0001-01-01 02:30:17 +02:30
/*
Unix SMB / CIFS implementation .
test suite for samr rpc operations
Copyright ( C ) Andrew Tridgell 2003
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
0001-01-01 02:30:17 +02:30
# define TEST_USERNAME "samrtorturetest"
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
static BOOL test_QueryUserInfo ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle ) ;
0001-01-01 02:30:17 +02:30
/*
this makes the debug code display the right thing
*/
static void init_samr_Name ( struct samr_Name * name , const char * s )
{
name - > name_len = strlen_m ( s ) * 2 ;
name - > name_size = name - > name_len ;
0001-01-01 02:30:17 +02:30
if ( name - > name_len = = 0 ) {
name - > name = NULL ;
} else {
name - > name = s ;
}
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
static BOOL test_Close ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_Close r ;
r . in . handle = handle ;
r . out . handle = handle ;
status = dcerpc_samr_Close ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " Close handle failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
return True ;
}
0001-01-01 02:30:17 +02:30
static BOOL test_QuerySecurity ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_QuerySecurity r ;
r . in . handle = handle ;
r . in . sec_info = 7 ;
status = dcerpc_samr_QuerySecurity ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " QuerySecurity failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
return True ;
}
0001-01-01 02:30:17 +02:30
static BOOL test_SetUserInfo ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
0001-01-01 02:30:17 +02:30
struct samr_SetUserInfo s ;
struct samr_QueryUserInfo q ;
0001-01-01 02:30:17 +02:30
struct samr_QueryUserInfo q0 ;
0001-01-01 02:30:17 +02:30
union samr_UserInfo u ;
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
s . in . handle = handle ;
s . in . info = & u ;
q . in . handle = handle ;
q . out . info = & u ;
0001-01-01 02:30:17 +02:30
q0 = q ;
0001-01-01 02:30:17 +02:30
# define TESTCALL(call, r) \
status = dcerpc_samr_ # # call ( p , mem_ctx , & r ) ; \
if ( ! NT_STATUS_IS_OK ( status ) ) { \
printf ( # call " level %u failed - %s (line %d) \n " , \
r . in . level , nt_errstr ( status ) , __LINE__ ) ; \
ret = False ; \
break ; \
}
# define STRING_EQUAL(s1, s2, field) \
if ( ( s1 & & ! s2 ) | | ( s2 & & ! s1 ) | | strcmp ( s1 , s2 ) ) { \
printf ( " Failed to set %s to '%s' (line %d) \n " , \
# field, s2, __LINE__); \
ret = False ; \
break ; \
}
# define INT_EQUAL(i1, i2, field) \
if ( i1 ! = i2 ) { \
printf ( " Failed to set %s to %u (line %d) \n " , \
# field, i2, __LINE__); \
ret = False ; \
break ; \
}
# define TEST_USERINFO_NAME(lvl1, field1, lvl2, field2, value) do { \
printf ( " field test %d/%s vs %d/%s \n " , lvl1 , # field1 , lvl2 , # field2 ) ; \
q . in . level = lvl1 ; \
TESTCALL ( QueryUserInfo , q ) \
s . in . level = lvl1 ; \
u = * q . out . info ; \
init_samr_Name ( & u . info # # lvl1 . field1 , value ) ; \
TESTCALL ( SetUserInfo , s ) \
init_samr_Name ( & u . info # # lvl1 . field1 , " " ) ; \
TESTCALL ( QueryUserInfo , q ) ; \
u = * q . out . info ; \
STRING_EQUAL ( u . info # # lvl1 . field1 . name , value , field1 ) ; \
q . in . level = lvl2 ; \
TESTCALL ( QueryUserInfo , q ) \
u = * q . out . info ; \
STRING_EQUAL ( u . info # # lvl2 . field2 . name , value , field2 ) ; \
} while ( 0 )
0001-01-01 02:30:17 +02:30
# define TEST_USERINFO_INT(lvl1, field1, lvl2, field2, value) do { \
0001-01-01 02:30:17 +02:30
printf ( " field test %d/%s vs %d/%s \n " , lvl1 , # field1 , lvl2 , # field2 ) ; \
q . in . level = lvl1 ; \
TESTCALL ( QueryUserInfo , q ) \
s . in . level = lvl1 ; \
u = * q . out . info ; \
0001-01-01 02:30:17 +02:30
u . info # # lvl1 . field1 = value ; \
0001-01-01 02:30:17 +02:30
TESTCALL ( SetUserInfo , s ) \
u . info # # lvl1 . field1 = 0 ; \
TESTCALL ( QueryUserInfo , q ) ; \
u = * q . out . info ; \
0001-01-01 02:30:17 +02:30
