/* Unix SMB/CIFS implementation. test suite for samr rpc operations Copyright (C) Andrew Tridgell 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" static BOOL test_LookupDomain(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct samr_Name *domain) { NTSTATUS status; struct samr_LookupDomain r; printf("Testing LookupDomain(%s)\n", domain->name); r.in.handle = handle; r.in.domain = domain; status = dcerpc_samr_LookupDomain(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("LookupDomain failed - %s\n", nt_errstr(status)); return False; } NDR_PRINT_DEBUG(dom_sid2, r.out.sid); return True; } static BOOL test_EnumDomains(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_EnumDomains r; uint32 resume_handle = 0; uint32 num_entries=0; int i; r.in.handle = handle; r.in.resume_handle = &resume_handle; r.in.buf_size = (uint32)-1; r.out.resume_handle = &resume_handle; r.out.num_entries = &num_entries; status = dcerpc_samr_EnumDomains(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumDomains failed - %s\n", nt_errstr(status)); return False; } NDR_PRINT_DEBUG(samr_SamArray, r.out.sam); if (r.out.sam) { for (i=0;icount;i++) { test_LookupDomain(p, mem_ctx, handle, &r.out.sam->entries[i].name); } } return True; } static BOOL test_Connect(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_Connect r; struct samr_Connect4 r4; r.in.system_name = 0; r.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.handle = handle; status = dcerpc_samr_Connect(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("Connect failed - %s\n", nt_errstr(status)); return False; } r4.in.system_name = "win2003"; r4.in.unknown = 0; r4.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; r4.out.handle = handle; status = dcerpc_samr_Connect4(p, mem_ctx, &r4); if (!NT_STATUS_IS_OK(status)) { printf("Connect4 failed - %s\n", nt_errstr(status)); return False; } return True; } BOOL torture_rpc_samr(int dummy) { NTSTATUS status; struct dcerpc_pipe *p; TALLOC_CTX *mem_ctx; BOOL ret = True; struct policy_handle handle; mem_ctx = talloc_init("torture_rpc_samr"); status = torture_rpc_connection(&p, "samr"); if (!NT_STATUS_IS_OK(status)) { return False; } if (!test_Connect(p, mem_ctx, &handle)) { ret = False; } if (!test_EnumDomains(p, mem_ctx, &handle)) { ret = False; } torture_rpc_close(p); return ret; }