/* Unix SMB/CIFS implementation. test suite for samr rpc operations Copyright (C) Andrew Tridgell 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" /* this makes the debug code display the right thing */ static void init_samr_Name(struct samr_Name *name, const char *s) { name->name = s; name->name_len = strlen_m(s)*2; name->name_size = name->name_len; } static BOOL test_Close(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_Close r; r.in.handle = handle; r.out.handle = handle; status = dcerpc_samr_Close(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("Close handle failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_QuerySecurity(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_QuerySecurity r; r.in.handle = handle; r.in.sec_info = 7; status = dcerpc_samr_QuerySecurity(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("QuerySecurity failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_CreateUser(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_CreateUser r; struct samr_DeleteUser d; struct policy_handle acct_handle; uint32 rid; struct samr_Name name; init_samr_Name(&name, "samrtorturetest"); r.in.handle = handle; r.in.username = &name; r.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.acct_handle = &acct_handle; r.out.rid = &rid; printf("Testing CreateUser(%s)\n", r.in.username->name); status = dcerpc_samr_CreateUser(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status) && !NT_STATUS_EQUAL(status, NT_STATUS_USER_EXISTS)) { printf("CreateUser failed - %s\n", nt_errstr(status)); return False; } printf("Testing DeleteUser\n"); d.in.handle = &acct_handle; d.out.handle = &acct_handle; status = dcerpc_samr_DeleteUser(p, mem_ctx, &d); if (!NT_STATUS_IS_OK(status)) { printf("DeleteUser failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_QueryAliasInfo(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_QueryAliasInfo r; uint16 levels[] = {1, 2, 3}; int i; BOOL ret = True; for (i=0;icount;i++) { if (!test_OpenUser(p, mem_ctx, handle, r.out.sam->entries[i].idx)) { ret = False; } } return ret; } static BOOL test_EnumDomainGroups(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_EnumDomainGroups r; uint32 resume_handle=0; int i; BOOL ret = True; printf("Testing EnumDomainGroups\n"); r.in.handle = handle; r.in.resume_handle = &resume_handle; r.in.max_size = (uint32)-1; r.out.resume_handle = &resume_handle; status = dcerpc_samr_EnumDomainGroups(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumDomainGroups failed - %s\n", nt_errstr(status)); return False; } if (!r.out.sam) { return False; } for (i=0;icount;i++) { if (!test_OpenGroup(p, mem_ctx, handle, r.out.sam->entries[i].idx)) { ret = False; } } return ret; } static BOOL test_EnumDomainAliases(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_EnumDomainAliases r; uint32 resume_handle=0; int i; BOOL ret = True; printf("Testing EnumDomainAliases\n"); r.in.handle = handle; r.in.resume_handle = &resume_handle; r.in.max_size = (uint32)-1; r.out.resume_handle = &resume_handle; status = dcerpc_samr_EnumDomainAliases(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumDomainAliases failed - %s\n", nt_errstr(status)); return False; } if (!r.out.sam) { return False; } for (i=0;icount;i++) { if (!test_OpenAlias(p, mem_ctx, handle, r.out.sam->entries[i].idx)) { ret = False; } } return ret; } static BOOL test_QueryDomainInfo(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_QueryDomainInfo r; uint16 levels[] = {1, 2, 3, 4, 5, 6, 7, 8, 9, 11, 12, 13}; int i; BOOL ret = True; for (i=0;iname); r.in.handle = handle; r.in.domain = domain; status = dcerpc_samr_LookupDomain(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("LookupDomain failed - %s\n", nt_errstr(status)); return False; } if (!test_OpenDomain(p, mem_ctx, handle, r.out.sid)) { return False; } return True; } static BOOL test_EnumDomains(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_EnumDomains r; uint32 resume_handle = 0; uint32 num_entries=0; int i; BOOL ret = True; r.in.handle = handle; r.in.resume_handle = &resume_handle; r.in.buf_size = (uint32)-1; r.out.resume_handle = &resume_handle; r.out.num_entries = &num_entries; status = dcerpc_samr_EnumDomains(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumDomains failed - %s\n", nt_errstr(status)); return False; } if (!r.out.sam) { return False; } for (i=0;icount;i++) { if (!test_LookupDomain(p, mem_ctx, handle, &r.out.sam->entries[i].name)) { ret = False; } } return ret; } static BOOL test_Connect(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_Connect r; struct samr_Connect4 r4; r.in.system_name = 0; r.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.handle = handle; status = dcerpc_samr_Connect(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("Connect failed - %s\n", nt_errstr(status)); return False; } r4.in.system_name = ""; r4.in.unknown = 0; r4.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; r4.out.handle = handle; status = dcerpc_samr_Connect4(p, mem_ctx, &r4); if (!NT_STATUS_IS_OK(status)) { printf("Connect4 failed - %s\n", nt_errstr(status)); return False; } return True; } BOOL torture_rpc_samr(int dummy) { NTSTATUS status; struct dcerpc_pipe *p; TALLOC_CTX *mem_ctx; BOOL ret = True; struct policy_handle handle; mem_ctx = talloc_init("torture_rpc_samr"); status = torture_rpc_connection(&p, DCERPC_SAMR_NAME, DCERPC_SAMR_UUID, DCERPC_SAMR_VERSION); if (!NT_STATUS_IS_OK(status)) { return False; } p->flags |= DCERPC_DEBUG_PRINT_BOTH; if (!test_Connect(p, mem_ctx, &handle)) { ret = False; } if (!test_QuerySecurity(p, mem_ctx, &handle)) { ret = False; } if (!test_EnumDomains(p, mem_ctx, &handle)) { ret = False; } if (!test_Close(p, mem_ctx, &handle)) { ret = False; } torture_rpc_close(p); return ret; }