CVE-2013-4408:librpc: check for invalid frag_len within dcerpc_read_ncacn_packet_done()
[Samba.git] / testsuite / nsswitch / getgrent_r.exp
blobc03237c2ad19fe26e80c9c3a4cfa21e4093f4550
2 # @(#) Test multiple threads can enumerate groups correctly
5 load_lib util-defs.exp
6 load_lib "$srcdir/lib/nsswitch-config.exp"
8 # Compile getgrent_r.c
10 set output [target_compile "$srcdir/$subdir/getgrent_r.c" \
11 "$srcdir/$subdir/getgrent_r" executable {additional_flags="-g"}]
13 if {$output != ""} {
14 perror "compile getgrent_r"
15 puts $output
16 return
19 # Clean up output from previous tests
21 set pid [pid]
22 file delete [glob -nocomplain "/tmp/getgrent_r-$pid.out-*"]
24 # Run test proggy
26 set output [util_start "$srcdir/$subdir/getgrent_r" "$pid" ""]
27 if {![regexp "^PASS:" $output]} {
28 perror "run getgrent_r"
29 puts $output
30 return -1
33 # Sort and compare output
35 set output [util_start "$srcdir/$subdir/getent_r.sh" "getgrent $pid" ""]
36 if {$output == ""} {
37 pass "getgrent_r"
38 } else {
39 fail "getgrent_r"
40 puts $output