Home
last modified time | relevance | path

Searched refs:expected_code (Results 1 – 25 of 60) sorted by relevance

123

/freebsd/crypto/krb5/src/tests/
H A Dt_kadmin_acl.py114 kadmin_as(none, ['cpw'] + args + ['selected'], expected_code=1,
117 expected_code=1, expected_msg=msg)
120 expected_code=1, expected_msg=msg)
124 expected_code=1, expected_msg=msg)
127 kadmin_as(none, ['cpw'] + args + ['none'], expected_code=1,
136 kadmin_as(none, ['addpol', 'policy'], expected_code=1,
151 kadmin_as(none, ['addprinc'] + args + ['selected'], expected_code=1,
153 kadmin_as(some_add, ['addprinc'] + args + ['unselected'], expected_code=1,
159 expected_code=1, expected_msg='already exists')
168 kadmin_as(none, ['delprinc', 'unselected'], expected_code=1,
[all …]
H A Dt_kadm5_auth.py15 realm.run_kadmin(['addprinc', '-randkey', 'princ'], expected_code=1)
18 'princ'], expected_code=1)
22 realm.run_kadmin(['modprinc', '-maxlife', '3', 'princ'], expected_code=1)
25 expected_code=1)
29 realm.run_kadmin(['setstr', 'princ', 'somekey', 'someval'], expected_code=1)
31 realm.run_kadmin(['setstr', 'princ', 'note', 'abcdefghijkl'], expected_code=1)
35 realm.run_kadmin(['delprinc', 'user'], expected_code=1)
40 realm.run_kadmin(['delprinc', 'deltest'], expected_code=1)
44 realm.run_kadmin(['renprinc', 'princ', 'xyz'], expected_code=1)
46 realm.run_kadmin(['renprinc', 'abcde', 'fghij'], expected_code=1)
[all …]
H A Dt_policy.py10 realm.run([kadminl, 'cpw', '-pw', 'sh0rt', 'pwuser'], expected_code=1,
12 realm.run([kadminl, 'cpw', '-pw', 'longenough', 'pwuser'], expected_code=1,
19 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser'], expected_code=1,
23 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser'], expected_code=1,
47 realm.run([kadminl, 'cpw', '-pw', pw, 'histprinc'], expected_code=1,
65 realm.run([kadminl, 'cpw', '-pw', '2222', 'histprinc'], expected_code=1,
67 realm.run([kadminl, 'cpw', '-pw', '1111', 'histprinc'], expected_code=1,
106 realm.run([kadminl, 'cpw', '-pw', 'aa', 'pwuser'], expected_code=1,
108 realm.run([kadminl, 'cpw', '-pw', '3rdpassword', 'pwuser'], expected_code=1,
112 realm.run([kadminl, 'cpw', '-pw', 'aa', 'newuser'], expected_code=1,
[all …]
H A Dt_ccache.py38 out = realm.run([klist, '-c', 'KEYRING:process:abcd'], expected_code=1)
47 realm.run([klist], expected_code=1, expected_msg='No credentials cache found')
52 expected_code=1, expected_msg='Failed to store credentials')
56 realm.run([klist, '-s'], expected_code=1)
60 realm.run([klist, '-s'], expected_code=1)
64 realm.run([klist, '-s'], expected_code=1)
77 realm.run([klist, '-A', '-s'], expected_code=1)
87 output = realm.run([klist], expected_code=1)
90 output = realm.run([klist, '-l'], expected_code=1)
93 realm.run([klist, '-A', '-s'], expected_code=1)
[all …]
H A Dt_kdb.py204 expected_code=1, expected_msg='DN is out of the realm subtree')
210 expected_code=1, expected_msg='DN is out of the realm subtree')
214 expected_code=1, expected_msg='ldap object is already kerberized')
217 expected_code=1, expected_msg='link information can not be set')
222 expected_code=1, expected_msg='DN is out of the realm subtree')
226 expected_code=1, expected_msg='kerberos principal is already linked')
231 expected_code=1, expected_msg='DN is out of the realm subtree')
235 expected_code=1, expected_msg='containerdn option not supported')
239 '-x', 'linkdn=cn=t2,cn=krb5', 'princ4'], expected_code=1,
269 kldaputil(['destroy_policy', '-force', 'tktpol'], expected_code=1)
[all …]
H A Dt_certauth.py25 realm.pkinit('nocert', expected_code=1, expected_msg='Client name mismatch')
34 realm.pkinit('user2', expected_code=1, expected_msg='Certificate mismatch')
41 realm.pkinit(realm.user_princ, expected_code=1,
51 realm.pkinit('user2', expected_code=1, expected_msg='Certificate mismatch')
62 realm.pkinit('user2', expected_code=1, expected_msg='Certificate mismatch')
63 realm.pkinit('nocert', expected_code=1, expected_msg='Client name mismatch')
H A Dt_alias.py13 realm.run([kadminl, 'getprinc', 'alias'], expected_code=1,
