, name.name);
tctx 102 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.name.type, name.type);
tctx 103 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT);
tctx 112 source4/torture/nbt/register.c static bool nbt_refresh_own(struct torture_context *tctx)
tctx 116 source4/torture/nbt/register.c struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx);
tctx 123 source4/torture/nbt/register.c if (!torture_nbt_get_name(tctx, &name, &address))
tctx 126 source4/torture/nbt/register.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx 130 source4/torture/nbt/register.c socket_address = socket_address_from_strings(tctx, nbtsock->sock->backend_name,
tctx 132 source4/torture/nbt/register.c torture_assert(tctx, socket_address != NULL,
tctx 136 source4/torture/nbt/register.c torture_assert_ntstatus_ok(tctx, status,
tctx 139 source4/torture/nbt/register.c torture_comment(tctx, "Testing name defense to name refresh\n");
tctx 143 source4/torture/nbt/register.c io.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 151 source4/torture/nbt/register.c status = nbt_name_refresh(nbtsock, tctx, &io);
tctx 153 source4/torture/nbt/register.c torture_assert_ntstatus_ok(tctx, status,
tctx 154 source4/torture/nbt/register.c talloc_asprintf(tctx, "Bad response from %s for name refresh", address));
tctx 156 source4/torture/nbt/register.c CHECK_STRING(tctx, io.out.name.name, name.name);
tctx 157 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.name.type, name.type);
tctx 158 source4/torture/nbt/register.c CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT);
tctx 34 source4/torture/nbt/wins.c #define CHECK_VALUE(tctx, v, correct) \
tctx 35 source4/torture/nbt/wins.c torture_assert_int_equal(tctx, v, correct, "Incorrect value")
tctx 37 source4/torture/nbt/wins.c #define CHECK_STRING(tctx, v, correct) \
tctx 38 source4/torture/nbt/wins.c torture_assert_casestr_equal(tctx, v, correct, "Incorrect value")
tctx 40 source4/torture/nbt/wins.c #define CHECK_NAME(tctx, _name, correct) do { \
tctx 41 source4/torture/nbt/wins.c CHECK_STRING(tctx, (_name).name, (correct).name); \
tctx 42 source4/torture/nbt/wins.c CHECK_VALUE(tctx, (uint8_t)(_name).type, (uint8_t)(correct).type); \
tctx 43 source4/torture/nbt/wins.c CHECK_STRING(tctx, (_name).scope, (correct).scope); \
tctx 50 source4/torture/nbt/wins.c static bool nbt_test_wins_name(struct torture_context *tctx, const char *address,
tctx 61 source4/torture/nbt/wins.c struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx);
tctx 67 source4/torture/nbt/wins.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx 69 source4/torture/nbt/wins.c myaddress = talloc_strdup(tctx, iface_best_ip(ifaces, address));
tctx 71 source4/torture/nbt/wins.c socket_address = socket_address_from_strings(tctx,
tctx 73 source4/torture/nbt/wins.c myaddress, lp_nbt_port(tctx->lp_ctx));
tctx 74 source4/torture/nbt/wins.c torture_assert(tctx, socket_address != NULL,
tctx 83 source4/torture/nbt/wins.c socket_address = socket_address_from_strings(tctx,
tctx 86 source4/torture/nbt/wins.c torture_assert(tctx, socket_address != NULL,
tctx 91 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 95 source4/torture/nbt/wins.c torture_comment(tctx, "Testing name registration to WINS with name %s at %s nb_flags=0x%x\n",
tctx 96 source4/torture/nbt/wins.c nbt_name_string(tctx, name), myaddress, nb_flags);
tctx 98 source4/torture/nbt/wins.c torture_comment(tctx, "release the name\n");
tctx 100 source4/torture/nbt/wins.c release.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 108 source4/torture/nbt/wins.c status = nbt_name_release(nbtsock, tctx, &release);
tctx 109 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx 110 source4/torture/nbt/wins.c CHECK_VALUE(tctx, release.out.rcode, 0);
tctx 115 source4/torture/nbt/wins.c torture_comment(tctx, "no low port - skip: register the name with a wrong address\n");
tctx 117 source4/torture/nbt/wins.c torture_comment(tctx, "register the name with a wrong address (makes the next request slow!)\n");
tctx 119 source4/torture/nbt/wins.c io.in.wins_port = lp_nbt_port(tctx->lp_ctx);
tctx 120 source4/torture/nbt/wins.c io.in.wins_servers = str_list_make(tctx, address, NULL);
tctx 121 source4/torture/nbt/wins.c io.in.addresses = str_list_make(tctx, "127.64.64.1", NULL);
tctx 125 source4/torture/nbt/wins.c status = nbt_name_register_wins(nbtsock, tctx, &io);
tctx 127 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 128 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name register\n",
tctx 131 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 132 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name register\n",
tctx 135 source4/torture/nbt/wins.c CHECK_STRING(tctx, io.out.wins_server, address);
tctx 136 source4/torture/nbt/wins.c CHECK_VALUE(tctx, io.out.rcode, 0);
tctx 138 source4/torture/nbt/wins.c torture_comment(tctx, "register the name correct address\n");
tctx 140 source4/torture/nbt/wins.c name_register.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 175 source4/torture/nbt/wins.c status = nbt_name_register_recv(req, tctx, &name_register);
tctx 177 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 178 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name register\n",
tctx 181 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 182 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name register\n",
tctx 185 source4/torture/nbt/wins.c CHECK_VALUE(tctx, name_register.out.rcode, 0);
tctx 186 source4/torture/nbt/wins.c CHECK_STRING(tctx, name_register.out.reply_addr, myaddress);
tctx 189 source4/torture/nbt/wins.c torture_comment(tctx, "register the name correct address\n");
tctx 191 source4/torture/nbt/wins.c io.in.wins_port = lp_nbt_port(tctx->lp_ctx);
tctx 192 source4/torture/nbt/wins.c io.in.wins_servers = (const char **)str_list_make(tctx, address, NULL);
tctx 193 source4/torture/nbt/wins.c io.in.addresses = (const char **)str_list_make(tctx, myaddress, NULL);
tctx 197 source4/torture/nbt/wins.c status = nbt_name_register_wins(nbtsock, tctx, &io);
tctx 198 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name register", address));
tctx 200 source4/torture/nbt/wins.c CHECK_STRING(tctx, io.out.wins_server, address);
tctx 201 source4/torture/nbt/wins.c CHECK_VALUE(tctx, io.out.rcode, 0);
tctx 207 source4/torture/nbt/wins.c torture_comment(tctx, "Try to register as non-group\n");
tctx 209 source4/torture/nbt/wins.c status = nbt_name_register_wins(nbtsock, tctx, &io);
tctx 210 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name register\n",
tctx 212 source4/torture/nbt/wins.c CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT);
tctx 215 source4/torture/nbt/wins.c torture_comment(tctx, "query the name to make sure its there\n");
tctx 218 source4/torture/nbt/wins.c query.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 224 source4/torture/nbt/wins.c status = nbt_name_query(nbtsock, tctx, &query);
tctx 227 source4/torture/nbt/wins.c tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND,
tctx 228 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx 231 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx 233 source4/torture/nbt/wins.c CHECK_NAME(tctx, query.out.name, *name);
tctx 234 source4/torture/nbt/wins.c CHECK_VALUE(tctx, query.out.num_addrs, 1);
tctx 237 source4/torture/nbt/wins.c CHECK_STRING(tctx, query.out.reply_addrs[0], "255.255.255.255");
tctx 239 source4/torture/nbt/wins.c CHECK_STRING(tctx, query.out.reply_addrs[0], myaddress);
tctx 243 source4/torture/nbt/wins.c query.in.name.name = strupper_talloc(tctx, name->name);
tctx 246 source4/torture/nbt/wins.c torture_comment(tctx, "check case sensitivity\n");
tctx 247 source4/torture/nbt/wins.c status = nbt_name_query(nbtsock, tctx, &query);
tctx 248 source4/torture/nbt/wins.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx 253 source4/torture/nbt/wins.c query.in.name.scope = strupper_talloc(tctx, name->scope);
tctx 257 source4/torture/nbt/wins.c torture_comment(tctx, "check case sensitivity on scope\n");
tctx 258 source4/torture/nbt/wins.c status = nbt_name_query(nbtsock, tctx, &query);
tctx 259 source4/torture/nbt/wins.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx 262 source4/torture/nbt/wins.c torture_comment(tctx, "refresh the name\n");
tctx 264 source4/torture/nbt/wins.c refresh.in.wins_port = lp_nbt_port(tctx->lp_ctx);
tctx 265 source4/torture/nbt/wins.c refresh.in.wins_servers = (const char **)str_list_make(tctx, address, NULL);
tctx 266 source4/torture/nbt/wins.c refresh.in.addresses = (const char **)str_list_make(tctx, myaddress, NULL);
tctx 270 source4/torture/nbt/wins.c status = nbt_name_refresh_wins(nbtsock, tctx, &refresh);
tctx 272 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 273 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name refresh",
tctx 276 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 277 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name refresh",
tctx 280 source4/torture/nbt/wins.c CHECK_STRING(tctx, refresh.out.wins_server, address);
tctx 281 source4/torture/nbt/wins.c CHECK_VALUE(tctx, refresh.out.rcode, 0);
tctx 285 source4/torture/nbt/wins.c release.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 293 source4/torture/nbt/wins.c status = nbt_name_release(nbtsock, tctx, &release);
tctx 295 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 296 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name release",
tctx 299 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 300 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name release",
tctx 303 source4/torture/nbt/wins.c CHECK_NAME(tctx, release.out.name, *name);
tctx 304 source4/torture/nbt/wins.c CHECK_VALUE(tctx, release.out.rcode, 0);
tctx 309 source4/torture/nbt/wins.c torture_comment(tctx, "no low port - skip: register the name with a wrong address\n");
tctx 311 source4/torture/nbt/wins.c torture_comment(tctx, "register the name with a wrong address (makes the next request slow!)\n");
tctx 313 source4/torture/nbt/wins.c io.in.wins_port = lp_nbt_port(tctx->lp_ctx);
tctx 314 source4/torture/nbt/wins.c io.in.wins_servers = str_list_make(tctx, address, NULL);
tctx 315 source4/torture/nbt/wins.c io.in.addresses = str_list_make(tctx, "127.64.64.1", NULL);
tctx 319 source4/torture/nbt/wins.c status = nbt_name_register_wins(nbtsock, tctx, &io);
tctx 321 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 322 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name register\n",
tctx 325 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 326 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name register\n",
tctx 329 source4/torture/nbt/wins.c CHECK_STRING(tctx, io.out.wins_server, address);
tctx 330 source4/torture/nbt/wins.c CHECK_VALUE(tctx, io.out.rcode, 0);
tctx 333 source4/torture/nbt/wins.c torture_comment(tctx, "refresh the name with the correct address\n");
tctx 335 source4/torture/nbt/wins.c refresh.in.wins_port = lp_nbt_port(tctx->lp_ctx);
tctx 336 source4/torture/nbt/wins.c refresh.in.wins_servers = str_list_make(tctx, address, NULL);
tctx 337 source4/torture/nbt/wins.c refresh.in.addresses = str_list_make(tctx, myaddress, NULL);
tctx 341 source4/torture/nbt/wins.c status = nbt_name_refresh_wins(nbtsock, tctx, &refresh);
tctx 343 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 344 source4/torture/nbt/wins.c talloc_asprintf(tctx, "No response from %s for name refresh",
tctx 347 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 348 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name refresh",
tctx 351 source4/torture/nbt/wins.c CHECK_STRING(tctx, refresh.out.wins_server, address);
tctx 352 source4/torture/nbt/wins.c CHECK_VALUE(tctx, refresh.out.rcode, 0);
tctx 354 source4/torture/nbt/wins.c torture_comment(tctx, "release the name\n");
tctx 356 source4/torture/nbt/wins.c release.in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 364 source4/torture/nbt/wins.c status = nbt_name_release(nbtsock, tctx, &release);
tctx 365 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "Bad response from %s for name query", address));
tctx 367 source4/torture/nbt/wins.c CHECK_NAME(tctx, release.out.name, *name);
tctx 368 source4/torture/nbt/wins.c CHECK_VALUE(tctx, release.out.rcode, 0);
tctx 370 source4/torture/nbt/wins.c torture_comment(tctx, "release again\n");
tctx 371 source4/torture/nbt/wins.c status = nbt_name_release(nbtsock, tctx, &release);
tctx 372 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 373 source4/torture/nbt/wins.c talloc_asprintf(tctx, "Bad response from %s for name query",
tctx 376 source4/torture/nbt/wins.c CHECK_NAME(tctx, release.out.name, *name);
tctx 377 source4/torture/nbt/wins.c CHECK_VALUE(tctx, release.out.rcode, 0);
tctx 380 source4/torture/nbt/wins.c torture_comment(tctx, "query the name to make sure its gone\n");
tctx 382 source4/torture/nbt/wins.c status = nbt_name_query(nbtsock, tctx, &query);
tctx 385 source4/torture/nbt/wins.c torture_assert_ntstatus_ok(tctx, status,
tctx 388 source4/torture/nbt/wins.c torture_assert_ntstatus_equal(tctx, status,
tctx 401 source4/torture/nbt/wins.c static bool nbt_test_wins(struct torture_context *tctx)
tctx 408 source4/torture/nbt/wins.c if (!torture_nbt_get_name(tctx, &name, &address))
tctx 411 source4/torture/nbt/wins.c name.name = talloc_asprintf(tctx, "_TORTURE-%5u", r);
tctx 415 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true);
tctx 418 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx 420 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false);
tctx 423 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true);
tctx 426 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false);
tctx 429 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false);
tctx 432 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true);
tctx 435 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true);
tctx 438 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx 442 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, true);
tctx 446 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H | NBT_NM_GROUP, false);
tctx 450 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx 452 source4/torture/nbt/wins.c name.name = talloc_asprintf(tctx, "_T\01-%5u.foo", r);
tctx 453 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx 456 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx 458 source4/torture/nbt/wins.c name.name = talloc_asprintf(tctx, ".");
tctx 459 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx 461 source4/torture/nbt/wins.c name.name = talloc_asprintf(tctx, "%5u-\377\200\300FOO", r);
tctx 462 source4/torture/nbt/wins.c ret &= nbt_test_wins_name(tctx, address, &name, NBT_NODE_H, false);
tctx 48 source4/torture/nbt/winsbench.c static struct nbt_name generate_name(TALLOC_CTX *tctx, int idx)
tctx 51 source4/torture/nbt/winsbench.c name.name = talloc_asprintf(tctx, "WINSBench%6u", idx);
tctx 226 source4/torture/nbt/winsbench.c static bool bench_wins(struct torture_context *tctx)
tctx 228 source4/torture/nbt/winsbench.c struct nbt_name_socket *nbtsock = nbt_name_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 232 source4/torture/nbt/winsbench.c int timelimit = torture_setting_int(tctx, "timelimit", 5);
tctx 240 source4/torture/nbt/winsbench.c if (!torture_nbt_get_name(tctx, &name, &address))
tctx 248 source4/torture/nbt/winsbench.c state->wins_port = lp_nbt_port(tctx->lp_ctx);
tctx 249 source4/torture/nbt/winsbench.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx 250 source4/torture/nbt/winsbench.c state->my_ip = talloc_strdup(tctx, iface_best_ip(ifaces, address));
tctx 258 source4/torture/nbt/winsbench.c torture_comment(tctx, "Running for %d seconds\n", timelimit);
tctx 264 source4/torture/nbt/winsbench.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 265 source4/torture/nbt/winsbench.c torture_comment(tctx, "%.1f queries per second (%d failures) \r",
tctx 280 source4/torture/nbt/winsbench.c torture_comment(tctx, "%.1f queries per second (%d failures) \n",
tctx 35 source4/torture/nbt/winsreplication.c #define CHECK_STATUS(tctx, status, correct) \
tctx 36 source4/torture/nbt/winsreplication.c torture_assert_ntstatus_equal(tctx, status, correct, \
tctx 39 source4/torture/nbt/winsreplication.c #define CHECK_VALUE(tctx, v, correct) \
tctx 40 source4/torture/nbt/winsreplication.c torture_assert(tctx, (v) == (correct), \
tctx 41 source4/torture/nbt/winsreplication.c talloc_asprintf(tctx, "Incorrect value %s=%d - should be %d\n", \
tctx 44 source4/torture/nbt/winsreplication.c #define CHECK_VALUE_UINT64(tctx, v, correct) \
tctx 45 source4/torture/nbt/winsreplication.c torture_assert(tctx, (v) == (correct), \
tctx 46 source4/torture/nbt/winsreplication.c talloc_asprintf(tctx, "Incorrect value %s=%llu - should be %llu\n", \
tctx 49 source4/torture/nbt/winsreplication.c #define CHECK_VALUE_STRING(tctx, v, correct) \
tctx 50 source4/torture/nbt/winsreplication.c torture_assert_str_equal(tctx, v, correct, "Invalid value")
tctx 84 source4/torture/nbt/winsreplication.c static bool test_assoc_ctx1(struct torture_context *tctx)
tctx 101 source4/torture/nbt/winsreplication.c if (!torture_nbt_get_name(tctx, &name, &address))
tctx 104 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test if assoc_ctx is only valid on the conection it was created on\n");
tctx 106 source4/torture/nbt/winsreplication.c wrepl_socket1 = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 107 source4/torture/nbt/winsreplication.c wrepl_socket2 = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 109 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Setup 2 wrepl connections\n");
tctx 110 source4/torture/nbt/winsreplication.c status = wrepl_connect(wrepl_socket1, wrepl_best_ip(tctx->lp_ctx, address), address);
tctx 111 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 113 source4/torture/nbt/winsreplication.c status = wrepl_connect(wrepl_socket2, wrepl_best_ip(tctx->lp_ctx, address), address);
tctx 114 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 116 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a start association request (conn1)\n");
tctx 118 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 120 source4/torture/nbt/winsreplication.c torture_comment(tctx, "association context (conn1): 0x%x\n", associate1.out.assoc_ctx);
tctx 122 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a start association request (conn2)\n");
tctx 124 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 126 source4/torture/nbt/winsreplication.c torture_comment(tctx, "association context (conn2): 0x%x\n", associate2.out.assoc_ctx);
tctx 128 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a replication table query, with assoc 1 (conn2), the anwser should be on conn1\n");
tctx 137 source4/torture/nbt/winsreplication.c status = wrepl_request_recv(req, tctx, &rep_packet);
tctx 138 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 140 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a association request (conn2), to make sure the last request was ignored\n");
tctx 142 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 144 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a replication table query, with invalid assoc (conn1), receive answer from conn2\n");
tctx 147 source4/torture/nbt/winsreplication.c status = wrepl_request_recv(req, tctx, &rep_packet);
tctx 148 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 150 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a association request (conn1), to make sure the last request was handled correct\n");
tctx 152 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 156 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a association stop request (conn1), reson: %u\n", assoc_stop.in.reason);
tctx 158 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_END_OF_FILE);
tctx 162 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a association stop request (conn2), reson: %u\n", assoc_stop.in.reason);
tctx 164 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 166 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Close 2 wrepl connections\n");
tctx 175 source4/torture/nbt/winsreplication.c static bool test_assoc_ctx2(struct torture_context *tctx)
tctx 184 source4/torture/nbt/winsreplication.c if (!torture_nbt_get_name(tctx, &name, &address))
tctx 187 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test if we always get back the same assoc_ctx\n");
tctx 189 source4/torture/nbt/winsreplication.c wrepl_socket = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 191 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Setup wrepl connections\n");
tctx 192 source4/torture/nbt/winsreplication.c status = wrepl_connect(wrepl_socket, wrepl_best_ip(tctx->lp_ctx, address), address);
tctx 193 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 195 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send 1st start association request\n");
tctx 197 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 199 source4/torture/nbt/winsreplication.c torture_comment(tctx, "1st association context: 0x%x\n", associate.out.assoc_ctx);
tctx 201 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send 2nd start association request\n");
tctx 203 source4/torture/nbt/winsreplication.c torture_assert_ntstatus_ok(tctx, status, "2nd start association failed");
tctx 204 source4/torture/nbt/winsreplication.c torture_assert(tctx, associate.out.assoc_ctx == assoc_ctx1,
tctx 206 source4/torture/nbt/winsreplication.c torture_comment(tctx, "2nd association context: 0x%x\n", associate.out.assoc_ctx);
tctx 208 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send 3rd start association request\n");
tctx 210 source4/torture/nbt/winsreplication.c torture_assert(tctx, associate.out.assoc_ctx == assoc_ctx1,
tctx 212 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 213 source4/torture/nbt/winsreplication.c torture_comment(tctx, "3rd association context: 0x%x\n", associate.out.assoc_ctx);
tctx 215 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Close wrepl connections\n");
tctx 224 source4/torture/nbt/winsreplication.c static void display_entry(struct torture_context *tctx, struct wrepl_name *name)
tctx 228 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s\n", nbt_name_string(tctx, &name->name));
tctx 229 source4/torture/nbt/winsreplication.c torture_comment(tctx, "\tTYPE:%u STATE:%u NODE:%u STATIC:%u VERSION_ID: %llu\n",
tctx 231 source4/torture/nbt/winsreplication.c torture_comment(tctx, "\tRAW_FLAGS: 0x%08X OWNER: %-15s\n",
tctx 234 source4/torture/nbt/winsreplication.c torture_comment(tctx, "\tADDR: %-15s OWNER: %-15s\n",
tctx 242 source4/torture/nbt/winsreplication.c static bool test_wins_replication(struct torture_context *tctx)
tctx 253 source4/torture/nbt/winsreplication.c if (!torture_nbt_get_name(tctx, &name, &address))
tctx 256 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test one pull replication cycle\n");
tctx 258 source4/torture/nbt/winsreplication.c wrepl_socket = wrepl_socket_init(tctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 260 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Setup wrepl connections\n");
tctx 261 source4/torture/nbt/winsreplication.c status = wrepl_connect(wrepl_socket, wrepl_best_ip(tctx->lp_ctx, address), address);
tctx 262 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 264 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a start association request\n");
tctx 267 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 269 source4/torture/nbt/winsreplication.c torture_comment(tctx, "association context: 0x%x\n", associate.out.assoc_ctx);
tctx 271 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Send a replication table query\n");
tctx 274 source4/torture/nbt/winsreplication.c status = wrepl_pull_table(wrepl_socket, tctx, &pull_table);
tctx 288 source4/torture/nbt/winsreplication.c torture_fail(tctx, "We are not a valid pull partner for the server");
tctx 290 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 292 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Found %d replication partners\n", pull_table.out.num_partners);
tctx 296 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s max_version=%6llu min_version=%6llu type=%d\n",
tctx 305 source4/torture/nbt/winsreplication.c status = wrepl_pull_names(wrepl_socket, tctx, &pull_names);
tctx 306 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 308 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Received %d names\n", pull_names.out.num_names);
tctx 311 source4/torture/nbt/winsreplication.c display_entry(tctx, &pull_names.out.names[j]);
tctx 315 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Close wrepl connections\n");
tctx 542 source4/torture/nbt/winsreplication.c struct torture_context *tctx, const char *address)
tctx 552 source4/torture/nbt/winsreplication.c ctx = talloc_zero(tctx, struct test_wrepl_conflict_conn);
tctx 556 source4/torture/nbt/winsreplication.c ctx->pull = wrepl_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 559 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Setup wrepl conflict pull connection\n");
tctx 560 source4/torture/nbt/winsreplication.c status = wrepl_connect(ctx->pull, wrepl_best_ip(tctx->lp_ctx, ctx->address), ctx->address);
tctx 613 source4/torture/nbt/winsreplication.c ctx->nbtsock = nbt_name_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 616 source4/torture/nbt/winsreplication.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx 618 source4/torture/nbt/winsreplication.c ctx->myaddr = socket_address_from_strings(tctx, ctx->nbtsock->sock->backend_name, iface_best_ip(ifaces, address), 0);
tctx 623 source4/torture/nbt/winsreplication.c ctx->myaddr2 = socket_address_from_strings(tctx, ctx->nbtsock->sock->backend_name, iface_n_ip(ifaces, i), 0);
tctx 631 source4/torture/nbt/winsreplication.c ctx->nbtsock_srv = nbt_name_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 635 source4/torture/nbt/winsreplication.c nbt_srv_addr = socket_address_from_strings(tctx, ctx->nbtsock_srv->sock->backend_name, ctx->myaddr->addr, lp_nbt_port(tctx->lp_ctx));
tctx 648 source4/torture/nbt/winsreplication.c ctx->nbtsock2 = nbt_name_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 654 source4/torture/nbt/winsreplication.c ctx->nbtsock_srv2 = nbt_name_socket_init(ctx, ctx->nbtsock_srv->event_ctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 658 source4/torture/nbt/winsreplication.c nbt_srv_addr = socket_address_from_strings(tctx,
tctx 661 source4/torture/nbt/winsreplication.c lp_nbt_port(tctx->lp_ctx));
tctx 708 source4/torture/nbt/winsreplication.c static bool test_wrepl_update_one(struct torture_context *tctx,
tctx 725 source4/torture/nbt/winsreplication.c wrepl_socket = wrepl_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 727 source4/torture/nbt/winsreplication.c status = wrepl_connect(wrepl_socket, wrepl_best_ip(tctx->lp_ctx, ctx->address), ctx->address);
tctx 728 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 731 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 750 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 751 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, repl_recv->mess_type, WREPL_REPLICATION);
tctx 752 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, repl_recv->message.replication.command, WREPL_REPL_SEND_REQUEST);
tctx 769 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 770 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, repl_recv->mess_type, WREPL_STOP_ASSOCIATION);
tctx 771 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, repl_recv->message.stop.reason, 0);
tctx 777 source4/torture/nbt/winsreplication.c static bool test_wrepl_is_applied(struct torture_context *tctx,
tctx 792 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 793 source4/torture/nbt/winsreplication.c torture_assert(tctx, pull_names.out.num_names == (expected?1:0),
tctx 794 source4/torture/nbt/winsreplication.c talloc_asprintf(tctx, "Invalid number of records returned - expected %d got %d", expected, pull_names.out.num_names));
tctx 803 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, names[0].name.type, name->name->type);
tctx 804 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, names[0].name.name, name->name->name);
tctx 805 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, names[0].name.scope, name->name->scope);
tctx 806 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, flags, name->flags);
tctx 807 source4/torture/nbt/winsreplication.c CHECK_VALUE_UINT64(tctx, names[0].version_id, name->id);
tctx 810 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, names[0].num_addresses,
tctx 813 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, names[0].num_addresses, 1);
tctx 814 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, names[0].addresses[0].address,
tctx 822 source4/torture/nbt/winsreplication.c static bool test_wrepl_mhomed_merged(struct torture_context *tctx,
tctx 851 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 852 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, pull_names.out.num_names, 1);
tctx 860 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, names[0].name.type, name2->name->type);
tctx 861 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, names[0].name.name, name2->name->name);
tctx 862 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, names[0].name.scope, name2->name->scope);
tctx 863 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, flags, name2->flags | WREPL_TYPE_MHOMED);
tctx 864 source4/torture/nbt/winsreplication.c CHECK_VALUE_UINT64(tctx, names[0].version_id, name2->id);
tctx 866 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, names[0].num_addresses, num_ips);
tctx 876 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, owner, owner2->address);
tctx 886 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, owner, owner1->address);
tctx 893 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, addr, "not found in address list");
tctx 899 source4/torture/nbt/winsreplication.c static bool test_wrepl_sgroup_merged(struct torture_context *tctx,
tctx 940 source4/torture/nbt/winsreplication.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 958 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s: Name '%s' not found\n", __location__, nbt_name_string(ctx, name2->name));
tctx 966 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name->name.type, name2->name->type);
tctx 967 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name->name.name, name2->name->name);
tctx 968 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name->name.scope, name2->name->scope);
tctx 969 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, flags, name2->flags);
tctx 971 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name->num_addresses, num_ips);
tctx 981 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, owner, ips2[j].owner);
tctx 992 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, owner, owner1->address);
tctx 994 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, owner, ips1[j].owner);
tctx 1002 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, addr, "not found in address list");
tctx 1008 source4/torture/nbt/winsreplication.c static bool test_conflict_same_owner(struct torture_context *tctx,
tctx 1126 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test Replica Conflicts with same owner[%s] for %s\n",
tctx 1135 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s,%s%s vs. %s,%s%s with %s ip(s) => %s\n",
tctx 1160 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->a,wins_name_cur);
tctx 1162 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->a, wins_name_last, false);
tctx 1163 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->a, wins_name_cur, false);
tctx 1165 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->a, wins_name_cur, true);
tctx 1172 source4/torture/nbt/winsreplication.c torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, __location__);
tctx 1180 source4/torture/nbt/winsreplication.c static bool test_conflict_different_owner(struct torture_context *tctx,
tctx 4778 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test Replica Conflicts with different owners\n");
tctx 4785 source4/torture/nbt/winsreplication.c torture_comment(tctx, "(%s) Programmer error, invalid record[%u]: %s\n",
tctx 4789 source4/torture/nbt/winsreplication.c torture_comment(tctx, "(%s) Programmer error, invalid record[%u]: %s\n",
tctx 4815 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s,%s%s vs. %s,%s%s %s => %s\n",
tctx 4844 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r1.owner, wins_name_r1);
tctx 4845 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r1.owner,
tctx 4866 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2);
tctx 4868 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r1.owner,
tctx 4871 source4/torture/nbt/winsreplication.c ret &= test_wrepl_sgroup_merged(tctx, ctx, records[i].r2.merge_owner,
tctx 4880 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r1.owner,
tctx 4884 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner,
tctx 4887 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner,
tctx 4893 source4/torture/nbt/winsreplication.c torture_comment(tctx, "failed before sgroup_cleanup record[%u]: %s\n", i, records[i].line);
tctx 4906 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r1.owner, wins_name_r1);
tctx 4910 source4/torture/nbt/winsreplication.c ret &= test_wrepl_sgroup_merged(tctx, ctx, NULL,
tctx 4927 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2);
tctx 4938 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2);
tctx 4939 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner, wins_name_r2, true);
tctx 4950 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, records[i].r2.owner, wins_name_r2);
tctx 4951 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, records[i].r2.owner, wins_name_r2, true);
tctx 4954 source4/torture/nbt/winsreplication.c torture_comment(tctx, "failed in sgroup_cleanup record[%u]: %s\n", i, records[i].line);
tctx 4963 source4/torture/nbt/winsreplication.c torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, records[i].line);
tctx 4971 source4/torture/nbt/winsreplication.c static bool test_conflict_owned_released_vs_replica(struct torture_context *tctx,
tctx 6525 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test Replica records vs. owned released records\n");
tctx 6528 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s => %s\n", nbt_name_string(ctx, &records[i].name),
tctx 6536 source4/torture/nbt/winsreplication.c name_register->in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 6548 source4/torture/nbt/winsreplication.c torture_comment(tctx, "No response from %s for name register\n", ctx->address);
tctx 6552 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Bad response from %s for name register - %s\n",
tctx 6556 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name_register->out.rcode, 0);
tctx 6557 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.reply_from, ctx->address);
tctx 6558 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name_register->out.name.type, records[i].name.type);
tctx 6559 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.name.name, records[i].name.name);
tctx 6560 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.name.scope, records[i].name.scope);
tctx 6561 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.reply_addr, records[i].wins.ips[0].ip);
tctx 6565 source4/torture/nbt/winsreplication.c release->in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 6575 source4/torture/nbt/winsreplication.c torture_comment(tctx, "No response from %s for name release\n", ctx->address);
tctx 6579 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Bad response from %s for name query - %s\n",
tctx 6583 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, release->out.rcode, 0);
tctx 6602 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx 6603 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name,
tctx 6615 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx 6616 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true);
tctx 6620 source4/torture/nbt/winsreplication.c release->in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 6629 source4/torture/nbt/winsreplication.c torture_comment(tctx, "No response from %s for name release\n", ctx->address);
tctx 6633 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Bad response from %s for name query - %s\n",
tctx 6637 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, release->out.rcode, 0);
tctx 6640 source4/torture/nbt/winsreplication.c torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, records[i].line);
tctx 6688 source4/torture/nbt/winsreplication.c static bool test_conflict_owned_active_vs_replica(struct torture_context *tctx,
tctx 9160 source4/torture/nbt/winsreplication.c torture_comment(tctx, "SKIP: Test Replica records vs. owned active records: not bound to port[%d]\n",
tctx 9161 source4/torture/nbt/winsreplication.c lp_nbt_port(tctx->lp_ctx));
tctx 9165 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Test Replica records vs. owned active records\n");
tctx 9178 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s\n", records[i].section);
tctx 9182 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s => SKIPPED\n", nbt_name_string(ctx, &records[i].name));
tctx 9196 source4/torture/nbt/winsreplication.c torture_comment(tctx, "%s%s%s => %s\n",
tctx 9223 source4/torture/nbt/winsreplication.c name_register->in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 9255 source4/torture/nbt/winsreplication.c torture_comment(tctx, "No response from %s for name register\n", ctx->address);
tctx 9259 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Bad response from %s for name register - %s\n",
tctx 9263 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name_register->out.rcode, 0);
tctx 9264 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.reply_from, ctx->address);
tctx 9265 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, name_register->out.name.type, records[i].name.type);
tctx 9266 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.name.name, records[i].name.name);
tctx 9267 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.name.scope, records[i].name.scope);
tctx 9268 source4/torture/nbt/winsreplication.c CHECK_VALUE_STRING(tctx, name_register->out.reply_addr, records[i].wins.ips[j].ip);
tctx 9299 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx 9330 source4/torture/nbt/winsreplication.c ret &= test_wrepl_mhomed_merged(tctx, ctx, &ctx->c,
tctx 9336 source4/torture/nbt/winsreplication.c ret &= test_wrepl_sgroup_merged(tctx, ctx, NULL,
tctx 9343 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name,
tctx 9357 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx 9358 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true);
tctx 9369 source4/torture/nbt/winsreplication.c release->in.dest_port = lp_nbt_port(tctx->lp_ctx);
tctx 9378 source4/torture/nbt/winsreplication.c torture_comment(tctx, "No response from %s for name release\n", ctx->address);
tctx 9382 source4/torture/nbt/winsreplication.c torture_comment(tctx, "Bad response from %s for name query - %s\n",
tctx 9386 source4/torture/nbt/winsreplication.c CHECK_VALUE(tctx, release->out.rcode, 0);
tctx 9399 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx 9410 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx 9411 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true);
tctx 9421 source4/torture/nbt/winsreplication.c ret &= test_wrepl_update_one(tctx, ctx, &ctx->b, wins_name);
tctx 9422 source4/torture/nbt/winsreplication.c ret &= test_wrepl_is_applied(tctx, ctx, &ctx->b, wins_name, true);
tctx 9427 source4/torture/nbt/winsreplication.c torture_comment(tctx, "conflict handled wrong or record[%u]: %s\n", i, records[i].line);
tctx 9633 source4/torture/nbt/winsreplication.c static bool torture_nbt_winsreplication_replica(struct torture_context *tctx)
tctx 9641 source4/torture/nbt/winsreplication.c if (!torture_nbt_get_name(tctx, &name, &address))
tctx 9644 source4/torture/nbt/winsreplication.c ctx = test_create_conflict_ctx(tctx, address);
tctx 9647 source4/torture/nbt/winsreplication.c ret &= test_conflict_same_owner(tctx, ctx);
tctx 9648 source4/torture/nbt/winsreplication.c ret &= test_conflict_different_owner(tctx, ctx);
tctx 9656 source4/torture/nbt/winsreplication.c static bool torture_nbt_winsreplication_owned(struct torture_context *tctx)
tctx 9663 source4/torture/nbt/winsreplication.c if (torture_setting_bool(tctx, "quick", false))
tctx 9664 source4/torture/nbt/winsreplication.c torture_skip(tctx,
tctx 9667 source4/torture/nbt/winsreplication.c if (!torture_nbt_get_name(tctx, &name, &address))
tctx 9670 source4/torture/nbt/winsreplication.c ctx = test_create_conflict_ctx(tctx, address);
tctx 9671 source4/torture/nbt/winsreplication.c torture_assert(tctx, ctx != NULL, "Creating context failed");
tctx 9673 source4/torture/nbt/winsreplication.c ret &= test_conflict_owned_released_vs_replica(tctx, ctx);
tctx 9674 source4/torture/nbt/winsreplication.c ret &= test_conflict_owned_active_vs_replica(tctx, ctx);
tctx 33 source4/torture/ndr/atsvc.c static bool jobenum_in_check(struct torture_context *tctx,
tctx 36 source4/torture/ndr/atsvc.c torture_assert(tctx, r->in.servername != NULL, "servername ptr");
tctx 37 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername");
tctx 38 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.ctr->entries_read, 0, "ctr entries read");
tctx 39 source4/torture/ndr/atsvc.c torture_assert(tctx, r->in.ctr->first_entry == NULL, "ctr entries first_entry");
tctx 40 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.preferred_max_len, -1, "preferred max len");
tctx 41 source4/torture/ndr/atsvc.c torture_assert(tctx, r->in.resume_handle != NULL, "resume handle ptr");
tctx 42 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, *r->in.resume_handle, 0, "resume handle");
tctx 80 source4/torture/ndr/atsvc.c static bool jobenum_out_check(struct torture_context *tctx,
tctx 83 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->out.ctr->entries_read, 7, "entries read");
tctx 84 source4/torture/ndr/atsvc.c torture_assert(tctx, r->out.ctr->first_entry != NULL, "first entry");
tctx 85 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].job_id, 1, "job id");
tctx 86 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].job_time, 84600000, "job time");
tctx 87 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].days_of_week, 0x2, "days of week");
tctx 88 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->out.ctr->first_entry[0].flags, 0x13, "flags");
tctx 89 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->out.ctr->first_entry[0].command, "foo.exe", "command");
tctx 90 source4/torture/ndr/atsvc.c torture_assert(tctx, r->out.total_entries != NULL, "total entries ptr");
tctx 91 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, *r->out.total_entries, 7, "total entries");
tctx 92 source4/torture/ndr/atsvc.c torture_assert(tctx, r->out.resume_handle, "resume handle ptr");
tctx 93 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, *r->out.resume_handle, 0, "resume handle");
tctx 94 source4/torture/ndr/atsvc.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 109 source4/torture/ndr/atsvc.c static bool jobadd_in_check(struct torture_context *tctx,
tctx 112 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername");
tctx 113 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.job_info->job_time, 84600000, "time");
tctx 114 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.job_info->days_of_month, 0, "days of month");
tctx 115 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.job_info->days_of_week, 0x2, "days of week");
tctx 116 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.job_info->flags, 17, "flags");
tctx 117 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->in.job_info->command, "foo.exe", "command");
tctx 126 source4/torture/ndr/atsvc.c static bool jobadd_out_check(struct torture_context *tctx,
tctx 129 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, *r->out.job_id, 14, "job id");
tctx 130 source4/torture/ndr/atsvc.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 141 source4/torture/ndr/atsvc.c static bool jobdel_in_check(struct torture_context *tctx,
tctx 144 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername");
tctx 145 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.min_job_id, 14, "min job id");
tctx 146 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.max_job_id, 14, "max job id");
tctx 154 source4/torture/ndr/atsvc.c static bool jobdel_out_check(struct torture_context *tctx,
tctx 168 source4/torture/ndr/atsvc.c static bool jobgetinfo_in_check(struct torture_context *tctx,
tctx 171 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, r->in.servername, "WIN2KDC1", "servername");
tctx 172 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, r->in.job_id, 1, "job id");
tctx 184 source4/torture/ndr/atsvc.c static bool jobgetinfo_out_check(struct torture_context *tctx,
tctx 187 source4/torture/ndr/atsvc.c torture_assert(tctx, *r->out.job_info != NULL, "job info");
tctx 188 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, (*r->out.job_info)->job_time, 84600000, "time");
tctx 189 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, (*r->out.job_info)->days_of_month, 0, "days of month");
tctx 190 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, (*r->out.job_info)->days_of_week, 0x2, "days of week");
tctx 191 source4/torture/ndr/atsvc.c torture_assert_int_equal(tctx, (*r->out.job_info)->flags, 0x13, "flags");
tctx 192 source4/torture/ndr/atsvc.c torture_assert_str_equal(tctx, (*r->out.job_info)->command, "foo.exe", "command");
tctx 29 source4/torture/ndr/dfs.c static bool getmanagerversion_out_check(struct torture_context *tctx,
tctx 32 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, *r->out.version, 4, "version");
tctx 45 source4/torture/ndr/dfs.c static bool enumex_in_check300(struct torture_context *tctx,
tctx 48 source4/torture/ndr/dfs.c torture_assert_str_equal(tctx, r->in.dfs_name, "w2k3dc", "dfs name");
tctx 49 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->in.level, 300, "level");
tctx 50 source4/torture/ndr/dfs.c torture_assert(tctx, r->in.total != NULL, "total ptr");
tctx 51 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, *r->in.total, 0, "total");
tctx 52 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->in.bufsize, -1, "buf size");
tctx 53 source4/torture/ndr/dfs.c torture_assert(tctx, r->in.info != NULL, "info ptr");
tctx 54 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->in.info->level, 300, "info level");
tctx 55 source4/torture/ndr/dfs.c torture_assert(tctx, r->in.info->e.info300->s == NULL, "info data ptr");
tctx 84 source4/torture/ndr/dfs.c static bool enumex_out_check300(struct torture_context *tctx,
tctx 87 source4/torture/ndr/dfs.c torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx 88 source4/torture/ndr/dfs.c torture_assert(tctx, r->out.total != NULL, "total ptr");
tctx 89 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, *r->out.total, 3, "total");
tctx 90 source4/torture/ndr/dfs.c torture_assert(tctx, r->out.info != NULL, "info ptr");
tctx 91 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->out.info->level, 300, "info level");
tctx 92 source4/torture/ndr/dfs.c torture_assert(tctx, r->out.info->e.info300 != NULL, "info data ptr");
tctx 93 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->out.info->e.info300->count, 3, "info enum array");
tctx 94 source4/torture/ndr/dfs.c torture_assert_str_equal(tctx, r->out.info->e.info300->s[0].dom_root, "\\W2K3DC\\standaloneroot", "info enum array 0");
tctx 95 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->out.info->e.info300->s[0].flavor, 256, "info enum flavor 0");
tctx 96 source4/torture/ndr/dfs.c torture_assert_str_equal(tctx, r->out.info->e.info300->s[1].dom_root, "\\W2K3DC\\standaloneroot2", "info enum array 1");
tctx 97 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->out.info->e.info300->s[1].flavor, 256, "info enum flavor 1");
tctx 98 source4/torture/ndr/dfs.c torture_assert_str_equal(tctx, r->out.info->e.info300->s[2].dom_root, "\\W2K3DOM\\testdomainroot", "info enum array 2");
tctx 99 source4/torture/ndr/dfs.c torture_assert_int_equal(tctx, r->out.info->e.info300->s[2].flavor, 512, "info enum flavor 2");
tctx 39 source4/torture/ndr/epmap.c static bool map_in_check(struct torture_context *tctx,
tctx 43 source4/torture/ndr/epmap.c torture_assert_int_equal(tctx, r->in.max_towers, 1, "max towers");
tctx 44 source4/torture/ndr/epmap.c torture_assert(tctx, r->in.map_tower != NULL, "map tower");
tctx 45 source4/torture/ndr/epmap.c torture_assert_int_equal(tctx, r->in.map_tower->tower_length, 75, "tower len");
tctx 58 source4/torture/ndr/epmap.c static bool map_out_check(struct torture_context *tctx,
tctx 61 source4/torture/ndr/epmap.c torture_assert_int_equal(tctx, *r->out.num_towers, 1, "num towers");
tctx 62 source4/torture/ndr/epmap.c torture_assert_int_equal(tctx, r->out.result, 0x4b, "return code");
tctx 299 source4/torture/ndr/lsa.c static bool lsarlookupnames_in_check(struct torture_context *tctx,
tctx 304 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.num_names, 100, "num names");
tctx 306 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.names[i].string, "Users", "names");
tctx 308 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids != NULL, "sids");
tctx 309 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->count, 0, "sids count");
tctx 310 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids == NULL, "sids domains");
tctx 311 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx 312 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.count != NULL, "count ptr");
tctx 313 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 0, "count");
tctx 428 source4/torture/ndr/lsa.c static bool lsarlookupnames_out_check(struct torture_context *tctx,
tctx 432 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.domains != NULL, "domains ptr");
tctx 433 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->count, 1, "domains count");
tctx 434 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->max_size, 32, "domains size");
tctx 435 source4/torture/ndr/lsa.c torture_assert(tctx, domains->domains != NULL, "domains domains");
tctx 436 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, domains->domains[0].name.string, "BUILTIN", "domain name");
tctx 438 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.count != NULL, "count ptr");
tctx 439 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.count, 100, "count");
tctx 441 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->count, 100, "sids count");
tctx 442 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->sids[0].sid_type, 4, "sid type");
tctx 443 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->sids[0].rid, 0x221, "sid rid");
tctx 444 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->sids[0].sid_index, 0, "sid index");
tctx 655 source4/torture/ndr/lsa.c static bool lsarlookupsids_in_check(struct torture_context *tctx,
tctx 659 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->num_sids, 100, "num sids");
tctx 660 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids != NULL, "sids sids");
tctx 661 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.names->count, 0, "names count");
tctx 662 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.names->names == NULL, "names names");
tctx 663 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx 664 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.count != NULL, "count ptr");
tctx 665 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 0, "count");
tctx 1015 source4/torture/ndr/lsa.c static bool lsarlookupsids_out_check(struct torture_context *tctx,
tctx 1019 source4/torture/ndr/lsa.c torture_assert(tctx, domains != NULL, "domains");
tctx 1020 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->count, 1, "domains count");
tctx 1021 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->max_size, 32, "domains size");
tctx 1022 source4/torture/ndr/lsa.c torture_assert(tctx, domains->domains != NULL, "domains domains");
tctx 1023 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, domains->domains[0].name.string, "BUILTIN", "name");
tctx 1024 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1036 source4/torture/ndr/lsa.c static bool lsaropenpolicy2_in_check(struct torture_context *tctx,
tctx 1039 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.system_name, "\\", "system name");
tctx 1040 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr != NULL, "attr ptr");
tctx 1041 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.attr->len, 0, "attr len");
tctx 1042 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr->root_dir == NULL, "attr root");
tctx 1043 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr->object_name == NULL, "attr object name");
tctx 1044 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.attr->attributes, 0, "attr attributes");
tctx 1045 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask");
tctx 1054 source4/torture/ndr/lsa.c static bool lsaropenpolicy2_out_check(struct torture_context *tctx,
tctx 1058 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1069 source4/torture/ndr/lsa.c static bool lsaropenpolicy_in_check(struct torture_context *tctx,
tctx 1072 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.system_name != NULL, "system name");
tctx 1073 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr != NULL, "attr ptr");
tctx 1074 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.attr->len, 0, "attr len");
tctx 1075 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr->root_dir == NULL, "attr root");
tctx 1076 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.attr->object_name == NULL, "attr object name");
tctx 1077 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.attr->attributes, 0, "attr attributes");
tctx 1078 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask");
tctx 1088 source4/torture/ndr/lsa.c static bool lsaropenpolicy_out_check(struct torture_context *tctx,
tctx 1092 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1103 source4/torture/ndr/lsa.c static bool lsarcreateaccount_in_check(struct torture_context *tctx,
tctx 1108 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask");
tctx 1117 source4/torture/ndr/lsa.c static bool lsarcreateaccount_out_check(struct torture_context *tctx,
tctx 1121 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1130 source4/torture/ndr/lsa.c static bool lsardelete_in_check(struct torture_context *tctx,
tctx 1141 source4/torture/ndr/lsa.c static bool lsardelete_out_check(struct torture_context *tctx,
tctx 1144 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1159 source4/torture/ndr/lsa.c static bool lsarcreatesecret_in_check(struct torture_context *tctx,
tctx 1163 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.name.string, "torturesecret-852885356", "name");
tctx 1164 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask");
tctx 1173 source4/torture/ndr/lsa.c static bool lsarcreatesecret_out_check(struct torture_context *tctx,
tctx 1177 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1192 source4/torture/ndr/lsa.c static bool lsaropensecret_in_check(struct torture_context *tctx,
tctx 1196 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.name.string, "torturesecret-852885356", "name");
tctx 1197 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask");
tctx 1206 source4/torture/ndr/lsa.c static bool lsaropensecret_out_check(struct torture_context *tctx,
tctx 1210 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1224 source4/torture/ndr/lsa.c static bool lsarsetsecret_in_check(struct torture_context *tctx,
tctx 1228 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.new_val != NULL, "new val ptr");
tctx 1229 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.old_val == NULL, "old val ptr");
tctx 1230 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.new_val->length, 32, "new val len");
tctx 1231 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.new_val->size, 32, "new val size");
tctx 1240 source4/torture/ndr/lsa.c static bool lsarsetsecret_out_check(struct torture_context *tctx,
tctx 1243 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1254 source4/torture/ndr/lsa.c static bool lsarquerysecret_in_check(struct torture_context *tctx,
tctx 1258 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.new_val != NULL, "new val ptr");
tctx 1259 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.new_val->buf == NULL, "new val ptr ptr");
tctx 1260 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.new_mtime != NULL, "new mtime ptr");
tctx 1262 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.old_val == NULL, "old val ptr");
tctx 1263 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.old_mtime == NULL, "old mtime ptr");
tctx 1279 source4/torture/ndr/lsa.c static bool lsarquerysecret_out_check(struct torture_context *tctx,
tctx 1283 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.new_val != NULL, "new val ptr");
tctx 1284 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.new_mtime != NULL, "new mtime ptr");
tctx 1286 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.old_val == NULL, "old val ptr");
tctx 1287 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.old_mtime == NULL, "old mtime ptr");
tctx 1303 source4/torture/ndr/lsa.c static bool lsarcreatetrusteddomain_in_check(struct torture_context *tctx,
tctx 1307 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.info->name.string, "torturedomain", "name");
tctx 1308 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.info->sid != NULL, "sid");
tctx 1309 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask");
tctx 1318 source4/torture/ndr/lsa.c static bool lsarcreatetrusteddomain_out_check(struct torture_context *tctx,
tctx 1322 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1332 source4/torture/ndr/lsa.c static bool lsarenumerateaccounts_in_check(struct torture_context *tctx,
tctx 1336 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.resume_handle != NULL, "resume handle ptr");
tctx 1337 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.resume_handle, 0, "resume handle");
tctx 1338 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.num_entries, 100, "num entries");
tctx 1361 source4/torture/ndr/lsa.c static bool lsarenumerateaccounts_out_check(struct torture_context *tctx,
tctx 1364 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.resume_handle != NULL, "resume handle ptr");
tctx 1365 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.resume_handle, 7, "resume handle");
tctx 1366 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->num_sids, 7, "num sids");
tctx 1367 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.sids->sids != NULL, "sids sids");
tctx 1368 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.sids->sids[0].sid != NULL, "sids sids");
tctx 1369 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1395 source4/torture/ndr/lsa.c static bool lsarlookupsids2_in_check(struct torture_context *tctx,
tctx 1399 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->num_sids, 7, "num sids");
tctx 1400 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids != NULL, "sids sids");
tctx 1401 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids[0].sid != NULL, "sids sids");
tctx 1402 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.names != NULL, "names ptr");
tctx 1403 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.names->count, 0, "names count");
tctx 1404 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.names->names == NULL, "names");
tctx 1405 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx 1406 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.count != NULL, "count ptr");
tctx 1407 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 7, "count");
tctx 1408 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.unknown1, 0, "unknown 1");
tctx 1409 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.unknown2, 0, "unknown 2");
