}
}
- if (!lp_parm_bool(-1, "target", "samba3", False)) {
+ if (!torture_setting_bool(tctx, "samba3", False)) {
goto done;
}
}
}
- if (lp_parm_bool(-1, "torture", "showall", False) ||
+ if (torture_setting_bool(tctx, "showall", False) ||
res != denytable1[i].result) {
int64_t tdif;
GetTimeOfDay(&tv);
}
}
- if (lp_parm_bool(-1, "torture", "showall", False) ||
+ if (torture_setting_bool(tctx, "showall", False) ||
res != denytable2[i].result) {
int64_t tdif;
GetTimeOfDay(&tv);
GetTimeOfDay(&tv);
tdif = usec_time_diff(&tv, &tv_start);
tdif /= 1000;
- if (lp_parm_bool(-1, "torture", "showall", False) ||
+ if (torture_setting_bool(tctx, "showall", False) ||
!NT_STATUS_EQUAL(status2, status2_p) ||
res != res2) {
torture_comment(tctx, "\n%-20s %-70s\n%-20s %-70s %4s %4s %s/%s\n",
return False;
}
- if (lp_parm_bool(-1, "target", "samba3", False)) {
+ if (torture_setting_bool(torture, "samba3", False)) {
/*
* In Samba3 it might happen that the old smbd from
* test_disconnect_lock is not scheduled before the
char **unc_list = NULL;
int num_unc_names = 0, conn_index=0, empty_lines=0;
const char *p;
- lpar->retry = lp_parm_int(-1, "torture", "retry",3);
- lpar->blocksize = lp_parm_int(-1, "torture", "blocksize",65535);
- lpar->writeblocks = lp_parm_int(-1, "torture", "writeblocks",15);
- lpar->writeratio = lp_parm_int(-1, "torture", "writeratio",5);
+ lpar->retry = torture_setting_int(tctx, "retry",3);
+ lpar->blocksize = torture_setting_int(tctx, "blocksize",65535);
+ lpar->writeblocks = torture_setting_int(tctx, "writeblocks",15);
+ lpar->writeratio = torture_setting_int(tctx, "writeratio",5);
lpar->workgroup = lp_workgroup();
- p = lp_parm_string(-1, "torture", "unclist");
+ p = torture_setting_string(tctx, "unclist", NULL);
if (p) {
char *h, *s;
unc_list = file_lines_load(p, &num_unc_names, NULL);
}else{
lpar->unc = talloc_array(tctx, struct unclist *, 1);
lpar->unc[0] = talloc(tctx,struct unclist);
- lpar->unc[0]->host = lp_parm_string(-1, "torture", "host");
- lpar->unc[0]->share = lp_parm_string(-1, "torture", "share");
+ lpar->unc[0]->host = torture_setting_string(tctx, "host", NULL);
+ lpar->unc[0]->share = torture_setting_string(tctx, "share", NULL);
return 1;
}
}
struct ldap_connection *conn;
TALLOC_CTX *mem_ctx;
BOOL ret = True;
- const char *host = lp_parm_string(-1, "torture", "host");
- const char *userdn = lp_parm_string(-1, "torture", "ldap_userdn");
- const char *secret = lp_parm_string(-1, "torture", "ldap_secret");
+ const char *host = torture_setting_string(torture, "host", NULL);
+ const char *userdn = torture_setting_string(torture, "ldap_userdn", NULL);
+ const char *secret = torture_setting_string(torture, "ldap_secret", NULL);
char *url;
char *basedn;
{
TALLOC_CTX *mem_ctx;
BOOL ret = True;
- const char *host = lp_parm_string(-1, "torture", "host");
+ const char *host = torture_setting_string(torture, "host", NULL);
mem_ctx = talloc_init("torture_cldap");
NTSTATUS status;
BOOL ret = True;
- make_nbt_name_server(&name, lp_parm_string(-1, "torture", "host"));
+ make_nbt_name_server(&name, torture_setting_string(torture, "host", NULL));
/* do an initial name resolution to find its IP */
status = resolve_name(&name, mem_ctx, &address, event_context_find(mem_ctx));
struct ldb_context *ldb;
TALLOC_CTX *mem_ctx;
BOOL ret = True;
- const char *host = lp_parm_string(-1, "torture", "host");
+ const char *host = torture_setting_string(torture, "host", NULL);
char *url;
struct test_rootDSE rootDSE;
