/* Unix SMB/CIFS implementation. test suite for srvsvc rpc operations Copyright (C) Stefan (metze) Metzmacher 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" #include "torture/torture.h" #include "librpc/gen_ndr/ndr_srvsvc.h" #include "librpc/gen_ndr/ndr_srvsvc_c.h" #include "torture/rpc/rpc.h" /**************************/ /* srvsvc_NetCharDev */ /**************************/ static BOOL test_NetCharDevGetInfo(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, const char *devname) { NTSTATUS status; struct srvsvc_NetCharDevGetInfo r; uint32_t levels[] = {0, 1}; int i; BOOL ret = True; r.in.server_unc = talloc_asprintf(mem_ctx,"\\\\%s",dcerpc_server_name(p)); r.in.device_name = devname; for (i=0;icount = 0; r.in.ctr.ctr0->array = NULL; r.in.max_buffer = (uint32_t)-1; r.in.resume_handle = NULL; for (i=0;icount;j++) { const char *device; device = r.out.ctr.ctr1->array[j].device; if (!test_NetCharDevGetInfo(p, mem_ctx, device)) { ret = False; } if (!test_NetCharDevControl(p, mem_ctx, device)) { ret = False; } } } } return ret; } /**************************/ /* srvsvc_NetCharDevQ */ /**************************/ static BOOL test_NetCharDevQGetInfo(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, const char *devicequeue) { NTSTATUS status; struct srvsvc_NetCharDevQGetInfo r; uint32_t levels[] = {0, 1}; int i; BOOL ret = True; r.in.server_unc = talloc_asprintf(mem_ctx,"\\\\%s",dcerpc_server_name(p)); r.in.queue_name = devicequeue; r.in.user = talloc_asprintf(mem_ctx,"Administrator"); for (i=0;idevice = r.in.queue_name; break; case 1: r.in.info.info1 = talloc(mem_ctx, struct srvsvc_NetCharDevQInfo1); r.in.info.info1->device = r.in.queue_name; r.in.info.info1->priority = 0x000; r.in.info.info1->devices = r.in.queue_name; r.in.info.info1->users = 0x000; r.in.info.info1->num_ahead = 0x000; break; default: break; } r.in.parm_error = &parm_error; status = dcerpc_srvsvc_NetCharDevQSetInfo(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { d_printf("NetCharDevQSetInfo level %u on devicequeue '%s' failed - %s\n", r.in.level, r.in.queue_name, nt_errstr(status)); ret = False; continue; } if (!W_ERROR_IS_OK(r.out.result)) { d_printf("NetCharDevQSetInfo level %u on devicequeue '%s' failed - %s\n", r.in.level, r.in.queue_name, win_errstr(r.out.result)); continue; } } return ret; } #endif static BOOL test_NetCharDevQEnum(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) { NTSTATUS status; struct srvsvc_NetCharDevQEnum r; struct srvsvc_NetCharDevQCtr0 c0; uint32_t levels[] = {0, 1}; int i; BOOL ret = True; r.in.server_unc = talloc_asprintf(mem_ctx,"\\\\%s",dcerpc_server_name(p)); r.in.user = talloc_asprintf(mem_ctx,"%s","Administrator"); r.in.ctr.ctr0 = &c0; r.in.ctr.ctr0->count = 0; r.in.ctr.ctr0->array = NULL; r.in.max_buffer = (uint32_t)-1; r.in.resume_handle = NULL; for (i=0;icount;j++) { const char *device; device = r.out.ctr.ctr1->array[j].device; if (!test_NetCharDevQGetInfo(p, mem_ctx, device)) { ret = False; } } } } return ret; } /**************************/ /* srvsvc_NetConn */ /**************************/ static BOOL test_NetConnEnum(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) { NTSTATUS status; struct srvsvc_NetConnEnum r; struct srvsvc_NetConnCtr0 c0; uint32_t levels[] = {0, 1}; int i; BOOL ret = True; r.in.server_unc = talloc_asprintf(mem_ctx,"\\\\%s",dcerpc_server_name(p)); r.in.path = talloc_asprintf(mem_ctx,"%s","ADMIN$"); r.in.ctr.ctr0 = &c0; r.in.ctr.ctr0->count = 0; r.in.ctr.ctr0->array = NULL; r.in.max_buffer = (uint32_t)-1; r.in.resume_handle = NULL; for (i=0;icount = 0; r.in.ctr.ctr3->array = NULL; r.in.max_buffer = (uint32_t)4096; r.in.resume_handle = NULL; for (i=0;icount = 0; r.in.ctr.ctr0->array = NULL; r.in.max_buffer = (uint32_t)-1; r.in.resume_handle = NULL; for (i=0;ipath) continue; if (!test_NetShareCheck(p, mem_ctx, r.out.info.info2->path)) { ret = False; } } return ret; } static BOOL test_NetShareAddSetDel(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx) { NTSTATUS status; struct srvsvc_NetShareAdd a; struct srvsvc_NetShareSetInfo r; struct srvsvc_NetShareGetInfo q; struct srvsvc_NetShareDel d; struct { uint32_t level; WERROR expected; } levels[] = { { 0, WERR_UNKNOWN_LEVEL }, { 1, WERR_OK }, { 2, WERR_OK }, { 501, WERR_UNKNOWN_LEVEL }, { 502, WERR_OK }, { 1004, WERR_OK }, { 1005, WERR_OK }, { 1006, WERR_OK }, /* { 1007, WERR_OK }, */ { 1501, WERR_OK }, }; int i; BOOL ret = True; a.in.server_unc = r.in.server_unc = q.in.server_unc = d.in.server_unc = talloc_asprintf(mem_ctx, "\\\\%s", dcerpc_server_name(p)); r.in.share_name = talloc_strdup(mem_ctx, "testshare"); a.in.level = 2; a.in.info.info2 = talloc(mem_ctx, struct srvsvc_NetShareInfo2); a.in.info.info2->name = r.in.share_name; a.in.info.info2->type = STYPE_DISKTREE; a.in.info.info2->comment = talloc_strdup(mem_ctx, "test comment"); a.in.info.info2->permissions = 123434566; a.in.info.info2->max_users = -1; a.in.info.info2->current_users = 0; a.in.info.info2->path = talloc_strdup(mem_ctx, "C:\\"); a.in.info.info2->password = NULL; a.in.parm_error = NULL; status = dcerpc_srvsvc_NetShareAdd(p, mem_ctx, &a); if (!NT_STATUS_IS_OK(status)) { d_printf("NetShareAdd level 2 on share 'testshare' failed - %s\n", nt_errstr(status)); return False; } else if (!W_ERROR_EQUAL(a.out.result, WERR_OK)) { d_printf("NetShareAdd level 2 on share 'testshare' failed - %s\n", win_errstr(a.out.result)); return False; } r.in.parm_error = NULL; q.in.level = 502; for (i = 0; i < ARRAY_SIZE(levels); i++) { r.in.level = levels[i].level; ZERO_STRUCT(r.out); d_printf("testing NetShareSetInfo level %u on share '%s'\n", r.in.level, r.in.share_name); switch (levels[i].level) { case 0: r.in.info.info0 = talloc(mem_ctx, struct srvsvc_NetShareInfo0); r.in.info.info0->name = r.in.share_name; break; case 1: r.in.info.info1 = talloc(mem_ctx, struct srvsvc_NetShareInfo1); r.in.info.info1->name = r.in.share_name; r.in.info.info1->type = STYPE_DISKTREE; r.in.info.info1->comment = talloc_strdup(mem_ctx, "test comment 1"); break; case 2: r.in.info.info2 = talloc(mem_ctx, struct srvsvc_NetShareInfo2); r.in.info.info2->name = r.in.share_name; r.in.info.info2->type = STYPE_DISKTREE; r.in.info.info2->comment = talloc_strdup(mem_ctx, "test comment 2"); r.in.info.info2->permissions = 0; r.in.info.info2->max_users = 2; r.in.info.info2->current_users = 1; r.in.info.info2->path = talloc_strdup(mem_ctx, "::BLaH::"); /* "C:\\"); */ r.in.info.info2->password = NULL; break; case 501: r.in.info.info501 = talloc(mem_ctx, struct srvsvc_NetShareInfo501); r.in.info.info501->name = r.in.share_name; r.in.info.info501->type = STYPE_DISKTREE; r.in.info.info501->comment = talloc_strdup(mem_ctx, "test comment 501"); r.in.info.info501->csc_policy = 0; break; case 502: r.in.info.info502 = talloc(mem_ctx, struct srvsvc_NetShareInfo502); r.in.info.info502->name = r.in.share_name; r.in.info.info502->type = STYPE_DISKTREE; r.in.info.info502->comment = talloc_strdup(mem_ctx, "test comment 502"); r.in.info.info502->permissions = 0; r.in.info.info502->max_users = 502; r.in.info.info502->current_users = 1; r.in.info.info502->path = talloc_strdup(mem_ctx, "C:\\"); r.in.info.info502->password = NULL; r.in.info.info502->unknown = 0; r.in.info.info502->sd = NULL; break; case 1004: r.in.info.info1004 = talloc(mem_ctx, struct