2 Unix SMB/CIFS implementation.
4 local testing of RPC binding string parsing
6 Copyright (C) Jelmer Vernooij 2004
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "librpc/gen_ndr/epmapper.h"
24 #include "librpc/rpc/dcerpc.h"
25 #include "librpc/rpc/dcerpc_proto.h"
26 #include "torture/torture.h"
27 #include "torture/local/proto.h"
28 #include "lib/util/util_net.h"
30 static bool test_BindingString(struct torture_context
*tctx
,
31 const void *test_data
)
33 const char *binding
= test_data
;
34 struct dcerpc_binding
*b
, *b2
;
36 struct epm_tower tower
;
37 TALLOC_CTX
*mem_ctx
= tctx
;
42 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(mem_ctx
, binding
, &b
),
43 "Error parsing binding string");
45 object
= dcerpc_binding_get_object(b
);
47 s
= dcerpc_binding_string(mem_ctx
, b
);
48 torture_assert(tctx
, s
!= NULL
, "Error converting binding back to string");
50 torture_assert_casestr_equal(tctx
, binding
, s
,
51 "Mismatch while comparing original and regenerated binding strings");
53 /* Generate protocol towers */
54 torture_assert_ntstatus_ok(tctx
, dcerpc_binding_build_tower(mem_ctx
, b
, &tower
),
55 "Error generating protocol tower");
57 /* Convert back to binding and then back to string and compare */
59 torture_assert_ntstatus_ok(tctx
, dcerpc_binding_from_tower(mem_ctx
, &tower
, &b2
),
60 "Error generating binding from tower for original binding");
62 /* The tower doesn't contain the object */
63 torture_assert_ntstatus_ok(tctx
, dcerpc_binding_set_object(b2
, object
),
64 "set object on tower binding");
66 s
= dcerpc_binding_string(mem_ctx
, b
);
67 torture_assert(tctx
, s
!= NULL
, "Error converting binding back to string for (stripped down)");
70 * Compare to a stripped down version of the binding string because
71 * the protocol tower doesn't contain the extra option data
73 * We remove all options except of the endpoint.
79 p2
= strchr(p
+ 1, ',');
82 * We only look at the first option,
83 * which might be the endpoint.
89 p2
= strchr(p
+ 1, '=');
92 * It's not the endpoint, so remove the
93 * whole option section.
99 s2
= dcerpc_binding_string(mem_ctx
, b2
);
100 torture_assert(tctx
, s
!= NULL
, "Error converting binding back to string");
102 host
= dcerpc_binding_get_string_option(b
, "host");
103 if (host
&& is_ipaddress_v4(host
)) {
104 torture_assert_casestr_equal(tctx
, s
, s2
, "Mismatch while comparing original and from protocol tower generated binding strings");
110 static const char *test_strings
[] = {
113 "ncalrpc:[,Security=Sane]",
114 "ncacn_np:[rpcecho]",
115 "ncacn_np:127.0.0.1[rpcecho]",
116 "ncacn_ip_tcp:127.0.0.1",
117 "ncacn_ip_tcp:127.0.0.1[20]",
118 "ncacn_ip_tcp:127.0.0.1[20,sign]",
119 "ncacn_ip_tcp:127.0.0.1[20,sign,Security=Foobar]",
120 "ncacn_http:127.0.0.1",
121 "ncacn_http:127.0.0.1[78]",
122 "ncacn_http:127.0.0.1[78,ProxyServer=myproxy:3128]",
123 "ncacn_np:localhost[rpcecho]",
124 "ncacn_np:[/pipe/rpcecho]",
125 "ncacn_np:localhost[/pipe/rpcecho,sign,seal]",
128 "308FB580-1EB2-11CA-923B-08002B1075A7@ncacn_np:localhost",
129 "308FB580-1EB2-11CA-923B-08002B1075A7@ncacn_ip_tcp:127.0.0.1",
130 "ncacn_unix_stream:[/tmp/epmapper]",
131 "ncalrpc:[IDENTIFIER]",
132 "ncacn_unix_stream:[/tmp/epmapper,sign]",
133 "ncacn_ip_tcp:127.0.0.1[75,target_hostname=port75.example.com,target_principal=host/port75.example.com]",
134 "ncacn_ip_tcp:127.0.0.1[75,connect,target_hostname=port75.example.com,target_principal=host/port75.example.com,assoc_group_id=0x01234567]",
135 "ncacn_ip_tcp:127.0.0.1[75,packet,target_hostname=port75.example.com,target_principal=host/port75.example.com,assoc_group_id=0x01234567]",
137 "ncacn_ip_tcp:::[75]",
138 "ncacn_ip_tcp:FD00::5357:5F00",
139 "ncacn_ip_tcp:FD00::5357:5F00[75]",
140 "ncacn_ip_tcp:FD00::5357:5F00[,target_hostname=port75.example.com]",
141 "ncacn_ip_tcp:FD00::5357:5F00[75,target_hostname=port75.example.com]",
142 "ncacn_ip_tcp:fe80::5357:5F00%75",