tctx 1476 source4/torture/ndr/lsa.c static bool lsarlookupsids2_out_check(struct torture_context *tctx,
tctx 1481 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.names != NULL, "names ptr");
tctx 1482 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.domains != NULL, "domains ptr");
tctx 1483 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->count, 4, "domains count");
tctx 1484 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->max_size, 32, "domains size");
tctx 1485 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, domains->domains[0].name.string, "NT AUTHORITY", "trust info name");
tctx 1486 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.names->count, 7, "names count");
tctx 1487 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[0].name.string, "Account Operators", "name str 1");
tctx 1488 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[1].name.string, "Administrators", "name str 2");
tctx 1489 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[2].name.string, "SUPPORT_388945a0", "name str 3");
tctx 1490 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.count != NULL, "count ptr");
tctx 1491 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.count, 7, "count");
tctx 1492 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1534 source4/torture/ndr/lsa.c static bool lsarlookupnames2_in_check(struct torture_context *tctx,
tctx 1538 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.num_names, 7, "num names");
tctx 1539 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.names[0].string, "Account Operators",
tctx 1541 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.names[1].string, "Administrators",
tctx 1543 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx 1544 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.lookup_options, 0, "lookup_options");
tctx 1545 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.client_revision, 0, "client_revision");
tctx 1546 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 0, "count");
tctx 1547 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->count, 0, "sids count");
tctx 1548 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids == NULL, "sids sids");
tctx 1587 source4/torture/ndr/lsa.c static bool lsarlookupnames2_out_check(struct torture_context *tctx,
tctx 1590 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.count, 7, "count");
tctx 1591 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->count, 7, "sids count");
tctx 1592 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1633 source4/torture/ndr/lsa.c static bool lsarlookupnames3_in_check(struct torture_context *tctx,
tctx 1637 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.num_names, 7, "num names");
tctx 1638 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.names[0].string, "Account Operators",
tctx 1640 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->in.names[1].string, "Administrators",
tctx 1642 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx 1643 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.lookup_options, 0, "lookup_options");
tctx 1644 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.client_revision, 0, "client_revision");
tctx 1645 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 0, "count");
tctx 1646 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->count, 0, "sids count");
tctx 1647 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids == NULL, "sids sids");
tctx 1697 source4/torture/ndr/lsa.c static bool lsarlookupnames3_out_check(struct torture_context *tctx,
tctx 1700 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.count, 7, "count");
tctx 1701 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.sids->count, 7, "sids count");
tctx 1702 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1728 source4/torture/ndr/lsa.c static bool lsarlookupsids3_in_check(struct torture_context *tctx,
tctx 1732 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.sids->num_sids, 7, "num sids");
tctx 1733 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids != NULL, "sids sids");
tctx 1734 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.sids->sids[0].sid != NULL, "sids sids");
tctx 1735 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.names != NULL, "names ptr");
tctx 1736 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.names->count, 0, "names count");
tctx 1737 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.names->names == NULL, "names");
tctx 1738 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.level, 1, "level");
tctx 1739 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.count != NULL, "count ptr");
tctx 1740 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.count, 7, "count");
tctx 1741 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.unknown1, 0, "unknown 1");
tctx 1742 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.unknown2, 0, "unknown 2");
tctx 1752 source4/torture/ndr/lsa.c static bool lsarlookupsids3_out_check(struct torture_context *tctx,
tctx 1757 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.names != NULL, "names ptr");
tctx 1758 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.domains != NULL, "domains ptr");
tctx 1759 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->count, 4, "domains count");
tctx 1760 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, domains->max_size, 32, "domains size");
tctx 1761 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, domains->domains[0].name.string, "NT AUTHORITY", "trust info name");
tctx 1762 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->out.names->count, 7, "names count");
tctx 1763 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[0].name.string, "Account Operators", "name str 1");
tctx 1764 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[1].name.string, "Administrators", "name str 2");
tctx 1765 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.names->names[2].name.string, "SUPPORT_388945a0", "name str 3");
tctx 1766 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.count != NULL, "count ptr");
tctx 1767 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.count, 7, "count");
tctx 1768 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 1779 source4/torture/ndr/lsa.c static bool lsarenumerateprivileges_in_check(struct torture_context *tctx,
tctx 1783 source4/torture/ndr/lsa.c torture_assert(tctx, r->in.resume_handle != NULL, "resume handle ptr");
tctx 1784 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->in.resume_handle, 0, "resume handle");
tctx 1785 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, r->in.max_count, 100, "max count");
tctx 1973 source4/torture/ndr/lsa.c static bool lsarenumerateprivileges_out_check(struct torture_context *tctx,
tctx 1976 source4/torture/ndr/lsa.c torture_assert(tctx, r->out.resume_handle != NULL, "resume handle ptr");
tctx 1977 source4/torture/ndr/lsa.c torture_assert_int_equal(tctx, *r->out.resume_handle, 29, "resume handle");
tctx 1978 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.privs->privs[0].name.string, "SeCreateTokenPrivilege", "name");
tctx 1979 source4/torture/ndr/lsa.c torture_assert_str_equal(tctx, r->out.privs->privs[1].name.string, "SeAssignPrimaryTokenPrivilege", "name");
tctx 1980 source4/torture/ndr/lsa.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 35 source4/torture/ndr/ndr.c static bool wrap_ndr_pull_test(struct torture_context *tctx,
tctx 41 source4/torture/ndr/ndr.c void *ds = talloc_zero_size(tctx, data->struct_size);
tctx 42 source4/torture/ndr/ndr.c struct ndr_pull *ndr = ndr_pull_init_blob(&(data->data), tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 46 source4/torture/ndr/ndr.c torture_assert_ndr_success(tctx, data->pull_fn(ndr, data->ndr_flags, ds),
tctx 49 source4/torture/ndr/ndr.c torture_assert(tctx, ndr->offset == ndr->data_size,
tctx 50 source4/torture/ndr/ndr.c talloc_asprintf(tctx,
tctx 54 source4/torture/ndr/ndr.c return check_fn(tctx, ds);
tctx 92 source4/torture/ndr/ndr.c static bool test_check_string_terminator(struct torture_context *tctx)
tctx 96 source4/torture/ndr/ndr.c TALLOC_CTX *mem_ctx = tctx;
tctx 99 source4/torture/ndr/ndr.c blob = strhex_to_data_blob(tctx, "0000");
tctx 101 source4/torture/ndr/ndr.c ndr = ndr_pull_init_blob(&blob, mem_ctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 103 source4/torture/ndr/ndr.c torture_assert_ndr_success(tctx, ndr_check_string_terminator(ndr, 1, 2),
tctx 106 source4/torture/ndr/ndr.c torture_assert(tctx, ndr->offset == 0,
tctx 110 source4/torture/ndr/ndr.c torture_fail(tctx, "check_string_terminator checked beyond string boundaries");
tctx 113 source4/torture/ndr/ndr.c torture_assert(tctx, ndr->offset == 0,
tctx 118 source4/torture/ndr/ndr.c blob = strhex_to_data_blob(tctx, "11220000");
tctx 119 source4/torture/ndr/ndr.c ndr = ndr_pull_init_blob(&blob, mem_ctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 121 source4/torture/ndr/ndr.c torture_assert_ndr_success(tctx,
tctx 125 source4/torture/ndr/ndr.c torture_assert_ndr_success(tctx,
tctx 130 source4/torture/ndr/ndr.c torture_fail(tctx, "check_string_terminator erroneously reported terminator");
tctx 133 source4/torture/ndr/ndr.c torture_assert(tctx, ndr->offset == 0,
tctx 138 source4/torture/ndr/ndr.c static bool test_guid_from_string_valid(struct torture_context *tctx)
tctx 144 source4/torture/ndr/ndr.c static bool test_guid_from_string_null(struct torture_context *tctx)
tctx 147 source4/torture/ndr/ndr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER,
tctx 153 source4/torture/ndr/ndr.c static bool test_guid_from_string_invalid(struct torture_context *tctx)
tctx 156 source4/torture/ndr/ndr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER,
tctx 162 source4/torture/ndr/ndr.c static bool test_guid_from_string(struct torture_context *tctx)
tctx 165 source4/torture/ndr/ndr.c torture_assert_ntstatus_ok(tctx,
tctx 179 source4/torture/ndr/ndr.c torture_assert(tctx, GUID_equal(&g1, &exp), "UUID parsed incorrectly");
tctx 180 source4/torture/ndr/ndr.c torture_assert_ntstatus_ok(tctx,
tctx 183 source4/torture/ndr/ndr.c torture_assert(tctx, GUID_equal(&g1, &exp), "UUID parsed incorrectly");
tctx 188 source4/torture/ndr/ndr.c static bool test_guid_string_valid(struct torture_context *tctx)
tctx 202 source4/torture/ndr/ndr.c torture_assert_str_equal(tctx, "00000001-0002-0003-0405-060708090a0b", GUID_string(tctx, &g),
tctx 207 source4/torture/ndr/ndr.c static bool test_guid_string2_valid(struct torture_context *tctx)
tctx 221 source4/torture/ndr/ndr.c torture_assert_str_equal(tctx, "{00000001-0002-0003-0405-060708090a0b}", GUID_string2(tctx, &g),
tctx 226 source4/torture/ndr/ndr.c static bool test_compare_uuid(struct torture_context *tctx)
tctx 230 source4/torture/ndr/ndr.c torture_assert_int_equal(tctx, 0, GUID_compare(&g1, &g2),
tctx 233 source4/torture/ndr/ndr.c torture_assert_int_equal(tctx, 1, GUID_compare(&g1, &g2),
tctx 237 source4/torture/ndr/ndr.c torture_assert_int_equal(tctx, 10, GUID_compare(&g1, &g2),
tctx 242 source4/torture/ndr/ndr.c torture_assert_int_equal(tctx, 20, GUID_compare(&g1, &g2),
tctx 40 source4/torture/ndr/netlogon.c static bool netrserverauthenticate3_in_check(struct torture_context *tctx,
tctx 44 source4/torture/ndr/netlogon.c torture_assert_str_equal(tctx, r->in.server_name, "\\\\NATIVE-DC.NATIVE.BASE", "server name");
tctx 45 source4/torture/ndr/netlogon.c torture_assert_str_equal(tctx, r->in.account_name, "NATIVE-2K$", "account name");
tctx 46 source4/torture/ndr/netlogon.c torture_assert_int_equal(tctx, r->in.secure_channel_type, 2, "secure channel type");
tctx 47 source4/torture/ndr/netlogon.c torture_assert_str_equal(tctx, r->in.computer_name, "NATIVE-2K", "computer name");
tctx 48 source4/torture/ndr/netlogon.c torture_assert_int_equal(tctx, *r->in.negotiate_flags, 0x6007ffff, "negotiate flags");
tctx 49 source4/torture/ndr/netlogon.c torture_assert_mem_equal(tctx, cred_expected, r->in.credentials->data, 8, "credentials");
tctx 58 source4/torture/ndr/netlogon.c static bool netrserverauthenticate3_out_check(struct torture_context *tctx,
tctx 62 source4/torture/ndr/netlogon.c torture_assert_mem_equal(tctx, cred_expected, r->out.return_credentials->data, 8, "return_credentials");
tctx 63 source4/torture/ndr/netlogon.c torture_assert_int_equal(tctx, *r->out.negotiate_flags, 0x6007ffff, "negotiate flags");
tctx 64 source4/torture/ndr/netlogon.c torture_assert_int_equal(tctx, *r->out.rid, 0x454, "rid");
tctx 65 source4/torture/ndr/netlogon.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 82 source4/torture/ndr/netlogon.c static bool netrserverreqchallenge_in_check(struct torture_context *tctx,
tctx 86 source4/torture/ndr/netlogon.c torture_assert_str_equal(tctx, r->in.server_name, "\\\\NATIVE-DC.NATIVE.BASE", "server name");
tctx 87 source4/torture/ndr/netlogon.c torture_assert_str_equal(tctx, r->in.computer_name, "NATIVE-2K", "account name");
tctx 88 source4/torture/ndr/netlogon.c torture_assert_mem_equal(tctx, cred_expected, r->in.credentials->data, 8, "credentials");
tctx 97 source4/torture/ndr/netlogon.c static bool netrserverreqchallenge_out_check(struct torture_context *tctx,
tctx 101 source4/torture/ndr/netlogon.c torture_assert_mem_equal(tctx, cred_expected, r->out.return_credentials->data, 8, "return_credentials");
tctx 102 source4/torture/ndr/netlogon.c torture_assert_ntstatus_ok(tctx, r->out.result, "return code");
tctx 32 source4/torture/ndr/winreg.c static bool closekey_in_check(struct torture_context *tctx,
tctx 35 source4/torture/ndr/winreg.c torture_assert(tctx, ck->in.handle != NULL, "handle invalid");
tctx 36 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, ck->in.handle->handle_type, 0, "handle type");
tctx 45 source4/torture/ndr/winreg.c static bool closekey_out_check(struct torture_context *tctx,
tctx 48 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, ck->out.handle->handle_type, 0, "handle type");
tctx 49 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, ck->out.result, "return code");
tctx 57 source4/torture/ndr/winreg.c static bool openhklm_in_check(struct torture_context *tctx,
tctx 60 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.system_name != NULL, "system name pointer");
tctx 61 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.system_name, 34016, "system name");
tctx 62 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask");
tctx 71 source4/torture/ndr/winreg.c static bool openhklm_out_check(struct torture_context *tctx,
tctx 74 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.handle != NULL, "handle pointer");
tctx 75 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.handle->handle_type, 0, "handle_type");
tctx 76 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx 91 source4/torture/ndr/winreg.c static bool createkey_in_check(struct torture_context *tctx,
tctx 94 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->in.name.name, "spottyfoot", "name");
tctx 95 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.keyclass.name == NULL, "keyclass");
tctx 96 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.options, 0, "option");
tctx 97 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.access_mask, 0x2000000, "access mask");
tctx 98 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.secdesc == NULL, "secdesc");
tctx 99 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.action_taken == NULL, "action_taken");
tctx 110 source4/torture/ndr/winreg.c static bool createkey_out_check(struct torture_context *tctx,
tctx 113 source4/torture/ndr/winreg.c torture_assert(tctx, GUID_all_zero(&r->out.new_handle->uuid), "new_handle");
tctx 114 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.action_taken == NULL, "action_taken pointer");
tctx 115 source4/torture/ndr/winreg.c torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM,
tctx 131 source4/torture/ndr/winreg.c static bool enumvalue_in_check(struct torture_context *tctx,
tctx 134 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.enum_index, 5, "enum index");
tctx 135 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.type != NULL, "type pointer");
tctx 136 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.type, 0, "type");
tctx 137 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.size, 65535, "size");
tctx 138 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.length, 0, "length");
tctx 139 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.name->size, 512, "name size");
tctx 140 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.name->length, 0, "name length");
tctx 162 source4/torture/ndr/winreg.c static bool enumvalue_out_check(struct torture_context *tctx,
tctx 165 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.name->size, 512, "name size");
tctx 166 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.name->length, 18, "name length");
tctx 167 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->out.name->name, "HOMEPATH", "name");
tctx 168 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.type, 1, "type");
tctx 169 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.size, 76, "size");
tctx 170 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.length, 76, "length");
tctx 171 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx 197 source4/torture/ndr/winreg.c static bool queryvalue_in_check(struct torture_context *tctx,
tctx 200 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->in.value_name->name, "HOMEPATH", "name");
tctx 201 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.type, 0, "type");
tctx 202 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.data_size, 4095, "size");
tctx 203 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.data_length, 0, "length");
tctx 204 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.data == NULL, "data pointer");
tctx 215 source4/torture/ndr/winreg.c static bool queryvalue_out_check(struct torture_context *tctx,
tctx 218 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx 219 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.type, 1, "type");
tctx 220 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.data == NULL, "data pointer");
tctx 221 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.data_size, 76, "size");
tctx 222 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.data_length, 0, "length");
tctx 242 source4/torture/ndr/winreg.c static bool querymultiplevalues_in_check(struct torture_context *tctx,
tctx 245 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.num_values, 1, "num values");
tctx 246 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->in.values[0].name->name, "HOMEPATH",
tctx 249 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.values[0].type, 0, "type");
tctx 250 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.values[0].offset, 0, "offset");
tctx 251 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.values[0].length, 0, "length");
tctx 252 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->in.buffer_size, 76, "buffer size");
tctx 274 source4/torture/ndr/winreg.c static bool querymultiplevalues_out_check(struct torture_context *tctx,
tctx 277 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->out.values[0].name->name, "HOMEPATH",
tctx 280 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.values[0].type, 0, "type");
tctx 281 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.values[0].offset, 0, "offset");
tctx 282 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.values[0].length, 0, "length");
tctx 284 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.buffer_size, 76, "buffer size");
tctx 285 source4/torture/ndr/winreg.c torture_assert_werr_equal(tctx, r->out.result, WERR_MORE_DATA,
tctx 296 source4/torture/ndr/winreg.c static bool flushkey_in_check(struct torture_context *tctx,
tctx 299 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.handle->handle_type, 0, "handle type");
tctx 307 source4/torture/ndr/winreg.c static bool flushkey_out_check(struct torture_context *tctx,
tctx 310 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx 324 source4/torture/ndr/winreg.c static bool openkey_in_check(struct torture_context *tctx, struct winreg_OpenKey *r)
tctx 326 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.unknown, 0, "unknown");
tctx 327 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.access_mask, 0x02000000, "access mask");
tctx 328 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->in.keyname.name, "spottyfoot", "keyname");
tctx 338 source4/torture/ndr/winreg.c static bool openkey_out_check(struct torture_context *tctx, struct winreg_OpenKey *r)
tctx 340 source4/torture/ndr/winreg.c torture_assert(tctx, GUID_all_zero(&r->out.handle->uuid), "handle");
tctx 341 source4/torture/ndr/winreg.c torture_assert_werr_equal(tctx, r->out.result, WERR_BADFILE, "return code");
tctx 354 source4/torture/ndr/winreg.c static bool deletekey_in_check(struct torture_context *tctx, struct winreg_DeleteKey *r)
tctx 357 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->in.key.name, "spottyfoot", "key name");
tctx 365 source4/torture/ndr/winreg.c static bool deletekey_out_check(struct torture_context *tctx, struct winreg_DeleteKey *r)
tctx 367 source4/torture/ndr/winreg.c torture_assert_werr_equal(tctx, r->out.result, WERR_BADFILE, "return code");
tctx 376 source4/torture/ndr/winreg.c static bool getversion_in_check(struct torture_context *tctx, struct winreg_GetVersion *r)
tctx 386 source4/torture/ndr/winreg.c static bool getversion_out_check(struct torture_context *tctx, struct winreg_GetVersion *r)
tctx 388 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.version, 5, "version");
tctx 389 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx 399 source4/torture/ndr/winreg.c static bool queryinfokey_in_check(struct torture_context *tctx, struct winreg_QueryInfoKey *r)
tctx 402 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.classname->name == NULL, "class in");
tctx 413 source4/torture/ndr/winreg.c static bool queryinfokey_out_check(struct torture_context *tctx, struct winreg_QueryInfoKey *r)
tctx 415 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.classname != NULL, "class out");
tctx 416 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.classname->name != NULL, "class out name");
tctx 417 source4/torture/ndr/winreg.c torture_assert_str_equal(tctx, r->out.classname->name, "", "class out name");
tctx 418 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.num_subkeys, 0, "num subkeys");
tctx 419 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.max_subkeylen, 0, "subkey length");
tctx 420 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, *r->out.max_classlen, 140, "subkey size");
tctx 421 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx 433 source4/torture/ndr/winreg.c static bool notifychangekeyvalue_in_check(struct torture_context *tctx, struct winreg_NotifyChangeKeyValue *r)
tctx 435 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.watch_subtree, 1, "watch subtree");
tctx 436 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.notify_filter, 0, "notify filter");
tctx 437 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.unknown, 0, "unknown");
tctx 438 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.string1.name == NULL, "string1");
tctx 439 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.string2.name == NULL, "string2");
tctx 440 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.unknown2, 0, "unknown2");
tctx 448 source4/torture/ndr/winreg.c static bool notifychangekeyvalue_out_check(struct torture_context *tctx, struct winreg_NotifyChangeKeyValue *r)
tctx 450 source4/torture/ndr/winreg.c torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, "notify change key value");
tctx 460 source4/torture/ndr/winreg.c static bool getkeysecurity_in_check(struct torture_context *tctx,
tctx 464 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sec_info, 2, "sec info");
tctx 465 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->size, 65536, "sd size");
tctx 466 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->len, 0, "sd len");
tctx 467 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.sd->data == NULL, "sd data");
tctx 478 source4/torture/ndr/winreg.c static bool getkeysecurity_out_check(struct torture_context *tctx,
tctx 481 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->size, 20, "sd size");
tctx 482 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->len, 20, "sd len");
tctx 483 source4/torture/ndr/winreg.c torture_assert_werr_ok(tctx, r->out.result, "return code");
tctx 496 source4/torture/ndr/winreg.c static bool enumkey_in_check(struct torture_context *tctx, struct winreg_EnumKey *r)
tctx 498 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.enum_index, 0, "enum index");
tctx 499 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.name->size, 1044, "name size");
tctx 500 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.name->length, 0, "name len");
tctx 501 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.keyclass != NULL, "keyclass pointer");
tctx 502 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.keyclass->name == NULL, "keyclass");
tctx 503 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.last_changed_time != NULL, "last_changed_time != NULL");
tctx 515 source4/torture/ndr/winreg.c static bool enumkey_out_check(struct torture_context *tctx, struct winreg_EnumKey *r)
tctx 517 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.name->size, 1044, "name size");
tctx 518 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->out.name->length, 8, "name len");
tctx 519 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.keyclass != NULL, "keyclass pointer");
tctx 520 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.keyclass->name == NULL, "keyclass");
tctx 521 source4/torture/ndr/winreg.c torture_assert(tctx, r->out.last_changed_time != NULL, "last_changed_time pointer");
tctx 318 source4/torture/rap/rap.c static bool test_netshareenum(struct torture_context *tctx,
tctx 327 source4/torture/rap/rap.c torture_assert_ntstatus_ok(tctx,
tctx 328 source4/torture/rap/rap.c smbcli_rap_netshareenum(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), "");
tctx 415 source4/torture/rap/rap.c static bool test_netserverenum(struct torture_context *tctx,
tctx 427 source4/torture/rap/rap.c torture_assert_ntstatus_ok(tctx,
tctx 428 source4/torture/rap/rap.c smbcli_rap_netserverenum2(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), "");
tctx 506 source4/torture/rap/rap.c static bool test_netservergetinfo(struct torture_context *tctx,
tctx 515 source4/torture/rap/rap.c torture_assert_ntstatus_ok(tctx, smbcli_rap_netservergetinfo(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), "");
tctx 517 source4/torture/rap/rap.c torture_assert_ntstatus_ok(tctx, smbcli_rap_netservergetinfo(cli->tree, lp_iconv_convenience(tctx->lp_ctx), tctx, &r), "");
tctx 43 source4/torture/raw/acls.c static bool test_sd(struct torture_context *tctx,
tctx 73 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 83 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 89 source4/torture/raw/acls.c test_sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-5432");
tctx 107 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 127 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 148 source4/torture/raw/acls.c static bool test_nttrans_create(struct torture_context *tctx,
tctx 182 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 194 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 202 source4/torture/raw/acls.c test_sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-54321");
tctx 215 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 220 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 241 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &_q); \
tctx 254 source4/torture/raw/acls.c static bool test_nttrans_create_null_dacl(struct torture_context *tctx,
tctx 264 source4/torture/raw/acls.c struct security_descriptor *sd = security_descriptor_initialise(tctx);
tctx 287 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 298 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 334 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 351 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 359 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 367 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 375 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 383 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 409 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 432 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 440 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 445 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 450 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 455 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 476 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 499 source4/torture/raw/acls.c static bool test_creator_sid(struct torture_context *tctx,
tctx 528 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 536 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 540 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx 543 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 561 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 566 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 571 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 576 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 580 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 596 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 609 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 614 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 623 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 628 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 635 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 648 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx,
tctx 656 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 670 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 675 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 684 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 689 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 711 source4/torture/raw/acls.c static bool test_generic_bits(struct torture_context *tctx,
tctx 767 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 775 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 779 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx 813 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 829 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx,
tctx 837 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 849 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 861 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 877 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx,
tctx 885 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 897 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 932 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 940 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 944 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx 978 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 994 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx,
tctx 1002 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 1014 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1026 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 1042 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx,
tctx 1050 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 1062 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1086 source4/torture/raw/acls.c static bool test_owner_bits(struct torture_context *tctx,
tctx 1121 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1129 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 1133 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx 1153 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 1174 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1209 source4/torture/raw/acls.c static bool test_inheritance(struct torture_context *tctx,
tctx 1349 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1357 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 1361 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx 1365 source4/torture/raw/acls.c sd_def = security_descriptor_dacl_create(tctx,
tctx 1377 source4/torture/raw/acls.c creator_owner = dom_sid_parse_talloc(tctx, SID_CREATOR_OWNER);
tctx 1380 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 1400 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1405 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 1445 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1450 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 1517 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 1539 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1546 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 1550 source4/torture/raw/acls.c sd2 = security_descriptor_dacl_create(tctx,
tctx 1568 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1582 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1588 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1592 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1609 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1613 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1637 source4/torture/raw/acls.c static bool test_inheritance_dynamic(struct torture_context *tctx,
tctx 1670 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1678 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &q);
tctx 1682 source4/torture/raw/acls.c owner_sid = dom_sid_string(tctx, sd_orig->owner_sid);
tctx 1686 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 1707 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1715 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1722 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1726 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 1741 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1749 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1803 source4/torture/raw/acls.c static bool test_sd_get_set(struct torture_context *tctx,
tctx 1841 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
tctx 1864 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1884 source4/torture/raw/acls.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1891 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &fi);
tctx 1900 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &fi);
tctx 1919 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &fi);
tctx 1938 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &fi);
tctx 1957 source4/torture/raw/acls.c status = smb_raw_fileinfo(cli->tree, tctx, &fi);
tctx 1989 source4/torture/raw/acls.c bool torture_raw_acls(struct torture_context *tctx, struct smbcli_state *cli)
tctx 1997 source4/torture/raw/acls.c ret &= test_sd(tctx, cli);
tctx 1998 source4/torture/raw/acls.c ret &= test_nttrans_create(tctx, cli);
tctx 1999 source4/torture/raw/acls.c ret &= test_nttrans_create_null_dacl(tctx, cli);
tctx 2000 source4/torture/raw/acls.c ret &= test_creator_sid(tctx, cli);
tctx 2001 source4/torture/raw/acls.c ret &= test_generic_bits(tctx, cli);
tctx 2002 source4/torture/raw/acls.c ret &= test_owner_bits(tctx, cli);
tctx 2003 source4/torture/raw/acls.c ret &= test_inheritance(tctx, cli);
tctx 2004 source4/torture/raw/acls.c ret &= test_inheritance_dynamic(tctx, cli);
tctx 2005 source4/torture/raw/acls.c ret &= test_sd_get_set(tctx, cli);
tctx 59 source4/torture/raw/chkpath.c static bool test_path_ex(struct smbcli_state *cli, struct torture_context *tctx,
tctx 99 source4/torture/raw/chkpath.c if (tctx && torture_setting_bool(tctx, "samba4", false)) {
tctx 120 source4/torture/raw/chkpath.c static bool test_chkpath(struct smbcli_state *cli, struct torture_context *tctx)
tctx 135 source4/torture/raw/chkpath.c fnum = create_complex_file(cli, tctx, BASEDIR "\\test.txt..");
tctx 150 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx 151 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR) + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx 152 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\\\") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx 153 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\foo\\..") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx 154 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\f\\o\\o\\..\\..\\..") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx 155 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, ((const char *)BASEDIR"\\foo\\\\..\\\\") + 1, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx 156 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR"\\", BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx 157 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR"\\\\..\\"BASEDIR, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx 158 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR"\\\\\\", BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx 159 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, "\\\\\\\\"BASEDIR"\\\\\\\\", BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx 160 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, "\\\\\\\\"BASEDIR, BASEDIR, NT_STATUS_OK, NT_STATUS_OK);
tctx 161 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR "\\foo\\..\\test.txt..", BASEDIR "\\test.txt..",
tctx 163 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, "", "\\", NT_STATUS_OK, NT_STATUS_OK);
tctx 182 source4/torture/raw/chkpath.c status = single_search(cli, tctx, "\\.\\\\\\\\\\\\.");
tctx 224 source4/torture/raw/chkpath.c ret &= test_path_ex(cli, tctx, BASEDIR "\\..", "\\", NT_STATUS_OK,NT_STATUS_OK);
tctx 243 source4/torture/raw/chkpath.c status = single_search(cli, tctx, BASEDIR".\\.\\.\\.\\foo\\..\\.\\");
tctx 271 source4/torture/raw/chkpath.c static bool test_chkpath_names(struct smbcli_state *cli, struct torture_context *tctx)
tctx 289 source4/torture/raw/chkpath.c char *path = talloc_asprintf(tctx, "%s\\File0x%02X%c",
tctx 309 source4/torture/raw/chkpath.c torture_setting_bool(tctx, "samba3", false)) {
tctx 47 source4/torture/raw/composite.c static bool test_loadfile(struct smbcli_state *cli, struct torture_context *tctx)
tctx 58 source4/torture/raw/composite.c int *count = talloc_zero(tctx, int);
tctx 60 source4/torture/raw/composite.c data = talloc_array(tctx, uint8_t, len);
tctx 80 source4/torture/raw/composite.c c = talloc_array(tctx, struct composite_context *, num_ops);
tctx 91 source4/torture/raw/composite.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 99 source4/torture/raw/composite.c status = smb_composite_loadfile_recv(c[i], tctx);
tctx 125 source4/torture/raw/composite.c static bool test_fetchfile(struct smbcli_state *cli, struct torture_context *tctx)
tctx 137 source4/torture/raw/composite.c int *count = talloc_zero(tctx, int);
tctx 140 source4/torture/raw/composite.c data = talloc_array(tctx, uint8_t, len);
tctx 156 source4/torture/raw/composite.c io2.in.dest_host = torture_setting_string(tctx, "host", NULL);
tctx 157 source4/torture/raw/composite.c io2.in.ports = lp_smb_ports(tctx->lp_ctx);
tctx 158 source4/torture/raw/composite.c io2.in.called_name = torture_setting_string(tctx, "host", NULL);
tctx 159 source4/torture/raw/composite.c io2.in.service = torture_setting_string(tctx, "share", NULL);
tctx 163 source4/torture/raw/composite.c io2.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 165 source4/torture/raw/composite.c io2.in.resolve_ctx = lp_resolve_context(tctx->lp_ctx);
tctx 166 source4/torture/raw/composite.c io2.in.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx);
tctx 167 source4/torture/raw/composite.c io2.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx 168 source4/torture/raw/composite.c lp_smbcli_options(tctx->lp_ctx, &io2.in.options);
tctx 169 source4/torture/raw/composite.c lp_smbcli_session_options(tctx->lp_ctx, &io2.in.session_options);
tctx 174 source4/torture/raw/composite.c c = talloc_array(tctx, struct composite_context *, torture_numops);
tctx 186 source4/torture/raw/composite.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 194 source4/torture/raw/composite.c status = smb_composite_fetchfile_recv(c[i], tctx);
tctx 223 source4/torture/raw/composite.c static bool test_appendacl(struct smbcli_state *cli, struct torture_context *tctx)
tctx 235 source4/torture/raw/composite.c int *count = talloc_zero(tctx, int);
tctx 241 source4/torture/raw/composite.c io_orig = talloc_array(tctx, struct smb_composite_appendacl *, num_ops);
tctx 269 source4/torture/raw/composite.c test_sd = security_descriptor_initialise(tctx);
tctx 270 source4/torture/raw/composite.c test_sid = dom_sid_parse_talloc (tctx, "S-1-5-32-1234-5432");
tctx 272 source4/torture/raw/composite.c ace = talloc_zero(tctx, struct security_ace);
tctx 289 source4/torture/raw/composite.c c = talloc_array(tctx, struct composite_context *, num_ops);
tctx 290 source4/torture/raw/composite.c io = talloc_array(tctx, struct smb_composite_appendacl *, num_ops);
tctx 302 source4/torture/raw/composite.c event_ctx = tctx->ev;
tctx 306 source4/torture/raw/composite.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 336 source4/torture/raw/composite.c static bool test_fsinfo(struct smbcli_state *cli, struct torture_context *tctx)
tctx 346 source4/torture/raw/composite.c int *count = talloc_zero(tctx, int);
tctx 349 source4/torture/raw/composite.c io1.in.dest_host = torture_setting_string(tctx, "host", NULL);
tctx 350 source4/torture/raw/composite.c io1.in.dest_ports = lp_smb_ports(tctx->lp_ctx);
tctx 351 source4/torture/raw/composite.c io1.in.socket_options = lp_socket_options(tctx->lp_ctx);
tctx 352 source4/torture/raw/composite.c io1.in.called_name = torture_setting_string(tctx, "host", NULL);
tctx 353 source4/torture/raw/composite.c io1.in.service = torture_setting_string(tctx, "share", NULL);
tctx 356 source4/torture/raw/composite.c io1.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 358 source4/torture/raw/composite.c io1.in.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx);
tctx 359 source4/torture/raw/composite.c io1.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx 363 source4/torture/raw/composite.c event_ctx = tctx->ev;
tctx 364 source4/torture/raw/composite.c c = talloc_array(tctx, struct composite_context *, torture_numops);
tctx 367 source4/torture/raw/composite.c c[i] = smb_composite_fsinfo_send(cli->tree, &io1, lp_resolve_context(tctx->lp_ctx));
tctx 376 source4/torture/raw/composite.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 384 source4/torture/raw/composite.c status = smb_composite_fsinfo_recv(c[i], tctx);
tctx 399 source4/torture/raw/composite.c guid=GUID_string(tctx, &io1.out.fsinfo->objectid_information.out.guid);
tctx 412 source4/torture/raw/composite.c bool torture_raw_composite(struct torture_context *tctx,
tctx 421 source4/torture/raw/composite.c ret &= test_fetchfile(cli, tctx);
tctx 422 source4/torture/raw/composite.c ret &= test_loadfile(cli, tctx);
tctx 423 source4/torture/raw/composite.c ret &= test_appendacl(cli, tctx);
tctx 424 source4/torture/raw/composite.c ret &= test_fsinfo(cli, tctx);
tctx 63 source4/torture/raw/context.c static bool test_session(struct smbcli_state *cli, struct torture_context *tctx)
tctx 95 source4/torture/raw/context.c lp_smbcli_session_options(tctx->lp_ctx, &options);
tctx 96 source4/torture/raw/context.c gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx 98 source4/torture/raw/context.c session = smbcli_session_init(cli->transport, tctx, false, options);
tctx 102 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 113 source4/torture/raw/context.c session2 = smbcli_session_init(cli->transport, tctx, false, options);
tctx 118 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 140 source4/torture/raw/context.c session3 = smbcli_session_init(cli->transport, tctx, false, options);
tctx 145 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 153 source4/torture/raw/context.c session4 = smbcli_session_init(cli->transport, tctx, false, options);
tctx 158 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 160 source4/torture/raw/context.c anon_creds = cli_credentials_init(tctx);
tctx 161 source4/torture/raw/context.c cli_credentials_set_conf(anon_creds, tctx->lp_ctx);
tctx 173 source4/torture/raw/context.c tree = smbcli_tree_init(session, tctx, false);
tctx 189 source4/torture/raw/context.c status = smb_raw_open(tree, tctx, &io);
tctx 235 source4/torture/raw/context.c setups[i].in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 240 source4/torture/raw/context.c sessions[i] = smbcli_session_init(cli->transport, tctx, false, options);
tctx 268 source4/torture/raw/context.c static bool test_tree(struct smbcli_state *cli, struct torture_context *tctx)
tctx 288 source4/torture/raw/context.c share = torture_setting_string(tctx, "share", NULL);
tctx 289 source4/torture/raw/context.c host = torture_setting_string(tctx, "host", NULL);
tctx 292 source4/torture/raw/context.c tree = smbcli_tree_init(cli->session, tctx, false);
tctx 297 source4/torture/raw/context.c tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share);
tctx 299 source4/torture/raw/context.c status = smb_raw_tcon(tree, tctx, &tcon);
tctx 308 source4/torture/raw/context.c status = smb_raw_tcon(tree, tctx, &tcon);
tctx 325 source4/torture/raw/context.c status = smb_raw_open(tree, tctx, &io);
tctx 373 source4/torture/raw/context.c static bool test_tree_ulogoff(struct smbcli_state *cli, struct torture_context *tctx)
tctx 397 source4/torture/raw/context.c share = torture_setting_string(tctx, "share", NULL);
tctx 398 source4/torture/raw/context.c host = torture_setting_string(tctx, "host", NULL);
tctx 400 source4/torture/raw/context.c lp_smbcli_session_options(tctx->lp_ctx, &options);
tctx 403 source4/torture/raw/context.c session1 = smbcli_session_init(cli->transport, tctx, false, options);
tctx 406 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 408 source4/torture/raw/context.c setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx 415 source4/torture/raw/context.c tree = smbcli_tree_init(session1, tctx, false);
tctx 419 source4/torture/raw/context.c tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share);
tctx 421 source4/torture/raw/context.c status = smb_raw_tcon(tree, tctx, &tcon);
tctx 439 source4/torture/raw/context.c status = smb_raw_open(tree, tctx, &io);
tctx 460 source4/torture/raw/context.c session2 = smbcli_session_init(cli->transport, tctx, false, options);
tctx 463 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 465 source4/torture/raw/context.c setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx 487 source4/torture/raw/context.c status = smb_raw_open(tree, tctx, &io);
tctx 636 source4/torture/raw/context.c static bool test_pid_2sess(struct smbcli_state *cli, struct torture_context *tctx)
tctx 657 source4/torture/raw/context.c lp_smbcli_session_options(tctx->lp_ctx, &options);
tctx 660 source4/torture/raw/context.c session = smbcli_session_init(cli->transport, tctx, false, options);
tctx 664 source4/torture/raw/context.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 666 source4/torture/raw/context.c setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx 691 source4/torture/raw/context.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 743 source4/torture/raw/context.c static bool test_pid_2tcon(struct smbcli_state *cli, struct torture_context *tctx)
tctx 765 source4/torture/raw/context.c share = torture_setting_string(tctx, "share", NULL);
tctx 766 source4/torture/raw/context.c host = torture_setting_string(tctx, "host", NULL);
tctx 769 source4/torture/raw/context.c tree = smbcli_tree_init(cli->session, tctx, false);
tctx 774 source4/torture/raw/context.c tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share);
tctx 776 source4/torture/raw/context.c status = smb_raw_tcon(tree, tctx, &tcon);
tctx 799 source4/torture/raw/context.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 830 source4/torture/raw/context.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 885 source4/torture/raw/context.c static bool torture_raw_context_int(struct torture_context *tctx,
tctx 890 source4/torture/raw/context.c ret &= test_session(cli, tctx);
tctx 891 source4/torture/raw/context.c ret &= test_tree(cli, tctx);
tctx 892 source4/torture/raw/context.c ret &= test_tree_ulogoff(cli, tctx);
tctx 893 source4/torture/raw/context.c ret &= test_pid_exit_only_sees_open(cli, tctx);
tctx 894 source4/torture/raw/context.c ret &= test_pid_2sess(cli, tctx);
tctx 895 source4/torture/raw/context.c ret &= test_pid_2tcon(cli, tctx);
tctx 231 source4/torture/raw/eas.c static bool test_max_eas(struct smbcli_state *cli, struct torture_context *tctx)
tctx 249 source4/torture/raw/eas.c maxeasize = torture_setting_int(tctx, "maxeasize", 65536);
tctx 250 source4/torture/raw/eas.c maxeanames = torture_setting_int(tctx, "maxeanames", 101);
tctx 251 source4/torture/raw/eas.c maxeastart = torture_setting_int(tctx, "maxeastart", 1);
tctx 252 source4/torture/raw/eas.c maxeadebug = torture_setting_int(tctx, "maxeadebug", 0);
tctx 298 source4/torture/raw/eas.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 302 source4/torture/raw/eas.c eablob = data_blob_talloc(tctx, NULL, maxeasize);
tctx 338 source4/torture/raw/eas.c eaname = talloc_asprintf(tctx, "MAX%d", i);
tctx 73 source4/torture/raw/lock.c static bool test_lock(struct torture_context *tctx, struct smbcli_state *cli)
tctx 208 source4/torture/raw/lock.c static bool test_lockx(struct torture_context *tctx, struct smbcli_state *cli)
tctx 366 source4/torture/raw/lock.c if (TARGET_IS_WIN7(tctx))
tctx 378 source4/torture/raw/lock.c if (TARGET_IS_WIN7(tctx))
tctx 396 source4/torture/raw/lock.c static bool test_pidhigh(struct torture_context *tctx,
tctx 476 source4/torture/raw/lock.c static bool test_async(struct torture_context *tctx,
tctx 498 source4/torture/raw/lock.c lp_smbcli_session_options(tctx->lp_ctx, &options);
tctx 629 source4/torture/raw/lock.c session = smbcli_session_init(cli->transport, tctx, false, options);
tctx 632 source4/torture/raw/lock.c setup.in.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 634 source4/torture/raw/lock.c setup.in.gensec_settings = lp_gensec_settings(tctx, tctx->lp_ctx);
tctx 640 source4/torture/raw/lock.c share = torture_setting_string(tctx, "share", NULL);
tctx 641 source4/torture/raw/lock.c host = torture_setting_string(tctx, "host", NULL);
tctx 642 source4/torture/raw/lock.c tree = smbcli_tree_init(session, tctx, false);
tctx 646 source4/torture/raw/lock.c tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share);
tctx 648 source4/torture/raw/lock.c status = smb_raw_tcon(tree, tctx, &tcon);
tctx 813 source4/torture/raw/lock.c static bool test_errorcode(struct torture_context *tctx,
tctx 857 source4/torture/raw/lock.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 861 source4/torture/raw/lock.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 1295 source4/torture/raw/lock.c static bool test_changetype(struct torture_context *tctx,
tctx 1397 source4/torture/raw/lock.c static bool test_zerobytelocks(struct torture_context *tctx, struct smbcli_state *cli)
tctx 1487 source4/torture/raw/lock.c static bool test_unlock(struct torture_context *tctx, struct smbcli_state *cli)
tctx 1641 source4/torture/raw/lock.c if (TARGET_IS_WIN7(tctx))
tctx 1654 source4/torture/raw/lock.c if (TARGET_IS_WIN7(tctx))
tctx 1672 source4/torture/raw/lock.c static bool test_multiple_unlock(struct torture_context *tctx, struct smbcli_state *cli)
tctx 1789 source4/torture/raw/lock.c static bool test_stacking(struct torture_context *tctx, struct smbcli_state *cli)
tctx 47 source4/torture/raw/lockbench.c struct torture_context *tctx;
tctx 184 source4/torture/raw/lockbench.c if (!torture_get_conn_index(state->client_num, state->mem_ctx, state->tctx, &host, &share)) {
tctx 191 source4/torture/raw/lockbench.c io->in.gensec_settings = lp_gensec_settings(state->mem_ctx, state->tctx->lp_ctx);
tctx 192 source4/torture/raw/lockbench.c io->in.socket_options = lp_socket_options(state->tctx->lp_ctx);
tctx 198 source4/torture/raw/lockbench.c io->in.workgroup = lp_workgroup(state->tctx->lp_ctx);
tctx 199 source4/torture/raw/lockbench.c io->in.iconv_convenience = lp_iconv_convenience(state->tctx->lp_ctx);
tctx 200 source4/torture/raw/lockbench.c lp_smbcli_options(state->tctx->lp_ctx, &io->in.options);
tctx 201 source4/torture/raw/lockbench.c lp_smbcli_session_options(state->tctx->lp_ctx, &io->in.session_options);
tctx 208 source4/torture/raw/lockbench.c lp_resolve_context(state->tctx->lp_ctx),
tctx 336 source4/torture/raw/lockbench.c state[i].tctx = torture;
tctx 40 source4/torture/raw/mkdir.c static bool test_mkdir(struct smbcli_state *cli, struct torture_context *tctx)
tctx 78 source4/torture/raw/mkdir.c smbcli_close(cli->tree, create_complex_file(cli, tctx, path));
tctx 110 source4/torture/raw/mkdir.c md.t2mkdir.in.path = talloc_asprintf(tctx, "%s\\bad_path\\bad_path",
tctx 121 source4/torture/raw/mkdir.c md.t2mkdir.in.eas = talloc_array(tctx, struct ea_struct, md.t2mkdir.in.num_eas);
tctx 124 source4/torture/raw/mkdir.c md.t2mkdir.in.eas[0].value = data_blob_talloc(tctx, "blah", 4);
tctx 127 source4/torture/raw/mkdir.c md.t2mkdir.in.eas[1].value = data_blob_talloc(tctx, "foo bar", 7);
tctx 130 source4/torture/raw/mkdir.c md.t2mkdir.in.eas[2].value = data_blob_talloc(tctx, "xx1", 3);
tctx 133 source4/torture/raw/mkdir.c if (torture_setting_bool(tctx, "samba3", false)
tctx 547 source4/torture/raw/notify.c static bool test_notify_mask(struct smbcli_state *cli, struct torture_context *tctx)
tctx 590 source4/torture/raw/notify.c status = smb_raw_open(cli->tree, tctx, &io); \
tctx 599 source4/torture/raw/notify.c status = smb_raw_changenotify_recv(req, tctx, ¬ify); \
tctx 711 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx 717 source4/torture/raw/notify.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 724 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx,
tctx 735 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx 743 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx 751 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx 760 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx 768 source4/torture/raw/notify.c fnum2 = create_complex_file(cli, tctx, BASEDIR "\\tname1");,
tctx 842 source4/torture/raw/notify.c static bool test_notify_tdis(struct torture_context *tctx)
tctx 854 source4/torture/raw/notify.c if (!torture_open_connection(&cli, tctx, 0)) {
tctx 874 source4/torture/raw/notify.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 892 source4/torture/raw/notify.c status = smb_raw_changenotify_recv(req, tctx, ¬ify);
tctx 904 source4/torture/raw/notify.c static bool test_notify_exit(struct torture_context *tctx)
tctx 916 source4/torture/raw/notify.c if (!torture_open_connection(&cli, tctx, 0)) {
tctx 936 source4/torture/raw/notify.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 953 source4/torture/raw/notify.c status = smb_raw_changenotify_recv(req, tctx, ¬ify);
tctx 965 source4/torture/raw/notify.c static bool test_notify_ulogoff(struct torture_context *tctx)
tctx 977 source4/torture/raw/notify.c if (!torture_open_connection(&cli, tctx, 0)) {
tctx 997 source4/torture/raw/notify.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1014 source4/torture/raw/notify.c status = smb_raw_changenotify_recv(req, tctx, ¬ify);
tctx 1033 source4/torture/raw/notify.c static bool test_notify_tcp_dis(struct torture_context *tctx)
tctx 1045 source4/torture/raw/notify.c if (!torture_open_connection(&cli, tctx, 0)) {
tctx 1065 source4/torture/raw/notify.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1081 source4/torture/raw/notify.c status = smb_raw_changenotify_recv(req, tctx, ¬ify);
tctx 1438 source4/torture/raw/notify.c struct torture_context *tctx)
tctx 1445 source4/torture/raw/notify.c share = torture_setting_string(tctx, "share", NULL);
tctx 1446 source4/torture/raw/notify.c host = torture_setting_string(tctx, "host", NULL);
tctx 1449 source4/torture/raw/notify.c tree = smbcli_tree_init(cli->session, tctx, false);
tctx 1454 source4/torture/raw/notify.c tcon.tconx.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share);
tctx 1456 source4/torture/raw/notify.c status = smb_raw_tcon(tree, tctx, &tcon);
tctx 56 source4/torture/raw/offline.c struct torture_context *tctx;
tctx 410 source4/torture/raw/offline.c state[i].tctx = torture;
tctx 424 source4/torture/raw/offline.c state[i].tctx = torture;
tctx 75 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname); \
tctx 94 source4/torture/raw/open.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \
tctx 101 source4/torture/raw/open.c timestring(tctx, t1), \
tctx 102 source4/torture/raw/open.c timestring(tctx, t2)); \
tctx 103 source4/torture/raw/open.c dump_all_info(tctx, &finfo); \
tctx 111 source4/torture/raw/open.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \
tctx 117 source4/torture/raw/open.c nt_time_string(tctx, t), \
tctx 118 source4/torture/raw/open.c nt_time_string(tctx, t2)); \
tctx 119 source4/torture/raw/open.c dump_all_info(tctx, &finfo); \
tctx 126 source4/torture/raw/open.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \
tctx 131 source4/torture/raw/open.c dump_all_info(tctx, &finfo); \
tctx 157 source4/torture/raw/open.c static bool test_open(struct smbcli_state *cli, struct torture_context *tctx)
tctx 172 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 180 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 185 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 198 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 205 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 212 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 220 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 231 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 235 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 248 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 268 source4/torture/raw/open.c static bool test_openx(struct smbcli_state *cli, struct torture_context *tctx)
tctx 314 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname);
tctx 323 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 342 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 359 source4/torture/raw/open.c fnum2 = create_complex_file(cli, tctx, fname);
tctx 367 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 383 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 388 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 399 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 401 source4/torture/raw/open.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 417 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 424 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 444 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 451 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 457 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 464 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname_exe);
tctx 476 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 498 source4/torture/raw/open.c static bool test_t2open(struct smbcli_state *cli, struct torture_context *tctx)
tctx 528 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname1);
tctx 549 source4/torture/raw/open.c io.t2open.in.eas = talloc_array(tctx, struct ea_struct, io.t2open.in.num_eas);
tctx 552 source4/torture/raw/open.c io.t2open.in.eas[0].value = data_blob_talloc(tctx, "first value", 11);
tctx 555 source4/torture/raw/open.c io.t2open.in.eas[1].value = data_blob_talloc(tctx, "foo", 3);
tctx 558 source4/torture/raw/open.c io.t2open.in.eas[2].value = data_blob_talloc(tctx, "xy", 2);
tctx 569 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 572 source4/torture/raw/open.c && torture_setting_bool(tctx, "samba3", false)) {
tctx 597 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 627 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 631 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 641 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 649 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 663 source4/torture/raw/open.c static bool test_ntcreatex(struct smbcli_state *cli, struct torture_context *tctx)
