#include "includes.h"
#include "system/filesys.h"
-#include "popt_common_cmdline.h"
#include "rpc_client/cli_pipe.h"
#include "client/client_proto.h"
#include "client/clitar_proto.h"
#include "../libcli/smb/smbXcli_base.h"
#include "lib/util/time_basic.h"
#include "lib/util/string_wrappers.h"
+#include "lib/cmdline/cmdline.h"
#ifndef REGISTER
#define REGISTER 0
struct cli_state *targetcli = NULL;
char *targetpath = NULL;
TALLOC_CTX *ctx = talloc_tos();
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
status = cli_resolve_path(ctx,
uint32_t attributes;
int ret = 1;
TALLOC_CTX *ctx = talloc_stackframe();
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
newdir = talloc_strdup(ctx, new_dir);
char *targetpath = NULL;
char *afname = NULL;
uint16_t fnum;
+ struct cli_credentials *creds = samba_cmdline_get_creds();
/* skip if this is . or .. */
if ( strequal(finfo->name,"..") || strequal(finfo->name,".") )
status = cli_resolve_path(
ctx,
"",
- get_cmdline_auth_info_creds(
- popt_get_cmdline_auth_info()),
+ creds,
cli_state,
afname,
&targetcli,
struct do_list_helper_state state = { .cli = cli, };
static int in_do_list = 0;
TALLOC_CTX *ctx = talloc_tos();
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS ret_status = NT_STATUS_OK;
NTSTATUS status = NT_STATUS_OK;
struct cli_state *targetcli = NULL;
char *targetname = NULL;
char *lname = NULL;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
lname = talloc_strdup(ctx, lname_in);
TALLOC_CTX *ctx = talloc_tos();
struct cli_state *targetcli;
char *targetname = NULL;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
status = cli_resolve_path(ctx, "",
static int cmd_quit(void)
{
cli_shutdown(cli);
- popt_free_cmdline_auth_info();
exit(0);
/* NOTREACHED */
return 0;
TALLOC_CTX *ctx = talloc_tos();
char *mask = NULL;
char *buf = NULL;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
mask = talloc_strdup(ctx, client_get_cur_dir());
struct cli_state *targetcli;
char *targetname = NULL;
struct push_state state;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
status = cli_resolve_path(ctx, "",
if (f == stdin) {
cli_shutdown(cli);
- popt_free_cmdline_auth_info();
exit(rc);
}
uint32_t attribute;
struct cli_state *targetcli;
char *targetname = NULL;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
char *targetname = NULL;
struct cli_state *targetcli;
uint16_t fnum = (uint16_t)-1;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
} else {
bool auth_requested = false;
- creds = get_cmdline_auth_info_creds(
- popt_get_cmdline_auth_info());
+ creds = samba_cmdline_get_creds();
auth_requested = cli_credentials_authentication_requested(creds);
if (!auth_requested) {
if (!NT_STATUS_IS_OK(status)) {
d_printf("posix_encrypt failed with error %s\n", nt_errstr(status));
} else {
+ bool ok;
+
d_printf("encryption on\n");
- set_cmdline_auth_info_smb_encrypt(popt_get_cmdline_auth_info());
+ ok = cli_credentials_set_smb_encryption(creds,
+ SMB_ENCRYPTION_REQUIRED,
+ CRED_SPECIFIED);
+ SMB_ASSERT(ok);
}
return 0;
struct cli_state *targetcli;
mode_t mode;
uint16_t fnum;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
char *targetname = NULL;
struct cli_state *targetcli;
mode_t mode;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
char *buf = NULL;
char *targetname = NULL;
struct cli_state *targetcli;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
char *buf = NULL;
char *targetname = NULL;
struct cli_state *targetcli;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
char *buf = NULL;
char *targetname = NULL;
struct cli_state *targetcli;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
char *buf2 = NULL;
char *targetname = NULL;
struct cli_state *targetcli;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
