svn commit: samba r15950 - in branches/SAMBA_4_0/source/torture/rpc: .

tridge at samba.org tridge at samba.org
Tue May 30 05:17:21 GMT 2006


Author: tridge
Date: 2006-05-30 05:17:20 +0000 (Tue, 30 May 2006)
New Revision: 15950

WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=15950

Log:

another printf() crash on solaris

Modified:
   branches/SAMBA_4_0/source/torture/rpc/samlogon.c


Changeset:
Modified: branches/SAMBA_4_0/source/torture/rpc/samlogon.c
===================================================================
--- branches/SAMBA_4_0/source/torture/rpc/samlogon.c	2006-05-30 05:08:15 UTC (rev 15949)
+++ branches/SAMBA_4_0/source/torture/rpc/samlogon.c	2006-05-30 05:17:20 UTC (rev 15950)
@@ -152,7 +152,7 @@
 		status = dcerpc_netr_LogonSamLogon(samlogon_state->p, samlogon_state->mem_ctx, r);
 		if (!r->out.return_authenticator || 
 		    !creds_client_check(samlogon_state->creds, &r->out.return_authenticator->cred)) {
-			printf("Credential chaining failed\n");
+			d_printf("Credential chaining failed\n");
 		}
 		if (!NT_STATUS_IS_OK(status)) {
 			if (error_string) {
@@ -210,7 +210,7 @@
 		status = dcerpc_netr_LogonSamLogonWithFlags(samlogon_state->p, samlogon_state->mem_ctx, r_flags);
 		if (!r_flags->out.return_authenticator || 
 		    !creds_client_check(samlogon_state->creds, &r_flags->out.return_authenticator->cred)) {
-			printf("Credential chaining failed\n");
+			d_printf("Credential chaining failed\n");
 		}
 		if (!NT_STATUS_IS_OK(status)) {
 			if (error_string) {
@@ -241,7 +241,7 @@
 	}
 		
 	if (!base) {
-		printf("No user info returned from 'successful' SamLogon*() call!\n");
+		d_printf("No user info returned from 'successful' SamLogon*() call!\n");
 		return NT_STATUS_INVALID_PARAMETER;
 	}
 
@@ -330,10 +330,10 @@
 
 	if (memcmp(lm_hash, lm_key, 
 		   sizeof(lm_key)) != 0) {
-		printf("LM Key does not match expectations!\n");
-		printf("lm_key:\n");
+		d_printf("LM Key does not match expectations!\n");
+		d_printf("lm_key:\n");
 		dump_data(1, lm_key, 8);
-		printf("expected:\n");
+		d_printf("expected:\n");
 		dump_data(1, lm_hash, 8);
 		pass = False;
 	}
@@ -347,9 +347,9 @@
 		if (memcmp(lm_key_expected, user_session_key, 
 			   16) != 0) {
 			*error_string = strdup("NT Session Key does not match expectations (should be first-8 LM hash)!\n");
-			printf("user_session_key:\n");
+			d_printf("user_session_key:\n");
 			dump_data(1, user_session_key, sizeof(user_session_key));
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, lm_key_expected, sizeof(lm_key_expected));
 			pass = False;
 		}
@@ -359,9 +359,9 @@
 		if (memcmp(session_key.data, user_session_key, 
 			   sizeof(user_session_key)) != 0) {
 			*error_string = strdup("NT Session Key does not match expectations!\n");
-			printf("user_session_key:\n");
+			d_printf("user_session_key:\n");
 			dump_data(1, user_session_key, 16);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, session_key.data, session_key.length);
 			pass = False;
 		}
@@ -447,10 +447,10 @@
 	if (lm_good) {
 		if (memcmp(lm_hash, lm_key, 
 			   sizeof(lm_key)) != 0) {
-			printf("LM Key does not match expectations!\n");
-			printf("lm_key:\n");
+			d_printf("LM Key does not match expectations!\n");
+			d_printf("lm_key:\n");
 			dump_data(1, lm_key, 8);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, lm_hash, 8);
 			pass = False;
 		}
@@ -458,10 +458,10 @@
 	} else {
 		if (memcmp(session_key.data, lm_key, 
 			   sizeof(lm_key)) != 0) {
-			printf("LM Key does not match expectations (first 8 session key)!\n");
-			printf("lm_key:\n");
+			d_printf("LM Key does not match expectations (first 8 session key)!\n");
+			d_printf("lm_key:\n");
 			dump_data(1, lm_key, 8);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, session_key.data, 8);
 			pass = False;
 		}
@@ -473,10 +473,10 @@
 		memset(lm_key_expected+8, '\0', 8);
 		if (memcmp(lm_key_expected, user_session_key, 
 			   16) != 0) {
-			printf("NT Session Key does not match expectations (should be first-8 LM hash)!\n");
-			printf("user_session_key:\n");
+			d_printf("NT Session Key does not match expectations (should be first-8 LM hash)!\n");
+			d_printf("user_session_key:\n");
 			dump_data(1, user_session_key, sizeof(user_session_key));
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, lm_key_expected, sizeof(lm_key_expected));
 			pass = False;
 		}
@@ -547,19 +547,19 @@
 
