[SCM] Samba Shared Repository - branch master updated - 161cb81911fe8877bfefd8bd3553f0b3166299fb

Jelmer Vernooij jelmer at samba.org
Fri Oct 31 15:17:44 GMT 2008


The branch, master has been updated
       via  161cb81911fe8877bfefd8bd3553f0b3166299fb (commit)
       via  ac428a22e6bdbf71fb848ec30e42c8795eb6e50b (commit)
       via  634e3df0248745809f56ed2e0b7674322fc4dbbe (commit)
       via  0e79895e2b8fdb7d524b8e4c8d5b53b38e58130f (commit)
       via  069a6f0e4b59bb76191fa4011adf8d97cfd69011 (commit)
      from  f591c26dca25cc83046fb1a7c8616b0e476d830c (commit)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 161cb81911fe8877bfefd8bd3553f0b3166299fb
Merge: ac428a22e6bdbf71fb848ec30e42c8795eb6e50b f591c26dca25cc83046fb1a7c8616b0e476d830c
Author: Jelmer Vernooij <jelmer at samba.org>
Date:   Fri Oct 31 16:17:10 2008 +0100

    Merge branch 'master' of ssh://git.samba.org/data/git/samba

commit ac428a22e6bdbf71fb848ec30e42c8795eb6e50b
Author: Jelmer Vernooij <jelmer at samba.org>
Date:   Fri Oct 31 16:15:08 2008 +0100

    dcerpc: Fix include path so header installer translates it correctly during install.

commit 634e3df0248745809f56ed2e0b7674322fc4dbbe
Author: Jelmer Vernooij <jelmer at samba.org>
Date:   Fri Oct 31 16:09:29 2008 +0100

    samba4.rpc.samr: Use torture API in a couple more places.

commit 0e79895e2b8fdb7d524b8e4c8d5b53b38e58130f
Author: Jelmer Vernooij <jelmer at samba.org>
Date:   Fri Oct 31 15:24:24 2008 +0100

    samba4.rpc.samr: Use more torture API functions

commit 069a6f0e4b59bb76191fa4011adf8d97cfd69011
Author: Jelmer Vernooij <jelmer at samba.org>
Date:   Fri Oct 31 15:07:34 2008 +0100

    Disable lanman authentication by default in Samba 4.

-----------------------------------------------------------------------

Summary of changes:
 selftest/selftest.pl        |    1 +
 selftest/target/Samba4.pm   |    1 +
 source4/librpc/rpc/dcerpc.h |    2 +-
 source4/param/loadparm.c    |    4 +-
 source4/torture/rpc/samr.c  |  772 +++++++++++++++++--------------------------
 5 files changed, 308 insertions(+), 472 deletions(-)


Changeset truncated at 500 lines:

diff --git a/selftest/selftest.pl b/selftest/selftest.pl
index aa99b2e..292a2d2 100755
--- a/selftest/selftest.pl
+++ b/selftest/selftest.pl
@@ -578,6 +578,7 @@ sub write_clientconf($$)
 	notify:inotify = false
 	ldb:nosync = true
 	system:anonymous = true
+	client lanman auth = Yes
 	torture:basedir = $prefix_abs/client
 #We don't want to pass our self-tests if the PAC code is wrong
 	gensec:require_pac = true
diff --git a/selftest/target/Samba4.pm b/selftest/target/Samba4.pm
index 8c79a31..5cc34c7 100644
--- a/selftest/target/Samba4.pm
+++ b/selftest/target/Samba4.pm
@@ -572,6 +572,7 @@ sub provision($$$$$$)
 #We don't want to pass our self-tests if the PAC code is wrong
 	gensec:require_pac = true
 	log level = $server_loglevel
+	lanman auth = Yes
 
 [tmp]
 	path = $tmpdir
diff --git a/source4/librpc/rpc/dcerpc.h b/source4/librpc/rpc/dcerpc.h
index 482e803..cc8d3d1 100644
--- a/source4/librpc/rpc/dcerpc.h
+++ b/source4/librpc/rpc/dcerpc.h
@@ -29,7 +29,7 @@
 