INT_EQUAL ( u . info # # lvl1 . field1 , value , field1 ) ; \
0001-01-01 02:30:17 +02:30
q . in . level = lvl2 ; \
TESTCALL ( QueryUserInfo , q ) \
u = * q . out . info ; \
0001-01-01 02:30:17 +02:30
INT_EQUAL ( u . info # # lvl2 . field2 , value , field1 ) ; \
0001-01-01 02:30:17 +02:30
} while ( 0 )
0001-01-01 02:30:17 +02:30
q0 . in . level = 12 ;
do { TESTCALL ( QueryUserInfo , q0 ) } while ( 0 ) ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
TEST_USERINFO_NAME ( 2 , comment , 1 , comment , " xx2-1 comment " ) ;
TEST_USERINFO_NAME ( 2 , comment , 21 , comment , " xx2-21 comment " ) ;
TEST_USERINFO_NAME ( 6 , full_name , 1 , full_name , " xx6-1 full_name " ) ;
TEST_USERINFO_NAME ( 6 , full_name , 3 , full_name , " xx6-3 full_name " ) ;
TEST_USERINFO_NAME ( 6 , full_name , 5 , full_name , " xx6-5 full_name " ) ;
TEST_USERINFO_NAME ( 6 , full_name , 6 , full_name , " xx6-6 full_name " ) ;
TEST_USERINFO_NAME ( 6 , full_name , 8 , full_name , " xx6-8 full_name " ) ;
TEST_USERINFO_NAME ( 6 , full_name , 21 , full_name , " xx6-21 full_name " ) ;
TEST_USERINFO_NAME ( 8 , full_name , 21 , full_name , " xx7-21 full_name " ) ;
0001-01-01 02:30:17 +02:30
TEST_USERINFO_NAME ( 11 , logon_script , 3 , logon_script , " xx11-3 logon_script " ) ;
TEST_USERINFO_NAME ( 11 , logon_script , 5 , logon_script , " xx11-5 logon_script " ) ;
0001-01-01 02:30:17 +02:30
TEST_USERINFO_NAME ( 11 , logon_script , 21 , logon_script , " xx11-21 logon_script " ) ;
0001-01-01 02:30:17 +02:30
TEST_USERINFO_NAME ( 12 , profile , 3 , profile , " xx12-3 profile " ) ;
TEST_USERINFO_NAME ( 12 , profile , 5 , profile , " xx12-5 profile " ) ;
0001-01-01 02:30:17 +02:30
TEST_USERINFO_NAME ( 12 , profile , 21 , profile , " xx12-21 profile " ) ;
0001-01-01 02:30:17 +02:30
TEST_USERINFO_NAME ( 13 , description , 1 , description , " xx13-1 description " ) ;
TEST_USERINFO_NAME ( 13 , description , 5 , description , " xx13-5 description " ) ;
0001-01-01 02:30:17 +02:30
TEST_USERINFO_NAME ( 13 , description , 21 , description , " xx13-21 description " ) ;
0001-01-01 02:30:17 +02:30
TEST_USERINFO_NAME ( 14 , workstations , 3 , workstations , " testworkstation3 " ) ;
TEST_USERINFO_NAME ( 14 , workstations , 5 , workstations , " testworkstation5 " ) ;
TEST_USERINFO_NAME ( 14 , workstations , 21 , workstations , " testworkstation21 " ) ;
0001-01-01 02:30:17 +02:30
TEST_USERINFO_NAME ( 20 , callback , 21 , callback , " xx20-21 callback " ) ;
0001-01-01 02:30:17 +02:30
TEST_USERINFO_INT ( 2 , country_code , 21 , country_code , __LINE__ ) ;
TEST_USERINFO_INT ( 2 , code_page , 21 , code_page , __LINE__ ) ;
TEST_USERINFO_INT ( 4 , logon_hours [ 3 ] , 3 , logon_hours [ 3 ] , __LINE__ ) ;
TEST_USERINFO_INT ( 4 , logon_hours [ 3 ] , 5 , logon_hours [ 3 ] , __LINE__ ) ;
TEST_USERINFO_INT ( 4 , logon_hours [ 3 ] , 21 , logon_hours [ 3 ] , __LINE__ ) ;
TEST_USERINFO_INT ( 9 , primary_gid , 1 , primary_gid , 513 ) ;
TEST_USERINFO_INT ( 9 , primary_gid , 3 , primary_gid , 513 ) ;
TEST_USERINFO_INT ( 9 , primary_gid , 5 , primary_gid , 513 ) ;
TEST_USERINFO_INT ( 9 , primary_gid , 21 , primary_gid , 513 ) ;
0001-01-01 02:30:17 +02:30
return ret ;
}
0001-01-01 02:30:17 +02:30
static BOOL test_GetUserPwInfo ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_GetUserPwInfo r ;
BOOL ret = True ;
printf ( " Testing GetUserPwInfo \n " ) ;
r . in . handle = handle ;
status = dcerpc_samr_GetUserPwInfo ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " GetUserPwInfo failed - %s \n " , nt_errstr ( status ) ) ;
ret = False ;
}
return ret ;
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
static BOOL test_user_ops ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
BOOL ret = True ;
if ( ! test_QuerySecurity ( p , mem_ctx , handle ) ) {
ret = False ;
}