22 realm.run([kadminl, 'alias', 'x', 'y@OTHER.REALM'], expected_code=1,
58 realm.run([kvno, 'a11'], expected_code=1,
63 realm.run([kvno, 'selfalias'], expected_code=1,
67 realm.run([kadminl, 'addprinc', '-nokey', 'alias'], expected_code=1,
69 realm.run([kadminl, 'alias', 'alias', 'canon'], expected_code=1,
71 realm.run([kadminl, 'renprinc', 'user', 'alias'], expected_code=1,
88 realm.run([kadminl, 'renprinc', 'alias', 'nalias'], expected_code=1,
H A Dt_proxy.py66 realm.kinit(realm.user_princ, password=password('user'), expected_code=1)
76 realm.kinit(realm.user_princ, password=password('user'), expected_code=1)
86 realm.kinit(realm.user_princ, password=password('user'), expected_code=1)
96 realm.kinit(realm.user_princ, password=password('user'), expected_code=1)
106 realm.kinit(realm.user_princ, password=password('user'), expected_code=1)
141 realm.kinit(realm.user_princ, password=password('user'), expected_code=1)
151 realm.kinit(realm.user_princ, password=password('user'), expected_code=1)
161 realm.kinit(realm.user_princ, password=password('user'), expected_code=1)
183 realm.kinit(realm.user_princ, password=password('user'), expected_code=1)
H A Dt_pkinit.py95 expected_code=1, expected_msg=msg)
114 realm.kinit('@%s' % realm.realm, flags=['-n'], expected_code=1,
134 realm.run([kadmin, '-n', 'getprinc', 'testadd'], expected_code=1,
145 realm.run([kvno, realm.host_princ], expected_code=1,
227 expected_code=1, expected_msg='Preauthentication failed')
237 expected_code=2)
282 expected_code=2)
316 expected_code=2)
366 expected_code=1, expected_msg=msg)
381 expected_code=1, expected_msg=msg)
[all …]
H A Dt_general.py7 realm.run([kinit, realm.user_princ], input='wrong\n', expected_code=1,
44 realm.run(['./icred', 'xpr'], expected_code=1,
47 realm.run(['./icred', 'xpr'], expected_code=1,
60 realm.run([kinit, '-C', 'notfoundprinc'], expected_code=1,
H A Dt_pwqual.py22 realm.run([kadminl, 'addprinc', '-pw', '', 'p1'], expected_code=1,
28 expected_code=1,
34 expected_code=1,
38 realm.run([kadminl, 'addprinc', '-pw', 'birdsoranges', 'p6'], expected_code=1,
H A Dt_preauth.py13 realm.kinit('nokeyuser', password('user'), expected_code=1,
86 password('user')], expected_code=1,
143 realm.user_princ, password('user')], expected_code=1,
189 realm.user_princ, password('user')], expected_code=1,
247 realm.user_princ, password('user')], expected_code=1,
H A Dt_skew.py42 realm.kinit(realm.user_princ, password('user'), expected_code=1,
44 realm.kinit(realm.user_princ, None, flags=['-T', fast_cache], expected_code=1,
50 realm.kinit(realm.user_princ, password('user'), expected_code=1,
52 realm.kinit(realm.user_princ, None, flags=['-T', fast_cache], expected_code=1,
H A Dt_cve-2013-1416.py8 realm.run([kvno, '/test'], expected_code=1)
9 realm.run([kvno, 'test/'], expected_code=1)
10 realm.run([kvno, '/'], expected_code=1)
H A Dt_unlockiter.py7 realm.run(['./unlockiter'], expected_code=1)
9 realm.run(['./unlockiter', '-l'], expected_code=1)
18 realm.run(['./unlockiter', '-l'], expected_code=1)
H A Dt_errmsg.py9 out = realm.run([klist, '-c', 'testdir/xx/yy'], env=e1, expected_code=1)
16 out = realm.run([klist, '-c', 'testdir/xx/yy'], env=e2, expected_code=1)
22 out = realm.run([klist, '-c', 'testdir/xx/yy'], env=e3, expected_code=1)
H A Dt_referral.py29 realm.run(['./gcred', nametype, 'a/x.d@'], expected_code=1,
103 out, trace = realm.run(['./gcred', 'srv-hst', 'a/x.d@'], expected_code=1,
122 r1.kinit('user', expected_code=1,
139 r1.kinit('user', None, ['-C'], env=denv, expected_code=1, expected_trace=msgs,
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dt_vfy_increds.py43 realm.run(['./t_vfy_increds'], expected_code=1)
44 realm.run(['./t_vfy_increds', '-n'], expected_code=1)
62 realm.run(['./t_vfy_increds', '-n'], expected_code=1)
74 realm.run(['./t_vfy_increds', '-n'], expected_code=1)
84 realm.run(['./t_vfy_increds', '-n'], expected_code=1)
94 realm.run(['./t_vfy_increds', '-n'], expected_code=1)
95 realm.run(['./t_vfy_increds', realm.nfs_princ], expected_code=1)
96 realm.run(['./t_vfy_increds', '-n', realm.nfs_princ], expected_code=1)