 	if (memcmp(lm_hash, lm_key, 
 		   sizeof(lm_key)) != 0) {
-		printf("LM Key does not match expectations!\n");
- 		printf("lm_key:\n");
+		d_printf("LM Key does not match expectations!\n");
+ 		d_printf("lm_key:\n");
 		dump_data(1, lm_key, 8);
-		printf("expected:\n");
+		d_printf("expected:\n");
 		dump_data(1, lm_hash, 8);
 		pass = False;
 	}
 	if (memcmp(session_key.data, user_session_key, 
 		   sizeof(user_session_key)) != 0) {
-		printf("NT Session Key does not match expectations!\n");
- 		printf("user_session_key:\n");
+		d_printf("NT Session Key does not match expectations!\n");
+ 		d_printf("user_session_key:\n");
 		dump_data(1, user_session_key, 16);
- 		printf("expected:\n");
+ 		d_printf("expected:\n");
 		dump_data(1, session_key.data, session_key.length);
 		pass = False;
 	}
@@ -659,19 +659,19 @@
 	case NO_NT:
 		if (memcmp(lmv2_session_key.data, user_session_key,
 			   sizeof(user_session_key)) != 0) {
-			printf("USER (LMv2) Session Key does not match expectations!\n");
-			printf("user_session_key:\n");
+			d_printf("USER (LMv2) Session Key does not match expectations!\n");
+			d_printf("user_session_key:\n");
 			dump_data(1, user_session_key, 16);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, lmv2_session_key.data, ntlmv2_session_key.length);
 			pass = False;
 		}
 		if (memcmp(lmv2_session_key.data, lm_session_key, 
 				   sizeof(lm_session_key)) != 0) {
-			printf("LM (LMv2) Session Key does not match expectations!\n");
-			printf("lm_session_key:\n");
+			d_printf("LM (LMv2) Session Key does not match expectations!\n");
+			d_printf("lm_session_key:\n");
 			dump_data(1, lm_session_key, 8);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, lmv2_session_key.data, 8);
 			pass = False;
 		}
@@ -681,18 +681,18 @@
 			   sizeof(user_session_key)) != 0) {
 			if (memcmp(lmv2_session_key.data, user_session_key,
 				   sizeof(user_session_key)) == 0) {
-				printf("USER (NTLMv2) Session Key expected, got LMv2 sessesion key instead:\n");
-				printf("user_session_key:\n");
+				d_printf("USER (NTLMv2) Session Key expected, got LMv2 sessesion key instead:\n");
+				d_printf("user_session_key:\n");
 				dump_data(1, user_session_key, 16);
-				printf("expected:\n");
+				d_printf("expected:\n");
 				dump_data(1, ntlmv2_session_key.data, ntlmv2_session_key.length);
 				pass = False;
 				