if ( ! test_QueryUserInfo ( p , mem_ctx , handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_SetUserInfo ( p , mem_ctx , handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_GetUserPwInfo ( p , mem_ctx , handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
return ret ;
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
static BOOL test_DeleteUser_byname ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle , const char * name )
{
NTSTATUS status ;
struct samr_LookupNames n ;
struct samr_OpenUser r ;
struct samr_DeleteUser d ;
struct policy_handle acct_handle ;
struct samr_Name sname ;
init_samr_Name ( & sname , name ) ;
n . in . handle = handle ;
n . in . num_names = 1 ;
n . in . names = & sname ;
status = dcerpc_samr_LookupNames ( p , mem_ctx , & n ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto failed ;
}
r . in . handle = handle ;
r . in . access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED ;
r . in . rid = n . out . rids . ids [ 0 ] ;
r . out . acct_handle = & acct_handle ;
status = dcerpc_samr_OpenUser ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto failed ;
}
d . in . handle = & acct_handle ;
d . out . handle = & acct_handle ;
status = dcerpc_samr_DeleteUser ( p , mem_ctx , & d ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto failed ;
}
return True ;
failed :
printf ( " DeleteUser_byname(%s) failed - %s \n " , name , nt_errstr ( status ) ) ;
return False ;
}
0001-01-01 02:30:17 +02:30
static BOOL test_CreateUser ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_CreateUser r ;
struct samr_DeleteUser d ;
struct policy_handle acct_handle ;
uint32 rid ;
struct samr_Name name ;
0001-01-01 02:30:17 +02:30
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
init_samr_Name ( & name , TEST_USERNAME ) ;
0001-01-01 02:30:17 +02:30
r . in . handle = handle ;
r . in . username = & name ;
r . in . access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED ;
r . out . acct_handle = & acct_handle ;
r . out . rid = & rid ;
printf ( " Testing CreateUser(%s) \n " , r . in . username - > name ) ;
status = dcerpc_samr_CreateUser ( p , mem_ctx , & r ) ;
0001-01-01 02:30:17 +02:30
if ( NT_STATUS_EQUAL ( status , NT_STATUS_ACCESS_DENIED ) ) {
printf ( " Server refused create of '%s' \n " , r . in . username - > name ) ;
return True ;
}
0001-01-01 02:30:17 +02:30
if ( NT_STATUS_EQUAL ( status , NT_STATUS_USER_EXISTS ) ) {
if ( ! test_DeleteUser_byname ( p , mem_ctx , handle , r . in . username - > name ) ) {
return False ;
}
status = dcerpc_samr_CreateUser ( p , mem_ctx , & r ) ;
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
0001-01-01 02:30:17 +02:30
printf ( " CreateUser failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_user_ops ( p , mem_ctx , & acct_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
printf ( " Testing DeleteUser \n " ) ;
d . in . handle = & acct_handle ;
d . out . handle = & acct_handle ;
status = dcerpc_samr_DeleteUser ( p , mem_ctx , & d ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " DeleteUser failed - %s \n " , nt_errstr ( status ) ) ;
0001-01-01 02:30:17 +02:30
ret = False ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
return ret ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
static BOOL test_QueryAliasInfo ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_QueryAliasInfo r ;
uint16 levels [ ] = { 1 , 2 , 3 } ;
int i ;
BOOL ret = True ;
for ( i = 0 ; i < ARRAY_SIZE ( levels ) ; i + + ) {
printf ( " Testing QueryAliasInfo level %u \n " , levels [ i ] ) ;
r . in . handle = handle ;
r . in . level = levels [ i ] ;
status = dcerpc_samr_QueryAliasInfo ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " QueryAliasInfo level %u failed - %s \n " ,
levels [ i ] , nt_errstr ( status ) ) ;
ret = False ;
}
}
return ret ;
}
0001-01-01 02:30:17 +02:30
static BOOL test_QueryGroupInfo ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_QueryGroupInfo r ;
uint16 levels [ ] = { 1 , 2 , 3 , 4 } ;
int i ;
BOOL ret = True ;
for ( i = 0 ; i < ARRAY_SIZE ( levels ) ; i + + ) {
