r8781: - fixed a memory leak in BASE-SECLEAK (ironic, isn't it). There is
authorAndrew Tridgell <tridge@samba.org>
Tue, 26 Jul 2005 12:41:29 +0000 (12:41 +0000)
committerGerald (Jerry) Carter <jerry@samba.org>
Wed, 10 Oct 2007 18:30:05 +0000 (13:30 -0500)
  another leak in the ASN.1 code that andrew has volunteered to look at

- make the timelimit controllable with -t
(This used to be commit 227d4d2115e768bbae13db2559d27bf8508aa18d)

source4/torture/basic/secleak.c

index 50d5c40d07803aa773378a1fdb135c375a4168aa..005eb5f213962f35b072fc74655def4cbdbe5436 100644 (file)
@@ -36,7 +36,7 @@ static BOOL try_failed_login(struct smbcli_state *cli)
        setup.in.capabilities = cli->transport->negotiate.capabilities;
        setup.in.workgroup = lp_workgroup();
 
-       setup.in.credentials = cli_credentials_init(NULL);
+       setup.in.credentials = cli_credentials_init(session);
        cli_credentials_set_conf(setup.in.credentials);
        cli_credentials_set_domain(setup.in.credentials, "INVALID-DOMAIN", CRED_SPECIFIED);
        cli_credentials_set_username(setup.in.credentials, "INVALID-USERNAME", CRED_SPECIFIED);
@@ -56,15 +56,17 @@ BOOL torture_sec_leak(void)
 {
        struct smbcli_state *cli;
        time_t t1 = time(NULL);
+       int timelimit = lp_parm_int(-1, "torture", "timelimit", 20);
 
        if (!torture_open_connection(&cli)) {
                return False;
        }
 
-       while (time(NULL) < t1+20) {
+       while (time(NULL) < t1+timelimit) {
                if (!try_failed_login(cli)) {
                        return False;
                }
+               talloc_report(NULL, stdout);
        }
 
        return True;