 			} else {
-				printf("USER (NTLMv2) Session Key does not match expectations!\n");
-				printf("user_session_key:\n");
+				d_printf("USER (NTLMv2) Session Key does not match expectations!\n");
+				d_printf("user_session_key:\n");
 				dump_data(1, user_session_key, 16);
-				printf("expected:\n");
+				d_printf("expected:\n");
 				dump_data(1, ntlmv2_session_key.data, ntlmv2_session_key.length);
 				pass = False;
 			}
@@ -701,17 +701,17 @@
 			   sizeof(lm_session_key)) != 0) {
 			if (memcmp(lmv2_session_key.data, lm_session_key,
 				   sizeof(lm_session_key)) == 0) {
-				printf("LM (NTLMv2) Session Key expected, got LMv2 sessesion key instead:\n");
-				printf("user_session_key:\n");
+				d_printf("LM (NTLMv2) Session Key expected, got LMv2 sessesion key instead:\n");
+				d_printf("user_session_key:\n");
 				dump_data(1, lm_session_key, 8);
-				printf("expected:\n");
+				d_printf("expected:\n");
 				dump_data(1, ntlmv2_session_key.data, 8);
 				pass = False;
 			} else {
-				printf("LM (NTLMv2) Session Key does not match expectations!\n");
-				printf("lm_session_key:\n");
+				d_printf("LM (NTLMv2) Session Key does not match expectations!\n");
+				d_printf("lm_session_key:\n");
 				dump_data(1, lm_session_key, 8);
-				printf("expected:\n");
+				d_printf("expected:\n");
 				dump_data(1, ntlmv2_session_key.data, 8);
 				pass = False;
 			}
@@ -826,19 +826,19 @@
 	case NO_NT:
 		if (memcmp(lmv2_session_key.data, user_session_key, 
 			   sizeof(user_session_key)) != 0) {
-			printf("USER (LMv2) Session Key does not match expectations!\n");
-			printf("user_session_key:\n");
+			d_printf("USER (LMv2) Session Key does not match expectations!\n");
+			d_printf("user_session_key:\n");
 			dump_data(1, user_session_key, 16);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, lmv2_session_key.data, ntlmv2_session_key.length);
 			pass = False;
 		}
 		if (memcmp(lmv2_session_key.data, lm_session_key, 
 			   sizeof(lm_session_key)) != 0) {
-			printf("LM (LMv2) Session Key does not match expectations!\n");
-			printf("lm_session_key:\n");
+			d_printf("LM (LMv2) Session Key does not match expectations!\n");
+			d_printf("lm_session_key:\n");
 			dump_data(1, lm_session_key, 8);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, lmv2_session_key.data, 8);
 			pass = False;
 		}
@@ -846,20 +846,20 @@
 	case BREAK_LM:
 		if (memcmp(ntlm_session_key.data, user_session_key, 
 			   sizeof(user_session_key)) != 0) {
-			printf("USER (NTLMv2) Session Key does not match expectations!\n");
-			printf("user_session_key:\n");
+			d_printf("USER (NTLMv2) Session Key does not match expectations!\n");
+			d_printf("user_session_key:\n");
 			dump_data(1, user_session_key, 16);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, ntlm_session_key.data, ntlm_session_key.length);
 			pass = False;
 		}
 		if (lm_good) {
 			if (memcmp(lm_hash, lm_session_key, 
 				   sizeof(lm_session_key)) != 0) {
-				printf("LM Session Key does not match expectations!\n");
-				printf("lm_session_key:\n");
+				d_printf("LM Session Key does not match expectations!\n");
+				d_printf("lm_session_key:\n");
 				dump_data(1, lm_session_key, 8);
-				printf("expected:\n");
+				d_printf("expected:\n");
 				dump_data(1, lm_hash, 8);
 				pass = False;
 			}
@@ -867,10 +867,10 @@
 			static const uint8_t zeros[8];
 			if (memcmp(zeros, lm_session_key, 
 				   sizeof(lm_session_key)) != 0) {
-				printf("LM Session Key does not match expectations (zeros)!\n");
-				printf("lm_session_key:\n");
+				d_printf("LM Session Key does not match expectations (zeros)!\n");
+				d_printf("lm_session_key:\n");
 				dump_data(1, lm_session_key, 8);
-				printf("expected:\n");
+				d_printf("expected:\n");
 				dump_data(1, zeros, 8);
 				pass = False;
 			}
@@ -879,19 +879,19 @@
 	default:
 		if (memcmp(ntlm_session_key.data, user_session_key, 
 			   sizeof(user_session_key)) != 0) {
-			printf("USER (NTLMv2) Session Key does not match expectations!\n");
-			printf("user_session_key:\n");
+			d_printf("USER (NTLMv2) Session Key does not match expectations!\n");
+			d_printf("user_session_key:\n");
 			dump_data(1, user_session_key, 16);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, ntlm_session_key.data, ntlm_session_key.length);
 			pass = False;
 		}
 		if (memcmp(ntlm_session_key.data, lm_session_key, 
 			   sizeof(lm_session_key)) != 0) {
-			printf("LM (NTLMv2) Session Key does not match expectations!\n");
-			printf("lm_session_key:\n");
+			d_printf("LM (NTLMv2) Session Key does not match expectations!\n");
+			d_printf("lm_session_key:\n");
 			dump_data(1, lm_session_key, 8);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, ntlm_session_key.data, 8);
 			pass = False;
 		}
@@ -1106,10 +1106,10 @@
 	if (lm_good) {
 		if (memcmp(lm_hash, lm_key, 
 			   sizeof(lm_key)) != 0) {
-			printf("LM Key does not match expectations!\n");
-			printf("lm_key:\n");
+			d_printf("LM Key does not match expectations!\n");
+			d_printf("lm_key:\n");
 			dump_data(1, lm_key, 8);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, lm_hash, 8);
 			pass = False;
 		}
@@ -1117,19 +1117,19 @@
 		static const uint8_t zeros[8];
 		if (memcmp(zeros, lm_key, 
 			   sizeof(lm_key)) != 0) {
-			printf("LM Session Key does not match expectations (zeros)!\n");
-			printf("lm_key:\n");
+			d_printf("LM Session Key does not match expectations (zeros)!\n");
+			d_printf("lm_key:\n");
 			dump_data(1, lm_key, 8);
-			printf("expected:\n");
+			d_printf("expected:\n");
 			dump_data(1, zeros, 8);
 			pass = False;
 		}
 	}
 	if (memcmp(nt_key, user_session_key, 16) != 0) {
-		printf("NT Session Key does not match expectations (should be NT Key)!\n");
-		printf("user_session_key:\n");
+		d_printf("NT Session Key does not match expectations (should be NT Key)!\n");
+		d_printf("user_session_key:\n");
 		dump_data(1, user_session_key, sizeof(user_session_key));
-		printf("expected:\n");
+		d_printf("expected:\n");
 		dump_data(1, nt_key, sizeof(nt_key));
 		pass = False;
 	}
@@ -1323,7 +1323,7 @@
 		DCERPC_NETR_LOGONSAMLOGONWITHFLAGS };
 	struct samlogon_state samlogon_state;
 	
