summaryrefslogtreecommitdiff
path: root/source4/torture
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2005-10-07 08:51:35 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 13:39:31 -0500
commitd76f425b307c415e5d3006b741ee4bfb6e7f5b4b (patch)
tree8d4cdc5ce0130de3d9bd5de5618ce0779b22223f /source4/torture
parent89a63bf14bce4511a3ccdf90459240c262cc0374 (diff)
downloadsamba-d76f425b307c415e5d3006b741ee4bfb6e7f5b4b.tar.gz
samba-d76f425b307c415e5d3006b741ee4bfb6e7f5b4b.tar.bz2
samba-d76f425b307c415e5d3006b741ee4bfb6e7f5b4b.zip
r10805: Move RPC-SAMLOGON to C99 initialisation
Andrew Bartlett (This used to be commit 0f994275ce5d84bdb746524c5da7d9661fbadb63)
Diffstat (limited to 'source4/torture')
-rw-r--r--source4/torture/rpc/samlogon.c194
1 files changed, 97 insertions, 97 deletions
diff --git a/source4/torture/rpc/samlogon.c b/source4/torture/rpc/samlogon.c
index 70da9b935a..e5e205a061 100644
--- a/source4/torture/rpc/samlogon.c
+++ b/source4/torture/rpc/samlogon.c
@@ -1529,135 +1529,135 @@ BOOL torture_rpc_samlogon(void)
NTSTATUS expected_network_error;
} usercreds[] = {
{
- "domain\\user",
- cli_credentials_get_domain(cmdline_credentials),
- cli_credentials_get_username(cmdline_credentials),
- cli_credentials_get_password(cmdline_credentials),
- True,
- NT_STATUS_OK,
- NT_STATUS_OK
+ .comment = "domain\\user",
+ .domain = cli_credentials_get_domain(cmdline_credentials),
+ .username = cli_credentials_get_username(cmdline_credentials),
+ .password = cli_credentials_get_password(cmdline_credentials),
+ .network_login = True,
+ .expected_interactive_error = NT_STATUS_OK,
+ .expected_network_error = NT_STATUS_OK
},
{
- "realm\\user",
- cli_credentials_get_realm(cmdline_credentials),
- cli_credentials_get_username(cmdline_credentials),
- cli_credentials_get_password(cmdline_credentials),
- True,
- NT_STATUS_OK,
- NT_STATUS_OK
+ .comment = "realm\\user",
+ .domain = cli_credentials_get_realm(cmdline_credentials),
+ .username = cli_credentials_get_username(cmdline_credentials),
+ .password = cli_credentials_get_password(cmdline_credentials),
+ .network_login = True,
+ .expected_interactive_error = NT_STATUS_OK,
+ .expected_network_error = NT_STATUS_OK
},
{
- "user@domain",
- NULL,
- talloc_asprintf(mem_ctx,
+ .comment = "user@domain",
+ .domain = NULL,
+ .username = talloc_asprintf(mem_ctx,
"%s@%s",
cli_credentials_get_username(cmdline_credentials),
cli_credentials_get_domain(cmdline_credentials)
),
- cli_credentials_get_password(cmdline_credentials),
- False,
- NT_STATUS_OK,
- NT_STATUS_OK
+ .password = cli_credentials_get_password(cmdline_credentials),
+ .network_login = False,
+ .expected_interactive_error = NT_STATUS_OK,
+ .expected_network_error = NT_STATUS_OK
},
{
- "user@realm",
- NULL,
- talloc_asprintf(mem_ctx,
+ .comment = "user@realm",
+ .domain = NULL,
+ .username = talloc_asprintf(mem_ctx,
"%s@%s",
cli_credentials_get_username(cmdline_credentials),
cli_credentials_get_realm(cmdline_credentials)
),
- cli_credentials_get_password(cmdline_credentials),
- True,
- NT_STATUS_OK,
- NT_STATUS_OK
+ .password = cli_credentials_get_password(cmdline_credentials),
+ .network_login = True,
+ .expected_interactive_error = NT_STATUS_OK,
+ .expected_network_error = NT_STATUS_OK
},
{
- "machine domain\\user",
- cli_credentials_get_domain(machine_credentials),
- cli_credentials_get_username(machine_credentials),
- cli_credentials_get_password(machine_credentials),
- True,
- NT_STATUS_NO_SUCH_USER,
- NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT
+ .comment = "machine domain\\user",
+ .domain = cli_credentials_get_domain(machine_credentials),
+ .username = cli_credentials_get_username(machine_credentials),
+ .password = cli_credentials_get_password(machine_credentials),
+ .network_login = True,
+ .expected_interactive_error = NT_STATUS_NO_SUCH_USER,
+ .expected_network_error = NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT
},
{
- "machine realm\\user",