tctx 722 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 738 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 757 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname);
tctx 765 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 802 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 836 source4/torture/raw/open.c static bool test_nttrans_create(struct smbcli_state *cli, struct torture_context *tctx)
tctx 899 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 915 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 934 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname);
tctx 942 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 961 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 985 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1023 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1066 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1104 source4/torture/raw/open.c static bool test_ntcreatex_brlocked(struct smbcli_state *cli, struct torture_context *tctx)
tctx 1130 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1161 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io1);
tctx 1174 source4/torture/raw/open.c static bool test_mknew(struct smbcli_state *cli, struct torture_context *tctx)
tctx 1190 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1194 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1202 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1212 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1229 source4/torture/raw/open.c static bool test_create(struct smbcli_state *cli, struct torture_context *tctx)
tctx 1245 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1249 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1258 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1268 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1285 source4/torture/raw/open.c static bool test_ctemp(struct smbcli_state *cli, TALLOC_CTX *tctx)
tctx 1301 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1309 source4/torture/raw/open.c status = smb_raw_fileinfo(cli->tree, tctx, &finfo);
tctx 1328 source4/torture/raw/open.c static bool test_chained(struct smbcli_state *cli, TALLOC_CTX *tctx)
tctx 1341 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname);
tctx 1364 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1385 source4/torture/raw/open.c static bool test_no_leading_slash(struct smbcli_state *cli, TALLOC_CTX *tctx)
tctx 1398 source4/torture/raw/open.c fnum = create_complex_file(cli, tctx, fname);
tctx 1414 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1431 source4/torture/raw/open.c static bool test_openx_over_dir(struct smbcli_state *cli, TALLOC_CTX *tctx)
tctx 1459 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1473 source4/torture/raw/open.c static bool test_raw_open_multi(struct torture_context *tctx)
tctx 1484 source4/torture/raw/open.c const char *host = torture_setting_string(tctx, "host", NULL);
tctx 1485 source4/torture/raw/open.c const char *share = torture_setting_string(tctx, "share", NULL);
tctx 1493 source4/torture/raw/open.c if ((tctx->ev == NULL) || (clients == NULL) || (requests == NULL) ||
tctx 1499 source4/torture/raw/open.c if (!torture_open_connection_share(mem_ctx, &cli, tctx, host, share, tctx->ev)) {
tctx 1507 source4/torture/raw/open.c tctx, host, share, tctx->ev)) {
tctx 1576 source4/torture/raw/open.c if (event_loop_once(tctx->ev) != 0) {
tctx 1596 source4/torture/raw/open.c static bool test_open_for_delete(struct smbcli_state *cli, struct torture_context *tctx)
tctx 1623 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 1638 source4/torture/raw/open.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 47 source4/torture/raw/openbench.c struct torture_context *tctx;
tctx 126 source4/torture/raw/openbench.c if (!torture_get_conn_index(state->client_num, state->mem_ctx, state->tctx, &host, &share)) {
tctx 133 source4/torture/raw/openbench.c io->in.socket_options = lp_socket_options(state->tctx->lp_ctx);
tctx 139 source4/torture/raw/openbench.c io->in.workgroup = lp_workgroup(state->tctx->lp_ctx);
tctx 140 source4/torture/raw/openbench.c io->in.gensec_settings = lp_gensec_settings(state->mem_ctx, state->tctx->lp_ctx);
tctx 141 source4/torture/raw/openbench.c lp_smbcli_options(state->tctx->lp_ctx, &io->in.options);
tctx 142 source4/torture/raw/openbench.c lp_smbcli_session_options(state->tctx->lp_ctx, &io->in.session_options);
tctx 151 source4/torture/raw/openbench.c lp_resolve_context(state->tctx->lp_ctx),
tctx 389 source4/torture/raw/openbench.c state[i].tctx = torture;
tctx 34 source4/torture/raw/oplock.c torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got 0x%x - should be 0x%x\n", \
tctx 41 source4/torture/raw/oplock.c torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got %d - should be between %d and %d\n", \
tctx 48 source4/torture/raw/oplock.c torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got '%s' - should be '%s'\n", \
tctx 54 source4/torture/raw/oplock.c #define CHECK_STATUS(tctx, status, correct) do { \
tctx 56 source4/torture/raw/oplock.c torture_result(tctx, TORTURE_FAIL, __location__": Incorrect status %s - should be %s", \
tctx 174 source4/torture/raw/oplock.c static bool open_connection_no_level2_oplocks(struct torture_context *tctx,
tctx 181 source4/torture/raw/oplock.c lp_smbcli_options(tctx->lp_ctx, &options);
tctx 182 source4/torture/raw/oplock.c lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx 186 source4/torture/raw/oplock.c status = smbcli_full_connection(tctx, c,
tctx 187 source4/torture/raw/oplock.c torture_setting_string(tctx, "host", NULL),
tctx 188 source4/torture/raw/oplock.c lp_smb_ports(tctx->lp_ctx),
tctx 189 source4/torture/raw/oplock.c torture_setting_string(tctx, "share", NULL),
tctx 190 source4/torture/raw/oplock.c NULL, lp_socket_options(tctx->lp_ctx), cmdline_credentials,
tctx 191 source4/torture/raw/oplock.c lp_resolve_context(tctx->lp_ctx),
tctx 192 source4/torture/raw/oplock.c tctx->ev, &options, &session_options,
tctx 193 source4/torture/raw/oplock.c lp_iconv_convenience(tctx->lp_ctx),
tctx 194 source4/torture/raw/oplock.c lp_gensec_settings(tctx, tctx->lp_ctx));
tctx 203 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive1(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 236 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE1: open a file with an exclusive oplock (share mode: none)\n");
tctx 240 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 241 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 245 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open should not cause a break\n");
tctx 246 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 247 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 251 source4/torture/raw/oplock.c torture_comment(tctx, "unlink it - should also be no break\n");
tctx 255 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 268 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive2(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 301 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE2: open a file with an exclusive oplock (share mode: all)\n");
tctx 308 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 309 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 313 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open should cause a break to level 2\n");
tctx 314 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 315 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 325 source4/torture/raw/oplock.c torture_comment(tctx, "try to unlink it - should not cause a break, but a sharing violation\n");
tctx 329 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 333 source4/torture/raw/oplock.c torture_comment(tctx, "close 1st handle\n");
tctx 336 source4/torture/raw/oplock.c torture_comment(tctx, "try to unlink it - should not cause a break, but a sharing violation\n");
tctx 340 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 344 source4/torture/raw/oplock.c torture_comment(tctx, "close 1st handle\n");
tctx 347 source4/torture/raw/oplock.c torture_comment(tctx, "unlink it\n");
tctx 351 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 362 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive3(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 395 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE3: open a file with an exclusive oplock (share mode: none)\n");
tctx 400 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 401 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 405 source4/torture/raw/oplock.c torture_comment(tctx, "setpathinfo EOF should trigger a break to none\n");
tctx 413 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 427 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive4(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 459 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE4: open with exclusive oplock\n");
tctx 464 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 465 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 470 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only shouldn't cause oplock break\n");
tctx 474 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 475 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 491 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive5(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 524 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE5: open with exclusive oplock\n");
tctx 533 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 534 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 540 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_OVERWRITE_IF dispostion causes oplock break\n");
tctx 545 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 546 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 562 source4/torture/raw/oplock.c static bool test_raw_oplock_exclusive6(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 597 source4/torture/raw/oplock.c torture_comment(tctx, "EXCLUSIVE6: open a file with an exclusive oplock (share mode: none)\n");
tctx 601 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 602 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 606 source4/torture/raw/oplock.c torture_comment(tctx, "rename should not generate a break but get a sharing violation\n");
tctx 616 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 629 source4/torture/raw/oplock.c static bool test_raw_oplock_batch1(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 666 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH1: open with batch oplock\n");
tctx 671 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 672 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 676 source4/torture/raw/oplock.c torture_comment(tctx, "unlink should generate a break\n");
tctx 680 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 687 source4/torture/raw/oplock.c torture_comment(tctx, "2nd unlink should not generate a break\n");
tctx 690 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 694 source4/torture/raw/oplock.c torture_comment(tctx, "writing should generate a self break to none\n");
tctx 713 source4/torture/raw/oplock.c static bool test_raw_oplock_batch2(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 747 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH2: open with batch oplock\n");
tctx 752 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 753 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 757 source4/torture/raw/oplock.c torture_comment(tctx, "unlink should generate a break, which we ack as break to none\n");
tctx 762 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 769 source4/torture/raw/oplock.c torture_comment(tctx, "2nd unlink should not generate a break\n");
tctx 772 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 776 source4/torture/raw/oplock.c torture_comment(tctx, "writing should not generate a break\n");
tctx 792 source4/torture/raw/oplock.c static bool test_raw_oplock_batch3(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 825 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH3: if we close on break then the unlink can succeed\n");
tctx 831 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 832 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 840 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 856 source4/torture/raw/oplock.c static bool test_raw_oplock_batch4(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 889 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH4: a self read should not cause a break\n");
tctx 896 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 897 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 907 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 920 source4/torture/raw/oplock.c static bool test_raw_oplock_batch5(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 952 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH5: a 2nd open should give a break\n");
tctx 959 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 960 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 967 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 968 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 984 source4/torture/raw/oplock.c static bool test_raw_oplock_batch6(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1017 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH6: a 2nd open should give a break to level II if the first open allowed shared read\n");
tctx 1027 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1028 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1034 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 1035 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1045 source4/torture/raw/oplock.c torture_comment(tctx, "write should trigger a break to none on both\n");
tctx 1065 source4/torture/raw/oplock.c static bool test_raw_oplock_batch7(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1097 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH7: a 2nd open should get an oplock when we close instead of ack\n");
tctx 1106 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1107 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1116 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 1117 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1135 source4/torture/raw/oplock.c static bool test_raw_oplock_batch8(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1167 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH8: open with batch oplock\n");
tctx 1174 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1175 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1180 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only shouldn't cause oplock break\n");
tctx 1186 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 1187 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1203 source4/torture/raw/oplock.c static bool test_raw_oplock_batch9(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1236 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH9: open with attributes only can create file\n");
tctx 1243 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1244 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1248 source4/torture/raw/oplock.c torture_comment(tctx, "Subsequent normal open should break oplock on attribute only open to level II\n");
tctx 1258 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 1259 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1268 source4/torture/raw/oplock.c torture_comment(tctx, "third oplocked open should grant level2 without break\n");
tctx 1277 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 1278 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1286 source4/torture/raw/oplock.c torture_comment(tctx, "write should trigger a break to none on both\n");
tctx 1309 source4/torture/raw/oplock.c static bool test_raw_oplock_batch10(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1341 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH10: Open with oplock after a non-oplock open should grant level2\n");
tctx 1348 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1349 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1365 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 1366 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1372 source4/torture/raw/oplock.c torture_comment(tctx, "write should trigger a break to none\n");
tctx 1382 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1399 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1417 source4/torture/raw/oplock.c static bool test_raw_oplock_batch11(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1451 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH11: Test if setpathinfo set EOF breaks oplocks.\n");
tctx 1464 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1465 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1478 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1492 source4/torture/raw/oplock.c static bool test_raw_oplock_batch12(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1526 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH12: Test if setpathinfo allocation size breaks oplocks.\n");
tctx 1539 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1540 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1553 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1567 source4/torture/raw/oplock.c static bool test_raw_oplock_batch13(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1600 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH13: open with batch oplock\n");
tctx 1611 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1612 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1618 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_OVERWRITE dispostion causes oplock break\n");
tctx 1628 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 1629 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1645 source4/torture/raw/oplock.c static bool test_raw_oplock_batch14(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1677 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH14: open with batch oplock\n");
tctx 1687 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1688 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1694 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_SUPERSEDE dispostion causes oplock break\n");
tctx 1704 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 1705 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1720 source4/torture/raw/oplock.c static bool test_raw_oplock_batch15(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1754 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH15: Test if qpathinfo all info breaks a batch oplock (should not).\n");
tctx 1768 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1769 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1779 source4/torture/raw/oplock.c status = smb_raw_pathinfo(cli2->tree, tctx, &qfi);
tctx 1781 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1793 source4/torture/raw/oplock.c static bool test_raw_oplock_batch16(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1826 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH16: open with batch oplock\n");
tctx 1837 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1838 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1844 source4/torture/raw/oplock.c torture_comment(tctx, "second open with attributes only and NTCREATEX_DISP_OVERWRITE_IF dispostion causes oplock break\n");
tctx 1854 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 1855 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1871 source4/torture/raw/oplock.c static bool test_raw_oplock_batch17(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1906 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH17: open a file with an batch oplock (share mode: none)\n");
tctx 1913 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1914 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1918 source4/torture/raw/oplock.c torture_comment(tctx, "rename should trigger a break\n");
tctx 1928 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 1942 source4/torture/raw/oplock.c static bool test_raw_oplock_batch18(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 1977 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH18: open a file with an batch oplock (share mode: none)\n");
tctx 1984 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 1985 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 1989 source4/torture/raw/oplock.c torture_comment(tctx, "ntrename should trigger a break\n");
tctx 1999 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 2013 source4/torture/raw/oplock.c static bool test_raw_oplock_batch19(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 2051 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH19: open a file with an batch oplock (share mode: none)\n");
tctx 2056 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 2057 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2061 source4/torture/raw/oplock.c torture_comment(tctx, "setpathinfo rename info should not trigger a break nor a violation\n");
tctx 2071 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2078 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx 2079 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2082 source4/torture/raw/oplock.c torture_comment(tctx, "setfileinfo rename info should not trigger a break nor a violation\n");
tctx 2091 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2098 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx 2099 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2116 source4/torture/raw/oplock.c bool test_trans2rename(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 2154 source4/torture/raw/oplock.c torture_comment(tctx, "open a file with an exclusive oplock (share mode: none)\n");
tctx 2158 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 2159 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2163 source4/torture/raw/oplock.c torture_comment(tctx, "setpathinfo rename info should not trigger a break nor a violation\n");
tctx 2173 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2180 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx 2181 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2184 source4/torture/raw/oplock.c torture_comment(tctx, "setfileinfo rename info should not trigger a break nor a violation\n");
tctx 2193 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2200 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx 2201 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2218 source4/torture/raw/oplock.c bool test_nttransrename(struct torture_context *tctx, struct smbcli_state *cli1)
tctx 2254 source4/torture/raw/oplock.c torture_comment(tctx, "nttrans_rename: open a file with an exclusive oplock (share mode: none)\n");
tctx 2258 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 2259 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2263 source4/torture/raw/oplock.c torture_comment(tctx, "nttrans_rename: should not trigger a break nor a share mode violation\n");
tctx 2272 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2276 source4/torture/raw/oplock.c torture_comment(tctx, "nttrans_rename: the server should have done nothing\n");
tctx 2281 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx 2282 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2289 source4/torture/raw/oplock.c status = smb_raw_pathinfo(cli1->tree, tctx, &qpi);
tctx 2290 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2297 source4/torture/raw/oplock.c status = smb_raw_pathinfo(cli1->tree, tctx, &qpi);
tctx 2298 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND);
tctx 2300 source4/torture/raw/oplock.c torture_comment(tctx, "nttrans_rename: after closing the file the file is still not renamed\n");
tctx 2302 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2308 source4/torture/raw/oplock.c status = smb_raw_pathinfo(cli1->tree, tctx, &qpi);
tctx 2309 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2316 source4/torture/raw/oplock.c status = smb_raw_pathinfo(cli1->tree, tctx, &qpi);
tctx 2317 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND);
tctx 2319 source4/torture/raw/oplock.c torture_comment(tctx, "nttrans_rename: rename with an invalid handle gives NT_STATUS_INVALID_HANDLE\n");
tctx 2328 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_INVALID_HANDLE);
tctx 2337 source4/torture/raw/oplock.c static bool test_raw_oplock_batch20(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 2375 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH20: open a file with an batch oplock (share mode: all)\n");
tctx 2383 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 2384 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2388 source4/torture/raw/oplock.c torture_comment(tctx, "setpathinfo rename info should not trigger a break nor a violation\n");
tctx 2398 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2405 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx 2406 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2409 source4/torture/raw/oplock.c torture_comment(tctx, "open a file with the new name an batch oplock (share mode: all)\n");
tctx 2418 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 2419 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2426 source4/torture/raw/oplock.c torture_comment(tctx, "setfileinfo rename info should not trigger a break nor a violation\n");
tctx 2435 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2444 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli1->tree, tctx, &qfi);
tctx 2445 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2452 source4/torture/raw/oplock.c status = smb_raw_fileinfo(cli2->tree, tctx, &qfi);
tctx 2453 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2465 source4/torture/raw/oplock.c static bool test_raw_oplock_batch21(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 2503 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH21: open with batch oplock\n");
tctx 2508 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 2509 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2513 source4/torture/raw/oplock.c torture_comment(tctx, "writing should not generate a break\n");
tctx 2516 source4/torture/raw/oplock.c CHECK_STATUS(tctx, smbcli_nt_error(cli1->tree), NT_STATUS_OK);
tctx 2521 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2534 source4/torture/raw/oplock.c static bool test_raw_oplock_batch22(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 2542 source4/torture/raw/oplock.c int timeout = torture_setting_int(tctx, "oplocktimeout", 30);
tctx 2545 source4/torture/raw/oplock.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 2546 source4/torture/raw/oplock.c torture_skip(tctx, "BATCH22 disabled against samba3\n");
tctx 2576 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH22: open with batch oplock\n");
tctx 2584 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 2585 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2589 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open shoud not succeed after the oplock break timeout\n");
tctx 2592 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 2593 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_SHARING_VIOLATION);
tctx 2603 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open shoud succeed after the oplock release without break\n");
tctx 2606 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 2607 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2626 source4/torture/raw/oplock.c static bool test_raw_oplock_batch23(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 2644 source4/torture/raw/oplock.c ret = open_connection_no_level2_oplocks(tctx, &cli3);
tctx 2662 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH23: a open and ask for a batch oplock\n");
tctx 2673 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 2674 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2680 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open without level2 oplock support should generate a break to level2\n");
tctx 2681 source4/torture/raw/oplock.c status = smb_raw_open(cli3->tree, tctx, &io);
tctx 2682 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2693 source4/torture/raw/oplock.c torture_comment(tctx, "a 3rd open with level2 oplock support should not generate a break\n");
tctx 2694 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 2695 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2713 source4/torture/raw/oplock.c static bool test_raw_oplock_batch24(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2)
tctx 2731 source4/torture/raw/oplock.c ret = open_connection_no_level2_oplocks(tctx, &cli3);
tctx 2749 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH24: a open without level support and ask for a batch oplock\n");
tctx 2760 source4/torture/raw/oplock.c status = smb_raw_open(cli3->tree, tctx, &io);
tctx 2761 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2767 source4/torture/raw/oplock.c torture_comment(tctx, "a 2nd open with level2 oplock support should generate a break to none\n");
tctx 2768 source4/torture/raw/oplock.c status = smb_raw_open(cli2->tree, tctx, &io);
tctx 2769 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2789 source4/torture/raw/oplock.c static bool test_raw_oplock_batch25(struct torture_context *tctx,
tctx 2824 source4/torture/raw/oplock.c torture_comment(tctx, "BATCH25: open a file with an batch oplock "
tctx 2831 source4/torture/raw/oplock.c status = smb_raw_open(cli1->tree, tctx, &io);
tctx 2832 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 2836 source4/torture/raw/oplock.c torture_comment(tctx, "setpathinfo attribute info should not trigger "
tctx 2846 source4/torture/raw/oplock.c CHECK_STATUS(tctx, status, NT_STATUS_OK);
tctx 85 source4/torture/raw/read.c static bool test_read(struct torture_context *tctx, struct smbcli_state *cli)
tctx 97 source4/torture/raw/read.c buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx 211 source4/torture/raw/read.c static bool test_lockread(struct torture_context *tctx,
tctx 224 source4/torture/raw/read.c buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx 357 source4/torture/raw/read.c static bool test_readx(struct torture_context *tctx, struct smbcli_state *cli)
tctx 369 source4/torture/raw/read.c buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx 502 source4/torture/raw/read.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 546 source4/torture/raw/read.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 556 source4/torture/raw/read.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 612 source4/torture/raw/read.c static bool test_readbraw(struct torture_context *tctx,
tctx 625 source4/torture/raw/read.c buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx 785 source4/torture/raw/read.c static bool test_read_for_execute(struct torture_context *tctx,
tctx 799 source4/torture/raw/read.c buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx 819 source4/torture/raw/read.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 850 source4/torture/raw/read.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 897 source4/torture/raw/read.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 46 source4/torture/raw/rename.c static bool test_mv(struct torture_context *tctx,
tctx 82 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 102 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 123 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx 191 source4/torture/raw/rename.c static bool test_osxrename(struct torture_context *tctx,
tctx 223 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 242 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx 263 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx 277 source4/torture/raw/rename.c static bool test_ntrename(struct torture_context *tctx,
tctx 296 source4/torture/raw/rename.c fnum = create_complex_file(cli, tctx, fname1);
tctx 356 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx 362 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx 372 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx 387 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx 394 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx 403 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx 409 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx 419 source4/torture/raw/rename.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo);
tctx 522 source4/torture/raw/rename.c static bool test_dir_rename(struct torture_context *tctx, struct smbcli_state *cli)
tctx 556 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 580 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 611 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 632 source4/torture/raw/rename.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 654 source4/torture/raw/rename.c extern bool test_trans2rename(struct torture_context *tctx, struct smbcli_state *cli1, struct smbcli_state *cli2);
tctx 655 source4/torture/raw/rename.c extern bool test_nttransrename(struct torture_context *tctx, struct smbcli_state *cli1);
tctx 277 source4/torture/raw/samba3hide.c bool torture_samba3_closeerr(struct torture_context *tctx)
tctx 286 source4/torture/raw/samba3hide.c if (!torture_open_connection(&cli, tctx, 0)) {
tctx 293 source4/torture/raw/samba3hide.c tctx, smbcli_mkdir(cli->tree, dname),
tctx 294 source4/torture/raw/samba3hide.c talloc_asprintf(tctx, "smbcli_mdir failed: (%s)\n",
tctx 299 source4/torture/raw/samba3hide.c torture_assert(tctx, fnum != -1,
tctx 300 source4/torture/raw/samba3hide.c talloc_asprintf(tctx, "smbcli_open failed: %s\n",
tctx 310 source4/torture/raw/samba3hide.c torture_assert(tctx, fnum != -1,
tctx 311 source4/torture/raw/samba3hide.c talloc_asprintf(tctx, "smbcli_open failed: %s\n",
tctx 316 source4/torture/raw/samba3hide.c torture_assert_ntstatus_ok(tctx, status,
tctx 321 source4/torture/raw/samba3hide.c torture_assert_ntstatus_ok(tctx, status,
tctx 329 source4/torture/raw/samba3hide.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_ACCESS_DENIED,
tctx 680 source4/torture/raw/samba3misc.c bool torture_samba3_posixtimedlock(struct torture_context *tctx)
tctx 699 source4/torture/raw/samba3misc.c if (!torture_open_connection(&cli, tctx, 0)) {
tctx 708 source4/torture/raw/samba3misc.c torture_warning(tctx, "smbcli_mkdir failed: %s\n",
tctx 714 source4/torture/raw/samba3misc.c if (!(fpath = talloc_asprintf(tctx, "%s\\%s", dirname, fname))) {
tctx 715 source4/torture/raw/samba3misc.c torture_warning(tctx, "talloc failed\n");
tctx 721 source4/torture/raw/samba3misc.c torture_warning(tctx, "Could not create file %s: %s\n", fpath,
tctx 727 source4/torture/raw/samba3misc.c if (!(localdir = torture_setting_string(tctx, "localdir", NULL))) {
tctx 728 source4/torture/raw/samba3misc.c torture_warning(tctx, "Need 'localdir' setting\n");
tctx 733 source4/torture/raw/samba3misc.c if (!(localname = talloc_asprintf(tctx, "%s/%s/%s", localdir, dirname,
tctx 735 source4/torture/raw/samba3misc.c torture_warning(tctx, "talloc failed\n");
tctx 746 source4/torture/raw/samba3misc.c torture_warning(tctx, "open(%s) failed: %s\n",
tctx 757 source4/torture/raw/samba3misc.c torture_warning(tctx, "fcntl failed: %s\n", strerror(errno));
tctx 797 source4/torture/raw/samba3misc.c torture_warning(tctx, "smb_raw_lock_send failed\n");
tctx 825 source4/torture/raw/samba3misc.c bool torture_samba3_rootdirfid(struct torture_context *tctx)
tctx 834 source4/torture/raw/samba3misc.c if (!torture_open_connection(&cli, tctx, 0)) {
tctx 856 source4/torture/raw/samba3misc.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 878 source4/torture/raw/samba3misc.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 895 source4/torture/raw/samba3misc.c bool torture_samba3_oplock_logoff(struct torture_context *tctx)
tctx 906 source4/torture/raw/samba3misc.c if (!torture_open_connection(&cli, tctx, 0)) {
tctx 926 source4/torture/raw/samba3misc.c status = smb_raw_open(cli->tree, tctx, &io);
tctx 47 source4/torture/raw/search.c TALLOC_CTX *tctx,
tctx 83 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx,
tctx 235 source4/torture/raw/search.c static bool test_one_file(struct torture_context *tctx,
tctx 247 source4/torture/raw/search.c fnum = create_complex_file(cli, tctx, fname);
tctx 259 source4/torture/raw/search.c torture_comment(tctx, "testing %s\n", levels[i].name);
tctx 261 source4/torture/raw/search.c levels[i].status = torture_single_search(cli, tctx, fname,
tctx 282 source4/torture/raw/search.c status = torture_single_search(cli, tctx, fname2,
tctx 306 source4/torture/raw/search.c status = smb_raw_pathinfo(cli->tree, tctx, &all_info);
tctx 307 source4/torture/raw/search.c torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_ALL_INFO failed");
tctx 311 source4/torture/raw/search.c status = smb_raw_pathinfo(cli->tree, tctx, &alt_info);
tctx 312 source4/torture/raw/search.c torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_ALT_NAME_INFO failed");
tctx 316 source4/torture/raw/search.c status = smb_raw_pathinfo(cli->tree, tctx, &internal_info);
tctx 317 source4/torture/raw/search.c torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_INTERNAL_INFORMATION failed");
tctx 321 source4/torture/raw/search.c status = smb_raw_pathinfo(cli->tree, tctx, &name_info);
tctx 322 source4/torture/raw/search.c torture_assert_ntstatus_ok(tctx, status, "RAW_FILEINFO_NAME_INFO failed");
tctx 342 source4/torture/raw/search.c #sname1, #field1, timestring(tctx, s->sname1.field1), \
tctx 343 source4/torture/raw/search.c #sname2, #field2, nt_time_string(tctx, v.sname2.out.field2)); \
tctx 354 source4/torture/raw/search.c #sname1, #field1, nt_time_string(tctx, s->sname1.field1), \
tctx 355 source4/torture/raw/search.c #sname2, #field2, nt_time_string(tctx, v.sname2.out.field2)); \
tctx 505 source4/torture/raw/search.c TALLOC_CTX *tctx;
tctx 519 source4/torture/raw/search.c data->list = talloc_realloc(data->tctx,
tctx 535 source4/torture/raw/search.c TALLOC_CTX *tctx,
tctx 567 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx,
tctx 608 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx,
tctx 626 source4/torture/raw/search.c #define CHECK_STATUS(status, correct) torture_assert_ntstatus_equal(tctx, status, correct, "incorrect status")
tctx 628 source4/torture/raw/search.c #define CHECK_VALUE(v, correct) torture_assert_int_equal(tctx, (v), (correct), "incorrect value");
tctx 630 source4/torture/raw/search.c #define CHECK_STRING(v, correct) torture_assert_casestr_equal(tctx, v, correct, "incorrect value");
tctx 656 source4/torture/raw/search.c static bool test_many_files(struct torture_context *tctx,
tctx 699 source4/torture/raw/search.c torture_comment(tctx, "Testing with %d files\n", num_files);
tctx 704 source4/torture/raw/search.c torture_assert(tctx, fnum != -1, "Failed to create");
tctx 715 source4/torture/raw/search.c torture_setting_bool(tctx, "samba3", false)) {
tctx 716 source4/torture/raw/search.c torture_comment(tctx,
tctx 722 source4/torture/raw/search.c result.tctx = talloc_new(tctx);
tctx 724 source4/torture/raw/search.c torture_comment(tctx,
tctx 727 source4/torture/raw/search.c status = multiple_search(cli, tctx, BASEDIR "\\*.*",
tctx 732 source4/torture/raw/search.c torture_assert_ntstatus_ok(tctx, status, "search failed");
tctx 750 source4/torture/raw/search.c torture_assert_str_equal(tctx, fname, s, "Incorrect name");
tctx 753 source4/torture/raw/search.c talloc_free(result.tctx);
tctx 798 source4/torture/raw/search.c static bool test_modify_search(struct torture_context *tctx,
tctx 831 source4/torture/raw/search.c result.tctx = talloc_new(tctx);
tctx 841 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx,
tctx 855 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx,
tctx 865 source4/torture/raw/search.c fnum = create_complex_file(cli, tctx, BASEDIR "\\T013-13.txt.3");
tctx 885 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx,
tctx 905 source4/torture/raw/search.c attrib_string(tctx, result.list[i].both_directory_info.attrib),
tctx 921 source4/torture/raw/search.c static bool test_sorted(struct torture_context *tctx, struct smbcli_state *cli)
tctx 937 source4/torture/raw/search.c fname = talloc_asprintf(cli, BASEDIR "\\%s.txt", generate_random_str_list(tctx, 10, "abcdefgh"));
tctx 950 source4/torture/raw/search.c result.tctx = tctx;
tctx 952 source4/torture/raw/search.c status = multiple_search(cli, tctx, BASEDIR "\\*.*",
tctx 984 source4/torture/raw/search.c static bool test_many_dirs(struct torture_context *tctx,
tctx 1026 source4/torture/raw/search.c file = talloc_zero_array(tctx, union smb_search_data, num_dirs);
tctx 1027 source4/torture/raw/search.c file2 = talloc_zero_array(tctx, union smb_search_data, num_dirs);
tctx 1028 source4/torture/raw/search.c file3 = talloc_zero_array(tctx, union smb_search_data, num_dirs);
tctx 1038 source4/torture/raw/search.c io.search_first.in.pattern = talloc_asprintf(tctx, BASEDIR "\\d%d\\*.txt", i);
tctx 1039 source4/torture/raw/search.c fname = talloc_asprintf(tctx, "f%d-", i);
tctx 1043 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx,
tctx 1072 source4/torture/raw/search.c fname = talloc_asprintf(tctx, "f%d-", i);
tctx 1076 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx,
tctx 1106 source4/torture/raw/search.c fname = talloc_asprintf(tctx, "f%d-", i);
tctx 1109 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx,
tctx 1148 source4/torture/raw/search.c static bool test_os2_delete(struct torture_context *tctx,
tctx 1182 source4/torture/raw/search.c result.tctx = tctx;
tctx 1192 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx,
tctx 1214 source4/torture/raw/search.c result.tctx = tctx;
tctx 1216 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx,
tctx 1260 source4/torture/raw/search.c static bool test_ea_list(struct torture_context *tctx,
tctx 1289 source4/torture/raw/search.c setfile.ea_set.in.eas = talloc_array(tctx, struct ea_struct, 2);
tctx 1305 source4/torture/raw/search.c result.tctx = tctx;
tctx 1315 source4/torture/raw/search.c io.t2ffirst.in.ea_names = talloc_array(tctx, struct ea_name, 2);
tctx 1319 source4/torture/raw/search.c status = smb_raw_search_first(cli->tree, tctx,
tctx 1332 source4/torture/raw/search.c nxt.t2fnext.in.ea_names = talloc_array(tctx, struct ea_name, 2);
tctx 1336 source4/torture/raw/search.c status = smb_raw_search_next(cli->tree, tctx,
tctx 209 source4/torture/raw/streams.c static bool test_stream_dir(struct torture_context *tctx,
tctx 279 source4/torture/raw/streams.c static bool test_stream_io(struct torture_context *tctx,
tctx 363 source4/torture/raw/streams.c if (!torture_setting_bool(tctx, "samba4", false)) {
tctx 396 source4/torture/raw/streams.c if (!torture_setting_bool(tctx, "samba4", false)) {
tctx 420 source4/torture/raw/streams.c static bool test_stream_sharemodes(struct torture_context *tctx,
tctx 509 source4/torture/raw/streams.c static bool test_stream_delete(struct torture_context *tctx,
tctx 650 source4/torture/raw/streams.c static bool test_stream_names(struct torture_context *tctx,
tctx 777 source4/torture/raw/streams.c if (torture_setting_bool(tctx, "samba4", true)) {
tctx 791 source4/torture/raw/streams.c char *path = talloc_asprintf(tctx, "%s%s",
tctx 822 source4/torture/raw/streams.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 847 source4/torture/raw/streams.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 877 source4/torture/raw/streams.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 956 source4/torture/raw/streams.c static bool test_stream_names2(struct torture_context *tctx,
tctx 985 source4/torture/raw/streams.c char *path = talloc_asprintf(tctx, "%s:Stream%c0x%02X:$DATA",
tctx 1034 source4/torture/raw/streams.c status2 = smb_raw_fileinfo(cli->tree, tctx, &finfo1); \
tctx 1043 source4/torture/raw/streams.c static bool test_stream_rename(struct torture_context *tctx,
tctx 1116 source4/torture/raw/streams.c static bool test_stream_rename2(struct torture_context *tctx,
tctx 1285 source4/torture/raw/streams.c if (torture_setting_bool(tctx, "samba3", false) ||
tctx 1286 source4/torture/raw/streams.c torture_setting_bool(tctx, "samba4", false)) {
tctx 1309 source4/torture/raw/streams.c static bool create_file_with_stream(struct torture_context *tctx,
tctx 1343 source4/torture/raw/streams.c static bool test_stream_create_disposition(struct torture_context *tctx,
tctx 1362 source4/torture/raw/streams.c if (!create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx 1410 source4/torture/raw/streams.c if (!create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx 1428 source4/torture/raw/streams.c if (!create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx 1447 source4/torture/raw/streams.c if (!create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx 1466 source4/torture/raw/streams.c if (!create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx 1496 source4/torture/raw/streams.c static bool test_stream_large_streaminfo(struct torture_context *tctx,
tctx 1520 source4/torture/raw/streams.c ret = create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx 1539 source4/torture/raw/streams.c static bool test_stream_attributes(struct torture_context *tctx,
tctx 1559 source4/torture/raw/streams.c ret = create_file_with_stream(tctx, cli, mem_ctx, fname,
tctx 62 source4/torture/raw/tconrate.c static int fork_tcon_client(struct torture_context *tctx,
tctx 73 source4/torture/raw/tconrate.c lp_smbcli_options(tctx->lp_ctx, &options);
tctx 74 source4/torture/raw/tconrate.c lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx 101 source4/torture/raw/tconrate.c host, lp_smb_ports(tctx->lp_ctx), share,
tctx 102 source4/torture/raw/tconrate.c NULL, lp_socket_options(tctx->lp_ctx), cmdline_credentials,
tctx 103 source4/torture/raw/tconrate.c lp_resolve_context(tctx->lp_ctx),
tctx 104 source4/torture/raw/tconrate.c tctx->ev, &options, &session_options,
tctx 105 source4/torture/raw/tconrate.c lp_iconv_convenience(tctx->lp_ctx),
tctx 106 source4/torture/raw/tconrate.c lp_gensec_settings(tctx, tctx->lp_ctx));
tctx 151 source4/torture/raw/tconrate.c bool torture_bench_treeconnect(struct torture_context *tctx)
tctx 153 source4/torture/raw/tconrate.c const char *host = torture_setting_string(tctx, "host", NULL);
tctx 154 source4/torture/raw/tconrate.c const char *share = torture_setting_string(tctx, "share", NULL);
tctx 156 source4/torture/raw/tconrate.c int timelimit = torture_setting_int(tctx, "timelimit",
tctx 158 source4/torture/raw/tconrate.c int nprocs = torture_setting_int(tctx, "nprocs", 4);
tctx 166 source4/torture/raw/tconrate.c torture_assert(tctx, nprocs > 0, "bad proc count");
tctx 167 source4/torture/raw/tconrate.c torture_assert(tctx, timelimit > 0, "bad timelimit");
tctx 168 source4/torture/raw/tconrate.c torture_assert(tctx, curr_counts, "allocation failure");
tctx 169 source4/torture/raw/tconrate.c torture_assert(tctx, last_counts, "allocation failure");
tctx 173 source4/torture/raw/tconrate.c fork_tcon_client(tctx, &curr_counts[i], timelimit, host, share);
tctx 41 source4/torture/raw/unlink.c static bool test_unlink(struct torture_context *tctx, struct smbcli_state *cli)
tctx 132 source4/torture/raw/unlink.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 160 source4/torture/raw/unlink.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 172 source4/torture/raw/unlink.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 182 source4/torture/raw/unlink.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 203 source4/torture/raw/unlink.c static bool test_delete_on_close(struct torture_context *tctx,
tctx 229 source4/torture/raw/unlink.c fnum = create_complex_file(cli, tctx, fname);
tctx 243 source4/torture/raw/unlink.c fnum = create_complex_file(cli, tctx, fname);
tctx 285 source4/torture/raw/unlink.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 295 source4/torture/raw/unlink.c fnum2 = create_complex_file(cli, tctx, inside);
tctx 326 source4/torture/raw/unlink.c fnum2 = create_complex_file(cli, tctx, inside);
tctx 342 source4/torture/raw/unlink.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 358 source4/torture/raw/unlink.c fnum2 = create_complex_file(cli, tctx, inside);
tctx 374 source4/torture/raw/unlink.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 391 source4/torture/raw/unlink.c fnum = create_complex_file(cli, tctx, inside);
tctx 409 source4/torture/raw/unlink.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 415 source4/torture/raw/unlink.c status = smb_raw_open(cli->tree, tctx, &op);
tctx 55 source4/torture/raw/write.c status = smb_raw_pathinfo(cli->tree, tctx, &finfo); \
tctx 60 source4/torture/raw/write.c dump_all_info(tctx, &finfo); \
tctx 99 source4/torture/raw/write.c static bool test_write(struct torture_context *tctx,
tctx 112 source4/torture/raw/write.c buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx 227 source4/torture/raw/write.c static bool test_writex(struct torture_context *tctx,
tctx 241 source4/torture/raw/write.c if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx 243 source4/torture/raw/write.c torture_comment(tctx, "dangerous not set - limiting range of test to 2^%d\n", max_bits);
tctx 246 source4/torture/raw/write.c buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx 415 source4/torture/raw/write.c static bool test_writeunlock(struct torture_context *tctx,
tctx 428 source4/torture/raw/write.c buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx 558 source4/torture/raw/write.c static bool test_writeclose(struct torture_context *tctx,
tctx 571 source4/torture/raw/write.c buf = talloc_zero_array(tctx, uint8_t, maxsize);
tctx 26 source4/torture/rpc/atsvc.c static bool test_JobGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx, uint32_t job_id)
tctx 30 source4/torture/rpc/atsvc.c struct atsvc_JobInfo *info = talloc(tctx, struct atsvc_JobInfo);
tctx 39 source4/torture/rpc/atsvc.c status = dcerpc_atsvc_JobGetInfo(p, tctx, &r);
tctx 41 source4/torture/rpc/atsvc.c torture_assert_ntstatus_ok(tctx, status, "JobGetInfo failed");
tctx 46 source4/torture/rpc/atsvc.c static bool test_JobDel(struct dcerpc_pipe *p, struct torture_context *tctx, uint32_t min_job_id,
tctx 56 source4/torture/rpc/atsvc.c status = dcerpc_atsvc_JobDel(p, tctx, &r);
tctx 58 source4/torture/rpc/atsvc.c torture_assert_ntstatus_ok(tctx, status, "JobDel failed");
tctx 63 source4/torture/rpc/atsvc.c static bool test_JobEnum(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 80 source4/torture/rpc/atsvc.c status = dcerpc_atsvc_JobEnum(p, tctx, &r);
tctx 82 source4/torture/rpc/atsvc.c torture_assert_ntstatus_ok(tctx, status, "JobEnum failed");
tctx 85 source4/torture/rpc/atsvc.c if (!test_JobGetInfo(p, tctx, r.out.ctr->first_entry[i].job_id)) {
tctx 93 source4/torture/rpc/atsvc.c static bool test_JobAdd(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 107 source4/torture/rpc/atsvc.c status = dcerpc_atsvc_JobAdd(p, tctx, &r);
tctx 109 source4/torture/rpc/atsvc.c torture_assert_ntstatus_ok(tctx, status, "JobAdd failed");
tctx 113 source4/torture/rpc/atsvc.c if (!test_JobEnum(tctx, p)) {
tctx 117 source4/torture/rpc/atsvc.c if (!test_JobGetInfo(p, tctx, *r.out.job_id)) {
tctx 121 source4/torture/rpc/atsvc.c if (!test_JobDel(p, tctx, *r.out.job_id, *r.out.job_id)) {
tctx 91 source4/torture/rpc/autoidl.c static void reopen(struct torture_context *tctx,
tctx 99 source4/torture/rpc/autoidl.c status = torture_rpc_connection(tctx, p, iface);
tctx 114 source4/torture/rpc/autoidl.c static void test_ptr_scan(struct torture_context *tctx, const struct ndr_interface_table *iface,
tctx 117 source4/torture/rpc/autoidl.c static void try_expand(struct torture_context *tctx, const struct ndr_interface_table *iface,
tctx 125 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface);
tctx 134 source4/torture/rpc/autoidl.c status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out);
tctx 140 source4/torture/rpc/autoidl.c test_ptr_scan(tctx, iface, opnum, &stub_in,
tctx 147 source4/torture/rpc/autoidl.c printf("expand by %d gives fault %s\n", n, dcerpc_errstr(tctx, p->last_fault_code));
tctx 151 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface);
tctx 159 source4/torture/rpc/autoidl.c static void test_ptr_scan(struct torture_context *tctx, const struct ndr_interface_table *iface,
tctx 167 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface);
tctx 175 source4/torture/rpc/autoidl.c status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out);
tctx 180 source4/torture/rpc/autoidl.c ofs-min_ofs, dcerpc_errstr(tctx, p->last_fault_code));
tctx 182 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface);
tctx 185 source4/torture/rpc/autoidl.c try_expand(tctx, iface, opnum, &stub_in, ofs+4, depth+1);
tctx 187 source4/torture/rpc/autoidl.c try_expand(tctx, iface, opnum, &stub_in, max_ofs, depth+1);
tctx 199 source4/torture/rpc/autoidl.c static void test_scan_call(struct torture_context *tctx, const struct ndr_interface_table *iface, int opnum)
tctx 207 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface);
tctx 209 source4/torture/rpc/autoidl.c get_policy_handle(p, tctx, &handle);
tctx 217 source4/torture/rpc/autoidl.c status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out);
tctx 224 source4/torture/rpc/autoidl.c test_ptr_scan(tctx, iface, opnum, &stub_in, 0, stub_in.length, 0);
tctx 228 source4/torture/rpc/autoidl.c fill_blob_handle(&stub_in, tctx, &handle);
tctx 230 source4/torture/rpc/autoidl.c status = dcerpc_request(p, NULL, opnum, false, tctx, &stub_in, &stub_out);
tctx 237 source4/torture/rpc/autoidl.c test_ptr_scan(tctx, iface, opnum, &stub_in, 0, stub_in.length, 0);
tctx 242 source4/torture/rpc/autoidl.c printf("opnum %d size %d fault %s\n", opnum, i, dcerpc_errstr(tctx, p->last_fault_code));
tctx 244 source4/torture/rpc/autoidl.c reopen(tctx, &p, iface);
tctx 257 source4/torture/rpc/autoidl.c static void test_auto_scan(struct torture_context *tctx, const struct ndr_interface_table *iface)
tctx 259 source4/torture/rpc/autoidl.c test_scan_call(tctx, iface, 2);
tctx 101 source4/torture/rpc/bench.c static bool bench_NetShareEnumAll(struct torture_context *tctx, struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx)
tctx 105 source4/torture/rpc/bench.c int timelimit = torture_setting_int(tctx, "timelimit", 10);
tctx 115 source4/torture/rpc/bench.c if (torture_setting_bool(tctx, "progress", true)) {
tctx 27 source4/torture/rpc/browser.c bool test_BrowserrQueryOtherDomains(struct torture_context *tctx,
tctx 39 source4/torture/rpc/browser.c torture_comment(tctx, "dcerpc_BrowserrQueryOtherDomains\n");
tctx 49 source4/torture/rpc/browser.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 57 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx 58 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx 59 source4/torture/rpc/browser.c torture_assert_werr_ok(tctx, r.out.result, "BrowserrQueryOtherDomains failed");
tctx 60 source4/torture/rpc/browser.c torture_assert_int_equal(tctx, *r.out.total_entries, 0, "BrowserrQueryOtherDomains");
tctx 66 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx 67 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx 68 source4/torture/rpc/browser.c torture_assert_werr_ok(tctx, r.out.result, "BrowserrQueryOtherDomains failed");
tctx 69 source4/torture/rpc/browser.c torture_assert_int_equal(tctx, *r.out.total_entries, 0, "BrowserrQueryOtherDomains");
tctx 72 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx 73 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx 74 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_INVALID_PARAM, r.out.result,
tctx 80 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx 81 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx 82 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result,
tctx 89 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx 90 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx 91 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result,
tctx 95 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx 96 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx 97 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result,
tctx 101 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx 102 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx 103 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result,
tctx 107 source4/torture/rpc/browser.c status = dcerpc_BrowserrQueryOtherDomains(p, tctx, &r);
tctx 108 source4/torture/rpc/browser.c torture_assert_ntstatus_ok(tctx, status, "BrowserrQueryOtherDomains failed");
tctx 109 source4/torture/rpc/browser.c torture_assert_werr_equal(tctx, WERR_UNKNOWN_LEVEL, r.out.result,
tctx 33 source4/torture/rpc/countcalls.c bool count_calls(struct torture_context *tctx,
tctx 41 source4/torture/rpc/countcalls.c NTSTATUS status = torture_rpc_connection(tctx, &p, iface);
tctx 47 source4/torture/rpc/dfs.c struct torture_context *tctx,
tctx 59 source4/torture/rpc/dfs.c if (!(libnetctx = libnet_context_init(tctx->ev, tctx->lp_ctx))) {
tctx 89 source4/torture/rpc/dfs.c struct torture_context *tctx,
tctx 99 source4/torture/rpc/dfs.c if (!(libnetctx = libnet_context_init(tctx->ev, tctx->lp_ctx))) {
tctx 120 source4/torture/rpc/dfs.c struct torture_context *tctx,
tctx 127 source4/torture/rpc/dfs.c if (!torture_open_connection_share(mem_ctx, cli, tctx, host, share, tctx->ev)) {
tctx 486 source4/torture/rpc/dfs.c struct torture_context *tctx,
tctx 496 source4/torture/rpc/dfs.c test_NetShareDel(mem_ctx, tctx, host, sharename);
tctx 497 source4/torture/rpc/dfs.c torture_open_connection_share(mem_ctx, &cli, tctx, host, "C$", tctx->ev);
tctx 504 source4/torture/rpc/dfs.c struct torture_context *tctx,
tctx 515 source4/torture/rpc/dfs.c test_cleanup_stdroot(p, mem_ctx, tctx, host, sharename, dir);
tctx 517 source4/torture/rpc/dfs.c ret &= test_CreateDir(mem_ctx, &cli, tctx, host, "C$", dir);
tctx 518 source4/torture/rpc/dfs.c ret &= test_NetShareAdd(mem_ctx, tctx, host, sharename, path);
tctx 522 source4/torture/rpc/dfs.c ret &= test_NetShareDel(mem_ctx, tctx, host, sharename);
tctx 32 source4/torture/rpc/drsuapi.c bool test_DsBind(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 44 source4/torture/rpc/drsuapi.c torture_comment(tctx, "testing DsBind\n");
tctx 46 source4/torture/rpc/drsuapi.c status = dcerpc_drsuapi_DsBind(p, tctx, &r);
tctx 50 source4/torture/rpc/drsuapi.c errstr = dcerpc_errstr(tctx, p->last_fault_code);
tctx 52 source4/torture/rpc/drsuapi.c torture_fail(tctx, "dcerpc_drsuapi_DsBind failed");
tctx 54 source4/torture/rpc/drsuapi.c torture_fail(tctx, "DsBind failed");
tctx 252 source4/torture/rpc/drsuapi.c static bool test_DsReplicaGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 330 source4/torture/rpc/drsuapi.c if (torture_setting_bool(tctx, "samba4", false)) {
tctx 367 source4/torture/rpc/drsuapi.c status = dcerpc_drsuapi_DsReplicaGetInfo(p, tctx, &r);
tctx 371 source4/torture/rpc/drsuapi.c errstr = dcerpc_errstr(tctx, p->last_fault_code);
tctx 389 source4/torture/rpc/drsuapi.c static bool test_DsReplicaSync(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 407 source4/torture/rpc/drsuapi.c if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx 412 source4/torture/rpc/drsuapi.c if (torture_setting_bool(tctx, "samba4", false)) {
tctx 440 source4/torture/rpc/drsuapi.c status = dcerpc_drsuapi_DsReplicaSync(p, tctx, &r);
tctx 444 source4/torture/rpc/drsuapi.c errstr = dcerpc_errstr(tctx, p->last_fault_code);
tctx 457 source4/torture/rpc/drsuapi.c static bool test_DsReplicaUpdateRefs(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 475 source4/torture/rpc/drsuapi.c if (torture_setting_bool(tctx, "samba4", false)) {
tctx 497 source4/torture/rpc/drsuapi.c r.in.req.req1.dest_dsa_dns_name = talloc_asprintf(tctx, "__some_dest_dsa_guid_string._msdn.%s",
tctx 504 source4/torture/rpc/drsuapi.c status = dcerpc_drsuapi_DsReplicaUpdateRefs(p, tctx, &r);
tctx 508 source4/torture/rpc/drsuapi.c errstr = dcerpc_errstr(tctx, p->last_fault_code);
tctx 521 source4/torture/rpc/drsuapi.c static bool test_DsGetNCChanges(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 545 source4/torture/rpc/drsuapi.c if (torture_setting_bool(tctx, "samba4", false)) {
tctx 577 source4/torture/rpc/drsuapi.c if (lp_parm_bool(tctx->lp_ctx, NULL, "drsuapi","compression", false)) {
