From 7da94cc4a664521be279b019e9f32121cd410193 Mon Sep 17 00:00:00 2001 From: Jelmer Vernooij Date: Sun, 11 Apr 2010 01:39:06 +0200 Subject: subunit: Support formatting compatible with upstream subunit, for consistency. Upstream subunit makes a ":" after commands optional, so I've fixed any places where we might trigger commands accidently. I've filed a bug about this in subunit. --- source4/torture/rpc/alter_context.c | 6 ++-- source4/torture/rpc/drsuapi.c | 16 ++++----- source4/torture/rpc/drsuapi_cracknames.c | 12 +++---- source4/torture/rpc/dsgetinfo.c | 2 +- source4/torture/rpc/dssync.c | 2 +- source4/torture/rpc/lsa.c | 2 +- source4/torture/rpc/netlogon.c | 2 +- source4/torture/rpc/samba3rpc.c | 4 +-- source4/torture/rpc/samlogon.c | 2 +- source4/torture/rpc/samr.c | 34 +++++++++---------- source4/torture/rpc/samr_accessmask.c | 30 ++++++++--------- source4/torture/rpc/spoolss.c | 2 +- source4/torture/rpc/srvsvc.c | 36 ++++++++++---------- source4/torture/rpc/wkssvc.c | 58 ++++++++++++++++---------------- 14 files changed, 104 insertions(+), 104 deletions(-) (limited to 'source4/torture/rpc') diff --git a/source4/torture/rpc/alter_context.c b/source4/torture/rpc/alter_context.c index c3a992b05f..3b165b57ce 100644 --- a/source4/torture/rpc/alter_context.c +++ b/source4/torture/rpc/alter_context.c @@ -65,7 +65,7 @@ bool torture_rpc_alter_context(struct torture_context *torture) torture_assert_ntstatus_equal(torture, status, NT_STATUS_RPC_UNSUPPORTED_NAME_SYNTAX, "dcerpc_alter_context with wrong version should fail"); - torture_comment(torture, "testing DSSETUP pipe operations\n"); + torture_comment(torture, "Testing DSSETUP pipe operations\n"); ret &= test_DsRoleGetPrimaryDomainInformation(torture, p2); if (handle) { @@ -97,7 +97,7 @@ bool torture_rpc_alter_context(struct torture_context *torture) } torture_assert_ntstatus_ok(torture, status, "dcerpc_alter_context failed"); - torture_comment(torture, "testing DSSETUP pipe operations - should fault\n"); + torture_comment(torture, "Testing DSSETUP pipe operations - should fault\n"); ret &= test_DsRoleGetPrimaryDomainInformation_ext(torture, p, NT_STATUS_NET_WRITE_FAULT); ret &= test_lsa_OpenPolicy2(p->binding_handle, torture, &handle); @@ -106,7 +106,7 @@ bool torture_rpc_alter_context(struct torture_context *torture) ret &= test_lsa_Close(p->binding_handle, torture, handle); } - torture_comment(torture, "testing DSSETUP pipe operations\n"); + torture_comment(torture, "Testing DSSETUP pipe operations\n"); ret &= test_DsRoleGetPrimaryDomainInformation(torture, p2); diff --git a/source4/torture/rpc/drsuapi.c b/source4/torture/rpc/drsuapi.c index 42d2d1280a..9ecd30bf17 100644 --- a/source4/torture/rpc/drsuapi.c +++ b/source4/torture/rpc/drsuapi.c @@ -76,7 +76,7 @@ bool test_DsBind(struct dcerpc_pipe *p, r.in.bind_info = &bind_info_ctr; r.out.bind_handle = &priv->bind_handle; - torture_comment(tctx, "testing DsBind\n"); + torture_comment(tctx, "Testing DsBind\n"); status = dcerpc_drsuapi_DsBind_r(p->binding_handle, tctx, &r); torture_drsuapi_assert_call(tctx, p, status, &r, "dcerpc_drsuapi_DsBind"); @@ -137,7 +137,7 @@ static bool test_DsGetDomainControllerInfo(struct torture_context *tctx, r.out.level_out = &level_out; torture_comment(tctx, - "testing DsGetDomainControllerInfo level %d on domainname '%s'\n", + "Testing DsGetDomainControllerInfo level %d on domainname '%s'\n", r.in.req->req1.level, r.in.req->req1.domain_name); status = dcerpc_drsuapi_DsGetDomainControllerInfo_r(p->binding_handle, tctx, &r); @@ -191,7 +191,7 @@ static bool test_DsGetDomainControllerInfo(struct torture_context *tctx, r.in.req->req1.domain_name = "__UNKNOWN_DOMAIN__"; /* This is clearly ignored for this level */ r.in.req->req1.level = -1; - torture_comment(tctx, "testing DsGetDomainControllerInfo level %d on domainname '%s'\n", + torture_comment(tctx, "Testing DsGetDomainControllerInfo level %d on domainname '%s'\n", r.in.req->req1.level, r.in.req->req1.domain_name); status = dcerpc_drsuapi_DsGetDomainControllerInfo_r(p->binding_handle, tctx, &r); @@ -236,7 +236,7 @@ static bool test_DsWriteAccountSpn(struct torture_context *tctx, r.in.level = 1; r.in.req = &req; - torture_comment(tctx, "testing DsWriteAccountSpn\n"); + torture_comment(tctx, "Testing DsWriteAccountSpn\n"); r.in.req->req1.operation = DRSUAPI_DS_SPN_OPERATION_ADD; r.in.req->req1.unknown1 = 0; @@ -350,7 +350,7 @@ static bool test_DsReplicaGetInfo(struct torture_context *tctx, for (i=0; i < ARRAY_SIZE(array); i++) { const char *object_dn; - torture_comment(tctx, "testing DsReplicaGetInfo level %d infotype %d\n", + torture_comment(tctx, "Testing DsReplicaGetInfo level %d infotype %d\n", array[i].level, array[i].infotype); object_dn = (array[i].obj_dn ? array[i].obj_dn : priv->domain_obj_dn); @@ -425,7 +425,7 @@ static bool test_DsReplicaSync(struct torture_context *tctx, r.in.bind_handle = &priv->bind_handle; for (i=0; i < ARRAY_SIZE(array); i++) { - torture_comment(tctx, "testing DsReplicaSync level %d\n", + torture_comment(tctx, "Testing DsReplicaSync level %d\n", array[i].level); r.in.level = array[i].level; @@ -552,7 +552,7 @@ static bool test_DsGetNCChanges(struct torture_context *tctx, for (i=0; i < ARRAY_SIZE(array); i++) { torture_comment(tctx, - "testing DsGetNCChanges level %d\n", + "Testing DsGetNCChanges level %d\n", array[i].level); r.in.bind_handle = &priv->bind_handle; @@ -685,7 +685,7 @@ bool test_DsUnbind(struct dcerpc_pipe *p, r.in.bind_handle = &priv->bind_handle; r.out.bind_handle = &priv->bind_handle; - torture_comment(tctx, "testing DsUnbind\n"); + torture_comment(tctx, "Testing DsUnbind\n"); status = dcerpc_drsuapi_DsUnbind_r(p->binding_handle, tctx, &r); torture_drsuapi_assert_call(tctx, p, status, &r, "dcerpc_drsuapi_DsUnbind"); diff --git a/source4/torture/rpc/drsuapi_cracknames.c b/source4/torture/rpc/drsuapi_cracknames.c index 2a49fb37f7..7078dde0bc 100644 --- a/source4/torture/rpc/drsuapi_cracknames.c +++ b/source4/torture/rpc/drsuapi_cracknames.c @@ -279,7 +279,7 @@ bool test_DsCrackNames(struct torture_context *tctx, names[0].str = dom_sid; - torture_comment(tctx, "testing DsCrackNames with name '%s' desired format:%d\n", + torture_comment(tctx, "Testing DsCrackNames with name '%s' desired format:%d\n", names[0].str, r.in.req->req1.format_desired); status = dcerpc_drsuapi_DsCrackNames_r(p->binding_handle, mem_ctx, &r); @@ -304,7 +304,7 @@ bool test_DsCrackNames(struct torture_context *tctx, r.in.req->req1.format_desired = DRSUAPI_DS_NAME_FORMAT_GUID; - torture_comment(tctx, "testing DsCrackNames with name '%s' desired