printf ( " Testing QueryGroupInfo level %u \n " , levels [ i ] ) ;
r . in . handle = handle ;
r . in . level = levels [ i ] ;
status = dcerpc_samr_QueryGroupInfo ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " QueryGroupInfo level %u failed - %s \n " ,
levels [ i ] , nt_errstr ( status ) ) ;
ret = False ;
}
}
return ret ;
}
0001-01-01 02:30:17 +02:30
static BOOL test_QueryUserInfo ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_QueryUserInfo r ;
0001-01-01 02:30:17 +02:30
uint16 levels [ ] = { 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 ,
0001-01-01 02:30:17 +02:30
11 , 12 , 13 , 14 , 16 , 17 , 20 , 21 } ;
0001-01-01 02:30:17 +02:30
int i ;
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
for ( i = 0 ; i < ARRAY_SIZE ( levels ) ; i + + ) {
printf ( " Testing QueryUserInfo level %u \n " , levels [ i ] ) ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
r . in . handle = handle ;
r . in . level = levels [ i ] ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
status = dcerpc_samr_QueryUserInfo ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " QueryUserInfo level %u failed - %s \n " ,
levels [ i ] , nt_errstr ( status ) ) ;
ret = False ;
}
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
return ret ;
0001-01-01 02:30:17 +02:30
}
static BOOL test_OpenUser ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle , uint32 rid )
{
NTSTATUS status ;
struct samr_OpenUser r ;
struct policy_handle acct_handle ;
0001-01-01 02:30:17 +02:30
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
printf ( " Testing OpenUser(%u) \n " , rid ) ;
r . in . handle = handle ;
r . in . access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED ;
r . in . rid = rid ;
r . out . acct_handle = & acct_handle ;
status = dcerpc_samr_OpenUser ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " OpenUser(%u) failed - %s \n " , rid , nt_errstr ( status ) ) ;
return False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_QuerySecurity ( p , mem_ctx , & acct_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_QueryUserInfo ( p , mem_ctx , & acct_handle ) ) {
0001-01-01 02:30:17 +02:30
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_GetUserPwInfo ( p , mem_ctx , & acct_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_Close ( p , mem_ctx , & acct_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
return ret ;
}
static BOOL test_OpenGroup ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle , uint32 rid )
{
NTSTATUS status ;
struct samr_OpenGroup r ;
struct policy_handle acct_handle ;
BOOL ret = True ;
printf ( " Testing OpenGroup(%u) \n " , rid ) ;
r . in . handle = handle ;
r . in . access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED ;
r . in . rid = rid ;
r . out . acct_handle = & acct_handle ;
status = dcerpc_samr_OpenGroup ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " OpenGroup(%u) failed - %s \n " , rid , nt_errstr ( status ) ) ;
0001-01-01 02:30:17 +02:30
return False ;
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ! test_QuerySecurity ( p , mem_ctx , & acct_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_QueryGroupInfo ( p , mem_ctx , & acct_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_Close ( p , mem_ctx , & acct_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
return ret ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
static BOOL test_OpenAlias ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle , uint32 rid )
{
NTSTATUS status ;
struct samr_OpenAlias r ;
struct policy_handle acct_handle ;
BOOL ret = True ;
printf ( " Testing OpenAlias(%u) \n " , rid ) ;
r . in . handle = handle ;
r . in . access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED ;
r . in . rid = rid ;
r . out . acct_handle = & acct_handle ;
status = dcerpc_samr_OpenAlias ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " OpenAlias(%u) failed - %s \n " , rid , nt_errstr ( status ) ) ;