143 "ncacn_ip_tcp:fe80::5357:5F00%75[75]",
144 "ncacn_ip_tcp:fe80::5357:5F00%75[,target_hostname=port75.example.com]",
145 "ncacn_ip_tcp:fe80::5357:5F00%75[75,target_hostname=port75.example.com]",
148 static bool test_parse_check_results(struct torture_context
*tctx
)
150 struct dcerpc_binding
*b
;
153 struct ndr_syntax_id abstract
;
154 enum dcerpc_transport_t transport
;
155 const char *endpoint
;
158 torture_assert_ntstatus_ok(tctx
,
159 GUID_from_string("308FB580-1EB2-11CA-923B-08002B1075A7", &uuid
),
162 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
, "ncacn_np:$SERVER", &b
), "parse");
163 transport
= dcerpc_binding_get_transport(b
);
164 torture_assert(tctx
, transport
== NCACN_NP
, "ncacn_np expected");
165 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
, "ncacn_ip_tcp:$SERVER", &b
), "parse");
166 transport
= dcerpc_binding_get_transport(b
);
167 torture_assert(tctx
, transport
== NCACN_IP_TCP
, "ncacn_ip_tcp expected");
168 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
, "ncacn_np:$SERVER[rpcecho]", &b
), "parse");
169 endpoint
= dcerpc_binding_get_string_option(b
, "endpoint");
170 torture_assert_str_equal(tctx
, endpoint
, "rpcecho", "endpoint");
171 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
, "ncacn_np:$SERVER[/pipe/rpcecho]", &b
), "parse");
172 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
, "ncacn_np:$SERVER[/pipe/rpcecho,sign,seal]", &b
), "parse");
173 flags
= dcerpc_binding_get_flags(b
);
174 torture_assert(tctx
, flags
== DCERPC_SIGN
+DCERPC_SEAL
, "sign+seal flags");
175 endpoint
= dcerpc_binding_get_string_option(b
, "endpoint");
176 torture_assert_str_equal(tctx
, endpoint
, "/pipe/rpcecho", "endpoint");
177 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
, "ncacn_np:$SERVER[,sign]", &b
), "parse");
178 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
, "ncacn_ip_tcp:$SERVER[,sign]", &b
), "parse");
179 endpoint
= dcerpc_binding_get_string_option(b
, "endpoint");
180 torture_assert(tctx
, endpoint
== NULL
, "endpoint");
181 flags
= dcerpc_binding_get_flags(b
);
182 torture_assert(tctx
, flags
== DCERPC_SIGN
, "sign flag");
183 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
, "ncalrpc:", &b
), "parse");
184 transport
= dcerpc_binding_get_transport(b
);
185 torture_assert(tctx
, transport
== NCALRPC
, "ncalrpc expected");
186 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
,
187 "308FB580-1EB2-11CA-923B-08002B1075A7@ncacn_np:$SERVER", &b
), "parse");
188 object
= dcerpc_binding_get_object(b
);
189 abstract
= dcerpc_binding_get_abstract_syntax(b
);
190 torture_assert(tctx
, GUID_equal(&object
, &uuid
), "object uuid");
191 torture_assert(tctx
, ndr_syntax_id_equal(&abstract
, &ndr_syntax_id_null
),
192 "null abstract syntax");
193 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
,
194 "308FB580-1EB2-11CA-923B-08002B1075A7@ncacn_ip_tcp:$SERVER", &b
), "parse");
195 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
, "ncacn_ip_tcp:$SERVER[,sign,localaddress=192.168.1.1]", &b
), "parse");
196 transport
= dcerpc_binding_get_transport(b
);
197 torture_assert(tctx
, transport
== NCACN_IP_TCP
, "ncacn_ip_tcp expected");
198 flags
= dcerpc_binding_get_flags(b
);
199 torture_assert(tctx
, flags
== DCERPC_SIGN
, "sign flag");
200 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "localaddress"),
201 "192.168.1.1", "localaddress");
202 torture_assert_str_equal(tctx
, "ncacn_ip_tcp:$SERVER[,sign,localaddress=192.168.1.1]",
203 dcerpc_binding_string(tctx
, b
), "back to string");
204 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "host"),
206 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "target_hostname"),
207 "$SERVER", "target_hostname");
209 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
,
210 "ncacn_ip_tcp:$HOST[,target_hostname=$HOSTNAME,target_principal=$PRINCIPAL]",
212 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "host"),