char *targetname = NULL;
char *linkname = NULL;
struct cli_state *targetcli;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
char *buf = NULL;
char *buf2 = NULL;
struct cli_state *newcli;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
char *targetname = NULL;
struct cli_state *targetcli;
mode_t mode;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
size_t num_dir_acls = 0;
size_t expected_buflen;
uint16_t i;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&name,NULL)) {
NTSTATUS status;
size_t i, num_eas;
struct ea_struct *eas;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
if (!next_token_talloc(ctx, &cmd_ptr,&name,NULL)) {
d_printf("geteas filename\n");
char *eavalue = NULL;
char *targetname = NULL;
struct cli_state *targetcli;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr, &name, NULL)
SMB_STRUCT_STAT sbuf;
struct tm *lt;
time_t tmp_time;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&name,NULL)) {
char *buf, *buf2, *buf3;
struct cli_state *targetcli;
char *targetname = NULL;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
struct cli_state *targetcli;
char *targetsrc;
char *targetdest;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
bool replace = false;
off_t written = 0;
struct scopy_timing st;
int rc = 0;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
char *buf, *buf2;
struct cli_state *targetcli;
char *targetname;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
TALLOC_CTX *ctx = talloc_tos();
struct cli_state *targetcli;
char *targetpath;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
status = cli_resolve_path(ctx, "",
TALLOC_CTX *ctx = talloc_tos();
char *buf;
int iosize;
+ struct cli_credentials *creds = samba_cmdline_get_creds();
bool smb_encrypt =
- get_cmdline_auth_info_smb_encrypt(
- popt_get_cmdline_auth_info());
+ (cli_credentials_get_smb_encryption(creds) ==
+ SMB_ENCRYPTION_REQUIRED);
if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
if (smbXcli_conn_protocol(cli->conn) < PROTOCOL_SMB2_02) {
TALLOC_CTX *ctx = talloc_tos();
char *cmd = talloc_strdup(ctx, cmd_in);
int rc = 0;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
if (!cmd) {
return 1;
struct cli_state *targetcli = NULL;
int i;
struct completion_remote info = { NULL, NULL, 1, 0, NULL, 0 };
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
NTSTATUS status;
/* can't have non-static initialisation on Sun CC, so do it
{
int rc = 0;
NTSTATUS status;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
status = cli_cm_open(talloc_tos(), NULL,
desthost,
static int do_host_query(const char *query_host)
{
NTSTATUS status;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
status = cli_cm_open(talloc_tos(), NULL,
query_host,
{
struct tar *tar_ctx = tar_get_ctx();
int ret = 0;
- struct cli_credentials *creds =
- get_cmdline_auth_info_creds(popt_get_cmdline_auth_info());
+ struct cli_credentials *creds = samba_cmdline_get_creds();
/* do we already have a connection? */
if (!cli) {
Handle a message operation.
****************************************************************************/
-static int do_message_op(struct user_auth_info *a_info)
+static int do_message_op(struct cli_credentials *creds)
{
NTSTATUS status;
}
cli_set_timeout(cli, io_timeout*1000);
- send_message(get_cmdline_auth_info_username(a_info));
+ send_message(cli_credentials_get_username(creds));
cli_shutdown(cli);
return 0;
bool tar_opt = false;
bool service_opt = false;
struct tar *tar_ctx = tar_get_ctx();
+ bool ok;
struct poptOption long_options[] = {
POPT_AUTOHELP
.descrip = "Get a list of shares available on a host",
.argDescrip = "HOST",
},
- {
- .longName = "max-protocol",
- .shortName = 'm',
- .argInfo = POPT_ARG_STRING,
- .arg = NULL,