return False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_QuerySecurity ( p , mem_ctx , & acct_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_QueryAliasInfo ( p , mem_ctx , & acct_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_Close ( p , mem_ctx , & acct_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
return ret ;
}
0001-01-01 02:30:17 +02:30
static BOOL test_EnumDomainUsers ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_EnumDomainUsers r ;
uint32 resume_handle = 0 ;
0001-01-01 02:30:17 +02:30
int i ;
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
struct samr_LookupNames n ;
0001-01-01 02:30:17 +02:30
struct samr_LookupRids lr ;
0001-01-01 02:30:17 +02:30
printf ( " Testing EnumDomainUsers \n " ) ;
r . in . handle = handle ;
r . in . resume_handle = & resume_handle ;
r . in . acct_flags = 0 ;
r . in . max_size = ( uint32 ) - 1 ;
r . out . resume_handle = & resume_handle ;
status = dcerpc_samr_EnumDomainUsers ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " EnumDomainUsers failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
0001-01-01 02:30:17 +02:30
if ( ! r . out . sam ) {
return False ;
}
0001-01-01 02:30:17 +02:30
if ( r . out . sam - > count = = 0 ) {
return True ;
}
0001-01-01 02:30:17 +02:30
for ( i = 0 ; i < r . out . sam - > count ; i + + ) {
if ( ! test_OpenUser ( p , mem_ctx , handle , r . out . sam - > entries [ i ] . idx ) ) {
ret = False ;
}
}
0001-01-01 02:30:17 +02:30
printf ( " Testing LookupNames \n " ) ;
n . in . handle = handle ;
n . in . num_names = r . out . sam - > count ;
n . in . names = talloc ( mem_ctx , r . out . sam - > count * sizeof ( struct samr_Name ) ) ;
for ( i = 0 ; i < r . out . sam - > count ; i + + ) {
n . in . names [ i ] = r . out . sam - > entries [ i ] . name ;
}
status = dcerpc_samr_LookupNames ( p , mem_ctx , & n ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " LookupNames failed - %s \n " , nt_errstr ( status ) ) ;
0001-01-01 02:30:17 +02:30
ret = False ;
}
printf ( " Testing LookupRids \n " ) ;
lr . in . handle = handle ;
lr . in . num_rids = r . out . sam - > count ;
lr . in . rids = talloc ( mem_ctx , r . out . sam - > count * sizeof ( uint32 ) ) ;
for ( i = 0 ; i < r . out . sam - > count ; i + + ) {
lr . in . rids [ i ] = r . out . sam - > entries [ i ] . idx ;
}
status = dcerpc_samr_LookupRids ( p , mem_ctx , & lr ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " LookupRids failed - %s \n " , nt_errstr ( status ) ) ;
ret = False ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
return ret ;
0001-01-01 02:30:17 +02:30
}
static BOOL test_EnumDomainGroups ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_EnumDomainGroups r ;
uint32 resume_handle = 0 ;
0001-01-01 02:30:17 +02:30
int i ;
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
printf ( " Testing EnumDomainGroups \n " ) ;
r . in . handle = handle ;
r . in . resume_handle = & resume_handle ;
r . in . max_size = ( uint32 ) - 1 ;
r . out . resume_handle = & resume_handle ;
status = dcerpc_samr_EnumDomainGroups ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " EnumDomainGroups failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
0001-01-01 02:30:17 +02:30
if ( ! r . out . sam ) {
return False ;
}
for ( i = 0 ; i < r . out . sam - > count ; i + + ) {
if ( ! test_OpenGroup ( p , mem_ctx , handle , r . out . sam - > entries [ i ] . idx ) ) {
ret = False ;
}
}
return ret ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
static BOOL test_EnumDomainAliases ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_EnumDomainAliases r ;
uint32 resume_handle = 0 ;
0001-01-01 02:30:17 +02:30
int i ;
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
printf ( " Testing EnumDomainAliases \n " ) ;
r . in . handle = handle ;
r . in . resume_handle = & resume_handle ;
r . in . max_size = ( uint32 ) - 1 ;
r . out . resume_handle = & resume_handle ;
