|
Home About Us A-Z Index Search * Contact Us Register Login Press ShopThe Open Brand -- Problem Reporting and Interpretations System |
Problem Report 1127 Details
Show help | Quick Search | Submit a Test Suite Support Request | Click here to view your privileges
This page provides all information on Problem Report 1127.
Report 1127 Actions
Problem Report Number 1127 Submitter's Classification Test Suite problem State Resolved Resolution Rejected (REJ) Problem Resolution ID REJ.X.0329 Raised 1970-01-01 08:00 Updated 2003-03-13 08:00 Published null Product Standard Internationalised System Calls and Libraries Extended V2 (UNIX 98) Certification Program The Open Brand certification program Test Suite VSU version 5.0.2 Test Identification CAPIbase/getpwent 3 Problem Summary PG4U.00144 The test bed does not provide a stable password database. Problem Text
The functionality being tested by this test is correct on our
implementation, however because our network passwd database file is
continually being updated, the value of VSU_PW_ENT_COUNT in tetexec.cfg,
as determined by "vsuconfig -x", may no longer be valid by the time
the getpwent() test is executed. In this case, the last call to
getpwent() may succeed unexpectedly instead of indicating an end
of file as the test is expecting. Re-executing this test directly
after updating VSU_PW_ENT_CNT to contain the correct value demonstrates
the functionality is intact:
10|7 /tset/CAPIbase/fgetpwent/fgetpwent3 06:24:44|TC Start, scenario ref 2206-1
15|7 1.10 1|TCM Start
400|7 3 1 06:24:44|IC Start
200|7 1 06:24:44|TP Start
520|7 1 12269 1 1|SPEC1170TESTSUITE CASE 3
520|7 1 12269 1 2|A call to struct passwd *getpwent(void)
520|7 1 12269 1 3|shall return a null pointer when an end-of-file is
520|7 1 12269 1 4|encountered.
520|7 1 12270 1 1|PREP: Read value of VSU_PW_ENT_COUNT from configuration file.
520|7 1 12270 1 2| This value indicates the number of entries in the
520|7 1 12270 1 3| user database on the system.
520|7 1 12270 1 4|PREP: Read VSU_PW_ENT_COUNT user entries from the user
520|7 1 12270 1 5| database. This should place us at the end-of-file.
520|7 1 12270 1 6|TEST: getpwent() returns NULL at the end-of-file
520|7 1 12270 1 7| by attempting to read one more entry
220|7 1 0 06:25:20|PASS
410|7 3 1 06:25:20|IC End
80|7 0 06:25:20|TC End
In the absence of isolated network and/or configuring the system such
that the passwd file used for the test is local to the system, it would
be desirable if these tests were designed to obtain VSU_PW_ENT_CNT at
runtime.Test Output
TEST CASE: getpwent
TEST PURPOSE #3
A call to struct passwd *getpwent(void)
shall return a null pointer when an end-of-file is
encountered.
PREP: Read value of VSU_PW_ENT_COUNT from configuration file.
This value indicates the number of entries in the
user database on the system.
PREP: Read VSU_PW_ENT_COUNT user entries from the user
database. This should place us at the end-of-file.
TEST: getpwent() returns NULL at the end-of-file
by attempting to read one more entry
ERROR: getpwent did not return NULL at the end-of-file
3 FAIL
Review Information
Review Type TSMA Review Start Date null Completed null Status Complete Review Recommendation No Resolution Given Review Response
We recommend this request be denied.
This is a configuration problem. The test suite documentation requires the
user to specify a value for VSU_PW_ENT_CNT that is accurate when the test
suite is run, and the submitter is not doing so. We suggest the submitter
effect a test environment is which the continual updating of the password
database is supressed.
Note that there is no portable way we can see to get this number other than
static configuration, as the nature of the password database is not defined
by the specification.
Review Type SA Review Start Date null Completed null Status Complete Review Resolution Rejected (REJ) Review Conclusion
This request is refused.
Problem Reporting System Options:
- View Report 1127
- List All PRs
- Search Reports
- Email the System Administrator
- View the The Open Brand Interpretations Database User Manual
Contact the Certification Authority