From ff3b446175aa5dfb704698845ebf8341796f76e2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?G=C3=BCnther=20Deschner?= Date: Thu, 9 Jul 2015 18:05:12 +0200 Subject: [PATCH] s4-torture: use smb_krb5_principal_set_type() in lsa forest krb5 tests. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Guenther Signed-off-by: Günther Deschner Reviewed-by: Andreas Schneider Autobuild-User(master): Andreas Schneider Autobuild-Date(master): Tue Jul 14 19:15:59 CEST 2015 on sn-devel-104 --- source4/torture/rpc/lsa.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/source4/torture/rpc/lsa.c b/source4/torture/rpc/lsa.c index 4834af3a68a..95caebbd004 100644 --- a/source4/torture/rpc/lsa.c +++ b/source4/torture/rpc/lsa.c @@ -3242,8 +3242,8 @@ static bool check_pw_with_krb5(struct torture_context *tctx, &ctx->upn_realm, realm, upn_realm_string, NULL), 0, "smb_krb5_make_principal failed"); - krb5_principal_set_type(ctx->smb_krb5_context->krb5_context, - ctx->upn_realm, KRB5_NT_ENTERPRISE_PRINCIPAL); + smb_krb5_principal_set_type(ctx->smb_krb5_context->krb5_context, + ctx->upn_realm, KRB5_NT_ENTERPRISE_PRINCIPAL); upn_dns_string = talloc_asprintf(ctx, "user@%s", trusted_dns_name); @@ -3252,8 +3252,8 @@ static bool check_pw_with_krb5(struct torture_context *tctx, &ctx->upn_dns, realm, upn_dns_string, NULL), 0, "smb_krb5_make_principal failed"); - krb5_principal_set_type(ctx->smb_krb5_context->krb5_context, - ctx->upn_dns, KRB5_NT_ENTERPRISE_PRINCIPAL); + smb_krb5_principal_set_type(ctx->smb_krb5_context->krb5_context, + ctx->upn_dns, KRB5_NT_ENTERPRISE_PRINCIPAL); upn_netbios_string = talloc_asprintf(ctx, "user@%s", trusted_netbios_name); @@ -3262,8 +3262,8 @@ static bool check_pw_with_krb5(struct torture_context *tctx, &ctx->upn_netbios, realm, upn_netbios_string, NULL), 0, "smb_krb5_make_principal failed"); - krb5_principal_set_type(ctx->smb_krb5_context->krb5_context, - ctx->upn_netbios, KRB5_NT_ENTERPRISE_PRINCIPAL); + smb_krb5_principal_set_type(ctx->smb_krb5_context->krb5_context, + ctx->upn_netbios, KRB5_NT_ENTERPRISE_PRINCIPAL); k5ret = principal_from_credentials(ctx, credentials, ctx->smb_krb5_context, &principal, &obtained, &error_string);