summaryrefslogtreecommitdiff
path: root/source4
diff options
context:
space:
mode:
authorAndrew Tridgell <tridge@samba.org>2005-08-24 11:01:10 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 13:34:30 -0500
commit3eb52c6cd61ae8117f3380050c0ef3be8ff841b4 (patch)
tree8eefedc9d2b172bfab083ec381f8ad7f4f74d033 /source4
parent38e2d25eda98df1b87355e4fdddb1127a6e42762 (diff)
downloadsamba-3eb52c6cd61ae8117f3380050c0ef3be8ff841b4.tar.gz
samba-3eb52c6cd61ae8117f3380050c0ef3be8ff841b4.tar.bz2
samba-3eb52c6cd61ae8117f3380050c0ef3be8ff841b4.zip
r9574: - made the sec_info fields in lsa and samr use a IDL bitmap
- fixed winreg_GetKeySecurity() to use a sec_info field correctly - simplied the winreg torture code, removing the separate opens for each hive - added torture cleanup code in winreg test - added 'create with security descriptor' in the winreg torture test (This used to be commit f20695decd587f7b6bbdbd4861441bd19ab85078)
Diffstat (limited to 'source4')
-rw-r--r--source4/librpc/idl/lsa.idl4
-rw-r--r--source4/librpc/idl/samr.idl6
-rw-r--r--source4/librpc/idl/security.idl16
-rw-r--r--source4/librpc/idl/winreg.idl12
-rw-r--r--source4/torture/rpc/winreg.c255
5 files changed, 156 insertions, 137 deletions
diff --git a/source4/librpc/idl/lsa.idl b/source4/librpc/idl/lsa.idl
index 63c7bad05c..83251b37db 100644
--- a/source4/librpc/idl/lsa.idl
+++ b/source4/librpc/idl/lsa.idl
@@ -13,6 +13,8 @@
depends(security)
] interface lsarpc
{
+ declare bitmap security_secinfo;
+
typedef [public,noejs] struct {
[value(2*strlen_m(string))] uint16 length;
[value(2*strlen_m(string))] uint16 size;
@@ -79,7 +81,7 @@
NTSTATUS lsa_QuerySecurity (
[in,ref] policy_handle *handle,
- [in] uint32 sec_info,
+ [in] security_secinfo sec_info,
[out] sec_desc_buf *sdbuf
);
diff --git a/source4/librpc/idl/samr.idl b/source4/librpc/idl/samr.idl
index 0d3e49ff36..3ca7d1bd06 100644
--- a/source4/librpc/idl/samr.idl
+++ b/source4/librpc/idl/samr.idl
@@ -16,6 +16,8 @@
depends(lsa,security)
] interface samr
{
+ declare bitmap security_secinfo;
+
/* account control (acct_flags) bits */
typedef [public,bitmap32bit] bitmap {
ACB_DISABLED = 0x00000001, /* 1 = User account disabled */
@@ -52,7 +54,7 @@
NTSTATUS samr_SetSecurity (
[in,ref] policy_handle *handle,
- [in] uint32 sec_info,
+ [in] security_secinfo sec_info,
[in,ref] sec_desc_buf *sdbuf
);
@@ -61,7 +63,7 @@
NTSTATUS samr_QuerySecurity (
[in,ref] policy_handle *handle,
- [in] uint32 sec_info,
+ [in] security_secinfo sec_info,
[out] sec_desc_buf *sdbuf
);
diff --git a/source4/librpc/idl/security.idl b/source4/librpc/idl/security.idl
index dd502b178f..cbdfba1ffb 100644
--- a/source4/librpc/idl/security.idl
+++ b/source4/librpc/idl/security.idl
@@ -297,13 +297,6 @@ interface security
SEC_DESC_SELF_RELATIVE = 0x8000
} security_descriptor_type;
- /* bits that determine which parts of a security descriptor
- are being queried/set */
- const int SECINFO_OWNER = 0x00000001;
- const int SECINFO_GROUP = 0x00000002;
- const int SECINFO_DACL = 0x00000004;
- const int SECINFO_SACL = 0x00000008;
-
typedef [public,flag(NDR_LITTLE_ENDIAN)] struct {
