summaryrefslogtreecommitdiff
path: root/source4/torture/rpc/samr.c
diff options
context:
space:
mode:
authorAndrew Tridgell <tridge@samba.org>2003-11-15 06:00:21 +0000
committerAndrew Tridgell <tridge@samba.org>2003-11-15 06:00:21 +0000
commitba5a060136145abdfa4915fe0fecc4afe1180627 (patch)
treea63f5c07b979c3ba44a31f53959761f857c3d912 /source4/torture/rpc/samr.c
parent78b7118d1aeccc9da490af614d4646a328ac2c46 (diff)
downloadsamba-ba5a060136145abdfa4915fe0fecc4afe1180627.tar.gz
samba-ba5a060136145abdfa4915fe0fecc4afe1180627.tar.bz2
samba-ba5a060136145abdfa4915fe0fecc4afe1180627.zip
added the first couple of calls from samr as IDL
samr_EnumDomains() works nicely (This used to be commit 7c162eaf3bb0195f9a2da05d6acd3c8e620f08d1)
Diffstat (limited to 'source4/torture/rpc/samr.c')
-rw-r--r--source4/torture/rpc/samr.c97
1 files changed, 97 insertions, 0 deletions
diff --git a/source4/torture/rpc/samr.c b/source4/torture/rpc/samr.c
new file mode 100644
index 0000000000..12d4ebbe93
--- /dev/null
+++ b/source4/torture/rpc/samr.c
@@ -0,0 +1,97 @@
+/*
+ Unix SMB/CIFS implementation.
+ test suite for samr rpc operations
+
+ Copyright (C) Andrew Tridgell 2003
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+*/
+
+#include "includes.h"
+
+
+static BOOL test_EnumDomains(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
+ struct policy_handle *handle)
+{
+ NTSTATUS status;
+ struct samr_EnumDomains r;
+ uint32 resume_handle = 0;
+ uint32 num_entries;
+
+ r.in.handle = handle;
+ r.in.resume_handle = &resume_handle;
+ r.in.buf_size = (uint32)-1;
+ r.out.resume_handle = &resume_handle;
+ r.out.num_entries = &num_entries;
+
+ status = dcerpc_samr_EnumDomains(p, mem_ctx, &r);
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("EnumDomains failed - %s\n", nt_errstr(status));
+ return False;
+ }
+
+ NDR_PRINT_DEBUG(samr_SamArray, r.out.sam);
+
+ return True;
+}
+
+
+static BOOL test_Connect(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
+ struct policy_handle *handle)
+{
+ NTSTATUS status;
+ struct samr_Connect r;
+
+ r.in.system_name = 0;
+ r.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED;
+ r.out.handle = handle;
+
+ status = dcerpc_samr_Connect(p, mem_ctx, &r);
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("Connect failed - %s\n", nt_errstr(status));
+ return False;
+ }
+
+ return True;
+}
+
+
+BOOL torture_rpc_samr(int dummy)
+{
+ NTSTATUS status;
+ struct dcerpc_pipe *p;
+ TALLOC_CTX *mem_ctx;
+ BOOL ret = True;
+ struct policy_handle handle;
+
+ mem_ctx = talloc_init("torture_rpc_samr");
+
+ status = torture_rpc_connection(&p, "samr");
+ if (!NT_STATUS_IS_OK(status)) {
+ return False;
+ }
+
+ if (!test_Connect(p, mem_ctx, &handle)) {
+ ret = False;
+ }
+
+ if (!test_EnumDomains(p, mem_ctx, &handle)) {
+ ret = False;
+ }
+
+ torture_rpc_close(p);
+
+ return ret;
+}