summaryrefslogtreecommitdiff
path: root/source4/torture
diff options
context:
space:
mode:
authorGünther Deschner <gd@samba.org>2012-06-28 13:59:50 +0200
committerGünther Deschner <gd@samba.org>2012-06-28 16:45:10 +0200
commit4aaeed2dac9958ab56fc7d757386285efc64e805 (patch)
tree30936e194f393d61f086adb80cecbc5c83306a1b /source4/torture
parent572701f9c84f70271d8ba7353c6638c0358bfbdd (diff)
downloadsamba-4aaeed2dac9958ab56fc7d757386285efc64e805.tar.gz
samba-4aaeed2dac9958ab56fc7d757386285efc64e805.tar.bz2
samba-4aaeed2dac9958ab56fc7d757386285efc64e805.zip
s4-torture: use torture context for printing debug output.
Guenther
Diffstat (limited to 'source4/torture')
-rw-r--r--source4/torture/rpc/samlogon.c208
1 files changed, 97 insertions, 111 deletions
diff --git a/source4/torture/rpc/samlogon.c b/source4/torture/rpc/samlogon.c
index cff39dde56..4b977754c9 100644
--- a/source4/torture/rpc/samlogon.c
+++ b/source4/torture/rpc/samlogon.c
@@ -49,6 +49,7 @@ enum ntlm_break {
struct samlogon_state {
TALLOC_CTX *mem_ctx;
+ struct torture_context *tctx;
const char *comment;
const char *account_name;
const char *account_domain;
@@ -356,10 +357,10 @@ static bool test_lm_ntlm_broken(struct samlogon_state *samlogon_state, enum ntlm
if (memcmp(lm_hash, lm_key,
sizeof(lm_key)) != 0) {
- d_printf("LM Key does not match expectations!\n");
- d_printf("lm_key:\n");
+ torture_comment(samlogon_state->tctx, "LM Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "lm_key:\n");
dump_data(1, lm_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, lm_hash, 8);
pass = false;
}
@@ -373,9 +374,9 @@ static bool test_lm_ntlm_broken(struct samlogon_state *samlogon_state, enum ntlm
if (memcmp(lm_key_expected, user_session_key,
16) != 0) {
*error_string = strdup("NT Session Key does not match expectations (should be first-8 LM hash)!\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, user_session_key, sizeof(user_session_key));
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, lm_key_expected, sizeof(lm_key_expected));
pass = false;
}
@@ -385,9 +386,9 @@ static bool test_lm_ntlm_broken(struct samlogon_state *samlogon_state, enum ntlm
if (memcmp(session_key.data, user_session_key,
sizeof(user_session_key)) != 0) {
*error_string = strdup("NT Session Key does not match expectations!\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, user_session_key, 16);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, session_key.data, session_key.length);
pass = false;
}
@@ -473,10 +474,10 @@ static bool test_ntlm_in_lm(struct samlogon_state *samlogon_state, char **error_
if (lm_good) {
if (memcmp(lm_hash, lm_key,
sizeof(lm_key)) != 0) {
- d_printf("LM Key does not match expectations!\n");
- d_printf("lm_key:\n");
+ torture_comment(samlogon_state->tctx, "LM Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "lm_key:\n");
dump_data(1, lm_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, lm_hash, 8);
pass = false;
}
@@ -484,10 +485,10 @@ static bool test_ntlm_in_lm(struct samlogon_state *samlogon_state, char **error_
} else {
if (memcmp(session_key.data, lm_key,
sizeof(lm_key)) != 0) {
- d_printf("LM Key does not match expectations (first 8 session key)!\n");
- d_printf("lm_key:\n");
+ torture_comment(samlogon_state->tctx, "LM Key does not match expectations (first 8 session key)!\n");
+ torture_comment(samlogon_state->tctx, "lm_key:\n");
dump_data(1, lm_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, session_key.data, 8);
pass = false;
}
@@ -499,10 +500,10 @@ static bool test_ntlm_in_lm(struct samlogon_state *samlogon_state, char **error_
memset(lm_key_expected+8, '\0', 8);
if (memcmp(lm_key_expected, user_session_key,
16) != 0) {
- d_printf("NT Session Key does not match expectations (should be first-8 LM hash)!\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "NT Session Key does not match expectations (should be first-8 LM hash)!\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, user_session_key, sizeof(user_session_key));