status = dcerpc_samr_EnumDomainAliases ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " EnumDomainAliases failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
0001-01-01 02:30:17 +02:30
if ( ! r . out . sam ) {
return False ;
}
for ( i = 0 ; i < r . out . sam - > count ; i + + ) {
if ( ! test_OpenAlias ( p , mem_ctx , handle , r . out . sam - > entries [ i ] . idx ) ) {
ret = False ;
}
}
return ret ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
static BOOL test_QueryDisplayInfo ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_QueryDisplayInfo r ;
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
uint16 levels [ ] = { 1 , 2 , 3 , 4 , 5 } ;
int i ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
for ( i = 0 ; i < ARRAY_SIZE ( levels ) ; i + + ) {
printf ( " Testing QueryDisplayInfo level %u \n " , levels [ i ] ) ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
r . in . handle = handle ;
r . in . level = levels [ i ] ;
r . in . start_idx = 0 ;
r . in . max_entries = 1000 ;
r . in . buf_size = ( uint32 ) - 1 ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
status = dcerpc_samr_QueryDisplayInfo ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " QueryDisplayInfo level %u failed - %s \n " ,
levels [ i ] , nt_errstr ( status ) ) ;
ret = False ;
}
0001-01-01 02:30:17 +02:30
}
return ret ;
}
0001-01-01 02:30:17 +02:30
static BOOL test_QueryDomainInfo ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_QueryDomainInfo r ;
0001-01-01 02:30:17 +02:30
uint16 levels [ ] = { 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 11 , 12 , 13 } ;
int i ;
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
for ( i = 0 ; i < ARRAY_SIZE ( levels ) ; i + + ) {
printf ( " Testing QueryDomainInfo level %u \n " , levels [ i ] ) ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
r . in . handle = handle ;
r . in . level = levels [ i ] ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
status = dcerpc_samr_QueryDomainInfo ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " QueryDomainInfo level %u failed - %s \n " ,
r . in . level , nt_errstr ( status ) ) ;
ret = False ;
continue ;
}
}
0001-01-01 02:30:17 +02:30
return True ;
}
static BOOL test_OpenDomain ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle , struct dom_sid2 * sid )
{
NTSTATUS status ;
struct samr_OpenDomain r ;
struct policy_handle domain_handle ;
0001-01-01 02:30:17 +02:30
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
printf ( " Testing OpenDomain \n " ) ;
r . in . handle = handle ;
r . in . access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED ;
r . in . sid = sid ;
r . out . domain_handle = & domain_handle ;
status = dcerpc_samr_OpenDomain ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " OpenDomain failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_CreateUser ( p , mem_ctx , & domain_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_QuerySecurity ( p , mem_ctx , & domain_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_QueryDomainInfo ( p , mem_ctx , & domain_handle ) ) {
0001-01-01 02:30:17 +02:30
ret = False ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
if ( ! test_EnumDomainUsers ( p , mem_ctx , & domain_handle ) ) {
0001-01-01 02:30:17 +02:30
ret = False ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
if ( ! test_EnumDomainGroups ( p , mem_ctx , & domain_handle ) ) {
0001-01-01 02:30:17 +02:30
ret = False ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
if ( ! test_EnumDomainAliases ( p , mem_ctx , & domain_handle ) ) {
0001-01-01 02:30:17 +02:30
ret = False ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
if ( ! test_QueryDisplayInfo ( p , mem_ctx , & domain_handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_Close ( p , mem_ctx , & domain_handle ) ) {
ret = False ;
}
return ret ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
