diff options
author | Andrew Tridgell <tridge@samba.org> | 2003-11-15 06:00:21 +0000 |
---|---|---|
committer | Andrew Tridgell <tridge@samba.org> | 2003-11-15 06:00:21 +0000 |
commit | ba5a060136145abdfa4915fe0fecc4afe1180627 (patch) | |
tree | a63f5c07b979c3ba44a31f53959761f857c3d912 /source4/torture/rpc/samr.c | |
parent | 78b7118d1aeccc9da490af614d4646a328ac2c46 (diff) | |
download | samba-ba5a060136145abdfa4915fe0fecc4afe1180627.tar.gz samba-ba5a060136145abdfa4915fe0fecc4afe1180627.tar.bz2 samba-ba5a060136145abdfa4915fe0fecc4afe1180627.zip |
added the first couple of calls from samr as IDL
samr_EnumDomains() works nicely
(This used to be commit 7c162eaf3bb0195f9a2da05d6acd3c8e620f08d1)
Diffstat (limited to 'source4/torture/rpc/samr.c')
-rw-r--r-- | source4/torture/rpc/samr.c | 97 |
1 files changed, 97 insertions, 0 deletions
diff --git a/source4/torture/rpc/samr.c b/source4/torture/rpc/samr.c new file mode 100644 index 0000000000..12d4ebbe93 --- /dev/null +++ b/source4/torture/rpc/samr.c @@ -0,0 +1,97 @@ +/* + Unix SMB/CIFS implementation. + test suite for samr rpc operations + + Copyright (C) Andrew Tridgell 2003 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. +*/ + +#include "includes.h" + + +static BOOL test_EnumDomains(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, + struct policy_handle *handle) +{ + NTSTATUS status; + struct samr_EnumDomains r; + uint32 resume_handle = 0; + uint32 num_entries; + + r.in.handle = handle; + r.in.resume_handle = &resume_handle; + r.in.buf_size = (uint32)-1; + r.out.resume_handle = &resume_handle; + r.out.num_entries = &num_entries; + + status = dcerpc_samr_EnumDomains(p, mem_ctx, &r); + if (!NT_STATUS_IS_OK(status)) { + printf("EnumDomains failed - %s\n", nt_errstr(status)); + return False; + } + + NDR_PRINT_DEBUG(samr_SamArray, r.out.sam); + + return True; +} + + +static BOOL test_Connect(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, + struct policy_handle *handle) +{ + NTSTATUS status; + struct samr_Connect r; + + r.in.system_name = 0; + r.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; + r.out.handle = handle; + + status = dcerpc_samr_Connect(p, mem_ctx, &r); + if (!NT_STATUS_IS_OK(status)) { + printf("Connect failed - %s\n", nt_errstr(status)); + return False; + } + + return True; +} + + +BOOL torture_rpc_samr(int dummy) +{ + NTSTATUS status; + struct dcerpc_pipe *p; + TALLOC_CTX *mem_ctx; + BOOL ret = True; + struct policy_handle handle; + + mem_ctx = talloc_init("torture_rpc_samr"); + + status = torture_rpc_connection(&p, "samr"); + if (!NT_STATUS_IS_OK(status)) { + return False; + } + + if (!test_Connect(p, mem_ctx, &handle)) { + ret = False; + } + + if (!test_EnumDomains(p, mem_ctx, &handle)) { + ret = False; + } + + torture_rpc_close(p); + + return ret; +} |