mirror of
https://github.com/samba-team/samba.git
synced 2024-12-25 23:21:54 +03:00
91a999270e
this was not readable well
502 lines
15 KiB
C
502 lines
15 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
helper functions for SMB2 test suite
|
|
|
|
Copyright (C) Andrew Tridgell 2005
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "libcli/security/security_descriptor.h"
|
|
#include "libcli/smb2/smb2.h"
|
|
#include "libcli/smb2/smb2_calls.h"
|
|
#include "lib/cmdline/popt_common.h"
|
|
#include "system/time.h"
|
|
#include "librpc/gen_ndr/ndr_security.h"
|
|
#include "param/param.h"
|
|
#include "libcli/resolve/resolve.h"
|
|
|
|
#include "torture/torture.h"
|
|
#include "torture/smb2/proto.h"
|
|
|
|
|
|
/*
|
|
write to a file on SMB2
|
|
*/
|
|
NTSTATUS smb2_util_write(struct smb2_tree *tree,
|
|
struct smb2_handle handle,
|
|
const void *buf, off_t offset, size_t size)
|
|
{
|
|
struct smb2_write w;
|
|
|
|
ZERO_STRUCT(w);
|
|
w.in.file.handle = handle;
|
|
w.in.offset = offset;
|
|
w.in.data = data_blob_const(buf, size);
|
|
|
|
return smb2_write(tree, &w);
|
|
}
|
|
|
|
/*
|
|
create a complex file/dir using the SMB2 protocol
|
|
*/
|
|
static NTSTATUS smb2_create_complex(struct smb2_tree *tree, const char *fname,
|
|
struct smb2_handle *handle, bool dir)
|
|
{
|
|
TALLOC_CTX *tmp_ctx = talloc_new(tree);
|
|
char buf[7] = "abc";
|
|
struct smb2_create io;
|
|
union smb_setfileinfo setfile;
|
|
union smb_fileinfo fileinfo;
|
|
time_t t = (time(NULL) & ~1);
|
|
NTSTATUS status;
|
|
|
|
smb2_util_unlink(tree, fname);
|
|
ZERO_STRUCT(io);
|
|
io.in.desired_access = SEC_FLAG_MAXIMUM_ALLOWED;
|
|
io.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
|
|
io.in.create_disposition = NTCREATEX_DISP_OVERWRITE_IF;
|
|
io.in.share_access =
|
|
NTCREATEX_SHARE_ACCESS_DELETE|
|
|
NTCREATEX_SHARE_ACCESS_READ|
|
|
NTCREATEX_SHARE_ACCESS_WRITE;
|
|
io.in.create_options = 0;
|
|
io.in.fname = fname;
|
|
if (dir) {
|
|
io.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
|
|
io.in.share_access &= ~NTCREATEX_SHARE_ACCESS_DELETE;
|
|
io.in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
|
|
io.in.create_disposition = NTCREATEX_DISP_CREATE;
|
|
}
|
|
|
|
/* it seems vista is now fussier about alignment? */
|
|
if (strchr(fname, ':') == NULL) {
|
|
/* setup some EAs */
|
|
io.in.eas.num_eas = 2;
|
|
io.in.eas.eas = talloc_array(tmp_ctx, struct ea_struct, 2);
|
|
io.in.eas.eas[0].flags = 0;
|
|
io.in.eas.eas[0].name.s = "EAONE";
|
|
io.in.eas.eas[0].value = data_blob_talloc(tmp_ctx, "VALUE1", 6);
|
|
io.in.eas.eas[1].flags = 0;
|
|
io.in.eas.eas[1].name.s = "SECONDEA";
|
|
io.in.eas.eas[1].value = data_blob_talloc(tmp_ctx, "ValueTwo", 8);
|
|
}
|
|
|
|
status = smb2_create(tree, tmp_ctx, &io);
|
|
talloc_free(tmp_ctx);
|
|
NT_STATUS_NOT_OK_RETURN(status);
|
|
|
|
*handle = io.out.file.handle;
|
|
|
|
if (!dir) {
|
|
status = smb2_util_write(tree, *handle, buf, 0, sizeof(buf));
|
|
NT_STATUS_NOT_OK_RETURN(status);
|
|
}
|
|
|
|
/* make sure all the timestamps aren't the same, and are also
|
|
in different DST zones*/
|
|
setfile.generic.level = RAW_SFILEINFO_BASIC_INFORMATION;
|
|
setfile.generic.in.file.handle = *handle;
|
|
|
|
unix_to_nt_time(&setfile.basic_info.in.create_time, t + 9*30*24*60*60);