 #include "../lib/util/data_blob.h"
 #include "librpc/gen_ndr/dcerpc.h"
-#include "librpc/ndr/libndr.h"
+#include "../librpc/ndr/libndr.h"
 
 enum dcerpc_transport_t {
 	NCA_UNKNOWN, NCACN_NP, NCACN_IP_TCP, NCACN_IP_UDP, NCACN_VNS_IPC, 
diff --git a/source4/param/loadparm.c b/source4/param/loadparm.c
index a019c95..18b3dcf 100644
--- a/source4/param/loadparm.c
+++ b/source4/param/loadparm.c
@@ -2361,8 +2361,8 @@ struct loadparm_context *loadparm_init(TALLOC_CTX *mem_ctx)
 	lp_do_global_parameter(lp_ctx, "TimeServer", "False");
 	lp_do_global_parameter(lp_ctx, "BindInterfacesOnly", "False");
 	lp_do_global_parameter(lp_ctx, "Unicode", "True");
-	lp_do_global_parameter(lp_ctx, "ClientLanManAuth", "True");
-	lp_do_global_parameter(lp_ctx, "LanmanAuth", "True");
+	lp_do_global_parameter(lp_ctx, "ClientLanManAuth", "False");
+	lp_do_global_parameter(lp_ctx, "LanmanAuth", "False");
 	lp_do_global_parameter(lp_ctx, "NTLMAuth", "True");
 	lp_do_global_parameter(lp_ctx, "client use spnego principal", "False");
 
diff --git a/source4/torture/rpc/samr.c b/source4/torture/rpc/samr.c
index 7e9b7e1..3d4c993 100644
--- a/source4/torture/rpc/samr.c
+++ b/source4/torture/rpc/samr.c
@@ -59,7 +59,7 @@ static void init_lsa_String(struct lsa_String *string, const char *s)
 	string->string = s;
 }
 
-bool test_samr_handle_Close(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, 
+bool test_samr_handle_Close(struct dcerpc_pipe *p, struct torture_context *tctx,
 				   struct policy_handle *handle)
 {
 	NTSTATUS status;
@@ -68,11 +68,8 @@ bool test_samr_handle_Close(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	r.in.handle = handle;
 	r.out.handle = handle;
 
-	status = dcerpc_samr_Close(p, mem_ctx, &r);
-	if (!NT_STATUS_IS_OK(status)) {
-		printf("Close handle failed - %s\n", nt_errstr(status));
-		return false;
-	}
+	status = dcerpc_samr_Close(p, tctx, &r);
+	torture_assert_ntstatus_ok(tctx, status, "Close");
 
 	return true;
 }
@@ -84,19 +81,16 @@ static bool test_Shutdown(struct dcerpc_pipe *p, struct torture_context *tctx,
 	struct samr_Shutdown r;
 
 	if (!torture_setting_bool(tctx, "dangerous", false)) {
-		printf("samr_Shutdown disabled - enable dangerous tests to use\n");
+		torture_skip(tctx, "samr_Shutdown disabled - enable dangerous tests to use\n");
 		return true;
 	}
 
 	r.in.connect_handle = handle;
 
-	printf("testing samr_Shutdown\n");
+	torture_comment(tctx, "testing samr_Shutdown\n");
 
 	status = dcerpc_samr_Shutdown(p, tctx, &r);
-	if (!NT_STATUS_IS_OK(status)) {
-		printf("samr_Shutdown failed - %s\n", nt_errstr(status));
-		return false;
-	}
+	torture_assert_ntstatus_ok(tctx, status, "samr_Shutdown");
 
 	return true;
 }
@@ -110,8 +104,7 @@ static bool test_SetDsrmPassword(struct dcerpc_pipe *p, struct torture_context *
 	struct samr_Password hash;
 
 	if (!torture_setting_bool(tctx, "dangerous", false)) {
-		printf("samr_SetDsrmPassword disabled - enable dangerous tests to use\n");
-		return true;
+		torture_skip(tctx, "samr_SetDsrmPassword disabled - enable dangerous tests to use");
 	}
 
 	E_md4hash("TeSTDSRM123", hash.hash);
@@ -122,13 +115,10 @@ static bool test_SetDsrmPassword(struct dcerpc_pipe *p, struct torture_context *
 	r.in.unknown = 0;
 	r.in.hash = &hash;
 