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, lm_key_expected, sizeof(lm_key_expected));
pass = false;
}
@@ -573,19 +574,19 @@ static bool test_ntlm_in_both(struct samlogon_state *samlogon_state, char **erro
if (memcmp(lm_hash, lm_key,
sizeof(lm_key)) != 0) {
- d_printf("LM Key does not match expectations!\n");
- d_printf("lm_key:\n");
+ torture_comment(samlogon_state->tctx, "LM Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "lm_key:\n");
dump_data(1, lm_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, lm_hash, 8);
pass = false;
}
if (memcmp(session_key.data, user_session_key,
sizeof(user_session_key)) != 0) {
- d_printf("NT Session Key does not match expectations!\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "NT Session Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, user_session_key, 16);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, session_key.data, session_key.length);
pass = false;
}
@@ -685,19 +686,19 @@ static bool test_lmv2_ntlmv2_broken(struct samlogon_state *samlogon_state,
case NO_NT:
if (memcmp(lmv2_session_key.data, user_session_key,
sizeof(user_session_key)) != 0) {
- d_printf("USER (LMv2) Session Key does not match expectations!\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "USER (LMv2) Session Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, user_session_key, 16);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, lmv2_session_key.data, ntlmv2_session_key.length);
pass = false;
}
if (memcmp(lmv2_session_key.data, lm_session_key,
sizeof(lm_session_key)) != 0) {
- d_printf("LM (LMv2) Session Key does not match expectations!\n");
- d_printf("lm_session_key:\n");
+ torture_comment(samlogon_state->tctx, "LM (LMv2) Session Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "lm_session_key:\n");
dump_data(1, lm_session_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, lmv2_session_key.data, 8);
pass = false;
}
@@ -707,18 +708,18 @@ static bool test_lmv2_ntlmv2_broken(struct samlogon_state *samlogon_state,
sizeof(user_session_key)) != 0) {
if (memcmp(lmv2_session_key.data, user_session_key,
sizeof(user_session_key)) == 0) {
- d_printf("USER (NTLMv2) Session Key expected, got LMv2 sessesion key instead:\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "USER (NTLMv2) Session Key expected, got LMv2 sessesion key instead:\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, user_session_key, 16);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, ntlmv2_session_key.data, ntlmv2_session_key.length);
pass = false;
} else {
- d_printf("USER (NTLMv2) Session Key does not match expectations!\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "USER (NTLMv2) Session Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, user_session_key, 16);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, ntlmv2_session_key.data, ntlmv2_session_key.length);
pass = false;
}
@@ -727,17 +728,17 @@ static bool test_lmv2_ntlmv2_broken(struct samlogon_state *samlogon_state,
sizeof(lm_session_key)) != 0) {
if (memcmp(lmv2_session_key.data, lm_session_key,
sizeof(lm_session_key)) == 0) {
- d_printf("LM (NTLMv2) Session Key expected, got LMv2 sessesion key instead:\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "LM (NTLMv2) Session Key expected, got LMv2 sessesion key instead:\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, lm_session_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, ntlmv2_session_key.data, 8);
pass = false;
} else {
- d_printf("LM (NTLMv2) Session Key does not match expectations!\n");
- d_printf("lm_session_key:\n");
+ torture_comment(samlogon_state->tctx, "LM (NTLMv2) Session Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "lm_session_key:\n");
dump_data(1, lm_session_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, ntlmv2_session_key.data, 8);
pass = false;
}
