/* Unix SMB/CIFS implementation. test suite for lsa rpc operations Copyright (C) Andrew Tridgell 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" static void init_lsa_Name(struct lsa_Name *name, const char *s) { name->name = s; } static BOOL test_OpenPolicy(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) { struct lsa_ObjectAttribute attr; struct policy_handle handle; struct lsa_QosInfo qos; struct lsa_OpenPolicy r; NTSTATUS status; uint16 system_name = '\\'; printf("\ntesting OpenPolicy\n"); qos.len = 0; qos.impersonation_level = 2; qos.context_mode = 1; qos.effective_only = 0; attr.len = 0; attr.root_dir = NULL; attr.object_name = NULL; attr.attributes = 0; attr.sec_desc = NULL; attr.sec_qos = &qos; r.in.system_name = &system_name; r.in.attr = &attr; r.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.handle = &handle; status = dcerpc_lsa_OpenPolicy(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("OpenPolicy failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_OpenPolicy2(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { struct lsa_ObjectAttribute attr; struct lsa_QosInfo qos; struct lsa_OpenPolicy2 r; NTSTATUS status; printf("\ntesting OpenPolicy2\n"); qos.len = 0; qos.impersonation_level = 2; qos.context_mode = 1; qos.effective_only = 0; attr.len = 0; attr.root_dir = NULL; attr.object_name = NULL; attr.attributes = 0; attr.sec_desc = NULL; attr.sec_qos = &qos; r.in.system_name = "\\"; r.in.attr = &attr; r.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.handle = handle; status = dcerpc_lsa_OpenPolicy2(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("OpenPolicy2 failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_LookupNames(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_TransNameArray *tnames) { struct lsa_LookupNames r; struct lsa_TransSidArray sids; struct lsa_Name *names; uint32 count = 0; NTSTATUS status; int i; printf("\nTesting LookupNames\n"); sids.count = 0; sids.sids = NULL; names = talloc(mem_ctx, tnames->count * sizeof(names[0])); for (i=0;icount;i++) { init_lsa_Name(&names[i], tnames->names[i].name.name); } r.in.handle = handle; r.in.num_names = tnames->count; r.in.names = names; r.in.sids = &sids; r.in.level = 1; r.in.count = &count; r.out.count = &count; r.out.sids = &sids; status = dcerpc_lsa_LookupNames(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status) && !NT_STATUS_EQUAL(status, STATUS_SOME_UNMAPPED)) { printf("LookupNames failed - %s\n", nt_errstr(status)); return False; } printf("\n"); return True; } static BOOL test_LookupSids(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_SidArray *sids) { struct lsa_LookupSids r; struct lsa_TransNameArray names; uint32 count = sids->num_sids; NTSTATUS status; printf("\nTesting LookupSids\n"); names.count = 0; names.names = NULL; r.in.handle = handle; r.in.sids = sids; r.in.names = &names; r.in.level = 1; r.in.count = &count; r.out.count = &count; r.out.names = &names; status = dcerpc_lsa_LookupSids(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status) && !NT_STATUS_EQUAL(status, STATUS_SOME_UNMAPPED)) { printf("LookupSids failed - %s\n", nt_errstr(status)); return False; } printf("\n"); if (!test_LookupNames(p, mem_ctx, handle, &names)) { return False; } return True; } static BOOL test_LookupPrivName(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_LUID *luid) { NTSTATUS status; struct lsa_LookupPrivName r; r.in.handle = handle; r.in.luid = luid; status = dcerpc_lsa_LookupPrivName(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("\nLookupPrivName failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_EnumPrivsAccount(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct policy_handle *acct_handle) { NTSTATUS status; struct lsa_EnumPrivsAccount r; printf("Testing EnumPrivsAccount\n"); r.in.handle = acct_handle; status = dcerpc_lsa_EnumPrivsAccount(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumPrivsAccount failed - %s\n", nt_errstr(status)); return False; } if (r.out.privs) { int i; for (i=0;icount;i++) { test_LookupPrivName(p, mem_ctx, handle, &r.out.privs->set[i].luid); } } return True; } static BOOL test_Delete(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct lsa_Delete r; printf("\ntesting Delete\n"); r.in.handle = handle; status = dcerpc_lsa_Delete(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("Delete failed - %s\n", nt_errstr(status)); return False; } printf("\n"); return True; } static BOOL find_domain_sid(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 **sid) { struct lsa_QueryInfoPolicy r; NTSTATUS status; r.in.handle = handle; r.in.level = LSA_POLICY_INFO_DOMAIN; status = dcerpc_lsa_QueryInfoPolicy(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("LSA_POLICY_INFO_DOMAIN failed - %s\n", nt_errstr(status)); return False; } *sid = r.out.info->domain.sid; return True; } static struct dom_sid *sid_add_auth(TALLOC_CTX *mem_ctx, const struct dom_sid *sid, uint32 sub_auth) { struct dom_sid *ret; ret = talloc_p(mem_ctx, struct dom_sid); if (!ret) { return NULL; } *ret = *sid; ret->sub_auths = talloc_array_p(mem_ctx, uint32, ret->num_auths+1); if (!ret->sub_auths) { return NULL; } memcpy(ret->sub_auths, sid->sub_auths, ret->num_auths * sizeof(sid->sub_auths[0])); ret->sub_auths[ret->num_auths] = sub_auth; ret->num_auths++; return ret; } static BOOL test_CreateAccount(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct lsa_CreateAccount r; struct dom_sid2 *domsid, *newsid; struct policy_handle acct_handle; if (!find_domain_sid(p, mem_ctx, handle, &domsid)) { return False; } newsid = sid_add_auth(mem_ctx, domsid, 0x1234abcd); if (!newsid) { printf("Failed to create newsid\n"); return False; } printf("Testing CreateAccount\n"); r.in.handle = handle; r.in.sid = newsid; r.