2 Unix SMB/CIFS implementation.
3 test suite for mgmt rpc operations
5 Copyright (C) Andrew Tridgell 2003
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "librpc/gen_ndr/ndr_mgmt_c.h"
23 #include "auth/gensec/gensec.h"
24 #include "librpc/ndr/ndr_table.h"
25 #include "torture/rpc/torture_rpc.h"
26 #include "param/param.h"
30 ask the server what interface IDs are available on this endpoint
32 bool test_inq_if_ids(struct torture_context
*tctx
,
33 struct dcerpc_binding_handle
*b
,
35 bool (*per_id_test
)(struct torture_context
*,
36 const struct ndr_interface_table
*iface
,
38 struct ndr_syntax_id
*id
),
41 struct mgmt_inq_if_ids r
;
42 struct rpc_if_id_vector_t
*vector
;
45 vector
= talloc(mem_ctx
, struct rpc_if_id_vector_t
);
46 r
.out
.if_id_vector
= &vector
;
48 torture_assert_ntstatus_ok(tctx
,
49 dcerpc_mgmt_inq_if_ids_r(b
, mem_ctx
, &r
),
52 torture_assert_werr_ok(tctx
,
54 "inq_if_ids gave unexpected error code");
57 torture_comment(tctx
, "inq_if_ids gave NULL if_id_vector\n");
61 for (i
=0;i
<vector
->count
;i
++) {
62 struct ndr_syntax_id
*id
= vector
->if_id
[i
].id
;
65 torture_comment(tctx
, "\tuuid %s version 0x%08x '%s'\n",
66 GUID_string(mem_ctx
, &id
->uuid
),
68 ndr_interface_name(&id
->uuid
, id
->if_version
));
71 per_id_test(tctx
, priv
, mem_ctx
, id
);
78 static bool test_inq_stats(struct torture_context
*tctx
,
79 struct dcerpc_binding_handle
*b
,
82 struct mgmt_inq_stats r
;
83 struct mgmt_statistics statistics
;
85 r
.in
.max_count
= MGMT_STATS_ARRAY_MAX_SIZE
;
87 r
.out
.statistics
= &statistics
;
89 torture_assert_ntstatus_ok(tctx
,
90 dcerpc_mgmt_inq_stats_r(b
, mem_ctx
, &r
),
93 if (statistics
.count
!= MGMT_STATS_ARRAY_MAX_SIZE
) {
94 torture_comment(tctx
, "Unexpected array size %d\n", statistics
.count
);
98 torture_comment(tctx
, "\tcalls_in %6d calls_out %6d\n\tpkts_in %6d pkts_out %6d\n",
99 statistics
.statistics
[MGMT_STATS_CALLS_IN
],
100 statistics
.statistics
[MGMT_STATS_CALLS_OUT
],
101 statistics
.statistics
[MGMT_STATS_PKTS_IN
],
102 statistics
.statistics
[MGMT_STATS_PKTS_OUT
]);
107 static bool test_inq_princ_name_size(struct torture_context
*tctx
,
108 struct dcerpc_binding_handle
*b
,
109 uint32_t authn_proto
,
110 const char *expected_princ_name
)
112 struct mgmt_inq_princ_name r
;
115 len
= strlen(expected_princ_name
);
117 r
.in
.authn_proto
= authn_proto
;
120 * 0 gives NT_STATUS_RPC_BAD_STUB_DATA
122 r
.in
.princ_name_size
= 0;
124 torture_assert_ntstatus_equal(tctx
,
125 dcerpc_mgmt_inq_princ_name_r(b
, tctx
, &r
),
126 NT_STATUS_RPC_BAD_STUB_DATA
,
127 "mgmt_inq_princ_name failed");
129 for (i
=1; i
<= len
; i
++) {
130 r
.in
.princ_name_size
= i
;
132 torture_assert_ntstatus_ok(tctx
,
133 dcerpc_mgmt_inq_princ_name_r(b
, tctx
, &r
),
134 "mgmt_inq_princ_name failed");
135 torture_assert_werr_equal(tctx
,
137 WERR_INSUFFICIENT_BUFFER
,
138 "mgmt_inq_princ_name failed");
141 r
.in
.princ_name_size
= len
+ 1;
143 torture_assert_ntstatus_ok(tctx
,
144 dcerpc_mgmt_inq_princ_name_r(b
, tctx
, &r
),
145 "mgmt_inq_princ_name failed");
146 torture_assert_werr_ok(tctx
,
148 "mgmt_inq_princ_name failed");
153 static bool test_inq_princ_name(struct torture_context
*tctx
,
154 struct dcerpc_binding_handle
*b
,
158 struct mgmt_inq_princ_name r
;
162 for (i
=0;i
<256;i
++) {
163 r
.in
.authn_proto
= i
; /* DCERPC_AUTH_TYPE_* */
164 r
.in
.princ_name_size
= 100;
166 status
= dcerpc_mgmt_inq_princ_name_r(b
, mem_ctx
, &r
);
167 if (!NT_STATUS_IS_OK(status
)) {