|
|
unix_to_nt_time(&setfile.basic_info.in.access_time, t + 6*30*24*60*60);
|
|
unix_to_nt_time(&setfile.basic_info.in.write_time, t + 3*30*24*60*60);
|
|
unix_to_nt_time(&setfile.basic_info.in.change_time, t + 1*30*24*60*60);
|
|
setfile.basic_info.in.attrib = FILE_ATTRIBUTE_NORMAL;
|
|
|
|
status = smb2_setinfo_file(tree, &setfile);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("Failed to setup file times - %s\n", nt_errstr(status));
|
|
return status;
|
|
}
|
|
|
|
/* make sure all the timestamps aren't the same */
|
|
fileinfo.generic.level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
|
|
fileinfo.generic.in.file.handle = *handle;
|
|
|
|
status = smb2_getinfo_file(tree, tree, &fileinfo);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("Failed to query file times - %s\n", nt_errstr(status));
|
|
return status;
|
|
|
|
}
|
|
|
|
#define CHECK_TIME(field) do {\
|
|
if (setfile.basic_info.in.field != fileinfo.all_info2.out.field) { \
|
|
printf("(%s) " #field " not setup correctly: %s(%llu) => %s(%llu)\n", \
|
|
__location__, \
|
|
nt_time_string(tree, setfile.basic_info.in.field), \
|
|
(unsigned long long)setfile.basic_info.in.field, \
|
|
nt_time_string(tree, fileinfo.basic_info.out.field), \
|
|
(unsigned long long)fileinfo.basic_info.out.field); \
|
|
status = NT_STATUS_INVALID_PARAMETER; \
|
|
} \
|
|
} while (0)
|
|
|
|
CHECK_TIME(create_time);
|
|
CHECK_TIME(access_time);
|
|
CHECK_TIME(write_time);
|
|
CHECK_TIME(change_time);
|
|
|
|
return status;
|
|
}
|
|
|
|
/*
|
|
create a complex file using the SMB2 protocol
|
|
*/
|
|
NTSTATUS smb2_create_complex_file(struct smb2_tree *tree, const char *fname,
|
|
struct smb2_handle *handle)
|
|
{
|
|
return smb2_create_complex(tree, fname, handle, false);
|
|
}
|
|
|
|
/*
|
|
create a complex dir using the SMB2 protocol
|
|
*/
|
|
NTSTATUS smb2_create_complex_dir(struct smb2_tree *tree, const char *fname,
|
|
struct smb2_handle *handle)
|
|
{
|
|
return smb2_create_complex(tree, fname, handle, true);
|
|
}
|
|
|
|
/*
|
|
show lots of information about a file
|
|
*/
|
|
void torture_smb2_all_info(struct smb2_tree *tree, struct smb2_handle handle)
|
|
{
|
|
NTSTATUS status;
|
|
TALLOC_CTX *tmp_ctx = talloc_new(tree);
|
|
union smb_fileinfo io;
|
|
|
|
io.generic.level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
|
|
io.generic.in.file.handle = handle;
|
|
|
|
status = smb2_getinfo_file(tree, tmp_ctx, &io);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
DEBUG(0,("getinfo failed - %s\n", nt_errstr(status)));
|
|
talloc_free(tmp_ctx);
|
|
return;
|
|
}
|
|
|
|
d_printf("all_info for '%s'\n", io.all_info2.out.fname.s);
|
|
d_printf("\tcreate_time: %s\n", nt_time_string(tmp_ctx, io.all_info2.out.create_time));
|
|
d_printf("\taccess_time: %s\n", nt_time_string(tmp_ctx, io.all_info2.out.access_time));
|
|
d_printf("\twrite_time: %s\n", nt_time_string(tmp_ctx, io.all_info2.out.write_time));
|
|
d_printf("\tchange_time: %s\n", nt_time_string(tmp_ctx, io.all_info2.out.change_time));
|
|
d_printf("\tattrib: 0x%x\n", io.all_info2.out.attrib);
|
|
d_printf("\tunknown1: 0x%x\n", io.all_info2.out.unknown1);
|
|
d_printf("\talloc_size: %llu\n", (long long)io.all_info2.out.alloc_size);
|
|