-	printf("testing netr_LogonSamLogon and netr_LogonSamLogonWithFlags\n");
+	d_printf("testing netr_LogonSamLogon and netr_LogonSamLogonWithFlags\n");
 	
 	samlogon_state.comment = comment;
 	samlogon_state.account_name = account_name;
@@ -1370,7 +1370,7 @@
 					samlogon_state.r_flags.in.validation_level = validation_levels[v];
 					samlogon_state.r_flags.in.logon_level = logon_levels[l];
 					if (!test_table[i].fn(&samlogon_state, &error_string)) {
-						printf("Testing '%s' [%s]\\[%s] '%s' at validation level %d, logon level %d, function %d: \n",
+						d_printf("Testing '%s' [%s]\\[%s] '%s' at validation level %d, logon level %d, function %d: \n",
 						       samlogon_state.comment,
 						       samlogon_state.account_domain,
 						       samlogon_state.account_name,
@@ -1378,9 +1378,9 @@
 						       logon_levels[l], function_levels[f]);
 						
 						if (test_table[i].expect_fail) {
-							printf(" failed (expected, test incomplete): %s\n", error_string);
+							d_printf(" failed (expected, test incomplete): %s\n", error_string);
 						} else {
-							printf(" failed: %s\n", error_string);
+							d_printf(" failed: %s\n", error_string);
 							ret = False;
 						}
 						SAFE_FREE(error_string);
@@ -1446,12 +1446,12 @@
 		creds_des_encrypt(creds, &pinfo.ntpassword);
 	}
 
-	printf("Testing netr_LogonSamLogonWithFlags '%s' (Interactive Logon)\n", comment);
+	d_printf("Testing netr_LogonSamLogonWithFlags '%s' (Interactive Logon)\n", comment);
 
 	status = dcerpc_netr_LogonSamLogonWithFlags(p, fn_ctx, &r);
 	if (!r.out.return_authenticator 
 	    || !creds_client_check(creds, &r.out.return_authenticator->cred)) {
-		printf("Credential chaining failed\n");
+		d_printf("Credential chaining failed\n");
 		talloc_free(fn_ctx);
 		return False;
 	}
@@ -1459,7 +1459,7 @@
 	talloc_free(fn_ctx);
 
 	if (!NT_STATUS_EQUAL(expected_error, status)) {
-		printf("[%s]\\[%s] netr_LogonSamLogonWithFlags - expected %s got %s\n", 
+		d_printf("[%s]\\[%s] netr_LogonSamLogonWithFlags - expected %s got %s\n", 
 		       account_domain, account_name, nt_errstr(expected_error), nt_errstr(status));
 		return False;
 	}
@@ -1504,7 +1504,7 @@
 	join_ctx = torture_join_domain(TEST_MACHINE_NAME, ACB_WSTRUST, 
 				       &machine_credentials);
 	if (!join_ctx) {
-		printf("Failed to join as Workstation\n");
+		d_printf("Failed to join as Workstation\n");
 		return False;
 	}
 
@@ -1518,7 +1518,7 @@
 					   ACB_NORMAL, 
 					   (const char **)&user_password);
 	if (!user_ctx) {
-		printf("Failed to join as Workstation\n");
+		d_printf("Failed to join as Workstation\n");
 		return False;
 	}
 
@@ -1529,7 +1529,7 @@
 
 	status = dcerpc_parse_binding(mem_ctx, binding, &b);
 	if (!NT_STATUS_IS_OK(status)) {
-		printf("Bad binding string %s\n", binding);
+		d_printf("Bad binding string %s\n", binding);
 		ret = False;
 		goto failed;
 	}
@@ -1545,7 +1545,7 @@
 				       machine_credentials, NULL);
 
 	if (!NT_STATUS_IS_OK(status)) {
-		printf("RPC pipe connect as domain member failed: %s\n", nt_errstr(status));
+		d_printf("RPC pipe connect as domain member failed: %s\n", nt_errstr(status));
 		ret = False;
 		goto failed;
 	}



More information about the samba-cvs mailing list