srvsvc_NetShareInfo1004); r.in.info.info1004->comment = talloc_strdup(mem_ctx, "test comment 1004"); break; case 1005: r.in.info.info1005 = talloc(mem_ctx, struct srvsvc_NetShareInfo1005); r.in.info.info1005->dfs_flags = 0; break; case 1006: r.in.info.info1006 = talloc(mem_ctx, struct srvsvc_NetShareInfo1006); r.in.info.info1006->max_users = 1006; break; /* case 1007: r.in.info.info1007 = talloc(mem_ctx, struct srvsvc_NetShareInfo1007); r.in.info.info1007->flags = 0; r.in.info.info1007->alternate_directory_name = talloc_strdup(mem_ctx, "test"); break; */ case 1501: r.in.info.info1501 = talloc_zero(mem_ctx, struct sec_desc_buf); break; } status = dcerpc_srvsvc_NetShareSetInfo(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { d_printf("NetShareGetInfo level %u on share '%s' failed - %s\n", r.in.level, r.in.share_name, nt_errstr(status)); ret = False; continue; } else if (!W_ERROR_EQUAL(r.out.result, levels[i].expected)) { d_printf("NetShareSetInfo level %u on share '%s' failed - %s (expected %s)\n", r.in.level, r.in.share_name, win_errstr(r.out.result), win_errstr(levels[i].expected)); ret = False; continue; } q.in.share_name = r.in.share_name; status = dcerpc_srvsvc_NetShareGetInfo(p, mem_ctx, &q); if (!NT_STATUS_IS_OK(status)) { d_printf("NetShareGetInfo level %u on share '%s' failed - %s\n", q.in.level, q.in.share_name, nt_errstr(status)); ret = False; continue; } else if (!W_ERROR_EQUAL(q.out.result, WERR_OK)) { d_printf("NetShareGetInfo level %u on share '%s' failed - %s\n", q.in.level, q.in.share_name, win_errstr(q.out.result)); ret = False; continue; } if (strcmp(q.out.info.info502->name, r.in.share_name) != 0) { ret = False; } switch (levels[i].level) { case 0: break; case 1: if (strcmp(q.out.info.info502->comment, "test comment 1") != 0) ret = False; break; case 2: if (strcmp(q.out.info.info502->comment, "test comment 2") != 0) ret = False; if (q.out.info.info2->max_users != 2) ret = False; if (strcmp(q.out.info.info2->path, "C:\\") != 0) ret = False; break; case 501: if (strcmp(q.out.info.info501->comment, "test comment 501") != 0) ret = False; break; case 502: if (strcmp(q.out.info.info502->comment, "test comment 502") != 0) ret = False; if (q.out.info.info2->max_users != 502) ret = False; if (strcmp(q.out.info.info2->path, "C:\\") != 0) ret = False; break; case 1004: if (strcmp(q.out.info.info502->comment, "test comment 1004") != 0) ret = False; break; case 1005: break; case 1006: if (q.out.info.info2->max_users != 1006) ret = False; break; /* case 1007: break; */ case 1501: break; } } d.in.share_name = r.in.share_name; d.in.reserved = 0; status = dcerpc_srvsvc_NetShareDel(p, mem_ctx, &d); if (!NT_STATUS_IS_OK(status)) { d_printf("NetShareDel on share 'testshare502' failed - %s\n", nt_errstr(status)); ret = False; } else if (!W_ERROR_EQUAL(a.out.result, WERR_OK)) { d_printf("NetShareDel on share 'testshare502' failed - %s\n", win_errstr(d.out.result)); ret = False; } return ret; } /**************************/ /* srvsvc_NetShare */ /**************************/ static BOOL test_NetShareEnumAll(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, BOOL admin) { NTSTATUS status; struct srvsvc_NetShareEnumAll r; struct srvsvc_NetShareCtr0 c0; struct { uint32_t level; WERROR anon_status; WERROR admin_status; } levels[] = { { 0, WERR_OK, WERR_OK }, { 1, WERR_OK, WERR_OK }, { 2, WERR_ACCESS_DENIED, WERR_OK }, { 501, WERR_ACCESS_DENIED, WERR_OK }, { 502, WERR_ACCESS_DENIED, WERR_OK }, }; int i; BOOL ret = True; uint32_t resume_handle; ZERO_STRUCT(c0); r.in.server_unc = talloc_asprintf(mem_ctx,"\\\\%s",dcerpc_server_name(p)); r.in.ctr.ctr0 = &c0; r.in.max_buffer = (uint32_t)-1; r.in.resume_handle = &resume_handle; r.out.resume_handle = &resume_handle; for (i=0;icount;j++) { const char *name; name = r.out.ctr.ctr2->array[j].name; if (!test_NetShareGetInfo(p, mem_ctx, name, admin)) { ret = False; } } } } return ret; } static BOOL test_NetShareEnum(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, BOOL admin) { NTSTATUS status; struct srvsvc_NetShareEnum r; struct srvsvc_NetShareCtr0 c0; struct { uint32_t level; WERROR anon_status; WERROR admin_status; } levels[] = { { 0, WERR_OK, WERR_OK }, { 1, WERR_OK, WERR_OK }, { 2, WERR_ACCESS_DENIED, WERR_OK }, { 501, WERR_UNKNOWN_LEVEL, WERR_UNKNOWN_LEVEL }, { 502, WERR_ACCESS_DENIED, WERR_OK }, }; int i; BOOL ret = True; r.in.server_unc = talloc_asprintf(mem_ctx,"\\\\%s",dcerpc_server_name(p)); r.in.ctr.ctr0 = &c0; r.in.ctr.ctr0->count = 0; r.in.ctr.ctr0->array = NULL; r.in.max_buffer = (uint32_t)-1; r.in.resume_handle = NULL; for (i=0;icount = 0; r.in.transports.ctr0->array = NULL; r.in.max_buffer = (uint32_t)-1; r.in.resume_handle = NULL; for (i=0;i= max) break; /* found it */ max = n; n -= (max - min)/2; continue; } } talloc_free(r.in.name); d_printf("Maximum length for type %2d, flags %08x: %d\n", i, r.in.flags, max); /* find invalid chars for this type check only ASCII between 0x20 and 0x7e */ invalidc = talloc_strdup(mem_ctx, ""); for (n = 0x20; n < 0x7e; n++) { r.in.name = talloc_asprintf(mem_ctx, "%c", (char)n); status = dcerpc_srvsvc_NetNameValidate(p, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { d_printf("NetNameValidate failed while checking valid chars (%s)\n", nt_errstr(status)); break; } if (!W_ERROR_IS_OK(r.out.result)) { invalidc = talloc_asprintf_append(invalidc, "%c", (char)n); } talloc_free(r.in.name); } d_printf(" Invalid chars for type %2d, flags %08x: \"%s\"\n", i, r.in.flags, invalidc); /* only two values are accepted for flags: 0x0 and 0x80000000 */ if (r.in.flags == 0x0) { r.in.flags = 0x80000000; goto again; } r.in.flags = 0x0; } return True; } BOOL torture_rpc_srvsvc(struct torture_context *torture) { NTSTATUS status; struct dcerpc_pipe *p; TALLOC_CTX *mem_ctx; BOOL ret = True; const char *binding = torture_setting_string(torture, "binding", NULL); struct cli_credentials *anon_credentials; mem_ctx = talloc_init("torture_rpc_srvsvc"); status = torture_rpc_connection(mem_ctx, &p, &dcerpc_table_srvsvc); if (!NT_STATUS_IS_OK(status)) { talloc_free(mem_ctx); return False; } ret &= test_NetCharDevEnum(p, mem_ctx); ret &= test_NetCharDevQEnum(p, mem_ctx); ret &= test_NetConnEnum(p, mem_ctx); ret &= test_NetFileEnum(p, mem_ctx); ret &= test_NetSessEnum(p, mem_ctx); ret &= test_NetShareEnumAll(p, mem_ctx, True); ret &= test_NetSrvGetInfo(p, mem_ctx); ret &= test_NetDiskEnum(p, mem_ctx); ret &= test_NetTransportEnum(p, mem_ctx); ret &= test_NetRemoteTOD(p, mem_ctx); ret &= test_NetShareEnum(p, mem_ctx, True); ret &= test_NetShareGetInfo(p, mem_ctx, "ADMIN$", True); /* ret &= test_NetShareAddSetDel(p, mem_ctx); */ ret &= test_NetNameValidate(p, mem_ctx); status = torture_rpc_connection(mem_ctx, &p, &dcerpc_table_srvsvc); if (!binding) { d_printf("You must specify a ncacn binding string\n"); return False; } anon_credentials = cli_credentials_init(mem_ctx); cli_credentials_set_conf(anon_credentials); cli_credentials_set_anonymous(anon_credentials); status = dcerpc_pipe_connect(mem_ctx, &p, binding, &dcerpc_table_srvsvc, anon_credentials, NULL); if (!NT_STATUS_IS_OK(status)) { talloc_free(mem_ctx); return False; } ret &= test_NetShareEnumAll(p, mem_ctx, False); ret &= test_NetShareEnum(p, mem_ctx, False); ret &= test_NetShareGetInfo(p, mem_ctx, "ADMIN$", False); talloc_free(mem_ctx); return ret; }