IF YOU WOULD LIKE TO GET AN ACCOUNT, please write an
email to Administrator. User accounts are meant only to access repo
and report issues and/or generate pull requests.
This is a purpose-specific Git hosting for
BaseALT
projects. Thank you for your understanding!
Только зарегистрированные пользователи имеют доступ к сервису!
Для получения аккаунта, обратитесь к администратору.
for t in `$samba4bindir/smbtorture --list | grep "^RPC-"`
do
echo$all_tests| grep $t > /dev/null
if[$? -ne 0]
then
auto_rpc_tests="$auto_rpc_tests$t"
fi
done
for bindoptions in seal,padcheck $VALIDATE bigendian;do
for transport in ncalrpc ncacn_np ncacn_ip_tcp;do
case$transport in
ncalrpc)tests=$ncalrpc_tests;;
ncacn_np)tests=$ncacn_np_tests;;
ncacn_ip_tcp)tests=$ncacn_ip_tcp_tests;;
esac
for t in $tests;do
plantest "$t on $transport with $bindoptions" dc $VALGRIND$samba4bindir/smbtorture $TORTURE_OPTIONS$transport:"\$SERVER[$bindoptions]" -U"\$USERNAME"%"\$PASSWORD" -W \$DOMAIN $t"$*"
done
plantest "RPC-SAMBA3-SHARESEC on $transport with $bindoptions" dc $VALGRIND$samba4bindir/smbtorture $TORTURE_OPTIONS$transport:"\$SERVER[$bindoptions]" -U"\$USERNAME"%"\$PASSWORD" -W \$DOMAIN --option=torture:share=tmp $t"$*"
done
done
for bindoptions in ""$VALIDATE bigendian;do
for t in $auto_rpc_tests;do
plantest "$t with $bindoptions" dc $VALGRIND$samba4bindir/smbtorture $TORTURE_OPTIONS"\$SERVER[$bindoptions]" -U"\$USERNAME"%"\$PASSWORD" -W \$DOMAIN $t"$*"
done
done
for bindoptions in connect $VALIDATE;do
for transport in ncalrpc ncacn_np ncacn_ip_tcp;do
case$transport in
ncalrpc)tests=$slow_ncalrpc_tests;;
ncacn_np)tests=$slow_ncacn_np_tests;;
ncacn_ip_tcp)tests=$slow_ncacn_ip_tcp_tests;;
esac
for t in $tests;do
plantest "$t on $transport with $bindoptions" dc $VALGRIND$samba4bindir/smbtorture $TORTURE_OPTIONS$transport:"\$SERVER[$bindoptions]" -U"\$USERNAME"%"\$PASSWORD" -W \$DOMAIN $t"$*"
plantest "RPC-SECRETS on $transport with $bindoptions with Kerberos" dc $samba4bindir/smbtorture $TORTURE_OPTIONS$transport:"\$SERVER[$bindoptions]" -k yes -U"\$USERNAME"%"\$PASSWORD" -W \$DOMAIN "--option=gensec:target_hostname=\$NETBIOSNAME" RPC-SECRETS "$*"
plantest "RPC-SECRETS on $transport with $bindoptions with Kerberos - use target principal" dc $samba4bindir/smbtorture $TORTURE_OPTIONS$transport:"\$SERVER[$bindoptions]" -k yes -U"\$USERNAME"%"\$PASSWORD" -W \$DOMAIN "--option=clientusespnegoprincipal=yes""--option=gensec:target_hostname=\$NETBIOSNAME" RPC-SECRETS "$*"
plantest "RPC-SECRETS on $transport with Kerberos - use Samba3 style login" dc $samba4bindir/smbtorture $TORTURE_OPTIONS$transport:"\$SERVER" -k yes -U"\$USERNAME"%"\$PASSWORD" -W "\$DOMAIN""--option=gensec:fake_gssapi_krb5=yes""--option=gensec:gssapi_krb5=no""--option=gensec:target_hostname=\$NETBIOSNAME""RPC-SECRETS-none*""$*"
plantest "RPC-SECRETS on $transport with Kerberos - use Samba3 style login, use target principal" dc $samba4bindir/smbtorture $TORTURE_OPTIONS$transport:"\$SERVER" -k yes -U"\$USERNAME"%"\$PASSWORD" -W "\$DOMAIN""--option=clientusespnegoprincipal=yes""--option=gensec:fake_gssapi_krb5=yes""--option=gensec:gssapi_krb5=no""--option=gensec:target_hostname=\$NETBIOSNAME""RPC-SECRETS-none*""$*"
# Echo tests
transports="ncacn_np ncacn_ip_tcp ncalrpc"
for transport in $transports;do
for bindoptions in connect spnego spnego,sign spnego,seal $VALIDATE padcheck bigendian bigendian,seal;do
plantest "RPC-ECHO on $transport with $bindoptions and $ntlmoptions" dc $samba4bindir/smbtorture $TORTURE_OPTIONS$transport:"\$SERVER[$bindoptions]"$ntlmoptions -U"\$USERNAME"%"\$PASSWORD" -W "\$DOMAIN" RPC-ECHO "$*"
plantest "RPC-ECHO on $transport with $bindoptions and $ntlmoptions" dc $samba4bindir/smbtorture $TORTURE_OPTIONS$transport:"\$SERVER[$bindoptions]"$ntlmoptions -U"\$USERNAME"%"\$PASSWORD" -W \$DOMAIN RPC-ECHO "$*"
done
done
done
plantest "RPC-ECHO on ncacn_np over smb2" dc $samba4bindir/smbtorture $TORTURE_OPTIONS ncacn_np:"\$SERVER[smb2]" -U"\$USERNAME"%"\$PASSWORD" -W \$DOMAIN RPC-ECHO "$*"
plantest "RPC-ECHO against member server with local creds" member $VALGRIND$samba4bindir/smbtorture $TORTURE_OPTIONS ncacn_np:"\$NETBIOSNAME" -U"\$NETBIOSNAME/\$USERNAME"%"\$PASSWORD" RPC-ECHO "$*"
plantest "RPC-ECHO against member server with domain creds" member $VALGRIND$samba4bindir/smbtorture $TORTURE_OPTIONS ncacn_np:"\$NETBIOSNAME" -U"\$DOMAIN/\$DC_USERNAME"%"\$DC_PASSWORD" RPC-ECHO "$*"
plantest "RPC-SAMR against member server with local creds" member $VALGRIND$samba4bindir/smbtorture $TORTURE_OPTIONS ncacn_np:"\$NETBIOSNAME" -U"\$NETBIOSNAME/\$USERNAME"%"\$PASSWORD""RPC-SAMR""$*"
plantest "RPC-SAMR-USERS against member server with local creds" member $VALGRIND$samba4bindir/smbtorture $TORTURE_OPTIONS ncacn_np:"\$NETBIOSNAME" -U"\$NETBIOSNAME/\$USERNAME"%"\$PASSWORD""RPC-SAMR-USERS""$*"
plantest "RPC-SAMR-PASSWORDS against member server with local creds" member $VALGRIND$samba4bindir/smbtorture $TORTURE_OPTIONS ncacn_np:"\$NETBIOSNAME" -U"\$NETBIOSNAME/\$USERNAME"%"\$PASSWORD""RPC-SAMR-PASSWORDS""$*"
plantest "wbinfo -a against member server with domain creds" member $VALGRIND$samba4bindir/wbinfo -a "\$DOMAIN/\$DC_USERNAME"%"\$DC_PASSWORD"