d_printf("\tsize: %llu\n", (long long)io.all_info2.out.size);
|
|
d_printf("\tnlink: %u\n", io.all_info2.out.nlink);
|
|
d_printf("\tdelete_pending: %u\n", io.all_info2.out.delete_pending);
|
|
d_printf("\tdirectory: %u\n", io.all_info2.out.directory);
|
|
d_printf("\tfile_id: %llu\n", (long long)io.all_info2.out.file_id);
|
|
d_printf("\tea_size: %u\n", io.all_info2.out.ea_size);
|
|
d_printf("\taccess_mask: 0x%08x\n", io.all_info2.out.access_mask);
|
|
d_printf("\tposition: 0x%llx\n", (long long)io.all_info2.out.position);
|
|
d_printf("\tmode: 0x%llx\n", (long long)io.all_info2.out.mode);
|
|
|
|
/* short name, if any */
|
|
io.generic.level = RAW_FILEINFO_ALT_NAME_INFORMATION;
|
|
status = smb2_getinfo_file(tree, tmp_ctx, &io);
|
|
if (NT_STATUS_IS_OK(status)) {
|
|
d_printf("\tshort name: '%s'\n", io.alt_name_info.out.fname.s);
|
|
}
|
|
|
|
/* the EAs, if any */
|
|
io.generic.level = RAW_FILEINFO_SMB2_ALL_EAS;
|
|
status = smb2_getinfo_file(tree, tmp_ctx, &io);
|
|
if (NT_STATUS_IS_OK(status)) {
|
|
int i;
|
|
for (i=0;i<io.all_eas.out.num_eas;i++) {
|
|
d_printf("\tEA[%d] flags=%d len=%d '%s'\n", i,
|
|
io.all_eas.out.eas[i].flags,
|
|
(int)io.all_eas.out.eas[i].value.length,
|
|
io.all_eas.out.eas[i].name.s);
|
|
}
|
|
}
|
|
|
|
/* streams, if available */
|
|
io.generic.level = RAW_FILEINFO_STREAM_INFORMATION;
|
|
status = smb2_getinfo_file(tree, tmp_ctx, &io);
|
|
if (NT_STATUS_IS_OK(status)) {
|
|
int i;
|
|
for (i=0;i<io.stream_info.out.num_streams;i++) {
|
|
d_printf("\tstream %d:\n", i);
|
|
d_printf("\t\tsize %ld\n",
|
|
(long)io.stream_info.out.streams[i].size);
|
|
d_printf("\t\talloc size %ld\n",
|
|
(long)io.stream_info.out.streams[i].alloc_size);
|
|
d_printf("\t\tname %s\n", io.stream_info.out.streams[i].stream_name.s);
|
|
}
|
|
}
|
|
|
|
if (DEBUGLVL(1)) {
|
|
/* the security descriptor */
|
|
io.query_secdesc.level = RAW_FILEINFO_SEC_DESC;
|
|
io.query_secdesc.in.secinfo_flags =
|
|
SECINFO_OWNER|SECINFO_GROUP|
|
|
SECINFO_DACL;
|
|
status = smb2_getinfo_file(tree, tmp_ctx, &io);
|
|
if (NT_STATUS_IS_OK(status)) {
|
|
NDR_PRINT_DEBUG(security_descriptor, io.query_secdesc.out.sd);
|
|
}
|
|
}
|
|
|
|
talloc_free(tmp_ctx);
|
|
}
|
|
|
|
|
|
/*
|
|
open a smb2 connection
|
|
*/
|
|
bool torture_smb2_connection(struct torture_context *tctx, struct smb2_tree **tree)
|
|
{
|
|
NTSTATUS status;
|
|
const char *host = torture_setting_string(tctx, "host", NULL);
|
|
const char *share = torture_setting_string(tctx, "share", NULL);
|
|
struct cli_credentials *credentials = cmdline_credentials;
|
|
struct smbcli_options options;
|
|
|
|
lpcfg_smbcli_options(tctx->lp_ctx, &options);
|
|
|
|
status = smb2_connect(tctx,
|
|
host,
|
|
lpcfg_smb_ports(tctx->lp_ctx),
|
|
share,
|
|
lpcfg_resolve_context(tctx->lp_ctx),
|
|
credentials,
|
|
tree,
|
|
tctx->ev,
|
|
&options,
|
|
lpcfg_socket_options(tctx->lp_ctx),
|
|
lpcfg_gensec_settings(tctx, tctx->lp_ctx)
|
|
);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("Failed to connect to SMB2 share \\\\%s\\%s - %s\n",
|
|
host, share, nt_errstr(status));
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
|
|
/*
|
|
create and return a handle to a test file
|
|
*/
|
|
NTSTATUS torture_smb2_testfile(struct smb2_tree *tree, const char *fname,
|
|