struct dsdb_schema *schema = NULL;
struct lsa_String name;
mem_ctx = talloc_init("test_domain_open");
- binding = lp_parm_string(-1, "torture", "binding");
+ binding = torture_setting_string(torture, "binding", NULL);
evt_ctx = event_context_find(torture);
net_ctx = libnet_context_init(evt_ctx);
struct policy_handle h;
const char *bindstr;
- bindstr = lp_parm_string(-1, "torture", "binding");
+ bindstr = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(torture, bindstr, &binding);
if (!NT_STATUS_IS_OK(status)) {
d_printf("failed to parse binding string\n");
struct dcerpc_pipe *p;
struct libnet_DomainClose r;
- bindstr = lp_parm_string(-1, "torture", "binding");
+ bindstr = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(torture, bindstr, &binding);
if (!NT_STATUS_IS_OK(status)) {
d_printf("failed to parse binding string\n");
BOOL ret = True;
mem_ctx = talloc_init("test_domainopen_lsa");
- binding = lp_parm_string(-1, "torture", "binding");
+ binding = torture_setting_string(torture, "binding", NULL);
ctx = libnet_context_init(evt_ctx);
ctx->cred = cmdline_credentials;
struct dcerpc_pipe *p;
struct libnet_DomainClose r;
- bindstr = lp_parm_string(-1, "torture", "binding");
+ bindstr = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(torture, bindstr, &binding);
if (!NT_STATUS_IS_OK(status)) {
d_printf("failed to parse binding string\n");
ctx = libnet_context_init(NULL);
ctx->cred = cmdline_credentials;
- lookup.in.hostname = lp_parm_string(-1, "torture", "host");
+ lookup.in.hostname = torture_setting_string(torture, "host", NULL);
if (lookup.in.hostname == NULL) {
- bindstr = lp_parm_string(-1, "torture", "binding");
+ bindstr = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(mem_ctx, bindstr, &bind);
if (NT_STATUS_IS_OK(status)) {
lookup.in.hostname = bind->host;
ctx = libnet_context_init(NULL);
ctx->cred = cmdline_credentials;
- lookup.in.hostname = lp_parm_string(-1, "torture", "host");
+ lookup.in.hostname = torture_setting_string(torture, "host", NULL);
if (lookup.in.hostname == NULL) {
- bindstr = lp_parm_string(-1, "torture", "binding");
+ bindstr = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(mem_ctx, bindstr, &bind);
if (NT_STATUS_IS_OK(status)) {
lookup.in.hostname = bind->host;
struct dcerpc_binding *binding;
const char *bindstr;;
- bindstr = lp_parm_string(-1, "torture", "binding");
+ bindstr = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(torture, bindstr, &binding);
if (!NT_STATUS_IS_OK(status)) {
d_printf("failed to parse binding string\n");
struct dcerpc_binding *binding;
const char *bindstr;
- bindstr = lp_parm_string(-1, "torture", "binding");
+ bindstr = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(torture, bindstr, &binding);
if (!NT_STATUS_IS_OK(status)) {
d_printf("failed to parse binding string\n");
struct dcerpc_binding *binding;
const char *bindstr;
- bindstr = lp_parm_string(-1, "torture", "binding");
+ bindstr = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(torture, bindstr, &binding);
if (!NT_STATUS_IS_OK(status)) {
d_printf("failed to parse binding string\n");
struct dcerpc_binding *binding;
const char *bindstr;
- bindstr = lp_parm_string(-1, "torture", "binding");
+ bindstr = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(torture, bindstr, &binding);
if (!NT_STATUS_IS_OK(status)) {
d_printf("failed to parse binding string\n");
struct dcerpc_binding *binding;
const char *bindstr;
- bindstr = lp_parm_string(-1, "torture", "binding");