214 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "target_hostname"),
215 "$HOSTNAME", "target_hostname");
216 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "target_principal"),
217 "$PRINCIPAL", "target_principal");
218 torture_assert_str_equal(tctx
,
219 dcerpc_binding_string(tctx
, b
),
220 "ncacn_ip_tcp:$HOST[,target_hostname=$HOSTNAME,target_principal=$PRINCIPAL]",
223 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
,
224 "ncacn_ip_tcp:$HOST[,connect,target_hostname=$HOSTNAME,target_principal=$PRINCIPAL,assoc_group_id=0x01234567]",
226 flags
= dcerpc_binding_get_flags(b
);
227 torture_assert(tctx
, flags
== DCERPC_CONNECT
, "connect flag");
228 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "host"),
230 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "target_hostname"),
231 "$HOSTNAME", "target_hostname");
232 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "target_principal"),
233 "$PRINCIPAL", "target_principal");
234 torture_assert_int_equal(tctx
, dcerpc_binding_get_assoc_group_id(b
), 0x01234567,
236 torture_assert_str_equal(tctx
,
237 dcerpc_binding_string(tctx
, b
),
238 "ncacn_ip_tcp:$HOST[,connect,target_hostname=$HOSTNAME,target_principal=$PRINCIPAL,assoc_group_id=0x01234567]",
241 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
,
242 "ncacn_ip_tcp:$HOST[,packet,target_hostname=$HOSTNAME,target_principal=$PRINCIPAL,assoc_group_id=0x01234567]",
244 flags
= dcerpc_binding_get_flags(b
);
245 torture_assert(tctx
, flags
== DCERPC_PACKET
, "packet flag");
246 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "host"),
248 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "target_hostname"),
249 "$HOSTNAME", "target_hostname");
250 torture_assert_str_equal(tctx
, dcerpc_binding_get_string_option(b
, "target_principal"),
251 "$PRINCIPAL", "target_principal");
252 torture_assert_int_equal(tctx
, dcerpc_binding_get_assoc_group_id(b
), 0x01234567,
254 torture_assert_str_equal(tctx
,
255 dcerpc_binding_string(tctx
, b
),
256 "ncacn_ip_tcp:$HOST[,packet,target_hostname=$HOSTNAME,target_principal=$PRINCIPAL,assoc_group_id=0x01234567]",
262 static bool test_no_transport(struct torture_context
*tctx
, const void *test_data
)
264 const char *binding
= test_data
;
265 struct dcerpc_binding
*b
;
266 enum dcerpc_transport_t transport
;
270 torture_assert_ntstatus_ok(tctx
, dcerpc_parse_binding(tctx
, binding
, &b
),
271 "Error parsing binding string");
273 transport
= dcerpc_binding_get_transport(b
);
274 torture_assert(tctx
, transport
== NCA_UNKNOWN
, "invalid transport");
276 s
= dcerpc_binding_string(tctx
, b
);
277 torture_assert(tctx
, s
!= NULL
, "Error converting binding back to string");
279 torture_assert_casestr_equal(tctx
, binding
, s
,
280 "Mismatch while comparing original and regenerated binding strings");
285 static const char *test_no_strings
[] = {
286 "port75.example.com",
287 "port75.example.com[75]",
290 "127.0.0.1[,target_hostname=port75.example.com]",
291 "127.0.0.1[75,target_hostname=port75.example.com]",
294 "::[,target_hostname=port75.example.com]",
295 "::[75,target_hostname=port75.example.com]",
297 "FD00::5357:5F00[75]",
298 "FD00::5357:5F00[,target_hostname=port75.example.com]",
299 "FD00::5357:5F00[75,target_hostname=port75.example.com]",
300 "fe80::5357:5F00%75",
301 "fe80::5357:5F00%75[75]",
302 "fe80::5357:5F00%75[,target_hostname=port75.example.com]",
303 "fe80::5357:5F00%75[75,target_hostname=port75.example.com]",
306 struct torture_suite
*torture_local_binding_string(TALLOC_CTX
*mem_ctx
)
309 struct torture_suite
*suite
= torture_suite_create(mem_ctx
, "binding");
311 for (i
= 0; i
< ARRAY_SIZE(test_strings
); i
++) {
312 torture_suite_add_simple_tcase_const(suite
, test_strings
[i
],
317 for (i
= 0; i
< ARRAY_SIZE(test_no_strings
); i
++) {
318 torture_suite_add_simple_tcase_const(suite
, test_no_strings
[i
],
323 torture_suite_add_simple_test(suite
, "parsing results",
324 test_parse_check_results
);