struct smb2_handle *handle)
|
|
{
|
|
struct smb2_create io;
|
|
NTSTATUS status;
|
|
|
|
ZERO_STRUCT(io);
|
|
io.in.oplock_level = 0;
|
|
io.in.desired_access = SEC_RIGHTS_FILE_ALL;
|
|
io.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
|
|
io.in.create_disposition = NTCREATEX_DISP_OPEN_IF;
|
|
io.in.share_access =
|
|
NTCREATEX_SHARE_ACCESS_DELETE|
|
|
NTCREATEX_SHARE_ACCESS_READ|
|
|
NTCREATEX_SHARE_ACCESS_WRITE;
|
|
io.in.create_options = 0;
|
|
io.in.fname = fname;
|
|
|
|
status = smb2_create(tree, tree, &io);
|
|
NT_STATUS_NOT_OK_RETURN(status);
|
|
|
|
*handle = io.out.file.handle;
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/*
|
|
create and return a handle to a test directory
|
|
*/
|
|
NTSTATUS torture_smb2_testdir(struct smb2_tree *tree, const char *fname,
|
|
struct smb2_handle *handle)
|
|
{
|
|
struct smb2_create io;
|
|
NTSTATUS status;
|
|
|
|
ZERO_STRUCT(io);
|
|
io.in.oplock_level = 0;
|
|
io.in.desired_access = SEC_RIGHTS_DIR_ALL;
|
|
io.in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
|
|
io.in.create_disposition = NTCREATEX_DISP_OPEN_IF;
|
|
io.in.share_access = NTCREATEX_SHARE_ACCESS_READ|NTCREATEX_SHARE_ACCESS_WRITE|NTCREATEX_SHARE_ACCESS_DELETE;
|
|
io.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
|
|
io.in.fname = fname;
|
|
|
|
status = smb2_create(tree, tree, &io);
|
|
NT_STATUS_NOT_OK_RETURN(status);
|
|
|
|
*handle = io.out.file.handle;
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
|
|
/*
|
|
create a complex file using SMB2, to make it easier to
|
|
find fields in SMB2 getinfo levels
|
|
*/
|
|
NTSTATUS torture_setup_complex_file(struct smb2_tree *tree, const char *fname)
|
|
{
|
|
struct smb2_handle handle;
|
|
NTSTATUS status = smb2_create_complex_file(tree, fname, &handle);
|
|
NT_STATUS_NOT_OK_RETURN(status);
|
|
return smb2_util_close(tree, handle);
|
|
}
|
|
|
|
|
|
/*
|
|
create a complex dir using SMB2, to make it easier to
|
|
find fields in SMB2 getinfo levels
|
|
*/
|
|
NTSTATUS torture_setup_complex_dir(struct smb2_tree *tree, const char *fname)
|
|
{
|
|
struct smb2_handle handle;
|
|
NTSTATUS status = smb2_create_complex_dir(tree, fname, &handle);
|
|
NT_STATUS_NOT_OK_RETURN(status);
|
|
return smb2_util_close(tree, handle);
|
|
}
|
|
|
|
|
|
/*
|
|
return a handle to the root of the share
|
|
*/
|
|
NTSTATUS smb2_util_roothandle(struct smb2_tree *tree, struct smb2_handle *handle)
|
|
{
|
|
struct smb2_create io;
|
|
NTSTATUS status;
|
|
|
|
ZERO_STRUCT(io);
|
|
io.in.oplock_level = 0;
|
|
io.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_DIR_READ_ATTRIBUTE | SEC_DIR_LIST;
|
|
io.in.file_attributes = 0;
|
|
io.in.create_disposition = NTCREATEX_DISP_OPEN;
|
|
io.in.share_access = NTCREATEX_SHARE_ACCESS_READ|NTCREATEX_SHARE_ACCESS_DELETE;
|
|
io.in.create_options = NTCREATEX_OPTIONS_ASYNC_ALERT;
|
|
io.in.fname = NULL;
|
|
|
|
status = smb2_create(tree, tree, &io);
|
|
NT_STATUS_NOT_OK_RETURN(status);
|
|
|
|
*handle = io.out.file.handle;
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/* Comparable to torture_setup_dir, but for SMB2. */
|
|
bool smb2_util_setup_dir(struct torture_context *tctx, struct smb2_tree *tree,
|
|
const char *dname)
|
|
{
|
|
NTSTATUS status;
|
|
|
|
/* XXX: smb_raw_exit equivalent?