-	printf("testing samr_SetDsrmPassword\n");
+	torture_comment(tctx, "testing samr_SetDsrmPassword\n");
 
 	status = dcerpc_samr_SetDsrmPassword(p, tctx, &r);
-	if (!NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED)) {
-		printf("samr_SetDsrmPassword failed - %s\n", nt_errstr(status));
-		return false;
-	}
+	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_NOT_SUPPORTED, "samr_SetDsrmPassword");
 
 	return true;
 }
@@ -146,35 +136,23 @@ static bool test_QuerySecurity(struct dcerpc_pipe *p,
 	r.in.sec_info = 7;
 
 	status = dcerpc_samr_QuerySecurity(p, tctx, &r);
-	if (!NT_STATUS_IS_OK(status)) {
-		printf("QuerySecurity failed - %s\n", nt_errstr(status));
-		return false;
-	}
+	torture_assert_ntstatus_ok(tctx, status, "QuerySecurity");
 
-	if (r.out.sdbuf == NULL) {
-		return false;
-	}
+	torture_assert(tctx, r.out.sdbuf != NULL, "sdbuf is NULL");
 
 	s.in.handle = handle;
 	s.in.sec_info = 7;
 	s.in.sdbuf = r.out.sdbuf;
 
 	if (torture_setting_bool(tctx, "samba4", false)) {
-		printf("skipping SetSecurity test against Samba4\n");
-		return true;
+		torture_skip(tctx, "skipping SetSecurity test against Samba4\n");
 	}
 
 	status = dcerpc_samr_SetSecurity(p, tctx, &s);
-	if (!NT_STATUS_IS_OK(status)) {
-		printf("SetSecurity failed - %s\n", nt_errstr(status));
-		return false;
-	}
+	torture_assert_ntstatus_ok(tctx, status, "SetSecurity");
 
 	status = dcerpc_samr_QuerySecurity(p, tctx, &r);
-	if (!NT_STATUS_IS_OK(status)) {
-		printf("QuerySecurity failed - %s\n", nt_errstr(status));
-		return false;
-	}
+	torture_assert_ntstatus_ok(tctx, status, "QuerySecurity");
 
 	return true;
 }
@@ -212,7 +190,7 @@ static bool test_SetUserInfo(struct dcerpc_pipe *p, struct torture_context *tctx
 #define TESTCALL(call, r) \
 		status = dcerpc_samr_ ##call(p, tctx, &r); \
 		if (!NT_STATUS_IS_OK(status)) { \
-			printf(#call " level %u failed - %s (%s)\n", \
+			torture_comment(tctx, #call " level %u failed - %s (%s)\n", \
 			       r.in.level, nt_errstr(status), __location__); \
 			ret = false; \
 			break; \
@@ -220,7 +198,7 @@ static bool test_SetUserInfo(struct dcerpc_pipe *p, struct torture_context *tctx
 
 #define STRING_EQUAL(s1, s2, field) \
 		if ((s1 && !s2) || (s2 && !s1) || strcmp(s1, s2)) { \
-			printf("Failed to set %s to '%s' (%s)\n", \
+			torture_comment(tctx, "Failed to set %s to '%s' (%s)\n", \
 			       #field, s2, __location__); \
 			ret = false; \
 			break; \
@@ -228,14 +206,14 @@ static bool test_SetUserInfo(struct dcerpc_pipe *p, struct torture_context *tctx
 
 #define INT_EQUAL(i1, i2, field) \
 		if (i1 != i2) { \
-			printf("Failed to set %s to 0x%llx - got 0x%llx (%s)\n", \
+			torture_comment(tctx, "Failed to set %s to 0x%llx - got 0x%llx (%s)\n", \
 			       #field, (unsigned long long)i2, (unsigned long long)i1, __location__); \
 			ret = false; \
 			break; \
 		}
 
 #define TEST_USERINFO_STRING(lvl1, field1, lvl2, field2, value, fpval) do { \
-		printf("field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \
+		torture_comment(tctx, "field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \
 		q.in.level = lvl1; \
 		TESTCALL(QueryUserInfo, q) \
 		s.in.level = lvl1; \
@@ -259,7 +237,7 @@ static bool test_SetUserInfo(struct dcerpc_pipe *p, struct torture_context *tctx
 	} while (0)
 
 #define TEST_USERINFO_INT_EXP(lvl1, field1, lvl2, field2, value, exp_value, fpval) do { \
-		printf("field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \
+		torture_comment(tctx, "field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \
 		q.in.level = lvl1; \
 		TESTCALL(QueryUserInfo, q) \
 		s.in.level = lvl1; \
@@ -524,7 +502,7 @@ static char *samr_rand_pass_fixed_len(TALLOC_CTX *mem_ctx, int len)
 	return s;
 }
 
