# (there is rpc.lsa.secrets fails due to OpenPolicy2 for example)
plansmbtorture4testsuite(t, "nt4_dc", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD')
elif t == "rpc.mdssvc":
- plansmbtorture4testsuite(t, "fileserver", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD --option=torture:no_spotlight_localdir=$SELFTEST_PREFIX/fileserver/share')
+ plansmbtorture4testsuite(t, "fileserver", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD')
elif t == "smb2.durable-open" or t == "smb2.durable-v2-open" or t == "smb2.replay" or t == "smb2.durable-v2-delay":
plansmbtorture4testsuite(t, "nt4_dc", '//$SERVER_IP/durable -U$USERNAME%$PASSWORD')
plansmbtorture4testsuite(t, "ad_dc", '//$SERVER_IP/durable -U$USERNAME%$PASSWORD')
data, struct torture_mdsscv_state);
struct dcerpc_binding_handle *b = state->p->binding_handle;
struct policy_handle ph;
- const char *localdir = NULL;
+ struct policy_handle nullh;
uint32_t device_id;
uint32_t unkn2;
uint32_t unkn3;
share_mount_path = torture_setting_string(
tctx, "share_mount_path", "/foo/bar");
- localdir = torture_setting_string(
- tctx, "no_spotlight_localdir", NULL);
- torture_assert_not_null_goto(
- tctx, localdir, ok, done,
- "need 'no_spotlight_localdir' torture option \n");
-
device_id_out = device_id = generate_random();
unkn2_out = unkn2 = 23;
unkn3_out = unkn3 = 0;
ZERO_STRUCT(ph);
+ ZERO_STRUCT(nullh);
status = dcerpc_mdssvc_open(b,
tctx,
torture_assert_u32_equal_goto(tctx, unkn3, unkn3_out,
ok, done, "Bad unkn3\n");
- torture_assert_str_equal_goto(tctx, share_path, localdir, ok, done,
- "Wrong share path\n");
+ torture_assert_goto(tctx, share_path[0] == '\0', ok, done,
+ "Expected empty string as share path\n");
+
+ torture_assert_mem_equal_goto(tctx, &ph, &nullh,
+ sizeof(ph), ok, done,
+ "Expected all-zero policy handle\n");
done:
return ok;