/* Unix SMB/CIFS implementation. test suite for samr rpc operations Copyright (C) Andrew Tridgell 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" #define TEST_USERNAME "samrtorturetest" static BOOL test_QueryUserInfo(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle); /* this makes the debug code display the right thing */ static void init_samr_Name(struct samr_Name *name, const char *s) { name->name_len = strlen_m(s)*2; name->name_size = name->name_len; if (name->name_len == 0) { name->name = NULL; } else { name->name = s; } } static BOOL test_Close(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_Close r; r.in.handle = handle; r.out.handle = handle; status = dcerpc_samr_Close(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("Close handle failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_QuerySecurity(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_QuerySecurity r; r.in.handle = handle; r.in.sec_info = 7; status = dcerpc_samr_QuerySecurity(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("QuerySecurity failed - %s\n", nt_errstr(status)); return False; } return True; } static BOOL test_SetUserInfo(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_SetUserInfo s; struct samr_QueryUserInfo q; struct samr_QueryUserInfo q0; union samr_UserInfo u; BOOL ret = True; s.in.handle = handle; s.in.info = &u; q.in.handle = handle; q.out.info = &u; q0 = q; #define TESTCALL(call, r) \ status = dcerpc_samr_ ##call(p, mem_ctx, &r); \ if (!NT_STATUS_IS_OK(status)) { \ printf(#call " level %u failed - %s (line %d)\n", \ r.in.level, nt_errstr(status), __LINE__); \ ret = False; \ break; \ } #define STRING_EQUAL(s1, s2, field) \ if ((s1 && !s2) || (s2 && !s1) || strcmp(s1, s2)) { \ printf("Failed to set %s to '%s' (line %d)\n", \ #field, s2, __LINE__); \ ret = False; \ break; \ } #define INT_EQUAL(i1, i2, field) \ if (i1 != i2) { \ printf("Failed to set %s to %u (line %d)\n", \ #field, i2, __LINE__); \ ret = False; \ break; \ } #define TEST_USERINFO_NAME(lvl1, field1, lvl2, field2, value) do { \ printf("field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \ q.in.level = lvl1; \ TESTCALL(QueryUserInfo, q) \ s.in.level = lvl1; \ u = *q.out.info; \ init_samr_Name(&u.info ## lvl1.field1, value); \ TESTCALL(SetUserInfo, s) \ init_samr_Name(&u.info ## lvl1.field1, ""); \ TESTCALL(QueryUserInfo, q); \ u = *q.out.info; \ STRING_EQUAL(u.info ## lvl1.field1.name, value, field1); \ q.in.level = lvl2; \ TESTCALL(QueryUserInfo, q) \ u = *q.out.info; \ STRING_EQUAL(u.info ## lvl2.field2.name, value, field2); \ } while (0) #define TEST_USERINFO_INT(lvl1, field1, lvl2, field2, value) do { \ printf("field test %d/%s vs %d/%s\n", lvl1, #field1, lvl2, #field2); \ q.in.level = lvl1; \ TESTCALL(QueryUserInfo, q) \ s.in.level = lvl1; \ u = *q.out.info; \ u.info ## lvl1.field1 = value; \ TESTCALL(SetUserInfo, s) \ u.info ## lvl1.field1 = 0; \ TESTCALL(QueryUserInfo, q); \ u = *q.out.info; \ INT_EQUAL(u.info ## lvl1.field1, value, field1); \ q.in.level = lvl2; \ TESTCALL(QueryUserInfo, q) \ u = *q.out.info; \ INT_EQUAL(u.info ## lvl2.field2, value, field1); \ } while (0) q0.in.level = 12; do { TESTCALL(QueryUserInfo, q0) } while (0); TEST_USERINFO_NAME(2, comment, 1, comment, "xx2-1 comment"); TEST_USERINFO_NAME(2, comment, 21, comment, "xx2-21 comment"); TEST_USERINFO_NAME(6, full_name, 1, full_name, "xx6-1 full_name"); TEST_USERINFO_NAME(6, full_name, 3, full_name, "xx6-3 full_name"); TEST_USERINFO_NAME(6, full_name, 5, full_name, "xx6-5 full_name"); TEST_USERINFO_NAME(6, full_name, 6, full_name, "xx6-6 full_name"); TEST_USERINFO_NAME(6, full_name, 8, full_name, "xx6-8 full_name"); TEST_USERINFO_NAME(6, full_name, 21, full_name, "xx6-21 full_name"); TEST_USERINFO_NAME(8, full_name, 21, full_name, "xx7-21 full_name"); TEST_USERINFO_NAME(11, logon_script, 3, logon_script, "xx11-3 logon_script"); TEST_USERINFO_NAME(11, logon_script, 5, logon_script, "xx11-5 logon_script"); TEST_USERINFO_NAME(11, logon_script, 21, logon_script, "xx11-21 logon_script"); TEST_USERINFO_NAME(12, profile, 3, profile, "xx12-3 profile"); TEST_USERINFO_NAME(12, profile, 5, profile, "xx12-5 profile"); TEST_USERINFO_NAME(12, profile, 21, profile, "xx12-21 profile"); TEST_USERINFO_NAME(13, description, 1, description, "xx13-1 description"); TEST_USERINFO_NAME(13, description, 5, description, "xx13-5 description"); TEST_USERINFO_NAME(13, description, 21, description, "xx13-21 