format:%d\n", + torture_comment(tctx, "Testing DsCrackNames with name '%s' desired format:%d\n", names[0].str, r.in.req->req1.format_desired); status = dcerpc_drsuapi_DsCrackNames_r(p->binding_handle, mem_ctx, &r); @@ -330,7 +330,7 @@ bool test_DsCrackNames(struct torture_context *tctx, r.in.req->req1.format_desired = DRSUAPI_DS_NAME_FORMAT_FQDN_1779; - torture_comment(tctx, "testing DsCrackNames with name '%s' desired format:%d\n", + torture_comment(tctx, "Testing DsCrackNames with name '%s' desired format:%d\n", names[0].str, r.in.req->req1.format_desired); status = dcerpc_drsuapi_DsCrackNames_r(p->binding_handle, mem_ctx, &r); @@ -378,7 +378,7 @@ bool test_DsCrackNames(struct torture_context *tctx, r.in.req->req1.format_desired = DRSUAPI_DS_NAME_FORMAT_FQDN_1779; names[0].str = nt4_domain; - torture_comment(tctx, "testing DsCrackNames with name '%s' desired format:%d\n", + torture_comment(tctx, "Testing DsCrackNames with name '%s' desired format:%d\n", names[0].str, r.in.req->req1.format_desired); status = dcerpc_drsuapi_DsCrackNames_r(p->binding_handle, mem_ctx, &r); @@ -404,7 +404,7 @@ bool test_DsCrackNames(struct torture_context *tctx, r.in.req->req1.format_desired = DRSUAPI_DS_NAME_FORMAT_FQDN_1779; names[0].str = talloc_asprintf(mem_ctx, "%s%s$", nt4_domain, test_dc); - torture_comment(tctx, "testing DsCrackNames with name '%s' desired format:%d\n", + torture_comment(tctx, "Testing DsCrackNames with name '%s' desired format:%d\n", names[0].str, r.in.req->req1.format_desired); status = dcerpc_drsuapi_DsCrackNames_r(p->binding_handle, mem_ctx, &r); @@ -430,7 +430,7 @@ bool test_DsCrackNames(struct torture_context *tctx, r.in.req->req1.format_desired = DRSUAPI_DS_NAME_FORMAT_FQDN_1779; names[0].str = priv->domain_guid_str; - torture_comment(tctx, "testing DsCrackNames with name '%s' desired format:%d\n", + torture_comment(tctx, "Testing DsCrackNames with name '%s' desired format:%d\n", names[0].str, r.in.req->req1.format_desired); status = dcerpc_drsuapi_DsCrackNames_r(p->binding_handle, mem_ctx, &r); diff --git a/source4/torture/rpc/dsgetinfo.c b/source4/torture/rpc/dsgetinfo.c index 7fdbdc470a..b01dd773a6 100644 --- a/source4/torture/rpc/dsgetinfo.c +++ b/source4/torture/rpc/dsgetinfo.c @@ -302,7 +302,7 @@ static bool test_getinfo(struct torture_context *tctx, for (i=0; i < ARRAY_SIZE(array); i++) { const char *object_dn; - torture_comment(tctx, "testing DsReplicaGetInfo level %d infotype %d\n", + torture_comment(tctx, "Testing DsReplicaGetInfo level %d infotype %d\n", array[i].level, array[i].infotype); if (array[i].obj_dn) { diff --git a/source4/torture/rpc/dssync.c b/source4/torture/rpc/dssync.c index 337f5e322a..793ab14dbf 100644 --- a/source4/torture/rpc/dssync.c +++ b/source4/torture/rpc/dssync.c @@ -806,7 +806,7 @@ static bool test_FetchData(struct torture_context *tctx, struct DsSyncTest *ctx) } for (i=0; i < ARRAY_SIZE(array); i++) { - printf("testing DsGetNCChanges level %d\n", + printf("Testing DsGetNCChanges level %d\n", array[i].level); r.in.bind_handle = &ctx->new_dc.drsuapi.bind_handle; diff --git a/source4/torture/rpc/lsa.c b/source4/torture/rpc/lsa.c index 2323920581..7dd2cef19f 100644 --- a/source4/torture/rpc/lsa.c +++ b/source4/torture/rpc/lsa.c @@ -2962,7 +2962,7 @@ static bool testcase_TrustedDomains(struct torture_context *tctx, talloc_get_type_abort(data, struct lsa_trustdom_state); struct dcerpc_binding_handle *b = p->binding_handle; - torture_comment(tctx, "testing %d domains\n", state->num_trusts); + torture_comment(tctx, "Testing %d domains\n", state->num_trusts); if (!test_OpenPolicy(b, tctx)) { ret = false; diff --git a/source4/torture/rpc/netlogon.c b/source4/torture/rpc/netlogon.c index 0034cdcf57..c469de9ec9 100644 --- a/source4/torture/rpc/netlogon.c +++ b/source4/torture/rpc/netlogon.c @@ -1693,7 +1693,7 @@ static bool test_LogonControl(struct torture_context *tctx, secure_channel_type = cli_credentials_get_secure_channel_type(machine_credentials); } - torture_comment(tctx, "testing LogonControl with secure channel type: %d\n", + torture_comment(tctx, "Testing LogonControl with secure channel type: %d\n", secure_channel_type); r.in.logon_server = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p)); diff --git a/source4/torture/rpc/samba3rpc.c b/source4/torture/rpc/samba3rpc.c index baf4501469..274ddd9ea8 100644 --- a/source4/torture/rpc/samba3rpc.c +++ b/source4/torture/rpc/samba3rpc.c @@ -1970,7 +1970,7 @@ static bool test_NetShareGetInfo(struct torture_context *tctx, for (i=0;iinfo1.min_password_age; s.in.info->info1.min_password_age = 0; - torture_comment(tctx, "testing samr_SetDomainInfo level 1\n"); + torture_comment(tctx, "Testing samr_SetDomainInfo level 1\n"); torture_assert_ntstatus_ok(tctx, dcerpc_samr_SetDomainInfo_r(b, tctx, &s), "SetDomainInfo failed"); if (!NT_STATUS_IS_OK(s.out.result)) { @@ -5206,7 +5206,7 @@ static bool test_ChangePassword(struct dcerpc_pipe *p, s.in.info->info1.password_properties = pwd_prop_old; s.in.info->info1.min_password_age = min_pwd_age_old; - torture_comment(tctx, "testing samr_SetDomainInfo level 1\n"); + torture_comment(tctx, "Testing samr_SetDomainInfo level 1\n"); torture_assert_ntstatus_ok(tctx, dcerpc_samr_SetDomainInfo_r(b, tctx, &s), "SetDomainInfo failed"); if (!NT_STATUS_IS_OK(s.out.result)) { @@ -7788,7 +7788,7 @@ static bool test_Connect(struct dcerpc_binding_handle *b, uint32_t level_out = 0; bool ret = true, got_handle = false; - torture_comment(tctx, "testing samr_Connect\n"); + torture_comment(tctx, "Testing samr_Connect\n"); r.in.system_name = 0; r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED; @@ -7804,7 +7804,7 @@ static bool test_Connect(struct dcerpc_binding_handle *b, *handle = h; } - torture_comment(tctx, "testing samr_Connect2\n"); + torture_comment(tctx, "Testing samr_Connect2\n"); r2.in.system_name = NULL; r2.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED; @@ -7823,7 +7823,7 @@ static bool test_Connect(struct dcerpc_binding_handle *b, *handle = h; } - torture_comment(tctx, "testing samr_Connect3\n"); + torture_comment(tctx, "Testing samr_Connect3\n"); r3.in.system_name = NULL; r3.in.unknown = 0; @@ -7843,7 +7843,7 @@ static bool test_Connect(struct dcerpc_binding_handle *b, *handle = h; } - torture_comment(tctx, "testing samr_Connect4\n"); + torture_comment(tctx, "Testing samr_Connect4\n"); r4.in.system_name = ""; r4.in.client_version = 0; @@ -7863,7 +7863,7 @@ static bool test_Connect(struct dcerpc_binding_handle *b, *handle = h; } - torture_comment(tctx, "testing samr_Connect5\n"); + torture_comment(tctx, "Testing samr_Connect5\n"); info.info1.client_version = 0; info.info1.unknown2 = 0; @@ -7904,7 +7904,7 @@ static bool test_samr_ValidatePassword(struct dcerpc_pipe *p, int i; struct dcerpc_binding_handle *b = p->binding_handle; - torture_comment(tctx, "testing samr_ValidatePassword\n"); + torture_comment(tctx, "Testing samr_ValidatePassword\n"); ZERO_STRUCT(r); r.in.level = NetValidatePasswordReset; diff --git a/source4/torture/rpc/samr_accessmask.c b/source4/torture/rpc/samr_accessmask.c index 7c24c5e23a..fc331e2d85 100644 --- a/source4/torture/rpc/samr_accessmask.c +++ b/source4/torture/rpc/samr_accessmask.c @@ -84,10 +84,10 @@ static bool test_samr_accessmask_Connect5(struct torture_context *tctx, uint32_t mask; struct dcerpc_binding_handle *b = p->binding_handle; - printf("testing which bits in accessmask allows us to connect\n"); + printf("Testing which bits in accessmask allows us to connect\n"); mask = 1; for (i=0;i<33;i++) { - printf("testing Connect5 with access mask 0x%08x", mask); + printf("Testing Connect5 with access mask 0x%08x", mask); status = torture_samr_Connect5(tctx, b, mask, &h); mask <<= 1; @@ -159,10 +159,10 @@ static bool test_samr_accessmask_EnumDomains(struct torture_context *tctx, uint32_t num_entries = 0; struct dcerpc_binding_handle *b = p->binding_handle; - printf("testing which bits in Connect5 accessmask allows us to EnumDomains\n"); + printf("Testing which bits in Connect5 accessmask allows us to EnumDomains\n"); mask = 1; for (i=0;i<33;i++) { - printf("testing Connect5/EnumDomains with access mask 0x%08x", mask); + printf("Testing Connect5/EnumDomains with access mask 0x%08x", mask); status = torture_samr_Connect5(tctx, b, mask, &ch); mask <<= 1; @@ -260,7 +260,7 @@ static bool test_samr_connect_user_acl(struct torture_context *tctx, struct dcerpc_binding_handle *test_b; const char *binding = torture_setting_string(tctx, "binding", NULL); - printf("testing ACLs to allow/prevent users to connect to SAMR"); + printf("Testing ACLs to allow/prevent users to connect to SAMR"); /* connect to SAMR */ status = torture_samr_Connect5(tctx, b, SEC_FLAG_MAXIMUM_ALLOWED, &ch); @@ -378,7 +378,7 @@ static bool test_samr_connect_user_acl_enforced(struct torture_context *tctx, struct dcerpc_binding_handle *test_b; const char *binding = torture_setting_string(tctx, "binding", NULL); - printf("testing if ACLs are enforced for non domain admin users when connecting to SAMR"); + printf("Testing if ACLs are enforced for non domain admin users when connecting to SAMR"); status = dcerpc_pipe_connect(tctx, @@ -425,10 +425,10 @@ static bool test_samr_accessmask_LookupDomain(struct torture_context *tctx, uint32_t mask; struct dcerpc_binding_handle *b = p->binding_handle; - printf("testing which bits in Connect5 accessmask allows us to LookupDomain\n"); + printf("Testing which bits in Connect5 accessmask allows us to LookupDomain\n"); mask = 1; for (i=0;i<33;i++) { - printf("testing Connect5/LookupDomain with access mask 0x%08x", mask); + printf("Testing Connect5/LookupDomain with access mask 0x%08x", mask); status = torture_samr_Connect5(tctx, b, mask, &ch); mask <<= 1; @@ -538,10 +538,10 @@ static bool test_samr_accessmask_OpenDomain(struct torture_context *tctx, - printf("testing which bits in Connect5 accessmask allows us to OpenDomain\n"); + printf("Testing