+ bindstr = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(torture, bindstr, &binding);
if (!NT_STATUS_IS_OK(status)) {
d_printf("failed to parse binding string\n");
TALLOC_CTX *mem_ctx;
mem_ctx = talloc_init("test_listshares");
- binding = lp_parm_string(-1, "torture", "binding");
+ binding = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(mem_ctx, binding, &bind);
if (!NT_STATUS_IS_OK(status)) {
printf("Error while parsing the binding string\n");
struct libnet_DelShare share;
mem_ctx = talloc_init("test_listshares");
- host = lp_parm_string(-1, "torture", "host");
- binding = lp_parm_string(-1, "torture", "binding");
+ host = torture_setting_string(torture, "host", NULL);
+ binding = torture_setting_string(torture, "binding", NULL);
status = dcerpc_parse_binding(mem_ctx, binding, &bind);
if (!NT_STATUS_IS_OK(status)) {
printf("Error while parsing the binding string\n");
BOOL ret = True;
mem_ctx = talloc_init("test_createuser");
- binding = lp_parm_string(-1, "torture", "binding");
+ binding = torture_setting_string(torture, "binding", NULL);
ctx = libnet_context_init(NULL);
ctx->cred = cmdline_credentials;
BOOL ret = True;
prep_mem_ctx = talloc_init("prepare test_deleteuser");
- binding = lp_parm_string(-1, "torture", "binding");
+ binding = torture_setting_string(torture, "binding", NULL);
ctx = libnet_context_init(NULL);
ctx->cred = cmdline_credentials;
BOOL ret = True;
prep_mem_ctx = talloc_init("prepare test_deleteuser");
- binding = lp_parm_string(-1, "torture", "binding");
+ binding = torture_setting_string(torture, "binding", NULL);
ctx = libnet_context_init(NULL);
ctx->cred = cmdline_credentials;
struct libnet_UserInfo req;
prep_mem_ctx = talloc_init("prepare torture user info");
- binding = lp_parm_string(-1, "torture", "binding");
+ binding = torture_setting_string(torture, "binding", NULL);
ctx = libnet_context_init(NULL);
ctx->cred = cmdline_credentials;
uint32_t rid;
mem_ctx = talloc_init("test_userinfo");
- binding = lp_parm_string(-1, "torture", "binding");
+ binding = torture_setting_string(torture, "binding", NULL);
status = torture_rpc_connection(mem_ctx,
&p,
BOOL ret = True;
mem_ctx = talloc_init("test_useradd");
- binding = lp_parm_string(-1, "torture", "binding");
+ binding = torture_setting_string(torture, "binding", NULL);
status = torture_rpc_connection(mem_ctx,
&p,
BOOL ret = True;
mem_ctx = talloc_init("test_userdel");
- binding = lp_parm_string(-1, "torture", "binding");
+ binding = torture_setting_string(torture, "binding", NULL);
status = torture_rpc_connection(mem_ctx,
&p,
BOOL ret = True;
mem_ctx = talloc_init("test_userdel");
- binding = lp_parm_string(-1, "torture", "binding");
+ binding = torture_setting_string(torture, "binding", NULL);
status = torture_rpc_connection(mem_ctx,
&p,
{
struct timeval tv;
struct tdb_wrap *tdbw;
- int timelimit = lp_parm_int(-1, "torture", "timelimit", 10);
+ int timelimit = torture_setting_int(torture, "timelimit", 10);
int i, count;
TALLOC_CTX *tmp_ctx = talloc_new(torture);
{
struct timeval tv;
struct ldb_context *ldb;
- int timelimit = lp_parm_int(-1, "torture", "timelimit", 10);
+ int timelimit = torture_setting_int(torture, "timelimit", 10);
int i, count;
TALLOC_CTX *tmp_ctx = talloc_new(torture);
struct ldb_ldif *ldif;
}
if (codepoint % 1000 == 0) {
- if (!lp_parm_bool(-1, "torture", "progress", True)) {
- printf("codepoint=%u \r", codepoint);
+ if (!torture_setting_bool(tctx, "progress", True)) {
+ torture_comment(tctx, "codepoint=%u \r", codepoint);
