summaryrefslogtreecommitdiff
path: root/source4/torture/ndr
diff options
context:
space:
mode:
authorAndrew Tridgell <tridge@samba.org>2011-09-02 11:58:59 +1000
committerAndrew Bartlett <abartlet@samba.org>2011-09-05 11:19:25 +0200
commitcd8dcf6d61a554ddac1a632f5bea855c4af1d558 (patch)
tree59a1babfa2562222ddccbb330448656ddbccd457 /source4/torture/ndr
parentbee8daf9a8fbffc2c71697fa2020dbbe1226b5a8 (diff)
downloadsamba-cd8dcf6d61a554ddac1a632f5bea855c4af1d558.tar.gz
samba-cd8dcf6d61a554ddac1a632f5bea855c4af1d558.tar.bz2
samba-cd8dcf6d61a554ddac1a632f5bea855c4af1d558.zip
s4-torture: enable password comparison in drsblobs test
I'm not sure why this was commented out, as it does pass Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
Diffstat (limited to 'source4/torture/ndr')
-rw-r--r--source4/torture/ndr/drsblobs.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/source4/torture/ndr/drsblobs.c b/source4/torture/ndr/drsblobs.c
index 4756ffdfb9..bc86f56619 100644
--- a/source4/torture/ndr/drsblobs.c
+++ b/source4/torture/ndr/drsblobs.c
@@ -129,7 +129,7 @@ static bool trust_domain_passwords_check_in(struct torture_context *tctx,
torture_assert_int_equal(tctx, r->outgoing.current.array[0].LastUpdateTime, 0xB6416B4C, "outgoing current last update time mismatch");
torture_assert_int_equal(tctx, r->outgoing.current.array[0].AuthType, TRUST_AUTH_TYPE_CLEAR, "outgoing current auth type mismatch");
torture_assert_int_equal(tctx, r->outgoing.current.array[0].AuthInfo.clear.size, 0x0000001c, "outgoing current auth info size mismatch");
- /* torture_assert_mem_equal(tctx, r->outgoing.current.array[0].AuthInfo.clear.password, trust_domain_passwords_in+512+12+8+4+4, 0x0000001c, "outgoing current auth info password mismatch"); */
+ torture_assert_mem_equal(tctx, r->outgoing.current.array[0].AuthInfo.clear.password, trust_domain_passwords_in+512+12+8+4+4, 0x0000001c, "outgoing current auth info password mismatch");
torture_assert_int_equal(tctx, r->outgoing.previous.count, 0, "outgoing previous count mismatch");
@@ -141,7 +141,7 @@ static bool trust_domain_passwords_check_in(struct torture_context *tctx,
torture_assert_int_equal(tctx, r->incoming.current.array[0].LastUpdateTime, 0xB6416B4C, "incoming current last update time mismatch");
torture_assert_int_equal(tctx, r->incoming.current.array[0].AuthType, TRUST_AUTH_TYPE_CLEAR, "incoming current auth type mismatch");
torture_assert_int_equal(tctx, r->incoming.current.array[0].AuthInfo.clear.size, 0x0000001c, "incoming current auth info size mismatch");
-/* torture_assert_mem_equal(tctx, r->incoming.current.array[0].AuthInfo.clear.password, trust_domain_passwords_in+512+12+8+4+4+0x0000001c+12+8+4+4, 0x0000001c, "incoming current auth info password mismatch"); */
+ torture_assert_mem_equal(tctx, r->incoming.current.array[0].AuthInfo.clear.password, trust_domain_passwords_in+512+12+8+4+4+0x0000001c+12+8+4+4, 0x0000001c, "incoming current auth info password mismatch");
torture_assert_int_equal(tctx, r->incoming.previous.count, 0, "incoming previous count mismatch");