description"); TEST_USERINFO_NAME(14, workstations, 3, workstations, "testworkstation3"); TEST_USERINFO_NAME(14, workstations, 5, workstations, "testworkstation5"); TEST_USERINFO_NAME(14, workstations, 21, workstations, "testworkstation21"); TEST_USERINFO_NAME(20, callback, 21, callback, "xx20-21 callback"); TEST_USERINFO_INT(2, country_code, 21, country_code, __LINE__); TEST_USERINFO_INT(2, code_page, 21, code_page, __LINE__); TEST_USERINFO_INT(4, logon_hours[3], 3, logon_hours[3], __LINE__); TEST_USERINFO_INT(4, logon_hours[3], 5, logon_hours[3], __LINE__); TEST_USERINFO_INT(4, logon_hours[3], 21, logon_hours[3], __LINE__); TEST_USERINFO_INT(9, primary_gid, 1, primary_gid, 513); TEST_USERINFO_INT(9, primary_gid, 3, primary_gid, 513); TEST_USERINFO_INT(9, primary_gid, 5, primary_gid, 513); TEST_USERINFO_INT(9, primary_gid, 21, primary_gid, 513); return ret; } static BOOL test_GetUserPwInfo(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_GetUserPwInfo r; BOOL ret = True; printf("Testing GetUserPwInfo\n"); r.in.handle = handle; status = dcerpc_samr_GetUserPwInfo(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("GetUserPwInfo failed - %s\n", nt_errstr(status)); ret = False; } return ret; } static BOOL test_user_ops(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { BOOL ret = True; if (!test_QuerySecurity(p, mem_ctx, handle)) { ret = False; } if (!test_QueryUserInfo(p, mem_ctx, handle)) { ret = False; } if (!test_SetUserInfo(p, mem_ctx, handle)) { ret = False; } if (!test_GetUserPwInfo(p, mem_ctx, handle)) { ret = False; } return ret; } static BOOL test_DeleteUser_byname(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, const char *name) { NTSTATUS status; struct samr_LookupNames n; struct samr_OpenUser r; struct samr_DeleteUser d; struct policy_handle acct_handle; struct samr_Name sname; init_samr_Name(&sname, name); n.in.handle = handle; n.in.num_names = 1; n.in.names = &sname; status = dcerpc_samr_LookupNames(p, mem_ctx, &n); if (!NT_STATUS_IS_OK(status)) { goto failed; } r.in.handle = handle; r.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; r.in.rid = n.out.rids.ids[0]; r.out.acct_handle = &acct_handle; status = dcerpc_samr_OpenUser(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { goto failed; } d.in.handle = &acct_handle; d.out.handle = &acct_handle; status = dcerpc_samr_DeleteUser(p, mem_ctx, &d); if (!NT_STATUS_IS_OK(status)) { goto failed; } return True; failed: printf("DeleteUser_byname(%s) failed - %s\n", name, nt_errstr(status)); return False; } static BOOL test_CreateUser(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_CreateUser r; struct samr_DeleteUser d; struct policy_handle acct_handle; uint32 rid; struct samr_Name name; BOOL ret = True; init_samr_Name(&name, TEST_USERNAME); r.in.handle = handle; r.in.username = &name; r.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.acct_handle = &acct_handle; r.out.rid = &rid; printf("Testing CreateUser(%s)\n", r.in.username->name); status = dcerpc_samr_CreateUser(p, mem_ctx, &r); if (NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) { printf("Server refused create of '%s'\n", r.in.username->name); return True; } if (NT_STATUS_EQUAL(status, NT_STATUS_USER_EXISTS)) { if (!test_DeleteUser_byname(p, mem_ctx, handle, r.in.username->name)) { return False; } status = dcerpc_samr_CreateUser(p, mem_ctx, &r); } if (!NT_STATUS_IS_OK(status)) { printf("CreateUser failed - %s\n", nt_errstr(status)); return False; } if (!test_user_ops(p, mem_ctx, &acct_handle)) { ret = False; } printf("Testing DeleteUser\n"); d.in.handle = &acct_handle; d.out.handle = &acct_handle; status = dcerpc_samr_DeleteUser(p, mem_ctx, &d); if (!NT_STATUS_IS_OK(status)) { printf("DeleteUser failed - %s\n", nt_errstr(status)); ret = False; } return ret; } static BOOL test_QueryAliasInfo(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_QueryAliasInfo r; uint16 levels[] = {1, 2, 3}; int i; BOOL ret = True; for (i=0;icount == 0) { return True; } for (i=0;icount;i++) { if (!test_OpenUser(p, mem_ctx, handle, r.out.sam->entries[i].idx)) { ret = False; } } printf("Testing LookupNames\n"); n.in.handle = handle; n.in.num_names = r.out.sam->count; n.in.names = talloc(mem_ctx, r.out.sam->count * sizeof(struct samr_Name)); for (i=0;icount;i++) { n.in.names[i] = r.out.sam->entries[i].name; } status = dcerpc_samr_LookupNames(p, mem_ctx, &n); if (!NT_STATUS_IS_OK(status)) { printf("LookupNames