security_descriptor_revision revision;
security_descriptor_type type; /* SEC_DESC_xxxx flags */
@@ -325,4 +318,13 @@ interface security
[size_is(num_sids)] dom_sid *sids[*];
udlong privilege_mask;
} security_token;
+
+ /* bits that determine which parts of a security descriptor
+ are being queried/set */
+ typedef [public,bitmap32bit] bitmap {
+ SECINFO_OWNER = 0x00000001,
+ SECINFO_GROUP = 0x00000002,
+ SECINFO_DACL = 0x00000004,
+ SECINFO_SACL = 0x00000008
+ } security_secinfo;
}
diff --git a/source4/librpc/idl/winreg.idl b/source4/librpc/idl/winreg.idl
index a6e2d53286..f29d3f6268 100644
--- a/source4/librpc/idl/winreg.idl
+++ b/source4/librpc/idl/winreg.idl
@@ -14,6 +14,8 @@
depends(lsa,initshutdown)
] interface winreg
{
+ declare bitmap security_secinfo;
+
typedef [v1_enum] enum {
REG_NONE = 0,
REG_SZ = 1,
@@ -96,6 +98,12 @@
bool8 inherit;
} winreg_SecBuf;
+ typedef [v1_enum] enum {
+ REG_ACTION_NONE = 0, /* used by caller */
+ REG_CREATED_NEW_KEY = 1,
+ REG_OPENED_EXISTING_KEY = 2
+ } winreg_CreateAction;
+
WERROR winreg_CreateKey(
[in,ref] policy_handle *handle,
[in] winreg_String name,
@@ -104,7 +112,7 @@
[in] uint32 access_required,
[in,unique] winreg_SecBuf *secdesc,
[out,ref] policy_handle *new_handle,
- [in,out,unique] uint32 *action_taken
+ [in,out,unique] winreg_CreateAction *action_taken
);
/******************/
@@ -161,7 +169,7 @@
/* Function: 0x0c */
WERROR winreg_GetKeySecurity(
[in,ref] policy_handle *handle,
- [in] uint32 access_mask,
+ [in] security_secinfo sec_info,
[in,out,ref] KeySecurityData *sd
);
diff --git a/source4/torture/rpc/winreg.c b/source4/torture/rpc/winreg.c
index 2cf52a2686..798a069558 100644
--- a/source4/torture/rpc/winreg.c
+++ b/source4/torture/rpc/winreg.c
@@ -23,6 +23,10 @@
#include "includes.h"
#include "librpc/gen_ndr/ndr_winreg.h"
+#define TEST_KEY_BASE "smbtorture test"
+#define TEST_KEY1 TEST_KEY_BASE "\\spottyfoot"
+#define TEST_KEY2 TEST_KEY_BASE "\\with a SD (#1)"
+
static void init_initshutdown_String(TALLOC_CTX *mem_ctx, struct initshutdown_String *name, const char *s)
{
name->name = talloc(mem_ctx, struct initshutdown_String_sub);
@@ -131,6 +135,68 @@ static BOOL test_CreateKey(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
return True;
}
+
+/*
+ createkey testing with a SD
+*/
+static BOOL test_CreateKey_sd(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
+ struct policy_handle *handle, const char *name,
+ const char *class, struct policy_handle *newhandle)
+{
+ struct winreg_CreateKey r;
+ NTSTATUS status;
+ uint32_t action_taken = 0;
+ struct security_descriptor *sd;
+ DATA_BLOB sdblob;
+ struct winreg_SecBuf secbuf;
+
+ sd = security_descriptor_create(mem_ctx,
+ NULL, NULL,
+ SID_NT_AUTHENTICATED_USERS,
+ SEC_ACE_TYPE_ACCESS_ALLOWED,
+ SEC_GENERIC_ALL,
+ SEC_ACE_FLAG_OBJECT_INHERIT,
+ NULL);
+
+ status = ndr_push_struct_blob(&sdblob, mem_ctx, sd,
+ (ndr_push_flags_fn_t)ndr_push_security_descriptor);
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("Failed to push security_descriptor ?!\n");
+ return False;
+ }
+
+ secbuf.sd.data = sdblob.data;