170 if (W_ERROR_IS_OK(r
.out
.result
)) {
171 const char *name
= gensec_get_name_by_authtype(NULL
, i
);
174 torture_comment(tctx
, "\tprinciple name for proto %u (%s) is '%s'\n",
175 i
, name
, r
.out
.princ_name
);
177 torture_comment(tctx
, "\tprinciple name for proto %u is '%s'\n",
178 i
, r
.out
.princ_name
);
182 case DCERPC_AUTH_TYPE_KRB5
:
183 case DCERPC_AUTH_TYPE_NTLMSSP
:
184 case DCERPC_AUTH_TYPE_SPNEGO
:
186 test_inq_princ_name_size(tctx
, b
, i
, r
.out
.princ_name
),
189 case DCERPC_AUTH_TYPE_SCHANNEL
:
191 * for some reason schannel behaves differently
201 torture_comment(tctx
, "\tno principle names?\n");
207 static bool test_is_server_listening(struct torture_context
*tctx
,
208 struct dcerpc_binding_handle
*b
,
211 struct mgmt_is_server_listening r
;
212 r
.out
.status
= talloc(mem_ctx
, uint32_t);
214 torture_assert_ntstatus_ok(tctx
,
215 dcerpc_mgmt_is_server_listening_r(b
, mem_ctx
, &r
),
216 "is_server_listening failed");
218 if (*r
.out
.status
!= 0 || r
.out
.result
== 0) {
219 torture_comment(tctx
, "\tserver is NOT listening\n");
221 torture_comment(tctx
, "\tserver is listening\n");
227 static bool test_stop_server_listening(struct torture_context
*tctx
,
228 struct dcerpc_binding_handle
*b
,
231 struct mgmt_stop_server_listening r
;
233 torture_assert_ntstatus_ok(tctx
,
234 dcerpc_mgmt_stop_server_listening_r(b
, mem_ctx
, &r
),
235 "stop_server_listening failed");
237 if (!W_ERROR_IS_OK(r
.out
.result
)) {
238 torture_comment(tctx
, "\tserver refused to stop listening - %s\n", win_errstr(r
.out
.result
));
240 torture_comment(tctx
, "\tserver allowed a stop_server_listening request\n");
248 bool torture_rpc_mgmt(struct torture_context
*tctx
)
251 struct dcerpc_pipe
*p
;
252 TALLOC_CTX
*mem_ctx
, *loop_ctx
;
254 const struct ndr_interface_list
*l
;
255 struct dcerpc_binding
*b
;
257 mem_ctx
= talloc_init("torture_rpc_mgmt");
259 status
= torture_rpc_binding(tctx
, &b
);
260 if (!NT_STATUS_IS_OK(status
)) {
261 talloc_free(mem_ctx
);
265 for (l
=ndr_table_list();l
;l
=l
->next
) {
266 struct dcerpc_binding_handle
*bh
;
268 loop_ctx
= talloc_named(mem_ctx
, 0, "torture_rpc_mgmt loop context");
270 /* some interfaces are not mappable */
271 if (l
->table
->num_calls
== 0 ||
272 strcmp(l
->table
->name
, "mgmt") == 0) {
273 talloc_free(loop_ctx
);
277 torture_comment(tctx
, "\nTesting pipe '%s'\n", l
->table
->name
);
279 status
= dcerpc_epm_map_binding(loop_ctx
, b
, l
->table
,
280 tctx
->ev
, tctx
->lp_ctx
);
281 if (!NT_STATUS_IS_OK(status
)) {
282 torture_comment(tctx
, "Failed to map port for uuid %s\n",
283 GUID_string(loop_ctx
, &l
->table
->syntax_id
.uuid
));
284 talloc_free(loop_ctx
);
288 lpcfg_set_cmdline(tctx
->lp_ctx
, "torture:binding", dcerpc_binding_string(loop_ctx
, b
));
290 status
= torture_rpc_connection(tctx
, &p
, &ndr_table_mgmt
);
291 if (NT_STATUS_EQUAL(status
, NT_STATUS_OBJECT_NAME_NOT_FOUND
)) {
292 torture_comment(tctx
, "Interface not available - skipping\n");
293 talloc_free(loop_ctx
);
297 if (!NT_STATUS_IS_OK(status
)) {
298 talloc_free(loop_ctx
);
299 torture_comment(tctx
, "Interface not available (%s) - skipping\n", nt_errstr(status
));
303 bh
= p
->binding_handle
;
305 if (!test_is_server_listening(tctx
, bh
, loop_ctx
)) {
309 if (!test_stop_server_listening(tctx
, bh
, loop_ctx
)) {
313 if (!test_inq_stats(tctx
, bh
, loop_ctx
)) {
317 if (!test_inq_princ_name(tctx
, bh
, loop_ctx
)) {
321 if (!test_inq_if_ids(tctx
, bh
, loop_ctx
, NULL
, NULL
)) {