From e3e794d1a9df40fd171f13318b4a7c51d48d90e5 Mon Sep 17 00:00:00 2001 From: Andrew Tridgell Date: Tue, 26 Jul 2005 12:41:29 +0000 Subject: [PATCH] r8781: - fixed a memory leak in BASE-SECLEAK (ironic, isn't it). There is another leak in the ASN.1 code that andrew has volunteered to look at - make the timelimit controllable with -t (This used to be commit 227d4d2115e768bbae13db2559d27bf8508aa18d) --- source4/torture/basic/secleak.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/source4/torture/basic/secleak.c b/source4/torture/basic/secleak.c index 50d5c40d078..005eb5f2139 100644 --- a/source4/torture/basic/secleak.c +++ b/source4/torture/basic/secleak.c @@ -36,7 +36,7 @@ static BOOL try_failed_login(struct smbcli_state *cli) setup.in.capabilities = cli->transport->negotiate.capabilities; setup.in.workgroup = lp_workgroup(); - setup.in.credentials = cli_credentials_init(NULL); + setup.in.credentials = cli_credentials_init(session); cli_credentials_set_conf(setup.in.credentials); cli_credentials_set_domain(setup.in.credentials, "INVALID-DOMAIN", CRED_SPECIFIED); cli_credentials_set_username(setup.in.credentials, "INVALID-USERNAME", CRED_SPECIFIED); @@ -56,15 +56,17 @@ BOOL torture_sec_leak(void) { struct smbcli_state *cli; time_t t1 = time(NULL); + int timelimit = lp_parm_int(-1, "torture", "timelimit", 20); if (!torture_open_connection(&cli)) { return False; } - while (time(NULL) < t1+20) { + while (time(NULL) < t1+timelimit) { if (!try_failed_login(cli)) { return False; } + talloc_report(NULL, stdout); } return True; -- 2.34.1