/* Unix SMB/CIFS implementation. test suite for lsa rpc operations Copyright (C) Andrew Tridgell 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" /* these really shouldn't be here .... */ static char *lsa_sid_string_talloc(TALLOC_CTX *mem_ctx, struct dom_sid *sid) { int i, ofs, maxlen; uint32 ia; char *ret; if (!sid) { return talloc_asprintf(mem_ctx, "(NULL SID)"); } maxlen = sid->num_auths * 11 + 25; ret = talloc(mem_ctx, maxlen); if (!ret) return NULL; ia = (sid->id_auth[5]) + (sid->id_auth[4] << 8 ) + (sid->id_auth[3] << 16) + (sid->id_auth[2] << 24); ofs = snprintf(ret, maxlen, "S-%u-%lu", (unsigned int)sid->sid_rev_num, (unsigned long)ia); for (i = 0; i < sid->num_auths; i++) { ofs += snprintf(ret + ofs, maxlen - ofs, "-%lu", (unsigned long)sid->sub_auths[i]); } return ret; } static int dom_sid_compare(struct dom_sid *sid1, struct dom_sid *sid2) { int i; if (sid1 == sid2) return 0; if (!sid1) return -1; if (!sid2) return 1; /* Compare most likely different rids, first: i.e start at end */ if (sid1->num_auths != sid2->num_auths) return sid1->num_auths - sid2->num_auths; for (i = sid1->num_auths-1; i >= 0; --i) if (sid1->sub_auths[i] != sid2->sub_auths[i]) return sid1->sub_auths[i] - sid2->sub_auths[i]; if (sid1->sid_rev_num != sid2->sid_rev_num) return sid1->sid_rev_num - sid2->sid_rev_num; for (i = 0; i < 6; i++) if (sid1->id_auth[i] != sid2->id_auth[i]) return sid1->id_auth[i] - sid2->id_auth[i]; return 0; } static BOOL test_OpenPolicy(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) { struct lsa_ObjectAttribute attr; struct policy_handle handle; struct lsa_QosInfo qos; struct lsa_OpenPolicy r; NTSTATUS status; uint16 system_name = '\\'; printf("\ntesting OpenPolicy\n"); qos.impersonation_level = 2; qos.context_mode = 1; qos.effective_only = 0; attr.root_dir = NULL; attr.object_name = NULL; attr.attributes = 0; attr.sec_desc = NULL; attr.sec_qos = &qos; r.in.system_name = &system_name; r.in.attr = &attr; r.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.handle = &handle; status = dcerpc_lsa_OpenPolicy(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("OpenPolicy failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_OpenPolicy2(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { struct lsa_ObjectAttribute attr; struct lsa_QosInfo qos; struct lsa_OpenPolicy2 r; NTSTATUS status; printf("\ntesting OpenPolicy2\n"); qos.impersonation_level = 2; qos.context_mode = 1; qos.effective_only = 0; attr.root_dir = NULL; attr.object_name = NULL; attr.attributes = 0; attr.sec_desc = NULL; attr.sec_qos = &qos; r.in.system_name = "\\"; r.in.attr = &attr; r.in.desired_access = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.handle = handle; status = dcerpc_lsa_OpenPolicy2(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("OpenPolicy2 failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_LookupNames(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_TransNameArray *tnames) { struct lsa_LookupNames r; struct lsa_TransSidArray sids; struct lsa_Name *names; uint32 count = 0; NTSTATUS status; int i; printf("\nTesting LookupNames\n"); sids.count = 0; sids.sids = NULL; names = talloc(mem_ctx, tnames->count * sizeof(names[0])); for (i=0;icount;i++) { names[i].name_len = 2*strlen(tnames->names[i].name.name); names[i].name_size = 2*strlen(tnames->names[i].name.name); names[i].name = tnames->names[i].name.name; } r.in.handle = handle; r.in.num_names = tnames->count; r.in.names = names; r.in.sids = &sids; r.in.level = 1; r.in.count = &count; r.out.count = &count; r.out.sids = &sids; status = dcerpc_lsa_LookupNames(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("LookupNames failed - %s\n", nt_errstr(status)); return False; } if (r.out.domains) { printf("lookup gave %d domains (max_count=%d)\n", r.out.domains->count, r.out.domains->max_count); for (i=0;icount;i++) { printf("name='%s' sid=%s\n", r.out.domains->domains[i].name.name, lsa_sid_string_talloc(mem_ctx, r.out.domains->domains[i].sid)); } } printf("lookup gave %d sids (sids.count=%d)\n", count, sids.count); for (i=0;inum_sids; NTSTATUS status; int i; printf("\nTesting LookupSids\n"); names.count = 0; names.names = NULL; r.in.handle = handle; r.in.sids = sids; r.in.names = &names; r.in.level = 1; r.in.count = &count; r.out.count = &count; r.out.names = &names; status = dcerpc_lsa_LookupSids(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("LookupSids failed - %s\n", nt_errstr(status)); return False; } if (r.out.domains) { printf("lookup gave %d domains (max_count=%d)\n", r.out.domains->count, r.out.domains->max_count); for (i=0;icount;i++) { printf("name='%s' sid=%s\n", r.out.domains->domains[i].name.name, lsa_sid_string_talloc(mem_ctx, r.out.domains->domains[i].sid)); } } printf("lookup gave %d names (names.count=%d)\n", count, names.count); for (i=0;icount, r.out.domains->max_count); for (i=0;icount;i++) { printf("name='%s' sid=%s\n", r.out.domains->domains[i].name.name, lsa_sid_string_talloc(mem_ctx, r.out.domains->domains[i].sid)); } } return True; } static BOOL test_Delete(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct lsa_Delete r; printf("\ntesting Delete - but what does it do?\n"); r.in.handle = handle; status = dcerpc_lsa_Delete(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("Delete failed - %s\n", nt_errstr(status)); return False; } printf("\n"); return True; } static BOOL test_Close(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct lsa_Close r; printf("\ntesting Close\n"); r.in.handle = handle; status = dcerpc_lsa_Close(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("Close failed - %s\n", nt_errstr(status)); return False; } status = dcerpc_lsa_Close(p, mem_ctx, &r); /* its really a fault - we need a status code for rpc fault */ if (!NT_STATUS_EQUAL(status, NT_STATUS_INVALID_LEVEL)) { printf("Close failed - %s\n", nt_errstr(status)); return False; } printf("\n"); return True; } BOOL torture_rpc_lsa(int dummy) { NTSTATUS status; struct dcerpc_pipe *p; TALLOC_CTX *mem_ctx; BOOL ret = True; struct policy_handle handle; mem_ctx = talloc_init("torture_rpc_lsa"); status = torture_rpc_connection(&p, "lsarpc"); if (!NT_STATUS_IS_OK(status)) { return False; } if (!test_OpenPolicy(p, mem_ctx)) { ret = False; } if (!test_OpenPolicy2(p, mem_ctx, &handle)) { ret = False; } if (!test_EnumAccounts(p, mem_ctx, &handle)) { ret = False; } if (!test_EnumPrivs(p, mem_ctx, &handle)) { ret = False; } if (!test_EnumTrustDom(p, mem_ctx, &handle)) { ret = False; } #if 0 if (!test_Delete(p, mem_ctx, &handle)) { ret = False; } #endif if (!test_Close(p, mem_ctx, &handle)) { ret = False; } torture_rpc_close(p); return ret; }