tctx 600 source4/torture/rpc/drsuapi.c if (lp_parm_bool(tctx->lp_ctx, NULL, "drsuapi", "compression", false)) {
tctx 603 source4/torture/rpc/drsuapi.c if (lp_parm_bool(tctx->lp_ctx, NULL, "drsuapi", "neighbour_writeable", true)) {
tctx 623 source4/torture/rpc/drsuapi.c status = dcerpc_drsuapi_DsGetNCChanges(p, tctx, &r);
tctx 627 source4/torture/rpc/drsuapi.c errstr = dcerpc_errstr(tctx, p->last_fault_code);
tctx 215 source4/torture/rpc/drsuapi_cracknames.c bool test_DsCrackNames(struct torture_context *tctx,
tctx 343 source4/torture/rpc/drsuapi_cracknames.c ldb = ldb_init(mem_ctx, tctx->ev);
tctx 608 source4/torture/rpc/drsuapi_cracknames.c .skip = torture_setting_bool(tctx, "samba4", false)
tctx 28 source4/torture/rpc/dssetup.c bool test_DsRoleGetPrimaryDomainInformation_ext(struct torture_context *tctx,
tctx 38 source4/torture/rpc/dssetup.c torture_comment(tctx, "dcerpc_dssetup_DsRoleGetPrimaryDomainInformation level %d\n", i);
tctx 40 source4/torture/rpc/dssetup.c status = dcerpc_dssetup_DsRoleGetPrimaryDomainInformation(p, tctx, &r);
tctx 41 source4/torture/rpc/dssetup.c torture_assert_ntstatus_equal(tctx, ext_status, status, "DsRoleGetPrimaryDomainInformation failed");
tctx 43 source4/torture/rpc/dssetup.c torture_assert_werr_ok(tctx, r.out.result, "DsRoleGetPrimaryDomainInformation failed");
tctx 50 source4/torture/rpc/dssetup.c bool test_DsRoleGetPrimaryDomainInformation(struct torture_context *tctx,
tctx 53 source4/torture/rpc/dssetup.c return test_DsRoleGetPrimaryDomainInformation_ext(tctx, p, NT_STATUS_OK);
tctx 83 source4/torture/rpc/dssync.c static struct DsSyncTest *test_create_context(struct torture_context *tctx)
tctx 89 source4/torture/rpc/dssync.c const char *binding = torture_setting_string(tctx, "binding", NULL);
tctx 90 source4/torture/rpc/dssync.c ctx = talloc_zero(tctx, struct DsSyncTest);
tctx 154 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "xpress", false)) {
tctx 178 source4/torture/rpc/dssync.c static bool _test_DsBind(struct torture_context *tctx,
tctx 187 source4/torture/rpc/dssync.c credentials, tctx->ev, tctx->lp_ctx);
tctx 240 source4/torture/rpc/dssync.c static bool test_LDAPBind(struct torture_context *tctx, struct DsSyncTest *ctx,
tctx 246 source4/torture/rpc/dssync.c status = torture_ldap_connection(tctx, &l->conn, ctx->ldap_url);
tctx 254 source4/torture/rpc/dssync.c status = torture_ldap_bind_sasl(l->conn, credentials, tctx->lp_ctx);
tctx 264 source4/torture/rpc/dssync.c static bool test_GetInfo(struct torture_context *tctx, struct DsSyncTest *ctx)
tctx 276 source4/torture/rpc/dssync.c cldap = cldap_socket_init(ctx, tctx->ev, lp_iconv_convenience(tctx->lp_ctx));
tctx 288 source4/torture/rpc/dssync.c names[0].str = talloc_asprintf(ctx, "%s\\", lp_workgroup(tctx->lp_ctx));
tctx 310 source4/torture/rpc/dssync.c search.in.dest_port = lp_cldap_port(tctx->lp_ctx);
tctx 326 source4/torture/rpc/dssync.c struct ldb_context *ldb = ldb_init(ctx, tctx->ev);
tctx 449 source4/torture/rpc/dssync.c static void test_analyse_objects(struct torture_context *tctx,
tctx 457 source4/torture/rpc/dssync.c if (!lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "print_pwd_blobs", false)) {
tctx 461 source4/torture/rpc/dssync.c save_values_dir = lp_parm_string(tctx->lp_ctx, NULL, "dssync", "save_pwd_blobs_dir");
tctx 578 source4/torture/rpc/dssync.c lp_iconv_convenience(tctx->lp_ctx), ptr,
tctx 594 source4/torture/rpc/dssync.c static bool test_FetchData(struct torture_context *tctx, struct DsSyncTest *ctx)
tctx 624 source4/torture/rpc/dssync.c partition = lp_parm_string(tctx->lp_ctx, NULL, "dssync", "partition");
tctx 630 source4/torture/rpc/dssync.c highest_usn = lp_parm_int(tctx->lp_ctx, NULL, "dssync", "highest_usn", 0);
tctx 632 source4/torture/rpc/dssync.c array[0].level = lp_parm_int(tctx->lp_ctx, NULL, "dssync", "get_nc_changes_level", array[0].level);
tctx 634 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "print_pwd_blobs", false)) {
tctx 670 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "compression", false)) {
tctx 673 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "neighbour_writeable", true)) {
tctx 702 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "compression", false)) {
tctx 705 source4/torture/rpc/dssync.c if (lp_parm_bool(tctx->lp_ctx, NULL, "dssync", "neighbour_writeable", true)) {
tctx 775 source4/torture/rpc/dssync.c test_analyse_objects(tctx, ctx, &gensec_skey, ctr1->first_object);
tctx 805 source4/torture/rpc/dssync.c test_analyse_objects(tctx, ctx, &gensec_skey, ctr6->first_object);
tctx 820 source4/torture/rpc/dssync.c static bool test_FetchNT4Data(struct torture_context *tctx,
tctx 843 source4/torture/rpc/dssync.c req.req1.unknown1 = lp_parm_int(tctx->lp_ctx, NULL, "dssync", "nt4-1", 3);
tctx 844 source4/torture/rpc/dssync.c req.req1.unknown2 = lp_parm_int(tctx->lp_ctx, NULL, "dssync", "nt4-2", 0x00004000);
tctx 33 source4/torture/rpc/echo.c #define TEST_ADDONE(tctx, value) do { \
tctx 37 source4/torture/rpc/echo.c status = dcerpc_echo_AddOne(p, tctx, &r); \
tctx 38 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "AddOne(%d) failed", i)); \
tctx 39 source4/torture/rpc/echo.c torture_assert (tctx, n == i+1, talloc_asprintf(tctx, "%d + 1 != %u (should be %u)\n", i, n, i+1)); \
tctx 40 source4/torture/rpc/echo.c torture_comment (tctx, "%d + 1 = %u\n", i, n); \
tctx 43 source4/torture/rpc/echo.c static bool test_addone(struct torture_context *tctx,
tctx 52 source4/torture/rpc/echo.c TEST_ADDONE(tctx, i);
tctx 55 source4/torture/rpc/echo.c TEST_ADDONE(tctx, 0x7FFFFFFE);
tctx 56 source4/torture/rpc/echo.c TEST_ADDONE(tctx, 0xFFFFFFFE);
tctx 57 source4/torture/rpc/echo.c TEST_ADDONE(tctx, 0xFFFFFFFF);
tctx 58 source4/torture/rpc/echo.c TEST_ADDONE(tctx, random() & 0xFFFFFFFF);
tctx 65 source4/torture/rpc/echo.c static bool test_echodata(struct torture_context *tctx,
tctx 74 source4/torture/rpc/echo.c if (torture_setting_bool(tctx, "quick", false) &&
tctx 81 source4/torture/rpc/echo.c data_in = talloc_array(tctx, uint8_t, len);
tctx 82 source4/torture/rpc/echo.c data_out = talloc_array(tctx, uint8_t, len);
tctx 90 source4/torture/rpc/echo.c status = dcerpc_echo_EchoData(p, tctx, &r);
tctx 91 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx,
tctx 98 source4/torture/rpc/echo.c torture_comment(tctx, "Bad data returned for len %d at offset %d\n",
tctx 100 source4/torture/rpc/echo.c torture_comment(tctx, "in:\n");
tctx 102 source4/torture/rpc/echo.c torture_comment(tctx, "out:\n");
tctx 113 source4/torture/rpc/echo.c static bool test_sourcedata(struct torture_context *tctx,
tctx 121 source4/torture/rpc/echo.c if (torture_setting_bool(tctx, "quick", false) &&
tctx 130 source4/torture/rpc/echo.c status = dcerpc_echo_SourceData(p, tctx, &r);
tctx 131 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx,
tctx 136 source4/torture/rpc/echo.c torture_assert(tctx, v[i] == (i & 0xFF),
tctx 137 source4/torture/rpc/echo.c talloc_asprintf(tctx,
tctx 146 source4/torture/rpc/echo.c static bool test_sinkdata(struct torture_context *tctx,
tctx 155 source4/torture/rpc/echo.c if (torture_setting_bool(tctx, "quick", false) &&
tctx 162 source4/torture/rpc/echo.c data_in = talloc_array(tctx, uint8_t, len);
tctx 170 source4/torture/rpc/echo.c status = dcerpc_echo_SinkData(p, tctx, &r);
tctx 171 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx,
tctx 175 source4/torture/rpc/echo.c torture_comment(tctx, "sunk %d bytes\n", len);
tctx 183 source4/torture/rpc/echo.c static bool test_testcall(struct torture_context *tctx,
tctx 193 source4/torture/rpc/echo.c status = dcerpc_echo_TestCall(p, tctx, &r);
tctx 194 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, "TestCall failed");
tctx 196 source4/torture/rpc/echo.c torture_assert_str_equal(tctx, s, "input string", "Didn't receive back same string");
tctx 204 source4/torture/rpc/echo.c static bool test_testcall2(struct torture_context *tctx,
tctx 213 source4/torture/rpc/echo.c r.out.info = talloc(tctx, union echo_Info);
tctx 215 source4/torture/rpc/echo.c torture_comment(tctx, "Testing TestCall2 level %d\n", i);
tctx 216 source4/torture/rpc/echo.c status = dcerpc_echo_TestCall2(p, tctx, &r);
tctx 217 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, "TestCall2 failed");
tctx 225 source4/torture/rpc/echo.c static bool test_sleep(struct torture_context *tctx,
tctx 240 source4/torture/rpc/echo.c if (torture_setting_bool(tctx, "quick", false)) {
tctx 241 source4/torture/rpc/echo.c torture_skip(tctx, "TestSleep disabled - use \"torture:quick=no\" to enable\n");
tctx 243 source4/torture/rpc/echo.c torture_comment(tctx, "Testing TestSleep - use \"torture:quick=yes\" to disable\n");
tctx 250 source4/torture/rpc/echo.c req[i] = dcerpc_echo_TestSleep_send(p, tctx, &r[i]);
tctx 251 source4/torture/rpc/echo.c torture_assert(tctx, req[i], "Failed to send async sleep request\n");
tctx 256 source4/torture/rpc/echo.c torture_assert(tctx, event_loop_once(ctx) == 0,
tctx 267 source4/torture/rpc/echo.c torture_comment(tctx, "rounded_tdiff=%d\n", rounded_tdiff);
tctx 268 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status,
tctx 269 source4/torture/rpc/echo.c talloc_asprintf(tctx, "TestSleep(%d) failed", i));
tctx 270 source4/torture/rpc/echo.c torture_assert(tctx, r[i].out.result == r[i].in.seconds,
tctx 271 source4/torture/rpc/echo.c talloc_asprintf(tctx, "Failed - Asked to sleep for %u seconds (server replied with %u seconds and the reply takes only %u seconds)",
tctx 273 source4/torture/rpc/echo.c torture_assert(tctx, r[i].out.result <= rounded_tdiff,
tctx 274 source4/torture/rpc/echo.c talloc_asprintf(tctx, "Failed - Slept for %u seconds (but reply takes only %u.%06u seconds)",
tctx 277 source4/torture/rpc/echo.c torture_comment(tctx, "Slept for %u seconds (but reply takes %u.%06u seconds - busy server?)\n",
tctx 280 source4/torture/rpc/echo.c torture_comment(tctx, "Slept for %u seconds (reply takes %u.%06u seconds - ok)\n",
tctx 283 source4/torture/rpc/echo.c torture_comment(tctx, "(Failed) - Not async - Slept for %u seconds (but reply takes %u.%06u seconds)",
tctx 290 source4/torture/rpc/echo.c torture_comment(tctx, "\n");
tctx 297 source4/torture/rpc/echo.c static bool test_enum(struct torture_context *tctx,
tctx 317 source4/torture/rpc/echo.c status = dcerpc_echo_TestEnum(p, tctx, &r);
tctx 318 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, "TestEnum failed");
tctx 325 source4/torture/rpc/echo.c static bool test_surrounding(struct torture_context *tctx,
tctx 332 source4/torture/rpc/echo.c r.in.data = talloc(tctx, struct echo_Surrounding);
tctx 335 source4/torture/rpc/echo.c r.in.data->surrounding = talloc_zero_array(tctx, uint16_t, r.in.data->x);
tctx 337 source4/torture/rpc/echo.c r.out.data = talloc(tctx, struct echo_Surrounding);
tctx 339 source4/torture/rpc/echo.c status = dcerpc_echo_TestSurrounding(p, tctx, &r);
tctx 340 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, "TestSurrounding failed");
tctx 342 source4/torture/rpc/echo.c torture_assert(tctx, r.out.data->x == 2 * r.in.data->x,
tctx 351 source4/torture/rpc/echo.c static bool test_doublepointer(struct torture_context *tctx,
tctx 363 source4/torture/rpc/echo.c status = dcerpc_echo_TestDoublePointer(p, tctx, &r);
tctx 364 source4/torture/rpc/echo.c torture_assert_ntstatus_ok(tctx, status, "TestDoublePointer failed");
tctx 366 source4/torture/rpc/echo.c torture_assert_int_equal(tctx, value, r.out.result,
tctx 375 source4/torture/rpc/echo.c static bool test_timeout(struct torture_context *tctx,
tctx 383 source4/torture/rpc/echo.c if (torture_setting_bool(tctx, "quick", false)) {
tctx 384 source4/torture/rpc/echo.c torture_skip(tctx, "timeout testing disabled - use \"torture:quick=no\" to enable\n");
tctx 387 source4/torture/rpc/echo.c torture_comment(tctx, "testing request timeouts\n");
tctx 391 source4/torture/rpc/echo.c req = dcerpc_echo_TestSleep_send(p, tctx, &r);
tctx 393 source4/torture/rpc/echo.c torture_comment(tctx, "Failed to send async sleep request\n");
tctx 399 source4/torture/rpc/echo.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_IO_TIMEOUT,
tctx 402 source4/torture/rpc/echo.c torture_comment(tctx, "testing request destruction\n");
tctx 403 source4/torture/rpc/echo.c req = dcerpc_echo_TestSleep_send(p, tctx, &r);
tctx 405 source4/torture/rpc/echo.c torture_comment(tctx, "Failed to send async sleep request\n");
tctx 410 source4/torture/rpc/echo.c req = dcerpc_echo_TestSleep_send(p, tctx, &r);
tctx 412 source4/torture/rpc/echo.c torture_comment(tctx, "Failed to send async sleep request\n");
tctx 417 source4/torture/rpc/echo.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_IO_TIMEOUT,
tctx 422 source4/torture/rpc/echo.c return test_addone(tctx, p);
tctx 138 source4/torture/rpc/epmapper.c static bool test_Lookup(struct torture_context *tctx,
tctx 165 source4/torture/rpc/epmapper.c status = dcerpc_epm_Lookup(p, tctx, &r);
tctx 171 source4/torture/rpc/epmapper.c *r.out.num_ents, GUID_string(tctx, &handle.uuid));
tctx 175 source4/torture/rpc/epmapper.c display_tower(tctx, &r.out.entries[i].tower->tower);
tctx 177 source4/torture/rpc/epmapper.c test_Map(p, tctx, r.out.entries[i].tower);
tctx 185 source4/torture/rpc/epmapper.c torture_assert_ntstatus_ok(tctx, status, "Lookup failed");
tctx 212 source4/torture/rpc/epmapper.c static bool test_Insert(struct torture_context *tctx,
tctx 221 source4/torture/rpc/epmapper.c r.in.entries = talloc_array(tctx, struct epm_entry_t, 1);
tctx 224 source4/torture/rpc/epmapper.c status = dcerpc_parse_binding(tctx, "ncalrpc:[SMBTORTURE]", &bd);
tctx 225 source4/torture/rpc/epmapper.c torture_assert_ntstatus_ok(tctx, status,
tctx 228 source4/torture/rpc/epmapper.c r.in.entries[0].tower = talloc(tctx, struct epm_twr_t);
tctx 230 source4/torture/rpc/epmapper.c status = dcerpc_binding_build_tower(tctx, bd, &r.in.entries[0].tower->tower);
tctx 231 source4/torture/rpc/epmapper.c torture_assert_ntstatus_ok(tctx, status,
tctx 236 source4/torture/rpc/epmapper.c status = dcerpc_epm_Insert(p, tctx, &r);
tctx 237 source4/torture/rpc/epmapper.c torture_assert_ntstatus_ok(tctx, status, "Insert failed");
tctx 239 source4/torture/rpc/epmapper.c torture_assert(tctx, r.out.result == 0, "Insert failed");
tctx 241 source4/torture/rpc/epmapper.c if (!test_Delete(p, tctx, r.in.entries)) {
tctx 248 source4/torture/rpc/epmapper.c static bool test_InqObject(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 253 source4/torture/rpc/epmapper.c r.in.epm_object = talloc(tctx, struct GUID);
tctx 256 source4/torture/rpc/epmapper.c status = dcerpc_epm_InqObject(p, tctx, &r);
tctx 257 source4/torture/rpc/epmapper.c torture_assert_ntstatus_ok(tctx, status, "InqObject failed");
tctx 40 source4/torture/rpc/eventlog.c static bool get_policy_handle(struct torture_context *tctx,
tctx 60 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 61 source4/torture/rpc/eventlog.c dcerpc_eventlog_OpenEventLogW(p, tctx, &r),
tctx 64 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, r.out.result, "OpenEventLog failed");
tctx 71 source4/torture/rpc/eventlog.c static bool test_GetNumRecords(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 78 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle))
tctx 85 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 86 source4/torture/rpc/eventlog.c dcerpc_eventlog_GetNumRecords(p, tctx, &r),
tctx 89 source4/torture/rpc/eventlog.c torture_comment(tctx, "%d records\n", *r.out.number);
tctx 93 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 94 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx 99 source4/torture/rpc/eventlog.c static bool test_ReadEventLog(struct torture_context *tctx,
tctx 110 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle))
tctx 121 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_ReadEventLogW(p, tctx, &r);
tctx 123 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_INVALID_PARAMETER,
tctx 141 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_ReadEventLogW(p, tctx, &r);
tctx 148 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_BUFFER_TOO_SMALL,
tctx 154 source4/torture/rpc/eventlog.c r.out.data = talloc_array(tctx, uint8_t, r.in.number_of_bytes);
tctx 156 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_ReadEventLogW(p, tctx, &r);
tctx 158 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status, "ReadEventLog failed");
tctx 168 source4/torture/rpc/eventlog.c ndr_err = ndr_pull_struct_blob_all(&blob, tctx,
tctx 169 source4/torture/rpc/eventlog.c lp_iconv_convenience(tctx->lp_ctx), &rec,
tctx 173 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status,
tctx 188 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status,
tctx 196 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 197 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx 203 source4/torture/rpc/eventlog.c static bool test_ReportEventLog(struct torture_context *tctx,
tctx 214 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle))
tctx 219 source4/torture/rpc/eventlog.c strings = talloc_array(tctx, struct lsa_String, 1);
tctx 239 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 240 source4/torture/rpc/eventlog.c dcerpc_eventlog_ReportEventW(p, tctx, &r),
tctx 243 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, r.out.result, "ReportEventW failed");
tctx 247 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 248 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx 253 source4/torture/rpc/eventlog.c static bool test_FlushEventLog(struct torture_context *tctx,
tctx 260 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle))
tctx 266 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx,
tctx 267 source4/torture/rpc/eventlog.c dcerpc_eventlog_FlushEventLog(p, tctx, &r),
tctx 273 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 274 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx 280 source4/torture/rpc/eventlog.c static bool test_ClearEventLog(struct torture_context *tctx,
tctx 287 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle))
tctx 293 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 294 source4/torture/rpc/eventlog.c dcerpc_eventlog_ClearEventLogW(p, tctx, &r),
tctx 299 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 300 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx 306 source4/torture/rpc/eventlog.c static bool test_GetLogInformation(struct torture_context *tctx,
tctx 315 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle))
tctx 324 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_GetLogInformation(p, tctx, &r);
tctx 326 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_LEVEL,
tctx 331 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_GetLogInformation(p, tctx, &r);
tctx 333 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_BUFFER_TOO_SMALL,
tctx 337 source4/torture/rpc/eventlog.c r.out.buffer = talloc_array(tctx, uint8_t, bytes_needed);
tctx 339 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_GetLogInformation(p, tctx, &r);
tctx 341 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status, "GetLogInformation failed");
tctx 345 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 346 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx 353 source4/torture/rpc/eventlog.c static bool test_OpenEventLog(struct torture_context *tctx,
tctx 359 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle))
tctx 364 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 365 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx 371 source4/torture/rpc/eventlog.c static bool test_BackupLog(struct torture_context *tctx,
tctx 383 source4/torture/rpc/eventlog.c if (!get_policy_handle(tctx, p, &handle))
tctx 386 source4/torture/rpc/eventlog.c tmp = talloc_asprintf(tctx, "C:\\%s", TEST_BACKUP_NAME);
tctx 392 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_BackupEventLogW(p, tctx, &r);
tctx 393 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, status,
tctx 396 source4/torture/rpc/eventlog.c tmp = talloc_asprintf(tctx, "\\??\\C:\\%s", TEST_BACKUP_NAME);
tctx 402 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_BackupEventLogW(p, tctx, &r);
tctx 403 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status, "BackupEventLogW failed");
tctx 405 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_BackupEventLogW(p, tctx, &r);
tctx 406 source4/torture/rpc/eventlog.c torture_assert_ntstatus_equal(tctx, status,
tctx 411 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 412 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx 424 source4/torture/rpc/eventlog.c status = dcerpc_eventlog_OpenBackupEventLogW(p, tctx, &b);
tctx 426 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx, status, "OpenBackupEventLogW failed");
tctx 430 source4/torture/rpc/eventlog.c torture_assert_ntstatus_ok(tctx,
tctx 431 source4/torture/rpc/eventlog.c dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
tctx 29 source4/torture/rpc/frsapi.c static bool test_GetDsPollingIntervalW(struct torture_context *tctx,
tctx 43 source4/torture/rpc/frsapi.c torture_assert_ntstatus_ok(tctx,
tctx 44 source4/torture/rpc/frsapi.c dcerpc_frsapi_GetDsPollingIntervalW(p, tctx, &r),
tctx 47 source4/torture/rpc/frsapi.c torture_assert_werr_ok(tctx, r.out.result,
tctx 53 source4/torture/rpc/frsapi.c static bool test_SetDsPollingIntervalW(struct torture_context *tctx,
tctx 67 source4/torture/rpc/frsapi.c torture_assert_ntstatus_ok(tctx,
tctx 68 source4/torture/rpc/frsapi.c dcerpc_frsapi_SetDsPollingIntervalW(p, tctx, &r),
tctx 71 source4/torture/rpc/frsapi.c torture_assert_werr_ok(tctx, r.out.result,
tctx 77 source4/torture/rpc/frsapi.c static bool test_DsPollingIntervalW(struct torture_context *tctx,
tctx 83 source4/torture/rpc/frsapi.c if (!test_GetDsPollingIntervalW(tctx, p, &i1, &i2, &i3)) {
tctx 87 source4/torture/rpc/frsapi.c if (!test_SetDsPollingIntervalW(tctx, p, i1, i2, i3)) {
tctx 94 source4/torture/rpc/frsapi.c if (!test_SetDsPollingIntervalW(tctx, p, k1, k2, k3)) {
tctx 98 source4/torture/rpc/frsapi.c if (!test_GetDsPollingIntervalW(tctx, p, &k1, &k2, &k3)) {
tctx 109 source4/torture/rpc/frsapi.c static bool test_IsPathReplicated_err(struct torture_context *tctx,
tctx 128 source4/torture/rpc/frsapi.c torture_assert_ntstatus_ok(tctx,
tctx 129 source4/torture/rpc/frsapi.c dcerpc_frsapi_IsPathReplicated(p, tctx, &r),
tctx 132 source4/torture/rpc/frsapi.c torture_assert_werr_equal(tctx, r.out.result, werr,
tctx 138 source4/torture/rpc/frsapi.c static bool _test_IsPathReplicated(struct torture_context *tctx,
tctx 143 source4/torture/rpc/frsapi.c return test_IsPathReplicated_err(tctx, p, path, type, WERR_OK);
tctx 146 source4/torture/rpc/frsapi.c static bool test_IsPathReplicated(struct torture_context *tctx,
tctx 156 source4/torture/rpc/frsapi.c if (!test_IsPathReplicated_err(tctx, p, NULL, 0,
tctx 162 source4/torture/rpc/frsapi.c if (!_test_IsPathReplicated(tctx, p, dcerpc_server_name(p),
tctx 169 source4/torture/rpc/frsapi.c const char *path = talloc_asprintf(tctx, "\\\\%s\\SYSVOL",
tctx 171 source4/torture/rpc/frsapi.c if (!_test_IsPathReplicated(tctx, p, path, lvls[i])) {
tctx 177 source4/torture/rpc/frsapi.c if (!_test_IsPathReplicated(tctx, p,
tctx 187 source4/torture/rpc/frsapi.c static bool test_ForceReplication(struct torture_context *tctx,
tctx 196 source4/torture/rpc/frsapi.c r.in.replica_set = talloc_asprintf(tctx, "%s",
tctx 197 source4/torture/rpc/frsapi.c lp_realm(tctx->lp_ctx));
tctx 200 source4/torture/rpc/frsapi.c torture_assert_ntstatus_ok(tctx,
tctx 201 source4/torture/rpc/frsapi.c dcerpc_frsapi_ForceReplication(p, tctx, &r),
tctx 204 source4/torture/rpc/frsapi.c torture_assert_werr_ok(tctx, r.out.result,
tctx 210 source4/torture/rpc/frsapi.c static bool test_InfoW(struct torture_context *tctx,
tctx 224 source4/torture/rpc/frsapi.c info = talloc_zero(tctx, struct frsapi_Info);
tctx 235 source4/torture/rpc/frsapi.c torture_assert_ntstatus_ok(tctx,
tctx 236 source4/torture/rpc/frsapi.c dcerpc_frsapi_InfoW(p, tctx, &r),
tctx 239 source4/torture/rpc/frsapi.c torture_assert_werr_ok(tctx, r.out.result, "InfoW failed");
tctx 33 source4/torture/rpc/initshutdown.c static bool test_Abort(struct torture_context *tctx,
tctx 42 source4/torture/rpc/initshutdown.c status = dcerpc_initshutdown_Abort(p, tctx, &r);
tctx 44 source4/torture/rpc/initshutdown.c torture_assert_ntstatus_ok(tctx, status,
tctx 47 source4/torture/rpc/initshutdown.c torture_assert_werr_ok(tctx, r.out.result, "initshutdown_Abort failed");
tctx 52 source4/torture/rpc/initshutdown.c static bool test_Init(struct torture_context *tctx,
tctx 60 source4/torture/rpc/initshutdown.c r.in.message = talloc(tctx, struct lsa_StringLarge);
tctx 66 source4/torture/rpc/initshutdown.c status = dcerpc_initshutdown_Init(p, tctx, &r);
tctx 68 source4/torture/rpc/initshutdown.c torture_assert_ntstatus_ok(tctx, status, "initshutdown_Init failed");
tctx 69 source4/torture/rpc/initshutdown.c torture_assert_werr_ok(tctx, r.out.result, "initshutdown_Init failed");
tctx 71 source4/torture/rpc/initshutdown.c return test_Abort(tctx, p);
tctx 74 source4/torture/rpc/initshutdown.c static bool test_InitEx(struct torture_context *tctx,
tctx 82 source4/torture/rpc/initshutdown.c r.in.message = talloc(tctx, struct lsa_StringLarge);
tctx 89 source4/torture/rpc/initshutdown.c status = dcerpc_initshutdown_InitEx(p, tctx, &r);
tctx 91 source4/torture/rpc/initshutdown.c torture_assert_ntstatus_ok(tctx, status, "initshutdown_InitEx failed");
tctx 93 source4/torture/rpc/initshutdown.c torture_assert_werr_ok(tctx, r.out.result, "initshutdown_InitEx failed");
tctx 95 source4/torture/rpc/initshutdown.c return test_Abort(tctx, p);
tctx 41 source4/torture/rpc/lsa.c struct torture_context *tctx)
tctx 69 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenPolicy(p, tctx, &r);
tctx 85 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 95 source4/torture/rpc/lsa.c *handle = talloc(tctx, struct policy_handle);
tctx 117 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenPolicy2(p, tctx, &r);
tctx 152 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 169 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_String, tnames->count);
tctx 184 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupNames(p, tctx, &r);
tctx 219 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 243 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_String, tnames.count);
tctx 258 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupNames(p, tctx, &r);
tctx 270 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 283 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx 287 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx 291 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx 295 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx 298 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx 303 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx 307 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx 311 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx 315 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx 320 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 338 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_String, tnames->count);
tctx 355 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupNames2(p, tctx, &r);
tctx 362 source4/torture/rpc/lsa.c torture_assert_int_equal(tctx, count, sids.count,
tctx 365 source4/torture/rpc/lsa.c torture_assert(tctx, sids.sids, "invalid sid buffer");
tctx 376 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 394 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_String, tnames->count);
tctx 411 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupNames3(p, tctx, &r);
tctx 418 source4/torture/rpc/lsa.c torture_assert_int_equal(tctx, count, sids.count,
tctx 421 source4/torture/rpc/lsa.c torture_assert(tctx, sids.sids, "invalid sid buffer");
tctx 431 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 448 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_String, tnames->count);
tctx 464 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupNames4(p, tctx, &r);
tctx 471 source4/torture/rpc/lsa.c torture_assert_int_equal(tctx, count, sids.count,
tctx 474 source4/torture/rpc/lsa.c torture_assert(tctx, sids.sids, "invalid sid buffer");
tctx 485 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 509 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupSids(p, tctx, &r);
tctx 517 source4/torture/rpc/lsa.c if (!test_LookupNames(p, tctx, handle, &names)) {
tctx 526 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 552 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupSids2(p, tctx, &r);
tctx 560 source4/torture/rpc/lsa.c if (!test_LookupNames2(p, tctx, handle, &names, false)) {
tctx 564 source4/torture/rpc/lsa.c if (!test_LookupNames3(p, tctx, handle, &names, false)) {
tctx 572 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 596 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupSids3(p, tctx, &r);
tctx 610 source4/torture/rpc/lsa.c if (!test_LookupNames4(p, tctx, &names, false)) {
tctx 618 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 630 source4/torture/rpc/lsa.c sids.sids = talloc_array(tctx, struct lsa_SidPtr, sids.num_sids);
tctx 634 source4/torture/rpc/lsa.c sids.sids[i].sid = dom_sid_parse_talloc(tctx, sidstr);
tctx 655 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupSids(p, tctx, &r);
tctx 663 source4/torture/rpc/lsa.c if (!test_LookupNames(p, tctx, handle, &names)) {
tctx 687 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupSids3(p, tctx, &r);
tctx 698 source4/torture/rpc/lsa.c if (!test_LookupNames4(p, tctx, &names, false)) {
tctx 727 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 741 source4/torture/rpc/lsa.c count = talloc_array(tctx, uint32_t, num_async_requests);
tctx 742 source4/torture/rpc/lsa.c names = talloc_array(tctx, struct lsa_TransNameArray, num_async_requests);
tctx 743 source4/torture/rpc/lsa.c r = talloc_array(tctx, struct lsa_LookupSids, num_async_requests);
tctx 747 source4/torture/rpc/lsa.c req = talloc_array(tctx, struct rpc_request *, num_async_requests);
tctx 751 source4/torture/rpc/lsa.c sidptr.sid = dom_sid_parse_talloc(tctx, "S-1-5-32-545");
tctx 793 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 805 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupPrivValue(p, tctx, &r);
tctx 815 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 827 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupPrivName(p, tctx, &r);
tctx 837 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 855 source4/torture/rpc/lsa.c privs.set = talloc_array(tctx, struct lsa_LUIDAttribute, 1);
tctx 859 source4/torture/rpc/lsa.c status = dcerpc_lsa_RemovePrivilegesFromAccount(p, tctx, &r);
tctx 869 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupPrivName(p, tctx, &r_name);
tctx 889 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 905 source4/torture/rpc/lsa.c privs.set = talloc_array(tctx, struct lsa_LUIDAttribute, 1);
tctx 909 source4/torture/rpc/lsa.c status = dcerpc_lsa_AddPrivilegesToAccount(p, tctx, &r);
tctx 919 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 933 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumPrivsAccount(p, tctx, &r);
tctx 942 source4/torture/rpc/lsa.c test_LookupPrivName(p, tctx, handle,
tctx 946 source4/torture/rpc/lsa.c ret &= test_RemovePrivilegesFromAccount(p, tctx, handle, acct_handle,
tctx 948 source4/torture/rpc/lsa.c ret &= test_AddPrivilegesToAccount(p, tctx, acct_handle,
tctx 956 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 969 source4/torture/rpc/lsa.c status = dcerpc_lsa_GetSystemAccessAccount(p, tctx, &r);
tctx 1010 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1019 source4/torture/rpc/lsa.c status = dcerpc_lsa_Delete(p, tctx, &r);
tctx 1029 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1039 source4/torture/rpc/lsa.c status = dcerpc_lsa_DeleteObject(p, tctx, &r);
tctx 1050 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1058 source4/torture/rpc/lsa.c newsid = dom_sid_parse_talloc(tctx, "S-1-5-12349876-4321-2854");
tctx 1067 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateAccount(p, tctx, &r);
tctx 1075 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenAccount(p, tctx, &r_o);
tctx 1085 source4/torture/rpc/lsa.c if (!test_Delete(p, tctx, &acct_handle)) {
tctx 1089 source4/torture/rpc/lsa.c if (!test_DeleteObject(p, tctx, &acct_handle)) {
tctx 1097 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1110 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenTrustedDomainByName(p, tctx, &r);
tctx 1116 source4/torture/rpc/lsa.c if (!test_Delete(p, tctx, &trustdom_handle)) {
tctx 1120 source4/torture/rpc/lsa.c if (!test_DeleteObject(p, tctx, &trustdom_handle)) {
tctx 1128 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1138 source4/torture/rpc/lsa.c status = dcerpc_lsa_DeleteTrustedDomain(p, tctx, &r);
tctx 1149 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1182 source4/torture/rpc/lsa.c secname[LOCAL] = talloc_asprintf(tctx, "torturesecret-%u", (uint_t)random());
tctx 1183 source4/torture/rpc/lsa.c secname[GLOBAL] = talloc_asprintf(tctx, "G$torturesecret-%u", (uint_t)random());
tctx 1194 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateSecret(p, tctx, &r);
tctx 1204 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateSecret(p, tctx, &r);
tctx 1217 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenSecret(p, tctx, &r2);
tctx 1240 source4/torture/rpc/lsa.c status = dcerpc_lsa_SetSecret(p, tctx, &r3);
tctx 1258 source4/torture/rpc/lsa.c status = dcerpc_lsa_SetSecret(p, tctx, &r3);
tctx 1279 source4/torture/rpc/lsa.c status = dcerpc_lsa_QuerySecret(p, tctx, &r4);
tctx 1291 source4/torture/rpc/lsa.c blob2 = data_blob_talloc(tctx, NULL, blob1.length);
tctx 1293 source4/torture/rpc/lsa.c secret2 = sess_decrypt_string(tctx,
tctx 1317 source4/torture/rpc/lsa.c status = dcerpc_lsa_SetSecret(p, tctx, &r5);
tctx 1338 source4/torture/rpc/lsa.c status = dcerpc_lsa_QuerySecret(p, tctx, &r6);
tctx 1354 source4/torture/rpc/lsa.c blob2 = data_blob_talloc(tctx, NULL, blob1.length);
tctx 1356 source4/torture/rpc/lsa.c secret4 = sess_decrypt_string(tctx,
tctx 1367 source4/torture/rpc/lsa.c blob2 = data_blob_talloc(tctx, NULL, blob1.length);
tctx 1369 source4/torture/rpc/lsa.c secret2 = sess_decrypt_string(tctx,
tctx 1381 source4/torture/rpc/lsa.c nt_time_string(tctx, *r6.out.old_mtime),
tctx 1382 source4/torture/rpc/lsa.c nt_time_string(tctx, *r6.out.new_mtime));
tctx 1399 source4/torture/rpc/lsa.c status = dcerpc_lsa_SetSecret(p, tctx, &r7);
tctx 1417 source4/torture/rpc/lsa.c status = dcerpc_lsa_QuerySecret(p, tctx, &r8);
tctx 1438 source4/torture/rpc/lsa.c blob2 = data_blob_talloc(tctx, NULL, blob1.length);
tctx 1440 source4/torture/rpc/lsa.c secret6 = sess_decrypt_string(tctx,
tctx 1451 source4/torture/rpc/lsa.c nt_time_string(tctx, *r8.out.old_mtime),
tctx 1452 source4/torture/rpc/lsa.c nt_time_string(tctx, *r8.out.new_mtime));
tctx 1458 source4/torture/rpc/lsa.c if (!test_Delete(p, tctx, &sec_handle)) {
tctx 1462 source4/torture/rpc/lsa.c if (!test_DeleteObject(p, tctx, &sec_handle)) {
tctx 1468 source4/torture/rpc/lsa.c status = dcerpc_lsa_DeleteObject(p, tctx, &d_o);
tctx 1476 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenSecret(p, tctx, &r2);
tctx 1490 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1504 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumAccountRights(p, tctx, &r);
tctx 1507 source4/torture/rpc/lsa.c dom_sid_string(tctx, sid), nt_errstr(status));
tctx 1516 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1524 source4/torture/rpc/lsa.c if (torture_setting_bool(tctx, "samba4", false)) {
tctx 1535 source4/torture/rpc/lsa.c status = dcerpc_lsa_QuerySecurity(p, tctx, &r);
tctx 1545 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1560 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenAccount(p, tctx, &r);
tctx 1566 source4/torture/rpc/lsa.c if (!test_EnumPrivsAccount(p, tctx, handle, &acct_handle)) {
tctx 1570 source4/torture/rpc/lsa.c if (!test_GetSystemAccessAccount(p, tctx, handle, &acct_handle)) {
tctx 1574 source4/torture/rpc/lsa.c if (!test_QuerySecurity(p, tctx, handle, &acct_handle)) {
tctx 1582 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1602 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumAccounts(p, tctx, &r);
tctx 1611 source4/torture/rpc/lsa.c if (!test_LookupSids(p, tctx, handle, &sids1)) {
tctx 1615 source4/torture/rpc/lsa.c if (!test_LookupSids2(p, tctx, handle, &sids1)) {
tctx 1625 source4/torture/rpc/lsa.c ret &= test_OpenAccount(p, tctx, handle, sids1.sids[i].sid);
tctx 1626 source4/torture/rpc/lsa.c ret &= test_EnumAccountRights(p, tctx, handle, sids1.sids[i].sid);
tctx 1640 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumAccounts(p, tctx, &r);
tctx 1655 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1676 source4/torture/rpc/lsa.c status = dcerpc_lsa_LookupPrivDisplayName(p, tctx, &r);
tctx 1689 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1705 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumAccountsWithUserRight(p, tctx, &r);
tctx 1722 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1741 source4/torture/rpc/lsa.c status = dcerpc_lsa_EnumPrivs(p, tctx, &r);
tctx 1748 source4/torture/rpc/lsa.c test_LookupPrivDisplayName(p, tctx, handle, (struct lsa_String *)&privs1.privs[i].name);
tctx 1749 source4/torture/rpc/lsa.c test_LookupPrivValue(p, tctx, handle, (struct lsa_String *)&privs1.privs[i].name);
tctx 1750 source4/torture/rpc/lsa.c if (!test_EnumAccountsWithUserRight(p, tctx, handle, (struct lsa_String *)&privs1.privs[i].name)) {
tctx 1759 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1771 source4/torture/rpc/lsa.c if (torture_setting_bool(tctx, "samba4", false)) {
tctx 1789 source4/torture/rpc/lsa.c status = dcerpc_lsa_lsaRQueryForestTrustInformation(p, tctx, &r);
tctx 1800 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1810 source4/torture/rpc/lsa.c ret &= test_QueryForestTrustInformation(p, tctx, handle,
tctx 1819 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 1844 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenTrustedDomain(p, tctx, &trust);
tctx 1863 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q);
tctx 1875 source4/torture/rpc/lsa.c status = dcerpc_lsa_CloseTrustedDomainEx(p, tctx, &c_trust);
tctx 1884 source4/torture/rpc/lsa.c status = dcerpc_lsa_Close(p, tctx, &c);
tctx 1903 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfoBySid(p, tctx, &q);
tctx 1921 source4/torture/rpc/lsa.c status = dcerpc_lsa_OpenTrustedDomainByName(p, tctx, &trust_by_name);
tctx 1934 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q);
tctx 1949 source4/torture/rpc/lsa.c status = dcerpc_lsa_Close(p, tctx, &c);
tctx 1966 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfoByName(p, tctx, &q);
tctx 1982 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 2001 source4/torture/rpc/lsa.c enum_status = dcerpc_lsa_EnumTrustDom(p, tctx, &r);
tctx 2023 source4/torture/rpc/lsa.c enum_status = dcerpc_lsa_EnumTrustDom(p, tctx, &r);
tctx 2051 source4/torture/rpc/lsa.c ret &= test_query_each_TrustDom(p, tctx, handle, &domains);
tctx 2063 source4/torture/rpc/lsa.c enum_status = dcerpc_lsa_EnumTrustedDomainsEx(p, tctx, &r_ex);
tctx 2078 source4/torture/rpc/lsa.c enum_status = dcerpc_lsa_EnumTrustedDomainsEx(p, tctx, &r_ex);
tctx 2107 source4/torture/rpc/lsa.c ret &= test_query_each_TrustDomEx(p, tctx, handle, &domains_ex);
tctx 2115 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 2130 source4/torture/rpc/lsa.c if (!test_EnumTrustDom(p, tctx, handle)) {
tctx 2135 source4/torture/rpc/lsa.c char *trust_name = talloc_asprintf(tctx, "torturedom%02d", i);
tctx 2136 source4/torture/rpc/lsa.c char *trust_sid = talloc_asprintf(tctx, "S-1-5-21-97398-379795-100%02d", i);
tctx 2138 source4/torture/rpc/lsa.c domsid[i] = dom_sid_parse_talloc(tctx, trust_sid);
tctx 2148 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateTrustedDomain(p, tctx, &r);
tctx 2150 source4/torture/rpc/lsa.c test_DeleteTrustedDomain(p, tctx, handle, trustinfo.name);
tctx 2151 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateTrustedDomain(p, tctx, &r);
tctx 2161 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q);
tctx 2193 source4/torture/rpc/lsa.c if (!test_EnumTrustDom(p, tctx, handle)) {
tctx 2198 source4/torture/rpc/lsa.c if (!test_DeleteTrustedDomainBySid(p, tctx, handle, domsid[i])) {
tctx 2207 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 2234 source4/torture/rpc/lsa.c char *trust_name = talloc_asprintf(tctx, "torturedom%02d", i);
tctx 2235 source4/torture/rpc/lsa.c char *trust_name_dns = talloc_asprintf(tctx, "torturedom%02d.samba.example.com", i);
tctx 2236 source4/torture/rpc/lsa.c char *trust_sid = talloc_asprintf(tctx, "S-1-5-21-97398-379795-100%02d", i);
tctx 2238 source4/torture/rpc/lsa.c domsid[i] = dom_sid_parse_talloc(tctx, trust_sid);
tctx 2263 source4/torture/rpc/lsa.c ndr_err = ndr_push_struct_blob(&auth_blob, tctx, lp_iconv_convenience(tctx->lp_ctx), &auth_struct,
tctx 2281 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateTrustedDomainEx2(p, tctx, &r);
tctx 2283 source4/torture/rpc/lsa.c test_DeleteTrustedDomain(p, tctx, handle, trustinfo.netbios_name);
tctx 2284 source4/torture/rpc/lsa.c status = dcerpc_lsa_CreateTrustedDomainEx2(p, tctx, &r);
tctx 2294 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryTrustedDomainInfo(p, tctx, &q);
tctx 2327 source4/torture/rpc/lsa.c if (!test_EnumTrustDom(p, tctx, handle)) {
tctx 2333 source4/torture/rpc/lsa.c if (!test_DeleteTrustedDomainBySid(p, tctx, handle, domsid[i])) {
tctx 2343 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 2361 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryDomainInformationPolicy(p, tctx, &r);
tctx 2379 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 2406 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryInfoPolicy2(p, tctx,
tctx 2409 source4/torture/rpc/lsa.c status = dcerpc_lsa_QueryInfoPolicy(p, tctx, &r);
tctx 2440 source4/torture/rpc/lsa.c if (torture_setting_bool(tctx, "samba4", false)) {
tctx 2465 source4/torture/rpc/lsa.c tnames.names = talloc_zero_array(tctx, struct lsa_TranslatedName, tnames.count);
tctx 2470 source4/torture/rpc/lsa.c tnames.names[2].name.string = talloc_asprintf(tctx, "%s\\", info->dns.name.string);
tctx 2472 source4/torture/rpc/lsa.c tnames.names[3].name.string = talloc_asprintf(tctx, "%s\\", info->dns.dns_domain.string);
tctx 2474 source4/torture/rpc/lsa.c tnames.names[4].name.string = talloc_asprintf(tctx, "%s\\guest", info->dns.name.string);
tctx 2476 source4/torture/rpc/lsa.c tnames.names[5].name.string = talloc_asprintf(tctx, "%s\\krbtgt", info->dns.name.string);
tctx 2478 source4/torture/rpc/lsa.c tnames.names[6].name.string = talloc_asprintf(tctx, "%s\\guest", info->dns.dns_domain.string);
tctx 2480 source4/torture/rpc/lsa.c tnames.names[7].name.string = talloc_asprintf(tctx, "%s\\krbtgt", info->dns.dns_domain.string);
tctx 2482 source4/torture/rpc/lsa.c tnames.names[8].name.string = talloc_asprintf(tctx, "krbtgt@%s", info->dns.name.string);
tctx 2484 source4/torture/rpc/lsa.c tnames.names[9].name.string = talloc_asprintf(tctx, "krbtgt@%s", info->dns.dns_domain.string);
tctx 2486 source4/torture/rpc/lsa.c tnames.names[10].name.string = talloc_asprintf(tctx, "%s\\"TEST_MACHINENAME "$", info->dns.name.string);
tctx 2488 source4/torture/rpc/lsa.c tnames.names[11].name.string = talloc_asprintf(tctx, "%s\\"TEST_MACHINENAME "$", info->dns.dns_domain.string);
tctx 2490 source4/torture/rpc/lsa.c tnames.names[12].name.string = talloc_asprintf(tctx, TEST_MACHINENAME "$@%s", info->dns.name.string);
tctx 2492 source4/torture/rpc/lsa.c tnames.names[13].name.string = talloc_asprintf(tctx, TEST_MACHINENAME "$@%s", info->dns.dns_domain.string);
tctx 2494 source4/torture/rpc/lsa.c ret &= test_LookupNames(p, tctx, handle, &tnames);
tctx 2503 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 2506 source4/torture/rpc/lsa.c return test_QueryInfoPolicyCalls(false, p, tctx, handle);
tctx 2510 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 2513 source4/torture/rpc/lsa.c return test_QueryInfoPolicyCalls(true, p, tctx, handle);
tctx 2517 source4/torture/rpc/lsa.c struct torture_context *tctx)
tctx 2532 source4/torture/rpc/lsa.c status = dcerpc_lsa_GetUserName(p, tctx, &r);
tctx 2544 source4/torture/rpc/lsa.c status = dcerpc_lsa_GetUserName(p, tctx, &r);
tctx 2555 source4/torture/rpc/lsa.c struct torture_context *tctx,
tctx 2567 source4/torture/rpc/lsa.c status = dcerpc_lsa_Close(p, tctx, &r);
tctx 2573 source4/torture/rpc/lsa.c status = dcerpc_lsa_Close(p, tctx, &r);
tctx 2585 source4/torture/rpc/lsa.c bool torture_rpc_lsa(struct torture_context *tctx)
tctx 2594 source4/torture/rpc/lsa.c status = torture_rpc_connection(tctx, &p, &ndr_table_lsarpc);
tctx 2599 source4/torture/rpc/lsa.c if (!test_OpenPolicy(p, tctx)) {
tctx 2603 source4/torture/rpc/lsa.c if (!test_lsa_OpenPolicy2(p, tctx, &handle)) {
tctx 2608 source4/torture/rpc/lsa.c join = torture_join_domain(tctx, TEST_MACHINENAME, ACB_WSTRUST, &machine_creds);
tctx 2612 source4/torture/rpc/lsa.c if (!test_LookupNames_wellknown(p, tctx, handle)) {
tctx 2616 source4/torture/rpc/lsa.c if (!test_LookupNames_bogus(p, tctx, handle)) {
tctx 2620 source4/torture/rpc/lsa.c if (!test_LookupSids_async(p, tctx, handle)) {
tctx 2624 source4/torture/rpc/lsa.c if (!test_QueryDomainInfoPolicy(p, tctx, handle)) {
tctx 2628 source4/torture/rpc/lsa.c if (!test_CreateAccount(p, tctx, handle)) {
tctx 2632 source4/torture/rpc/lsa.c if (!test_CreateSecret(p, tctx, handle)) {
tctx 2635 source4/torture/rpc/lsa.c if (!test_CreateTrustedDomain(p, tctx, handle)) {
tctx 2639 source4/torture/rpc/lsa.c if (!test_CreateTrustedDomainEx2(p, tctx, handle)) {
tctx 2643 source4/torture/rpc/lsa.c if (!test_EnumAccounts(p, tctx, handle)) {
tctx 2647 source4/torture/rpc/lsa.c if (!test_EnumPrivs(p, tctx, handle)) {
tctx 2651 source4/torture/rpc/lsa.c if (!test_QueryInfoPolicy(p, tctx, handle)) {
tctx 2655 source4/torture/rpc/lsa.c if (!test_QueryInfoPolicy2(p, tctx, handle)) {
tctx 2659 source4/torture/rpc/lsa.c if (!test_Delete(p, tctx, handle)) {
tctx 2663 source4/torture/rpc/lsa.c if (!test_many_LookupSids(p, tctx, handle)) {
tctx 2667 source4/torture/rpc/lsa.c if (!test_lsa_Close(p, tctx, handle)) {
tctx 2671 source4/torture/rpc/lsa.c torture_leave_domain(tctx, join);
tctx 2674 source4/torture/rpc/lsa.c if (!test_many_LookupSids(p, tctx, handle)) {
tctx 2679 source4/torture/rpc/lsa.c if (!test_GetUserName(p, tctx)) {
tctx 2686 source4/torture/rpc/lsa.c bool torture_rpc_lsa_get_user(struct torture_context *tctx)
tctx 2692 source4/torture/rpc/lsa.c status = torture_rpc_connection(tctx, &p, &ndr_table_lsarpc);
tctx 2697 source4/torture/rpc/lsa.c if (!test_GetUserName(p, tctx)) {
tctx 2704 source4/torture/rpc/lsa.c static bool testcase_LookupNames(struct torture_context *tctx,
tctx 2712 source4/torture/rpc/lsa.c if (!test_OpenPolicy(p, tctx)) {
tctx 2716 source4/torture/rpc/lsa.c if (!test_lsa_OpenPolicy2(p, tctx, &handle)) {
tctx 2725 source4/torture/rpc/lsa.c tnames.names = talloc_array(tctx, struct lsa_TranslatedName, tnames.count);
tctx 2730 source4/torture/rpc/lsa.c if (!test_LookupNames(p, tctx, handle, &tnames)) {
tctx 2735 source4/torture/rpc/lsa.c tnames2.names = talloc_array(tctx, struct lsa_TranslatedName2, tnames2.count);
tctx 2740 source4/torture/rpc/lsa.c if (!test_LookupNames2(p, tctx, handle, &tnames2, true)) {
tctx 2744 source4/torture/rpc/lsa.c if (!test_LookupNames3(p, tctx, handle, &tnames2, true)) {
tctx 2748 source4/torture/rpc/lsa.c if (!test_lsa_Close(p, tctx, handle)) {
tctx 172 source4/torture/rpc/lsa_lookup.c static bool get_downleveltrust(struct torture_context *tctx, struct dcerpc_pipe *p,
tctx 188 source4/torture/rpc/lsa_lookup.c status = dcerpc_lsa_EnumTrustDom(p, tctx, &r);
tctx 191 source4/torture/rpc/lsa_lookup.c torture_fail(tctx, "no trusts");
tctx 194 source4/torture/rpc/lsa_lookup.c torture_fail(tctx, "no trusts");
tctx 209 source4/torture/rpc/lsa_lookup.c status = dcerpc_lsa_QueryTrustedDomainInfoBySid(p, tctx, &q);
tctx 219 source4/torture/rpc/lsa_lookup.c torture_fail(tctx, "I need a AD DC with an outgoing trust to NT4");
tctx 328 source4/torture/rpc/lsa_lookup.c static bool test_LookupSidsReply(struct torture_context *tctx,
tctx 347 source4/torture/rpc/lsa_lookup.c if (!open_policy(tctx, p, &handle)) {
tctx 351 source4/torture/rpc/lsa_lookup.c dom_admin_sid = talloc_asprintf(tctx, "%s-%d", dom_sid, 512);
tctx 353 source4/torture/rpc/lsa_lookup.c sids = talloc_array(tctx, struct dom_sid *, num_sids);
tctx 355 source4/torture/rpc/lsa_lookup.c sids[0] = dom_sid_parse_talloc(tctx, dom_admin_sid);
tctx 361 source4/torture/rpc/lsa_lookup.c sidarray.sids = talloc_array(tctx, struct lsa_SidPtr, num_sids);
tctx 376 source4/torture/rpc/lsa_lookup.c status = dcerpc_lsa_LookupSids(p, tctx, &r);
tctx 378 source4/torture/rpc/lsa_lookup.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NONE_MAPPED,
tctx 381 source4/torture/rpc/lsa_lookup.c torture_assert_int_equal(tctx, names.count, num_sids,
tctx 383 source4/torture/rpc/lsa_lookup.c torture_assert(tctx, names.names,
tctx 385 source4/torture/rpc/lsa_lookup.c torture_assert_str_equal(tctx, names.names[0].name.string, dom_admin_sid,
tctx 390 source4/torture/rpc/lsa_lookup.c torture_assert_int_equal(tctx, domains->count, num_sids,
tctx 392 source4/torture/rpc/lsa_lookup.c torture_assert(tctx, domains->domains,
tctx 394 source4/torture/rpc/lsa_lookup.c torture_assert_str_equal(tctx, dom_sid_string(tctx, domains->domains[0].sid), dom_sid,
tctx 34 source4/torture/rpc/mgmt.c bool test_inq_if_ids(struct torture_context *tctx,
tctx 76 source4/torture/rpc/mgmt.c per_id_test(tctx, priv, mem_ctx, id);
tctx 42 source4/torture/rpc/netlogon.c static bool test_LogonUasLogon(struct torture_context *tctx,
tctx 54 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonUasLogon(p, tctx, &r);
tctx 55 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonUasLogon");
tctx 60 source4/torture/rpc/netlogon.c static bool test_LogonUasLogoff(struct torture_context *tctx,
tctx 72 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonUasLogoff(p, tctx, &r);
tctx 73 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonUasLogoff");
tctx 78 source4/torture/rpc/netlogon.c bool test_SetupCredentials(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 90 source4/torture/rpc/netlogon.c mach_password = cli_credentials_get_nt_hash(credentials, tctx);
tctx 93 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerReqChallenge\n");
tctx 95 source4/torture/rpc/netlogon.c creds = talloc(tctx, struct creds_CredentialState);
tctx 96 source4/torture/rpc/netlogon.c torture_assert(tctx, creds != NULL, "memory allocation");
tctx 105 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerReqChallenge(p, tctx, &r);
tctx 106 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge");
tctx 109 source4/torture/rpc/netlogon.c a.in.account_name = talloc_asprintf(tctx, "%s$", machine_name);
tctx 119 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerAuthenticate\n");
tctx 121 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerAuthenticate(p, tctx, &a);
tctx 125 source4/torture/rpc/netlogon.c return test_SetupCredentials2(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS,
tctx 129 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerAuthenticate");
tctx 131 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &credentials3),
tctx 138 source4/torture/rpc/netlogon.c bool test_SetupCredentials2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 152 source4/torture/rpc/netlogon.c mach_password = cli_credentials_get_nt_hash(machine_credentials, tctx);
tctx 155 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerReqChallenge\n");
tctx 157 source4/torture/rpc/netlogon.c creds = talloc(tctx, struct creds_CredentialState);
tctx 158 source4/torture/rpc/netlogon.c torture_assert(tctx, creds != NULL, "memory allocation");
tctx 167 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerReqChallenge(p, tctx, &r);
tctx 168 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge");
tctx 171 source4/torture/rpc/netlogon.c a.in.account_name = talloc_asprintf(tctx, "%s$", machine_name);
tctx 183 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerAuthenticate2\n");
tctx 185 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerAuthenticate2(p, tctx, &a);
tctx 186 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerAuthenticate2");
tctx 188 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &credentials3),
tctx 191 source4/torture/rpc/netlogon.c torture_comment(tctx, "negotiate_flags=0x%08x\n", negotiate_flags);
tctx 198 source4/torture/rpc/netlogon.c static bool test_SetupCredentials3(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 216 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerReqChallenge\n");
tctx 218 source4/torture/rpc/netlogon.c creds = talloc(tctx, struct creds_CredentialState);
tctx 219 source4/torture/rpc/netlogon.c torture_assert(tctx, creds != NULL, "memory allocation");
tctx 228 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerReqChallenge(p, tctx, &r);
tctx 229 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge");
tctx 234 source4/torture/rpc/netlogon.c a.in.account_name = talloc_asprintf(tctx, "%s$", machine_name);
tctx 247 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerAuthenticate3\n");
tctx 249 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerAuthenticate3(p, tctx, &a);
tctx 250 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerAuthenticate3");
tctx 251 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &credentials3), "Credential chaining failed");
tctx 253 source4/torture/rpc/netlogon.c torture_comment(tctx, "negotiate_flags=0x%08x\n", negotiate_flags);
tctx 256 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerReqChallenge(p, tctx, &r);
tctx 257 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerReqChallenge");
tctx 266 source4/torture/rpc/netlogon.c static bool test_SetPassword(struct torture_context *tctx,
tctx 277 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx 281 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 282 source4/torture/rpc/netlogon.c r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME);
tctx 289 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8);
tctx 294 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerPasswordSet on machine account\n");
tctx 295 source4/torture/rpc/netlogon.c torture_comment(tctx, "Changing machine account password to '%s'\n",
tctx 300 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet(p, tctx, &r);
tctx 301 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet");
tctx 304 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n");
tctx 311 source4/torture/rpc/netlogon.c torture_comment(tctx,
tctx 313 source4/torture/rpc/netlogon.c torture_comment(tctx,
tctx 318 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet(p, tctx, &r);
tctx 319 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet (2)");
tctx 322 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n");
tctx 327 source4/torture/rpc/netlogon.c torture_assert(tctx,
tctx 328 source4/torture/rpc/netlogon.c test_SetupCredentials(p, tctx, machine_credentials, &creds),
tctx 355 source4/torture/rpc/netlogon.c static bool test_SetPassword2(struct torture_context *tctx,
tctx 369 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx 373 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 374 source4/torture/rpc/netlogon.c r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME);
tctx 381 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8);
tctx 388 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing ServerPasswordSet2 on machine account\n");
tctx 389 source4/torture/rpc/netlogon.c torture_comment(tctx, "Changing machine account password to '%s'\n", password);
tctx 393 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r);
tctx 394 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet2");
tctx 397 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n");
tctx 402 source4/torture/rpc/netlogon.c if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx 403 source4/torture/rpc/netlogon.c torture_comment(tctx,
tctx 418 source4/torture/rpc/netlogon.c torture_comment(tctx,
tctx 420 source4/torture/rpc/netlogon.c torture_comment(tctx,
tctx 425 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r);
tctx 426 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet2");
tctx 429 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n");
tctx 435 source4/torture/rpc/netlogon.c torture_assert(tctx, test_SetupCredentials(p, tctx, machine_credentials, &creds),
tctx 439 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8);
tctx 446 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing second ServerPasswordSet2 on machine account\n");
tctx 447 source4/torture/rpc/netlogon.c torture_comment(tctx, "Changing machine account password to '%s'\n", password);
tctx 451 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r);
tctx 452 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet2 (2)");
tctx 455 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n");
tctx 462 source4/torture/rpc/netlogon.c torture_comment(tctx,
tctx 464 source4/torture/rpc/netlogon.c torture_comment(tctx,
tctx 469 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r);
tctx 470 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet (3)");
tctx 473 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n");
tctx 478 source4/torture/rpc/netlogon.c torture_assert (tctx,
tctx 479 source4/torture/rpc/netlogon.c test_SetupCredentials(p, tctx, machine_credentials, &creds),
tctx 482 source4/torture/rpc/netlogon.c new_random_pass = netlogon_very_rand_pass(tctx, 128);
tctx 492 source4/torture/rpc/netlogon.c torture_comment(tctx,
tctx 497 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordSet2(p, tctx, &r);
tctx 498 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordSet (3)");
tctx 501 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n");
tctx 509 source4/torture/rpc/netlogon.c torture_assert (tctx,
tctx 510 source4/torture/rpc/netlogon.c test_SetupCredentials(p, tctx, machine_credentials, &creds),
tctx 516 source4/torture/rpc/netlogon.c static bool test_GetPassword(struct torture_context *tctx,
tctx 527 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx 533 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 534 source4/torture/rpc/netlogon.c r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME);
tctx 541 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerPasswordGet(p, tctx, &r);
tctx 542 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerPasswordGet");
tctx 547 source4/torture/rpc/netlogon.c static bool test_GetTrustPasswords(struct torture_context *tctx,
tctx 558 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx 564 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 565 source4/torture/rpc/netlogon.c r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME);
tctx 573 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerTrustPasswordsGet(p, tctx, &r);
tctx 574 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "ServerTrustPasswordsGet");
tctx 582 source4/torture/rpc/netlogon.c bool test_netlogon_ops(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 596 source4/torture/rpc/netlogon.c if (lp_client_lanman_auth(tctx->lp_ctx)) {
tctx 600 source4/torture/rpc/netlogon.c if (lp_client_ntlmv2_auth(tctx->lp_ctx)) {
tctx 604 source4/torture/rpc/netlogon.c cli_credentials_get_ntlm_username_domain(cmdline_credentials, tctx,
tctx 613 source4/torture/rpc/netlogon.c names_blob = NTLMv2_generate_names_blob(tctx, cli_credentials_get_workstation(credentials),
tctx 616 source4/torture/rpc/netlogon.c status = cli_credentials_get_ntlm_response(cmdline_credentials, tctx,
tctx 622 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "cli_credentials_get_ntlm_response failed");
tctx 637 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 654 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx 655 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed");
tctx 657 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred),
tctx 667 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing SamLogon with validation level %d and a NULL credential\n", i);
tctx 669 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx 670 source4/torture/rpc/netlogon.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_PARAMETER,
