summaryrefslogtreecommitdiff
path: root/source4/torture/rpc/lsa.c
diff options
context:
space:
mode:
authorGünther Deschner <gd@samba.org>2015-07-09 18:02:31 +0200
committerAndreas Schneider <asn@cryptomilk.org>2015-07-14 16:11:18 +0200
commita1c9415769b8a8b9cf3e8b88a13bfa2301ea8863 (patch)
tree4e32ad51e573eb89c47ff6caca5fc52b00a2ba23 /source4/torture/rpc/lsa.c
parentda3f41219d564c8166a680fcce83d88e2a0e160b (diff)
downloadsamba-a1c9415769b8a8b9cf3e8b88a13bfa2301ea8863.tar.gz
s4-torture: use krb5_error in lsa forest trust tests.
Guenther Signed-off-by: Günther Deschner <gd@samba.org> Reviewed-by: Andreas Schneider <asn@samba.org>
Diffstat (limited to 'source4/torture/rpc/lsa.c')
-rw-r--r--source4/torture/rpc/lsa.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/source4/torture/rpc/lsa.c b/source4/torture/rpc/lsa.c
index 81d01bb1212..4834af3a68a 100644
--- a/source4/torture/rpc/lsa.c
+++ b/source4/torture/rpc/lsa.c
@@ -2926,7 +2926,7 @@ struct check_pw_with_krb5_ctx {
unsigned error_io;
unsigned ok;
} counts;
- KRB_ERROR error;
+ krb5_error error;
struct smb_krb5_context *smb_krb5_context;
krb5_get_init_creds_opt *krb_options;
krb5_creds my_creds;
@@ -3288,7 +3288,7 @@ static bool check_pw_with_krb5(struct torture_context *tctx,
torture_assert_int_equal(tctx, k5ret, KRB5_KDC_UNREACH, assertion_message);
torture_assert_int_equal(tctx, ctx->counts.io, 1, assertion_message);
torture_assert_int_equal(tctx, ctx->counts.error_io, 1, assertion_message);
- torture_assert_int_equal(tctx, ctx->error.error_code, 68, assertion_message);
+ torture_assert_int_equal(tctx, KRB5_ERROR_CODE(&ctx->error), 68, assertion_message);
torture_assert(tctx, ctx->error.crealm != NULL, assertion_message);
torture_assert_str_equal(tctx, *ctx->error.crealm, trusted_realm_name, assertion_message);
torture_assert(tctx, ctx->error.cname == NULL, assertion_message);
@@ -3313,7 +3313,7 @@ static bool check_pw_with_krb5(struct torture_context *tctx,
torture_assert_int_equal(tctx, k5ret, KRB5_KDC_UNREACH, assertion_message);
torture_assert_int_equal(tctx, ctx->counts.io, 1, assertion_message);
torture_assert_int_equal(tctx, ctx->counts.error_io, 1, assertion_message);
- torture_assert_int_equal(tctx, ctx->error.error_code, 68, assertion_message);
+ torture_assert_int_equal(tctx, KRB5_ERROR_CODE(&ctx->error), 68, assertion_message);
torture_assert(tctx, ctx->error.crealm != NULL, assertion_message);
torture_assert_str_equal(tctx, *ctx->error.crealm, trusted_realm_name, assertion_message);
torture_assert(tctx, ctx->error.cname == NULL, assertion_message);
@@ -3338,7 +3338,7 @@ static bool check_pw_with_krb5(struct torture_context *tctx,
torture_assert_int_equal(tctx, k5ret, KRB5_KDC_UNREACH, assertion_message);
torture_assert_int_equal(tctx, ctx->counts.io, 1, assertion_message);
torture_assert_int_equal(tctx, ctx->counts.error_io, 1, assertion_message);
- torture_assert_int_equal(tctx, ctx->error.error_code, 68, assertion_message);
+ torture_assert_int_equal(tctx, KRB5_ERROR_CODE(&ctx->error), 68, assertion_message);
torture_assert(tctx, ctx->error.crealm != NULL, assertion_message);
torture_assert_str_equal(tctx, *ctx->error.crealm, trusted_realm_name, assertion_message);
torture_assert(tctx, ctx->error.cname == NULL, assertion_message);
@@ -4082,7 +4082,7 @@ static bool check_pw_with_krb5(struct torture_context *tctx,
torture_assert_int_equal(tctx, k5ret, KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN, assertion_message);
torture_assert_int_equal(tctx, ctx->counts.io, 1, assertion_message);
torture_assert_int_equal(tctx, ctx->counts.error_io, 1, assertion_message);
- torture_assert_int_equal(tctx, ctx->error.error_code, 7, assertion_message);
+ torture_assert_int_equal(tctx, KRB5_ERROR_CODE(&ctx->error), 7, assertion_message);
/* Confirm if we have no referral ticket in the cache */
krb5_free_cred_contents(ctx->smb_krb5_context->krb5_context,