1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00

r17187: Beginnings of a little lsa walker for Samba3, if only to prevent the

regression we had in 3.0.23...

Volker
This commit is contained in:
Volker Lendecke 2006-07-22 18:20:07 +00:00 committed by Gerald (Jerry) Carter
parent c6aa60c7e6
commit 0236f3b41a
2 changed files with 78 additions and 0 deletions

View File

@ -134,6 +134,7 @@ NTSTATUS torture_rpc_init(void)
torture_samba3_rpc_sharesec); torture_samba3_rpc_sharesec);
register_torture_op("RPC-SAMBA3-GETUSERNAME", register_torture_op("RPC-SAMBA3-GETUSERNAME",
torture_samba3_rpc_getusername); torture_samba3_rpc_getusername);
register_torture_op("RPC-SAMBA3-LSA", torture_samba3_rpc_lsa);
register_torture_op("RPC-DRSUAPI", torture_rpc_drsuapi); register_torture_op("RPC-DRSUAPI", torture_rpc_drsuapi);
register_torture_op("RPC-CRACKNAMES", torture_rpc_drsuapi_cracknames); register_torture_op("RPC-CRACKNAMES", torture_rpc_drsuapi_cracknames);
register_torture_op("RPC-ROT", torture_rpc_rot); register_torture_op("RPC-ROT", torture_rpc_rot);

View File

@ -2071,3 +2071,80 @@ BOOL torture_samba3_rpc_sharesec(struct torture_context *torture)
talloc_free(mem_ctx); talloc_free(mem_ctx);
return ret; return ret;
} }
BOOL torture_samba3_rpc_lsa(struct torture_context *torture)
{
TALLOC_CTX *mem_ctx;
BOOL ret = True;
struct smbcli_state *cli;
struct dcerpc_pipe *p;
struct policy_handle lsa_handle;
NTSTATUS status;
struct dom_sid *domain_sid;
if (!(mem_ctx = talloc_new(torture))) {
return False;
}
if (!(torture_open_connection_share(
mem_ctx, &cli, lp_parm_string(-1, "torture", "host"),
"IPC$", NULL))) {
d_printf("IPC$ connection failed\n");
talloc_free(mem_ctx);
return False;
}
p = pipe_bind_smb(mem_ctx, cli->tree, "\\lsarpc",
&dcerpc_table_lsarpc);
if (p == NULL) {
d_printf("(%s) pipe_bind_smb failed\n", __location__);
talloc_free(mem_ctx);
return False;
}
{
struct lsa_ObjectAttribute attr;
struct lsa_OpenPolicy2 o;
o.in.system_name = talloc_asprintf(
mem_ctx, "\\\\%s", dcerpc_server_name(p));
ZERO_STRUCT(attr);
o.in.attr = &attr;
o.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
o.out.handle = &lsa_handle;
status = dcerpc_lsa_OpenPolicy2(p, mem_ctx, &o);
if (!NT_STATUS_IS_OK(status)) {
d_printf("(%s) dcerpc_lsa_OpenPolicy2 failed: %s\n",
__location__, nt_errstr(status));
talloc_free(mem_ctx);
return False;
}
}
#if 0
p->conn->flags |= DCERPC_DEBUG_PRINT_IN | DCERPC_DEBUG_PRINT_OUT;
#endif
{
int i;
int levels[] = { 2,3,5,6 };
for (i=0; i<ARRAY_SIZE(levels); i++) {
struct lsa_QueryInfoPolicy r;
r.in.handle = &lsa_handle;
r.in.level = levels[i];
status = dcerpc_lsa_QueryInfoPolicy(p, mem_ctx, &r);
if (!NT_STATUS_IS_OK(status)) {
d_printf("(%s) dcerpc_lsa_QueryInfoPolicy %d "
"failed: %s\n", __location__,
levels[i], nt_errstr(status));
talloc_free(mem_ctx);
return False;
}
if (levels[i] == 5) {
domain_sid = r.out.info->account_domain.sid;
}
}
}
return ret;
}