@@ -852,19 +853,19 @@ static bool test_lmv2_ntlm_broken(struct samlogon_state *samlogon_state,
case NO_NT:
if (memcmp(lmv2_session_key.data, user_session_key,
sizeof(user_session_key)) != 0) {
- d_printf("USER (LMv2) Session Key does not match expectations!\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "USER (LMv2) Session Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, user_session_key, 16);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, lmv2_session_key.data, ntlmv2_session_key.length);
pass = false;
}
if (memcmp(lmv2_session_key.data, lm_session_key,
sizeof(lm_session_key)) != 0) {
- d_printf("LM (LMv2) Session Key does not match expectations!\n");
- d_printf("lm_session_key:\n");
+ torture_comment(samlogon_state->tctx, "LM (LMv2) Session Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "lm_session_key:\n");
dump_data(1, lm_session_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, lmv2_session_key.data, 8);
pass = false;
}
@@ -872,20 +873,20 @@ static bool test_lmv2_ntlm_broken(struct samlogon_state *samlogon_state,
case BREAK_LM:
if (memcmp(ntlm_session_key.data, user_session_key,
sizeof(user_session_key)) != 0) {
- d_printf("USER (NTLMv2) Session Key does not match expectations!\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "USER (NTLMv2) Session Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, user_session_key, 16);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, ntlm_session_key.data, ntlm_session_key.length);
pass = false;
}
if (lm_good) {
if (memcmp(lm_hash, lm_session_key,
sizeof(lm_session_key)) != 0) {
- d_printf("LM Session Key does not match expectations!\n");
- d_printf("lm_session_key:\n");
+ torture_comment(samlogon_state->tctx, "LM Session Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "lm_session_key:\n");
dump_data(1, lm_session_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, lm_hash, 8);
pass = false;
}
@@ -893,10 +894,10 @@ static bool test_lmv2_ntlm_broken(struct samlogon_state *samlogon_state,
static const uint8_t zeros[8];
if (memcmp(zeros, lm_session_key,
sizeof(lm_session_key)) != 0) {
- d_printf("LM Session Key does not match expectations (zeros)!\n");
- d_printf("lm_session_key:\n");
+ torture_comment(samlogon_state->tctx, "LM Session Key does not match expectations (zeros)!\n");
+ torture_comment(samlogon_state->tctx, "lm_session_key:\n");
dump_data(1, lm_session_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, zeros, 8);
pass = false;
}
@@ -905,19 +906,19 @@ static bool test_lmv2_ntlm_broken(struct samlogon_state *samlogon_state,
default:
if (memcmp(ntlm_session_key.data, user_session_key,
sizeof(user_session_key)) != 0) {
- d_printf("USER (NTLMv2) Session Key does not match expectations!\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "USER (NTLMv2) Session Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, user_session_key, 16);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, ntlm_session_key.data, ntlm_session_key.length);
pass = false;
}
if (memcmp(ntlm_session_key.data, lm_session_key,
sizeof(lm_session_key)) != 0) {
- d_printf("LM (NTLMv2) Session Key does not match expectations!\n");
- d_printf("lm_session_key:\n");
+ torture_comment(samlogon_state->tctx, "LM (NTLMv2) Session Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "lm_session_key:\n");
dump_data(1, lm_session_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, ntlm_session_key.data, 8);
pass = false;
}
@@ -1132,10 +1133,10 @@ static bool test_ntlm2(struct samlogon_state *samlogon_state, char **error_strin
if (lm_good) {
if (memcmp(lm_hash, lm_key,
sizeof(lm_key)) != 0) {
- d_printf("LM Key does not match expectations!\n");
- d_printf("lm_key:\n");
+ torture_comment(samlogon_state->tctx, "LM Key does not match expectations!\n");
+ torture_comment(samlogon_state->tctx, "lm_key:\n");
dump_data(1, lm_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, lm_hash, 8);
pass = false;