- .val = 'm',
- .descrip = "Set the max protocol level",
- .argDescrip = "LEVEL",
- },
{
.longName = "tar",
.shortName = 'T',
POPT_COMMON_SAMBA
POPT_COMMON_CONNECTION
POPT_COMMON_CREDENTIALS
+ POPT_LEGACY_S3
+ POPT_COMMON_VERSION
POPT_TABLEEND
};
TALLOC_CTX *frame = talloc_stackframe();
+ struct cli_credentials *creds = NULL;
if (!client_set_cur_dir("\\")) {
exit(ENOMEM);
}
- /* set default debug level to 1 regardless of what smb.conf sets */
- setup_logging( "smbclient", DEBUG_DEFAULT_STDERR );
smb_init_locale();
+ ok = samba_cmdline_init(frame,
+ SAMBA_CMDLINE_CONFIG_CLIENT,
+ false /* require_smbconf */);
+ if (!ok) {
+ DBG_ERR("Failed to init cmdline parser!\n");
+ exit(ENOMEM);
+ }
lp_set_cmdline("log level", "1");
- popt_common_credentials_set_ignore_missing_conf();
- popt_common_credentials_set_delay_post();
-
/* skip argv(0) */
pc = poptGetContext("smbclient", argc, const_argv, long_options, 0);
- poptSetOtherOptionHelp(pc, "service <password>");
+ poptSetOtherOptionHelp(pc, "[OPTIONS] service <password>");
+ creds = samba_cmdline_get_creds();
while ((opt = poptGetNextOpt(pc)) != -1) {
/*
}
/* if the service has already been retrieved then check if we have also a password */
- if (service_opt
- && (!get_cmdline_auth_info_got_pass(
- popt_get_cmdline_auth_info()))
- && poptPeekArg(pc)) {
- set_cmdline_auth_info_password(
- popt_get_cmdline_auth_info(), poptGetArg(pc));
+ if (service_opt &&
+ cli_credentials_get_password(creds) == NULL &&
+ poptPeekArg(pc)) {
+ cli_credentials_set_password(creds,
+ poptGetArg(pc),
+ CRED_SPECIFIED);
}
print_sockaddr(dest_ss_str, sizeof(dest_ss_str), &dest_ss);
}
break;
- case 'E':
- setup_logging("smbclient", DEBUG_STDERR );
- display_set_stderr();
- break;
-
case 'L':
query_host = talloc_strdup(frame, poptGetOptArg(pc));
if (!query_host) {
exit(ENOMEM);
}
break;
- case 'm':
- lp_set_cmdline("client max protocol", poptGetOptArg(pc));
- break;
case 'T':
/* We must use old option processing for this. Find the
* position of the -T option in the raw argv[]. */
}
/* if the service has already been retrieved then check if we have also a password */
- if (service_opt
- && !get_cmdline_auth_info_got_pass(popt_get_cmdline_auth_info())
- && poptPeekArg(pc)) {
- set_cmdline_auth_info_password(popt_get_cmdline_auth_info(),
- poptGetArg(pc));
+ if (service_opt &&
+ cli_credentials_get_password(creds) == NULL &&
+ poptPeekArg(pc)) {
+ cli_credentials_set_password(creds,
+ poptGetArg(pc),
+ CRED_SPECIFIED);
}
if (service_opt && service) {
}
poptFreeContext(pc);
- popt_burn_cmdline_password(argc, argv);
+ samba_cmdline_burn(argc, argv);
DEBUG(3,("Client started (version %s).\n", samba_version_string()));
- /* Ensure we have a password (or equivalent). */
- popt_common_credentials_post();
-
if (tar_to_process(tar_ctx)) {
if (cmdstr)
process_command_string(cmdstr);
rc = do_host_query(qhost);
} else if (message) {
- rc = do_message_op(popt_get_cmdline_auth_info());
+ rc = do_message_op(creds);
} else if (process(base_directory)) {
rc = 1;
}
- popt_free_cmdline_auth_info();
TALLOC_FREE(frame);
return rc;
}
plantestsuite("samba3.blackbox.smbclient_s3.SMB3.plain.member_creds", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$SERVER', '$SERVER/$USERNAME', '$PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "SMB3"])
env = "nt4_dc_smb1_done"
-plantestsuite("samba3.blackbox.smbclient_s3.NT1.sign", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$DOMAIN', '$DC_USERNAME', '$DC_PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "NT1", "--signing=required"])
+plantestsuite("samba3.blackbox.smbclient_s3.NT1.sign", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$DOMAIN', '$DC_USERNAME', '$DC_PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "NT1", "--client-protection=sign"])