-static bool test_SetUserPass(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, 
+static bool test_SetUserPass(struct dcerpc_pipe *p, struct torture_context *tctx,
 			     struct policy_handle *handle, char **password)
 {
 	NTSTATUS status;
@@ -537,11 +515,11 @@ static bool test_SetUserPass(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	int policy_min_pw_len = 0;
 	pwp.in.user_handle = handle;
 
-	status = dcerpc_samr_GetUserPwInfo(p, mem_ctx, &pwp);
+	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
 	if (NT_STATUS_IS_OK(status)) {
 		policy_min_pw_len = pwp.out.info.min_password_length;
 	}
-	newpass = samr_rand_pass(mem_ctx, policy_min_pw_len);
+	newpass = samr_rand_pass(tctx, policy_min_pw_len);
 
 	s.in.user_handle = handle;
 	s.in.info = &u;
@@ -560,9 +538,9 @@ static bool test_SetUserPass(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 
 	arcfour_crypt_blob(u.info24.password.data, 516, &session_key);
 
-	printf("Testing SetUserInfo level 24 (set password)\n");
+	torture_comment(tctx, "Testing SetUserInfo level 24 (set password)\n");
 
-	status = dcerpc_samr_SetUserInfo(p, mem_ctx, &s);
+	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
 	if (!NT_STATUS_IS_OK(status)) {
 		printf("SetUserInfo level %u failed - %s\n",
 		       s.in.level, nt_errstr(status));
@@ -575,7 +553,7 @@ static bool test_SetUserPass(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 }
 
 
-static bool test_SetUserPass_23(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, 
+static bool test_SetUserPass_23(struct dcerpc_pipe *p, struct torture_context *tctx,
 				struct policy_handle *handle, uint32_t fields_present,
 				char **password)
 {
@@ -589,11 +567,11 @@ static bool test_SetUserPass_23(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	int policy_min_pw_len = 0;
 	pwp.in.user_handle = handle;
 
-	status = dcerpc_samr_GetUserPwInfo(p, mem_ctx, &pwp);
+	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
 	if (NT_STATUS_IS_OK(status)) {
 		policy_min_pw_len = pwp.out.info.min_password_length;
 	}
-	newpass = samr_rand_pass(mem_ctx, policy_min_pw_len);
+	newpass = samr_rand_pass(tctx, policy_min_pw_len);
 
 	s.in.user_handle = handle;
 	s.in.info = &u;
@@ -614,9 +592,9 @@ static bool test_SetUserPass_23(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 
 	arcfour_crypt_blob(u.info23.password.data, 516, &session_key);
 
-	printf("Testing SetUserInfo level 23 (set password)\n");
+	torture_comment(tctx, "Testing SetUserInfo level 23 (set password)\n");
 
-	status = dcerpc_samr_SetUserInfo(p, mem_ctx, &s);
+	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
 	if (!NT_STATUS_IS_OK(status)) {
 		printf("SetUserInfo level %u failed - %s\n",
 		       s.in.level, nt_errstr(status));
@@ -638,9 +616,9 @@ static bool test_SetUserPass_23(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	session_key.length--;
 	arcfour_crypt_blob(u.info23.password.data, 516, &session_key);
 
-	printf("Testing SetUserInfo level 23 (set password) with wrong password\n");
+	torture_comment(tctx, "Testing SetUserInfo level 23 (set password) with wrong password\n");
 
-	status = dcerpc_samr_SetUserInfo(p, mem_ctx, &s);
+	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
 	if (!NT_STATUS_EQUAL(status, NT_STATUS_WRONG_PASSWORD)) {
 		printf("SetUserInfo level %u should have failed with WRONG_PASSWORD- %s\n",
 		       s.in.level, nt_errstr(status));
@@ -651,7 +629,7 @@ static bool test_SetUserPass_23(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 }
 
 
-static bool test_SetUserPassEx(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, 
+static bool test_SetUserPassEx(struct dcerpc_pipe *p, struct torture_context *tctx,
 			       struct policy_handle *handle, bool makeshort, 
 			       char **password)
 {
@@ -660,7 +638,7 @@ static bool test_SetUserPassEx(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	union samr_UserInfo u;
 	bool ret = true;
 	DATA_BLOB session_key;
-	DATA_BLOB confounded_session_key = data_blob_talloc(mem_ctx, NULL, 16);
+	DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16);
 	uint8_t confounder[16];
 	char *newpass;
 	struct MD5Context ctx;
@@ -668,14 +646,14 @@ static bool test_SetUserPassEx(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	int policy_min_pw_len = 0;
 	pwp.in.user_handle = handle;
 