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.acct_handle = &acct_handle; status = dcerpc_lsa_CreateAccount(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("CreateAccount failed - %s\n", nt_errstr(status)); return False; } if (!test_Delete(p, mem_ctx, &acct_handle)) { return False; } return True; } static BOOL test_CreateTrustedDomain(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct lsa_CreateTrustedDomain r; struct lsa_TrustInformation trustinfo; struct dom_sid *domsid; struct policy_handle dom_handle; printf("Testing CreateTrustedDomain\n"); if (!find_domain_sid(p, mem_ctx, handle, &domsid)) { return False; } domsid->sub_auths[domsid->num_auths-1] ^= 0xF0F0F0F0; trustinfo.sid = domsid; init_lsa_Name(&trustinfo.name, "torturedomain"); r.in.handle = handle; r.in.info = &trustinfo; r.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.dom_handle = &dom_handle; status = dcerpc_lsa_CreateTrustedDomain(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("CreateTrustedDomain failed - %s\n", nt_errstr(status)); return False; } if (!test_Delete(p, mem_ctx, &dom_handle)) { return False; } return True; } static BOOL test_CreateSecret(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct lsa_CreateSecret r; struct lsa_OpenSecret r2; struct policy_handle sec_handle, sec_handle2; struct lsa_Delete d; printf("Testing CreateSecret\n"); init_lsa_Name(&r.in.name, "torturesecret"); r.in.handle = handle; r.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.sec_handle = &sec_handle; status = dcerpc_lsa_CreateSecret(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("CreateSecret failed - %s\n", nt_errstr(status)); return False; } r2.in.handle = handle; r2.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; init_lsa_Name(&r2.in.name, "torturesecret"); r2.out.sec_handle = &sec_handle2; printf("Testing OpenSecret\n"); status = dcerpc_lsa_OpenSecret(p, mem_ctx, &r2); if (!NT_STATUS_IS_OK(status)) { printf("OpenSecret failed - %s\n", nt_errstr(status)); return False; } if (!test_Delete(p, mem_ctx, &sec_handle)) { return False; } d.in.handle = &sec_handle2; status = dcerpc_lsa_Delete(p, mem_ctx, &d); if (!NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) { printf("Second delete expected INVALID_HANDLE - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_EnumAccountRights(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *acct_handle, struct dom_sid *sid) { NTSTATUS status; struct lsa_EnumAccountRights r; struct lsa_RightSet rights; printf("Testing EnumAccountRights\n"); r.in.handle = acct_handle; r.in.sid = sid; r.out.rights = &rights; status = dcerpc_lsa_EnumAccountRights(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumAccountRights failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_QuerySecObj(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct policy_handle *acct_handle) { NTSTATUS status; struct lsa_QuerySecObj r; printf("Testing QuerySecObj\n"); r.in.handle = acct_handle; r.in.sec_info = 7; status = dcerpc_lsa_QuerySecObj(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("QuerySecObj failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_OpenAccount(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid *sid) { NTSTATUS status; struct lsa_OpenAccount r; struct policy_handle acct_handle; printf("Testing OpenAccount\n"); r.in.handle = handle; r.in.sid = sid; r.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.acct_handle = &acct_handle; status = dcerpc_lsa_OpenAccount(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("OpenAccount failed - %s\n", nt_errstr(status)); return False; } if (!test_EnumPrivsAccount(p, mem_ctx, handle, &acct_handle)) { return False; } if (!test_QuerySecObj(p, mem_ctx, handle, &acct_handle)) { return False; } return True; } static BOOL test_EnumAccounts(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct lsa_EnumAccounts r; struct lsa_SidArray sids1, sids2; uint32 resume_handle = 0; int i; printf("\ntesting EnumAccounts\n"); r.in.handle = handle; r.in.resume_handle = &resume_handle; r.in.num_entries = 100; r.out.resume_handle = &resume_handle; r.out.sids = &sids1; resume_handle = 0; status = dcerpc_lsa_EnumAccounts(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumAccounts failed - %s\n", nt_errstr(status)); return False; } if (!test_LookupSids(p, mem_ctx, handle, &sids1)) { return False; } printf("testing all accounts\n"); for (i=0;i