tctx 681 source4/torture/rpc/netlogon.c static bool test_SamLogon(struct torture_context *tctx,
tctx 687 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, credentials, &creds)) {
tctx 691 source4/torture/rpc/netlogon.c return test_netlogon_ops(p, tctx, credentials, creds);
tctx 700 source4/torture/rpc/netlogon.c static bool test_DatabaseSync(struct torture_context *tctx,
tctx 712 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx 718 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 733 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing DatabaseSync of id %d\n", r.in.database_id);
tctx 740 source4/torture/rpc/netlogon.c status = dcerpc_netr_DatabaseSync(p, tctx, &r);
tctx 748 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DatabaseSync");
tctx 751 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n");
tctx 760 source4/torture/rpc/netlogon.c torture_comment(tctx, "\tsequence_nums[%d]=%llu\n",
tctx 774 source4/torture/rpc/netlogon.c static bool test_DatabaseDeltas(struct torture_context *tctx,
tctx 787 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx 791 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 806 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing DatabaseDeltas of id %d at %llu\n",
tctx 812 source4/torture/rpc/netlogon.c status = dcerpc_netr_DatabaseDeltas(p, tctx, &r);
tctx 815 source4/torture/rpc/netlogon.c torture_comment(tctx, "not considering %s to be an error\n",
tctx 822 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DatabaseDeltas");
tctx 825 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n");
tctx 835 source4/torture/rpc/netlogon.c static bool test_DatabaseRedo(struct torture_context *tctx,
tctx 851 source4/torture/rpc/netlogon.c sid = dom_sid_parse_talloc(tctx, "S-1-5-21-1111111111-2222222222-333333333-500");
tctx 1086 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-5-32-544"),
tctx 1098 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-5-32-544"),
tctx 1111 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-5-32-544"),
tctx 1172 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-5-32"),
tctx 1195 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-1-0"),
tctx 1208 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-1-0"),
tctx 1221 source4/torture/rpc/netlogon.c .sid = *dom_sid_parse_talloc(tctx, "S-1-1-0"),
tctx 1267 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1291 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing DatabaseRedo\n");
tctx 1293 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx 1327 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing DatabaseRedo with database %s and %s\n",
tctx 1330 source4/torture/rpc/netlogon.c status = dcerpc_netr_DatabaseRedo(p, tctx, &r);
tctx 1335 source4/torture/rpc/netlogon.c torture_assert_ntstatus_equal(tctx, status, changes[i].expected_error, changes[i].comment);
tctx 1337 source4/torture/rpc/netlogon.c torture_assert_int_equal(tctx,
tctx 1342 source4/torture/rpc/netlogon.c torture_assert_int_equal(tctx,
tctx 1348 source4/torture/rpc/netlogon.c torture_assert_int_equal(tctx,
tctx 1356 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n");
tctx 1357 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx 1371 source4/torture/rpc/netlogon.c static bool test_AccountDeltas(struct torture_context *tctx,
tctx 1385 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx 1391 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1406 source4/torture/rpc/netlogon.c status = dcerpc_netr_AccountDeltas(p, tctx, &r);
tctx 1407 source4/torture/rpc/netlogon.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "AccountDeltas");
tctx 1415 source4/torture/rpc/netlogon.c static bool test_AccountSync(struct torture_context *tctx, struct dcerpc_pipe *p,
tctx 1432 source4/torture/rpc/netlogon.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx 1436 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1452 source4/torture/rpc/netlogon.c status = dcerpc_netr_AccountSync(p, tctx, &r);
tctx 1453 source4/torture/rpc/netlogon.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "AccountSync");
tctx 1461 source4/torture/rpc/netlogon.c static bool test_GetDcName(struct torture_context *tctx,
tctx 1468 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1469 source4/torture/rpc/netlogon.c r.in.domainname = lp_workgroup(tctx->lp_ctx);
tctx 1472 source4/torture/rpc/netlogon.c status = dcerpc_netr_GetDcName(p, tctx, &r);
tctx 1473 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "GetDcName");
tctx 1474 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "GetDcName");
tctx 1476 source4/torture/rpc/netlogon.c torture_comment(tctx, "\tDC is at '%s'\n", dcname);
tctx 1484 source4/torture/rpc/netlogon.c static bool test_LogonControl(struct torture_context *tctx,
tctx 1492 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1499 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl level %d\n", i);
tctx 1501 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl(p, tctx, &r);
tctx 1502 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx 1512 source4/torture/rpc/netlogon.c static bool test_GetAnyDCName(struct torture_context *tctx,
tctx 1519 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1520 source4/torture/rpc/netlogon.c r.in.domainname = lp_workgroup(tctx->lp_ctx);
tctx 1523 source4/torture/rpc/netlogon.c status = dcerpc_netr_GetAnyDCName(p, tctx, &r);
tctx 1524 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "GetAnyDCName");
tctx 1525 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "GetAnyDCName");
tctx 1528 source4/torture/rpc/netlogon.c torture_comment(tctx, "\tDC is at '%s'\n", dcname);
tctx 1538 source4/torture/rpc/netlogon.c static bool test_LogonControl2(struct torture_context *tctx,
tctx 1547 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx);
tctx 1549 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1558 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2 level %d function %d\n",
tctx 1561 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2(p, tctx, &r);
tctx 1562 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx 1565 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx);
tctx 1573 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2 level %d function %d\n",
tctx 1576 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2(p, tctx, &r);
tctx 1577 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx 1580 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx);
tctx 1588 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2 level %d function %d\n",
tctx 1591 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2(p, tctx, &r);
tctx 1592 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx 1603 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2 level %d function %d\n",
tctx 1606 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2(p, tctx, &r);
tctx 1607 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx 1616 source4/torture/rpc/netlogon.c static bool test_DatabaseSync2(struct torture_context *tctx,
tctx 1629 source4/torture/rpc/netlogon.c if (!test_SetupCredentials2(p, tctx, NETLOGON_NEG_AUTH2_FLAGS,
tctx 1637 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1653 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing DatabaseSync2 of id %d\n", r.in.database_id);
tctx 1660 source4/torture/rpc/netlogon.c status = dcerpc_netr_DatabaseSync2(p, tctx, &r);
tctx 1669 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DatabaseSync2");
tctx 1672 source4/torture/rpc/netlogon.c torture_comment(tctx, "Credential chaining failed\n");
tctx 1685 source4/torture/rpc/netlogon.c static bool test_LogonControl2Ex(struct torture_context *tctx,
tctx 1694 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx);
tctx 1696 source4/torture/rpc/netlogon.c r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1705 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n",
tctx 1708 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2Ex(p, tctx, &r);
tctx 1709 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx 1712 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx);
tctx 1720 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n",
tctx 1723 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2Ex(p, tctx, &r);
tctx 1724 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx 1727 source4/torture/rpc/netlogon.c data.domain = lp_workgroup(tctx->lp_ctx);
tctx 1735 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n",
tctx 1738 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2Ex(p, tctx, &r);
tctx 1739 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx 1750 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing LogonControl2Ex level %d function %d\n",
tctx 1753 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonControl2Ex(p, tctx, &r);
tctx 1754 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "LogonControl");
tctx 1760 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetForestTrustInformation(struct torture_context *tctx,
tctx 1769 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1774 source4/torture/rpc/netlogon.c torture_comment(tctx ,"Testing netr_DsRGetForestTrustInformation\n");
tctx 1776 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetForestTrustInformation(p, tctx, &r);
tctx 1777 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DsRGetForestTrustInformation");
tctx 1778 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "DsRGetForestTrustInformation");
tctx 1786 source4/torture/rpc/netlogon.c static bool test_DsrEnumerateDomainTrusts(struct torture_context *tctx,
tctx 1794 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1798 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsrEnumerateDomainTrusts(p, tctx, &r);
tctx 1799 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DsrEnumerateDomaintrusts");
tctx 1800 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "DsrEnumerateDomaintrusts");
tctx 1807 source4/torture/rpc/netlogon.c if (!test_netr_DsRGetForestTrustInformation(tctx, p, NULL)) {
tctx 1817 source4/torture/rpc/netlogon.c if (!test_netr_DsRGetForestTrustInformation(tctx, p,
tctx 1827 source4/torture/rpc/netlogon.c static bool test_netr_NetrEnumerateTrustedDomains(struct torture_context *tctx,
tctx 1834 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1837 source4/torture/rpc/netlogon.c status = dcerpc_netr_NetrEnumerateTrustedDomains(p, tctx, &r);
tctx 1838 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_NetrEnumerateTrustedDomains");
tctx 1839 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "NetrEnumerateTrustedDomains");
tctx 1844 source4/torture/rpc/netlogon.c static bool test_netr_NetrEnumerateTrustedDomainsEx(struct torture_context *tctx,
tctx 1851 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1854 source4/torture/rpc/netlogon.c status = dcerpc_netr_NetrEnumerateTrustedDomainsEx(p, tctx, &r);
tctx 1855 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_NetrEnumerateTrustedDomainsEx");
tctx 1856 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "NetrEnumerateTrustedDomainsEx");
tctx 1862 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetSiteName(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1870 source4/torture/rpc/netlogon.c if (torture_setting_bool(tctx, "samba4", false))
tctx 1871 source4/torture/rpc/netlogon.c torture_skip(tctx, "skipping DsRGetSiteName test against Samba4");
tctx 1875 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_DsRGetSiteName\n");
tctx 1877 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetSiteName(p, tctx, &r);
tctx 1878 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DsRGetSiteName");
tctx 1879 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "DsRGetSiteName");
tctx 1880 source4/torture/rpc/netlogon.c torture_assert_str_equal(tctx, expected_site, site, "netr_DsRGetSiteName");
tctx 1882 source4/torture/rpc/netlogon.c r.in.computer_name = talloc_asprintf(tctx, "\\\\%s", computer_name);
tctx 1883 source4/torture/rpc/netlogon.c torture_comment(tctx,
tctx 1886 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetSiteName(p, tctx, &r);
tctx 1887 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DsRGetSiteName");
tctx 1888 source4/torture/rpc/netlogon.c torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_COMPUTERNAME, "netr_DsRGetSiteName");
tctx 1896 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetDCName(struct torture_context *tctx,
tctx 1903 source4/torture/rpc/netlogon.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1904 source4/torture/rpc/netlogon.c r.in.domain_name = talloc_asprintf(tctx, "%s", lp_realm(tctx->lp_ctx));
tctx 1910 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetDCName(p, tctx, &r);
tctx 1911 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "DsRGetDCName");
tctx 1912 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "DsRGetDCName");
tctx 1913 source4/torture/rpc/netlogon.c return test_netr_DsRGetSiteName(p, tctx,
tctx 1921 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetDCNameEx(struct torture_context *tctx,
tctx 1928 source4/torture/rpc/netlogon.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1929 source4/torture/rpc/netlogon.c r.in.domain_name = talloc_asprintf(tctx, "%s", lp_realm(tctx->lp_ctx));
tctx 1935 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetDCNameEx(p, tctx, &r);
tctx 1936 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_DsRGetDCNameEx");
tctx 1937 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "netr_DsRGetDCNameEx");
tctx 1939 source4/torture/rpc/netlogon.c return test_netr_DsRGetSiteName(p, tctx, info->dc_unc,
tctx 1946 source4/torture/rpc/netlogon.c static bool test_netr_DsRGetDCNameEx2(struct torture_context *tctx,
tctx 1953 source4/torture/rpc/netlogon.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1956 source4/torture/rpc/netlogon.c r.in.domain_name = talloc_asprintf(tctx, "%s", lp_realm(tctx->lp_ctx));
tctx 1962 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_DsRGetDCNameEx2 without client account\n");
tctx 1964 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetDCNameEx2(p, tctx, &r);
tctx 1965 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_DsRGetDCNameEx2");
tctx 1966 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "netr_DsRGetDCNameEx2");
tctx 1968 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_DsRGetDCNameEx2 with client acount\n");
tctx 1974 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRGetDCNameEx2(p, tctx, &r);
tctx 1975 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_DsRGetDCNameEx2");
tctx 1976 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "netr_DsRGetDCNameEx2");
tctx 1977 source4/torture/rpc/netlogon.c return test_netr_DsRGetSiteName(p, tctx, info->dc_unc,
tctx 1981 source4/torture/rpc/netlogon.c static bool test_netr_DsrGetDcSiteCoverageW(struct torture_context *tctx,
tctx 1988 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1991 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsrGetDcSiteCoverageW(p, tctx, &r);
tctx 1992 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "failed");
tctx 1993 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "failed");
tctx 1998 source4/torture/rpc/netlogon.c static bool test_netr_DsRAddressToSitenamesW(struct torture_context *tctx,
tctx 2006 source4/torture/rpc/netlogon.c ctr = talloc(tctx, struct netr_DsRAddressToSitenamesWCtr);
tctx 2009 source4/torture/rpc/netlogon.c addr.buffer = talloc_zero_array(tctx, uint8_t, addr.size);
tctx 2017 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 2019 source4/torture/rpc/netlogon.c r.in.addresses = talloc_zero_array(tctx, struct netr_DsRAddress, r.in.count);
tctx 2023 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRAddressToSitenamesW(p, tctx, &r);
tctx 2024 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "failed");
tctx 2025 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "failed");
tctx 2030 source4/torture/rpc/netlogon.c static bool test_netr_DsRAddressToSitenamesExW(struct torture_context *tctx,
tctx 2038 source4/torture/rpc/netlogon.c ctr = talloc(tctx, struct netr_DsRAddressToSitenamesExWCtr);
tctx 2041 source4/torture/rpc/netlogon.c addr.buffer = talloc_zero_array(tctx, uint8_t, addr.size);
tctx 2049 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 2051 source4/torture/rpc/netlogon.c r.in.addresses = talloc_zero_array(tctx, struct netr_DsRAddress, r.in.count);
tctx 2055 source4/torture/rpc/netlogon.c status = dcerpc_netr_DsRAddressToSitenamesExW(p, tctx, &r);
tctx 2056 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "failed");
tctx 2057 source4/torture/rpc/netlogon.c torture_assert_werr_ok(tctx, r.out.result, "failed");
tctx 2062 source4/torture/rpc/netlogon.c static bool test_netr_ServerGetTrustInfo(struct torture_context *tctx,
tctx 2077 source4/torture/rpc/netlogon.c if (!test_SetupCredentials3(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS,
tctx 2084 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 2085 source4/torture/rpc/netlogon.c r.in.account_name = talloc_asprintf(tctx, "%s$", TEST_MACHINE_NAME);
tctx 2095 source4/torture/rpc/netlogon.c status = dcerpc_netr_ServerGetTrustInfo(p, tctx, &r);
tctx 2096 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "failed");
tctx 2097 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &return_authenticator.cred), "Credential chaining failed");
tctx 2103 source4/torture/rpc/netlogon.c static bool test_GetDomainInfo(struct torture_context *tctx,
tctx 2114 source4/torture/rpc/netlogon.c if (!test_SetupCredentials3(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS,
tctx 2123 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 2142 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_LogonGetDomainInfo\n");
tctx 2144 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonGetDomainInfo(p, tctx, &r);
tctx 2145 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_LogonGetDomainInfo");
tctx 2146 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &a.cred), "Credential chaining failed");
tctx 2148 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_LogonGetDomainInfo 2nd call\n");
tctx 2151 source4/torture/rpc/netlogon.c status = dcerpc_netr_LogonGetDomainInfo(p, tctx, &r);
tctx 2152 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_LogonGetDomainInfo");
tctx 2153 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds, &a.cred), "Credential chaining failed");
tctx 2167 source4/torture/rpc/netlogon.c static bool test_GetDomainInfo_async(struct torture_context *tctx,
tctx 2180 source4/torture/rpc/netlogon.c int *async_counter = talloc(tctx, int);
tctx 2183 source4/torture/rpc/netlogon.c if (!test_SetupCredentials3(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS,
tctx 2189 source4/torture/rpc/netlogon.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 2208 source4/torture/rpc/netlogon.c torture_comment(tctx, "Testing netr_LogonGetDomainInfo - async count %d\n", ASYNC_COUNT);
tctx 2216 source4/torture/rpc/netlogon.c req[i] = dcerpc_netr_LogonGetDomainInfo_send(p, tctx, &r);
tctx 2223 source4/torture/rpc/netlogon.c torture_assert_int_equal(tctx, event_loop_once(dcerpc_event_context(p)), 0,
tctx 2230 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "netr_LogonGetDomainInfo_async");
tctx 2231 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, r.out.result, "netr_LogonGetDomainInfo_async");
tctx 2233 source4/torture/rpc/netlogon.c torture_assert(tctx, creds_client_check(creds_async[i], &a.cred),
tctx 2237 source4/torture/rpc/netlogon.c torture_comment(tctx,
tctx 2240 source4/torture/rpc/netlogon.c torture_assert_int_equal(tctx, (*async_counter), ASYNC_COUNT, "int");
tctx 2245 source4/torture/rpc/netlogon.c static bool test_ManyGetDCName(struct torture_context *tctx,
tctx 2267 source4/torture/rpc/netlogon.c torture_comment(tctx, "Torturing GetDCName\n");
tctx 2270 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "Failed to create secondary connection");
tctx 2273 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "Failed to create bind on secondary connection");
tctx 2292 source4/torture/rpc/netlogon.c status = dcerpc_lsa_OpenPolicy2(p2, tctx, &o);
tctx 2293 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "OpenPolicy2 failed");
tctx 2301 source4/torture/rpc/netlogon.c status = dcerpc_lsa_EnumTrustDom(p2, tctx, &t);
tctx 2305 source4/torture/rpc/netlogon.c torture_fail(tctx, "Could not list domains");
tctx 2309 source4/torture/rpc/netlogon.c d.in.logon_server = talloc_asprintf(tctx, "\\\\%s",
tctx 2319 source4/torture/rpc/netlogon.c status = dcerpc_netr_GetAnyDCName(p, tctx, &d);
tctx 2320 source4/torture/rpc/netlogon.c torture_assert_ntstatus_ok(tctx, status, "GetAnyDCName");
tctx 2322 source4/torture/rpc/netlogon.c torture_comment(tctx, "\tDC for domain %s is %s\n", info->name.string,
tctx 2 source4/torture/rpc/netlogon.h bool test_SetupCredentials2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 29 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetVersion(struct torture_context *tctx,
tctx 38 source4/torture/rpc/ntsvcs.c status = dcerpc_PNP_GetVersion(p, tctx, &r);
tctx 40 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, status, "PNP_GetVersion");
tctx 41 source4/torture/rpc/ntsvcs.c torture_assert_werr_ok(tctx, r.out.result, "PNP_GetVersion");
tctx 42 source4/torture/rpc/ntsvcs.c torture_assert_int_equal(tctx, version, 0x400, "invalid version");
tctx 47 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetDeviceListSize(struct torture_context *tctx,
tctx 57 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx,
tctx 58 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceListSize(p, tctx, &r),
tctx 60 source4/torture/rpc/ntsvcs.c torture_assert_werr_equal(tctx, r.out.result, WERR_CM_INVALID_POINTER,
tctx 65 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx,
tctx 66 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceListSize(p, tctx, &r),
tctx 68 source4/torture/rpc/ntsvcs.c torture_assert_werr_ok(tctx, r.out.result,
tctx 74 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetDeviceList(struct torture_context *tctx,
tctx 81 source4/torture/rpc/ntsvcs.c buffer = talloc_array(tctx, uint16_t, 0);
tctx 89 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx,
tctx 90 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceList(p, tctx, &r),
tctx 92 source4/torture/rpc/ntsvcs.c torture_assert_werr_equal(tctx, r.out.result, WERR_CM_INVALID_POINTER,
tctx 97 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx,
tctx 98 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceList(p, tctx, &r),
tctx 108 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx,
tctx 109 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceListSize(p, tctx, &s),
tctx 111 source4/torture/rpc/ntsvcs.c torture_assert_werr_ok(tctx, s.out.result,
tctx 115 source4/torture/rpc/ntsvcs.c buffer = talloc_array(tctx, uint16_t, length);
tctx 121 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx,
tctx 122 source4/torture/rpc/ntsvcs.c dcerpc_PNP_GetDeviceList(p, tctx, &r),
tctx 125 source4/torture/rpc/ntsvcs.c torture_assert_werr_ok(tctx, r.out.result,
tctx 131 source4/torture/rpc/ntsvcs.c static bool test_PNP_GetDeviceRegProp(struct torture_context *tctx,
tctx 142 source4/torture/rpc/ntsvcs.c buffer = talloc(tctx, uint8_t);
tctx 155 source4/torture/rpc/ntsvcs.c status = dcerpc_PNP_GetDeviceRegProp(p, tctx, &r);
tctx 156 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, status, "PNP_GetDeviceRegProp");
tctx 160 source4/torture/rpc/ntsvcs.c buffer = talloc_array(tctx, uint8_t, needed);
tctx 163 source4/torture/rpc/ntsvcs.c status = dcerpc_PNP_GetDeviceRegProp(p, tctx, &r);
tctx 164 source4/torture/rpc/ntsvcs.c torture_assert_ntstatus_ok(tctx, status, "PNP_GetDeviceRegProp");
tctx 34 source4/torture/rpc/oxidresolve.c static bool test_RemoteActivation(struct torture_context *tctx,
tctx 43 source4/torture/rpc/oxidresolve.c status = torture_rpc_connection(tctx, &p,
tctx 64 source4/torture/rpc/oxidresolve.c status = dcerpc_RemoteActivation(p, tctx, &r);
tctx 88 source4/torture/rpc/oxidresolve.c static bool test_SimplePing(struct torture_context *tctx,
tctx 97 source4/torture/rpc/oxidresolve.c status = dcerpc_SimplePing(p, tctx, &r);
tctx 98 source4/torture/rpc/oxidresolve.c torture_assert_ntstatus_ok(tctx, status, "SimplePing");
tctx 99 source4/torture/rpc/oxidresolve.c torture_assert_werr_ok(tctx, r.out.result, "SimplePing");
tctx 104 source4/torture/rpc/oxidresolve.c static bool test_ComplexPing(struct torture_context *tctx,
tctx 113 source4/torture/rpc/oxidresolve.c if (!test_RemoteActivation(tctx, &oxid, &oid))
tctx 124 source4/torture/rpc/oxidresolve.c status = dcerpc_ComplexPing(p, tctx, &r);
tctx 140 source4/torture/rpc/oxidresolve.c static bool test_ServerAlive(struct torture_context *tctx,
tctx 146 source4/torture/rpc/oxidresolve.c status = dcerpc_ServerAlive(p, tctx, &r);
tctx 147 source4/torture/rpc/oxidresolve.c torture_assert_ntstatus_ok(tctx, status, "ServerAlive");
tctx 148 source4/torture/rpc/oxidresolve.c torture_assert_werr_ok(tctx, r.out.result, "ServerAlive");
tctx 153 source4/torture/rpc/oxidresolve.c static bool test_ResolveOxid(struct torture_context *tctx,
tctx 162 source4/torture/rpc/oxidresolve.c if (!test_RemoteActivation(tctx, &oxid, &oid))
tctx 169 source4/torture/rpc/oxidresolve.c status = dcerpc_ResolveOxid(p, tctx, &r);
tctx 170 source4/torture/rpc/oxidresolve.c torture_assert_ntstatus_ok(tctx, status, "ResolveOxid");
tctx 171 source4/torture/rpc/oxidresolve.c torture_assert_werr_ok(tctx, r.out.result, "ResolveOxid");
tctx 176 source4/torture/rpc/oxidresolve.c static bool test_ResolveOxid2(struct torture_context *tctx,
tctx 185 source4/torture/rpc/oxidresolve.c if (!test_RemoteActivation(tctx, &oxid, &oid))
tctx 192 source4/torture/rpc/oxidresolve.c status = dcerpc_ResolveOxid2(p, tctx, &r);
tctx 193 source4/torture/rpc/oxidresolve.c torture_assert_ntstatus_ok(tctx, status, "ResolveOxid2");
tctx 195 source4/torture/rpc/oxidresolve.c torture_assert_werr_ok(tctx, r.out.result, "ResolveOxid2");
tctx 197 source4/torture/rpc/oxidresolve.c torture_comment(tctx, "Remote server versions: %d, %d\n", r.out.ComVersion->MajorVersion, r.out.ComVersion->MinorVersion);
tctx 202 source4/torture/rpc/oxidresolve.c static bool test_ServerAlive2(struct torture_context *tctx,
tctx 208 source4/torture/rpc/oxidresolve.c status = dcerpc_ServerAlive2(p, tctx, &r);
tctx 209 source4/torture/rpc/oxidresolve.c torture_assert_ntstatus_ok(tctx, status, "ServerAlive2");
tctx 210 source4/torture/rpc/oxidresolve.c torture_assert_werr_ok(tctx, r.out.result, "ServerAlive2");
tctx 31 source4/torture/rpc/remact.c static bool test_RemoteActivation(struct torture_context *tctx,
tctx 51 source4/torture/rpc/remact.c status = dcerpc_RemoteActivation(p, tctx, &r);
tctx 52 source4/torture/rpc/remact.c torture_assert_ntstatus_ok(tctx, status, "RemoteActivation");
tctx 54 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, r.out.result, "RemoteActivation");
tctx 56 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, *r.out.hr, "RemoteActivation");
tctx 58 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, r.out.results[0], "RemoteActivation");
tctx 64 source4/torture/rpc/remact.c status = dcerpc_RemoteActivation(p, tctx, &r);
tctx 65 source4/torture/rpc/remact.c torture_assert_ntstatus_ok(tctx, status,
tctx 68 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, r.out.result,
tctx 71 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, *r.out.hr, "RemoteActivation(GetClassObject)");
tctx 73 source4/torture/rpc/remact.c torture_assert_werr_ok(tctx, r.out.results[0],
tctx 43 source4/torture/rpc/remote_pac.c static bool test_PACVerify(struct torture_context *tctx,
tctx 73 source4/torture/rpc/remote_pac.c TALLOC_CTX *tmp_ctx = talloc_new(tctx);
tctx 75 source4/torture/rpc/remote_pac.c torture_assert(tctx, tmp_ctx != NULL, "talloc_new() failed");
tctx 77 source4/torture/rpc/remote_pac.c if (!test_SetupCredentials2(p, tctx, NETLOGON_NEG_AUTH2_ADS_FLAGS,
tctx 83 source4/torture/rpc/remote_pac.c status = torture_temp_dir(tctx, "PACVerify", &tmp_dir);
tctx 84 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "torture_temp_dir failed");
tctx 86 source4/torture/rpc/remote_pac.c status = gensec_client_start(tctx, &gensec_client_context, tctx->ev,
tctx 87 source4/torture/rpc/remote_pac.c lp_gensec_settings(tctx, tctx->lp_ctx));
tctx 88 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_client_start (client) failed");
tctx 93 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_set_credentials (client) failed");
tctx 96 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_start_mech_by_sasl_name (client) failed");
tctx 98 source4/torture/rpc/remote_pac.c status = gensec_server_start(tctx, tctx->ev,
tctx 99 source4/torture/rpc/remote_pac.c lp_gensec_settings(tctx, tctx->lp_ctx),
tctx 101 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_server_start (server) failed");
tctx 104 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_set_credentials (server) failed");
tctx 107 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_start_mech_by_sasl_name (server) failed");
tctx 115 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_update (client) failed");
tctx 120 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_update (server) failed");
tctx 131 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "gensec_session_info failed");
tctx 147 source4/torture/rpc/remote_pac.c ndr_err = ndr_push_struct_blob(&pac_wrapped, tmp_ctx, lp_iconv_convenience(tctx->lp_ctx), &pac_wrapped_struct,
tctx 149 source4/torture/rpc/remote_pac.c torture_assert(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), "ndr_push_struct_blob of PACValidate structure failed");
tctx 151 source4/torture/rpc/remote_pac.c torture_assert(tctx, (creds->negotiate_flags & NETLOGON_NEG_ARCFOUR), "not willing to even try a PACValidate without RC4 encryption");
tctx 176 source4/torture/rpc/remote_pac.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 183 source4/torture/rpc/remote_pac.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx 185 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed");
tctx 198 source4/torture/rpc/remote_pac.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 202 source4/torture/rpc/remote_pac.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx 204 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_LOGON_FAILURE, "LogonSamLogon failed");
tctx 206 source4/torture/rpc/remote_pac.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred),
tctx 220 source4/torture/rpc/remote_pac.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 224 source4/torture/rpc/remote_pac.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx 226 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_PARAMETER, "LogonSamLogon failed");
tctx 228 source4/torture/rpc/remote_pac.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred),
tctx 249 source4/torture/rpc/remote_pac.c ndr_err = ndr_push_struct_blob(&pac_wrapped, tmp_ctx, lp_iconv_convenience(tctx->lp_ctx), &pac_wrapped_struct,
tctx 251 source4/torture/rpc/remote_pac.c torture_assert(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), "ndr_push_struct_blob of PACValidate structure failed");
tctx 253 source4/torture/rpc/remote_pac.c torture_assert(tctx, (creds->negotiate_flags & NETLOGON_NEG_ARCFOUR), "not willing to even try a PACValidate without RC4 encryption");
tctx 267 source4/torture/rpc/remote_pac.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 271 source4/torture/rpc/remote_pac.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx 273 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_LOGON_FAILURE, "LogonSamLogon failed");
tctx 275 source4/torture/rpc/remote_pac.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred),
tctx 296 source4/torture/rpc/remote_pac.c ndr_err = ndr_push_struct_blob(&pac_wrapped, tmp_ctx, lp_iconv_convenience(tctx->lp_ctx), &pac_wrapped_struct,
tctx 298 source4/torture/rpc/remote_pac.c torture_assert(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), "ndr_push_struct_blob of PACValidate structure failed");
tctx 300 source4/torture/rpc/remote_pac.c torture_assert(tctx, (creds->negotiate_flags & NETLOGON_NEG_ARCFOUR), "not willing to even try a PACValidate without RC4 encryption");
tctx 314 source4/torture/rpc/remote_pac.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 318 source4/torture/rpc/remote_pac.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx 320 source4/torture/rpc/remote_pac.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_INVALID_PARAMETER, "LogonSamLogon failed");
tctx 322 source4/torture/rpc/remote_pac.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred),
tctx 47 source4/torture/rpc/rpc.c NTSTATUS torture_rpc_binding(struct torture_context *tctx,
tctx 51 source4/torture/rpc/rpc.c const char *binding_string = torture_setting_string(tctx, "binding",
tctx 55 source4/torture/rpc/rpc.c torture_comment(tctx,
tctx 60 source4/torture/rpc/rpc.c status = dcerpc_parse_binding(tctx, binding_string, binding);
tctx 73 source4/torture/rpc/rpc.c _PUBLIC_ NTSTATUS torture_rpc_connection(struct torture_context *tctx,
tctx 80 source4/torture/rpc/rpc.c dcerpc_init(tctx->lp_ctx);
tctx 82 source4/torture/rpc/rpc.c status = torture_rpc_binding(tctx, &binding);
tctx 86 source4/torture/rpc/rpc.c status = dcerpc_pipe_connect_b(tctx,
tctx 88 source4/torture/rpc/rpc.c cmdline_credentials, tctx->ev, tctx->lp_ctx);
tctx 92 source4/torture/rpc/rpc.c dcerpc_binding_string(tctx, binding), nt_errstr(status));
tctx 101 source4/torture/rpc/rpc.c NTSTATUS torture_rpc_connection_transport(struct torture_context *tctx,
tctx 110 source4/torture/rpc/rpc.c status = torture_rpc_binding(tctx, &binding);
tctx 117 source4/torture/rpc/rpc.c status = dcerpc_pipe_connect_b(tctx, p, binding, table,
tctx 118 source4/torture/rpc/rpc.c cmdline_credentials, tctx->ev, tctx->lp_ctx);
tctx 127 source4/torture/rpc/rpc.c static bool torture_rpc_setup_machine(struct torture_context *tctx,
tctx 132 source4/torture/rpc/rpc.c struct torture_rpc_tcase *tcase = talloc_get_type(tctx->active_tcase,
tctx 136 source4/torture/rpc/rpc.c status = torture_rpc_binding(tctx, &binding);
tctx 140 source4/torture/rpc/rpc.c *data = tcase_data = talloc_zero(tctx, struct torture_rpc_tcase_data);
tctx 142 source4/torture/rpc/rpc.c tcase_data->join_ctx = torture_join_domain(tctx, tcase->machine_name,
tctx 146 source4/torture/rpc/rpc.c torture_fail(tctx, "Failed to join as BDC");
tctx 148 source4/torture/rpc/rpc.c status = dcerpc_pipe_connect_b(tctx,
tctx 152 source4/torture/rpc/rpc.c tcase_data->credentials, tctx->ev, tctx->lp_ctx);
tctx 154 source4/torture/rpc/rpc.c torture_assert_ntstatus_ok(tctx, status, "Error connecting to server");
tctx 190 source4/torture/rpc/rpc.c static bool torture_rpc_setup_anonymous(struct torture_context *tctx,
tctx 196 source4/torture/rpc/rpc.c struct torture_rpc_tcase *tcase = talloc_get_type(tctx->active_tcase,
tctx 199 source4/torture/rpc/rpc.c status = torture_rpc_binding(tctx, &binding);
tctx 203 source4/torture/rpc/rpc.c *data = tcase_data = talloc_zero(tctx, struct torture_rpc_tcase_data);
tctx 204 source4/torture/rpc/rpc.c tcase_data->credentials = cli_credentials_init_anon(tctx);
tctx 206 source4/torture/rpc/rpc.c status = dcerpc_pipe_connect_b(tctx,
tctx 210 source4/torture/rpc/rpc.c tcase_data->credentials, tctx->ev, tctx->lp_ctx);
tctx 212 source4/torture/rpc/rpc.c torture_assert_ntstatus_ok(tctx, status, "Error connecting to server");
tctx 217 source4/torture/rpc/rpc.c static bool torture_rpc_setup (struct torture_context *tctx, void **data)
tctx 221 source4/torture/rpc/rpc.c tctx->active_tcase, struct torture_rpc_tcase);
tctx 224 source4/torture/rpc/rpc.c *data = tcase_data = talloc_zero(tctx, struct torture_rpc_tcase_data);
tctx 227 source4/torture/rpc/rpc.c status = torture_rpc_connection(tctx,
tctx 231 source4/torture/rpc/rpc.c torture_assert_ntstatus_ok(tctx, status, "Error connecting to server");
tctx 267 source4/torture/rpc/rpc.c static bool torture_rpc_wrap_test(struct torture_context *tctx,
tctx 277 source4/torture/rpc/rpc.c return fn(tctx, tcase_data->pipe);
tctx 280 source4/torture/rpc/rpc.c static bool torture_rpc_wrap_test_ex(struct torture_context *tctx,
tctx 290 source4/torture/rpc/rpc.c return fn(tctx, tcase_data->pipe, test->data);
tctx 294 source4/torture/rpc/rpc.c static bool torture_rpc_wrap_test_creds(struct torture_context *tctx,
tctx 304 source4/torture/rpc/rpc.c return fn(tctx, tcase_data->pipe, tcase_data->credentials);
tctx 44 source4/torture/rpc/rpc.h NTSTATUS torture_rpc_connection(struct torture_context *tctx,
tctx 48 source4/torture/rpc/rpc.h struct test_join *torture_join_domain(struct torture_context *tctx,
tctx 53 source4/torture/rpc/rpc.h void torture_leave_domain(struct torture_context *tctx, struct test_join *join);
tctx 1347 source4/torture/rpc/samba3rpc.c static bool test_join3(struct torture_context *tctx,
tctx 1360 source4/torture/rpc/samba3rpc.c lp_smbcli_options(tctx->lp_ctx, &options);
tctx 1361 source4/torture/rpc/samba3rpc.c lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx 1363 source4/torture/rpc/samba3rpc.c status = smbcli_full_connection(tctx, &cli,
tctx 1364 source4/torture/rpc/samba3rpc.c torture_setting_string(tctx, "host", NULL),
tctx 1365 source4/torture/rpc/samba3rpc.c lp_smb_ports(tctx->lp_ctx),
tctx 1366 source4/torture/rpc/samba3rpc.c "IPC$", NULL, lp_socket_options(tctx->lp_ctx),
tctx 1367 source4/torture/rpc/samba3rpc.c smb_creds, lp_resolve_context(tctx->lp_ctx),
tctx 1368 source4/torture/rpc/samba3rpc.c tctx->ev, &options, &session_options,
tctx 1369 source4/torture/rpc/samba3rpc.c lp_iconv_convenience(tctx->lp_ctx),
tctx 1370 source4/torture/rpc/samba3rpc.c lp_gensec_settings(tctx, tctx->lp_ctx));
tctx 1383 source4/torture/rpc/samba3rpc.c cli_credentials_set_conf(wks_creds, tctx->lp_ctx);
tctx 1391 source4/torture/rpc/samba3rpc.c if (!join3(cli, tctx->lp_ctx, use_level25, samr_creds, wks_creds)) {
tctx 1400 source4/torture/rpc/samba3rpc.c if (!auth2(cli, tctx->lp_ctx, wks_creds)) {
tctx 1405 source4/torture/rpc/samba3rpc.c if (!leave(cli, tctx->lp_ctx, samr_creds, wks_creds)) {
tctx 1316 source4/torture/rpc/samlogon.c struct torture_context *tctx,
tctx 1348 source4/torture/rpc/samlogon.c samlogon_state.workgroup = lp_workgroup(tctx->lp_ctx);
tctx 1349 source4/torture/rpc/samlogon.c samlogon_state.netbios_name = lp_netbios_name(tctx->lp_ctx);
tctx 1356 source4/torture/rpc/samlogon.c samlogon_state.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx);
tctx 58 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 62 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 66 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 70 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 91 source4/torture/rpc/samr.c bool test_samr_handle_Close(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 100 source4/torture/rpc/samr.c status = dcerpc_samr_Close(p, tctx, &r);
tctx 101 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "Close");
tctx 106 source4/torture/rpc/samr.c static bool test_Shutdown(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 112 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx 113 source4/torture/rpc/samr.c torture_skip(tctx, "samr_Shutdown disabled - enable dangerous tests to use\n");
tctx 119 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Shutdown\n");
tctx 121 source4/torture/rpc/samr.c status = dcerpc_samr_Shutdown(p, tctx, &r);
tctx 122 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "samr_Shutdown");
tctx 127 source4/torture/rpc/samr.c static bool test_SetDsrmPassword(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 135 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx 136 source4/torture/rpc/samr.c torture_skip(tctx, "samr_SetDsrmPassword disabled - enable dangerous tests to use");
tctx 147 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_SetDsrmPassword\n");
tctx 149 source4/torture/rpc/samr.c status = dcerpc_samr_SetDsrmPassword(p, tctx, &r);
tctx 150 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_SUPPORTED, "samr_SetDsrmPassword");
tctx 157 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 169 source4/torture/rpc/samr.c status = dcerpc_samr_QuerySecurity(p, tctx, &r);
tctx 170 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "QuerySecurity");
tctx 172 source4/torture/rpc/samr.c torture_assert(tctx, sdbuf != NULL, "sdbuf is NULL");
tctx 178 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba4", false)) {
tctx 179 source4/torture/rpc/samr.c torture_skip(tctx, "skipping SetSecurity test against Samba4\n");
tctx 182 source4/torture/rpc/samr.c status = dcerpc_samr_SetSecurity(p, tctx, &s);
tctx 183 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "SetSecurity");
tctx 185 source4/torture/rpc/samr.c status = dcerpc_samr_QuerySecurity(p, tctx, &r);
tctx 186 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "QuerySecurity");
tctx 192 source4/torture/rpc/samr.c static bool test_SetUserInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 208 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 226 source4/torture/rpc/samr.c status = dcerpc_samr_ ##call(p, tctx, &r); \
tctx 228 source4/torture/rpc/samr.c torture_comment(tctx, #call " level %u failed - %s (%s)\n", \
tctx 236 source4/torture/rpc/samr.c torture_comment(tctx, "Failed to set %s to '%s' (%s)\n", \
tctx 244 source4/torture/rpc/samr.c torture_comment(tctx, "Failed to set %s to '%s' (%s)\n", \
tctx 252 source4/torture/rpc/samr.c torture_comment(tctx, "Failed to set %s to 0x%llx - got 0x%llx (%s)\n", \
tctx 259 source4/torture/rpc/samr.c torture_comment(tctx, "field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \
tctx 283 source4/torture/rpc/samr.c torture_comment(tctx, "field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \
tctx 307 source4/torture/rpc/samr.c torture_comment(tctx, "field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \
tctx 343 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 350 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-1", base_account_name);
tctx 352 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-3", base_account_name);
tctx 354 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-5", base_account_name);
tctx 356 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-6", base_account_name);
tctx 358 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-7", base_account_name);
tctx 360 source4/torture/rpc/samr.c test_account_name = talloc_asprintf(tctx, "%sxx7-21", base_account_name);
tctx 445 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 460 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 524 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 609 source4/torture/rpc/samr.c static bool test_SetUserPass(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 624 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx 628 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 646 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 24 (set password)\n");
tctx 648 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 661 source4/torture/rpc/samr.c static bool test_SetUserPass_23(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 677 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx 681 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 702 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 23 (set password)\n");
tctx 704 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 726 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 23 (set password) with wrong password\n");
tctx 728 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 739 source4/torture/rpc/samr.c static bool test_SetUserPassEx(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 748 source4/torture/rpc/samr.c DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16);
tctx 758 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx 763 source4/torture/rpc/samr.c newpass = samr_rand_pass_fixed_len(tctx, policy_min_pw_len - 1);
tctx 765 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 792 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 26 (set password ex)\n");
tctx 794 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 809 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 26 (set password ex) with wrong session key\n");
tctx 811 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 823 source4/torture/rpc/samr.c static bool test_SetUserPass_25(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 832 source4/torture/rpc/samr.c DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16);
tctx 842 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx 846 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 875 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 25 (set password ex)\n");
tctx 877 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 892 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 25 (set password ex) with wrong session key\n");
tctx 894 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 904 source4/torture/rpc/samr.c static bool test_SetUserPass_18(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 921 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx 925 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 949 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16);
tctx 956 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16);
tctx 961 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 18 (set password hash)\n");
tctx 963 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 975 source4/torture/rpc/samr.c static bool test_SetUserPass_21(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 993 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx 997 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 1035 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16);
tctx 1044 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16);
tctx 1049 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 21 (set password hash)\n");
tctx 1051 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 1065 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 1078 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 1091 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 1106 source4/torture/rpc/samr.c DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16);
tctx 1119 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx 1123 source4/torture/rpc/samr.c newpass = samr_rand_pass_silent(tctx, policy_min_pw_len);
tctx 1136 source4/torture/rpc/samr.c comment = talloc_asprintf(tctx, "comment: %ld\n", time(NULL));
tctx 1226 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16);
tctx 1233 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16);
tctx 1244 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16);
tctx 1252 source4/torture/rpc/samr.c out = data_blob_talloc_zero(tctx, 16);
tctx 1274 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo2(p, tctx, &s2);
tctx 1276 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 1290 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx,
tctx 1294 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx,
tctx 1313 source4/torture/rpc/samr.c static bool test_SetAliasInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1329 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetAliasInfo level %u\n", levels[i]);
tctx 1333 source4/torture/rpc/samr.c r.in.info = talloc(tctx, union samr_AliasInfo);
tctx 1341 source4/torture/rpc/samr.c status = dcerpc_samr_SetAliasInfo(p, tctx, &r);
tctx 1352 source4/torture/rpc/samr.c status = dcerpc_samr_QueryAliasInfo(p, tctx, &q);
tctx 1363 source4/torture/rpc/samr.c static bool test_GetGroupsForUser(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1370 source4/torture/rpc/samr.c torture_comment(tctx, "testing GetGroupsForUser\n");
tctx 1375 source4/torture/rpc/samr.c status = dcerpc_samr_GetGroupsForUser(p, tctx, &r);
tctx 1376 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetGroupsForUser");
tctx 1382 source4/torture/rpc/samr.c static bool test_GetDomPwInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1392 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
tctx 1394 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
tctx 1395 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
tctx 1397 source4/torture/rpc/samr.c r.in.domain_name->string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1398 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
tctx 1400 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
tctx 1401 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
tctx 1404 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
tctx 1406 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
tctx 1407 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
tctx 1410 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
tctx 1412 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
tctx 1413 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
tctx 1418 source4/torture/rpc/samr.c static bool test_GetUserPwInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1425 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetUserPwInfo\n");
tctx 1430 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &r);
tctx 1431 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetUserPwInfo");
tctx 1436 source4/torture/rpc/samr.c static NTSTATUS test_LookupName(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1452 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx 1461 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx 1471 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx 1479 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx 1491 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx 1504 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 1512 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, domain_handle, name, &rid);
tctx 1521 source4/torture/rpc/samr.c status = dcerpc_samr_OpenUser(p, tctx, &r);
tctx 1531 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 1544 source4/torture/rpc/samr.c status = test_OpenUser_byname(p, tctx, handle, "testuser", &user_handle);
tctx 1578 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx 1584 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &user_handle)) {
tctx 1592 source4/torture/rpc/samr.c static bool test_ChangePasswordUser(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1611 source4/torture/rpc/samr.c status = test_OpenUser_byname(p, tctx, handle, acct_name, &user_handle);
tctx 1618 source4/torture/rpc/samr.c status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
tctx 1622 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 1624 source4/torture/rpc/samr.c torture_comment(tctx, "Testing ChangePasswordUser\n");
tctx 1626 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL,
tctx 1657 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx 1658 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_WRONG_PASSWORD,
tctx 1678 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx 1679 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_WRONG_PASSWORD,
tctx 1699 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx 1722 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx 1752 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx 1762 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 1790 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx 1800 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 1828 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx 1852 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser(p, tctx, &r);
tctx 1862 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &user_handle)) {
tctx 1870 source4/torture/rpc/samr.c static bool test_OemChangePasswordUser2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1894 source4/torture/rpc/samr.c torture_comment(tctx, "Testing OemChangePasswordUser2\n");
tctx 1896 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL,
tctx 1901 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &dom_pw_info);
tctx 1906 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 1908 source4/torture/rpc/samr.c server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1926 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx 1948 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx 1965 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx 1978 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx 1992 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx 2006 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx 2026 source4/torture/rpc/samr.c status = dcerpc_samr_OemChangePasswordUser2(p, tctx, &r);
tctx 2040 source4/torture/rpc/samr.c static bool test_ChangePasswordUser2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 2064 source4/torture/rpc/samr.c torture_comment(tctx, "Testing ChangePasswordUser2 on %s\n", acct_name);
tctx 2066 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL,
tctx 2072 source4/torture/rpc/samr.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &dom_pw_info);
tctx 2077 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 2080 source4/torture/rpc/samr.c server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 2105 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser2(p, tctx, &r);
tctx 2119 source4/torture/rpc/samr.c bool test_ChangePasswordUser3(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 2140 source4/torture/rpc/samr.c torture_comment(tctx, "Testing ChangePasswordUser3\n");
tctx 2145 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, policy_min_pw_len);
tctx 2147 source4/torture/rpc/samr.c newpass = samr_rand_pass_fixed_len(tctx, policy_min_pw_len);
tctx 2151 source4/torture/rpc/samr.c torture_comment(tctx, "Using password '%s'\n", newpass);
tctx 2154 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL,
tctx 2158 source4/torture/rpc/samr.c server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 2189 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx 2220 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx 2229 source4/torture/rpc/samr.c init_lsa_String(&account_bad, talloc_asprintf(tctx, "%sXX", account_string));
tctx 2232 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx 2266 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx 2329 source4/torture/rpc/samr.c return test_ChangePasswordUser3(p, tctx, account_string,
tctx 2344 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "ChangePasswordUser3");
tctx 2345 source4/torture/rpc/samr.c *password = talloc_strdup(tctx, newpass);
tctx 2351 source4/torture/rpc/samr.c bool test_ChangePasswordRandomBytes(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 2361 source4/torture/rpc/samr.c DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16);
tctx 2377 source4/torture/rpc/samr.c new_random_pass = samr_very_rand_pass(tctx, 128);
tctx 2379 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL,
tctx 2383 source4/torture/rpc/samr.c server.string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 2413 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo level 25 (set password ex) with a password made up of only random bytes\n");
tctx 2415 source4/torture/rpc/samr.c status = dcerpc_samr_SetUserInfo(p, tctx, &s);
tctx 2422 source4/torture/rpc/samr.c torture_comment(tctx, "Testing ChangePasswordUser3 with a password made up of only random bytes\n");
tctx 2426 source4/torture/rpc/samr.c new_random_pass = samr_very_rand_pass(tctx, 128);
tctx 2447 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx 2462 source4/torture/rpc/samr.c newpass = samr_rand_pass(tctx, 128);
tctx 2485 source4/torture/rpc/samr.c status = dcerpc_samr_ChangePasswordUser3(p, tctx, &r);
tctx 2496 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "ChangePasswordUser3 (on second random password)");
tctx 2497 source4/torture/rpc/samr.c *password = talloc_strdup(tctx, newpass);
tctx 2504 source4/torture/rpc/samr.c static bool test_GetMembersInAlias(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 2511 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetMembersInAlias\n");
tctx 2516 source4/torture/rpc/samr.c status = dcerpc_samr_GetMembersInAlias(p, tctx, &r);
tctx 2517 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "GetMembersInAlias");
tctx 2522 source4/torture/rpc/samr.c static bool test_AddMemberToAlias(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 2531 source4/torture/rpc/samr.c sid = dom_sid_add_rid(tctx, domain_sid, 512);
tctx 2533 source4/torture/rpc/samr.c torture_comment(tctx, "testing AddAliasMember\n");
tctx 2537 source4/torture/rpc/samr.c status = dcerpc_samr_AddAliasMember(p, tctx, &r);
tctx 2538 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "AddAliasMember");
tctx 2543 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteAliasMember(p, tctx, &d);
tctx 2544 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "DelAliasMember");
tctx 2549 source4/torture/rpc/samr.c static bool test_AddMultipleMembersToAlias(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 2557 source4/torture/rpc/samr.c torture_comment(tctx, "testing AddMultipleMembersToAlias\n");
tctx 2562 source4/torture/rpc/samr.c sids.sids = talloc_array(tctx, struct lsa_SidPtr, 3);
tctx 2564 source4/torture/rpc/samr.c sids.sids[0].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-1");
tctx 2565 source4/torture/rpc/samr.c sids.sids[1].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-2");
tctx 2566 source4/torture/rpc/samr.c sids.sids[2].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-3");
tctx 2568 source4/torture/rpc/samr.c status = dcerpc_samr_AddMultipleMembersToAlias(p, tctx, &a);
tctx 2569 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "AddMultipleMembersToAlias");
tctx 2572 source4/torture/rpc/samr.c torture_comment(tctx, "testing RemoveMultipleMembersFromAlias\n");
tctx 2576 source4/torture/rpc/samr.c status = dcerpc_samr_RemoveMultipleMembersFromAlias(p, tctx, &r);
tctx 2577 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "RemoveMultipleMembersFromAlias");
tctx 2580 source4/torture/rpc/samr.c status = dcerpc_samr_RemoveMultipleMembersFromAlias(p, tctx, &r);
tctx 2581 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "RemoveMultipleMembersFromAlias");
tctx 2584 source4/torture/rpc/samr.c sids.sids[2].sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1-2-3-4");
tctx 2586 source4/torture/rpc/samr.c status = dcerpc_samr_RemoveMultipleMembersFromAlias(p, tctx, &r);
tctx 2587 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND, "RemoveMultipleMembersFromAlias");
tctx 2592 source4/torture/rpc/samr.c static bool test_TestPrivateFunctionsUser(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 2598 source4/torture/rpc/samr.c torture_comment(tctx, "Testing TestPrivateFunctionsUser\n");
tctx 2602 source4/torture/rpc/samr.c status = dcerpc_samr_TestPrivateFunctionsUser(p, tctx, &r);
tctx 2603 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "TestPrivateFunctionsUser");
tctx 2609 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 2621 source4/torture/rpc/samr.c torture_comment(tctx, "Testing QueryUserInfo%s level 5 and 21 call ",
tctx 2634 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo2(p, tctx, &r2);
tctx 2640 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &r);
tctx 2666 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, pwdlastset5, pwdlastset21,
tctx 2671 source4/torture/rpc/samr.c torture_comment(tctx, "(pwdlastset: %lld)\n", *pwdlastset);
tctx 2676 source4/torture/rpc/samr.c static bool test_SamLogon_Creds(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 2692 source4/torture/rpc/samr.c if (lp_client_lanman_auth(tctx->lp_ctx)) {
tctx 2696 source4/torture/rpc/samr.c if (lp_client_ntlmv2_auth(tctx->lp_ctx)) {
tctx 2700 source4/torture/rpc/samr.c cli_credentials_get_ntlm_username_domain(test_credentials, tctx,
tctx 2709 source4/torture/rpc/samr.c names_blob = NTLMv2_generate_names_blob(tctx, cli_credentials_get_workstation(machine_credentials),
tctx 2712 source4/torture/rpc/samr.c status = cli_credentials_get_ntlm_response(test_credentials, tctx,
tctx 2718 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "cli_credentials_get_ntlm_response failed");
tctx 2735 source4/torture/rpc/samr.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 2751 source4/torture/rpc/samr.c status = dcerpc_netr_LogonSamLogon(p, tctx, &r);
