r22443: It isn't fatal to get the case wrong on this stuff.
authorAndrew Bartlett <abartlet@samba.org>
Sun, 22 Apr 2007 09:17:25 +0000 (09:17 +0000)
committerGerald (Jerry) Carter <jerry@samba.org>
Wed, 10 Oct 2007 19:51:21 +0000 (14:51 -0500)
Andrew Bartlett
(This used to be commit 55639277b2be2f249173f64d51ac87d176e53449)

source4/torture/rpc/drsuapi_cracknames.c

index 9d231be0e1897b81dc68c97aae82852fe55e2f96..bfca02c99d533cfa21247f737b484566eb791ae1 100644 (file)
@@ -930,10 +930,17 @@ BOOL test_DsCrackNames(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
                        } else if (crack[i].expected_str
                                   && (strcmp(r.out.ctr.ctr1->array[0].result_name, 
                                              crack[i].expected_str) != 0)) {
-                               printf("DsCrackNames failed - got %s, expected %s on %s\n", 
-                                      r.out.ctr.ctr1->array[0].result_name, 
-                                      crack[i].expected_str, comment);
-                               ret = False;
+                               if (strcasecmp(r.out.ctr.ctr1->array[0].result_name, 
+                                              crack[i].expected_str) != 0) {
+                                       printf("DsCrackNames failed - got %s, expected %s on %s\n", 
+                                              r.out.ctr.ctr1->array[0].result_name, 
+                                              crack[i].expected_str, comment);
+                                       ret = False;
+                               } else {
+                                       printf("(warning) DsCrackNames returned different case - got %s, expected %s on %s\n", 
+                                              r.out.ctr.ctr1->array[0].result_name, 
+                                              crack[i].expected_str, comment);
+                               }
                        } else if (crack[i].expected_dns
                                   && (strcmp(r.out.ctr.ctr1->array[0].dns_domain_name, 
                                              crack[i].expected_dns) != 0)) {