diff options
author | Günther Deschner <gd@samba.org> | 2009-01-12 18:21:20 +0100 |
---|---|---|
committer | Günther Deschner <gd@samba.org> | 2009-01-14 10:18:13 +0100 |
commit | 4994956ad02c1fbd95a8e398f5472ec5ee8e539c (patch) | |
tree | a9e3debe4e467d1a71a01dc7c6b836a7bd33539f /source4/torture/rpc | |
parent | 9874c9eff77573b59d783698cc0c69e0985a3945 (diff) | |
download | samba-4994956ad02c1fbd95a8e398f5472ec5ee8e539c.tar.gz samba-4994956ad02c1fbd95a8e398f5472ec5ee8e539c.tar.bz2 samba-4994956ad02c1fbd95a8e398f5472ec5ee8e539c.zip |
s4-smbtorture: pure cosmetic cleanup of eventlog test.
Guenther
Diffstat (limited to 'source4/torture/rpc')
-rw-r--r-- | source4/torture/rpc/eventlog.c | 84 |
1 files changed, 42 insertions, 42 deletions
diff --git a/source4/torture/rpc/eventlog.c b/source4/torture/rpc/eventlog.c index e89cdd3ea9..7c3cb0ef46 100644 --- a/source4/torture/rpc/eventlog.c +++ b/source4/torture/rpc/eventlog.c @@ -1,20 +1,20 @@ -/* +/* Unix SMB/CIFS implementation. test suite for eventlog rpc operations Copyright (C) Tim Potter 2003,2005 Copyright (C) Jelmer Vernooij 2004 - + This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. - + This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. - + You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. */ @@ -34,9 +34,9 @@ static void init_lsa_String(struct lsa_String *name, const char *s) name->size = name->length; } -static bool get_policy_handle(struct torture_context *tctx, - struct dcerpc_pipe *p, - struct policy_handle *handle) +static bool get_policy_handle(struct torture_context *tctx, + struct dcerpc_pipe *p, + struct policy_handle *handle) { struct eventlog_OpenEventLogW r; struct eventlog_OpenUnknown0 unknown0; @@ -54,8 +54,8 @@ static bool get_policy_handle(struct torture_context *tctx, r.in.minor_version = 0x00000001; r.out.handle = handle; - torture_assert_ntstatus_ok(tctx, - dcerpc_eventlog_OpenEventLogW(p, tctx, &r), + torture_assert_ntstatus_ok(tctx, + dcerpc_eventlog_OpenEventLogW(p, tctx, &r), "OpenEventLog failed"); torture_assert_ntstatus_ok(tctx, r.out.result, "OpenEventLog failed"); @@ -79,22 +79,22 @@ static bool test_GetNumRecords(struct torture_context *tctx, struct dcerpc_pipe r.in.handle = &handle; r.out.number = &number; - torture_assert_ntstatus_ok(tctx, - dcerpc_eventlog_GetNumRecords(p, tctx, &r), + torture_assert_ntstatus_ok(tctx, + dcerpc_eventlog_GetNumRecords(p, tctx, &r), "GetNumRecords failed"); torture_comment(tctx, "%d records\n", *r.out.number); cr.in.handle = cr.out.handle = &handle; - torture_assert_ntstatus_ok(tctx, - dcerpc_eventlog_CloseEventLog(p, tctx, &cr), - "CloseEventLog failed"); + torture_assert_ntstatus_ok(tctx, + dcerpc_eventlog_CloseEventLog(p, tctx, &cr), + "CloseEventLog failed"); return true; } -static bool test_ReadEventLog(struct torture_context *tctx, - struct dcerpc_pipe *p) +static bool test_ReadEventLog(struct torture_context *tctx, + struct dcerpc_pipe *p) { NTSTATUS status; struct eventlog_ReadEventLogW r; @@ -132,7 +132,7 @@ static bool test_ReadEventLog(struct torture_context *tctx, torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_BUFFER_TOO_SMALL, "ReadEventLog failed"); - + /* Now read the actual record */ r.in.number_of_bytes = *r.out.real_size; @@ -141,7 +141,7 @@ static bool test_ReadEventLog(struct torture_context *tctx, status = dcerpc_eventlog_ReadEventLogW(p, tctx, &r); torture_assert_ntstatus_ok(tctx, status, "ReadEventLog failed"); - + /* Decode a user-marshalled record */ blob.length = *r.out.sent_size; @@ -155,7 +155,7 @@ static bool test_ReadEventLog(struct torture_context *tctx, NDR_PRINT_DEBUG(eventlog_Record, &rec); - torture_assert_ntstatus_ok(tctx, status, + torture_assert_ntstatus_ok(tctx, status, "ReadEventLog failed parsing event log record"); r.in.offset++; @@ -163,15 +163,15 @@ static bool test_ReadEventLog(struct torture_context *tctx, cr.in.handle = cr.out.handle = &handle; - torture_assert_ntstatus_ok(tctx, - dcerpc_eventlog_CloseEventLog(p, tctx, &cr), - "CloseEventLog failed"); + torture_assert_ntstatus_ok(tctx, + dcerpc_eventlog_CloseEventLog(p, tctx, &cr), + "CloseEventLog failed"); return true; } -static bool test_FlushEventLog(struct torture_context *tctx, - struct dcerpc_pipe *p) +static bool test_FlushEventLog(struct torture_context *tctx, + struct dcerpc_pipe *p) { struct eventlog_FlushEventLog r; struct eventlog_CloseEventLog cr; @@ -183,21 +183,21 @@ static bool test_FlushEventLog(struct torture_context *tctx, r.in.handle = &handle; /* Huh? Does this RPC always return access denied? */ - torture_assert_ntstatus_equal(tctx, + torture_assert_ntstatus_equal(tctx, dcerpc_eventlog_FlushEventLog(p, tctx, &r), - NT_STATUS_ACCESS_DENIED, + NT_STATUS_ACCESS_DENIED, "FlushEventLog failed"); cr.in.handle = cr.out.handle = &handle; - torture_assert_ntstatus_ok(tctx, - dcerpc_eventlog_CloseEventLog(p, tctx, &cr), - "CloseEventLog failed"); + torture_assert_ntstatus_ok(tctx, + dcerpc_eventlog_CloseEventLog(p, tctx, &cr), + "CloseEventLog failed"); return true; } -static bool test_ClearEventLog(struct torture_context *tctx, +static bool test_ClearEventLog(struct torture_context *tctx, struct dcerpc_pipe *p) { struct eventlog_ClearEventLogW r; @@ -210,21 +210,21 @@ static bool test_ClearEventLog(struct torture_context *tctx, r.in.handle = &handle; r.in.backupfile = NULL; - torture_assert_ntstatus_ok(tctx, - dcerpc_eventlog_ClearEventLogW(p, tctx, &r), + torture_assert_ntstatus_ok(tctx, + dcerpc_eventlog_ClearEventLogW(p, tctx, &r), "ClearEventLog failed"); cr.in.handle = cr.out.handle = &handle; - torture_assert_ntstatus_ok(tctx, - dcerpc_eventlog_CloseEventLog(p, tctx, &cr), - "CloseEventLog failed"); + torture_assert_ntstatus_ok(tctx, + dcerpc_eventlog_CloseEventLog(p, tctx, &cr), + "CloseEventLog failed"); return true; } -static bool test_OpenEventLog(struct torture_context *tctx, - struct dcerpc_pipe *p) +static bool test_OpenEventLog(struct torture_context *tctx, + struct dcerpc_pipe *p) { struct policy_handle handle; struct eventlog_CloseEventLog cr; @@ -234,9 +234,9 @@ static bool test_OpenEventLog(struct torture_context *tctx, cr.in.handle = cr.out.handle = &handle; - torture_assert_ntstatus_ok(tctx, - dcerpc_eventlog_CloseEventLog(p, tctx, &cr), - "CloseEventLog failed"); + torture_assert_ntstatus_ok(tctx, + dcerpc_eventlog_CloseEventLog(p, tctx, &cr), + "CloseEventLog failed"); return true; } @@ -248,11 +248,11 @@ struct torture_suite *torture_rpc_eventlog(TALLOC_CTX *mem_ctx) struct torture_test *test; suite = torture_suite_create(mem_ctx, "EVENTLOG"); - tcase = torture_suite_add_rpc_iface_tcase(suite, "eventlog", + tcase = torture_suite_add_rpc_iface_tcase(suite, "eventlog", &ndr_table_eventlog); torture_rpc_tcase_add_test(tcase, "OpenEventLog", test_OpenEventLog); - test = torture_rpc_tcase_add_test(tcase, "ClearEventLog", + test = torture_rpc_tcase_add_test(tcase, "ClearEventLog", test_ClearEventLog); test->dangerous = true; torture_rpc_tcase_add_test(tcase, "GetNumRecords", test_GetNumRecords); |