tctx 2753 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, expected_result, "LogonSamLogon failed");
tctx 2756 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed");
tctx 2759 source4/torture/rpc/samr.c torture_assert(tctx, creds_client_check(creds, &r.out.return_authenticator->cred),
tctx 2765 source4/torture/rpc/samr.c static bool test_SamLogon(struct torture_context *tctx,
tctx 2773 source4/torture/rpc/samr.c if (!test_SetupCredentials(p, tctx, machine_credentials, &creds)) {
tctx 2777 source4/torture/rpc/samr.c return test_SamLogon_Creds(p, tctx, machine_credentials, test_credentials,
tctx 2781 source4/torture/rpc/samr.c static bool test_SamLogon_with_creds(struct torture_context *tctx,
tctx 2791 source4/torture/rpc/samr.c test_credentials = cli_credentials_init(tctx);
tctx 2796 source4/torture/rpc/samr.c lp_workgroup(tctx->lp_ctx), CRED_SPECIFIED);
tctx 2806 source4/torture/rpc/samr.c if (!test_SamLogon(tctx, p, machine_creds, test_credentials,
tctx 2808 source4/torture/rpc/samr.c torture_warning(tctx, "new password did not work\n");
tctx 2817 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 2838 source4/torture/rpc/samr.c fields = talloc_asprintf(tctx, "(fields_present: 0x%08x)",
tctx 2845 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetUserInfo%s level %d call "
tctx 2850 source4/torture/rpc/samr.c if (!test_SetUserPass_level_ex(p, tctx, handle, level,
tctx 2859 source4/torture/rpc/samr.c if (!test_QueryUserInfo_pwdlastset(p, tctx, handle,
tctx 2869 source4/torture/rpc/samr.c if (!test_SamLogon_with_creds(tctx, np,
tctx 2881 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 2912 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 2918 source4/torture/rpc/samr.c status = torture_rpc_connection(tctx, &np, &ndr_table_netlogon);
tctx 2944 source4/torture/rpc/samr.c torture_comment(tctx, "------------------------------\n"
tctx 2966 source4/torture/rpc/samr.c if (!test_SetPassword_level(p, np, tctx, handle,
tctx 2995 source4/torture/rpc/samr.c torture_comment(tctx, "not considering a non-0 "
tctx 3003 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: "
tctx 3019 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n");
tctx 3026 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n");
tctx 3039 source4/torture/rpc/samr.c if (!test_SetPassword_level(p, np, tctx, handle,
tctx 3070 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, pwdlastset_old,
tctx 3076 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: "
tctx 3082 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: "
tctx 3097 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n");
tctx 3104 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n");
tctx 3119 source4/torture/rpc/samr.c if (!test_SetPassword_level(p, np, tctx, handle,
tctx 3148 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, pwdlastset_old,
tctx 3154 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: "
tctx 3160 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: "
tctx 3172 source4/torture/rpc/samr.c if (!test_SetPassword_level(p, np, tctx, handle,
tctx 3196 source4/torture/rpc/samr.c torture_comment(tctx, "not considering a non-0 "
tctx 3211 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, pwdlastset_old,
tctx 3218 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: "
tctx 3225 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed: "
tctx 3241 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n");
tctx 3248 source4/torture/rpc/samr.c torture_warning(tctx, "pwdlastset not increasing\n");
tctx 3283 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 3297 source4/torture/rpc/samr.c user_sid = dom_sid_add_rid(tctx, domain_sid, rid);
tctx 3309 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r);
tctx 3310 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND,
tctx 3331 source4/torture/rpc/samr.c status = dcerpc_lsa_AddAccountRights(lp, tctx, &r);
tctx 3332 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3351 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccounts(lp, tctx, &r);
tctx 3352 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3361 source4/torture/rpc/samr.c torture_assert(tctx, found_sid,
tctx 3375 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r);
tctx 3376 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3380 source4/torture/rpc/samr.c torture_warning(tctx, "failed to find newly added rights");
tctx 3395 source4/torture/rpc/samr.c status = dcerpc_lsa_OpenAccount(lp, tctx, &r);
tctx 3396 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3409 source4/torture/rpc/samr.c status = dcerpc_lsa_GetSystemAccessAccount(lp, tctx, &r);
tctx 3410 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3422 source4/torture/rpc/samr.c status = dcerpc_lsa_Close(lp, tctx, &r);
tctx 3423 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3435 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteUser(p, tctx, &r);
tctx 3436 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "Delete User failed");
tctx 3454 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccounts(lp, tctx, &r);
tctx 3455 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3464 source4/torture/rpc/samr.c torture_assert(tctx, found_sid,
tctx 3478 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r);
tctx 3479 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3483 source4/torture/rpc/samr.c torture_warning(tctx, "failed to find newly added rights");
tctx 3498 source4/torture/rpc/samr.c status = dcerpc_lsa_OpenAccount(lp, tctx, &r);
tctx 3499 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3512 source4/torture/rpc/samr.c status = dcerpc_lsa_GetSystemAccessAccount(lp, tctx, &r);
tctx 3513 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3525 source4/torture/rpc/samr.c status = dcerpc_lsa_DeleteObject(lp, tctx, &r);
tctx 3526 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3545 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccounts(lp, tctx, &r);
tctx 3546 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 3555 source4/torture/rpc/samr.c torture_assert(tctx, !found_sid,
tctx 3569 source4/torture/rpc/samr.c status = dcerpc_lsa_EnumAccountRights(lp, tctx, &r);
tctx 3570 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_OBJECT_NAME_NOT_FOUND,
tctx 3578 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 3601 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, domain_handle, base_acct_name, &rid);
tctx 3608 source4/torture/rpc/samr.c if (!test_QuerySecurity(p, tctx, user_handle)) {
tctx 3612 source4/torture/rpc/samr.c if (!test_QueryUserInfo(p, tctx, user_handle)) {
tctx 3616 source4/torture/rpc/samr.c if (!test_QueryUserInfo2(p, tctx, user_handle)) {
tctx 3620 source4/torture/rpc/samr.c if (!test_SetUserInfo(p, tctx, user_handle, base_acct_flags,
tctx 3625 source4/torture/rpc/samr.c if (!test_GetUserPwInfo(p, tctx, user_handle)) {
tctx 3629 source4/torture/rpc/samr.c if (!test_TestPrivateFunctionsUser(p, tctx, user_handle)) {
tctx 3633 source4/torture/rpc/samr.c if (!test_SetUserPass(p, tctx, user_handle, &password)) {
tctx 3640 source4/torture/rpc/samr.c char *v = generate_random_str(tctx, 1);
tctx 3648 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) {
tctx 3652 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, simple_pass, false)) {
tctx 3657 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) {
tctx 3662 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, samr_rand_pass(tctx, 4), false)) {
tctx 3667 source4/torture/rpc/samr.c if (!test_ChangePasswordRandomBytes(p, tctx, base_acct_name, user_handle, &password)) {
tctx 3673 source4/torture/rpc/samr.c if (!test_SetUserPass_23(p, tctx, user_handle, password_fields[i], &password)) {
tctx 3678 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
tctx 3684 source4/torture/rpc/samr.c if (!test_SetUserPass_25(p, tctx, user_handle, password_fields[i], &password)) {
tctx 3689 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
tctx 3694 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, false, &password)) {
tctx 3698 source4/torture/rpc/samr.c if (!test_ChangePassword(p, tctx, base_acct_name, domain_handle, &password)) {
tctx 3702 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba4", false)) {
tctx 3706 source4/torture/rpc/samr.c if (!test_SetUserPass_18(p, tctx, user_handle, &password)) {
tctx 3710 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
tctx 3722 source4/torture/rpc/samr.c if (!test_SetUserPass_21(p, tctx, user_handle, password_fields[i], &password)) {
tctx 3727 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
tctx 3737 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &q);
tctx 3749 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 3765 source4/torture/rpc/samr.c if (!test_SetPassword_pwdlastset(p, tctx, base_acct_flags,
tctx 3773 source4/torture/rpc/samr.c torture_comment(tctx, "pwdLastSet test succeeded\n");
tctx 3775 source4/torture/rpc/samr.c torture_warning(tctx, "pwdLastSet test failed\n");
tctx 3785 source4/torture/rpc/samr.c status = torture_rpc_connection(tctx, &lp, &ndr_table_lsarpc);
tctx 3786 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "Failed to open LSA pipe");
tctx 3788 source4/torture/rpc/samr.c if (!test_lsa_OpenPolicy2(lp, tctx, &lsa_handle)) {
tctx 3792 source4/torture/rpc/samr.c if (!test_DeleteUser_with_privs(p, lp, tctx,
tctx 3799 source4/torture/rpc/samr.c if (!test_lsa_Close(lp, tctx, lsa_handle)) {
tctx 3804 source4/torture/rpc/samr.c torture_warning(tctx, "privileged user delete test failed\n");
tctx 3816 source4/torture/rpc/samr.c static bool test_alias_ops(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 3822 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 3823 source4/torture/rpc/samr.c if (!test_QuerySecurity(p, tctx, alias_handle)) {
tctx 3828 source4/torture/rpc/samr.c if (!test_QueryAliasInfo(p, tctx, alias_handle)) {
tctx 3832 source4/torture/rpc/samr.c if (!test_SetAliasInfo(p, tctx, alias_handle)) {
tctx 3836 source4/torture/rpc/samr.c if (!test_AddMemberToAlias(p, tctx, alias_handle, domain_sid)) {
tctx 3840 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba4", false)) {
tctx 3845 source4/torture/rpc/samr.c if (!test_AddMultipleMembersToAlias(p, tctx, alias_handle)) {
tctx 3853 source4/torture/rpc/samr.c static bool test_DeleteUser(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 3858 source4/torture/rpc/samr.c torture_comment(tctx, "Testing DeleteUser\n");
tctx 3863 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteUser(p, tctx, &d);
tctx 3864 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "DeleteUser");
tctx 3870 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 3878 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, handle, name, &rid);
tctx 3883 source4/torture/rpc/samr.c status = test_OpenUser_byname(p, tctx, handle, name, &user_handle);
tctx 3890 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteUser(p, tctx, &d);
tctx 3904 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 3913 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, handle, name, &rid);
tctx 3922 source4/torture/rpc/samr.c status = dcerpc_samr_OpenGroup(p, tctx, &r);
tctx 3929 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteDomainGroup(p, tctx, &d);
tctx 3943 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 3955 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, domain_handle, name, &rid);
tctx 3964 source4/torture/rpc/samr.c status = dcerpc_samr_OpenAlias(p, tctx, &r);
tctx 3971 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteDomAlias(p, tctx, &d);
tctx 3984 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 3995 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteDomAlias(p, tctx, &d);
tctx 4004 source4/torture/rpc/samr.c static bool test_CreateAlias(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 4026 source4/torture/rpc/samr.c status = dcerpc_samr_CreateDomAlias(p, tctx, &r);
tctx 4028 source4/torture/rpc/samr.c if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) {
tctx 4040 source4/torture/rpc/samr.c if (!test_DeleteAlias_byname(p, tctx, domain_handle, r.in.alias_name->string)) {
tctx 4043 source4/torture/rpc/samr.c status = dcerpc_samr_CreateDomAlias(p, tctx, &r);
tctx 4055 source4/torture/rpc/samr.c if (!test_alias_ops(p, tctx, alias_handle, domain_sid)) {
tctx 4063 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 4073 source4/torture/rpc/samr.c if (!test_ChangePasswordUser(p, tctx, acct_name, domain_handle, password)) {
tctx 4077 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, acct_name, password, 0, true)) {
tctx 4081 source4/torture/rpc/samr.c if (!test_OemChangePasswordUser2(p, tctx, acct_name, domain_handle, password)) {
tctx 4086 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, *password, 0, true)) {
tctx 4092 source4/torture/rpc/samr.c char *v = generate_random_str(tctx, 1);
tctx 4098 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, simple_pass, 0, true)) {
tctx 4120 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo(p, tctx, &r);
tctx 4140 source4/torture/rpc/samr.c status = dcerpc_samr_SetDomainInfo(p, tctx, &s);
tctx 4147 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, len - 1, password, NULL, 0, true)) {
tctx 4156 source4/torture/rpc/samr.c status = dcerpc_samr_SetDomainInfo(p, tctx, &s);
tctx 4174 source4/torture/rpc/samr.c n.in.names = talloc_array(tctx, struct lsa_String, 1);
tctx 4179 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx 4190 source4/torture/rpc/samr.c status = dcerpc_samr_OpenUser(p, tctx, &r);
tctx 4200 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &q);
tctx 4208 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL,
tctx 4216 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) {
tctx 4220 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) {
tctx 4227 source4/torture/rpc/samr.c static bool test_CreateUser(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 4252 source4/torture/rpc/samr.c user_ctx = talloc_named(tctx, 0, "test_CreateUser2 per-user context");
tctx 4265 source4/torture/rpc/samr.c if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) {
tctx 4316 source4/torture/rpc/samr.c if (!test_user_ops(p, tctx, &user_handle, domain_handle,
tctx 4345 source4/torture/rpc/samr.c static bool test_CreateUser2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 4388 source4/torture/rpc/samr.c user_ctx = talloc_named(tctx, 0, "test_CreateUser2 per-user context");
tctx 4403 source4/torture/rpc/samr.c if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) {
tctx 4476 source4/torture/rpc/samr.c if (!test_user_ops(p, tctx, &user_handle, domain_handle,
tctx 4502 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 4519 source4/torture/rpc/samr.c status = dcerpc_samr_QueryAliasInfo(p, tctx, &r);
tctx 4531 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 4548 source4/torture/rpc/samr.c status = dcerpc_samr_QueryGroupInfo(p, tctx, &r);
tctx 4560 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 4573 source4/torture/rpc/samr.c status = dcerpc_samr_QueryGroupMember(p, tctx, &r);
tctx 4584 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 4603 source4/torture/rpc/samr.c status = dcerpc_samr_QueryGroupInfo(p, tctx, &r);
tctx 4630 source4/torture/rpc/samr.c status = dcerpc_samr_SetGroupInfo(p, tctx, &s);
tctx 4652 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 4670 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &r);
tctx 4682 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 4700 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo2(p, tctx, &r);
tctx 4712 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 4727 source4/torture/rpc/samr.c status = dcerpc_samr_OpenUser(p, tctx, &r);
tctx 4733 source4/torture/rpc/samr.c if (!test_QuerySecurity(p, tctx, &user_handle)) {
tctx 4737 source4/torture/rpc/samr.c if (!test_QueryUserInfo(p, tctx, &user_handle)) {
tctx 4741 source4/torture/rpc/samr.c if (!test_QueryUserInfo2(p, tctx, &user_handle)) {
tctx 4745 source4/torture/rpc/samr.c if (!test_GetUserPwInfo(p, tctx, &user_handle)) {
tctx 4749 source4/torture/rpc/samr.c if (!test_GetGroupsForUser(p,tctx, &user_handle)) {
tctx 4753 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &user_handle)) {
tctx 4761 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 4776 source4/torture/rpc/samr.c status = dcerpc_samr_OpenGroup(p, tctx, &r);
tctx 4782 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 4783 source4/torture/rpc/samr.c if (!test_QuerySecurity(p, tctx, &group_handle)) {
tctx 4788 source4/torture/rpc/samr.c if (!test_QueryGroupInfo(p, tctx, &group_handle)) {
tctx 4792 source4/torture/rpc/samr.c if (!test_QueryGroupMember(p, tctx, &group_handle)) {
tctx 4796 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &group_handle)) {
tctx 4803 source4/torture/rpc/samr.c static bool test_OpenAlias(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 4811 source4/torture/rpc/samr.c torture_comment(tctx, "Testing OpenAlias(%u)\n", rid);
tctx 4818 source4/torture/rpc/samr.c status = dcerpc_samr_OpenAlias(p, tctx, &r);
tctx 4824 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 4825 source4/torture/rpc/samr.c if (!test_QuerySecurity(p, tctx, &alias_handle)) {
tctx 4830 source4/torture/rpc/samr.c if (!test_QueryAliasInfo(p, tctx, &alias_handle)) {
tctx 4834 source4/torture/rpc/samr.c if (!test_GetMembersInAlias(p, tctx, &alias_handle)) {
tctx 4838 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &alias_handle)) {
tctx 4845 source4/torture/rpc/samr.c static bool check_mask(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 4856 source4/torture/rpc/samr.c torture_comment(tctx, "Testing OpenUser(%u)\n", rid);
tctx 4863 source4/torture/rpc/samr.c status = dcerpc_samr_OpenUser(p, tctx, &r);
tctx 4873 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &q);
tctx 4886 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &user_handle)) {
tctx 4894 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 4925 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainUsers(p, tctx, &r);
tctx 4932 source4/torture/rpc/samr.c torture_assert(tctx, sam, "EnumDomainUsers failed: r.out.sam unexpectedly NULL");
tctx 4940 source4/torture/rpc/samr.c if (!check_mask(p, tctx, handle, sam->entries[i].idx, mask)) {
tctx 4943 source4/torture/rpc/samr.c } else if (!test_OpenUser(p, tctx, handle, sam->entries[i].idx)) {
tctx 4952 source4/torture/rpc/samr.c n.in.names = talloc_array(tctx, struct lsa_String, sam->count);
tctx 4958 source4/torture/rpc/samr.c status = dcerpc_samr_LookupNames(p, tctx, &n);
tctx 4968 source4/torture/rpc/samr.c lr.in.rids = talloc_array(tctx, uint32_t, sam->count);
tctx 4974 source4/torture/rpc/samr.c status = dcerpc_samr_LookupRids(p, tctx, &lr);
tctx 4975 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "LookupRids");
tctx 4983 source4/torture/rpc/samr.c static bool test_EnumDomainUsers_async(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 4993 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "dangerous", false)) {
tctx 4994 source4/torture/rpc/samr.c torture_skip(tctx, "samr async test disabled - enable dangerous tests to use\n");
tctx 4997 source4/torture/rpc/samr.c torture_comment(tctx, "Testing EnumDomainUsers_async\n");
tctx 5006 source4/torture/rpc/samr.c req[i] = dcerpc_samr_EnumDomainUsers_send(p, tctx, &r);
tctx 5018 source4/torture/rpc/samr.c torture_comment(tctx, "%d async requests OK\n", i);
tctx 5024 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 5044 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainGroups(p, tctx, &r);
tctx 5055 source4/torture/rpc/samr.c if (!test_OpenGroup(p, tctx, handle, sam->entries[i].idx)) {
tctx 5064 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 5084 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainAliases(p, tctx, &r);
tctx 5095 source4/torture/rpc/samr.c if (!test_OpenAlias(p, tctx, handle, sam->entries[i].idx)) {
tctx 5104 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 5126 source4/torture/rpc/samr.c status = dcerpc_samr_GetDisplayEnumerationIndex(p, tctx, &r);
tctx 5138 source4/torture/rpc/samr.c status = dcerpc_samr_GetDisplayEnumerationIndex(p, tctx, &r);
tctx 5151 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 5173 source4/torture/rpc/samr.c status = dcerpc_samr_GetDisplayEnumerationIndex2(p, tctx, &r);
tctx 5184 source4/torture/rpc/samr.c status = dcerpc_samr_GetDisplayEnumerationIndex2(p, tctx, &r);
tctx 5211 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 5250 source4/torture/rpc/samr.c status = dcerpc_samr_OpenUser(p, tctx, &r);
tctx 5260 source4/torture/rpc/samr.c status = dcerpc_samr_QueryUserInfo(p, tctx, &q);
tctx 5309 source4/torture/rpc/samr.c if (!test_samr_handle_Close(p, tctx, &user_handle)) {
tctx 5317 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 5347 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDisplayInfo(p, tctx, &r);
tctx 5355 source4/torture/rpc/samr.c if (!test_each_DisplayInfo_user(p, tctx, &r, &seen_testuser)) {
tctx 5361 source4/torture/rpc/samr.c if (!test_each_DisplayInfo_user(p, tctx, &r, NULL)) {
tctx 5382 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo(p, tctx, &dom_info);
tctx 5400 source4/torture/rpc/samr.c if (NT_STATUS_IS_OK(test_OpenUser_byname(p, tctx, handle, TEST_ACCOUNT_NAME, &user_handle))) {
tctx 5404 source4/torture/rpc/samr.c test_samr_handle_Close(p, tctx, &user_handle);
tctx 5426 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 5450 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDisplayInfo2(p, tctx, &r);
tctx 5461 source4/torture/rpc/samr.c static bool test_QueryDisplayInfo3(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 5474 source4/torture/rpc/samr.c torture_comment(tctx, "Testing QueryDisplayInfo3 level %u\n", levels[i]);
tctx 5485 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDisplayInfo3(p, tctx, &r);
tctx 5498 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 5520 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDisplayInfo(p, tctx, &r);
tctx 5544 source4/torture/rpc/samr.c static bool test_QueryDomainInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 5555 source4/torture/rpc/samr.c const char *domain_comment = talloc_asprintf(tctx,
tctx 5557 source4/torture/rpc/samr.c timestring(tctx, time(NULL)));
tctx 5561 source4/torture/rpc/samr.c s.in.info = talloc(tctx, union samr_DomainInfo);
tctx 5564 source4/torture/rpc/samr.c status = dcerpc_samr_SetDomainInfo(p, tctx, &s);
tctx 5572 source4/torture/rpc/samr.c torture_comment(tctx, "Testing QueryDomainInfo level %u\n", levels[i]);
tctx 5578 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo(p, tctx, &r);
tctx 5627 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SetDomainInfo level %u\n", levels[i]);
tctx 5633 source4/torture/rpc/samr.c status = dcerpc_samr_SetDomainInfo(p, tctx, &s);
tctx 5650 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo(p, tctx, &r);
tctx 5663 source4/torture/rpc/samr.c static bool test_QueryDomainInfo2(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 5680 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo2(p, tctx, &r);
tctx 5694 source4/torture/rpc/samr.c static bool test_GroupList(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 5712 source4/torture/rpc/samr.c torture_comment(tctx, "Testing coherency of querydispinfo vs enumdomgroups\n");
tctx 5723 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainGroups(p, tctx, &q1);
tctx 5730 source4/torture/rpc/samr.c add_string_to_array(tctx,
tctx 5736 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "EnumDomainGroups");
tctx 5738 source4/torture/rpc/samr.c torture_assert(tctx, sam, "EnumDomainGroups failed to return sam");
tctx 5751 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDisplayInfo(p, tctx, &q2);
tctx 5797 source4/torture/rpc/samr.c static bool test_DeleteDomainGroup(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 5803 source4/torture/rpc/samr.c torture_comment(tctx, "Testing DeleteDomainGroup\n");
tctx 5808 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteDomainGroup(p, tctx, &d);
tctx 5809 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "DeleteDomainGroup");
tctx 5814 source4/torture/rpc/samr.c static bool test_TestPrivateFunctionsDomain(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 5821 source4/torture/rpc/samr.c torture_comment(tctx, "Testing TestPrivateFunctionsDomain\n");
tctx 5825 source4/torture/rpc/samr.c status = dcerpc_samr_TestPrivateFunctionsDomain(p, tctx, &r);
tctx 5826 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_IMPLEMENTED, "TestPrivateFunctionsDomain");
tctx 5831 source4/torture/rpc/samr.c static bool test_RidToSid(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 5843 source4/torture/rpc/samr.c torture_comment(tctx, "Testing RidToSid\n");
tctx 5845 source4/torture/rpc/samr.c calc_sid = dom_sid_dup(tctx, domain_sid);
tctx 5850 source4/torture/rpc/samr.c status = dcerpc_samr_RidToSid(p, tctx, &r);
tctx 5859 source4/torture/rpc/samr.c dom_sid_string(tctx, out_sid),
tctx 5860 source4/torture/rpc/samr.c dom_sid_string(tctx, calc_sid));
tctx 5869 source4/torture/rpc/samr.c static bool test_GetBootKeyInformation(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 5877 source4/torture/rpc/samr.c torture_comment(tctx, "Testing GetBootKeyInformation\n");
tctx 5882 source4/torture/rpc/samr.c status = dcerpc_samr_GetBootKeyInformation(p, tctx, &r);
tctx 5885 source4/torture/rpc/samr.c torture_comment(tctx, "GetBootKeyInformation (ignored) - %s\n", nt_errstr(status));
tctx 5891 source4/torture/rpc/samr.c static bool test_AddGroupMember(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 5903 source4/torture/rpc/samr.c status = test_LookupName(p, tctx, domain_handle, TEST_ACCOUNT_NAME, &rid);
tctx 5904 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "test_AddGroupMember looking up name " TEST_ACCOUNT_NAME);
tctx 5910 source4/torture/rpc/samr.c torture_comment(tctx, "Testing AddGroupMember and DeleteGroupMember\n");
tctx 5915 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteGroupMember(p, tctx, &d);
tctx 5916 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_MEMBER_NOT_IN_GROUP, status, "DeleteGroupMember");
tctx 5918 source4/torture/rpc/samr.c status = dcerpc_samr_AddGroupMember(p, tctx, &r);
tctx 5919 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "AddGroupMember");
tctx 5921 source4/torture/rpc/samr.c status = dcerpc_samr_AddGroupMember(p, tctx, &r);
tctx 5922 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_MEMBER_IN_GROUP, status, "AddGroupMember");
tctx 5924 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba4", false) ||
tctx 5925 source4/torture/rpc/samr.c torture_setting_bool(tctx, "samba3", false)) {
tctx 5926 source4/torture/rpc/samr.c torture_comment(tctx, "skipping SetMemberAttributesOfGroup test against Samba4\n");
tctx 5935 source4/torture/rpc/samr.c status = dcerpc_samr_SetMemberAttributesOfGroup(p, tctx, &s);
tctx 5936 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "SetMemberAttributesOfGroup");
tctx 5942 source4/torture/rpc/samr.c status = dcerpc_samr_QueryGroupMember(p, tctx, &q);
tctx 5943 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "QueryGroupMember");
tctx 5945 source4/torture/rpc/samr.c status = dcerpc_samr_DeleteGroupMember(p, tctx, &d);
tctx 5946 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "DeleteGroupMember");
tctx 5948 source4/torture/rpc/samr.c status = dcerpc_samr_AddGroupMember(p, tctx, &r);
tctx 5949 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "AddGroupMember");
tctx 5956 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 5979 source4/torture/rpc/samr.c status = dcerpc_samr_CreateDomainGroup(p, tctx, &r);
tctx 5981 source4/torture/rpc/samr.c if (dom_sid_equal(domain_sid, dom_sid_parse_talloc(tctx, SID_BUILTIN))) {
tctx 5983 source4/torture/rpc/samr.c torture_comment(tctx, "Server correctly refused create of '%s'\n", r.in.name->string);
tctx 5993 source4/torture/rpc/samr.c if (!test_DeleteGroup_byname(p, tctx, domain_handle, r.in.name->string)) {
tctx 5998 source4/torture/rpc/samr.c status = dcerpc_samr_CreateDomainGroup(p, tctx, &r);
tctx 6001 source4/torture/rpc/samr.c if (!test_DeleteUser_byname(p, tctx, domain_handle, r.in.name->string)) {
tctx 6007 source4/torture/rpc/samr.c status = dcerpc_samr_CreateDomainGroup(p, tctx, &r);
tctx 6009 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "CreateDomainGroup");
tctx 6015 source4/torture/rpc/samr.c if (!test_AddGroupMember(p, tctx, domain_handle, group_handle)) {
tctx 6020 source4/torture/rpc/samr.c if (!test_SetGroupInfo(p, tctx, group_handle)) {
tctx 6032 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 6039 source4/torture/rpc/samr.c r.in.sid = dom_sid_parse_talloc(tctx, "S-1-5-32-12-34-56-78");
tctx 6041 source4/torture/rpc/samr.c status = dcerpc_samr_RemoveMemberFromForeignDomain(p, tctx, &r);
tctx 6042 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "RemoveMemberFromForeignDomain");
tctx 6048 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 6071 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainUsers(p, tctx, &r);
tctx 6073 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 6088 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 6110 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainGroups(p, tctx, &r);
tctx 6112 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 6127 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 6149 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomainAliases(p, tctx, &r);
tctx 6151 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 6166 source4/torture/rpc/samr.c struct torture_context *tctx,
tctx 6189 source4/torture/rpc/samr.c status = dcerpc_samr_QueryDomainInfo2(p, tctx, &r);
tctx 6190 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status,
tctx 6219 source4/torture/rpc/samr.c name = talloc_asprintf(tctx, "%s%04d", TEST_ACCOUNT_NAME, i);
tctx 6220 source4/torture/rpc/samr.c ret &= test_CreateUser(p, tctx, domain_handle, name, &handle, domain_sid, 0, NULL, false);
tctx 6223 source4/torture/rpc/samr.c name = talloc_asprintf(tctx, "%s%04d", TEST_GROUPNAME, i);
tctx 6224 source4/torture/rpc/samr.c ret &= test_CreateDomainGroup(p, tctx, domain_handle, name, &handle, domain_sid, false);
tctx 6227 source4/torture/rpc/samr.c name = talloc_asprintf(tctx, "%s%04d", TEST_ALIASNAME, i);
tctx 6228 source4/torture/rpc/samr.c ret &= test_CreateAlias(p, tctx, domain_handle, name, &handle, domain_sid, false);
tctx 6234 source4/torture/rpc/samr.c ret &= test_samr_handle_Close(p, tctx, &handle);
tctx 6243 source4/torture/rpc/samr.c ret &= test_EnumDomainUsers(p, tctx, domain_handle, &num_enum);
tctx 6246 source4/torture/rpc/samr.c ret &= test_EnumDomainGroups(p, tctx, domain_handle, &num_enum);
tctx 6249 source4/torture/rpc/samr.c ret &= test_EnumDomainAliases(p, tctx, domain_handle, &num_enum);
tctx 6255 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, num_enum, num_anounced + num_created,
tctx 6271 source4/torture/rpc/samr.c torture_assert_int_equal(tctx, num_disp, num_anounced + num_created,
tctx 6277 source4/torture/rpc/samr.c static bool test_Connect(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 6280 source4/torture/rpc/samr.c static bool test_OpenDomain(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 6298 source4/torture/rpc/samr.c torture_comment(tctx, "Testing OpenDomain of %s\n", dom_sid_string(tctx, sid));
tctx 6305 source4/torture/rpc/samr.c status = dcerpc_samr_OpenDomain(p, tctx, &r);
tctx 6306 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "OpenDomain");
tctx 6310 source4/torture/rpc/samr.c ret &= test_samr_handle_Close(p, tctx, handle);
tctx 6316 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 6317 source4/torture/rpc/samr.c ret &= test_CreateUser2(p, tctx, &domain_handle, sid, which_ops, NULL);
tctx 6319 source4/torture/rpc/samr.c ret &= test_CreateUser(p, tctx, &domain_handle, TEST_ACCOUNT_NAME, &user_handle, sid, which_ops, NULL, true);
tctx 6321 source4/torture/rpc/samr.c ret &= test_QueryDisplayInfo(p, tctx, &domain_handle);
tctx 6323 source4/torture/rpc/samr.c printf("Testing PASSWORDS or ATTRIBUTES on domain %s failed!\n", dom_sid_string(tctx, sid));
tctx 6327 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 6328 source4/torture/rpc/samr.c ret &= test_CreateUser2(p, tctx, &domain_handle, sid, which_ops, machine_credentials);
tctx 6330 source4/torture/rpc/samr.c ret &= test_CreateUser(p, tctx, &domain_handle, TEST_ACCOUNT_NAME, &user_handle, sid, which_ops, machine_credentials, true);
tctx 6332 source4/torture/rpc/samr.c printf("Testing PASSWORDS PWDLASTSET on domain %s failed!\n", dom_sid_string(tctx, sid));
tctx 6338 source4/torture/rpc/samr.c ret &= test_ManyObjects(p, tctx, &domain_handle, sid, which_ops);
tctx 6341 source4/torture/rpc/samr.c ret &= test_CreateUser(p, tctx, &domain_handle, TEST_ACCOUNT_NAME, &user_handle, sid, which_ops, NULL, true);
tctx 6343 source4/torture/rpc/samr.c printf("Failed to CreateUser in SAMR-OTHER on domain %s!\n", dom_sid_string(tctx, sid));
tctx 6345 source4/torture/rpc/samr.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 6346 source4/torture/rpc/samr.c ret &= test_QuerySecurity(p, tctx, &domain_handle);
tctx 6348 source4/torture/rpc/samr.c ret &= test_RemoveMemberFromForeignDomain(p, tctx, &domain_handle);
tctx 6349 source4/torture/rpc/samr.c ret &= test_CreateAlias(p, tctx, &domain_handle, TEST_ALIASNAME, &alias_handle, sid, true);
tctx 6350 source4/torture/rpc/samr.c ret &= test_CreateDomainGroup(p, tctx, &domain_handle, TEST_GROUPNAME, &group_handle, sid, true);
tctx 6351 source4/torture/rpc/samr.c ret &= test_QueryDomainInfo(p, tctx, &domain_handle);
tctx 6352 source4/torture/rpc/samr.c ret &= test_QueryDomainInfo2(p, tctx, &domain_handle);
tctx 6353 source4/torture/rpc/samr.c ret &= test_EnumDomainUsers_all(p, tctx, &domain_handle);
tctx 6354 source4/torture/rpc/samr.c ret &= test_EnumDomainUsers_async(p, tctx, &domain_handle);
tctx 6355 source4/torture/rpc/samr.c ret &= test_EnumDomainGroups_all(p, tctx, &domain_handle);
tctx 6356 source4/torture/rpc/samr.c ret &= test_EnumDomainAliases_all(p, tctx, &domain_handle);
tctx 6357 source4/torture/rpc/samr.c ret &= test_QueryDisplayInfo2(p, tctx, &domain_handle);
tctx 6358 source4/torture/rpc/samr.c ret &= test_QueryDisplayInfo3(p, tctx, &domain_handle);
tctx 6359 source4/torture/rpc/samr.c ret &= test_QueryDisplayInfo_continue(p, tctx, &domain_handle);
tctx 6361 source4/torture/rpc/samr.c if (torture_setting_bool(tctx, "samba4", false)) {
tctx 6362 source4/torture/rpc/samr.c torture_comment(tctx, "skipping GetDisplayEnumerationIndex test against Samba4\n");
tctx 6364 source4/torture/rpc/samr.c ret &= test_GetDisplayEnumerationIndex(p, tctx, &domain_handle);
tctx 6365 source4/torture/rpc/samr.c ret &= test_GetDisplayEnumerationIndex2(p, tctx, &domain_handle);
tctx 6367 source4/torture/rpc/samr.c ret &= test_GroupList(p, tctx, &domain_handle);
tctx 6368 source4/torture/rpc/samr.c ret &= test_TestPrivateFunctionsDomain(p, tctx, &domain_handle);
tctx 6369 source4/torture/rpc/samr.c ret &= test_RidToSid(p, tctx, sid, &domain_handle);
tctx 6370 source4/torture/rpc/samr.c ret &= test_GetBootKeyInformation(p, tctx, &domain_handle);
tctx 6372 source4/torture/rpc/samr.c torture_comment(tctx, "Testing SAMR-OTHER on domain %s failed!\n", dom_sid_string(tctx, sid));
tctx 6378 source4/torture/rpc/samr.c !test_DeleteUser(p, tctx, &user_handle)) {
tctx 6383 source4/torture/rpc/samr.c !test_DeleteAlias(p, tctx, &alias_handle)) {
tctx 6388 source4/torture/rpc/samr.c !test_DeleteDomainGroup(p, tctx, &group_handle)) {
tctx 6392 source4/torture/rpc/samr.c ret &= test_samr_handle_Close(p, tctx, &domain_handle);
tctx 6395 source4/torture/rpc/samr.c ret &= test_Connect(p, tctx, handle);
tctx 6398 source4/torture/rpc/samr.c printf("Testing domain %s failed!\n", dom_sid_string(tctx, sid));
tctx 6404 source4/torture/rpc/samr.c static bool test_LookupDomain(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 6416 source4/torture/rpc/samr.c torture_comment(tctx, "Testing LookupDomain(%s)\n", domain);
tctx 6424 source4/torture/rpc/samr.c status = dcerpc_samr_LookupDomain(p, tctx, &r);
tctx 6425 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER, status, "LookupDomain expected NT_STATUS_INVALID_PARAMETER");
tctx 6429 source4/torture/rpc/samr.c status = dcerpc_samr_LookupDomain(p, tctx, &r);
tctx 6430 source4/torture/rpc/samr.c torture_assert_ntstatus_equal(tctx, NT_STATUS_NO_SUCH_DOMAIN, status, "LookupDomain expected NT_STATUS_NO_SUCH_DOMAIN");
tctx 6437 source4/torture/rpc/samr.c status = dcerpc_samr_LookupDomain(p, tctx, &r);
tctx 6438 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "LookupDomain");
tctx 6440 source4/torture/rpc/samr.c if (!test_GetDomPwInfo(p, tctx, &n1)) {
tctx 6444 source4/torture/rpc/samr.c if (!test_OpenDomain(p, tctx, handle, *r.out.sid, which_ops,
tctx 6453 source4/torture/rpc/samr.c static bool test_EnumDomains(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 6472 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomains(p, tctx, &r);
tctx 6473 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "EnumDomains");
tctx 6480 source4/torture/rpc/samr.c if (!test_LookupDomain(p, tctx, handle,
tctx 6487 source4/torture/rpc/samr.c status = dcerpc_samr_EnumDomains(p, tctx, &r);
tctx 6488 source4/torture/rpc/samr.c torture_assert_ntstatus_ok(tctx, status, "EnumDomains");
tctx 6494 source4/torture/rpc/samr.c static bool test_Connect(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 6508 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Connect\n");
tctx 6514 source4/torture/rpc/samr.c status = dcerpc_samr_Connect(p, tctx, &r);
tctx 6516 source4/torture/rpc/samr.c torture_comment(tctx, "Connect failed - %s\n", nt_errstr(status));
tctx 6523 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Connect2\n");
tctx 6529 source4/torture/rpc/samr.c status = dcerpc_samr_Connect2(p, tctx, &r2);
tctx 6531 source4/torture/rpc/samr.c torture_comment(tctx, "Connect2 failed - %s\n", nt_errstr(status));
tctx 6535 source4/torture/rpc/samr.c test_samr_handle_Close(p, tctx, handle);
tctx 6541 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Connect3\n");
tctx 6548 source4/torture/rpc/samr.c status = dcerpc_samr_Connect3(p, tctx, &r3);
tctx 6554 source4/torture/rpc/samr.c test_samr_handle_Close(p, tctx, handle);
tctx 6560 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Connect4\n");
tctx 6567 source4/torture/rpc/samr.c status = dcerpc_samr_Connect4(p, tctx, &r4);
tctx 6573 source4/torture/rpc/samr.c test_samr_handle_Close(p, tctx, handle);
tctx 6579 source4/torture/rpc/samr.c torture_comment(tctx, "testing samr_Connect5\n");
tctx 6592 source4/torture/rpc/samr.c status = dcerpc_samr_Connect5(p, tctx, &r5);
tctx 6598 source4/torture/rpc/samr.c test_samr_handle_Close(p, tctx, handle);
tctx 34 source4/torture/rpc/samr_accessmask.c static NTSTATUS torture_samr_Close(struct torture_context *tctx,
tctx 43 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_Close(p, tctx, &cl);
tctx 48 source4/torture/rpc/samr_accessmask.c static NTSTATUS torture_samr_Connect5(struct torture_context *tctx,
tctx 67 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_Connect5(p, tctx, &r5);
tctx 73 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_Connect5(struct torture_context *tctx,
tctx 85 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &h);
tctx 121 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &h);
tctx 143 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_EnumDomains(struct torture_context *tctx,
tctx 159 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch);
tctx 180 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_EnumDomains(p, tctx, &ed);
tctx 186 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch);
tctx 207 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_EnumDomains(p, tctx, &ed);
tctx 213 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch);
tctx 234 source4/torture/rpc/samr_accessmask.c static bool test_samr_connect_user_acl(struct torture_context *tctx,
tctx 251 source4/torture/rpc/samr_accessmask.c const char *binding = torture_setting_string(tctx, "binding", NULL);
tctx 256 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, SEC_FLAG_MAXIMUM_ALLOWED, &ch);
tctx 267 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_QuerySecurity(p, tctx, &qs);
tctx 294 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_SetSecurity(p, tctx, &ss);
tctx 302 source4/torture/rpc/samr_accessmask.c status = dcerpc_pipe_connect(tctx,
tctx 304 source4/torture/rpc/samr_accessmask.c test_credentials, tctx->ev, tctx->lp_ctx);
tctx 311 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, test_p, SEC_FLAG_MAXIMUM_ALLOWED, &uch);
tctx 323 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_QuerySecurity(p, tctx, &qs);
tctx 334 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch);
tctx 354 source4/torture/rpc/samr_accessmask.c static bool test_samr_connect_user_acl_enforced(struct torture_context *tctx,
tctx 364 source4/torture/rpc/samr_accessmask.c const char *binding = torture_setting_string(tctx, "binding", NULL);
tctx 369 source4/torture/rpc/samr_accessmask.c status = dcerpc_pipe_connect(tctx,
tctx 371 source4/torture/rpc/samr_accessmask.c test_credentials, tctx->ev, tctx->lp_ctx);
tctx 378 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, test_p, SAMR_ACCESS_SHUTDOWN_SERVER, &uch);
tctx 400 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_LookupDomain(struct torture_context *tctx,
tctx 415 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch);
tctx 432 source4/torture/rpc/samr_accessmask.c dn.string = lp_workgroup(tctx->lp_ctx);
tctx 434 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_LookupDomain(p, tctx, &ld);
tctx 440 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch);
tctx 457 source4/torture/rpc/samr_accessmask.c dn.string = lp_workgroup(tctx->lp_ctx);
tctx 459 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_LookupDomain(p, tctx, &ld);
tctx 465 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch);
tctx 487 source4/torture/rpc/samr_accessmask.c static bool test_samr_accessmask_OpenDomain(struct torture_context *tctx,
tctx 502 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, SEC_FLAG_MAXIMUM_ALLOWED, &ch);
tctx 511 source4/torture/rpc/samr_accessmask.c dn.string = lp_workgroup(tctx->lp_ctx);
tctx 512 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_LookupDomain(p, tctx, &ld);
tctx 524 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch);
tctx 543 source4/torture/rpc/samr_accessmask.c status = dcerpc_samr_OpenDomain(p, tctx, &od);
tctx 549 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &dh);
tctx 555 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch);
tctx 569 source4/torture/rpc/samr_accessmask.c status = torture_samr_Close(tctx, p, &ch);
tctx 582 source4/torture/rpc/samr_accessmask.c static bool test_samr_connect(struct torture_context *tctx,
tctx 591 source4/torture/rpc/samr_accessmask.c if (torture_setting_bool(tctx, "samba3", false)) {
tctx 592 source4/torture/rpc/samr_accessmask.c torture_skip(tctx, "Skipping test against Samba 3");
tctx 596 source4/torture/rpc/samr_accessmask.c testuser = torture_create_testuser(tctx, TEST_USER_NAME, lp_workgroup(tctx->lp_ctx),
tctx 602 source4/torture/rpc/samr_accessmask.c test_credentials = cli_credentials_init(tctx);
tctx 604 source4/torture/rpc/samr_accessmask.c cli_credentials_set_domain(test_credentials, lp_workgroup(tctx->lp_ctx),
tctx 614 source4/torture/rpc/samr_accessmask.c if (!test_samr_connect_user_acl(tctx, p, test_credentials, test_sid)) {
tctx 628 source4/torture/rpc/samr_accessmask.c if (!test_samr_connect_user_acl_enforced(tctx, p, test_credentials, test_sid)) {
tctx 633 source4/torture/rpc/samr_accessmask.c torture_leave_domain(tctx, testuser);
tctx 427 source4/torture/rpc/samsync.c static bool samsync_handle_user(struct torture_context *tctx, TALLOC_CTX *mem_ctx, struct samsync_state *samsync_state,
tctx 582 source4/torture/rpc/samsync.c ndr_err = ndr_pull_struct_blob(&data, mem_ctx, lp_iconv_convenience(tctx->lp_ctx), &keys, (ndr_pull_flags_fn_t)ndr_pull_netr_USER_KEYS);
tctx 1147 source4/torture/rpc/samsync.c static bool test_DatabaseSync(struct torture_context *tctx,
tctx 1221 source4/torture/rpc/samsync.c if (!samsync_handle_user(tctx, delta_ctx, samsync_state,
tctx 33 source4/torture/rpc/scanner.c static bool test_num_calls(struct torture_context *tctx,
tctx 50 source4/torture/rpc/scanner.c status = torture_rpc_connection(tctx, &p, iface);
tctx 44 source4/torture/rpc/schannel.c bool test_netlogon_ex_ops(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 58 source4/torture/rpc/schannel.c if (lp_client_lanman_auth(tctx->lp_ctx)) {
tctx 62 source4/torture/rpc/schannel.c if (lp_client_ntlmv2_auth(tctx->lp_ctx)) {
tctx 66 source4/torture/rpc/schannel.c cli_credentials_get_ntlm_username_domain(cmdline_credentials, tctx,
tctx 75 source4/torture/rpc/schannel.c names_blob = NTLMv2_generate_names_blob(tctx, cli_credentials_get_workstation(credentials),
tctx 78 source4/torture/rpc/schannel.c status = cli_credentials_get_ntlm_response(cmdline_credentials, tctx,
tctx 84 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status,
tctx 100 source4/torture/rpc/schannel.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 109 source4/torture/rpc/schannel.c torture_comment(tctx,
tctx 116 source4/torture/rpc/schannel.c status = dcerpc_netr_LogonSamLogonEx(p, tctx, &r);
tctx 117 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "LogonSamLogon failed");
tctx 126 source4/torture/rpc/schannel.c static bool test_samr_ops(struct torture_context *tctx,
tctx 139 source4/torture/rpc/schannel.c name.string = lp_workgroup(tctx->lp_ctx);
tctx 149 source4/torture/rpc/schannel.c status = dcerpc_samr_Connect(p, tctx, &connect_r);
tctx 161 source4/torture/rpc/schannel.c opendom.in.sid = dom_sid_parse_talloc(tctx, "S-1-5-32");
tctx 164 source4/torture/rpc/schannel.c status = dcerpc_samr_OpenDomain(p, tctx, &opendom);
tctx 175 source4/torture/rpc/schannel.c status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
tctx 191 source4/torture/rpc/schannel.c static bool test_lsa_ops(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 207 source4/torture/rpc/schannel.c status = dcerpc_lsa_GetUserName(p, tctx, &r);
tctx 225 source4/torture/rpc/schannel.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 237 source4/torture/rpc/schannel.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 242 source4/torture/rpc/schannel.c if (!test_many_LookupSids(p, tctx, NULL)) {
tctx 254 source4/torture/rpc/schannel.c static bool test_schannel(struct torture_context *tctx,
tctx 260 source4/torture/rpc/schannel.c const char *binding = torture_setting_string(tctx, "binding", NULL);
tctx 271 source4/torture/rpc/schannel.c join_ctx = torture_join_domain(tctx,
tctx 272 source4/torture/rpc/schannel.c talloc_asprintf(tctx, "%s%d", TEST_MACHINE_NAME, i),
tctx 274 source4/torture/rpc/schannel.c torture_assert(tctx, join_ctx != NULL, "Failed to join domain");
tctx 276 source4/torture/rpc/schannel.c status = dcerpc_parse_binding(tctx, binding, &b);
tctx 277 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "Bad binding string");
tctx 282 source4/torture/rpc/schannel.c status = dcerpc_pipe_connect_b(tctx, &p, b, &ndr_table_samr,
tctx 283 source4/torture/rpc/schannel.c credentials, tctx->ev, tctx->lp_ctx);
tctx 284 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status,
tctx 287 source4/torture/rpc/schannel.c torture_assert(tctx, test_samr_ops(tctx, p),
tctx 295 source4/torture/rpc/schannel.c status = dcerpc_epm_map_binding(tctx, b, &ndr_table_netlogon, tctx->ev, tctx->lp_ctx);
tctx 296 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "epm map");
tctx 300 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "seconday connection");
tctx 303 source4/torture/rpc/schannel.c credentials, lp_gensec_settings(tctx, tctx->lp_ctx),
tctx 308 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "bind auth");
tctx 310 source4/torture/rpc/schannel.c status = dcerpc_schannel_creds(p_netlogon->conn->security_state.generic_state, tctx, &creds);
tctx 311 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "schannel creds");
tctx 314 source4/torture/rpc/schannel.c torture_assert(tctx, test_netlogon_ops(p_netlogon, tctx, credentials, creds),
tctx 317 source4/torture/rpc/schannel.c torture_assert(tctx, test_netlogon_ex_ops(p_netlogon, tctx, credentials, creds),
tctx 321 source4/torture/rpc/schannel.c status = dcerpc_epm_map_binding(tctx, b, &ndr_table_lsarpc, tctx->ev, tctx->lp_ctx);
tctx 322 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "epm map");
tctx 327 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "seconday connection");
tctx 330 source4/torture/rpc/schannel.c credentials, lp_gensec_settings(tctx, tctx->lp_ctx),
tctx 335 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "bind auth");
tctx 337 source4/torture/rpc/schannel.c torture_assert(tctx, test_lsa_ops(tctx, p_lsa),
tctx 346 source4/torture/rpc/schannel.c status = dcerpc_parse_binding(tctx, binding, &b);
tctx 347 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "Bad binding string");
tctx 352 source4/torture/rpc/schannel.c status = dcerpc_pipe_connect_b(tctx, &p_samr2, b, &ndr_table_samr,
tctx 353 source4/torture/rpc/schannel.c credentials, tctx->ev, tctx->lp_ctx);
tctx 354 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status,
tctx 358 source4/torture/rpc/schannel.c torture_assert (tctx, test_samr_ops(tctx, p_samr2),
tctx 362 source4/torture/rpc/schannel.c status = dcerpc_epm_map_binding(tctx, b, &ndr_table_netlogon, tctx->ev, tctx->lp_ctx);
tctx 363 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "epm");
tctx 367 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "seconday connection");
tctx 371 source4/torture/rpc/schannel.c credentials, lp_gensec_settings(tctx, tctx->lp_ctx),
tctx 376 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "auth failed");
tctx 379 source4/torture/rpc/schannel.c torture_assert(tctx, test_netlogon_ex_ops(p_netlogon2, tctx, credentials, creds),
tctx 385 source4/torture/rpc/schannel.c torture_assert(tctx, test_netlogon_ops(p_netlogon2, tctx, credentials, creds),
tctx 394 source4/torture/rpc/schannel.c status = dcerpc_pipe_connect_b(tctx, &p_netlogon3, b, &ndr_table_netlogon,
tctx 395 source4/torture/rpc/schannel.c credentials, tctx->ev, tctx->lp_ctx);
tctx 396 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(tctx, status, "Failed to connect without schannel");
tctx 398 source4/torture/rpc/schannel.c torture_assert(tctx, !test_netlogon_ex_ops(p_netlogon3, tctx, credentials, creds),
tctx 402 source4/torture/rpc/schannel.c tctx->last_result = TORTURE_OK;
tctx 403 source4/torture/rpc/schannel.c tctx->last_reason = NULL;
tctx 405 source4/torture/rpc/schannel.c torture_assert(tctx, test_netlogon_ops(p_netlogon3, tctx, credentials, creds),
tctx 408 source4/torture/rpc/schannel.c torture_leave_domain(tctx, join_ctx);
tctx 524 source4/torture/rpc/schannel.c struct torture_context *tctx;
tctx 551 source4/torture/rpc/schannel.c torture_comment(s->tctx, "conn[%u]: %s\n", conn->index, nt_errstr(s->error));
tctx 574 source4/torture/rpc/schannel.c if (lp_client_lanman_auth(s->tctx->lp_ctx)) {
tctx 578 source4/torture/rpc/schannel.c if (lp_client_ntlmv2_auth(s->tctx->lp_ctx)) {
tctx 606 source4/torture/rpc/schannel.c torture_assert_ntstatus_ok(s->tctx, status,
tctx 632 source4/torture/rpc/schannel.c torture_assert(s->tctx, req, "Failed to setup LogonSamLogonEx request");
tctx 681 source4/torture/rpc/schannel.c s->tctx = torture;
tctx 690 source4/torture/rpc/schannel.c tmp = torture_setting_string(s->tctx, "extra_user1", NULL);
tctx 697 source4/torture/rpc/schannel.c tmp = torture_setting_string(s->tctx, "extra_user2", NULL);
tctx 702 source4/torture/rpc/schannel.c s->join_ctx1 = torture_join_domain(s->tctx, talloc_asprintf(s, "%sb", TEST_MACHINE_NAME),
tctx 706 source4/torture/rpc/schannel.c s->join_ctx2 = torture_join_domain(s->tctx, talloc_asprintf(s, "%sc", TEST_MACHINE_NAME),
tctx 37 source4/torture/rpc/session_key.c struct torture_context *tctx,
tctx 56 source4/torture/rpc/session_key.c secname = talloc_asprintf(tctx, "torturesecret-%u", (uint_t)random());
tctx 58 source4/torture/rpc/session_key.c torture_comment(tctx, "Testing CreateSecret of %s\n", secname);
tctx 66 source4/torture/rpc/session_key.c status = dcerpc_lsa_CreateSecret(p, tctx, &r);
tctx 67 source4/torture/rpc/session_key.c torture_assert_ntstatus_ok(tctx, status, "CreateSecret failed");
tctx 70 source4/torture/rpc/session_key.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_fetch_session_key failed");
tctx 81 source4/torture/rpc/session_key.c torture_comment(tctx, "Testing SetSecret\n");
tctx 83 source4/torture/rpc/session_key.c status = dcerpc_lsa_SetSecret(p, tctx, &r3);
tctx 84 source4/torture/rpc/session_key.c torture_assert_ntstatus_ok(tctx, status, "SetSecret failed");
tctx 96 source4/torture/rpc/session_key.c torture_comment(tctx, "Testing SetSecret with broken key\n");
tctx 98 source4/torture/rpc/session_key.c status = dcerpc_lsa_SetSecret(p, tctx, &r3);
tctx 99 source4/torture/rpc/session_key.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_UNKNOWN_REVISION,
tctx 116 source4/torture/rpc/session_key.c torture_comment(tctx, "Testing QuerySecret\n");
tctx 117 source4/torture/rpc/session_key.c status = dcerpc_lsa_QuerySecret(p, tctx, &r4);
tctx 118 source4/torture/rpc/session_key.c torture_assert_ntstatus_ok(tctx, status, "QuerySecret failed");
tctx 120 source4/torture/rpc/session_key.c torture_fail(tctx, "No secret buffer returned");
tctx 124 source4/torture/rpc/session_key.c blob2 = data_blob_talloc(tctx, NULL, blob1.length);
tctx 126 source4/torture/rpc/session_key.c secret2 = sess_decrypt_string(tctx, &blob1, &session_key);
tctx 128 source4/torture/rpc/session_key.c torture_assert_str_equal(tctx, secret1, secret2, "Returned secret invalid");
tctx 132 source4/torture/rpc/session_key.c status = dcerpc_lsa_DeleteObject(p, tctx, &d);
tctx 133 source4/torture/rpc/session_key.c torture_assert_ntstatus_ok(tctx, status, "delete should have returned OKINVALID_HANDLE");
tctx 53 source4/torture/rpc/spoolss.c #define COMPARE_STRING(tctx, c,r,e) \
tctx 54 source4/torture/rpc/spoolss.c torture_assert_str_equal(tctx, c.e, r.e, "invalid value")
tctx 60 source4/torture/rpc/spoolss.c torture_fail(tctx, #c "." #e "field is not " #type "\n"); \
tctx 63 source4/torture/rpc/spoolss.c torture_fail(tctx, #r "." #e "field is not " #type "\n"); \
tctx 70 source4/torture/rpc/spoolss.c #define COMPARE_UINT32(tctx, c, r, e) do {\
tctx 72 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, c.e, r.e, "invalid value"); \
tctx 75 source4/torture/rpc/spoolss.c #define COMPARE_STRING_ARRAY(tctx, c,r,e)
tctx 77 source4/torture/rpc/spoolss.c static bool test_OpenPrinter_server(struct torture_context *tctx, struct dcerpc_pipe *p, struct test_spoolss_context *ctx)
tctx 88 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing OpenPrinter(%s)\n", op.in.printername);
tctx 91 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_OpenPrinter failed");
tctx 92 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, op.out.result, "dcerpc_spoolss_OpenPrinter failed");
tctx 97 source4/torture/rpc/spoolss.c static bool test_EnumPorts(struct torture_context *tctx,
tctx 121 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPorts level %u\n", r.in.level);
tctx 124 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPorts failed");
tctx 129 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER,
tctx 138 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPorts failed");
tctx 140 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPorts failed");
tctx 142 source4/torture/rpc/spoolss.c torture_assert(tctx, info, "EnumPorts returned no info");
tctx 151 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, ctx->port_count[level], ctx->port_count[old_level],
tctx 163 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info1, ref->info2, port_name);
tctx 175 source4/torture/rpc/spoolss.c static bool test_GetPrintProcessorDirectory(struct torture_context *tctx,
tctx 215 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetPrintProcessorDirectory level %u\n", r.in.level);
tctx 218 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status,
tctx 220 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER,
tctx 229 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_GetPrintProcessorDirectory failed");
tctx 231 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetPrintProcessorDirectory failed");
tctx 238 source4/torture/rpc/spoolss.c static bool test_GetPrinterDriverDirectory(struct torture_context *tctx,
tctx 278 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetPrinterDriverDirectory level %u\n", r.in.level);
tctx 281 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status,
tctx 283 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER,
tctx 292 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_GetPrinterDriverDirectory failed");
tctx 294 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetPrinterDriverDirectory failed");
tctx 300 source4/torture/rpc/spoolss.c static bool test_EnumPrinterDrivers(struct torture_context *tctx,
tctx 320 source4/torture/rpc/spoolss.c r.in.server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 329 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinterDrivers level %u\n", r.in.level);
tctx 332 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status,
tctx 345 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrinterDrivers failed");
tctx 348 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrinterDrivers failed");
tctx 357 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, ctx->driver_count[level], ctx->driver_count[old_level],
tctx 368 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info1, ref->info6, driver_name);
tctx 371 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info2, ref->info6, version);
tctx 372 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info2, ref->info6, driver_name);
tctx 373 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info2, ref->info6, architecture);
tctx 374 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info2, ref->info6, driver_path);
tctx 375 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info2, ref->info6, data_file);
tctx 376 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info2, ref->info6, config_file);
tctx 379 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info3, ref->info6, version);
tctx 380 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, driver_name);
tctx 381 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, architecture);
tctx 382 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, driver_path);
tctx 383 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, data_file);
tctx 384 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, config_file);
tctx 385 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, help_file);
tctx 386 source4/torture/rpc/spoolss.c COMPARE_STRING_ARRAY(tctx, cur->info3, ref->info6, dependent_files);
tctx 387 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, monitor_name);
tctx 388 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info3, ref->info6, default_datatype);
tctx 391 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info4, ref->info6, version);
tctx 392 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, driver_name);
tctx 393 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, architecture);
tctx 394 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, driver_path);
tctx 395 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, data_file);
tctx 396 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, config_file);
tctx 397 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, help_file);
tctx 398 source4/torture/rpc/spoolss.c COMPARE_STRING_ARRAY(tctx, cur->info4, ref->info6, dependent_files);
tctx 399 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, monitor_name);
tctx 400 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info6, default_datatype);
tctx 401 source4/torture/rpc/spoolss.c COMPARE_STRING_ARRAY(tctx, cur->info4, ref->info6, previous_names);
tctx 404 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info5, ref->info6, version);
tctx 405 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info6, driver_name);