- cli_credentials_get_realm(machine_credentials),
- cli_credentials_get_username(machine_credentials),
- cli_credentials_get_password(machine_credentials),
- True,
- NT_STATUS_NO_SUCH_USER,
- NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT
+ .comment = "machine realm\\user",
+ .domain = cli_credentials_get_realm(machine_credentials),
+ .username = cli_credentials_get_username(machine_credentials),
+ .password = cli_credentials_get_password(machine_credentials),
+ .network_login = True,
+ .expected_interactive_error = NT_STATUS_NO_SUCH_USER,
+ .expected_network_error = NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT
},
{
- "machine user@domain",
- NULL,
- talloc_asprintf(mem_ctx,
- "%s@%s",
- cli_credentials_get_username(machine_credentials),
- cli_credentials_get_domain(machine_credentials)
- ),
- cli_credentials_get_password(machine_credentials),
- False,
- NT_STATUS_NO_SUCH_USER,
- NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT
+ .comment = "machine user@domain",
+ .domain = NULL,
+ .username = talloc_asprintf(mem_ctx,
+ "%s@%s",
+ cli_credentials_get_username(machine_credentials),
+ cli_credentials_get_domain(machine_credentials)
+ ),
+ .password = cli_credentials_get_password(machine_credentials),
+ .network_login = False,
+ .expected_interactive_error = NT_STATUS_NO_SUCH_USER,
+ .expected_network_error = NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT
},
{
- "machine user@realm",
- NULL,
- talloc_asprintf(mem_ctx,
- "%s@%s",
- cli_credentials_get_username(machine_credentials),
- cli_credentials_get_realm(machine_credentials)
+ .comment = "machine user@realm",
+ .domain = NULL,
+ .username = talloc_asprintf(mem_ctx,
+ "%s@%s",
+ cli_credentials_get_username(machine_credentials),
+ cli_credentials_get_realm(machine_credentials)
),
- cli_credentials_get_password(machine_credentials),
- True,
- NT_STATUS_NO_SUCH_USER,
- NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT
+ .password = cli_credentials_get_password(machine_credentials),
+ .network_login = True,
+ .expected_interactive_error = NT_STATUS_NO_SUCH_USER,
+ .expected_network_error = NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT
},
{
- "test user (long pw): domain\\user",
- userdomain,
- TEST_USER_NAME,
- user_password,
- True,
- NT_STATUS_OK,
- NT_STATUS_OK
+ .comment = "test user (long pw): domain\\user",
+ .domain = userdomain,
+ .username = TEST_USER_NAME,
+ .password = user_password,
+ .network_login = True,
+ .expected_interactive_error = NT_STATUS_OK,
+ .expected_network_error = NT_STATUS_OK
},
{
- "test user (long pw): user@realm",
- NULL,
- talloc_asprintf(mem_ctx,
- "%s@%s",
- TEST_USER_NAME,
- lp_realm()),
- user_password,
- True,
- NT_STATUS_OK,
- NT_STATUS_OK
+ .comment = "test user (long pw): user@realm",
+ .domain = NULL,
+ .username = talloc_asprintf(mem_ctx,
+ "%s@%s",
+ TEST_USER_NAME,
+ lp_realm()),
+ .password = user_password,
+ .network_login = True,
+ .expected_interactive_error = NT_STATUS_OK,
+ .expected_network_error = NT_STATUS_OK
},
{
- "test user (long pw): user@domain",
- NULL,
- talloc_asprintf(mem_ctx,
- "%s@%s",
- TEST_USER_NAME,
- userdomain),
- user_password,
- False,
- NT_STATUS_OK,
- NT_STATUS_OK
+ .comment = "test user (long pw): user@domain",
+ .domain = NULL,
+ .username = talloc_asprintf(mem_ctx,
+ "%s@%s",
+ TEST_USER_NAME,
+ userdomain),
+ .password = user_password,
+ .network_login = False,
+ .expected_interactive_error = NT_STATUS_OK,
+ .expected_network_error = NT_STATUS_OK
},
/* Oddball, can we use the old password ? */
{
- "test user: user\\domain OLD PASSWORD",
- userdomain,
- TEST_USER_NAME,
- old_user_password,
- True,
- NT_STATUS_WRONG_PASSWORD,
- NT_STATUS_OK
+ .comment = "test user: user\\domain OLD PASSWORD",
+ .domain = userdomain,
+ .username = TEST_USER_NAME,
+ .password = old_user_password,
+ .network_login = True,
+ .expected_interactive_error = NT_STATUS_WRONG_PASSWORD,
+ .expected_network_error = NT_STATUS_OK
}
};