/* Unix SMB/CIFS implementation. test suite for lsa rpc operations Copyright (C) Andrew Tridgell 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" /* these really shouldn't be here .... */ static char *lsa_sid_string_talloc(TALLOC_CTX *mem_ctx, struct dom_sid *sid) { int i, ofs, maxlen; uint32 ia; char *ret; if (!sid) { return talloc_asprintf(mem_ctx, "(NULL SID)"); } maxlen = sid->num_auths * 11 + 25; ret = talloc(mem_ctx, maxlen); if (!ret) return NULL; ia = (sid->id_auth[5]) + (sid->id_auth[4] << 8 ) + (sid->id_auth[3] << 16) + (sid->id_auth[2] << 24); ofs = snprintf(ret, maxlen, "S-%u-%lu", (unsigned int)sid->sid_rev_num, (unsigned long)ia); for (i = 0; i < sid->num_auths; i++) { ofs += snprintf(ret + ofs, maxlen - ofs, "-%lu", (unsigned long)sid->sub_auths[i]); } return ret; } static int dom_sid_compare(struct dom_sid *sid1, struct dom_sid *sid2) { int i; if (sid1 == sid2) return 0; if (!sid1) return -1; if (!sid2) return 1; /* Compare most likely different rids, first: i.e start at end */ if (sid1->num_auths != sid2->num_auths) return sid1->num_auths - sid2->num_auths; for (i = sid1->num_auths-1; i >= 0; --i) if (sid1->sub_auths[i] != sid2->sub_auths[i]) return sid1->sub_auths[i] - sid2->sub_auths[i]; if (sid1->sid_rev_num != sid2->sid_rev_num) return sid1->sid_rev_num - sid2->sid_rev_num; for (i = 0; i < 6; i++) if (sid1->id_auth[i] != sid2->id_auth[i]) return sid1->id_auth[i] - sid2->id_auth[i]; return 0; } static BOOL test_OpenPolicy(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) { struct lsa_ObjectAttribute attr; struct policy_handle handle; struct lsa_QosInfo qos; struct lsa_OpenPolicy r; NTSTATUS status; uint16 system_name = '\\'; printf("\ntesting OpenPolicy\n"); qos.impersonation_level = 2; qos.context_mode = 1; qos.effective_only = 0; attr.root_dir = NULL; attr.object_name = NULL; attr.attributes = 0; attr.sec_desc = NULL; attr.sec_qos = &qos; r.in.system_name = &system_name; r.in.attr = &attr; r.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.handle = &handle; status = dcerpc_lsa_OpenPolicy(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("OpenPolicy failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_OpenPolicy2(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { struct lsa_ObjectAttribute attr; struct lsa_QosInfo qos; struct lsa_OpenPolicy2 r; NTSTATUS status; printf("\ntesting OpenPolicy2\n"); qos.impersonation_level = 2; qos.context_mode = 1; qos.effective_only = 0; attr.root_dir = NULL; attr.object_name = NULL; attr.attributes = 0; attr.sec_desc = NULL; attr.sec_qos = &qos; r.in.system_name = "\\"; r.in.attr = &attr; r.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.handle = handle; status = dcerpc_lsa_OpenPolicy2(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("OpenPolicy2 failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_LookupNames(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_TransNameArray *tnames) { struct lsa_LookupNames r; struct lsa_TransSidArray sids; struct lsa_Name *names; uint32 count = 0; NTSTATUS status; int i; printf("\nTesting LookupNames\n"); sids.count = 0; sids.sids = NULL; names = talloc(mem_ctx, tnames->count * sizeof(names[0])); for (i=0;icount;i++) { names[i].name_len = 2*strlen(tnames->names[i].name.name); names[i].name_size = 2*strlen(tnames->names[i].name.name); names[i].name = tnames->names[i].name.name; } r.in.handle = handle; r.in.num_names = tnames->count; r.in.names = names; r.in.sids = &sids; r.in.level = 1; r.in.count = &count; r.out.count = &count; r.out.sids = &sids; status = dcerpc_lsa_LookupNames(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status) && !NT_STATUS_EQUAL(status, STATUS_SOME_UNMAPPED)) { printf("LookupNames failed - %s\n", nt_errstr(status)); return False; } if (r.out.domains) { NDR_PRINT_DEBUG(lsa_RefDomainList, r.out.domains); } printf("lookup gave %d sids (sids.count=%d)\n", count, sids.count); NDR_PRINT_DEBUG(lsa_TransSidArray, r.out.sids); printf("\n"); return True; } static BOOL test_LookupSids(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_SidArray *sids) { struct lsa_LookupSids r; struct lsa_TransNameArray names; uint32 count = sids->num_sids; NTSTATUS status; printf("\nTesting LookupSids\n"); names.count = 0; names.names = NULL; r.in.handle = handle; r.in.sids = sids; r.in.names = &names; r.in.level = 1; r.in.count = &count; r.out.count = &count; r.out.names = &names; status = dcerpc_lsa_LookupSids(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status) && !NT_STATUS_EQUAL(status, STATUS_SOME_UNMAPPED)) { printf("LookupSids failed - %s\n", nt_errstr(status)); return False; } if (r.out.domains) { NDR_PRINT_DEBUG(lsa_RefDomainList, r.out.domains); } NDR_PRINT_DEBUG(lsa_TransNameArray, r.out.names); printf("\n"); if (!test_LookupNames(p, mem_ctx, handle, &names)) { return False; } return True; } static BOOL test_LookupPrivName(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_LUID *luid) { NTSTATUS status; struct lsa_LookupPrivName r; r.in.handle = handle; r.in.luid_high = luid->high; r.in.luid_low = luid->low; status = dcerpc_lsa_LookupPrivName(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("\nLookupPrivName failed - %s\n", nt_errstr(status)); return False; } NDR_PRINT_DEBUG(lsa_Name, r.out.name); return True; } static BOOL test_EnumPrivsAccount(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct policy_handle *acct_handle) { NTSTATUS status; struct lsa_EnumPrivsAccount r; printf("Testing EnumPrivsAccount\n"); r.in.handle = acct_handle; status = dcerpc_lsa_EnumPrivsAccount(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumPrivsAccount failed - %s\n", nt_errstr(status)); return False; } printf("received %d privileges\n", r.out.privs?r.out.privs->count:0); if (r.out.privs) { int i; NDR_PRINT_DEBUG(lsa_PrivilegeSet, r.out.privs); for (i=0;icount;i++) { test_LookupPrivName(p, mem_ctx, handle, &r.out.privs->set[i].luid); } } return True; } static BOOL test_EnumAccountRights(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *acct_handle, struct dom_sid *sid) { NTSTATUS status; struct lsa_EnumAccountRights r; struct lsa_RightSet rights; printf("Testing EnumAccountRights\n"); r.in.handle = acct_handle; r.in.sid = sid; r.out.rights = &rights; status = dcerpc_lsa_EnumAccountRights(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumAccountRights failed - %s\n", nt_errstr(status)); return False; } NDR_PRINT_DEBUG(lsa_RightSet, r.out.rights); return True; } static BOOL test_OpenAccount(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid *sid) { NTSTATUS status; struct lsa_OpenAccount r; struct policy_handle acct_handle; printf("Testing OpenAccount(%s)\n", lsa_sid_string_talloc(mem_ctx, sid)); r.in.handle = handle; r.in.sid = sid; r.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.acct_handle = &acct_handle; status = dcerpc_lsa_OpenAccount(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("OpenAccount failed - %s\n", nt_errstr(status)); return False; } if (!test_EnumPrivsAccount(p, mem_ctx, handle, &acct_handle)) { return False; } return True; } static BOOL test_EnumAccounts(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct lsa_EnumAccounts r; struct lsa_SidArray sids1, sids2; uint32 resume_handle = 0; int i; printf("\ntesting EnumAccounts\n"); r.in.handle = handle; r.in.resume_handle = &resume_handle; r.in.num_entries = 100; r.out.resume_handle = &resume_handle; r.out.sids = &sids1; resume_handle = 0; status = dcerpc_lsa_EnumAccounts(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumAccounts failed - %s\n", nt_errstr(status)); return False; } printf("Got %d sids resume_handle=%u\n", sids1.num_sids, resume_handle); NDR_PRINT_DEBUG(lsa_SidArray, r.out.sids); if (!test_LookupSids(p, mem_ctx, handle, &sids1)) { return False; } printf("testing all accounts\n"); for (i=0;i