+ secbuf.sd.len = sdblob.length;
+ secbuf.sd.size = sdblob.length;
+ secbuf.length = sdblob.length-10;
+ secbuf.inherit = 0;
+
+ printf("\ntesting CreateKey with sd\n");
+
+ r.in.handle = handle;
+ r.out.new_handle = newhandle;
+ init_winreg_String(&r.in.name, name);
+ init_winreg_String(&r.in.class, class);
+ r.in.options = 0x0;
+ r.in.access_required = SEC_FLAG_MAXIMUM_ALLOWED;
+ r.in.action_taken = r.out.action_taken = &action_taken;
+ r.in.secdesc = &secbuf;
+
+ status = dcerpc_winreg_CreateKey(p, mem_ctx, &r);
+
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("CreateKey with sd failed - %s\n", nt_errstr(status));
+ return False;
+ }
+
+ if (!W_ERROR_IS_OK(r.out.result)) {
+ printf("CreateKey with sd failed - %s\n", win_errstr(r.out.result));
+ return False;
+ }
+
+ return True;
+}
+
static BOOL test_GetKeySecurity(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
struct policy_handle *handle)
{
@@ -145,8 +211,8 @@ static BOOL test_GetKeySecurity(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
r.in.handle = handle;
r.in.sd = r.out.sd = talloc_zero(mem_ctx, struct KeySecurityData);
- r.in.sd->size = 0xffff;
- r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+ r.in.sd->size = 0x1000;
+ r.in.sec_info = SECINFO_OWNER | SECINFO_GROUP | SECINFO_DACL;
status = dcerpc_winreg_GetKeySecurity(p, mem_ctx, &r);
@@ -163,8 +229,8 @@ static BOOL test_GetKeySecurity(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
sdblob.data = r.out.sd->data;
sdblob.length = r.out.sd->len;
- status = ndr_pull_struct_blob_all(&sdblob, mem_ctx, &sd,
- (ndr_pull_flags_fn_t)ndr_pull_security_descriptor);
+ status = ndr_pull_struct_blob(&sdblob, mem_ctx, &sd,
+ (ndr_pull_flags_fn_t)ndr_pull_security_descriptor);
if (!NT_STATUS_IS_OK(status)) {
printf("pull_security_descriptor failed - %s\n", nt_errstr(status));
return False;
@@ -257,6 +323,20 @@ static BOOL test_OpenKey(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
return True;
}
+static BOOL test_Cleanup(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
+ struct policy_handle *handle, const char *key)
+{
+ struct winreg_DeleteKey r;
+
+ r.in.handle = handle;
+ init_winreg_String(&r.in.key, key);
+
+ dcerpc_winreg_DeleteKey(p, mem_ctx, &r);
+
+ return True;
+}
+
+
static BOOL test_DeleteKey(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
struct policy_handle *handle, const char *key)
{
@@ -390,10 +470,10 @@ static BOOL test_QueryMultipleValues(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
r.in.num_values = 1;
r.in.buffer_size = r.out.buffer_size = talloc(mem_ctx, uint32_t);
*r.in.buffer_size = 0x00;
- r.in.buffer = r.out.buffer = talloc_zero_array(mem_ctx, uint8_t, *r.in.buffer_size);
-
do {
*r.in.buffer_size += 0x20;
+ r.in.buffer = r.out.buffer = talloc_zero_array(mem_ctx, uint8_t,
+ *r.in.buffer_size);
status = dcerpc_winreg_QueryMultipleValues(p, mem_ctx, &r);
@@ -490,89 +570,6 @@ static BOOL test_EnumValue(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
return ret;
}
-static BOOL test_OpenHKLM(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