static BOOL test_LookupDomain ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle , struct samr_Name * domain )
{
NTSTATUS status ;
struct samr_LookupDomain r ;
printf ( " Testing LookupDomain(%s) \n " , domain - > name ) ;
r . in . handle = handle ;
r . in . domain = domain ;
status = dcerpc_samr_LookupDomain ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " LookupDomain failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_OpenDomain ( p , mem_ctx , handle , r . out . sid ) ) {
return False ;
}
0001-01-01 02:30:17 +02:30
return True ;
}
0001-01-01 02:30:17 +02:30
static BOOL test_EnumDomains ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_EnumDomains r ;
uint32 resume_handle = 0 ;
0001-01-01 02:30:17 +02:30
int i ;
0001-01-01 02:30:17 +02:30
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
r . in . handle = handle ;
r . in . resume_handle = & resume_handle ;
r . in . buf_size = ( uint32 ) - 1 ;
r . out . resume_handle = & resume_handle ;
status = dcerpc_samr_EnumDomains ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " EnumDomains failed - %s \n " , nt_errstr ( status ) ) ;
return False ;
}
0001-01-01 02:30:17 +02:30
if ( ! r . out . sam ) {
return False ;
}
for ( i = 0 ; i < r . out . sam - > count ; i + + ) {
if ( ! test_LookupDomain ( p , mem_ctx , handle ,
& r . out . sam - > entries [ i ] . name ) ) {
ret = False ;
0001-01-01 02:30:17 +02:30
}
}
0001-01-01 02:30:17 +02:30
return ret ;
0001-01-01 02:30:17 +02:30
}
static BOOL test_Connect ( struct dcerpc_pipe * p , TALLOC_CTX * mem_ctx ,
struct policy_handle * handle )
{
NTSTATUS status ;
struct samr_Connect r ;
0001-01-01 02:30:17 +02:30
struct samr_Connect2 r2 ;
0001-01-01 02:30:17 +02:30
struct samr_Connect4 r4 ;
0001-01-01 02:30:17 +02:30
BOOL ret = True ;
0001-01-01 02:30:17 +02:30
r . in . system_name = 0 ;
r . in . access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED ;
r . out . handle = handle ;
status = dcerpc_samr_Connect ( p , mem_ctx , & r ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " Connect failed - %s \n " , nt_errstr ( status ) ) ;
0001-01-01 02:30:17 +02:30
ret = False ;
}
r2 . in . system_name = " " ;
r2 . in . access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED ;
r2 . out . handle = handle ;
status = dcerpc_samr_Connect2 ( p , mem_ctx , & r2 ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " Connect2 failed - %s \n " , nt_errstr ( status ) ) ;
ret = False ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
r4 . in . system_name = " " ;
0001-01-01 02:30:17 +02:30
r4 . in . unknown = 0 ;
r4 . in . access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED ;
r4 . out . handle = handle ;
status = dcerpc_samr_Connect4 ( p , mem_ctx , & r4 ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " Connect4 failed - %s \n " , nt_errstr ( status ) ) ;
0001-01-01 02:30:17 +02:30
ret = False ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
return ret ;
0001-01-01 02:30:17 +02:30
}
BOOL torture_rpc_samr ( int dummy )
{
NTSTATUS status ;
struct dcerpc_pipe * p ;
TALLOC_CTX * mem_ctx ;
BOOL ret = True ;
struct policy_handle handle ;
mem_ctx = talloc_init ( " torture_rpc_samr " ) ;
0001-01-01 02:30:17 +02:30
status = torture_rpc_connection ( & p ,
DCERPC_SAMR_NAME ,
DCERPC_SAMR_UUID ,
DCERPC_SAMR_VERSION ) ;
0001-01-01 02:30:17 +02:30
if ( ! NT_STATUS_IS_OK ( status ) ) {
return False ;
}
0001-01-01 02:30:17 +02:30
p - > flags | = DCERPC_DEBUG_PRINT_BOTH ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ! test_Connect ( p , mem_ctx , & handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_QuerySecurity ( p , mem_ctx , & handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_EnumDomains ( p , mem_ctx , & handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
if ( ! test_Close ( p , mem_ctx , & handle ) ) {
ret = False ;
}
0001-01-01 02:30:17 +02:30
talloc_destroy ( mem_ctx ) ;
0001-01-01 02:30:17 +02:30
torture_rpc_close ( p ) ;
return ret ;
}