summaryrefslogtreecommitdiffstats
path: root/src/tests
diff options
context:
space:
mode:
authorKen Raeburn <raeburn@mit.edu>2003-12-13 07:32:01 +0000
committerKen Raeburn <raeburn@mit.edu>2003-12-13 07:32:01 +0000
commit068dfb5ce85dbe853e9ec3bfde00c27dde4beeee (patch)
tree9616d939ae5512028a84389f57cf91ff483177f2 /src/tests
parent2c583b371f5aa87ab857ff96f7b27045de86e66f (diff)
downloadkrb5-068dfb5ce85dbe853e9ec3bfde00c27dde4beeee.tar.gz
krb5-068dfb5ce85dbe853e9ec3bfde00c27dde4beeee.tar.xz
krb5-068dfb5ce85dbe853e9ec3bfde00c27dde4beeee.zip
* default.exp (passes): Add an AES-only pass.
(start_kerberos_daemons): Check for error "No principal in keytab matches desired name". (dump_db): New proc, for debugging. (spawn_xterm): Add GSSCLIENT to list of exported variables. ticket: 2066 status: open git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15915 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/tests')
-rw-r--r--src/tests/dejagnu/config/ChangeLog8
-rw-r--r--src/tests/dejagnu/config/default.exp39
2 files changed, 46 insertions, 1 deletions
diff --git a/src/tests/dejagnu/config/ChangeLog b/src/tests/dejagnu/config/ChangeLog
index beabe48b8..9396e5eb9 100644
--- a/src/tests/dejagnu/config/ChangeLog
+++ b/src/tests/dejagnu/config/ChangeLog
@@ -1,3 +1,11 @@
+2003-12-13 Ken Raeburn <raeburn@mit.edu>
+
+ * default.exp (passes): Add an AES-only pass.
+ (start_kerberos_daemons): Check for error "No principal in keytab
+ matches desired name".
+ (dump_db): New proc, for debugging.
+ (spawn_xterm): Add GSSCLIENT to list of exported variables.
+
2003-06-05 Ken Raeburn <raeburn@mit.edu>
* default.exp (setup_root_shell): Check for "not authorized". Map
diff --git a/src/tests/dejagnu/config/default.exp b/src/tests/dejagnu/config/default.exp
index 5f4b5924d..215671d34 100644
--- a/src/tests/dejagnu/config/default.exp
+++ b/src/tests/dejagnu/config/default.exp
@@ -97,6 +97,17 @@ set passes {
{dummy=[verbose -log "AES + DES enctypes"]}
}
{
+ aesonly
+ des3_krbtgt=0
+ {supported_enctypes=aes256-cts-hmac-sha1-96:normal}
+ {kdc_supported_enctypes=aes256-cts-hmac-sha1-96:normal}
+ {permitted_enctypes(kdc)=aes256-cts-hmac-sha1-96}
+ {permitted_enctypes(client)=aes256-cts-hmac-sha1-96}
+ {permitted_enctypes(server)=aes256-cts-hmac-sha1-96}
+ {master_key_type=aes256-cts-hmac-sha1-96}
+ {dummy=[verbose -log "AES enctypes"]}
+ }
+ {
aes-des3
des3_krbtgt=0
{supported_enctypes=aes256-cts-hmac-sha1-96:normal des3-cbc-sha1:normal des-cbc-crc:normal}
@@ -1451,6 +1462,10 @@ proc start_kerberos_daemons { standalone } {
wait -i $tailf_spawn_id
return 0
}
+ "No principal in keytab matches desired name" {
+ dump_db
+ exp_continue
+ }
"starting" { }
timeout {
if {$standalone} {
@@ -1591,6 +1606,28 @@ proc add_kerberos_key { kkey standalone } {
}
}
+# dump_db
+proc dump_db { } {
+ global KADMIN_LOCAL
+ global REALMNAME
+
+ spawn $KADMIN_LOCAL -r $REALMNAME
+ expect_after {
+ eof {
+ perror "failed to get debugging dump of database (eof)"
+ }
+ timeout {
+ perror "failed to get debugging dump of database (timeout)"
+ }
+ }
+ expect "kadmin.local: "
+ send "getprincs\r"
+ expect "kadmin.local: "
+ send "quit\r"
+ expect eof
+ catch expect_after
+}
+
# add_random_key
# Add a key with a random password to the Kerberos database.
# start_kerberos_daemons must be called before this procedure. If the
@@ -2508,7 +2545,7 @@ proc krb_exit { } {
# helpful sometimes for debugging the test suite
proc spawn_xterm { } {
global env
- foreach i {KDB5_UTIL KRB5KDC KADMIND KADMIN KADMIN_LOCAL KINIT KTUTIL KLIST RLOGIN RLOGIND FTP FTPD KPASSWD REALMNAME} {
+ foreach i {KDB5_UTIL KRB5KDC KADMIND KADMIN KADMIN_LOCAL KINIT KTUTIL KLIST RLOGIN RLOGIND FTP FTPD KPASSWD REALMNAME GSSCLIENT} {
global $i
if [info exists $i] { set env($i) [set $i] }
}