tctx 406 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info6, architecture);
tctx 407 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info6, driver_path);
tctx 408 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info6, data_file);
tctx 409 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info6, config_file);
tctx 424 source4/torture/rpc/spoolss.c static bool test_EnumMonitors(struct torture_context *tctx,
tctx 448 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumMonitors level %u\n", r.in.level);
tctx 451 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumMonitors failed");
tctx 456 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER,
tctx 465 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumMonitors failed");
tctx 467 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumMonitors failed");
tctx 476 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, ctx->monitor_count[level], ctx->monitor_count[old_level],
tctx 487 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info1, ref->info2, monitor_name);
tctx 499 source4/torture/rpc/spoolss.c static bool test_EnumPrintProcessors(struct torture_context *tctx,
tctx 524 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrintProcessors level %u\n", r.in.level);
tctx 527 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcessors failed");
tctx 532 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER,
tctx 541 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcessors failed");
tctx 543 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrintProcessors failed");
tctx 552 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, ctx->print_processor_count[level], ctx->print_processor_count[old_level],
tctx 574 source4/torture/rpc/spoolss.c static bool test_EnumPrintProcDataTypes(struct torture_context *tctx,
tctx 599 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrintProcDataTypes level %u\n", r.in.level);
tctx 602 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcDataType failed");
tctx 607 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER,
tctx 616 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrintProcDataTypes failed");
tctx 618 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrintProcDataTypes failed");
tctx 625 source4/torture/rpc/spoolss.c static bool test_EnumPrinters(struct torture_context *tctx,
tctx 650 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinters level %u\n", r.in.level);
tctx 653 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrinters failed");
tctx 658 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INSUFFICIENT_BUFFER,
tctx 667 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EnumPrinters failed");
tctx 669 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrinters failed");
tctx 678 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, ctx->printer_count[level], ctx->printer_count[old_level],
tctx 689 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info0, ref->info2, printername);
tctx 690 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info0, ref->info2, servername);
tctx 691 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info0, ref->info2, cjobs);
tctx 710 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info0, ref->info2, status);
tctx 723 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info1, ref->info2, comment);
tctx 729 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info2, printername);
tctx 730 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info4, ref->info2, servername);
tctx 731 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info4, ref->info2, attributes);
tctx 734 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info2, printername);
tctx 735 source4/torture/rpc/spoolss.c COMPARE_STRING(tctx, cur->info5, ref->info2, portname);
tctx 736 source4/torture/rpc/spoolss.c COMPARE_UINT32(tctx, cur->info5, ref->info2, attributes);
tctx 751 source4/torture/rpc/spoolss.c static bool test_GetPrinter(struct torture_context *tctx,
tctx 768 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetPrinter level %u\n", r.in.level);
tctx 770 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinter(p, tctx, &r);
tctx 771 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed");
tctx 774 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx 778 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinter(p, tctx, &r);
tctx 781 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed");
tctx 783 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetPrinter failed");
tctx 790 source4/torture/rpc/spoolss.c static bool test_ClosePrinter(struct torture_context *tctx,
tctx 800 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing ClosePrinter\n");
tctx 802 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_ClosePrinter(p, tctx, &r);
tctx 803 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed");
tctx 808 source4/torture/rpc/spoolss.c static bool test_GetForm(struct torture_context *tctx,
tctx 825 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetForm level %d\n", r.in.level);
tctx 827 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetForm(p, tctx, &r);
tctx 828 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetForm failed");
tctx 831 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx 835 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetForm(p, tctx, &r);
tctx 836 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetForm failed");
tctx 838 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetForm failed");
tctx 840 source4/torture/rpc/spoolss.c torture_assert(tctx, r.out.info, "No form info returned");
tctx 843 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetForm failed");
tctx 848 source4/torture/rpc/spoolss.c static bool test_EnumForms(struct torture_context *tctx,
tctx 872 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumForms level %d\n", levels[i]);
tctx 874 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumForms(p, tctx, &r);
tctx 875 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumForms failed");
tctx 882 source4/torture/rpc/spoolss.c torture_fail(tctx, "EnumForms on the PrintServer isn't supported by test server (NT4)");
tctx 886 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx 891 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumForms(p, tctx, &r);
tctx 893 source4/torture/rpc/spoolss.c torture_assert(tctx, info, "No forms returned");
tctx 897 source4/torture/rpc/spoolss.c ret &= test_GetForm(tctx, p, handle, info[j].info1.form_name, levels[i]);
tctx 901 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumForms failed");
tctx 903 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumForms failed");
tctx 909 source4/torture/rpc/spoolss.c static bool test_DeleteForm(struct torture_context *tctx,
tctx 920 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_DeleteForm(p, tctx, &r);
tctx 922 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "DeleteForm failed");
tctx 924 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "DeleteForm failed");
tctx 929 source4/torture/rpc/spoolss.c static bool test_AddForm(struct torture_context *tctx,
tctx 951 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_AddForm(p, tctx, &r);
tctx 953 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "AddForm failed");
tctx 955 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "AddForm failed");
tctx 957 source4/torture/rpc/spoolss.c if (!print_server) ret &= test_GetForm(tctx, p, handle, form_name, 1);
tctx 974 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_SetForm(p, tctx, &sf);
tctx 976 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "SetForm failed");
tctx 978 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "SetForm failed");
tctx 981 source4/torture/rpc/spoolss.c if (!print_server) ret &= test_GetForm(tctx, p, handle, form_name, 1);
tctx 983 source4/torture/rpc/spoolss.c if (!test_DeleteForm(tctx, p, handle, form_name)) {
tctx 990 source4/torture/rpc/spoolss.c static bool test_EnumPorts_old(struct torture_context *tctx,
tctx 999 source4/torture/rpc/spoolss.c r.in.servername = talloc_asprintf(tctx, "\\\\%s",
tctx 1008 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPorts\n");
tctx 1010 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPorts(p, tctx, &r);
tctx 1012 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPorts failed");
tctx 1015 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx 1020 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPorts(p, tctx, &r);
tctx 1021 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPorts failed");
tctx 1023 source4/torture/rpc/spoolss.c torture_assert(tctx, info, "No ports returned");
tctx 1029 source4/torture/rpc/spoolss.c static bool test_AddPort(struct torture_context *tctx,
tctx 1035 source4/torture/rpc/spoolss.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s",
tctx 1040 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing AddPort\n");
tctx 1042 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_AddPort(p, tctx, &r);
tctx 1044 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "AddPort failed");
tctx 1060 source4/torture/rpc/spoolss.c static bool test_GetJob(struct torture_context *tctx,
tctx 1077 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetJob level %d\n", r.in.level);
tctx 1079 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetJob(p, tctx, &r);
tctx 1080 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_UNKNOWN_LEVEL, "Unexpected return code");
tctx 1084 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetJob level %d\n", r.in.level);
tctx 1089 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetJob(p, tctx, &r);
tctx 1090 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetJob failed");
tctx 1093 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx 1098 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetJob(p, tctx, &r);
tctx 1099 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetJob failed");
tctx 1102 source4/torture/rpc/spoolss.c torture_assert(tctx, r.out.info, "No job info returned");
tctx 1103 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetJob failed");
tctx 1109 source4/torture/rpc/spoolss.c static bool test_SetJob(struct torture_context *tctx,
tctx 1124 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_PAUSE\n");
tctx 1127 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RESUME\n");
tctx 1130 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_CANCEL\n");
tctx 1133 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RESTART\n");
tctx 1136 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_DELETE\n");
tctx 1139 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_SEND_TO_PRINTER\n");
tctx 1142 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_LAST_PAGE_EJECTED\n");
tctx 1145 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RETAIN\n");
tctx 1148 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob: SPOOLSS_JOB_CONTROL_RELEASE\n");
tctx 1151 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetJob\n");
tctx 1155 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_SetJob(p, tctx, &r);
tctx 1156 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "SetJob failed");
tctx 1157 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "SetJob failed");
tctx 1162 source4/torture/rpc/spoolss.c static bool test_AddJob(struct torture_context *tctx,
tctx 1176 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing AddJob\n");
tctx 1178 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_AddJob(p, tctx, &r);
tctx 1179 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_UNKNOWN_LEVEL, "AddJob failed");
tctx 1183 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_AddJob(p, tctx, &r);
tctx 1184 source4/torture/rpc/spoolss.c torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM, "AddJob failed");
tctx 1190 source4/torture/rpc/spoolss.c static bool test_EnumJobs(struct torture_context *tctx,
tctx 1210 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumJobs\n");
tctx 1212 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumJobs(p, tctx, &r);
tctx 1214 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumJobs failed");
tctx 1218 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx 1223 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumJobs(p, tctx, &r);
tctx 1225 source4/torture/rpc/spoolss.c torture_assert(tctx, info, "No jobs returned");
tctx 1229 source4/torture/rpc/spoolss.c test_GetJob(tctx, p, handle, info[j].info1.job_id);
tctx 1232 source4/torture/rpc/spoolss.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 1233 source4/torture/rpc/spoolss.c test_SetJob(tctx, p, handle, info[j].info1.job_id, SPOOLSS_JOB_CONTROL_PAUSE);
tctx 1234 source4/torture/rpc/spoolss.c test_SetJob(tctx, p, handle, info[j].info1.job_id, SPOOLSS_JOB_CONTROL_RESUME);
tctx 1239 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumJobs failed");
tctx 1245 source4/torture/rpc/spoolss.c static bool test_DoPrintTest(struct torture_context *tctx,
tctx 1261 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing StartDocPrinter\n");
tctx 1271 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_StartDocPrinter(p, tctx, &s);
tctx 1272 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_StartDocPrinter failed");
tctx 1273 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, s.out.result, "StartDocPrinter failed");
tctx 1276 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing StartPagePrinter: Page[%d]\n", i);
tctx 1280 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_StartPagePrinter(p, tctx, &sp);
tctx 1281 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status,
tctx 1283 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, sp.out.result, "StartPagePrinter failed");
tctx 1285 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing WritePrinter: Page[%d]\n", i);
tctx 1288 source4/torture/rpc/spoolss.c w.in.data = data_blob_string_const(talloc_asprintf(tctx,"TortureTestPage: %d\nData\n",i));
tctx 1291 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_WritePrinter(p, tctx, &w);
tctx 1292 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_WritePrinter failed");
tctx 1293 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, w.out.result, "WritePrinter failed");
tctx 1295 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EndPagePrinter: Page[%d]\n", i);
tctx 1299 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EndPagePrinter(p, tctx, &ep);
tctx 1300 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EndPagePrinter failed");
tctx 1301 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, ep.out.result, "EndPagePrinter failed");
tctx 1304 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EndDocPrinter\n");
tctx 1308 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EndDocPrinter(p, tctx, &e);
tctx 1309 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_spoolss_EndDocPrinter failed");
tctx 1310 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, e.out.result, "EndDocPrinter failed");
tctx 1312 source4/torture/rpc/spoolss.c ret &= test_AddJob(tctx, p, handle);
tctx 1313 source4/torture/rpc/spoolss.c ret &= test_EnumJobs(tctx, p, handle);
tctx 1315 source4/torture/rpc/spoolss.c ret &= test_SetJob(tctx, p, handle, job_id, SPOOLSS_JOB_CONTROL_DELETE);
tctx 1320 source4/torture/rpc/spoolss.c static bool test_PausePrinter(struct torture_context *tctx,
tctx 1342 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetPrinter: SPOOLSS_PRINTER_CONTROL_PAUSE\n");
tctx 1344 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_SetPrinter(p, tctx, &r);
tctx 1346 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "SetPrinter failed");
tctx 1348 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "SetPrinter failed");
tctx 1353 source4/torture/rpc/spoolss.c static bool test_ResumePrinter(struct torture_context *tctx,
tctx 1375 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetPrinter: SPOOLSS_PRINTER_CONTROL_RESUME\n");
tctx 1377 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_SetPrinter(p, tctx, &r);
tctx 1379 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "SetPrinter failed");
tctx 1381 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "SetPrinter failed");
tctx 1386 source4/torture/rpc/spoolss.c static bool test_GetPrinterData(struct torture_context *tctx,
tctx 1404 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetPrinterData\n");
tctx 1406 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterData(p, tctx, &r);
tctx 1407 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterData failed");
tctx 1412 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterData(p, tctx, &r);
tctx 1413 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterData failed");
tctx 1415 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetPrinterData failed");
tctx 1421 source4/torture/rpc/spoolss.c static bool test_GetPrinterDataEx(struct torture_context *tctx,
tctx 1440 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing GetPrinterDataEx\n");
tctx 1442 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterDataEx(p, tctx, &r);
tctx 1446 source4/torture/rpc/spoolss.c torture_skip(tctx, "GetPrinterDataEx not supported by server\n");
tctx 1448 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterDataEx failed");
tctx 1453 source4/torture/rpc/spoolss.c r.out.buffer = talloc_array(tctx, uint8_t, needed);
tctx 1455 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterDataEx(p, tctx, &r);
tctx 1456 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterDataEx failed");
tctx 1458 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "GetPrinterDataEx failed");
tctx 1464 source4/torture/rpc/spoolss.c static bool test_EnumPrinterData(struct torture_context *tctx, struct dcerpc_pipe *p,
tctx 1485 source4/torture/rpc/spoolss.c r.out.data = talloc_zero_array(tctx, uint8_t, 0);
tctx 1487 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinterData\n");
tctx 1489 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterData(p, tctx, &r);
tctx 1491 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterData failed");
tctx 1494 source4/torture/rpc/spoolss.c r.out.value_name = talloc_zero_array(tctx, const char, value_size);
tctx 1496 source4/torture/rpc/spoolss.c r.out.data = talloc_zero_array(tctx, uint8_t, data_size);
tctx 1498 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterData(p, tctx, &r);
tctx 1500 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterData failed");
tctx 1502 source4/torture/rpc/spoolss.c test_GetPrinterData(tctx, p, handle, r.out.value_name);
tctx 1504 source4/torture/rpc/spoolss.c test_GetPrinterDataEx(tctx,
tctx 1515 source4/torture/rpc/spoolss.c static bool test_EnumPrinterDataEx(struct torture_context *tctx,
tctx 1532 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinterDataEx\n");
tctx 1534 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &r);
tctx 1535 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDataEx failed");
tctx 1539 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &r);
tctx 1541 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDataEx failed");
tctx 1547 source4/torture/rpc/spoolss.c static bool test_DeletePrinterData(struct torture_context *tctx,
tctx 1558 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing DeletePrinterData\n");
tctx 1560 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_DeletePrinterData(p, tctx, &r);
tctx 1562 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "DeletePrinterData failed");
tctx 1567 source4/torture/rpc/spoolss.c static bool test_SetPrinterData(struct torture_context *tctx,
tctx 1580 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing SetPrinterData\n");
tctx 1582 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_SetPrinterData(p, tctx, &r);
tctx 1584 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "SetPrinterData failed");
tctx 1586 source4/torture/rpc/spoolss.c if (!test_GetPrinterData(tctx, p, handle, value_name)) {
tctx 1590 source4/torture/rpc/spoolss.c if (!test_DeletePrinterData(tctx, p, handle, value_name)) {
tctx 1597 source4/torture/rpc/spoolss.c static bool test_SecondaryClosePrinter(struct torture_context *tctx,
tctx 1611 source4/torture/rpc/spoolss.c torture_comment(tctx, "testing close on secondary pipe\n");
tctx 1613 source4/torture/rpc/spoolss.c status = dcerpc_parse_binding(tctx, p->conn->binding_string, &b);
tctx 1614 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "Failed to parse dcerpc binding");
tctx 1617 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "Failed to create secondary connection");
tctx 1620 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "Failed to create bind on secondary connection");
tctx 1625 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_ClosePrinter(p2, tctx, &cp);
tctx 1626 source4/torture/rpc/spoolss.c torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NET_WRITE_FAULT,
tctx 1629 source4/torture/rpc/spoolss.c torture_assert_int_equal(tctx, p2->last_fault_code, DCERPC_FAULT_CONTEXT_MISMATCH,
tctx 1637 source4/torture/rpc/spoolss.c static bool test_OpenPrinter_badname(struct torture_context *tctx,
tctx 1652 source4/torture/rpc/spoolss.c torture_comment(tctx, "\nTesting OpenPrinter(%s) with bad name\n", op.in.printername);
tctx 1654 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_OpenPrinter(p, tctx, &op);
tctx 1655 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinter failed");
tctx 1657 source4/torture/rpc/spoolss.c torture_comment(tctx, "OpenPrinter(%s) unexpected result[%s] should be WERR_INVALID_PRINTER_NAME\n",
tctx 1662 source4/torture/rpc/spoolss.c ret &=test_ClosePrinter(tctx, p, &handle);
tctx 1673 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing OpenPrinterEx(%s) with bad name\n", opEx.in.printername);
tctx 1675 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &opEx);
tctx 1676 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinterEx failed");
tctx 1678 source4/torture/rpc/spoolss.c torture_comment(tctx, "OpenPrinterEx(%s) unexpected result[%s] should be WERR_INVALID_PARAM\n",
tctx 1683 source4/torture/rpc/spoolss.c ret &=test_ClosePrinter(tctx, p, &handle);
tctx 1689 source4/torture/rpc/spoolss.c static bool test_OpenPrinter(struct torture_context *tctx,
tctx 1698 source4/torture/rpc/spoolss.c r.in.printername = talloc_asprintf(tctx, "\\\\%s\\%s", dcerpc_server_name(p), name);
tctx 1704 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing OpenPrinter(%s)\n", r.in.printername);
tctx 1706 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_OpenPrinter(p, tctx, &r);
tctx 1708 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinter failed");
tctx 1710 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "OpenPrinter failed");
tctx 1712 source4/torture/rpc/spoolss.c if (!test_GetPrinter(tctx, p, &handle)) {
tctx 1716 source4/torture/rpc/spoolss.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 1717 source4/torture/rpc/spoolss.c if (!test_SecondaryClosePrinter(tctx, p, &handle)) {
tctx 1722 source4/torture/rpc/spoolss.c if (!test_ClosePrinter(tctx, p, &handle)) {
tctx 1729 source4/torture/rpc/spoolss.c static bool call_OpenPrinterEx(struct torture_context *tctx,
tctx 1738 source4/torture/rpc/spoolss.c r.in.printername = talloc_asprintf(tctx, "\\\\%s\\%s",
tctx 1741 source4/torture/rpc/spoolss.c r.in.printername = talloc_asprintf(tctx, "\\\\%s",
tctx 1760 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing OpenPrinterEx(%s)\n", r.in.printername);
tctx 1762 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &r);
tctx 1764 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinterEx failed");
tctx 1766 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "OpenPrinterEx failed");
tctx 1771 source4/torture/rpc/spoolss.c static bool test_OpenPrinterEx(struct torture_context *tctx,
tctx 1778 source4/torture/rpc/spoolss.c if (!call_OpenPrinterEx(tctx, p, name, &handle)) {
tctx 1782 source4/torture/rpc/spoolss.c if (!test_GetPrinter(tctx, p, &handle)) {
tctx 1786 source4/torture/rpc/spoolss.c if (!test_EnumForms(tctx, p, &handle, false)) {
tctx 1790 source4/torture/rpc/spoolss.c if (!test_AddForm(tctx, p, &handle, false)) {
tctx 1794 source4/torture/rpc/spoolss.c if (!test_EnumPrinterData(tctx, p, &handle)) {
tctx 1798 source4/torture/rpc/spoolss.c if (!test_EnumPrinterDataEx(tctx, p, &handle)) {
tctx 1802 source4/torture/rpc/spoolss.c if (!test_PausePrinter(tctx, p, &handle)) {
tctx 1806 source4/torture/rpc/spoolss.c if (!test_DoPrintTest(tctx, p, &handle)) {
tctx 1810 source4/torture/rpc/spoolss.c if (!test_ResumePrinter(tctx, p, &handle)) {
tctx 1814 source4/torture/rpc/spoolss.c if (!test_SetPrinterData(tctx, p, &handle)) {
tctx 1818 source4/torture/rpc/spoolss.c if (!torture_setting_bool(tctx, "samba3", false)) {
tctx 1819 source4/torture/rpc/spoolss.c if (!test_SecondaryClosePrinter(tctx, p, &handle)) {
tctx 1824 source4/torture/rpc/spoolss.c if (!test_ClosePrinter(tctx, p, &handle)) {
tctx 1831 source4/torture/rpc/spoolss.c static bool test_EnumPrinters_old(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 1854 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinters level %u\n", r.in.level);
tctx 1856 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinters(p, tctx, &r);
tctx 1857 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinters failed");
tctx 1860 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx 1864 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinters(p, tctx, &r);
tctx 1867 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinters failed");
tctx 1869 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrinters failed");
tctx 1872 source4/torture/rpc/spoolss.c torture_comment(tctx, "No printers returned\n");
tctx 1878 source4/torture/rpc/spoolss.c char *unc = talloc_strdup(tctx, info[j].info1.name);
tctx 1889 source4/torture/rpc/spoolss.c if (!test_OpenPrinter(tctx, p, name)) {
tctx 1892 source4/torture/rpc/spoolss.c if (!test_OpenPrinterEx(tctx, p, name)) {
tctx 1926 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterDriver2(p, tctx, &r);
tctx 1934 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_GetPrinterDriver2(p, tctx, &r);
tctx 1953 source4/torture/rpc/spoolss.c static bool test_EnumPrinterDrivers_old(struct torture_context *tctx,
tctx 1967 source4/torture/rpc/spoolss.c r.in.server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1976 source4/torture/rpc/spoolss.c torture_comment(tctx, "Testing EnumPrinterDrivers level %u\n", r.in.level);
tctx 1978 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterDrivers(p, tctx, &r);
tctx 1980 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDrivers failed");
tctx 1983 source4/torture/rpc/spoolss.c DATA_BLOB blob = data_blob_talloc(tctx, NULL, needed);
tctx 1987 source4/torture/rpc/spoolss.c status = dcerpc_spoolss_EnumPrinterDrivers(p, tctx, &r);
tctx 1990 source4/torture/rpc/spoolss.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDrivers failed");
tctx 1992 source4/torture/rpc/spoolss.c torture_assert_werr_ok(tctx, r.out.result, "EnumPrinterDrivers failed");
tctx 1995 source4/torture/rpc/spoolss.c torture_comment(tctx, "No printer drivers returned\n");
tctx 185 source4/torture/rpc/spoolss_notify.c static bool test_RFFPCNEx(struct torture_context *tctx,
tctx 203 source4/torture/rpc/spoolss_notify.c ntvfs_init(tctx->lp_ctx);
tctx 207 source4/torture/rpc/spoolss_notify.c q.in.printername = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 213 source4/torture/rpc/spoolss_notify.c torture_comment(tctx, "Testing OpenPrinter(%s)\n", q.in.printername);
tctx 215 source4/torture/rpc/spoolss_notify.c status = dcerpc_spoolss_OpenPrinter(p, tctx, &q);
tctx 217 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinter failed");
tctx 219 source4/torture/rpc/spoolss_notify.c torture_assert_werr_ok(tctx, q.out.result, "OpenPrinter failed");
tctx 232 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, dcerpc_register_ep_server(&ep_server),
tctx 235 source4/torture/rpc/spoolss_notify.c lp_set_cmdline(tctx->lp_ctx, "dcerpc endpoint servers", "spoolss");
tctx 237 source4/torture/rpc/spoolss_notify.c load_interfaces(tctx, lp_interfaces(tctx->lp_ctx), &ifaces);
tctx 239 source4/torture/rpc/spoolss_notify.c torture_comment(tctx, "Listening for callbacks on %s\n", address);
tctx 240 source4/torture/rpc/spoolss_notify.c status = smbsrv_add_socket(p->conn->event_ctx, tctx->lp_ctx, &single_ops, address);
tctx 241 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, status, "starting smb server");
tctx 243 source4/torture/rpc/spoolss_notify.c status = dcesrv_init_context(tctx, tctx->lp_ctx, endpoints, &dce_ctx);
tctx 244 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, status,
tctx 248 source4/torture/rpc/spoolss_notify.c r.in.local_machine = talloc_asprintf(tctx, "\\\\%s", address);
tctx 254 source4/torture/rpc/spoolss_notify.c t1.types = talloc_zero_array(tctx, struct spoolss_NotifyOptionType, 2);
tctx 268 source4/torture/rpc/spoolss_notify.c status = dcerpc_spoolss_RemoteFindFirstPrinterChangeNotifyEx(p, tctx, &r);
tctx 270 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, status, "FFPCNEx failed");
tctx 272 source4/torture/rpc/spoolss_notify.c torture_assert_werr_ok(tctx, r.out.result, "error return code for FFPCNEx");
tctx 277 source4/torture/rpc/spoolss_notify.c torture_comment(tctx, "Testing ClosePrinter\n");
tctx 279 source4/torture/rpc/spoolss_notify.c status = dcerpc_spoolss_ClosePrinter(p, tctx, &cp);
tctx 280 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed");
tctx 283 source4/torture/rpc/spoolss_notify.c torture_assert(tctx, received_packets != NULL, "no packets received");
tctx 284 source4/torture/rpc/spoolss_notify.c torture_assert_int_equal(tctx, received_packets->opnum, 58, "invalid opnum");
tctx 295 source4/torture/rpc/spoolss_notify.c static bool test_ReplyOpenPrinter(struct torture_context *tctx,
tctx 309 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx,
tctx 310 source4/torture/rpc/spoolss_notify.c dcerpc_spoolss_ReplyOpenPrinter(pipe, tctx, &r),
tctx 313 source4/torture/rpc/spoolss_notify.c torture_assert_werr_ok(tctx, r.out.result, "error return code");
tctx 318 source4/torture/rpc/spoolss_notify.c torture_assert_ntstatus_ok(tctx,
tctx 319 source4/torture/rpc/spoolss_notify.c dcerpc_spoolss_ReplyClosePrinter(pipe, tctx, &s),
tctx 322 source4/torture/rpc/spoolss_notify.c torture_assert_werr_ok(tctx, r.out.result, "error return code");
tctx 42 source4/torture/rpc/spoolss_win.c static bool test_OpenPrinterEx(struct torture_context *tctx,
tctx 52 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Opening printer '%s'\n", printer_name);
tctx 54 source4/torture/rpc/spoolss_win.c op.in.printername = talloc_strdup(tctx, printer_name);
tctx 70 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &op);
tctx 71 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "OpenPrinterEx failed");
tctx 72 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, op.out.result, "OpenPrinterEx failed");
tctx 77 source4/torture/rpc/spoolss_win.c static bool test_OpenPrinterAsAdmin(struct torture_context *tctx,
tctx 95 source4/torture/rpc/spoolss_win.c op.in.printername = talloc_strdup(tctx, printername);
tctx 106 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing OpenPrinterEx(%s) with admin rights\n",
tctx 109 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_OpenPrinterEx(p, tctx, &op);
tctx 112 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_ClosePrinter(p, tctx, &cp);
tctx 113 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed");
tctx 120 source4/torture/rpc/spoolss_win.c static bool test_ClosePrinter(struct torture_context *tctx,
tctx 125 source4/torture/rpc/spoolss_win.c static bool test_OpenPrinterSequence(struct torture_context *tctx,
tctx 130 source4/torture/rpc/spoolss_win.c char *printername = talloc_asprintf(tctx, "\\\\%s",
tctx 134 source4/torture/rpc/spoolss_win.c ret = test_OpenPrinterEx(tctx, p, handle, printername, 0);
tctx 135 source4/torture/rpc/spoolss_win.c torture_assert(tctx, ret == true, "OpenPrinterEx failed.");
tctx 137 source4/torture/rpc/spoolss_win.c ret = test_ClosePrinter(tctx, p, handle);
tctx 138 source4/torture/rpc/spoolss_win.c torture_assert(tctx, ret, "ClosePrinter failed");
tctx 141 source4/torture/rpc/spoolss_win.c ret = test_OpenPrinterAsAdmin(tctx, p, printername);
tctx 142 source4/torture/rpc/spoolss_win.c torture_assert(tctx, ret == true,
tctx 145 source4/torture/rpc/spoolss_win.c ret = test_OpenPrinterEx(tctx, p, handle, printername, SERVER_EXECUTE);
tctx 146 source4/torture/rpc/spoolss_win.c torture_assert(tctx, ret == true, "OpenPrinterEx failed.");
tctx 151 source4/torture/rpc/spoolss_win.c static bool test_GetPrinterData(struct torture_context *tctx,
tctx 164 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing GetPrinterData(%s).\n", value_name);
tctx 172 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_GetPrinterData(p, tctx, &gpd);
tctx 173 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterData failed.");
tctx 174 source4/torture/rpc/spoolss_win.c torture_assert_werr_equal(tctx, gpd.out.result, expected_werr,
tctx 178 source4/torture/rpc/spoolss_win.c torture_assert_int_equal(tctx, data.value,
tctx 185 source4/torture/rpc/spoolss_win.c static bool test_EnumPrinters(struct torture_context *tctx,
tctx 198 source4/torture/rpc/spoolss_win.c ep.in.server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 207 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinters failed.");
tctx 214 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status,"EnumPrinters failed.");
tctx 217 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, ep.out.result, "EnumPrinters failed.");
tctx 222 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Found %d printer(s).\n", ctx->printer_count);
tctx 227 source4/torture/rpc/spoolss_win.c static bool test_GetPrinter(struct torture_context *tctx,
tctx 239 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Test GetPrinter level %d\n", level);
tctx 247 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_GetPrinter(p, tctx, &gp);
tctx 248 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed");
tctx 254 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_GetPrinter(p, tctx, &gp);
tctx 255 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "GetPrinter failed");
tctx 258 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, gp.out.result, "GetPrinter failed");
tctx 270 source4/torture/rpc/spoolss_win.c static bool test_EnumJobs(struct torture_context *tctx,
tctx 276 source4/torture/rpc/spoolss_win.c DATA_BLOB blob = data_blob_talloc_zero(tctx, 1024);
tctx 281 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Test EnumJobs\n");
tctx 291 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumJobs(p, tctx, &ej);
tctx 292 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumJobs failed");
tctx 294 source4/torture/rpc/spoolss_win.c blob = data_blob_talloc_zero(tctx, needed);
tctx 297 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumJobs(p, tctx, &ej);
tctx 298 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumJobs failed");
tctx 300 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, ej.out.result, "EnumJobs failed");
tctx 305 source4/torture/rpc/spoolss_win.c static bool test_GetPrinterDriver2(struct torture_context *tctx,
tctx 312 source4/torture/rpc/spoolss_win.c DATA_BLOB blob = data_blob_talloc_zero(tctx, 87424);
tctx 317 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing GetPrinterDriver2\n");
tctx 330 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_GetPrinterDriver2(p, tctx, &gpd2);
tctx 331 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "GetPrinterDriver2 failed");
tctx 334 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, gpd2.out.result,
tctx 341 source4/torture/rpc/spoolss_win.c static bool test_EnumForms(struct torture_context *tctx,
tctx 348 source4/torture/rpc/spoolss_win.c DATA_BLOB blob = data_blob_talloc_zero(tctx, initial_blob_size);
tctx 353 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing EnumForms\n");
tctx 363 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumForms(p, tctx, &ef);
tctx 364 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumForms failed");
tctx 367 source4/torture/rpc/spoolss_win.c blob = data_blob_talloc_zero(tctx, needed);
tctx 370 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumForms(p, tctx, &ef);
tctx 371 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumForms failed");
tctx 374 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, ef.out.result, "EnumForms failed");
tctx 379 source4/torture/rpc/spoolss_win.c static bool test_EnumPrinterKey(struct torture_context *tctx,
tctx 390 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing EnumPrinterKey(%s)\n", key);
tctx 393 source4/torture/rpc/spoolss_win.c epk.in.key_name = talloc_strdup(tctx, key);
tctx 398 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumPrinterKey(p, tctx, &epk);
tctx 399 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterKey failed");
tctx 404 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumPrinterKey(p, tctx, &epk);
tctx 405 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status,
tctx 409 source4/torture/rpc/spoolss_win.c torture_assert_werr_ok(tctx, epk.out.result, "EnumPrinterKey failed");
tctx 416 source4/torture/rpc/spoolss_win.c static bool test_EnumPrinterDataEx(struct torture_context *tctx,
tctx 429 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Testing EnumPrinterDataEx(%s)\n", key);
tctx 432 source4/torture/rpc/spoolss_win.c epde.in.key_name = talloc_strdup(tctx, key);
tctx 438 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &epde);
tctx 439 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "EnumPrinterDataEx failed.");
tctx 442 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_EnumPrinterDataEx(p, tctx, &epde);
tctx 443 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status,
tctx 447 source4/torture/rpc/spoolss_win.c torture_assert_werr_equal(tctx, epde.out.result, expected_error,
tctx 453 source4/torture/rpc/spoolss_win.c static bool test_ClosePrinter(struct torture_context *tctx,
tctx 463 source4/torture/rpc/spoolss_win.c status = dcerpc_spoolss_ClosePrinter(p, tctx, &cp);
tctx 464 source4/torture/rpc/spoolss_win.c torture_assert_ntstatus_ok(tctx, status, "ClosePrinter failed");
tctx 469 source4/torture/rpc/spoolss_win.c static bool test_WinXP(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 480 source4/torture/rpc/spoolss_win.c ntvfs_init(tctx->lp_ctx);
tctx 482 source4/torture/rpc/spoolss_win.c ctx = talloc_zero(tctx, struct test_spoolss_win_context);
tctx 483 source4/torture/rpc/spoolss_win.c tmp_ctx = talloc_zero(tctx, struct test_spoolss_win_context);
tctx 485 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterSequence(tctx, p, &handle01);
tctx 486 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinterData(tctx, p, &handle01,"UISingleJobStatusString",
tctx 488 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Skip RemoteFindNextPrinterChangeNotifyEx test\n");
tctx 491 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle1, server_name, 0);
tctx 493 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinters(tctx, p, ctx, 1024);
tctx 495 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle02, server_name, 0);
tctx 496 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinterData(tctx, p, &handle02, "MajorVersion", WERR_OK,
tctx 498 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle02);
tctx 505 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle02,
tctx 508 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle02, ctx, 2, 0);
tctx 510 source4/torture/rpc/spoolss_win.c torture_assert_str_equal(tctx, ctx->current_info->info2.printername,
tctx 515 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle03,
tctx 517 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle03, ctx, 0, 1164);
tctx 518 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle03, ctx, 2, 0);
tctx 520 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle04,
tctx 522 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle04, ctx, 2, 0);
tctx 523 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle04);
tctx 525 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle04,
tctx 527 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle04, ctx, 2, 4096);
tctx 528 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle04);
tctx 530 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterAsAdmin(tctx, p,
tctx 533 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle04,
tctx 535 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinterData(tctx, p, &handle04,"UISingleJobStatusString",
tctx 537 source4/torture/rpc/spoolss_win.c torture_comment(tctx, "Skip RemoteFindNextPrinterChangeNotifyEx test\n");
tctx 539 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx 542 source4/torture/rpc/spoolss_win.c ret &= test_EnumJobs(tctx, p, &handle04);
tctx 543 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle04, ctx, 2, 4096);
tctx 545 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx 546 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle04);
tctx 548 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinters(tctx, p, ctx, 1556);
tctx 549 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinterDriver2(tctx, p, ctx, &handle03);
tctx 550 source4/torture/rpc/spoolss_win.c ret &= test_EnumForms(tctx, p, &handle03, 0);
tctx 552 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinterKey(tctx, p, &handle03, "", ctx);
tctx 556 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinterKey(tctx, p, &handle03,
tctx 559 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinterDataEx(tctx, p, &handle03,
tctx 564 source4/torture/rpc/spoolss_win.c ret &= test_EnumPrinterDataEx(tctx, p, &handle03, "", 0,
tctx 567 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle03, tmp_ctx, 2, 0);
tctx 569 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx 571 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx 573 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle03, tmp_ctx, 2, 2556);
tctx 575 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx 577 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx 579 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx 581 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx 583 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle03, tmp_ctx, 7, 0);
tctx 585 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx 587 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx 589 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle03);
tctx 591 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &unused_handle2,
tctx 593 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle2);
tctx 595 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle03, server_name, 0);
tctx 596 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinterData(tctx, p, &handle03, "W3SvcInstalled",
tctx 598 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle03);
tctx 600 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &unused_handle1);
tctx 601 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle02);
tctx 603 source4/torture/rpc/spoolss_win.c ret &= test_OpenPrinterEx(tctx, p, &handle02,
tctx 605 source4/torture/rpc/spoolss_win.c ret &= test_GetPrinter(tctx, p, &handle02, tmp_ctx, 2, 0);
tctx 606 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle02);
tctx 609 source4/torture/rpc/spoolss_win.c ret &= test_ClosePrinter(tctx, p, &handle01);
tctx 30 source4/torture/rpc/srvsvc.c static bool test_NetCharDevGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 39 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 45 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetCharDevGetInfo level %u on device '%s'\n",
tctx 47 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetCharDevGetInfo(p, tctx, &r);
tctx 48 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetCharDevGetInfo failed");
tctx 49 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetCharDevGetInfo failed");
tctx 55 source4/torture/rpc/srvsvc.c static bool test_NetCharDevControl(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 63 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 69 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetCharDevControl opcode %u on device '%s'\n",
tctx 71 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetCharDevControl(p, tctx, &r);
tctx 72 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetCharDevControl failed");
tctx 73 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetCharDevControl failed");
tctx 79 source4/torture/rpc/srvsvc.c static bool test_NetCharDevEnum(struct torture_context *tctx,
tctx 93 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 116 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetCharDevEnum level %u\n", info_ctr.level);
tctx 117 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetCharDevEnum(p, tctx, &r);
tctx 118 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetCharDevEnum failed");
tctx 120 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetCharDevEnum failed: %s\n", win_errstr(r.out.result));
tctx 129 source4/torture/rpc/srvsvc.c if (!test_NetCharDevGetInfo(p, tctx, device)) {
tctx 132 source4/torture/rpc/srvsvc.c if (!test_NetCharDevControl(p, tctx, device)) {
tctx 145 source4/torture/rpc/srvsvc.c static bool test_NetCharDevQGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 154 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 156 source4/torture/rpc/srvsvc.c r.in.user = talloc_asprintf(tctx,"Administrator");
tctx 161 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetCharDevQGetInfo level %u on devicequeue '%s'\n",
tctx 163 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetCharDevQGetInfo(p, tctx, &r);
tctx 164 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetCharDevQGetInfo failed");
tctx 165 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetCharDevQGetInfo failed");
tctx 226 source4/torture/rpc/srvsvc.c static bool test_NetCharDevQEnum(struct torture_context *tctx,
tctx 240 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 241 source4/torture/rpc/srvsvc.c r.in.user = talloc_asprintf(tctx,"%s","Administrator");
tctx 263 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetCharDevQEnum level %u\n", info_ctr.level);
tctx 264 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetCharDevQEnum(p, tctx, &r);
tctx 265 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetCharDevQEnum failed");
tctx 267 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetCharDevQEnum failed: %s\n", win_errstr(r.out.result));
tctx 276 source4/torture/rpc/srvsvc.c if (!test_NetCharDevQGetInfo(p, tctx, device)) {
tctx 289 source4/torture/rpc/srvsvc.c static bool test_NetConnEnum(struct torture_context *tctx,
tctx 303 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 304 source4/torture/rpc/srvsvc.c r.in.path = talloc_asprintf(tctx,"%s","ADMIN$");
tctx 325 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetConnEnum level %u\n", info_ctr.level);
tctx 326 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetConnEnum(p, tctx, &r);
tctx 327 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetConnEnum failed");
tctx 329 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetConnEnum failed: %s\n", win_errstr(r.out.result));
tctx 339 source4/torture/rpc/srvsvc.c static bool test_NetFileEnum(struct torture_context *tctx,
tctx 353 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 375 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetFileEnum level %u\n", info_ctr.level);
tctx 376 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetFileEnum(p, tctx, &r);
tctx 377 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetFileEnum failed");
tctx 379 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetFileEnum failed: %s\n", win_errstr(r.out.result));
tctx 389 source4/torture/rpc/srvsvc.c static bool test_NetSessEnum(struct torture_context *tctx,
tctx 406 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 441 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetSessEnum level %u\n", info_ctr.level);
tctx 442 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetSessEnum(p, tctx, &r);
tctx 443 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetSessEnum failed");
tctx 445 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetSessEnum failed: %s\n", win_errstr(r.out.result));
tctx 455 source4/torture/rpc/srvsvc.c static bool test_NetShareCheck(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 462 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 466 source4/torture/rpc/srvsvc.c torture_comment(tctx,
tctx 469 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareCheck(p, tctx, &r);
tctx 470 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "dcerpc_srvsvc_NetShareCheck failed");
tctx 471 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetShareCheck failed");
tctx 476 source4/torture/rpc/srvsvc.c static bool test_NetShareGetInfo(struct torture_context *tctx,
tctx 497 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 508 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetShareGetInfo level %u on share '%s'\n",
tctx 511 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareGetInfo(p, tctx, &r);
tctx 512 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed");
tctx 513 source4/torture/rpc/srvsvc.c torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareGetInfo failed");
tctx 517 source4/torture/rpc/srvsvc.c if (!test_NetShareCheck(p, tctx, r.out.info->info2->path)) {
tctx 525 source4/torture/rpc/srvsvc.c static bool test_NetShareGetInfoAdminFull(struct torture_context *tctx,
tctx 528 source4/torture/rpc/srvsvc.c return test_NetShareGetInfo(tctx, p, "ADMIN$", true);
tctx 531 source4/torture/rpc/srvsvc.c static bool test_NetShareGetInfoAdminAnon(struct torture_context *tctx,
tctx 534 source4/torture/rpc/srvsvc.c return test_NetShareGetInfo(tctx, p, "ADMIN$", false);
tctx 537 source4/torture/rpc/srvsvc.c static bool test_NetShareAddSetDel(struct torture_context *tctx,
tctx 565 source4/torture/rpc/srvsvc.c talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 566 source4/torture/rpc/srvsvc.c r.in.share_name = talloc_strdup(tctx, "testshare");
tctx 568 source4/torture/rpc/srvsvc.c info.info2 = talloc(tctx, struct srvsvc_NetShareInfo2);
tctx 571 source4/torture/rpc/srvsvc.c info.info2->comment = talloc_strdup(tctx, "test comment");
tctx 575 source4/torture/rpc/srvsvc.c info.info2->path = talloc_strdup(tctx, "C:\\");
tctx 582 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareAdd(p, tctx, &a);
tctx 583 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareAdd level 2 on share 'testshare' failed");
tctx 584 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, a.out.result, "NetShareAdd level 2 on share 'testshare' failed");
tctx 595 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetShareSetInfo level %u on share '%s'\n",
tctx 600 source4/torture/rpc/srvsvc.c info.info0 = talloc(tctx, struct srvsvc_NetShareInfo0);
tctx 604 source4/torture/rpc/srvsvc.c info.info1 = talloc(tctx, struct srvsvc_NetShareInfo1);
tctx 607 source4/torture/rpc/srvsvc.c info.info1->comment = talloc_strdup(tctx, "test comment 1");
tctx 610 source4/torture/rpc/srvsvc.c info.info2 = talloc(tctx, struct srvsvc_NetShareInfo2);
tctx 613 source4/torture/rpc/srvsvc.c info.info2->comment = talloc_strdup(tctx, "test comment 2");
tctx 617 source4/torture/rpc/srvsvc.c info.info2->path = talloc_strdup(tctx, "::BLaH::"); /* "C:\\"); */
tctx 621 source4/torture/rpc/srvsvc.c info.info501 = talloc(tctx, struct srvsvc_NetShareInfo501);
tctx 624 source4/torture/rpc/srvsvc.c info.info501->comment = talloc_strdup(tctx, "test comment 501");
tctx 629 source4/torture/rpc/srvsvc.c info.info502 = talloc(tctx, struct srvsvc_NetShareInfo502);
tctx 632 source4/torture/rpc/srvsvc.c info.info502->comment = talloc_strdup(tctx, "test comment 502");
tctx 636 source4/torture/rpc/srvsvc.c info.info502->path = talloc_strdup(tctx, "C:\\");
tctx 641 source4/torture/rpc/srvsvc.c info.info1004 = talloc(tctx, struct srvsvc_NetShareInfo1004);
tctx 642 source4/torture/rpc/srvsvc.c info.info1004->comment = talloc_strdup(tctx, "test comment 1004");
tctx 645 source4/torture/rpc/srvsvc.c info.info1005 = talloc(tctx, struct srvsvc_NetShareInfo1005);
tctx 649 source4/torture/rpc/srvsvc.c info.info1006 = talloc(tctx, struct srvsvc_NetShareInfo1006);
tctx 659 source4/torture/rpc/srvsvc.c info.info1501 = talloc_zero(tctx, struct sec_desc_buf);
tctx 665 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareSetInfo(p, tctx, &r);
tctx 666 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed");
tctx 667 source4/torture/rpc/srvsvc.c torture_assert_werr_equal(tctx, r.out.result, levels[i].expected, "NetShareSetInfo failed");
tctx 672 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareGetInfo(p, tctx, &q);
tctx 673 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed");
tctx 674 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, q.out.result, "NetShareGetInfo failed");
tctx 676 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info502->name, r.in.share_name,
tctx 683 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info502->comment, "test comment 1", "comment");
tctx 686 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info2->comment, "test comment 2", "comment");
tctx 687 source4/torture/rpc/srvsvc.c torture_assert_int_equal(tctx, q.out.info->info2->max_users, 2, "max users");
tctx 688 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info2->path, "C:\\", "path");
tctx 691 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info501->comment, "test comment 501", "comment");
tctx 694 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info502->comment, "test comment 502", "comment");
tctx 695 source4/torture/rpc/srvsvc.c torture_assert_int_equal(tctx, q.out.info->info502->max_users, 502, "max users");
tctx 696 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info502->path, "C:\\", "path");
tctx 699 source4/torture/rpc/srvsvc.c torture_assert_str_equal(tctx, q.out.info->info1004->comment, "test comment 1004",
tctx 705 source4/torture/rpc/srvsvc.c torture_assert_int_equal(tctx, q.out.info->info1006->max_users, 1006, "Max users");
tctx 718 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareDel(p, tctx, &d);
tctx 719 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareDel on share 'testshare502' failed");
tctx 720 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, a.out.result, "NetShareDel on share 'testshare502' failed");
tctx 728 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAll(struct torture_context *tctx,
tctx 757 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 800 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetShareEnumAll level %u\n", info_ctr.level);
tctx 801 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareEnumAll(p, tctx, &r);
tctx 802 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareEnumAll failed");
tctx 803 source4/torture/rpc/srvsvc.c torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareEnumAll failed");
tctx 810 source4/torture/rpc/srvsvc.c if (!test_NetShareGetInfo(tctx, p, name, admin)) {
tctx 820 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAllFull(struct torture_context *tctx,
tctx 823 source4/torture/rpc/srvsvc.c return test_NetShareEnumAll(tctx, p, true);
tctx 826 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAllAnon(struct torture_context *tctx,
tctx 829 source4/torture/rpc/srvsvc.c return test_NetShareEnumAll(tctx, p, false);
tctx 832 source4/torture/rpc/srvsvc.c static bool test_NetShareEnum(struct torture_context *tctx,
tctx 857 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 895 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetShareEnum level %u\n", info_ctr.level);
tctx 896 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetShareEnum(p, tctx, &r);
tctx 897 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetShareEnum failed");
tctx 898 source4/torture/rpc/srvsvc.c torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareEnum failed");
tctx 904 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumFull(struct torture_context *tctx,
tctx 907 source4/torture/rpc/srvsvc.c return test_NetShareEnum(tctx, p, true);
tctx 910 source4/torture/rpc/srvsvc.c static bool test_NetShareEnumAnon(struct torture_context *tctx,
tctx 913 source4/torture/rpc/srvsvc.c return test_NetShareEnum(tctx, p, false);
tctx 919 source4/torture/rpc/srvsvc.c static bool test_NetSrvGetInfo(struct torture_context *tctx,
tctx 928 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 933 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetSrvGetInfo level %u\n", r.in.level);
tctx 934 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetSrvGetInfo(p, tctx, &r);
tctx 935 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetSrvGetInfo failed");
tctx 937 source4/torture/rpc/srvsvc.c torture_comment(tctx, "NetSrvGetInfo failed: %s\n", win_errstr(r.out.result));
tctx 947 source4/torture/rpc/srvsvc.c static bool test_NetDiskEnum(struct torture_context *tctx,
tctx 970 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetDiskEnum level %u\n", r.in.level);
tctx 971 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetDiskEnum(p, tctx, &r);
tctx 972 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetDiskEnum failed");
tctx 973 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetDiskEnum failed");
tctx 982 source4/torture/rpc/srvsvc.c static bool test_NetTransportEnum(struct torture_context *tctx,
tctx 997 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s", dcerpc_server_name(p));
tctx 1016 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetTransportEnum level %u\n", transports.level);
tctx 1017 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetTransportEnum(p, tctx, &r);
tctx 1018 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetTransportEnum failed");
tctx 1020 source4/torture/rpc/srvsvc.c torture_comment(tctx, "unexpected result: %s\n", win_errstr(r.out.result));
tctx 1030 source4/torture/rpc/srvsvc.c static bool test_NetRemoteTOD(struct torture_context *tctx,
tctx 1037 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
tctx 1040 source4/torture/rpc/srvsvc.c torture_comment(tctx, "testing NetRemoteTOD\n");
tctx 1041 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetRemoteTOD(p, tctx, &r);
tctx 1042 source4/torture/rpc/srvsvc.c torture_assert_ntstatus_ok(tctx, status, "NetRemoteTOD failed");
tctx 1043 source4/torture/rpc/srvsvc.c torture_assert_werr_ok(tctx, r.out.result, "NetRemoteTOD failed");
tctx 1052 source4/torture/rpc/srvsvc.c static bool test_NetNameValidate(struct torture_context *tctx,
tctx 1061 source4/torture/rpc/srvsvc.c r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 1071 source4/torture/rpc/srvsvc.c r.in.name = name = talloc_array(tctx, char, 4097);
tctx 1084 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetNameValidate(p, tctx, &r);
tctx 1111 source4/torture/rpc/srvsvc.c invalidc = talloc_strdup(tctx, "");
tctx 1114 source4/torture/rpc/srvsvc.c r.in.name = name = talloc_asprintf(tctx, "%c", (char)n);
tctx 1116 source4/torture/rpc/srvsvc.c status = dcerpc_srvsvc_NetNameValidate(p, tctx, &r);
tctx 31 source4/torture/rpc/svcctl.c static bool test_OpenSCManager(struct dcerpc_pipe *p, struct torture_context *tctx, struct policy_handle *h)
tctx 40 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx,
tctx 41 source4/torture/rpc/svcctl.c dcerpc_svcctl_OpenSCManagerW(p, tctx, &r),
tctx 47 source4/torture/rpc/svcctl.c static bool test_CloseServiceHandle(struct dcerpc_pipe *p, struct torture_context *tctx, struct policy_handle *h)
tctx 53 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx,
tctx 54 source4/torture/rpc/svcctl.c dcerpc_svcctl_CloseServiceHandle(p, tctx, &r),
tctx 60 source4/torture/rpc/svcctl.c static bool test_OpenService(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 70 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx,
tctx 71 source4/torture/rpc/svcctl.c dcerpc_svcctl_OpenServiceW(p, tctx, &r),
tctx 73 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "OpenServiceW failed!");
tctx 79 source4/torture/rpc/svcctl.c static bool test_QueryServiceStatus(struct torture_context *tctx,