- struct policy_handle *handle)
-{
- NTSTATUS status;
- struct winreg_OpenHKLM r;
- BOOL ret = True;
-
- printf("\ntesting OpenHKLM\n");
-
- r.in.system_name = 0;
- r.in.access_required = SEC_FLAG_MAXIMUM_ALLOWED;
- r.out.handle = handle;
-
- status = dcerpc_winreg_OpenHKLM(p, mem_ctx, &r);
-
- if (!NT_STATUS_IS_OK(status)) {
- printf("OpenHKLM failed - %s\n", nt_errstr(status));
- return False;
- }
-
- if (!W_ERROR_IS_OK(r.out.result)) {
- printf("OpenHKLM failed - %s\n", win_errstr(r.out.result));
- return False;
- }
-
- return ret;
-}
-
-static BOOL test_OpenHKU(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
- struct policy_handle *handle)
-{
- NTSTATUS status;
- struct winreg_OpenHKU r;
- BOOL ret = True;
-
- printf("\ntesting OpenHKU\n");
-
- r.in.system_name = 0;
- r.in.access_required = SEC_FLAG_MAXIMUM_ALLOWED;
- r.out.handle = handle;
-
- status = dcerpc_winreg_OpenHKU(p, mem_ctx, &r);
-
- if (!NT_STATUS_IS_OK(status)) {
- printf("OpenHKU failed - %s\n", nt_errstr(status));
- return False;
- }
-
- if (!W_ERROR_IS_OK(r.out.result)) {
- printf("OpenHKU failed - %s\n", win_errstr(r.out.result));
- return False;
- }
-
- return ret;
-}
-
-static BOOL test_OpenHKCR(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
- struct policy_handle *handle)
-{
- NTSTATUS status;
- struct winreg_OpenHKCR r;
- BOOL ret = True;
-
- printf("\ntesting OpenHKCR\n");
-
- r.in.system_name = 0;
- r.in.access_required = SEC_FLAG_MAXIMUM_ALLOWED;
- r.out.handle = handle;
-
- status = dcerpc_winreg_OpenHKCR(p, mem_ctx, &r);
-
- if (!NT_STATUS_IS_OK(status)) {
- printf("OpenHKCR failed - %s\n", nt_errstr(status));
- return False;
- }
-
- if (!W_ERROR_IS_OK(r.out.result)) {
- printf("OpenHKU failed - %s\n", win_errstr(r.out.result));
- return False;
- }
- return ret;
-}
-
static BOOL test_InitiateSystemShutdown(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
const char *msg, uint32_t timeout)
{
@@ -655,29 +652,6 @@ static BOOL test_AbortSystemShutdown(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx)
return True;
}
-static BOOL test_OpenHKCU(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
- struct policy_handle *handle)
-{
- NTSTATUS status;
- struct winreg_OpenHKCU r;
- BOOL ret = True;
-
- printf("\ntesting OpenHKCU\n");
-
- r.in.system_name = 0;
- r.in.access_required = SEC_FLAG_MAXIMUM_ALLOWED;
- r.out.handle = handle;
-
- status = dcerpc_winreg_OpenHKCU(p, mem_ctx, &r);
-
- if (!NT_STATUS_IS_OK(status)) {
- printf("OpenHKCU failed - %s\n", nt_errstr(status));
- return False;
- }
-
- return ret;
-}
-
#define MAX_DEPTH 2 /* Only go this far down the tree */
static BOOL test_key(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
@@ -708,20 +682,27 @@ static BOOL test_key(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
return True;
}
-typedef BOOL winreg_open_fn(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
- struct policy_handle *handle);
+typedef NTSTATUS (*winreg_open_fn)(struct dcerpc_pipe *, TALLOC_CTX *, void *);
-static BOOL test_Open(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, void *fn)