-	status = dcerpc_samr_GetUserPwInfo(p, mem_ctx, &pwp);
+	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
 	if (NT_STATUS_IS_OK(status)) {
 		policy_min_pw_len = pwp.out.info.min_password_length;
 	}
 	if (makeshort && policy_min_pw_len) {
-		newpass = samr_rand_pass_fixed_len(mem_ctx, policy_min_pw_len - 1);
+		newpass = samr_rand_pass_fixed_len(tctx, policy_min_pw_len - 1);
 	} else {
-		newpass = samr_rand_pass(mem_ctx, policy_min_pw_len);
+		newpass = samr_rand_pass(tctx, policy_min_pw_len);
 	}
 
 	s.in.user_handle = handle;
@@ -702,9 +680,9 @@ static bool test_SetUserPassEx(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	arcfour_crypt_blob(u.info26.password.data, 516, &confounded_session_key);
 	memcpy(&u.info26.password.data[516], confounder, 16);
 
-	printf("Testing SetUserInfo level 26 (set password ex)\n");
+	torture_comment(tctx, "Testing SetUserInfo level 26 (set password ex)\n");
 
-	status = dcerpc_samr_SetUserInfo(p, mem_ctx, &s);
+	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
 	if (!NT_STATUS_IS_OK(status)) {
 		printf("SetUserInfo level %u failed - %s\n",
 		       s.in.level, nt_errstr(status));
@@ -719,9 +697,9 @@ static bool test_SetUserPassEx(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	arcfour_crypt_blob(u.info26.password.data, 516, &confounded_session_key);
 	memcpy(&u.info26.password.data[516], confounder, 16);
 
-	printf("Testing SetUserInfo level 26 (set password ex) with wrong session key\n");
+	torture_comment(tctx, "Testing SetUserInfo level 26 (set password ex) with wrong session key\n");
 
-	status = dcerpc_samr_SetUserInfo(p, mem_ctx, &s);
+	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
 	if (!NT_STATUS_EQUAL(status, NT_STATUS_WRONG_PASSWORD)) {
 		printf("SetUserInfo level %u should have failed with WRONG_PASSWORD: %s\n",
 		       s.in.level, nt_errstr(status));
@@ -733,7 +711,7 @@ static bool test_SetUserPassEx(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	return ret;
 }
 
-static bool test_SetUserPass_25(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, 
+static bool test_SetUserPass_25(struct dcerpc_pipe *p, struct torture_context *tctx,
 				struct policy_handle *handle, uint32_t fields_present,
 				char **password)
 {
@@ -742,7 +720,7 @@ static bool test_SetUserPass_25(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	union samr_UserInfo u;
 	bool ret = true;
 	DATA_BLOB session_key;
-	DATA_BLOB confounded_session_key = data_blob_talloc(mem_ctx, NULL, 16);
+	DATA_BLOB confounded_session_key = data_blob_talloc(tctx, NULL, 16);
 	struct MD5Context ctx;
 	uint8_t confounder[16];
 	char *newpass;
@@ -750,11 +728,11 @@ static bool test_SetUserPass_25(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	int policy_min_pw_len = 0;
 	pwp.in.user_handle = handle;
 
-	status = dcerpc_samr_GetUserPwInfo(p, mem_ctx, &pwp);
+	status = dcerpc_samr_GetUserPwInfo(p, tctx, &pwp);
 	if (NT_STATUS_IS_OK(status)) {
 		policy_min_pw_len = pwp.out.info.min_password_length;
 	}
-	newpass = samr_rand_pass(mem_ctx, policy_min_pw_len);
+	newpass = samr_rand_pass(tctx, policy_min_pw_len);
 
 	s.in.user_handle = handle;
 	s.in.info = &u;
@@ -783,9 +761,9 @@ static bool test_SetUserPass_25(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key);
 	memcpy(&u.info25.password.data[516], confounder, 16);
 
-	printf("Testing SetUserInfo level 25 (set password ex)\n");
+	torture_comment(tctx, "Testing SetUserInfo level 25 (set password ex)\n");
 