}
@@ -1143,19 +1144,19 @@ static bool test_ntlm2(struct samlogon_state *samlogon_state, char **error_strin
static const uint8_t zeros[8];
if (memcmp(zeros, lm_key,
sizeof(lm_key)) != 0) {
- d_printf("LM Session Key does not match expectations (zeros)!\n");
- d_printf("lm_key:\n");
+ torture_comment(samlogon_state->tctx, "LM Session Key does not match expectations (zeros)!\n");
+ torture_comment(samlogon_state->tctx, "lm_key:\n");
dump_data(1, lm_key, 8);
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, zeros, 8);
pass = false;
}
}
if (memcmp(nt_key, user_session_key, 16) != 0) {
- d_printf("NT Session Key does not match expectations (should be NT Key)!\n");
- d_printf("user_session_key:\n");
+ torture_comment(samlogon_state->tctx, "NT Session Key does not match expectations (should be NT Key)!\n");
+ torture_comment(samlogon_state->tctx, "user_session_key:\n");
dump_data(1, user_session_key, sizeof(user_session_key));
- d_printf("expected:\n");
+ torture_comment(samlogon_state->tctx, "expected:\n");
dump_data(1, nt_key, sizeof(nt_key));
pass = false;
}
@@ -1357,7 +1358,7 @@ static bool test_SamLogon(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
ZERO_STRUCT(logon);
- d_printf("Testing netr_LogonSamLogon and netr_LogonSamLogonWithFlags\n");
+ torture_comment(tctx, "Testing netr_LogonSamLogon and netr_LogonSamLogonWithFlags\n");
samlogon_state.comment = comment;
samlogon_state.account_name = account_name;
@@ -1371,6 +1372,7 @@ static bool test_SamLogon(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
samlogon_state.chall = data_blob_talloc(fn_ctx, NULL, 8);
samlogon_state.parameter_control = parameter_control;
samlogon_state.old_password = old_password;
+ samlogon_state.tctx = tctx;
generate_random_buffer(samlogon_state.chall.data, 8);
samlogon_state.r_flags.in.server_name = talloc_asprintf(fn_ctx, "\\\\%s", dcerpc_server_name(p));
@@ -1418,7 +1420,7 @@ static bool test_SamLogon(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
samlogon_state.r_flags.in.validation_level = validation_levels[v];
samlogon_state.r_flags.in.logon_level = logon_levels[l];
if (!test_table[i].fn(&samlogon_state, &error_string)) {
- d_printf("Testing '%s' [%s]\\[%s] '%s' at validation level %d, logon level %d, function %d: \n",
+ torture_comment(tctx, "Testing '%s' [%s]\\[%s] '%s' at validation level %d, logon level %d, function %d: \n",
samlogon_state.comment,
samlogon_state.account_domain,
samlogon_state.account_name,
@@ -1426,9 +1428,9 @@ static bool test_SamLogon(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
logon_levels[l], function_levels[f]);
if (test_table[i].expect_fail) {
- d_printf(" failed (expected, test incomplete): %s\n", error_string);
+ torture_comment(tctx, " failed (expected, test incomplete): %s\n", error_string);
} else {
- d_printf(" failed: %s\n", error_string);
+ torture_comment(tctx, " failed: %s\n", error_string);
ret = false;
}
SAFE_FREE(error_string);
@@ -1446,6 +1448,7 @@ static bool test_SamLogon(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
test an ADS style interactive domain logon
*/
bool test_InteractiveLogon(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
+ struct torture_context *tctx,
struct netlogon_creds_CredentialState *creds,
const char *comment,
const char *workstation_name,
@@ -1508,28 +1511,24 @@ bool test_InteractiveLogon(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
netlogon_creds_des_encrypt(creds, &pinfo.ntpassword);
}
- d_printf("Testing netr_LogonSamLogonWithFlags '%s' (Interactive Logon)\n", comment);
+ torture_comment(tctx, "Testing netr_LogonSamLogonWithFlags '%s' (Interactive Logon)\n", comment);
+
+ torture_assert_ntstatus_ok(tctx,
+ dcerpc_netr_LogonSamLogonWithFlags_r(b, fn_ctx, &r),
+ talloc_asprintf(tctx, "%s: netr_LogonSamLogonWithFlags - %s\n",
+ __location__, nt_errstr(status)));
- status = dcerpc_netr_LogonSamLogonWithFlags_r(b, fn_ctx, &r);
