s4-smbtorture: pure cosmetic cleanup of eventlog test.
authorGünther Deschner <gd@samba.org>
Mon, 12 Jan 2009 17:21:20 +0000 (18:21 +0100)
committerGünther Deschner <gd@samba.org>
Wed, 14 Jan 2009 09:18:13 +0000 (10:18 +0100)
Guenther

source4/torture/rpc/eventlog.c

index e89cdd3ea918b606759c586ca9b7ed2f2759c596..7c3cb0ef463b837dd92a7c7c813205160e8df858 100644 (file)
@@ -1,20 +1,20 @@
-/* 
+/*
    Unix SMB/CIFS implementation.
    test suite for eventlog rpc operations
 
    Copyright (C) Tim Potter 2003,2005
    Copyright (C) Jelmer Vernooij 2004
-   
+
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
-   
+
    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.
-   
+
    You should have received a copy of the GNU General Public License
    along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */
@@ -34,9 +34,9 @@ static void init_lsa_String(struct lsa_String *name, const char *s)
        name->size = name->length;
 }
 
-static bool get_policy_handle(struct torture_context *tctx, 
-                                                         struct dcerpc_pipe *p,
-                                                         struct policy_handle *handle)
+static bool get_policy_handle(struct torture_context *tctx,
+                             struct dcerpc_pipe *p,
+                             struct policy_handle *handle)
 {
        struct eventlog_OpenEventLogW r;
        struct eventlog_OpenUnknown0 unknown0;
@@ -54,8 +54,8 @@ static bool get_policy_handle(struct torture_context *tctx,
        r.in.minor_version = 0x00000001;
        r.out.handle = handle;
 
-       torture_assert_ntstatus_ok(tctx, 
-                       dcerpc_eventlog_OpenEventLogW(p, tctx, &r), 
+       torture_assert_ntstatus_ok(tctx,
+                       dcerpc_eventlog_OpenEventLogW(p, tctx, &r),
                        "OpenEventLog failed");
 
        torture_assert_ntstatus_ok(tctx, r.out.result, "OpenEventLog failed");
@@ -79,22 +79,22 @@ static bool test_GetNumRecords(struct torture_context *tctx, struct dcerpc_pipe
        r.in.handle = &handle;
        r.out.number = &number;
 
-       torture_assert_ntstatus_ok(tctx, 
-                       dcerpc_eventlog_GetNumRecords(p, tctx, &r), 
+       torture_assert_ntstatus_ok(tctx,
+                       dcerpc_eventlog_GetNumRecords(p, tctx, &r),
                        "GetNumRecords failed");
 
        torture_comment(tctx, "%d records\n", *r.out.number);
 
        cr.in.handle = cr.out.handle = &handle;
 
-       torture_assert_ntstatus_ok(tctx, 
-                                       dcerpc_eventlog_CloseEventLog(p, tctx, &cr), 
-                                       "CloseEventLog failed");
+       torture_assert_ntstatus_ok(tctx,
+                       dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
+                       "CloseEventLog failed");
        return true;
 }
 
-static bool test_ReadEventLog(struct torture_context *tctx, 
-                                                         struct dcerpc_pipe *p)
+static bool test_ReadEventLog(struct torture_context *tctx,
+                             struct dcerpc_pipe *p)
 {
        NTSTATUS status;
        struct eventlog_ReadEventLogW r;
@@ -132,7 +132,7 @@ static bool test_ReadEventLog(struct torture_context *tctx,
 
                torture_assert_ntstatus_equal(tctx, r.out.result, NT_STATUS_BUFFER_TOO_SMALL,
                        "ReadEventLog failed");
-               
+
                /* Now read the actual record */
 
                r.in.number_of_bytes = *r.out.real_size;
@@ -141,7 +141,7 @@ static bool test_ReadEventLog(struct torture_context *tctx,
                status = dcerpc_eventlog_ReadEventLogW(p, tctx, &r);
 
                torture_assert_ntstatus_ok(tctx, status, "ReadEventLog failed");
-               
+
                /* Decode a user-marshalled record */
 
                blob.length = *r.out.sent_size;
@@ -155,7 +155,7 @@ static bool test_ReadEventLog(struct torture_context *tctx,
 
                NDR_PRINT_DEBUG(eventlog_Record, &rec);
 
-               torture_assert_ntstatus_ok(tctx, status, 
+               torture_assert_ntstatus_ok(tctx, status,
                                "ReadEventLog failed parsing event log record");
 
                r.in.offset++;
@@ -163,15 +163,15 @@ static bool test_ReadEventLog(struct torture_context *tctx,
 
        cr.in.handle = cr.out.handle = &handle;
 