which bits in Connect5 accessmask allows us to OpenDomain\n"); mask = 1; for (i=0;i<33;i++) { - printf("testing Connect5/OpenDomain with access mask 0x%08x", mask); + printf("Testing Connect5/OpenDomain with access mask 0x%08x", mask); status = torture_samr_Connect5(tctx, b, mask, &ch); mask <<= 1; @@ -700,7 +700,7 @@ static bool test_LookupRids(struct torture_context *tctx, struct lsa_Strings names; struct samr_Ids types; - torture_comment(tctx, "testing LookupRids %d\n", rid); + torture_comment(tctx, "Testing LookupRids %d\n", rid); r.in.domain_handle = domain_handle; r.in.num_rids = 1; @@ -725,7 +725,7 @@ static bool test_user(struct torture_context *tctx, { struct policy_handle user_handle; - torture_comment(tctx, "testing user %s (%d)\n", u->account_name.string, u->rid); + torture_comment(tctx, "Testing user %s (%d)\n", u->account_name.string, u->rid); torture_assert(tctx, test_LookupRids(tctx, b, domain_handle, u->rid), "failed to call lookuprids"); @@ -756,7 +756,7 @@ static bool test_user(struct torture_context *tctx, r.in.level = levels[i]; - torture_comment(tctx, "testing QueryUserInfo rid: %d level: %d\n", + torture_comment(tctx, "Testing QueryUserInfo rid: %d level: %d\n", u->rid, r.in.level); torture_assert_ntstatus_ok(tctx, dcerpc_samr_QueryUserInfo_r(b, tctx, &r), @@ -793,7 +793,7 @@ static bool test_samr_group(struct torture_context *tctx, { struct policy_handle group_handle; - torture_comment(tctx, "testing group %s (%d)\n", g->name.string, g->idx); + torture_comment(tctx, "Testing group %s (%d)\n", g->name.string, g->idx); torture_assert(tctx, test_LookupRids(tctx, b, domain_handle, g->idx), "failed to call lookuprids"); @@ -836,7 +836,7 @@ static bool test_samr_alias(struct torture_context *tctx, struct policy_handle *domain_handle, struct samr_SamEntry *a) { - torture_comment(tctx, "testing alias %s (%d)\n", a->name.string, a->idx); + torture_comment(tctx, "Testing alias %s (%d)\n", a->name.string, a->idx); torture_assert(tctx, test_LookupRids(tctx, b, domain_handle, a->idx), "failed to call lookuprids"); diff --git a/source4/torture/rpc/spoolss.c b/source4/torture/rpc/spoolss.c index 4f4e732450..19647f3acd 100644 --- a/source4/torture/rpc/spoolss.c +++ b/source4/torture/rpc/spoolss.c @@ -4664,7 +4664,7 @@ static bool test_SecondaryClosePrinter(struct torture_context *tctx, return true; } - torture_comment(tctx, "testing close on secondary pipe\n"); + torture_comment(tctx, "Testing close on secondary pipe\n"); status = dcerpc_parse_binding(tctx, p->conn->binding_string, &b); torture_assert_ntstatus_ok(tctx, status, "Failed to parse dcerpc binding"); diff --git a/source4/torture/rpc/srvsvc.c b/source4/torture/rpc/srvsvc.c index 0942258156..9bcc95b191 100644 --- a/source4/torture/rpc/srvsvc.c +++ b/source4/torture/rpc/srvsvc.c @@ -41,7 +41,7 @@ static bool test_NetCharDevGetInfo(struct dcerpc_pipe *p, struct torture_context for (i=0;ilp_ctx); - torture_comment(tctx, "testing NetrLogonDomainNameAdd\n"); + torture_comment(tctx, "Testing NetrLogonDomainNameAdd\n"); status = dcerpc_wkssvc_NetrLogonDomainNameAdd_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, @@ -516,7 +516,7 @@ static bool test_NetrLogonDomainNameDel(struct torture_context *tctx, r.in.domain_name = lp_workgroup(tctx->lp_ctx); - torture_comment(tctx, "testing NetrLogonDomainNameDel\n"); + torture_comment(tctx, "Testing NetrLogonDomainNameDel\n"); status = dcerpc_wkssvc_NetrLogonDomainNameDel_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, @@ -545,7 +545,7 @@ static bool test_NetrEnumerateComputerNames_level(struct torture_context *tctx, r.in.Reserved = 0; r.out.ctr = &ctr; - torture_comment(tctx, "testing NetrEnumerateComputerNames level %u\n", + torture_comment(tctx, "Testing NetrEnumerateComputerNames level %u\n", r.in.name_type); status = dcerpc_wkssvc_NetrEnumerateComputerNames_r(b, tctx, &r); @@ -615,7 +615,7 @@ static bool test_NetrValidateName(struct torture_context *tctx, r.in.Password = NULL; r.in.name_type = levels[i]; - torture_comment(tctx, "testing NetrValidateName level %u\n", + torture_comment(tctx, "Testing NetrValidateName level %u\n", r.in.name_type); status = dcerpc_wkssvc_NetrValidateName_r(b, tctx, &r); @@ -646,7 +646,7 @@ static bool test_NetrValidateName2(struct torture_context *tctx, r.in.EncryptedPassword = NULL; r.in.name_type = levels[i]; - torture_comment(tctx, "testing NetrValidateName2 level %u\n", + torture_comment(tctx, "Testing NetrValidateName2 level %u\n", r.in.name_type); status = dcerpc_wkssvc_NetrValidateName2_r(b, tctx, &r); @@ -676,7 +676,7 @@ static bool test_NetrAddAlternateComputerName(struct torture_context *tctx, r.in.EncryptedPassword = NULL; r.in.Reserved = 0; - torture_comment(tctx, "testing NetrAddAlternateComputerName\n"); + torture_comment(tctx, "Testing NetrAddAlternateComputerName\n"); status = dcerpc_wkssvc_NetrAddAlternateComputerName_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, @@ -718,7 +718,7 @@ static bool test_NetrRemoveAlternateComputerName(struct torture_context *tctx, r.in.EncryptedPassword = NULL; r.in.Reserved = 0; - torture_comment(tctx, "testing NetrRemoveAlternateComputerName\n"); + torture_comment(tctx, "Testing NetrRemoveAlternateComputerName\n"); status = dcerpc_wkssvc_NetrRemoveAlternateComputerName_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, @@ -783,7 +783,7 @@ static bool test_NetrSetPrimaryComputername(struct torture_context *tctx, const char **names_o = NULL, **names = NULL; int num_names_o = 0, num_names = 0; - torture_comment(tctx, "testing NetrSetPrimaryComputername\n"); + torture_comment(tctx, "Testing NetrSetPrimaryComputername\n"); if (!test_NetrAddAlternateComputerName(tctx, p)) { return false; @@ -851,7 +851,7 @@ static bool test_NetrRenameMachineInDomain(struct torture_context *tctx, r.in.password = NULL; r.in.RenameOptions = 0; - torture_comment(tctx, "testing NetrRenameMachineInDomain\n"); + torture_comment(tctx, "Testing NetrRenameMachineInDomain\n"); status = dcerpc_wkssvc_NetrRenameMachineInDomain_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, @@ -889,7 +889,7 @@ static bool test_NetrRenameMachineInDomain2(struct torture_context *tctx, const char **names_o = NULL, **names = NULL; int num_names_o = 0, num_names = 0; - torture_comment(tctx, "testing NetrRenameMachineInDomain2\n"); + torture_comment(tctx, "Testing NetrRenameMachineInDomain2\n"); if (!test_NetrEnumerateComputerNames_level(tctx, p, NetPrimaryComputerName, @@ -967,7 +967,7 @@ static bool test_NetrWorkstationStatisticsGet(struct torture_context *tctx, r.in.server_name = dcerpc_server_name(p); r.out.info = &info; - torture_comment(tctx, "testing NetrWorkstationStatisticsGet\n"); + torture_comment(tctx, "Testing NetrWorkstationStatisticsGet\n"); status = dcerpc_wkssvc_NetrWorkstationStatisticsGet_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, @@ -999,7 +999,7 @@ static bool test_NetrMessageBufferSend(struct torture_context *tctx, r.in.message_buffer = (uint8_t *)msg; r.in.message_size = size; - torture_comment(tctx, "testing NetrMessageBufferSend\n"); + torture_comment(tctx, "Testing NetrMessageBufferSend\n"); status = dcerpc_wkssvc_NetrMessageBufferSend_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, @@ -1022,7 +1022,7 @@ static bool test_NetrGetJoinInformation(struct torture_context *tctx, r.in.name_buffer = r.out.name_buffer = &name_buffer; r.out.name_type = &join_status; - torture_comment(tctx, "testing NetrGetJoinInformation\n"); + torture_comment(tctx, "Testing NetrGetJoinInformation\n"); status = dcerpc_wkssvc_NetrGetJoinInformation_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, @@ -1081,7 +1081,7 @@ static bool test_NetrGetJoinableOus(struct torture_context *tctx, r.in.num_ous = r.out.num_ous = &num_ous; r.out.ous = &ous; - torture_comment(tctx, "testing NetrGetJoinableOus\n"); + torture_comment(tctx, "Testing NetrGetJoinableOus\n"); status = dcerpc_wkssvc_NetrGetJoinableOus_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, "NetrGetJoinableOus failed"); @@ -1108,7 +1108,7 @@ static bool test_NetrGetJoinableOus2(struct torture_context *tctx, r.in.num_ous = r.out.num_ous = &num_ous; r.out.ous = &ous; - torture_comment(tctx, "testing NetrGetJoinableOus2\n"); + torture_comment(tctx, "Testing NetrGetJoinableOus2\n"); status = dcerpc_wkssvc_NetrGetJoinableOus2_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, "NetrGetJoinableOus2 failed"); @@ -1138,7 +1138,7 @@ static bool test_NetrUnjoinDomain(struct torture_context *tctx, r.in.password = NULL; r.in.unjoin_flags = 0; - torture_comment(tctx, "testing NetrUnjoinDomain\n"); + torture_comment(tctx, "Testing NetrUnjoinDomain\n"); status = dcerpc_wkssvc_NetrUnjoinDomain_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, @@ -1169,7 +1169,7 @@ static bool test_NetrJoinDomain(struct torture_context *tctx, r.in.password = NULL; r.in.join_flags = 0; - torture_comment(tctx, "testing NetrJoinDomain\n"); + torture_comment(tctx, "Testing NetrJoinDomain\n"); status = dcerpc_wkssvc_NetrJoinDomain_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, @@ -1252,7 +1252,7 @@ static bool test_NetrJoinDomain2(struct torture_context *tctx, r.in.join_flags = WKSSVC_JOIN_FLAGS_JOIN_TYPE | WKSSVC_JOIN_FLAGS_ACCOUNT_CREATE; - torture_comment(tctx, "testing NetrJoinDomain2 (assuming non-DC)\n"); + torture_comment(tctx, "Testing NetrJoinDomain2 (assuming non-DC)\n"); status = dcerpc_wkssvc_NetrJoinDomain2_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, @@ -1331,7 +1331,7 @@ static bool test_NetrUnjoinDomain2(struct torture_context *tctx, r.in.encrypted_password = pwd_buf; r.in.unjoin_flags = 0; - torture_comment(tctx, "testing NetrUnjoinDomain2 (assuming non-DC)\n"); + torture_comment(tctx, "Testing NetrUnjoinDomain2 (assuming non-DC)\n"); status = dcerpc_wkssvc_NetrUnjoinDomain2_r(b, tctx, &r); torture_assert_ntstatus_ok(tctx, status, -- cgit