mirror of
https://github.com/samba-team/samba.git
synced 2025-01-11 05:18:09 +03:00
torture/backupkey: Fix flapping test
UNEXPECTED(failure): samba4.rpc.backupkey with seal.backupkey.server_wrap_decrypt_wrong_r2(ad_dc_default)
REASON: Exception: Exception: ../../source4/torture/rpc/backupkey.c:2219: r.out.result was WERR_INVALID_ACCESS, expected WERR_INVALID_PARAMETER: decrypt should fail with WERR_INVALID_PARAMETER
As commit 664bde19bf
states:
"The use of the wrong key can still create structures that parse as a
SID, therefore we can sometimes get an unusual error, which becomes a
flapping test".
BUG: https://bugzilla.samba.org/show_bug.cgi?id=12107
Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
parent
264351f5c3
commit
aa90354e24
@ -2216,10 +2216,12 @@ static bool test_ServerWrap_decrypt_wrong_stuff(struct torture_context *tctx,
|
||||
WERR_INVALID_ACCESS,
|
||||
"decrypt should fail with WERR_INVALID_ACCESS");
|
||||
} else {
|
||||
torture_assert_werr_equal(tctx,
|
||||
r.out.result,
|
||||
WERR_INVALID_PARAMETER,
|
||||
"decrypt should fail with WERR_INVALID_PARAMETER");
|
||||
if (!W_ERROR_EQUAL(r.out.result, WERR_INVALID_ACCESS)
|
||||
&& !W_ERROR_EQUAL(r.out.result, WERR_INVALID_PARAMETER)) {
|
||||
torture_assert_werr_equal(tctx, r.out.result,
|
||||
WERR_INVALID_DATA,
|
||||
"decrypt should fail with WERR_INVALID_ACCESS, WERR_INVALID_PARAMETER or WERR_INVALID_DATA");
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
|
Loading…
Reference in New Issue
Block a user