env = "nt4_dc"
-plantestsuite("samba3.blackbox.smbclient_s3.SMB3.sign", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$DOMAIN', '$DC_USERNAME', '$DC_PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "SMB3", "--signing=required"])
+plantestsuite("samba3.blackbox.smbclient_s3.SMB3.sign", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$DOMAIN', '$DC_USERNAME', '$DC_PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "SMB3", "--client-protection=sign"])
for env in ["nt4_member", "ad_member"]:
- plantestsuite("samba3.blackbox.smbclient_s3.NT1.sign.member_creds", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$SERVER', '$SERVER/$USERNAME', '$PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "NT1", "--signing=required"])
- plantestsuite("samba3.blackbox.smbclient_s3.SMB3.sign.member_creds", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$SERVER', '$SERVER/$USERNAME', '$PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "SMB3", "--signing=required"])
+ plantestsuite("samba3.blackbox.smbclient_s3.NT1.sign.member_creds", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$SERVER', '$SERVER/$USERNAME', '$PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "NT1", "--client-protection=sign"])
+ plantestsuite("samba3.blackbox.smbclient_s3.SMB3.sign.member_creds", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$SERVER', '$SERVER/$USERNAME', '$PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "SMB3", "--client-protection=sign"])
env = "nt4_dc_smb1_done"
# encrypted
-plantestsuite("samba3.blackbox.smbclient_s3.NT1.crypt", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$DOMAIN', '$USERNAME', '$PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "NT1", "-e"])
+plantestsuite("samba3.blackbox.smbclient_s3.NT1.crypt", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$DOMAIN', '$USERNAME', '$PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "NT1", "--client-protection=encrypt"])
env = "nt4_dc"
-plantestsuite("samba3.blackbox.smbclient_s3.SMB3.crypt", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$DOMAIN', '$USERNAME', '$PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "SMB3", "-e"])
+plantestsuite("samba3.blackbox.smbclient_s3.SMB3.crypt", env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_s3.sh"), '$SERVER', '$SERVER_IP', '$DOMAIN', '$USERNAME', '$PASSWORD', '$USERID', '$LOCAL_PATH', '$PREFIX', smbclient3, wbinfo, net, configuration, "SMB3", "--client-protection=encrypt"])
for env in ["fileserver"]:
plantestsuite("samba3.blackbox.preserve_case.NT1", env + "_smb1_done", [os.path.join(samba3srcdir, "script/tests/test_preserve_case.sh"), '$SERVER', '$DOMAIN', '$USERNAME', '$PASSWORD', '$PREFIX', smbclient3, "NT1"])
# The ktest environment uses:
# server min protocol = SMB3_00
# client max protocol = SMB3
-options_list = ["", "-e"]
+options_list = ["", "--client-protection=encrypt"]
for options in options_list:
plantestsuite("samba3.blackbox.smbclient_krb5 old ccache %s" % options, "ktest:local",
[os.path.join(samba3srcdir, "script/tests/test_smbclient_krb5.sh"),
plantestsuite("samba3.blackbox.smbclient_large_file %s krb5" % options, "ktest:local",
[os.path.join(samba3srcdir, "script/tests/test_smbclient_large_file.sh"),
"$PREFIX/ktest/krb5_ccache-3",
- smbclient3, "$SERVER", "$PREFIX", options, "-k " + configuration])
+ smbclient3, "$SERVER", "$PREFIX", options, "--use-krb5-ccache=$PREFIX/ktest/krb5_ccache-3 " + configuration])
-options_list = ["-mNT1", "-mNT1 -e", "-mSMB3", "-mSMB3 -e"]
+options_list = ["-mNT1", "-mNT1 --client-protection=encrypt", "-mSMB3", "-mSMB3 --client-protection=encrypt"]
for options in options_list:
env = "nt4_dc"
if "NT1" in options: