diff options
author | Andrew Bartlett <abartlet@samba.org> | 2007-04-12 04:01:42 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 14:49:59 -0500 |
commit | b60157ffd21aaeed01ffefee0e33493b278556d6 (patch) | |
tree | fdc3f0f0bda0db933d37db826bf85ab105f0c3a2 /source4/torture | |
parent | 3154dbd3acfa91e2a804cb721489ee4dae020c83 (diff) | |
download | samba-b60157ffd21aaeed01ffefee0e33493b278556d6.tar.gz samba-b60157ffd21aaeed01ffefee0e33493b278556d6.tar.bz2 samba-b60157ffd21aaeed01ffefee0e33493b278556d6.zip |
r22184: On some hosts, parsing a compleatly invalid principal causes heimadal
to try and figure out what realm the current host is in (by DNS lookup
for it's full domain name). We don't want to do that for this test,
just break the checksum.
Andrew Bartlett
(This used to be commit 791e87514505acc68c5a8ff71fe9a27efdc6a027)
Diffstat (limited to 'source4/torture')
-rw-r--r-- | source4/torture/auth/pac.c | 8 |
1 files changed, 6 insertions, 2 deletions
diff --git a/source4/torture/auth/pac.c b/source4/torture/auth/pac.c index d3d6dcbe4d..d23a9c1b5a 100644 --- a/source4/torture/auth/pac.c +++ b/source4/torture/auth/pac.c @@ -276,6 +276,7 @@ static bool torture_pac_saved_check(struct torture_context *tctx) struct smb_krb5_context *smb_krb5_context; const char *principal_string; + char *broken_principal_string; krb5_principal client_principal; const char *authtime_string; time_t authtime; @@ -575,8 +576,11 @@ static bool torture_pac_saved_check(struct torture_context *tctx) /* Break the client principal */ krb5_free_principal(smb_krb5_context->krb5_context, client_principal); + broken_principal_string = talloc_strdup(mem_ctx, principal_string); + broken_principal_string[0]++; + ret = krb5_parse_name(smb_krb5_context->krb5_context, - "not the right principal", &client_principal); + broken_principal_string, &client_principal); if (ret) { krb5_free_keyblock_contents(smb_krb5_context->krb5_context, @@ -584,7 +588,7 @@ static bool torture_pac_saved_check(struct torture_context *tctx) krb5_free_keyblock_contents(smb_krb5_context->krb5_context, &server_keyblock); torture_fail(tctx, talloc_asprintf(tctx, - "(saved test) parsing of bogus client principal failed: %s", + "(saved test) parsing of broken client principal failed: %s", smb_get_krb5_error_message(smb_krb5_context->krb5_context, ret, mem_ctx))); } |