}
}
unsigned int c;
if (i % 1000 == 0) {
- if (!lp_parm_bool(-1, "torture", "progress", True)) {
+ if (!torture_setting_bool(tctx, "progress", true)) {
torture_comment(tctx, "i=%u \r", i);
}
}
struct smbcli_state *cli;
const char *p;
- p = lp_parm_string(-1, "torture", "timelimit");
+ p = torture_setting_string(torture, "timelimit", NULL);
if (p && *p) {
timelimit = atoi(p);
}
warmup = timelimit / 20;
- loadfile = lp_parm_string(-1, "torture", "loadfile");
+ loadfile = torture_setting_string(torture, "loadfile", NULL);
if (!loadfile || !*loadfile) {
loadfile = "client.txt";
}
TALLOC_CTX *mem_ctx = talloc_new(torture);
extern int torture_nprocs;
int i, count=0;
- int timelimit = lp_parm_int(-1, "torture", "timelimit", 10);
+ int timelimit = torture_setting_int(torture, "timelimit", 10);
union smb_open io;
struct timeval tv;
struct event_context *ev = event_context_find(mem_ctx);
CHECK_STATUS(status, NT_STATUS_OK);
CHECK_VALUE(io.readx.out.remaining, 0xFFFF);
CHECK_VALUE(io.readx.out.compaction_mode, 0);
- if (lp_parm_bool(-1, "target", "samba3", False)) {
+ if (lp_parm_bool(-1, "torture", "samba3", False)) {
printf("SAMBA3: ignore wrong nread[%d] should be [%d]\n",
io.readx.out.nread, 0);
} else {
struct smbcli_tree *hideunwrite;
if (!torture_open_connection_share(
- torture, &cli, lp_parm_string(-1, "torture", "host"),
- lp_parm_string(-1, "torture", "share"), NULL)) {
+ torture, &cli, torture_setting_string(torture, "host", NULL),
+ torture_setting_string(torture, "share", NULL), NULL)) {
d_printf("torture_open_connection_share failed\n");
return False;
}
}
if (!torture_open_connection_share(
- torture, &cli, lp_parm_string(-1, "torture", "host"),
- lp_parm_string(-1, "torture", "share"), NULL)) {
+ torture, &cli, torture_setting_string(torture, "host", NULL),
+ torture_setting_string(torture, "share", NULL), NULL)) {
d_printf("torture_open_connection_share failed\n");
ret = False;
goto done;
smbcli_deltree(cli->tree, dirname);
status = torture_second_tcon(torture, cli->session,
- lp_parm_string(-1, "torture", "share"),
+ torture_setting_string(torture, "share", NULL),
&tree2);
CHECK_STATUS(status, NT_STATUS_OK);
if (!NT_STATUS_IS_OK(status))
NTSTATUS status;
int fnum;
- if (!lp_parm_bool(-1, "torture", "dangerous", False)) {
+ if (!torture_setting_bool(torture, "dangerous", False)) {
printf("torture_raw_sfileinfo_bug disabled - enable dangerous tests to use\n");
return True;
}
struct dcerpc_pipe **pipe;
const struct dcerpc_interface_table **table;
- if (!lp_parm_bool(-1, "torture", "async", False)) {
+ if (!torture_setting_bool(torture, "async", False)) {
printf("async bind test disabled - enable async tests to use\n");
return True;
}
- binding_string = lp_parm_string(-1, "torture", "binding");
+ binding_string = torture_setting_string(torture, "binding", NULL);
/* talloc context */
mem_ctx = talloc_init("torture_async_bind");
{
struct dcerpc_pipe *p;
struct dcerpc_binding *binding;
- const char *binding_string = lp_parm_string(-1, "torture", "binding");
+ const char *binding_string = torture_setting_string(torture, "binding", NULL);
TALLOC_CTX *mem_ctx;
NTSTATUS status;
BOOL ret;
ret &= test_DsBind(p, mem_ctx, &priv);
- ret &= test_DsCrackNames(p, mem_ctx, &priv, lp_parm_string(-1, "torture", "host"));
+ ret &= test_DsCrackNames(p, mem_ctx, &priv,
+ torture_setting_string(torture, "host", NULL));
ret &= test_DsUnbind(p, mem_ctx, &priv);
return False;
}
- if (!lp_parm_bool(-1, "torture", "dangerous", False)) {