tctx 87 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h))
tctx 90 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx 96 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceStatus(p, tctx, &r);
tctx 97 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceStatus failed!");
tctx 98 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceStatus failed!");
tctx 100 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s))
tctx 103 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h))
tctx 109 source4/torture/rpc/svcctl.c static bool test_QueryServiceStatusEx(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 120 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h))
tctx 123 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx 126 source4/torture/rpc/svcctl.c buffer = talloc(tctx, uint8_t);
tctx 134 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceStatusEx(p, tctx, &r);
tctx 135 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceStatusEx failed!");
tctx 139 source4/torture/rpc/svcctl.c buffer = talloc_array(tctx, uint8_t, needed);
tctx 142 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceStatusEx(p, tctx, &r);
tctx 143 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceStatusEx failed!");
tctx 144 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceStatusEx failed!");
tctx 147 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s))
tctx 150 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h))
tctx 156 source4/torture/rpc/svcctl.c static bool test_QueryServiceConfigW(struct torture_context *tctx,
tctx 167 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h))
tctx 170 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx 178 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfigW(p, tctx, &r);
tctx 179 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfigW failed!");
tctx 183 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfigW(p, tctx, &r);
tctx 184 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfigW failed!");
tctx 187 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceConfigW failed!");
tctx 189 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s))
tctx 192 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h))
tctx 198 source4/torture/rpc/svcctl.c static bool test_QueryServiceConfig2W(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 209 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h))
tctx 212 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx 215 source4/torture/rpc/svcctl.c buffer = talloc(tctx, uint8_t);
tctx 223 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r);
tctx 224 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!");
tctx 228 source4/torture/rpc/svcctl.c buffer = talloc_array(tctx, uint8_t, needed);
tctx 231 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r);
tctx 232 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!");
tctx 233 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceConfig2W failed!");
tctx 241 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r);
tctx 242 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!");
tctx 246 source4/torture/rpc/svcctl.c buffer = talloc_array(tctx, uint8_t, needed);
tctx 249 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_QueryServiceConfig2W(p, tctx, &r);
tctx 250 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "QueryServiceConfig2W failed!");
tctx 251 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceConfig2W failed!");
tctx 254 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s))
tctx 257 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h))
tctx 263 source4/torture/rpc/svcctl.c static bool test_QueryServiceObjectSecurity(struct torture_context *tctx,
tctx 272 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h))
tctx 275 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx 284 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx,
tctx 285 source4/torture/rpc/svcctl.c dcerpc_svcctl_QueryServiceObjectSecurity(p, tctx, &r),
tctx 287 source4/torture/rpc/svcctl.c torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
tctx 292 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx,
tctx 293 source4/torture/rpc/svcctl.c dcerpc_svcctl_QueryServiceObjectSecurity(p, tctx, &r),
tctx 298 source4/torture/rpc/svcctl.c buffer = talloc_array(tctx, uint8_t, needed);
tctx 300 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx,
tctx 301 source4/torture/rpc/svcctl.c dcerpc_svcctl_QueryServiceObjectSecurity(p, tctx, &r),
tctx 305 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "QueryServiceObjectSecurity failed!");
tctx 307 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s))
tctx 310 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h))
tctx 316 source4/torture/rpc/svcctl.c static bool test_StartServiceW(struct torture_context *tctx,
tctx 322 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h))
tctx 325 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx 332 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx,
tctx 333 source4/torture/rpc/svcctl.c dcerpc_svcctl_StartServiceW(p, tctx, &r),
tctx 335 source4/torture/rpc/svcctl.c torture_assert_werr_equal(tctx, r.out.result,
tctx 339 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s))
tctx 342 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h))
tctx 348 source4/torture/rpc/svcctl.c static bool test_ControlService(struct torture_context *tctx,
tctx 355 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h))
tctx 358 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx 365 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx,
tctx 366 source4/torture/rpc/svcctl.c dcerpc_svcctl_ControlService(p, tctx, &r),
tctx 368 source4/torture/rpc/svcctl.c torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
tctx 371 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s))
tctx 374 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h))
tctx 380 source4/torture/rpc/svcctl.c static bool test_EnumServicesStatus(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 391 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h))
tctx 404 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_EnumServicesStatusW(p, tctx, &r);
tctx 406 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "EnumServicesStatus failed!");
tctx 410 source4/torture/rpc/svcctl.c r.out.service = talloc_array(tctx, uint8_t, needed);
tctx 412 source4/torture/rpc/svcctl.c status = dcerpc_svcctl_EnumServicesStatusW(p, tctx, &r);
tctx 414 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx, status, "EnumServicesStatus failed!");
tctx 415 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result, "EnumServicesStatus failed");
tctx 425 source4/torture/rpc/svcctl.c blob.data = talloc_steal(tctx, r.out.service);
tctx 427 source4/torture/rpc/svcctl.c ndr = ndr_pull_init_blob(&blob, tctx, lp_iconv_convenience(tctx->lp_ctx));
tctx 429 source4/torture/rpc/svcctl.c service = talloc_array(tctx, struct ENUM_SERVICE_STATUSW, services_returned);
tctx 443 source4/torture/rpc/svcctl.c torture_assert(tctx, service[i].service_name,
tctx 451 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h))
tctx 457 source4/torture/rpc/svcctl.c static bool test_EnumDependentServicesW(struct torture_context *tctx,
tctx 469 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h))
tctx 472 source4/torture/rpc/svcctl.c if (!test_OpenService(p, tctx, &h, TORTURE_DEFAULT_SERVICE, &s))
tctx 482 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx,
tctx 483 source4/torture/rpc/svcctl.c dcerpc_svcctl_EnumDependentServicesW(p, tctx, &r),
tctx 486 source4/torture/rpc/svcctl.c torture_assert_werr_equal(tctx, r.out.result, WERR_INVALID_PARAM,
tctx 493 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx,
tctx 494 source4/torture/rpc/svcctl.c dcerpc_svcctl_EnumDependentServicesW(p, tctx, &r),
tctx 499 source4/torture/rpc/svcctl.c r.out.service_status = talloc_array(tctx, uint8_t, needed);
tctx 501 source4/torture/rpc/svcctl.c torture_assert_ntstatus_ok(tctx,
tctx 502 source4/torture/rpc/svcctl.c dcerpc_svcctl_EnumDependentServicesW(p, tctx, &r),
tctx 507 source4/torture/rpc/svcctl.c torture_assert_werr_ok(tctx, r.out.result,
tctx 511 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &s))
tctx 514 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h))
tctx 520 source4/torture/rpc/svcctl.c static bool test_SCManager(struct torture_context *tctx,
tctx 525 source4/torture/rpc/svcctl.c if (!test_OpenSCManager(p, tctx, &h))
tctx 528 source4/torture/rpc/svcctl.c if (!test_CloseServiceHandle(p, tctx, &h))
tctx 309 source4/torture/rpc/testjoin.c _PUBLIC_ struct test_join *torture_join_domain(struct torture_context *tctx,
tctx 321 source4/torture/rpc/testjoin.c tj = talloc(tctx, struct test_join);
tctx 330 source4/torture/rpc/testjoin.c libnet_ctx = libnet_context_init(tctx->ev, tctx->lp_ctx);
tctx 339 source4/torture/rpc/testjoin.c libnet_r->in.binding = torture_setting_string(tctx, "binding", NULL);
tctx 341 source4/torture/rpc/testjoin.c libnet_r->in.binding = talloc_asprintf(libnet_r, "ncacn_np:%s", torture_setting_string(tctx, "host", NULL));
tctx 394 source4/torture/rpc/testjoin.c lp_netbios_name(tctx->lp_ctx), timestring(tj, time(NULL)));
tctx 402 source4/torture/rpc/testjoin.c cli_credentials_set_conf(*machine_credentials, tctx->lp_ctx);
tctx 30 source4/torture/rpc/unixinfo.c static bool test_sidtouid(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 37 source4/torture/rpc/unixinfo.c sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-5432");
tctx 41 source4/torture/rpc/unixinfo.c status = dcerpc_unixinfo_SidToUid(p, tctx, &r);
tctx 43 source4/torture/rpc/unixinfo.c } else torture_assert_ntstatus_ok(tctx, status, "SidToUid failed");
tctx 51 source4/torture/rpc/unixinfo.c static bool test_uidtosid(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 59 source4/torture/rpc/unixinfo.c torture_assert_ntstatus_ok(tctx, dcerpc_unixinfo_UidToSid(p, tctx, &r),
tctx 65 source4/torture/rpc/unixinfo.c static bool test_getpwuid(struct torture_context *tctx,
tctx 81 source4/torture/rpc/unixinfo.c r.out.infos = talloc_array(tctx, struct unixinfo_GetPWUidInfo, num_uids);
tctx 83 source4/torture/rpc/unixinfo.c result = dcerpc_unixinfo_GetPWUid(p, tctx, &r);
tctx 85 source4/torture/rpc/unixinfo.c torture_assert_ntstatus_ok(tctx, result, "GetPWUid failed");
tctx 93 source4/torture/rpc/unixinfo.c static bool test_sidtogid(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 100 source4/torture/rpc/unixinfo.c sid = dom_sid_parse_talloc(tctx, "S-1-5-32-1234-5432");
tctx 104 source4/torture/rpc/unixinfo.c status = dcerpc_unixinfo_SidToGid(p, tctx, &r);
tctx 106 source4/torture/rpc/unixinfo.c } else torture_assert_ntstatus_ok(tctx, status, "SidToGid failed");
tctx 114 source4/torture/rpc/unixinfo.c static bool test_gidtosid(struct torture_context *tctx, struct dcerpc_pipe *p)
tctx 122 source4/torture/rpc/unixinfo.c torture_assert_ntstatus_ok(tctx, dcerpc_unixinfo_GidToSid(p, tctx, &r),
tctx 59 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 69 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_GetVersion(p, tctx, &r),
tctx 72 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "GetVersion failed");
tctx 78 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 91 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx,
tctx 92 source4/torture/rpc/winreg.c dcerpc_winreg_NotifyChangeKeyValue(p, tctx, &r),
tctx 96 source4/torture/rpc/winreg.c torture_comment(tctx,
tctx 105 source4/torture/rpc/winreg.c static bool test_CreateKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 123 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_CreateKey(p, tctx, &r),
tctx 126 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "CreateKey failed");
tctx 136 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 147 source4/torture/rpc/winreg.c sd = security_descriptor_dacl_create(tctx,
tctx 157 source4/torture/rpc/winreg.c torture_assert_ndr_success(tctx,
tctx 158 source4/torture/rpc/winreg.c ndr_push_struct_blob(&sdblob, tctx, NULL, sd,
tctx 178 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_CreateKey(p, tctx, &r),
tctx 181 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "CreateKey with sd failed");
tctx 187 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 208 source4/torture/rpc/winreg.c r.in.sd = r.out.sd = talloc_zero(tctx, struct KeySecurityData);
tctx 211 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx,
tctx 212 source4/torture/rpc/winreg.c dcerpc_winreg_GetKeySecurity(p, tctx, &r),
tctx 215 source4/torture/rpc/winreg.c torture_assert_werr_equal(tctx, r.out.result, get_werr,
tctx 221 source4/torture/rpc/winreg.c sd = talloc_zero(tctx, struct security_descriptor);
tctx 223 source4/torture/rpc/winreg.c torture_assert_ndr_success(tctx,
tctx 224 source4/torture/rpc/winreg.c ndr_pull_struct_blob(&sdblob, tctx, NULL, sd,
tctx 242 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 246 source4/torture/rpc/winreg.c return _test_GetKeySecurity(p, tctx, handle, NULL, WERR_OK, sd_out);
tctx 250 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 267 source4/torture/rpc/winreg.c torture_assert_ndr_success(tctx,
tctx 268 source4/torture/rpc/winreg.c ndr_push_struct_blob(&sdblob, tctx, NULL, sd,
tctx 272 source4/torture/rpc/winreg.c sdata = talloc_zero(tctx, struct KeySecurityData);
tctx 300 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx,
tctx 301 source4/torture/rpc/winreg.c dcerpc_winreg_SetKeySecurity(p, tctx, &r),
tctx 304 source4/torture/rpc/winreg.c torture_assert_werr_equal(tctx, r.out.result, werr,
tctx 311 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 315 source4/torture/rpc/winreg.c return _test_SetKeySecurity(p, tctx, handle, NULL, sd, WERR_OK);
tctx 318 source4/torture/rpc/winreg.c static bool test_CloseKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 326 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_CloseKey(p, tctx, &r),
tctx 329 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "CloseKey failed");
tctx 334 source4/torture/rpc/winreg.c static bool test_FlushKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 342 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_FlushKey(p, tctx, &r),
tctx 345 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "FlushKey failed");
tctx 350 source4/torture/rpc/winreg.c static bool _test_OpenKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 366 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, dcerpc_winreg_OpenKey(p, tctx, &r),
tctx 369 source4/torture/rpc/winreg.c torture_assert_werr_equal(tctx, r.out.result, open_werr,
tctx 379 source4/torture/rpc/winreg.c static bool test_OpenKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 383 source4/torture/rpc/winreg.c return _test_OpenKey(p, tctx, hive_handle, keyname,
tctx 388 source4/torture/rpc/winreg.c static bool test_Cleanup(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 397 source4/torture/rpc/winreg.c dcerpc_winreg_DeleteKey(p, tctx, &r);
tctx 403 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 410 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, NULL, get_werr, &sd)) {
tctx 414 source4/torture/rpc/winreg.c if (!_test_SetKeySecurity(p, tctx, handle, NULL, sd, set_werr)) {
tctx 422 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 429 source4/torture/rpc/winreg.c torture_comment(tctx, "SecurityDescriptor get & set\n");
tctx 431 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx 435 source4/torture/rpc/winreg.c if (!_test_GetSetSecurityDescriptor(p, tctx, &new_handle,
tctx 440 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) {
tctx 448 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 460 source4/torture/rpc/winreg.c if (!_test_OpenKey(p, tctx, handle, key, access_mask, &new_handle,
tctx 469 source4/torture/rpc/winreg.c if (!_test_GetSetSecurityDescriptor(p, tctx, &new_handle,
tctx 474 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) {
tctx 482 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 489 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) {
tctx 507 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 515 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx 519 source4/torture/rpc/winreg.c ret = test_dacl_trustee_present(p, tctx, &new_handle, sid);
tctx 521 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle);
tctx 527 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 535 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) {
tctx 553 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 561 source4/torture/rpc/winreg.c if (!_test_OpenKey(p, tctx, handle, key, SEC_FLAG_SYSTEM_SECURITY,
tctx 566 source4/torture/rpc/winreg.c ret = test_sacl_trustee_present(p, tctx, &new_handle, sid);
tctx 568 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle);
tctx 574 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 581 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) {
tctx 593 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 601 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx 605 source4/torture/rpc/winreg.c ret = test_owner_present(p, tctx, &new_handle, sid);
tctx 607 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle);
tctx 613 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 620 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) {
tctx 632 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 640 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx 644 source4/torture/rpc/winreg.c ret = test_group_present(p, tctx, &new_handle, sid);
tctx 646 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle);
tctx 652 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 660 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) {
tctx 679 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 686 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) {
tctx 704 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 712 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx 716 source4/torture/rpc/winreg.c if (!test_SetKeySecurity(p, tctx, &new_handle, sd)) {
tctx 720 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) {
tctx 728 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 736 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx 740 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, &new_handle, sd)) {
tctx 744 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) {
tctx 752 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 779 source4/torture/rpc/winreg.c torture_comment(tctx, "SecurityDescriptor inheritance\n");
tctx 781 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx 785 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, &new_handle, NULL, WERR_OK, &sd)) {
tctx 789 source4/torture/rpc/winreg.c sd_orig = security_descriptor_copy(tctx, sd);
tctx 794 source4/torture/rpc/winreg.c ace = security_ace_create(tctx,
tctx 810 source4/torture/rpc/winreg.c if (!test_SetKeySecurity(p, tctx, &new_handle, sd)) {
tctx 814 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx 819 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) {
tctx 823 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, handle, TEST_SUBKEY_SD, NULL)) {
tctx 828 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, TEST_SUBKEY_SD, &new_handle)) {
tctx 833 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx 839 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle);
tctx 840 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, handle, TEST_SUBSUBKEY_SD, NULL)) {
tctx 845 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, TEST_SUBSUBKEY_SD, &new_handle)) {
tctx 850 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx 857 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle);
tctx 858 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, handle, TEST_SUBKEY_SD);
tctx 859 source4/torture/rpc/winreg.c test_RestoreSecurity(p, tctx, handle, key, sd_orig);
tctx 865 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 891 source4/torture/rpc/winreg.c torture_comment(tctx, "SecurityDescriptor inheritance block\n");
tctx 893 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, key, &new_handle)) {
tctx 897 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, &new_handle, NULL, WERR_OK, &sd)) {
tctx 901 source4/torture/rpc/winreg.c sd_orig = security_descriptor_copy(tctx, sd);
tctx 906 source4/torture/rpc/winreg.c ace = security_ace_create(tctx,
tctx 919 source4/torture/rpc/winreg.c if (!_test_SetKeySecurity(p, tctx, &new_handle, NULL, sd, WERR_OK)) {
tctx 923 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx 928 source4/torture/rpc/winreg.c if (!test_CloseKey(p, tctx, &new_handle)) {
tctx 932 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, handle, TEST_SUBSUBKEY_SD, NULL)) {
tctx 936 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, TEST_SUBSUBKEY_SD, &new_handle)) {
tctx 941 source4/torture/rpc/winreg.c if (test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx 947 source4/torture/rpc/winreg.c sid = dom_sid_parse_talloc(tctx, TEST_SID);
tctx 952 source4/torture/rpc/winreg.c if (test_dacl_trustee_present(p, tctx, &new_handle, sid)) {
tctx 958 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle);
tctx 960 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, TEST_SUBKEY_SD, &new_handle)) {
tctx 965 source4/torture/rpc/winreg.c if (test_dacl_ace_present(p, tctx, &new_handle, ace)) {
tctx 971 source4/torture/rpc/winreg.c if (!test_dacl_trustee_flags_present(p, tctx, &new_handle, sid, ace_flags)) {
tctx 979 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle);
tctx 980 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, handle, TEST_SUBKEY_SD);
tctx 981 source4/torture/rpc/winreg.c test_RestoreSecurity(p, tctx, handle, key, sd_orig);
tctx 987 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 1019 source4/torture/rpc/winreg.c torture_comment(tctx,
tctx 1022 source4/torture/rpc/winreg.c torture_comment(tctx,
tctx 1028 source4/torture/rpc/winreg.c if (_test_SecurityDescriptor(p, tctx, handle,
tctx 1047 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 1066 source4/torture/rpc/winreg.c torture_comment(tctx, "SecurityDescriptor (%s) sets for secinfo: "
tctx 1070 source4/torture/rpc/winreg.c if (!_test_OpenKey(p, tctx, handle, key,
tctx 1080 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle);
tctx 1084 source4/torture/rpc/winreg.c if (!_test_SetKeySecurity(p, tctx, &new_handle, &sec_info,
tctx 1087 source4/torture/rpc/winreg.c torture_warning(tctx,
tctx 1091 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle);
tctx 1095 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, &new_handle);
tctx 1099 source4/torture/rpc/winreg.c present = fn(p, tctx, handle, key, sid);
tctx 1101 source4/torture/rpc/winreg.c torture_warning(tctx,
tctx 1107 source4/torture/rpc/winreg.c torture_warning(tctx,
tctx 1118 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 1128 source4/torture/rpc/winreg.c security_descriptor_dacl_create(tctx,
tctx 1133 source4/torture/rpc/winreg.c security_descriptor_dacl_create(tctx,
tctx 1138 source4/torture/rpc/winreg.c security_descriptor_dacl_create(tctx,
tctx 1152 source4/torture/rpc/winreg.c security_descriptor_sacl_create(tctx,
tctx 1231 source4/torture/rpc/winreg.c sid = dom_sid_parse_talloc(tctx, TEST_SID);
tctx 1236 source4/torture/rpc/winreg.c if (!test_BackupSecurity(p, tctx, handle, key, &sd_orig)) {
tctx 1246 source4/torture/rpc/winreg.c if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle,
tctx 1270 source4/torture/rpc/winreg.c if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle,
tctx 1294 source4/torture/rpc/winreg.c if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle,
tctx 1318 source4/torture/rpc/winreg.c if (!test_SetSecurityDescriptor_SecInfo(p, tctx, handle,
tctx 1337 source4/torture/rpc/winreg.c test_RestoreSecurity(p, tctx, handle, key, sd_orig);
tctx 1343 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 1349 source4/torture/rpc/winreg.c if (!test_SecurityDescriptor(p, tctx, handle, key)) {
tctx 1354 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorInheritance(p, tctx, handle, key)) {
tctx 1359 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorBlockInheritance(p, tctx, handle, key)) {
tctx 1364 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorsSecInfo(p, tctx, handle, key)) {
tctx 1369 source4/torture/rpc/winreg.c if (!test_SecurityDescriptorsMasks(p, tctx, handle, key)) {
tctx 1377 source4/torture/rpc/winreg.c static bool test_DeleteKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1386 source4/torture/rpc/winreg.c status = dcerpc_winreg_DeleteKey(p, tctx, &r);
tctx 1388 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, status, "DeleteKey failed");
tctx 1389 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "DeleteKey failed");
tctx 1395 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 1415 source4/torture/rpc/winreg.c r.out.classname = talloc(tctx, struct winreg_String);
tctx 1417 source4/torture/rpc/winreg.c r.in.classname = talloc(tctx, struct winreg_String);
tctx 1420 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx,
tctx 1421 source4/torture/rpc/winreg.c dcerpc_winreg_QueryInfoKey(p, tctx, &r),
tctx 1424 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "QueryInfoKey failed");
tctx 1429 source4/torture/rpc/winreg.c static bool test_key(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1433 source4/torture/rpc/winreg.c static bool test_EnumKey(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1457 source4/torture/rpc/winreg.c status = dcerpc_winreg_EnumKey(p, tctx, &r);
tctx 1462 source4/torture/rpc/winreg.c torture_comment(tctx, "EnumKey: %d: %s\n",
tctx 1466 source4/torture/rpc/winreg.c if (!test_OpenKey(p, tctx, handle, r.out.name->name,
tctx 1469 source4/torture/rpc/winreg.c test_key(p, tctx, &key_handle,
tctx 1478 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, status, "EnumKey failed");
tctx 1482 source4/torture/rpc/winreg.c torture_fail(tctx, "EnumKey failed");
tctx 1489 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 1499 source4/torture/rpc/winreg.c r.in.values = r.out.values = talloc_array(tctx, struct QueryMultipleValue, 1);
tctx 1500 source4/torture/rpc/winreg.c r.in.values[0].name = talloc(tctx, struct winreg_String);
tctx 1507 source4/torture/rpc/winreg.c r.in.buffer_size = r.out.buffer_size = talloc(tctx, uint32_t);
tctx 1511 source4/torture/rpc/winreg.c r.in.buffer = r.out.buffer = talloc_zero_array(tctx, uint8_t,
tctx 1514 source4/torture/rpc/winreg.c status = dcerpc_winreg_QueryMultipleValues(p, tctx, &r);
tctx 1517 source4/torture/rpc/winreg.c torture_fail(tctx, "QueryMultipleValues failed");
tctx 1523 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "QueryMultipleValues failed");
tctx 1529 source4/torture/rpc/winreg.c struct torture_context *tctx,
tctx 1542 source4/torture/rpc/winreg.c r.in.value_name = talloc_zero(tctx, struct winreg_String);
tctx 1548 source4/torture/rpc/winreg.c status = dcerpc_winreg_QueryValue(p, tctx, &r);
tctx 1550 source4/torture/rpc/winreg.c torture_fail(tctx, "QueryValue failed");
tctx 1553 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result, "QueryValue failed");
tctx 1558 source4/torture/rpc/winreg.c static bool test_EnumValue(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1583 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx,
tctx 1584 source4/torture/rpc/winreg.c dcerpc_winreg_EnumValue(p, tctx, &r),
tctx 1588 source4/torture/rpc/winreg.c ret &= test_QueryValue(p, tctx, handle,
tctx 1590 source4/torture/rpc/winreg.c ret &= test_QueryMultipleValues(p, tctx, handle,
tctx 1597 source4/torture/rpc/winreg.c torture_assert_werr_equal(tctx, r.out.result, WERR_NO_MORE_ITEMS,
tctx 1604 source4/torture/rpc/winreg.c struct torture_context *tctx)
tctx 1612 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx,
tctx 1613 source4/torture/rpc/winreg.c dcerpc_winreg_AbortSystemShutdown(p, tctx, &r),
tctx 1616 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result,
tctx 1622 source4/torture/rpc/winreg.c static bool test_InitiateSystemShutdown(struct torture_context *tctx,
tctx 1630 source4/torture/rpc/winreg.c r.in.message = talloc(tctx, struct lsa_StringLarge);
tctx 1636 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx,
tctx 1637 source4/torture/rpc/winreg.c dcerpc_winreg_InitiateSystemShutdown(p, tctx, &r),
tctx 1640 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result,
tctx 1643 source4/torture/rpc/winreg.c return test_AbortSystemShutdown(p, tctx);
tctx 1647 source4/torture/rpc/winreg.c static bool test_InitiateSystemShutdownEx(struct torture_context *tctx,
tctx 1655 source4/torture/rpc/winreg.c r.in.message = talloc(tctx, struct lsa_StringLarge);
tctx 1662 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx,
tctx 1663 source4/torture/rpc/winreg.c dcerpc_winreg_InitiateSystemShutdownEx(p, tctx, &r),
tctx 1666 source4/torture/rpc/winreg.c torture_assert_werr_ok(tctx, r.out.result,
tctx 1669 source4/torture/rpc/winreg.c return test_AbortSystemShutdown(p, tctx);
tctx 1673 source4/torture/rpc/winreg.c static bool test_key(struct dcerpc_pipe *p, struct torture_context *tctx,
tctx 1680 source4/torture/rpc/winreg.c if (!test_QueryInfoKey(p, tctx, handle, NULL)) {
tctx 1683 source4/torture/rpc/winreg.c if (!test_NotifyChangeKeyValue(p, tctx, handle)) {
tctx 1686 source4/torture/rpc/winreg.c if (test_security && !test_GetKeySecurity(p, tctx, handle, NULL)) {
tctx 1689 source4/torture/rpc/winreg.c if (!test_EnumKey(p, tctx, handle, depth, test_security)) {
tctx 1692 source4/torture/rpc/winreg.c if (!test_EnumValue(p, tctx, handle, 0xFF, 0xFFFF)) {
tctx 1695 source4/torture/rpc/winreg.c test_CloseKey(p, tctx, handle);
tctx 1702 source4/torture/rpc/winreg.c static bool test_Open_Security(struct torture_context *tctx,
tctx 1717 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, open_fn(p, tctx, &r),
tctx 1720 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, &handle, TEST_KEY_BASE);
tctx 1722 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, &handle, TEST_KEY_BASE, NULL)) {
tctx 1723 source4/torture/rpc/winreg.c torture_comment(tctx,
tctx 1727 source4/torture/rpc/winreg.c if (test_CreateKey_sd(p, tctx, &handle, TEST_KEY2,
tctx 1732 source4/torture/rpc/winreg.c if (created2 && !test_CloseKey(p, tctx, &newhandle)) {
tctx 1737 source4/torture/rpc/winreg.c if (test_CreateKey_sd(p, tctx, &handle, TEST_KEY4, NULL, &newhandle)) {
tctx 1741 source4/torture/rpc/winreg.c if (created4 && !test_CloseKey(p, tctx, &newhandle)) {
tctx 1746 source4/torture/rpc/winreg.c if (created4 && !test_SecurityDescriptors(p, tctx, &handle, TEST_KEY4)) {
tctx 1750 source4/torture/rpc/winreg.c if (created4 && !test_DeleteKey(p, tctx, &handle, TEST_KEY4)) {
tctx 1755 source4/torture/rpc/winreg.c if (created2 && !test_DeleteKey(p, tctx, &handle, TEST_KEY2)) {
tctx 1762 source4/torture/rpc/winreg.c if(!test_key(p, tctx, &handle, MAX_DEPTH - 1, true)) {
tctx 1766 source4/torture/rpc/winreg.c if (!test_key(p, tctx, &handle, 0, true)) {
tctx 1771 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, &handle, TEST_KEY_BASE);
tctx 1776 source4/torture/rpc/winreg.c static bool test_Open(struct torture_context *tctx, struct dcerpc_pipe *p,
tctx 1791 source4/torture/rpc/winreg.c torture_assert_ntstatus_ok(tctx, open_fn(p, tctx, &r),
tctx 1794 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, &handle, TEST_KEY_BASE);
tctx 1796 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, &handle, TEST_KEY_BASE, NULL)) {
tctx 1797 source4/torture/rpc/winreg.c torture_comment(tctx,
tctx 1801 source4/torture/rpc/winreg.c if (!test_CreateKey(p, tctx, &handle, TEST_KEY1, NULL)) {
tctx 1802 source4/torture/rpc/winreg.c torture_comment(tctx,
tctx 1808 source4/torture/rpc/winreg.c if (created && !test_FlushKey(p, tctx, &handle)) {
tctx 1809 source4/torture/rpc/winreg.c torture_comment(tctx, "FlushKey failed\n");
tctx 1813 source4/torture/rpc/winreg.c if (created && !test_OpenKey(p, tctx, &handle, TEST_KEY1, &newhandle))
tctx 1814 source4/torture/rpc/winreg.c torture_fail(tctx,
tctx 1817 source4/torture/rpc/winreg.c if (created && !test_CloseKey(p, tctx, &newhandle))
tctx 1818 source4/torture/rpc/winreg.c torture_fail(tctx,
tctx 1821 source4/torture/rpc/winreg.c if (created && !test_DeleteKey(p, tctx, &handle, TEST_KEY1)) {
tctx 1822 source4/torture/rpc/winreg.c torture_comment(tctx, "DeleteKey failed\n");
tctx 1828 source4/torture/rpc/winreg.c if (created && !test_FlushKey(p, tctx, &handle)) {
tctx 1829 source4/torture/rpc/winreg.c torture_comment(tctx, "FlushKey failed\n");
tctx 1834 source4/torture/rpc/winreg.c !_test_OpenKey(p, tctx, &handle, TEST_KEY1,
tctx 1837 source4/torture/rpc/winreg.c torture_comment(tctx,
tctx 1843 source4/torture/rpc/winreg.c if (!test_GetVersion(p, tctx, &handle)) {
tctx 1844 source4/torture/rpc/winreg.c torture_comment(tctx, "GetVersion failed\n");
tctx 1848 source4/torture/rpc/winreg.c if (created && test_CreateKey(p, tctx, &handle, TEST_KEY3, NULL)) {
tctx 1853 source4/torture/rpc/winreg.c test_CreateKey(p, tctx, &handle, TEST_SUBKEY, NULL)) {
tctx 1858 source4/torture/rpc/winreg.c !test_DeleteKey(p, tctx, &handle, TEST_KEY3)) {
tctx 1865 source4/torture/rpc/winreg.c if(!test_key(p, tctx, &handle, MAX_DEPTH - 1, false)) {
tctx 1869 source4/torture/rpc/winreg.c if (!test_key(p, tctx, &handle, 0, false)) {
tctx 1874 source4/torture/rpc/winreg.c test_Cleanup(p, tctx, &handle, TEST_KEY_BASE);
tctx 37 source4/torture/rpc/wkssvc.c static bool test_NetWkstaGetInfo(struct torture_context *tctx,
tctx 51 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetWkstaGetInfo level %u\n",
tctx 53 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetWkstaGetInfo(p, tctx, &r);
tctx 54 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 55 source4/torture/rpc/wkssvc.c talloc_asprintf(tctx, "NetWkstaGetInfo level %u failed",
tctx 57 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 58 source4/torture/rpc/wkssvc.c talloc_asprintf(tctx, "NetWkstaGetInfo level %u failed",
tctx 65 source4/torture/rpc/wkssvc.c static bool test_NetWkstaTransportEnum(struct torture_context *tctx,
tctx 90 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetWkstaTransportEnum level 0\n");
tctx 92 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetWkstaTransportEnum(p, tctx, &r);
tctx 93 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 95 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result, talloc_asprintf(tctx,
tctx 102 source4/torture/rpc/wkssvc.c static bool test_NetrWkstaTransportAdd(struct torture_context *tctx,
tctx 123 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrWkstaTransportAdd level 0\n");
tctx 125 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrWkstaTransportAdd(p, tctx, &r);
tctx 126 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 128 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result,
tctx 135 source4/torture/rpc/wkssvc.c static bool test_NetrWkstaTransportDel(struct torture_context *tctx,
tctx 145 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrWkstaTransportDel\n");
tctx 147 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrWkstaTransportDel(p, tctx, &r);
tctx 148 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 150 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 156 source4/torture/rpc/wkssvc.c static bool test_NetWkstaEnumUsers(struct torture_context *tctx,
tctx 176 source4/torture/rpc/wkssvc.c user0 = talloc_zero(tctx,
tctx 181 source4/torture/rpc/wkssvc.c user1 = talloc_zero(tctx,
tctx 196 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetWkstaEnumUsers level %u\n",
tctx 199 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetWkstaEnumUsers(p, tctx, &r);
tctx 200 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 202 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 209 source4/torture/rpc/wkssvc.c static bool test_NetrWkstaUserGetInfo(struct torture_context *tctx,
tctx 215 source4/torture/rpc/wkssvc.c const char *dom = lp_workgroup(tctx->lp_ctx);
tctx 241 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrWkstaUserGetInfo level %u\n",
tctx 244 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrWkstaUserGetInfo(p, tctx, &r);
tctx 245 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 247 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result,
tctx 255 source4/torture/rpc/wkssvc.c static bool test_NetrUseEnum(struct torture_context *tctx,
tctx 276 source4/torture/rpc/wkssvc.c use0 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr0);
tctx 280 source4/torture/rpc/wkssvc.c use1 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr1);
tctx 284 source4/torture/rpc/wkssvc.c use2 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr2);
tctx 291 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 298 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUseEnum level %u\n",
tctx 301 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseEnum(p, tctx, &r);
tctx 302 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 304 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 311 source4/torture/rpc/wkssvc.c static bool test_NetrUseAdd(struct torture_context *tctx,
tctx 321 source4/torture/rpc/wkssvc.c ctr = talloc(tctx, union wkssvc_NetrUseGetInfoCtr);
tctx 330 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 335 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUseAdd level %u\n",
tctx 338 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseAdd(p, tctx, &r);
tctx 339 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 341 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_UNKNOWN_LEVEL,
tctx 353 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 358 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUseAdd level %u\n",
tctx 361 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseAdd(p, tctx, &r);
tctx 362 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 364 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 370 source4/torture/rpc/wkssvc.c static bool test_NetrUseDel(struct torture_context *tctx,
tctx 376 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 380 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUseDel\n");
tctx 382 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseDel(p, tctx, &r);
tctx 383 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 385 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 390 source4/torture/rpc/wkssvc.c static bool test_NetrUseGetInfo_level(struct torture_context *tctx,
tctx 402 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 406 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseGetInfo(p, tctx, &r);
tctx 408 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 410 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, werr,
tctx 415 source4/torture/rpc/wkssvc.c static bool test_NetrUseGetInfo(struct torture_context *tctx,
tctx 431 source4/torture/rpc/wkssvc.c use0 = talloc_zero(tctx, struct wkssvc_NetrUseEnumCtr0);
tctx 434 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 440 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUseEnum(p, tctx, &r);
tctx 441 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 443 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 452 source4/torture/rpc/wkssvc.c if (!test_NetrUseGetInfo_level(tctx, p, use_name,
tctx 466 source4/torture/rpc/wkssvc.c if (!test_NetrUseGetInfo_level(tctx, p, use_name,
tctx 480 source4/torture/rpc/wkssvc.c static bool test_NetrLogonDomainNameAdd(struct torture_context *tctx,
tctx 486 source4/torture/rpc/wkssvc.c r.in.domain_name = lp_workgroup(tctx->lp_ctx);
tctx 488 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrLogonDomainNameAdd\n");
tctx 490 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrLogonDomainNameAdd(p, tctx, &r);
tctx 491 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 493 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED,
tctx 498 source4/torture/rpc/wkssvc.c static bool test_NetrLogonDomainNameDel(struct torture_context *tctx,
tctx 504 source4/torture/rpc/wkssvc.c r.in.domain_name = lp_workgroup(tctx->lp_ctx);
tctx 506 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrLogonDomainNameDel\n");
tctx 508 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrLogonDomainNameDel(p, tctx, &r);
tctx 509 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 511 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED,
tctx 516 source4/torture/rpc/wkssvc.c static bool test_NetrEnumerateComputerNames_level(struct torture_context *tctx,
tctx 527 source4/torture/rpc/wkssvc.c ctr = talloc_zero(tctx, struct wkssvc_ComputerNamesCtr);
tctx 534 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrEnumerateComputerNames level %u\n",
tctx 537 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrEnumerateComputerNames(p, tctx, &r);
tctx 538 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 540 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 544 source4/torture/rpc/wkssvc.c torture_comment(tctx,
tctx 554 source4/torture/rpc/wkssvc.c if (!add_string_to_array(tctx,
tctx 567 source4/torture/rpc/wkssvc.c static bool test_NetrEnumerateComputerNames(struct torture_context *tctx,
tctx 575 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx,
tctx 587 source4/torture/rpc/wkssvc.c static bool test_NetrValidateName(struct torture_context *tctx,
tctx 597 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 598 source4/torture/rpc/wkssvc.c r.in.name = lp_workgroup(tctx->lp_ctx);
tctx 603 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrValidateName level %u\n",
tctx 606 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrValidateName(p, tctx, &r);
tctx 607 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 609 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result,
tctx 617 source4/torture/rpc/wkssvc.c static bool test_NetrValidateName2(struct torture_context *tctx,
tctx 627 source4/torture/rpc/wkssvc.c r.in.server_name = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
tctx 628 source4/torture/rpc/wkssvc.c r.in.name = lp_workgroup(tctx->lp_ctx);
tctx 633 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrValidateName2 level %u\n",
tctx 636 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrValidateName2(p, tctx, &r);
tctx 637 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 639 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result,
tctx 647 source4/torture/rpc/wkssvc.c static bool test_NetrAddAlternateComputerName(struct torture_context *tctx,
tctx 662 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrAddAlternateComputerName\n");
tctx 664 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrAddAlternateComputerName(p, tctx, &r);
tctx 665 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 667 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 670 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx 683 source4/torture/rpc/wkssvc.c torture_comment(tctx, "new alternate name not set\n");
tctx 688 source4/torture/rpc/wkssvc.c static bool test_NetrRemoveAlternateComputerName(struct torture_context *tctx,
tctx 703 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrRemoveAlternateComputerName\n");
tctx 705 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrRemoveAlternateComputerName(p, tctx, &r);
tctx 706 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 708 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 711 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx 727 source4/torture/rpc/wkssvc.c static bool test_NetrSetPrimaryComputername_name(struct torture_context *tctx,
tctx 740 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrSetPrimaryComputername(p, tctx, &r);
tctx 741 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 743 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 749 source4/torture/rpc/wkssvc.c static bool test_NetrSetPrimaryComputername(struct torture_context *tctx,
tctx 767 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrSetPrimaryComputername\n");
tctx 769 source4/torture/rpc/wkssvc.c if (!test_NetrAddAlternateComputerName(tctx, p)) {
tctx 773 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx 784 source4/torture/rpc/wkssvc.c if (!test_NetrSetPrimaryComputername_name(tctx, p,
tctx 790 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx 802 source4/torture/rpc/wkssvc.c torture_comment(tctx,
tctx 808 source4/torture/rpc/wkssvc.c if (!test_NetrSetPrimaryComputername_name(tctx, p,
tctx 814 source4/torture/rpc/wkssvc.c if (!test_NetrRemoveAlternateComputerName(tctx, p)) {
tctx 822 source4/torture/rpc/wkssvc.c static bool test_NetrRenameMachineInDomain(struct torture_context *tctx,
tctx 834 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrRenameMachineInDomain\n");
tctx 836 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrRenameMachineInDomain(p, tctx, &r);
tctx 837 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 839 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED,
tctx 844 source4/torture/rpc/wkssvc.c static bool test_NetrRenameMachineInDomain2_name(struct torture_context *tctx,
tctx 857 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrRenameMachineInDomain2(p, tctx, &r);
tctx 858 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 860 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 865 source4/torture/rpc/wkssvc.c static bool test_NetrRenameMachineInDomain2(struct torture_context *tctx,
tctx 871 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrRenameMachineInDomain2\n");
tctx 873 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx 884 source4/torture/rpc/wkssvc.c if (!test_NetrRenameMachineInDomain2_name(tctx, p,
tctx 890 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx 902 source4/torture/rpc/wkssvc.c test_NetrRenameMachineInDomain2_name(tctx, p, names_o[0]);
tctx 907 source4/torture/rpc/wkssvc.c test_NetrRenameMachineInDomain2_name(tctx, p, names_o[0]);
tctx 911 source4/torture/rpc/wkssvc.c if (!test_NetrRenameMachineInDomain2_name(tctx, p, names_o[0]))
tctx 916 source4/torture/rpc/wkssvc.c if (!test_NetrEnumerateComputerNames_level(tctx, p,
tctx 934 source4/torture/rpc/wkssvc.c static bool test_NetrWorkstationStatisticsGet(struct torture_context *tctx,
tctx 943 source4/torture/rpc/wkssvc.c info = talloc_zero(tctx, struct wkssvc_NetrWorkstationStatistics);
tctx 948 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrWorkstationStatisticsGet\n");
tctx 950 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrWorkstationStatisticsGet(p, tctx, &r);
tctx 951 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 953 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 960 source4/torture/rpc/wkssvc.c static bool test_NetrMessageBufferSend(struct torture_context *tctx,
tctx 969 source4/torture/rpc/wkssvc.c push_ucs2_talloc(tctx, (void **)&msg, message, &size);
tctx 977 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrMessageBufferSend\n");
tctx 979 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrMessageBufferSend(p, tctx, &r);
tctx 980 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 982 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 987 source4/torture/rpc/wkssvc.c static bool test_NetrGetJoinInformation(struct torture_context *tctx,
tctx 999 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrGetJoinInformation\n");
tctx 1001 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrGetJoinInformation(p, tctx, &r);
tctx 1002 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 1004 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 1009 source4/torture/rpc/wkssvc.c static bool test_GetJoinInformation(struct torture_context *tctx,
tctx 1023 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrGetJoinInformation(p, tctx, &r);
tctx 1024 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 1026 source4/torture/rpc/wkssvc.c torture_assert_werr_ok(tctx, r.out.result,
tctx 1034 source4/torture/rpc/wkssvc.c *name = talloc_strdup(tctx, name_buffer);
tctx 1041 source4/torture/rpc/wkssvc.c static bool test_NetrGetJoinableOus(struct torture_context *tctx,
tctx 1050 source4/torture/rpc/wkssvc.c r.in.domain_name = lp_workgroup(tctx->lp_ctx);
tctx 1056 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrGetJoinableOus\n");
tctx 1058 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrGetJoinableOus(p, tctx, &r);
tctx 1059 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, "NetrGetJoinableOus failed");
tctx 1060 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result,
tctx 1067 source4/torture/rpc/wkssvc.c static bool test_NetrGetJoinableOus2(struct torture_context *tctx,
tctx 1076 source4/torture/rpc/wkssvc.c r.in.domain_name = lp_workgroup(tctx->lp_ctx);
tctx 1082 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrGetJoinableOus2\n");
tctx 1084 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrGetJoinableOus2(p, tctx, &r);
tctx 1085 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status, "NetrGetJoinableOus2 failed");
tctx 1086 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result,
tctx 1093 source4/torture/rpc/wkssvc.c static bool test_NetrUnjoinDomain(struct torture_context *tctx,
tctx 1102 source4/torture/rpc/wkssvc.c admin_account = talloc_asprintf(tctx, "%s\\%s",
tctx 1103 source4/torture/rpc/wkssvc.c lp_workgroup(tctx->lp_ctx),
tctx 1111 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUnjoinDomain\n");
tctx 1113 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUnjoinDomain(p, tctx, &r);
tctx 1114 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 1116 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED,
tctx 1121 source4/torture/rpc/wkssvc.c static bool test_NetrJoinDomain(struct torture_context *tctx,
tctx 1130 source4/torture/rpc/wkssvc.c admin_account = talloc_asprintf(tctx, "%s\\%s",
tctx 1131 source4/torture/rpc/wkssvc.c lp_workgroup(tctx->lp_ctx),
tctx 1135 source4/torture/rpc/wkssvc.c r.in.domain_name = lp_realm(tctx->lp_ctx);
tctx 1141 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrJoinDomain\n");
tctx 1143 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrJoinDomain(p, tctx, &r);
tctx 1144 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 1146 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, WERR_NOT_SUPPORTED,
tctx 1197 source4/torture/rpc/wkssvc.c static bool test_NetrJoinDomain2(struct torture_context *tctx,
tctx 1214 source4/torture/rpc/wkssvc.c if (!test_GetJoinInformation(tctx, p, &join_status, &join_name))
tctx 1231 source4/torture/rpc/wkssvc.c domain_admin_account = torture_setting_string(tctx, "domain_admin_account", NULL);
tctx 1233 source4/torture/rpc/wkssvc.c domain_admin_password = torture_setting_string(tctx, "domain_admin_password", NULL);
tctx 1235 source4/torture/rpc/wkssvc.c domain_name = torture_setting_string(tctx, "domain_name", NULL);
tctx 1240 source4/torture/rpc/wkssvc.c torture_comment(tctx, "not enough input parameter\n");
tctx 1249 source4/torture/rpc/wkssvc.c encode_wkssvc_join_password_buffer(tctx, domain_admin_password,
tctx 1260 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrJoinDomain2 (assuming non-DC)\n");
tctx 1262 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrJoinDomain2(p, tctx, &r);
tctx 1263 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 1265 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, expected_err,
tctx 1268 source4/torture/rpc/wkssvc.c if (!test_GetJoinInformation(tctx, p, &join_status, &join_name))
tctx 1274 source4/torture/rpc/wkssvc.c torture_comment(tctx,
tctx 1282 source4/torture/rpc/wkssvc.c static bool test_NetrUnjoinDomain2(struct torture_context *tctx,
tctx 1298 source4/torture/rpc/wkssvc.c if (!test_GetJoinInformation(tctx, p, &join_status, &join_name))
tctx 1315 source4/torture/rpc/wkssvc.c domain_admin_account = torture_setting_string(tctx, "domain_admin_account", NULL);
tctx 1317 source4/torture/rpc/wkssvc.c domain_admin_password = torture_setting_string(tctx, "domain_admin_password", NULL);
tctx 1321 source4/torture/rpc/wkssvc.c torture_comment(tctx, "not enough input parameter\n");
tctx 1330 source4/torture/rpc/wkssvc.c encode_wkssvc_join_password_buffer(tctx, domain_admin_password,
tctx 1338 source4/torture/rpc/wkssvc.c torture_comment(tctx, "testing NetrUnjoinDomain2 (assuming non-DC)\n");
tctx 1340 source4/torture/rpc/wkssvc.c status = dcerpc_wkssvc_NetrUnjoinDomain2(p, tctx, &r);
tctx 1341 source4/torture/rpc/wkssvc.c torture_assert_ntstatus_ok(tctx, status,
tctx 1343 source4/torture/rpc/wkssvc.c torture_assert_werr_equal(tctx, r.out.result, expected_err,
tctx 1346 source4/torture/rpc/wkssvc.c if (!test_GetJoinInformation(tctx, p, &join_status, &join_name))
tctx 1358 source4/torture/rpc/wkssvc.c torture_comment(tctx,
tctx 67 source4/torture/smb2/connect.c static NTSTATUS torture_smb2_write(struct torture_context *tctx, struct smb2_tree *tree, struct smb2_handle handle)
tctx 76 source4/torture/smb2/connect.c if (torture_setting_bool(tctx, "dangerous", false)) {
tctx 78 source4/torture/smb2/connect.c } else if (torture_setting_bool(tctx, "samba4", false)) {
tctx 80 source4/torture/smb2/getinfo.c static bool torture_smb2_fileinfo(struct torture_context *tctx, struct smb2_tree *tree)
tctx 34 source4/torture/smb2/maxwrite.c static NTSTATUS torture_smb2_write(struct torture_context *tctx,
tctx 46 source4/torture/smb2/maxwrite.c TALLOC_CTX *tmp_ctx = talloc_new(tctx);
tctx 31 source4/torture/smb2/oplocks.c torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got 0x%x - should be 0x%x\n", \
tctx 38 source4/torture/smb2/oplocks.c torture_result(tctx, TORTURE_FAIL, __location__": Incorrect status %s - should be %s", \
tctx 106 source4/torture/smb2/oplocks.c bool torture_smb2_oplock_batch1(struct torture_context *tctx,
tctx 109 source4/torture/smb2/oplocks.c TALLOC_CTX *mem_ctx = talloc_new(tctx);
tctx 31 source4/torture/smb2/persistent_handles.c torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s got 0x%x - should be 0x%x\n", \
tctx 38 source4/torture/smb2/persistent_handles.c torture_result(tctx, TORTURE_FAIL, __location__": Incorrect status %s - should be %s", \
tctx 48 source4/torture/smb2/persistent_handles.c bool torture_smb2_persistent_handles1(struct torture_context *tctx,
tctx 52 source4/torture/smb2/persistent_handles.c TALLOC_CTX *mem_ctx = talloc_new(tctx);
tctx 113 source4/torture/smb2/persistent_handles.c torture_comment(tctx, "position: %llu\n",
tctx 130 source4/torture/smb2/persistent_handles.c torture_comment(tctx, "position: %llu\n",
tctx 145 source4/torture/smb2/persistent_handles.c b = data_blob_talloc(tctx, NULL, 16);
tctx 173 source4/torture/smb2/persistent_handles.c torture_comment(tctx, "position: %llu\n",
tctx 267 source4/torture/smb2/util.c bool torture_smb2_connection(struct torture_context *tctx, struct smb2_tree **tree)
tctx 270 source4/torture/smb2/util.c const char *host = torture_setting_string(tctx, "host", NULL);
tctx 271 source4/torture/smb2/util.c const char *share = torture_setting_string(tctx, "share", NULL);
tctx 275 source4/torture/smb2/util.c lp_smbcli_options(tctx->lp_ctx, &options);
tctx 277 source4/torture/smb2/util.c status = smb2_connect(tctx, host,
tctx 278 source4/torture/smb2/util.c lp_smb_ports(tctx->lp_ctx),
tctx 280 source4/torture/smb2/util.c lp_resolve_context(tctx->lp_ctx),
tctx 282 source4/torture/smb2/util.c tctx->ev, &options,
tctx 283 source4/torture/smb2/util.c lp_socket_options(tctx->lp_ctx),
tctx 284 source4/torture/smb2/util.c lp_gensec_settings(tctx, tctx->lp_ctx)
tctx 208 source4/torture/smbiconv.c cd = smb_iconv_open_ex(tctx, to, from, lp_parm_bool(tctx->lp_ctx, NULL, "iconv", "native", true));
tctx 404 source4/torture/smbtorture.c static void run_shell(struct torture_context *tctx)
tctx 430 source4/torture/smbtorture.c lp_set_cmdline(tctx->lp_ctx, name, argv[2]);
tctx 443 source4/torture/smbtorture.c run_test(tctx, argv[1]);
tctx 51 source4/torture/unix/unix_info2.c static struct smbcli_state *connect_to_server(struct torture_context *tctx)
tctx 56 source4/torture/unix/unix_info2.c const char *host = torture_setting_string(tctx, "host", NULL);
tctx 57 source4/torture/unix/unix_info2.c const char *share = torture_setting_string(tctx, "share", NULL);
tctx 61 source4/torture/unix/unix_info2.c lp_smbcli_options(tctx->lp_ctx, &options);
tctx 62 source4/torture/unix/unix_info2.c lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx 64 source4/torture/unix/unix_info2.c status = smbcli_full_connection(tctx, &cli, host,
tctx 65 source4/torture/unix/unix_info2.c lp_smb_ports(tctx->lp_ctx),
tctx 66 source4/torture/unix/unix_info2.c share, NULL, lp_socket_options(tctx->lp_ctx),
tctx 68 source4/torture/unix/unix_info2.c lp_resolve_context(tctx->lp_ctx),
tctx 69 source4/torture/unix/unix_info2.c tctx->ev, &options, &session_options,
tctx 70 source4/torture/unix/unix_info2.c lp_iconv_convenience(tctx->lp_ctx),
tctx 71 source4/torture/unix/unix_info2.c lp_gensec_settings(tctx, tctx->lp_ctx));
tctx 71 source4/torture/unix/whoami.c static struct smbcli_state *connect_to_server(struct torture_context *tctx,
tctx 77 source4/torture/unix/whoami.c const char *host = torture_setting_string(tctx, "host", NULL);
tctx 78 source4/torture/unix/whoami.c const char *share = torture_setting_string(tctx, "share", NULL);
tctx 82 source4/torture/unix/whoami.c lp_smbcli_options(tctx->lp_ctx, &options);
tctx 83 source4/torture/unix/whoami.c lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx 85 source4/torture/unix/whoami.c status = smbcli_full_connection(tctx, &cli, host,
tctx 86 source4/torture/unix/whoami.c lp_smb_ports(tctx->lp_ctx),
tctx 87 source4/torture/unix/whoami.c share, NULL, lp_socket_options(tctx->lp_ctx),
tctx 88 source4/torture/unix/whoami.c creds, lp_resolve_context(tctx->lp_ctx),
tctx 89 source4/torture/unix/whoami.c tctx->ev, &options, &session_options,
tctx 90 source4/torture/unix/whoami.c lp_iconv_convenience(tctx->lp_ctx),
tctx 91 source4/torture/unix/whoami.c lp_gensec_settings(tctx, tctx->lp_ctx));
tctx 56 source4/torture/util.h struct torture_context *tctx,
tctx 62 source4/torture/util.h struct torture_context *tctx,
tctx 66 source4/torture/util.h struct torture_context *tctx,
tctx 68 source4/torture/util.h _PUBLIC_ bool torture_open_connection(struct smbcli_state **c, struct torture_context *tctx, int conn_index);
tctx 72 source4/torture/util.h double torture_create_procs(struct torture_context *tctx,
tctx 470 source4/torture/util_smb.c struct torture_context *tctx,
tctx 480 source4/torture/util_smb.c lp_smbcli_options(tctx->lp_ctx, &options);
tctx 481 source4/torture/util_smb.c lp_smbcli_session_options(tctx->lp_ctx, &session_options);
tctx 483 source4/torture/util_smb.c options.use_oplocks = torture_setting_bool(tctx, "use_oplocks", true);
tctx 484 source4/torture/util_smb.c options.use_level2_oplocks = torture_setting_bool(tctx, "use_level2_oplocks", true);
tctx 487 source4/torture/util_smb.c lp_smb_ports(tctx->lp_ctx),
tctx 489 source4/torture/util_smb.c lp_socket_options(tctx->lp_ctx),
tctx 491 source4/torture/util_smb.c lp_resolve_context(tctx->lp_ctx),
tctx 493 source4/torture/util_smb.c lp_iconv_convenience(tctx->lp_ctx),
tctx 494 source4/torture/util_smb.c lp_gensec_settings(tctx, tctx->lp_ctx));
tctx 505 source4/torture/util_smb.c struct torture_context *tctx,
tctx 512 source4/torture/util_smb.c (*host) = talloc_strdup(mem_ctx, torture_setting_string(tctx, "host", NULL));
tctx 513 source4/torture/util_smb.c (*share) = talloc_strdup(mem_ctx, torture_setting_string(tctx, "share", NULL));
tctx 515 source4/torture/util_smb.c p = torture_setting_string(tctx, "unclist", NULL);
tctx 541 source4/torture/util_smb.c struct torture_context *tctx,
tctx 547 source4/torture/util_smb.c if (!torture_get_conn_index(conn_index, ev, tctx, &host, &share)) {
tctx 551 source4/torture/util_smb.c ret = torture_open_connection_share(NULL, c, tctx, host, share, ev);
tctx 558 source4/torture/util_smb.c _PUBLIC_ bool torture_open_connection(struct smbcli_state **c, struct torture_context *tctx, int conn_index)
tctx 560 source4/torture/util_smb.c return torture_open_connection_ev(c, conn_index, tctx, tctx->ev);
tctx 614 source4/torture/util_smb.c double torture_create_procs(struct torture_context *tctx,
tctx 622 source4/torture/util_smb.c int torture_nprocs = torture_setting_int(tctx, "nprocs", 4);
tctx 663 source4/torture/util_smb.c lp_set_cmdline(tctx->lp_ctx, "netbios name", myname);
tctx 668 source4/torture/util_smb.c if (torture_open_connection(¤t_cli, tctx, i)) {
tctx 688 source4/torture/util_smb.c child_status_out[i] = fn(tctx, current_cli, i);