-       torture_assert_ntstatus_ok(tctx, 
-                                       dcerpc_eventlog_CloseEventLog(p, tctx, &cr), 
-                                       "CloseEventLog failed");
+       torture_assert_ntstatus_ok(tctx,
+                       dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
+                       "CloseEventLog failed");
 
        return true;
 }
 
-static bool test_FlushEventLog(struct torture_context *tctx, 
-                                                          struct dcerpc_pipe *p)
+static bool test_FlushEventLog(struct torture_context *tctx,
+                              struct dcerpc_pipe *p)
 {
        struct eventlog_FlushEventLog r;
        struct eventlog_CloseEventLog cr;
@@ -183,21 +183,21 @@ static bool test_FlushEventLog(struct torture_context *tctx,
        r.in.handle = &handle;
 
        /* Huh?  Does this RPC always return access denied? */
-       torture_assert_ntstatus_equal(tctx, 
+       torture_assert_ntstatus_equal(tctx,
                        dcerpc_eventlog_FlushEventLog(p, tctx, &r),
-                       NT_STATUS_ACCESS_DENIED, 
+                       NT_STATUS_ACCESS_DENIED,
                        "FlushEventLog failed");
 
        cr.in.handle = cr.out.handle = &handle;
 
-       torture_assert_ntstatus_ok(tctx, 
-                                       dcerpc_eventlog_CloseEventLog(p, tctx, &cr), 
-                                       "CloseEventLog failed");
+       torture_assert_ntstatus_ok(tctx,
+                       dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
+                       "CloseEventLog failed");
 
        return true;
 }
 
-static bool test_ClearEventLog(struct torture_context *tctx, 
+static bool test_ClearEventLog(struct torture_context *tctx,
                               struct dcerpc_pipe *p)
 {
        struct eventlog_ClearEventLogW r;
@@ -210,21 +210,21 @@ static bool test_ClearEventLog(struct torture_context *tctx,
        r.in.handle = &handle;
        r.in.backupfile = NULL;
 
-       torture_assert_ntstatus_ok(tctx, 
-                       dcerpc_eventlog_ClearEventLogW(p, tctx, &r), 
+       torture_assert_ntstatus_ok(tctx,
+                       dcerpc_eventlog_ClearEventLogW(p, tctx, &r),
                        "ClearEventLog failed");
 
        cr.in.handle = cr.out.handle = &handle;
 
-       torture_assert_ntstatus_ok(tctx, 
-                                       dcerpc_eventlog_CloseEventLog(p, tctx, &cr), 
-                                       "CloseEventLog failed");
+       torture_assert_ntstatus_ok(tctx,
+                       dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
+                       "CloseEventLog failed");
 
        return true;
 }
 
-static bool test_OpenEventLog(struct torture_context *tctx, 
-                                                         struct dcerpc_pipe *p)
+static bool test_OpenEventLog(struct torture_context *tctx,
+                             struct dcerpc_pipe *p)
 {
        struct policy_handle handle;
        struct eventlog_CloseEventLog cr;
@@ -234,9 +234,9 @@ static bool test_OpenEventLog(struct torture_context *tctx,
 
        cr.in.handle = cr.out.handle = &handle;
 
-       torture_assert_ntstatus_ok(tctx, 
-                                       dcerpc_eventlog_CloseEventLog(p, tctx, &cr), 
-                                       "CloseEventLog failed");
+       torture_assert_ntstatus_ok(tctx,
+                       dcerpc_eventlog_CloseEventLog(p, tctx, &cr),
+                       "CloseEventLog failed");
 
        return true;
 }
@@ -248,11 +248,11 @@ struct torture_suite *torture_rpc_eventlog(TALLOC_CTX *mem_ctx)
        struct torture_test *test;
 
        suite = torture_suite_create(mem_ctx, "EVENTLOG");
-       tcase = torture_suite_add_rpc_iface_tcase(suite, "eventlog", 
+       tcase = torture_suite_add_rpc_iface_tcase(suite, "eventlog",
                                                  &ndr_table_eventlog);
 
        torture_rpc_tcase_add_test(tcase, "OpenEventLog", test_OpenEventLog);
-       test = torture_rpc_tcase_add_test(tcase, "ClearEventLog", 
+       test = torture_rpc_tcase_add_test(tcase, "ClearEventLog",
                                          test_ClearEventLog);
        test->dangerous = true;
        torture_rpc_tcase_add_test(tcase, "GetNumRecords", test_GetNumRecords);