+ if (!torture_setting_bool(torture, "dangerous", False)) {
printf("initshutdown tests disabled - enable dangerous tests to use\n");
} else {
ret &= test_Init(p, mem_ctx, "spottyfood", 30);
NTSTATUS status;
struct lsa_QuerySecurity r;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping QuerySecurity test against Samba4\n");
return True;
}
NTSTATUS status;
int i;
BOOL ret = True;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping QueryDomainInformationPolicy test against Samba4\n");
return True;
}
BOOL ret = True;
printf("\nTesting QueryInfoPolicy\n");
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping QueryInfoPolicy against Samba4\n");
return True;
}
int i;
BOOL ret = True;
printf("\nTesting QueryInfoPolicy2\n");
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping QueryInfoPolicy2 against Samba4\n");
return True;
}
struct dcerpc_pipe *p;
TALLOC_CTX *mem_ctx, *loop_ctx;
BOOL ret = True;
- const char *binding = lp_parm_string(-1, "torture", "binding");
+ const char *binding = torture_setting_string(torture, "binding", NULL);
const struct dcerpc_interface_list *l;
struct dcerpc_binding *b;
NTSTATUS status;
struct netr_LogonUasLogon r;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping LogonUasLogon test against Samba4\n");
return True;
}
NTSTATUS status;
struct netr_LogonUasLogoff r;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping LogonUasLogoff test against Samba4\n");
return True;
}
int i;
BOOL ret = True;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping DatabaseSync test against Samba4\n");
return True;
}
int i;
BOOL ret = True;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping DatabaseDeltas test against Samba4\n");
return True;
}
struct netr_GetDcName r;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping GetDCName test against Samba4\n");
return True;
}
BOOL ret = True;
int i;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping LogonControl test against Samba4\n");
return True;
}
NTSTATUS status;
struct netr_GetAnyDCName r;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping GetAnyDCName test against Samba4\n");
return True;
}
BOOL ret = True;
int i;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping LogonControl2 test against Samba4\n");
return True;
}
int i;
BOOL ret = True;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping DatabaseSync2 test against Samba4\n");
return True;
}
BOOL ret = True;
int i;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping DatabaseSync2 test against Samba4\n");
return True;
}
struct netr_DsRGetSiteName r;
BOOL ret = True;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping DsRGetSiteName test against Samba4\n");
return True;
}
}
status = smbcli_full_connection(mem_ctx, &cli,
- lp_parm_string(-1, "torture", "host"),
+ torture_setting_string(torture, "host", NULL),
"IPC$", NULL, cmdline_credentials,
NULL);
if (!NT_STATUS_IS_OK(status)) {
}
status = smbcli_full_connection(mem_ctx, &cli,
- lp_parm_string(-1, "torture", "host"),
+ torture_setting_string(torture, "host", NULL),
"IPC$", NULL, cmdline_credentials,
NULL);
if (!NT_STATUS_IS_OK(status)) {
const char *wks_name;
int i;
- wks_name = lp_parm_string(-1, "torture", "wksname");
+ wks_name = torture_setting_string(torture, "wksname", NULL);
if (wks_name == NULL) {
wks_name = get_myname();
}
}
status = smbcli_full_connection(mem_ctx, &cli,
- lp_parm_string(-1, "torture", "host"),
+ torture_setting_string(torture, "host", NULL),