- if (!NT_STATUS_IS_OK(status)) {
- d_printf("%s: netr_LogonSamLogonWithFlags - %s\n",
- __location__, nt_errstr(status));
- return false;
- }
if (!r.out.return_authenticator
|| !netlogon_creds_client_check(creds, &r.out.return_authenticator->cred)) {
- d_printf("Credential chaining failed\n");
talloc_free(fn_ctx);
- return false;
+ torture_fail(tctx, "Credential chaining failed\n");
}
talloc_free(fn_ctx);
- if (!NT_STATUS_EQUAL(expected_error, r.out.result)) {
- d_printf("[%s]\\[%s] netr_LogonSamLogonWithFlags - expected %s got %s\n",
- account_domain, account_name, nt_errstr(expected_error), nt_errstr(r.out.result));
- return false;
- }
+ torture_assert_ntstatus_equal(tctx, r.out.result, expected_error,
+ talloc_asprintf(tctx, "[%s]\\[%s] netr_LogonSamLogonWithFlags - expected %s got %s\n",
+ account_domain, account_name, nt_errstr(expected_error), nt_errstr(r.out.result)));
return true;
}
@@ -1666,10 +1665,7 @@ bool torture_rpc_samlogon(struct torture_context *torture)
* workstation here */
join_ctx = torture_join_domain(torture, TEST_MACHINE_NAME, ACB_WSTRUST,
&machine_credentials);
- if (!join_ctx) {
- d_printf("Failed to join as Workstation\n");
- return false;
- }
+ torture_assert(torture, join_ctx, "Failed to join as Workstation\n");
userdomain = torture_setting_string(torture, "userdomain", lpcfg_workgroup(torture->lp_ctx));
@@ -1678,10 +1674,7 @@ bool torture_rpc_samlogon(struct torture_context *torture)
userdomain,
ACB_NORMAL,
(const char **)&user_password);
- if (!user_ctx) {
- d_printf("Failed to create a test user\n");
- return false;
- }
+ torture_assert(torture, user_ctx, "Failed to create a test user\n");
old_user_password = user_password;
@@ -1695,10 +1688,8 @@ bool torture_rpc_samlogon(struct torture_context *torture)
userdomain,
ACB_NORMAL,
(const char **)&user_password_wrong_wks);
- if (!user_ctx_wrong_wks) {
- d_printf("Failed to create a test user (wrong workstation test)\n");
- return false;
- }
+ torture_assert(torture, user_ctx_wrong_wks,
+ "Failed to create a test user (wrong workstation test)\n");
ZERO_STRUCT(u);
s.in.user_handle = torture_join_samr_user_policy(user_ctx_wrong_wks);
@@ -1726,10 +1717,8 @@ bool torture_rpc_samlogon(struct torture_context *torture)
userdomain,
ACB_NORMAL,
(const char **)&user_password_wrong_time);
- if (!user_ctx_wrong_time) {
- d_printf("Failed to create a test user (wrong workstation test)\n");
- return false;
- }
+ torture_assert(torture, user_ctx_wrong_time,
+ "Failed to create a test user (wrong workstation test)\n");
ZERO_STRUCT(u);
s.in.user_handle = torture_join_samr_user_policy(user_ctx_wrong_time);
@@ -1770,11 +1759,8 @@ bool torture_rpc_samlogon(struct torture_context *torture)
&ndr_table_netlogon,
machine_credentials, torture->ev, torture->lp_ctx);
- if (!NT_STATUS_IS_OK(status)) {
- d_printf("RPC pipe connect as domain member failed: %s\n", nt_errstr(status));
- ret = false;
- goto failed;
- }
+ torture_assert_ntstatus_ok_goto(torture, status, ret, failed,
+ talloc_asprintf(torture, "RPC pipe connect as domain member failed: %s\n", nt_errstr(status)));
status = dcerpc_schannel_creds(p->conn->security_state.generic_state, mem_ctx, &creds);
if (!NT_STATUS_IS_OK(status)) {
@@ -1950,7 +1936,7 @@ bool torture_rpc_samlogon(struct torture_context *torture)
/* Try all the tests for different username forms */
for (ci = 0; ci < ARRAY_SIZE(usercreds); ci++) {
- if (!test_InteractiveLogon(p, mem_ctx, creds,
+ if (!test_InteractiveLogon(p, mem_ctx, torture, creds,
usercreds[ci].comment,
TEST_MACHINE_NAME,
usercreds[ci].domain,
@@ -1983,7 +1969,7 @@ bool torture_rpc_samlogon(struct torture_context *torture)
for (i=0; i < ARRAY_SIZE(credential_flags); i++) {
/* TODO: Somehow we lost setting up the different credential flags here! */
- if (!test_InteractiveLogon(p, mem_ctx, creds,
+ if (!test_InteractiveLogon(p, mem_ctx, torture, creds,
usercreds[0].comment,
TEST_MACHINE_NAME,
usercreds[0].domain,