mirror of
https://github.com/samba-team/samba.git
synced 2024-12-31 17:18:04 +03:00
90067934cd
The thing that finally convinced me that minimal includes was worth
pursuing for rpc was a compiler (tcc) that failed to build Samba due
to reaching internal limits of the size of include files. Also the
fact that includes.h.gch was 16MB, which really seems excessive. This
patch brings it back to 12M, which is still too large, but
better. Note that this patch speeds up compile times for both the pch
and non-pch case.
This change also includes the addition iof a "depends()" option in our
IDL files, allowing you to specify that one IDL file depends on
another. This capability was needed for the auto-includes generation.
(This used to be commit b8f5fa8ac8
)
182 lines
4.2 KiB
C
182 lines
4.2 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
test suite for eventlog rpc operations
|
|
|
|
Copyright (C) Tim Potter 2003
|
|
Copyright (C) Jelmer Vernooij 2004
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "librpc/gen_ndr/ndr_eventlog.h"
|
|
|
|
static void init_eventlog_String(struct eventlog_String *name, const char *s)
|
|
{
|
|
name->name = s;
|
|
name->name_len = 2*strlen_m(s);
|
|
name->name_size = name->name_len;
|
|
}
|
|
|
|
static BOOL test_GetNumRecords(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle)
|
|
{
|
|
NTSTATUS status;
|
|
struct eventlog_GetNumRecords r;
|
|
|
|
printf("\ntesting GetNumRecords\n");
|
|
|
|
r.in.handle = handle;
|
|
|
|
status = dcerpc_eventlog_GetNumRecords(p, mem_ctx, &r);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("GetNumRecords failed - %s\n", nt_errstr(status));
|
|
return False;
|
|
}
|
|
|
|
printf("%d records\n", r.out.number);
|
|
|
|
return True;
|
|
}
|
|
|
|
static BOOL test_ReadEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t offset)
|
|
{
|
|
NTSTATUS status;
|
|
struct eventlog_ReadEventLogW r;
|
|
|
|
printf("\ntesting ReadEventLog\n");
|
|
|
|
r.in.flags = 0x0;
|
|
r.in.offset = offset;
|
|
r.in.handle = handle;
|
|
r.in.number_of_bytes = 0x0;
|
|
|
|
status = dcerpc_eventlog_ReadEventLogW(p, mem_ctx, &r);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("ReadEventLog failed - %s\n", nt_errstr(status));
|
|
return False;
|
|
}
|
|
|
|
if (NT_STATUS_IS_OK(r.out.result)) {
|
|
/* No data */
|
|
return True;
|
|
}
|
|
|
|
if (!NT_STATUS_EQUAL(r.out.result, NT_STATUS_BUFFER_TOO_SMALL)) {
|
|
printf("ReadEventLog failed - %s\n", nt_errstr(r.out.result));
|
|
return False;
|
|
}
|
|
|
|
r.in.number_of_bytes = r.out.real_size;
|
|
|
|
status = dcerpc_eventlog_ReadEventLogW(p, mem_ctx, &r);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("ReadEventLog failed - %s\n", nt_errstr(status));
|
|
return False;
|
|
}
|
|
|
|
|
|
return True;
|
|
}
|
|
|
|
BOOL test_CloseEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
|
|
struct policy_handle *handle)
|
|
{
|
|
NTSTATUS status;
|
|
struct eventlog_CloseEventLog r;
|
|
|
|
r.in.handle = r.out.handle = handle;
|
|
|
|
printf("Testing CloseEventLog\n");
|
|
|
|
status = dcerpc_eventlog_CloseEventLog(p, mem_ctx, &r);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("CloseEventLog failed - %s\n", nt_errstr(status));
|
|
return False;
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
static BOOL test_OpenEventLog(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, struct policy_handle *handle)
|
|
{
|
|
NTSTATUS status;
|
|
struct eventlog_OpenEventLogW r;
|
|
struct eventlog_OpenUnknown0 unknown0;
|
|
|
|
printf("\ntesting OpenEventLog\n");
|
|
|
|
unknown0.unknown0 = 0x005c;
|
|
unknown0.unknown1 = 0x0001;
|
|
|
|
r.in.unknown0 = &unknown0;
|
|
init_eventlog_String(&r.in.source, "system");
|
|
init_eventlog_String(&r.in.unknown1, NULL);
|
|
r.in.unknown2 = 0x00000001;
|
|
r.in.unknown3 = 0x00000001;
|
|
r.out.handle = handle;
|
|
|
|
status = dcerpc_eventlog_OpenEventLogW(p, mem_ctx, &r);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("OpenEventLog failed - %s\n", nt_errstr(status));
|
|
return False;
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(r.out.result)) {
|
|
printf("OpenEventLog failed - %s\n", nt_errstr(r.out.result));
|
|
return False;
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
BOOL torture_rpc_eventlog(void)
|
|
{
|
|
NTSTATUS status;
|
|
struct dcerpc_pipe *p;
|
|
struct policy_handle handle;
|
|
TALLOC_CTX *mem_ctx;
|
|
BOOL ret = True;
|
|
|
|
mem_ctx = talloc_init("torture_rpc_atsvc");
|
|
|
|
status = torture_rpc_connection(&p,
|
|
DCERPC_EVENTLOG_NAME,
|
|
DCERPC_EVENTLOG_UUID,
|
|
DCERPC_EVENTLOG_VERSION);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return False;
|
|
}
|
|
|
|
if (!test_OpenEventLog(p, mem_ctx, &handle)) {
|
|
return False;
|
|
}
|
|
|
|
test_GetNumRecords(p, mem_ctx, &handle);
|
|
|
|
test_ReadEventLog(p, mem_ctx, &handle, 0);
|
|
|
|
test_CloseEventLog(p, mem_ctx, &handle);
|
|
|
|
talloc_destroy(mem_ctx);
|
|
|
|
torture_rpc_close(p);
|
|
|
|
return ret;
|
|
}
|