"IPC$", NULL, anon_creds, NULL);
if (!NT_STATUS_IS_OK(status)) {
d_printf("smbcli_full_connection failed: %s\n",
struct cli_credentials *anon_creds;
const char *wks_name;
- wks_name = lp_parm_string(-1, "torture", "wksname");
- if (wks_name == NULL) {
- wks_name = get_myname();
- }
+ wks_name = torture_setting_string(torture, "wksname", get_myname());
mem_ctx = talloc_init("torture_samba3_sessionkey");
ret = True;
- if (!lp_parm_bool(-1, "target", "samba3", False)) {
+ if (!torture_setting_bool(torture, "samba3", False)) {
/* Samba3 in the build farm right now does this happily. Need
* to fix :-) */
}
status = smbcli_full_connection(
- mem_ctx, &cli, lp_parm_string(-1, "torture", "host"),
+ mem_ctx, &cli, torture_setting_string(torture, "host", NULL),
"IPC$", NULL, cmdline_credentials, NULL);
if (!NT_STATUS_IS_OK(status)) {
d_printf("(%s) smbcli_full_connection failed: %s\n",
}
status = smbcli_full_connection(
- mem_ctx, &cli, lp_parm_string(-1, "torture", "host"),
+ mem_ctx, &cli, torture_setting_string(torture, "host", NULL),
"IPC$", NULL, anon_creds, NULL);
if (!NT_STATUS_IS_OK(status)) {
d_printf("(%s) anon smbcli_full_connection failed: %s\n",
}
if (!(torture_open_connection_share(
- mem_ctx, &cli, lp_parm_string(-1, "torture", "host"),
+ mem_ctx, &cli, torture_setting_string(torture, "host", NULL),
"IPC$", NULL))) {
talloc_free(mem_ctx);
return False;
}
if (!(torture_open_connection_share(
- mem_ctx, &cli, lp_parm_string(-1, "torture", "host"),
+ mem_ctx, &cli, torture_setting_string(torture, "host", NULL),
"IPC$", NULL))) {
d_printf("IPC$ connection failed\n");
talloc_free(mem_ctx);
return False;
}
- sd = get_sharesec(mem_ctx, cli->session, lp_parm_string(-1, "torture",
- "share"));
+ sd = get_sharesec(mem_ctx, cli->session, torture_setting_string(torture,
+ "share", NULL));
ret &= try_tcon(mem_ctx, sd, cli->session,
- lp_parm_string(-1, "torture", "share"),
+ torture_setting_string(torture, "share", NULL),
user_sid, 0, NT_STATUS_ACCESS_DENIED, NT_STATUS_OK);
ret &= try_tcon(mem_ctx, sd, cli->session,
- lp_parm_string(-1, "torture", "share"),
+ torture_setting_string(torture, "share", NULL),
user_sid, SEC_FILE_READ_DATA, NT_STATUS_OK,
NT_STATUS_NETWORK_ACCESS_DENIED);
ret &= try_tcon(mem_ctx, sd, cli->session,
- lp_parm_string(-1, "torture", "share"),
+ torture_setting_string(torture, "share", NULL),
user_sid, SEC_FILE_ALL, NT_STATUS_OK, NT_STATUS_OK);
talloc_free(mem_ctx);
}
if (!(torture_open_connection_share(
- mem_ctx, &cli, lp_parm_string(-1, "torture", "host"),
+ mem_ctx, &cli, torture_setting_string(torture, "host", NULL),
"IPC$", NULL))) {
d_printf("IPC$ connection failed\n");
talloc_free(mem_ctx);
}
if (!(torture_open_connection_share(
- mem_ctx, &cli, lp_parm_string(-1, "torture", "host"),
+ mem_ctx, &cli, torture_setting_string(torture, "host", NULL),
"IPC$", NULL))) {
d_printf("IPC$ connection failed\n");
talloc_free(mem_ctx);
}
if (!(torture_open_connection_share(
- mem_ctx, &cli, lp_parm_string(-1, "torture", "host"),
+ mem_ctx, &cli, torture_setting_string(torture, "host", NULL),
"IPC$", NULL))) {
d_printf("IPC$ connection failed\n");
talloc_free(mem_ctx);
char *user_password;
const char *old_user_password;
char *test_machine_account;
- const char *binding = lp_parm_string(-1, "torture", "binding");
+ const char *binding = torture_setting_string(torture, "binding", NULL);
const char *userdomain;
int i;
int ci;
return False;
}
- userdomain = lp_parm_string(-1, "torture", "userdomain");
- if (!userdomain) {