105 realm.run(['./t_vfy_increds'], expected_code=1)
/freebsd/crypto/krb5/src/tests/gssapi/
H A Dt_bindings.py12 expected_code=1, expected_msg='Incorrect channel bindings')
20 expected_code=1, expected_msg='Incorrect channel bindings')
30 expected_code=1, expected_msg='Incorrect channel bindings')
32 expected_code=1, expected_msg='Incorrect channel bindings')
39 expected_code=1, expected_msg='Incorrect channel bindings')
41 expected_code=1, expected_msg='Incorrect channel bindings')
48 expected_code=1, expected_msg='Incorrect channel bindings')
50 expected_code=1, expected_msg='Incorrect channel bindings')
57 expected_code=1, expected_msg='Incorrect channel bindings')
59 expected_code=1, expected_msg='Incorrect channel bindings')
H A Dt_credstore.py25 expected_code=1, expected_msg='does not match desired name')
27 expected_code=1, expected_msg='does not match desired name')
29 expected_code=1, expected_msg='does not match desired name')
43 expected_code=1, expected_msg='does not match desired name')
45 expected_code=1, expected_msg='does not match desired name')
54 expected_code=1,
63 expected_code=1, expected_msg='An invalid name was supplied')
67 expected_code=1, expected_msg='Credential usage type is unknown')
71 expected_code=1, expected_msg='Credential usage type is unknown')
74 expected_code=1, expected_msg='Credential usage type is unknown')
[all …]
H A Dt_store_cred.py20 realm.run(['./t_store_cred', cc_alice], expected_code=1,
22 realm.run(['./t_store_cred', cc_bob], expected_code=1,
35 realm.run(['./t_store_cred', cc_bob, cc_alternate], expected_code=1,
42 realm.run(['./t_store_cred', '-i', cc_bob, cc_alternate], expected_code=1,
48 realm.run([klist, '-c', cc_dir], expected_code=1,
51 realm.run(['./t_store_cred', cc_alice, cc_dir], expected_code=1,
54 realm.run([klist, '-c', cc_dir], expected_code=1,
H A Dt_negoex.py78 test({'KEY': 'never'}, expected_code=1, expected_msg='No NegoEx verify key')
111 test({'HOPS': '1', 'INIT_EXCHANGE_FAIL': '102'}, expected_code=1,
115 expected_code=1,
118 test({'HOPS': '2', 'INIT_EXCHANGE_FAIL': '102'}, expected_code=1,
127 test({'HOPS': '2', 'ACCEPT_FAIL': '102'}, expected_code=1,
H A Dt_s4u.py37 pservice1, pservice2], expected_code=1)
45 expected_code=1)
53 pservice1, pservice2], expected_code=1)
60 realm.run(['./t_s4u', puser, pservice2], expected_code=1,
62 realm.run(['./t_s4u', '--spnego', puser, pservice2], expected_code=1,
68 realm.run(['./t_s4u', puser, pservice2], expected_code=1,
75 realm.run(['./t_s4u', '--spnego', puser, pservice2], expected_code=1,
369 ra.run(['./t_s4u', 'p:' + 'sensitive@A', 'h:service@rb.a'], expected_code=1)
378 ra.run(['./t_s4u', 'p:' + 'sensitive@A', 'h:service@rb.b'], expected_code=1)
387 ra.run(['./t_s4u', 'p:' + 'sensitive@A', 'h:service@rb.c'], expected_code=1)
[all …]
H A Dt_gssapi.py35 'h:host'], env=no_default, expected_code=1,
78 realm.run(['./t_accname', 'p:service2/dwight'], expected_code=1,
86 realm.run(['./t_accname', 'p:service1/andrew', 'h:service2'], expected_code=1,
90 realm.run(['./t_accname', 'p:service2/calvin', 'h:service1'], expected_code=1,
102 'h:host@%s' % socket.gethostname()], expected_code=1,
125 realm.run(['./t_imp_cred', 'p:service2/dwight'], expected_code=1,
130 out = realm.run(['./t_accname', 'p:abc'], expected_code=1)
/freebsd/crypto/krb5/src/clients/ksu/
H A Dt_ksu.py131 realm.run([ksu, 'ksutest', '-n', 'alice', '-a', '-c', klist], expected_code=1,
138 realm.run([ksu, 'ksutest', '-e', klist], expected_code=1,
143 realm.run([ksu, 'ksutest', '-e', klist], expected_code=1,
149 realm.run([ksu, 'ksutest', '-e', klist], expected_code=1,
161 realm.run([ksu, 'ksutest', '-a', '-c', klist], expected_code=1,
169 realm.run([ksu, 'ksutest', '-e', klist], expected_code=1,
172 realm.run([ksu, 'ksutest', '-a', '-c', klist], expected_code=1,
184 realm.run([ksu, 'ksutest', '-a', '-c', klist], expected_code=1,
188 realm.run([ksu, 'ksutest', '-e', kvno], expected_code=1,
190 realm.run([ksu, 'ksutest', '-e', 'doesnotexist'], expected_code=1,
[all …]

123