mirror of
https://github.com/samba-team/samba.git
synced 2024-12-22 13:34:15 +03:00
acd6a086b3
dcerpc_interface_table struct rather then a tuple of interface
name, UUID and version.
This removes the requirement for having a global list of DCE/RPC interfaces,
except for these parts of the code that use that list explicitly
(ndrdump and the scanner torture test).
This should also allow us to remove the hack that put the authservice parameter
in the dcerpc_binding struct as it can now be read directly from
dcerpc_interface_table.
I will now modify some of these functions to take a dcerpc_syntax_id
structure rather then a full dcerpc_interface_table.
(This used to be commit 8aae0f168e
)
256 lines
6.1 KiB
C
256 lines
6.1 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
test suite for mgmt rpc operations
|
|
|
|
Copyright (C) Andrew Tridgell 2003
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "librpc/gen_ndr/ndr_mgmt.h"
|
|
|
|
|
|
/*
|
|
ask the server what interface IDs are available on this endpoint
|
|
*/
|
|
static BOOL test_inq_if_ids(struct dcerpc_pipe *p,
|
|
TALLOC_CTX *mem_ctx)
|
|
{
|
|
NTSTATUS status;
|
|
struct mgmt_inq_if_ids r;
|
|
int i;
|
|
|
|
status = dcerpc_mgmt_inq_if_ids(p, mem_ctx, &r);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("inq_if_ids failed - %s\n", nt_errstr(status));
|
|
return False;
|
|
}
|
|
|
|
if (!W_ERROR_IS_OK(r.out.result)) {
|
|
printf("inq_if_ids gave error code %s\n", win_errstr(r.out.result));
|
|
return False;
|
|
}
|
|
|
|
if (!r.out.if_id_vector) {
|
|
printf("inq_if_ids gave NULL if_id_vector\n");
|
|
return False;
|
|
}
|
|
|
|
for (i=0;i<r.out.if_id_vector->count;i++) {
|
|
const char *uuid;
|
|
struct dcerpc_syntax_id *id = r.out.if_id_vector->if_id[i].id;
|
|
if (!id) continue;
|
|
|
|
uuid = GUID_string(mem_ctx, &id->uuid);
|
|
|
|
printf("\tuuid %s version 0x%08x '%s'\n",
|
|
uuid,
|
|
id->if_version, idl_pipe_name(uuid, id->if_version));
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
static BOOL test_inq_stats(struct dcerpc_pipe *p,
|
|
TALLOC_CTX *mem_ctx)
|
|
{
|
|
NTSTATUS status;
|
|
struct mgmt_inq_stats r;
|
|
|
|
r.in.max_count = MGMT_STATS_ARRAY_MAX_SIZE;
|
|
r.in.unknown = 0;
|
|
|
|
status = dcerpc_mgmt_inq_stats(p, mem_ctx, &r);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("inq_stats failed - %s\n", nt_errstr(status));
|
|
return False;
|
|
}
|
|
|
|
if (r.out.statistics.count != MGMT_STATS_ARRAY_MAX_SIZE) {
|
|
printf("Unexpected array size %d\n", r.out.statistics.count);
|
|
return False;
|
|
}
|
|
|
|
printf("\tcalls_in %6d calls_out %6d\n\tpkts_in %6d pkts_out %6d\n",
|
|
r.out.statistics.statistics[MGMT_STATS_CALLS_IN],
|
|
r.out.statistics.statistics[MGMT_STATS_CALLS_OUT],
|
|
r.out.statistics.statistics[MGMT_STATS_PKTS_IN],
|
|
r.out.statistics.statistics[MGMT_STATS_PKTS_OUT]);
|
|
|
|
return True;
|
|
}
|
|
|
|
static BOOL test_inq_princ_name(struct dcerpc_pipe *p,
|
|
TALLOC_CTX *mem_ctx)
|
|
{
|
|
NTSTATUS status;
|
|
struct mgmt_inq_princ_name r;
|
|
int i;
|
|
BOOL ret = False;
|
|
|
|
for (i=0;i<100;i++) {
|
|
r.in.authn_proto = i; /* DCERPC_AUTH_TYPE_* */
|
|
r.in.princ_name_size = 100;
|
|
|
|
status = dcerpc_mgmt_inq_princ_name(p, mem_ctx, &r);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
continue;
|
|
}
|
|
if (W_ERROR_IS_OK(r.out.result)) {
|
|
const char *name = gensec_get_name_by_authtype(i);
|
|
ret = True;
|
|
if (name) {
|
|
printf("\tprinciple name for proto %u (%s) is '%s'\n",
|
|
