diff options
| author | Günther Deschner <gd@samba.org> | 2010-03-19 00:16:29 +0100 | 
|---|---|---|
| committer | Stefan Metzmacher <metze@samba.org> | 2010-03-29 15:35:46 +0200 | 
| commit | 959a128c7b9303b59e92273b01fefde02d752015 (patch) | |
| tree | 364b7c4cf43089b9180b66c34ef55d01e53e5fbc /source4 | |
| parent | 583c7cbd4c70be4f8e4d1c28fb7bba42c5d3c05d (diff) | |
| download | samba-959a128c7b9303b59e92273b01fefde02d752015.tar.gz samba-959a128c7b9303b59e92273b01fefde02d752015.tar.bz2 samba-959a128c7b9303b59e92273b01fefde02d752015.zip  | |
s4:torture/rpc/session_key.c: add explicit check for NTSTATUS r.out.result
Guenther
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Diffstat (limited to 'source4')
| -rw-r--r-- | source4/torture/rpc/session_key.c | 25 | 
1 files changed, 15 insertions, 10 deletions
diff --git a/source4/torture/rpc/session_key.c b/source4/torture/rpc/session_key.c index b637e08a6b..1473a637d9 100644 --- a/source4/torture/rpc/session_key.c +++ b/source4/torture/rpc/session_key.c @@ -63,8 +63,9 @@ static bool test_CreateSecret_basic(struct dcerpc_pipe *p,  	r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;  	r.out.sec_handle = &sec_handle; -	status = dcerpc_lsa_CreateSecret_r(b, tctx, &r); -	torture_assert_ntstatus_ok(tctx, status, "CreateSecret failed"); +	torture_assert_ntstatus_ok(tctx, dcerpc_lsa_CreateSecret_r(b, tctx, &r), +		"CreateSecret failed"); +	torture_assert_ntstatus_ok(tctx, r.out.result, "CreateSecret failed");  	status = dcerpc_fetch_session_key(p, &session_key);  	torture_assert_ntstatus_ok(tctx, status, "dcerpc_fetch_session_key failed"); @@ -80,8 +81,9 @@ static bool test_CreateSecret_basic(struct dcerpc_pipe *p,  	torture_comment(tctx, "Testing SetSecret\n"); -	status = dcerpc_lsa_SetSecret_r(b, tctx, &r3); -	torture_assert_ntstatus_ok(tctx, status, "SetSecret failed"); +	torture_assert_ntstatus_ok(tctx, dcerpc_lsa_SetSecret_r(b, tctx, &r3), +		"SetSecret failed"); +	torture_assert_ntstatus_ok(tctx, r3.out.result, "SetSecret failed");  	r3.in.sec_handle = &sec_handle;  	r3.in.new_val = &buf1; @@ -95,8 +97,9 @@ static bool test_CreateSecret_basic(struct dcerpc_pipe *p,  	torture_comment(tctx, "Testing SetSecret with broken key\n"); -	status = dcerpc_lsa_SetSecret_r(b, tctx, &r3); -	torture_assert_ntstatus_equal(tctx, status, NT_STATUS_UNKNOWN_REVISION,  +	torture_assert_ntstatus_ok(tctx, dcerpc_lsa_SetSecret_r(b, tctx, &r3), +		"SetSecret failed"); +	torture_assert_ntstatus_equal(tctx, r3.out.result, NT_STATUS_UNKNOWN_REVISION,  		"SetSecret should have failed UNKNOWN_REVISION");  	data_blob_free(&enc_key); @@ -114,8 +117,9 @@ static bool test_CreateSecret_basic(struct dcerpc_pipe *p,  	bufp1.buf = NULL;  	torture_comment(tctx, "Testing QuerySecret\n"); -	status = dcerpc_lsa_QuerySecret_r(b, tctx, &r4); -	torture_assert_ntstatus_ok(tctx, status, "QuerySecret failed"); +	torture_assert_ntstatus_ok(tctx, dcerpc_lsa_QuerySecret_r(b, tctx, &r4), +		"QuerySecret failed"); +	torture_assert_ntstatus_ok(tctx, r4.out.result, "QuerySecret failed");  	if (r4.out.new_val == NULL || r4.out.new_val->buf == NULL)  		torture_fail(tctx, "No secret buffer returned");  	blob1.data = r4.out.new_val->buf->data; @@ -129,8 +133,9 @@ static bool test_CreateSecret_basic(struct dcerpc_pipe *p,  	d.in.handle = &sec_handle;  	d.out.handle = &sec_handle; -	status = dcerpc_lsa_DeleteObject_r(b, tctx, &d); -	torture_assert_ntstatus_ok(tctx, status, "delete should have returned OKINVALID_HANDLE"); +	torture_assert_ntstatus_ok(tctx, dcerpc_lsa_DeleteObject_r(b, tctx, &d), +		"DeleteObject failed"); +	torture_assert_ntstatus_ok(tctx, d.out.result, "delete should have returned OKINVALID_HANDLE");  	return true;  }  | 