|
|
smb_raw_exit(cli->session); */
|
|
if (smb2_deltree(tree, dname) == -1) {
|
|
torture_result(tctx, TORTURE_ERROR, "Unable to deltree when setting up %s.\n", dname);
|
|
return false;
|
|
}
|
|
|
|
status = smb2_util_mkdir(tree, dname);
|
|
if (NT_STATUS_IS_ERR(status)) {
|
|
torture_result(tctx, TORTURE_ERROR, "Unable to mkdir when setting up %s - %s\n", dname,
|
|
nt_errstr(status));
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
#define CHECK_STATUS(status, correct) do { \
|
|
if (!NT_STATUS_EQUAL(status, correct)) { \
|
|
torture_result(tctx, TORTURE_FAIL, "(%s) Incorrect status %s - should be %s\n", \
|
|
__location__, nt_errstr(status), nt_errstr(correct)); \
|
|
ret = false; \
|
|
goto done; \
|
|
}} while (0)
|
|
|
|
/*
|
|
* Helper function to verify a security descriptor, by querying
|
|
* and comparing against the passed in sd.
|
|
*/
|
|
bool smb2_util_verify_sd(TALLOC_CTX *tctx, struct smb2_tree *tree,
|
|
struct smb2_handle handle, struct security_descriptor *sd)
|
|
{
|
|
NTSTATUS status;
|
|
bool ret = true;
|
|
union smb_fileinfo q = {};
|
|
|
|
q.query_secdesc.level = RAW_FILEINFO_SEC_DESC;
|
|
q.query_secdesc.in.file.handle = handle;
|
|
q.query_secdesc.in.secinfo_flags =
|
|
SECINFO_OWNER |
|
|
SECINFO_GROUP |
|
|
SECINFO_DACL;
|
|
status = smb2_getinfo_file(tree, tctx, &q);
|
|
CHECK_STATUS(status, NT_STATUS_OK);
|
|
|
|
if (!security_acl_equal(
|
|
q.query_secdesc.out.sd->dacl, sd->dacl)) {
|
|
torture_warning(tctx, "%s: security descriptors don't match!\n",
|
|
__location__);
|
|
torture_warning(tctx, "got:\n");
|
|
NDR_PRINT_DEBUG(security_descriptor,
|
|
q.query_secdesc.out.sd);
|
|
torture_warning(tctx, "expected:\n");
|
|
NDR_PRINT_DEBUG(security_descriptor, sd);
|
|
ret = false;
|
|
}
|
|
|
|
done:
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Helper function to verify attributes, by querying
|
|
* and comparing against the passed in attrib.
|
|
*/
|
|
bool smb2_util_verify_attrib(TALLOC_CTX *tctx, struct smb2_tree *tree,
|
|
struct smb2_handle handle, uint32_t attrib)
|
|
{
|
|
NTSTATUS status;
|
|
bool ret = true;
|
|
union smb_fileinfo q = {};
|
|
|
|
q.standard.level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
|
|
q.standard.in.file.handle = handle;
|
|
status = smb2_getinfo_file(tree, tctx, &q);
|
|
CHECK_STATUS(status, NT_STATUS_OK);
|
|
|
|
q.all_info2.out.attrib &= ~FILE_ATTRIBUTE_ARCHIVE;
|
|
|
|
if (q.all_info2.out.attrib != attrib) {
|
|
torture_warning(tctx, "%s: attributes don't match! "
|
|
"got %x, expected %x\n", __location__,
|
|
(uint32_t)q.standard.out.attrib,
|
|
(uint32_t)attrib);
|
|
ret = false;
|
|
}
|
|
|
|
done:
|
|
return ret;
|
|
}
|
|
|
|
|