From 4030a62b2d9ee524f6f02506323343cd36daae24 Mon Sep 17 00:00:00 2001 From: Stefan Metzmacher Date: Thu, 21 Nov 2024 15:57:41 +0100 Subject: [PATCH] python:tests/krb5: avoid some problems when running against w2025 (preview) with STRICT_CHECKING=0 Signed-off-by: Stefan Metzmacher Reviewed-by: Andreas Schneider --- python/samba/tests/krb5/raw_testcase.py | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/python/samba/tests/krb5/raw_testcase.py b/python/samba/tests/krb5/raw_testcase.py index 995a5c78b11..82246752715 100644 --- a/python/samba/tests/krb5/raw_testcase.py +++ b/python/samba/tests/krb5/raw_testcase.py @@ -4070,7 +4070,7 @@ class RawKerberosTest(TestCase): else: self.assertNotIn(PADATA_REQ_ENC_PA_REP, enc_pa_dict) - if PADATA_SUPPORTED_ETYPES in enc_pa_dict: + if PADATA_SUPPORTED_ETYPES in enc_pa_dict and self.strict_checking: expected_supported_etypes = kdc_exchange_dict[ 'expected_supported_etypes'] @@ -5128,9 +5128,10 @@ class RawKerberosTest(TestCase): require_strict.add(PADATA_ENCRYPTED_CHALLENGE) got_patypes = tuple(pa['padata-type'] for pa in rep_padata) + TD_CMS_DIGEST_ALGORITHMS = 111 self.assertSequenceElementsEqual(expected_patypes, got_patypes, require_strict=require_strict, - unchecked={PADATA_PW_SALT}) + unchecked={PADATA_PW_SALT,TD_CMS_DIGEST_ALGORITHMS}) if not expected_patypes: return None -- 2.47.3