]> git.ipfire.org Git - thirdparty/bind9.git/commitdiff
Use proper logging in SPNEGO tests
authorNicki Křížek <nicki@isc.org>
Tue, 17 Jun 2025 15:43:06 +0000 (17:43 +0200)
committerNicki Křížek <nicki@isc.org>
Fri, 27 Jun 2025 14:31:49 +0000 (16:31 +0200)
Avoid using print() and use proper logging facility instead.

bin/tests/system/tsiggss/tests_isc_spnego_flaws.py

index 0d0ed03d7c948d370e45062d64d74a7c72a443cf..955d9901e817953975de79ac17f7aee83443ee8f 100755 (executable)
@@ -17,7 +17,6 @@ A tool for reproducing ISC SPNEGO vulnerabilities
 """
 
 import argparse
-import datetime
 import struct
 import time
 
@@ -177,14 +176,10 @@ def send_crafted_tkey_query(opts: argparse.Namespace) -> None:
     """
 
     query = CraftedTKEYQuery(opts).msg
-    print("# > " + str(datetime.datetime.now()))
-    print(query.to_text())
-    print()
-
-    response = isctest.query.tcp(query, opts.server_ip, timeout=2)
-    print("# < " + str(datetime.datetime.now()))
-    print(response.to_text())
-    print()
+
+    isctest.query.tcp(
+        query, opts.server_ip, timeout=2, log_query=True, log_response=True
+    )
 
 
 def test_cve_2020_8625():