+static BOOL test_Open(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, winreg_open_fn open_fn)
{
struct policy_handle handle, newhandle;
BOOL ret = True, created = False, deleted = False;
- winreg_open_fn *open_fn = (winreg_open_fn *)fn;
+ struct winreg_OpenHKLM r;
+ NTSTATUS status;
- if (!open_fn(p, mem_ctx, &handle)) {
+ r.in.system_name = 0;
+ r.in.access_required = SEC_FLAG_MAXIMUM_ALLOWED;
+ r.out.handle = &handle;
+
+ status = open_fn(p, mem_ctx, &r);
+ if (!NT_STATUS_IS_OK(status)) {
return False;
}
- if (!test_CreateKey(p, mem_ctx, &handle, "spottyfoot", NULL)) {
+ test_Cleanup(p, mem_ctx, &handle, TEST_KEY_BASE);
+
+ if (!test_CreateKey(p, mem_ctx, &handle, TEST_KEY1, NULL)) {
printf("CreateKey failed - not considering a failure\n");
} else {
created = True;
@@ -732,12 +713,12 @@ static BOOL test_Open(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, void *fn)
ret = False;
}
- if (created && !test_OpenKey(p, mem_ctx, &handle, "spottyfoot", &newhandle)) {
+ if (created && !test_OpenKey(p, mem_ctx, &handle, TEST_KEY1, &newhandle)) {
printf("CreateKey failed (OpenKey after Create didn't work)\n");
ret = False;
}
- if (created && !test_DeleteKey(p, mem_ctx, &handle, "spottyfoot")) {
+ if (created && !test_DeleteKey(p, mem_ctx, &handle, TEST_KEY1)) {
printf("DeleteKey failed\n");
ret = False;
} else {
@@ -749,7 +730,7 @@ static BOOL test_Open(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, void *fn)
ret = False;
}
- if (deleted && test_OpenKey(p, mem_ctx, &handle, "spottyfoot", &newhandle)) {
+ if (deleted && test_OpenKey(p, mem_ctx, &handle, TEST_KEY1, &newhandle)) {
printf("DeleteKey failed (OpenKey after Delete didn't work)\n");
ret = False;
}
@@ -759,9 +740,32 @@ static BOOL test_Open(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, void *fn)
ret = False;
}
+ if (created && !test_CreateKey_sd(p, mem_ctx, &handle, TEST_KEY2,
+ NULL, &newhandle)) {
+ printf("CreateKey failed - not considering a failure\n");
+ created = False;
+ } else {
+ created = True;
+ }
+
+ if (created && !test_GetKeySecurity(p, mem_ctx, &newhandle)) {
+ printf("GetKeySecurity failed\n");
+ ret = False;
+ }
+
+ if (created && !test_CloseKey(p, mem_ctx, &newhandle)) {
+ printf("CloseKey failed\n");
+ ret = False;
+ }
+
+ if (created && !test_DeleteKey(p, mem_ctx, &handle, TEST_KEY2)) {
+ printf("DeleteKey failed\n");
+ ret = False;
+ }
+
/* The HKCR hive has a very large fanout */
- if (open_fn == test_OpenHKCR) {
+ if (open_fn == (void *)dcerpc_winreg_OpenHKCR) {
if(!test_key(p, mem_ctx, &handle, MAX_DEPTH - 1)) {
ret = False;
}
@@ -780,10 +784,11 @@ BOOL torture_rpc_winreg(void)
struct dcerpc_pipe *p;
TALLOC_CTX *mem_ctx;
BOOL ret = True;
- winreg_open_fn *open_fns[] = { test_OpenHKLM, test_OpenHKU,
- test_OpenHKCR, test_OpenHKCU };
+ winreg_open_fn open_fns[] = { (winreg_open_fn)dcerpc_winreg_OpenHKLM,
+ (winreg_open_fn)dcerpc_winreg_OpenHKU,
+ (winreg_open_fn)dcerpc_winreg_OpenHKCR,
+ (winreg_open_fn)dcerpc_winreg_OpenHKCU };
int i;
-
mem_ctx = talloc_init("torture_rpc_winreg");
status = torture_rpc_connection(mem_ctx,