-	status = dcerpc_samr_SetUserInfo(p, mem_ctx, &s);
+	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
 	if (!NT_STATUS_IS_OK(status)) {
 		printf("SetUserInfo level %u failed - %s\n",
 		       s.in.level, nt_errstr(status));
@@ -800,9 +778,9 @@ static bool test_SetUserPass_25(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
 	arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key);
 	memcpy(&u.info25.password.data[516], confounder, 16);
 
-	printf("Testing SetUserInfo level 25 (set password ex) with wrong session key\n");
+	torture_comment(tctx, "Testing SetUserInfo level 25 (set password ex) with wrong session key\n");
 
-	status = dcerpc_samr_SetUserInfo(p, mem_ctx, &s);
+	status = dcerpc_samr_SetUserInfo(p, tctx, &s);
 	if (!NT_STATUS_EQUAL(status, NT_STATUS_WRONG_PASSWORD)) {
 		printf("SetUserInfo level %u should have failed with WRONG_PASSWORD- %s\n",
 		       s.in.level, nt_errstr(status));
@@ -827,7 +805,7 @@ static bool test_SetAliasInfo(struct dcerpc_pipe *p, struct torture_context *tct
 	 */
 
 	for (i=0;i<ARRAY_SIZE(levels);i++) {
-		printf("Testing SetAliasInfo level %u\n", levels[i]);
+		torture_comment(tctx, "Testing SetAliasInfo level %u\n", levels[i]);
 
 		r.in.alias_handle = handle;
 		r.in.level = levels[i];
@@ -865,19 +843,15 @@ static bool test_GetGroupsForUser(struct dcerpc_pipe *p, struct torture_context
 {
 	struct samr_GetGroupsForUser r;
 	NTSTATUS status;
-	bool ret = true;
 
-	printf("testing GetGroupsForUser\n");
+	torture_comment(tctx, "testing GetGroupsForUser\n");
 
 	r.in.user_handle = user_handle;
 
 	status = dcerpc_samr_GetGroupsForUser(p, tctx, &r);
-	if (!NT_STATUS_IS_OK(status)) {
-		printf("GetGroupsForUser failed - %s\n",nt_errstr(status));
-		ret = false;
-	}
+	torture_assert_ntstatus_ok(tctx, status, "GetGroupsForUser");
 
-	return ret;
+	return true;
 
 }
 
@@ -886,46 +860,32 @@ static bool test_GetDomPwInfo(struct dcerpc_pipe *p, struct torture_context *tct
 {
 	NTSTATUS status;
 	struct samr_GetDomPwInfo r;
-	bool ret = true;
 
 	r.in.domain_name = domain_name;
-	printf("Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
+	torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
 
 	status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
-	if (!NT_STATUS_IS_OK(status)) {
-		printf("GetDomPwInfo failed - %s\n", nt_errstr(status));
-		ret = false;
-	}
+	torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
 
 	r.in.domain_name->string = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
-	printf("Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
+	torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
 
 	status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
-	if (!NT_STATUS_IS_OK(status)) {
-		printf("GetDomPwInfo failed - %s\n", nt_errstr(status));
-		ret = false;
-	}
+	torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
 
 	r.in.domain_name->string = "\\\\__NONAME__";
-	printf("Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
+	torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
 
 	status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
-	if (!NT_STATUS_IS_OK(status)) {
-		printf("GetDomPwInfo failed - %s\n", nt_errstr(status));
-		ret = false;
-	}
+	torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
 
 	r.in.domain_name->string = "\\\\Builtin";
-	printf("Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
+	torture_comment(tctx, "Testing GetDomPwInfo with name %s\n", r.in.domain_name->string);
 
 	status = dcerpc_samr_GetDomPwInfo(p, tctx, &r);
-	if (!NT_STATUS_IS_OK(status)) {
-		printf("GetDomPwInfo failed - %s\n", nt_errstr(status));
-		ret = false;
-	}
-
+	torture_assert_ntstatus_ok(tctx, status, "GetDomPwInfo");
 
-	return ret;
+	return true;
 }
 
 static bool test_GetUserPwInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
@@ -933,19 +893,15 @@ static bool test_GetUserPwInfo(struct dcerpc_pipe *p, struct torture_context *tc


-- 
Samba Shared Repository


More information about the samba-cvs mailing list