i, name, r.out.princ_name);
|
|
} else {
|
|
printf("\tprinciple name for proto %u is '%s'\n",
|
|
i, r.out.princ_name);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!ret) {
|
|
printf("\tno principle names?\n");
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
static BOOL test_is_server_listening(struct dcerpc_pipe *p,
|
|
TALLOC_CTX *mem_ctx)
|
|
{
|
|
NTSTATUS status;
|
|
struct mgmt_is_server_listening r;
|
|
|
|
status = dcerpc_mgmt_is_server_listening(p, mem_ctx, &r);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("is_server_listening failed - %s\n", nt_errstr(status));
|
|
return False;
|
|
}
|
|
|
|
if (r.out.status != 0 || r.out.result == 0) {
|
|
printf("\tserver is NOT listening\n");
|
|
} else {
|
|
printf("\tserver is listening\n");
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
static BOOL test_stop_server_listening(struct dcerpc_pipe *p,
|
|
TALLOC_CTX *mem_ctx)
|
|
{
|
|
NTSTATUS status;
|
|
struct mgmt_stop_server_listening r;
|
|
|
|
status = dcerpc_mgmt_stop_server_listening(p, mem_ctx, &r);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("stop_server_listening failed - %s\n", nt_errstr(status));
|
|
return False;
|
|
}
|
|
|
|
if (!W_ERROR_IS_OK(r.out.result)) {
|
|
printf("\tserver refused to stop listening - %s\n", win_errstr(r.out.result));
|
|
} else {
|
|
printf("\tserver allowed a stop_server_listening request\n");
|
|
return False;
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
|
|
BOOL torture_rpc_mgmt(void)
|
|
{
|
|
NTSTATUS status;
|
|
struct dcerpc_pipe *p;
|
|
TALLOC_CTX *mem_ctx, *loop_ctx;
|
|
BOOL ret = True;
|
|
const char *binding = lp_parm_string(-1, "torture", "binding");
|
|
const struct dcerpc_interface_list *l;
|
|
struct dcerpc_binding *b;
|
|
|
|
mem_ctx = talloc_init("torture_rpc_mgmt");
|
|
|
|
if (!binding) {
|
|
printf("You must supply a ncacn binding string\n");
|
|
return False;
|
|
}
|
|
|
|
status = dcerpc_parse_binding(mem_ctx, binding, &b);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
talloc_free(mem_ctx);
|
|
printf("Failed to parse binding '%s'\n", binding);
|
|
return False;
|
|
}
|
|
|
|
for (l=librpc_dcerpc_pipes();l;l=l->next) {
|
|
loop_ctx = talloc_named(mem_ctx, 0, "torture_rpc_mgmt loop context");
|
|
|
|
/* some interfaces are not mappable */
|
|
if (l->table->num_calls == 0 ||
|
|
strcmp(l->table->name, "mgmt") == 0) {
|
|
talloc_free(loop_ctx);
|
|
continue;
|
|
}
|
|
|
|
printf("\nTesting pipe '%s'\n", l->table->name);
|
|
|
|
if (b->transport == NCACN_IP_TCP) {
|
|
status = dcerpc_epm_map_binding(loop_ctx, b, l->table, NULL);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
talloc_free(loop_ctx);
|
|
printf("Failed to map port for uuid %s\n", l->table->uuid);
|
|
continue;
|
|
}
|
|
} else {
|
|
b->endpoint = talloc_strdup(b, l->table->name);
|
|
}
|
|
|
|
lp_set_cmdline("torture:binding", dcerpc_binding_string(loop_ctx, b));
|
|
|
|
status = torture_rpc_connection(loop_ctx, &p, &dcerpc_table_mgmt);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
talloc_free(loop_ctx);
|
|
ret = False;
|
|
continue;
|
|
}
|
|
|
|
if (!test_is_server_listening(p, loop_ctx)) {
|
|
ret = False;
|
|
}
|
|
|
|
if (!test_stop_server_listening(p, loop_ctx)) {
|
|
ret = False;
|
|
}
|
|
|
|
if (!test_inq_stats(p, loop_ctx)) {
|
|
ret = False;
|
|
}
|
|
|
|
if (!test_inq_princ_name(p, loop_ctx)) {
|
|
ret = False;
|
|
}
|
|
|
|
if (!test_inq_if_ids(p, loop_ctx)) {
|
|
ret = False;
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
}
|