failed - %s\n", nt_errstr(status)); ret = False; } printf("Testing LookupRids\n"); lr.in.handle = handle; lr.in.num_rids = r.out.sam->count; lr.in.rids = talloc(mem_ctx, r.out.sam->count * sizeof(uint32)); for (i=0;icount;i++) { lr.in.rids[i] = r.out.sam->entries[i].idx; } status = dcerpc_samr_LookupRids(p, mem_ctx, &lr); if (!NT_STATUS_IS_OK(status)) { printf("LookupRids failed - %s\n", nt_errstr(status)); ret = False; } return ret; } static BOOL test_EnumDomainGroups(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_EnumDomainGroups r; uint32 resume_handle=0; int i; BOOL ret = True; printf("Testing EnumDomainGroups\n"); r.in.handle = handle; r.in.resume_handle = &resume_handle; r.in.max_size = (uint32)-1; r.out.resume_handle = &resume_handle; status = dcerpc_samr_EnumDomainGroups(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumDomainGroups failed - %s\n", nt_errstr(status)); return False; } if (!r.out.sam) { return False; } for (i=0;icount;i++) { if (!test_OpenGroup(p, mem_ctx, handle, r.out.sam->entries[i].idx)) { ret = False; } } return ret; } static BOOL test_EnumDomainAliases(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_EnumDomainAliases r; uint32 resume_handle=0; int i; BOOL ret = True; printf("Testing EnumDomainAliases\n"); r.in.handle = handle; r.in.resume_handle = &resume_handle; r.in.max_size = (uint32)-1; r.out.resume_handle = &resume_handle; status = dcerpc_samr_EnumDomainAliases(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumDomainAliases failed - %s\n", nt_errstr(status)); return False; } if (!r.out.sam) { return False; } for (i=0;icount;i++) { if (!test_OpenAlias(p, mem_ctx, handle, r.out.sam->entries[i].idx)) { ret = False; } } return ret; } static BOOL test_QueryDisplayInfo(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_QueryDisplayInfo r; BOOL ret = True; uint16 levels[] = {1, 2, 3, 4, 5}; int i; for (i=0;iname); r.in.handle = handle; r.in.domain = domain; status = dcerpc_samr_LookupDomain(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("LookupDomain failed - %s\n", nt_errstr(status)); return False; } if (!test_OpenDomain(p, mem_ctx, handle, r.out.sid)) { return False; } return True; } static BOOL test_EnumDomains(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_EnumDomains r; uint32 resume_handle = 0; int i; BOOL ret = True; r.in.handle = handle; r.in.resume_handle = &resume_handle; r.in.buf_size = (uint32)-1; r.out.resume_handle = &resume_handle; status = dcerpc_samr_EnumDomains(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("EnumDomains failed - %s\n", nt_errstr(status)); return False; } if (!r.out.sam) { return False; } for (i=0;icount;i++) { if (!test_LookupDomain(p, mem_ctx, handle, &r.out.sam->entries[i].name)) { ret = False; } } return ret; } static BOOL test_Connect(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { NTSTATUS status; struct samr_Connect r; struct samr_Connect2 r2; struct samr_Connect4 r4; BOOL ret = True; r.in.system_name = 0; r.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; r.out.handle = handle; status = dcerpc_samr_Connect(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { printf("Connect failed - %s\n", nt_errstr(status)); ret = False; } r2.in.system_name = ""; r2.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; r2.out.handle = handle; status = dcerpc_samr_Connect2(p, mem_ctx, &r2); if (!NT_STATUS_IS_OK(status)) { printf("Connect2 failed - %s\n", nt_errstr(status)); ret = False; } r4.in.system_name = ""; r4.in.unknown = 0; r4.in.access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; r4.out.handle = handle; status = dcerpc_samr_Connect4(p, mem_ctx, &r4); if (!NT_STATUS_IS_OK(status)) { printf("Connect4 failed - %s\n", nt_errstr(status)); ret = False; } return ret; } BOOL torture_rpc_samr(int dummy) { NTSTATUS status; struct dcerpc_pipe *p; TALLOC_CTX *mem_ctx; BOOL ret = True; struct policy_handle handle; mem_ctx = talloc_init("torture_rpc_samr"); status = torture_rpc_connection(&p, DCERPC_SAMR_NAME, DCERPC_SAMR_UUID, DCERPC_SAMR_VERSION); if (!NT_STATUS_IS_OK(status)) { return False; } p->flags |= DCERPC_DEBUG_PRINT_BOTH; if (!test_Connect(p, mem_ctx, &handle)) { ret = False; } if (!test_QuerySecurity(p, mem_ctx, &handle)) { ret = False; } if (!test_EnumDomains(p, mem_ctx, &handle)) { ret = False; } if (!test_Close(p, mem_ctx, &handle)) { ret = False; } talloc_destroy(mem_ctx); torture_rpc_close(p); return ret; }