Finger always return 0 with bad user and host test. And it also return
different error message on different distros. So let's only check stderr
message and decide whether the test pass or fail.

Signed-off-by: Hangbin Liu <liuhang...@gmail.com>
---
 testcases/network/tcp_cmds/finger/finger01 | 11 +++++------
 1 file changed, 5 insertions(+), 6 deletions(-)

diff --git a/testcases/network/tcp_cmds/finger/finger01 
b/testcases/network/tcp_cmds/finger/finger01
index 203d746..e01c1ad 100755
--- a/testcases/network/tcp_cmds/finger/finger01
+++ b/testcases/network/tcp_cmds/finger/finger01
@@ -112,14 +112,13 @@ do_test2()
     BADHOST="xxxx"
 
     tst_resm TINFO "finger -badflag default "
-    finger -x 2>&1 1>/dev/null && end_testcase "finger -x should fail"
+    finger -x &>/dev/null && end_testcase "finger -x should fail"
 
     tst_resm TINFO "finger -bad user "
-    finger $BADUSER 2>&1 1>/dev/null || end_testcase "finger $BADUSER"
-    finger @$BADHOST 2>&1 1>/dev/null | grep "finger: unknown host" \
-        || end_testcase "finger @$BADHOST"
-    if ! finger $BADUSER@$BADHOST 2>&1 1>/dev/null \
-        | grep "finger: unknown host"; then
+    [ "$(finger $BADUSER 2>&1 1>/dev/null)" ] || end_testcase "finger $BADUSER"
+    [ "$(finger @$BADHOST 2>&1 1>/dev/null)" ] || \
+        end_testcase "finger $BADUSER@$BADHOST"
+    [ "finger $BADUSER@$BADHOST 2>&1 1>/dev/null" ] || \
         end_testcase "finger $BADUSER@$BADHOST"
     fi
 }
-- 
1.9.3


------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Ltp-list mailing list
Ltp-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to