testprogs/blackbox/test_weak_disable_ntlmssp_ldap.sh better names
authorStefan Metzmacher <metze@samba.org>
Wed, 13 Mar 2024 15:53:44 +0000 (16:53 +0100)
committerStefan Metzmacher <metze@samba.org>
Wed, 8 May 2024 08:17:07 +0000 (10:17 +0200)
testprogs/blackbox/test_weak_disable_ntlmssp_ldap.sh

index d2f1c8fdfc80b8d56dee6d216b21700fa8ec7297..96d91d4e9e36fb0a69e5d020f1c138b62c695f01 100755 (executable)
@@ -22,19 +22,22 @@ samba_net="$BINDIR/net"
 unset GNUTLS_FORCE_FIPS_MODE
 
 # Checks that testparm reports: Weak crypto is allowed
-testit_grep "testparm" "Weak crypto is allowed" $samba_testparm --suppress-prompt $SMB_CONF_PATH 2>&1 || failed=$(expr $failed + 1)
+testit_grep "testparm.with-weak" "Weak crypto is allowed" $samba_testparm --suppress-prompt $SMB_CONF_PATH 2>&1 || failed=$(expr $failed + 1)
 
 # We should be allowed to use NTLM for connecting
-testit "net_ads_search.ntlm" $samba_net ads search --use-kerberos=off '(objectCategory=group)' sAMAccountName -U${USERNAME}%${PASSWORD} || failed=$(expr $failed + 1)
+testit "net_ads_search.ntlm.with-weak" $samba_net ads search --use-kerberos=off '(objectCategory=group)' sAMAccountName -U${USERNAME}%${PASSWORD} || failed=$(expr $failed + 1)
 
 GNUTLS_FORCE_FIPS_MODE=1
 export GNUTLS_FORCE_FIPS_MODE
 
 # Checks that testparm reports: Weak crypto is disallowed
-testit_grep "testparm" "Weak crypto is disallowed" $samba_testparm --suppress-prompt $SMB_CONF_PATH 2>&1 || failed=$(expr $failed + 1)
+testit_grep "testparm.without-weak" "Weak crypto is disallowed" $samba_testparm --suppress-prompt $SMB_CONF_PATH 2>&1 || failed=$(expr $failed + 1)
 
 # We should not be allowed to use NTLM for connecting
-testit_expect_failure_grep "net_ads_search.ntlm" "We can't fallback to NTLMSSP, weak crypto is disallowed." $samba_net ads search --use-kerberos=off -d10 '(objectCategory=group)' sAMAccountName -U${USERNAME}%${PASSWORD} || failed=$(expr $failed + 1)
+testit_expect_failure_grep \
+       "net_ads_search.ntlm.without-weak" \
+       "We can't fallback to NTLMSSP, weak crypto is disallowed." \
+       $samba_net ads search -d10 --use-kerberos=off '(objectCategory=group)' sAMAccountName -U${USERNAME}%${PASSWORD} || failed=$(expr $failed + 1)
 
 unset GNUTLS_FORCE_FIPS_MODE