- userdomain = lp_workgroup();
- }
+ userdomain = torture_setting_string(torture, "userdomain", lp_workgroup());
user_ctx = torture_create_testuser(TEST_USER_NAME,
userdomain,
s.in.sec_info = 7;
s.in.sdbuf = r.out.sdbuf;
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping SetSecurity test against Samba4\n");
return True;
}
TEST_USERINFO_INT(21, logon_hours.bits[3], 21, logon_hours.bits[3], 4,
SAMR_FIELD_LOGON_HOURS);
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping Set Account Flag tests against Samba4\n");
return ret;
}
ret = False;
}
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping MultipleMembers Alias tests against Samba4\n");
return ret;
}
return False;
}
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping SetMemberAttributesOfGroup test against Samba4\n");
} else {
/* this one is quite strange. I am using random inputs in the
ret &= test_QueryDisplayInfo3(p, mem_ctx, &domain_handle);
ret &= test_QueryDisplayInfo_continue(p, mem_ctx, &domain_handle);
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
printf("skipping GetDisplayEnumerationIndex test against Samba4\n");
} else {
ret &= test_GetDisplayEnumerationIndex(p, mem_ctx, &domain_handle);
TALLOC_CTX *mem_ctx, *loop_ctx;
BOOL ret = True;
const struct dcerpc_interface_list *l;
- const char *binding = lp_parm_string(-1, "torture", "binding");
+ const char *binding = torture_setting_string(torture, "binding", NULL);
struct dcerpc_binding *b;
mem_ctx = talloc_init("torture_rpc_scanner");
struct dcerpc_pipe *p;
TALLOC_CTX *mem_ctx;
BOOL ret = True;
- const char *binding = lp_parm_string(-1, "torture", "binding");
+ const char *binding = torture_setting_string(torture, "binding", NULL);
struct cli_credentials *anon_credentials;
mem_ctx = talloc_init("torture_rpc_srvsvc");
return False;
}
- if (!lp_parm_bool(-1, "torture", "dangerous", False)) {
+ if (!torture_setting_bool(torture, "dangerous", False)) {
printf("winreg_InitiateShutdown disabled - enable dangerous tests to use\n");
} else {
ret &= test_InitiateSystemShutdown(p, mem_ctx, "spottyfood", 30);
if (lp_parm_bool(-1, "torture", "dangerous", False)) {
data = data_blob_talloc(tree, NULL, 160000);
- } else if (lp_parm_bool(-1, "target", "samba4", False)) {
+ } else if (lp_parm_bool(-1, "torture", "samba4", False)) {
data = data_blob_talloc(tree, NULL, UINT16_MAX);
} else {
data = data_blob_talloc(tree, NULL, 120000);
file_levels[i].dinfo.query_secdesc.in.secinfo_flags = 0x7;
}
if (file_levels[i].level == RAW_FILEINFO_SMB2_ALL_EAS) {
- if (lp_parm_bool(-1, "target", "samba4", False)) {
+ if (lp_parm_bool(-1, "torture", "samba4", False)) {
continue;
}
file_levels[i].finfo.all_eas.in.continue_flags =
{
TALLOC_CTX *mem_ctx = talloc_new(NULL);
struct smb2_tree *tree;
- const char *host = lp_parm_string(-1, "torture", "host");
- const char *share = lp_parm_string(-1, "torture", "share");
+ const char *host = torture_setting_string(torture, "host", NULL);
+ const char *share = torture_setting_string(torture, "share", NULL);
struct cli_credentials *credentials = cmdline_credentials;
NTSTATUS status;
int opcode;
}
if (strcmp(target, "samba3") == 0) {
- lp_set_cmdline("target:samba3", "true");
+ lp_set_cmdline("torture:samba3", "true");
lp_set_cmdline("torture:knownfail", "samba3-knownfail");
} else if (strcmp(target, "samba4") == 0) {
- lp_set_cmdline("target:samba4", "true");
+ lp_set_cmdline("torture:samba4", "true");
lp_set_cmdline("torture:knownfail", "samba4-knownfail");
}