/*
Unix SMB / CIFS implementation .
test suite for samr rpc operations
Copyright ( C ) Andrew Tridgell 2003
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
static BOOL test_LookupDomain ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle , struct samr_Name * domain )
{
NTSTATUS status ;
struct samr_LookupDomain r ;
printf ( " Testing LookupDomain(%s) \n " , domain - > name ) ;
r . in . handle = handle ;
r . in . domain = domain ;
status = dcerpc_samr_LookupDomain ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " LookupDomain failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
NDR_PRINT_DEBUG ( dom_sid2 , r . out . sid ) ;
return True ;
}
static BOOL test_EnumDomains ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_EnumDomains r ;
uint32 resume_handle = 0 ;
uint32 num_entries = 0 ;
int i ;
r . in . handle = handle ;
r . in . resume_handle = & resume_handle ;
r . in . buf_size = ( uint32 ) - 1 ;
r . out . resume_handle = & resume_handle ;
r . out . num_entries = & num_entries ;
status = dcerpc_samr_EnumDomains ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " EnumDomains failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
NDR_PRINT_DEBUG ( samr_SamArray , r . out . sam ) ;
if ( r . out . sam ) {
for ( i = 0 ; i < r . out . sam - > count ; i + + ) {
test_LookupDomain ( p , mem_ctx , handle , & r . out . sam - > entries [ i ] . name ) ;
}
}
return True ;
}
static BOOL test_Connect ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_Connect r ;
struct samr_Connect4 r4 ;
r . in . system_name = 0 ;
r . in . access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED ;
r . out . handle = handle ;
status = dcerpc_samr_Connect ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " Connect failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
r4 . in . system_name = " win2003 " ;
r4 . in . unknown = 0 ;
r4 . in . access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED ;
r4 . out . handle = handle ;
status = dcerpc_samr_Connect4 ( p , mem_ctx , & r4 ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " Connect4 failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
return True ;
}
BOOL torture_rpc_samr ( int dummy )
{
NTSTATUS status ;
struct dcerpc_pipe * p ;
TALLOC_CTX * mem_ctx ;
BOOL ret = True ;
struct policy_handle handle ;
mem_ctx = talloc_init ( " torture_rpc_samr " ) ;
status = torture_rpc_connection ( & p , " samr " ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return False ;
}
if ( ! test_Connect ( p , mem_ctx , & handle ) ) {
ret = False ;
}
if ( ! test_EnumDomains ( p , mem_ctx , & handle ) ) {
ret = False ;
}
torture_rpc_close ( p ) ;
return ret ;
}