2 Unix SMB/CIFS implementation.
3 test suite for mgmt rpc operations
5 Copyright (C) Andrew Tridgell 2003
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "librpc/gen_ndr/ndr_mgmt_c.h"
23 #include "auth/gensec/gensec.h"
24 #include "librpc/ndr/ndr_table.h"
25 #include "torture/rpc/torture_rpc.h"
26 #include "param/param.h"
30 ask the server what interface IDs are available on this endpoint
32 bool test_inq_if_ids(struct torture_context
*tctx
,
33 struct dcerpc_binding_handle
*b
,
35 bool (*per_id_test
)(struct torture_context
*,
36 const struct ndr_interface_table
*iface
,
38 struct ndr_syntax_id
*id
),
41 struct mgmt_inq_if_ids r
;
42 struct rpc_if_id_vector_t
*vector
;
45 vector
= talloc(mem_ctx
, struct rpc_if_id_vector_t
);
46 r
.out
.if_id_vector
= &vector
;
48 torture_assert_ntstatus_ok(tctx
,
49 dcerpc_mgmt_inq_if_ids_r(b
, mem_ctx
, &r
),
52 torture_assert_werr_ok(tctx
,
54 "inq_if_ids gave unexpected error code");
57 torture_comment(tctx
, "inq_if_ids gave NULL if_id_vector\n");
61 for (i
=0;i
<vector
->count
;i
++) {
62 struct ndr_syntax_id
*id
= vector
->if_id
[i
].id
;
65 torture_comment(tctx
, "\tuuid %s version 0x%08x '%s'\n",
66 GUID_string(mem_ctx
, &id
->uuid
),
68 ndr_interface_name(&id
->uuid
, id
->if_version
));
71 per_id_test(tctx
, priv
, mem_ctx
, id
);
78 static bool test_inq_stats(struct torture_context
*tctx
,
79 struct dcerpc_binding_handle
*b
,
82 struct mgmt_inq_stats r
;
83 struct mgmt_statistics statistics
;
85 r
.in
.max_count
= MGMT_STATS_ARRAY_MAX_SIZE
;
87 r
.out
.statistics
= &statistics
;
89 torture_assert_ntstatus_ok(tctx
,
90 dcerpc_mgmt_inq_stats_r(b
, mem_ctx
, &r
),
93 if (statistics
.count
!= MGMT_STATS_ARRAY_MAX_SIZE
) {
94 torture_comment(tctx
, "Unexpected array size %d\n", statistics
.count
);
98 torture_comment(tctx
, "\tcalls_in %6d calls_out %6d\n\tpkts_in %6d pkts_out %6d\n",
99 statistics
.statistics
[MGMT_STATS_CALLS_IN
],
100 statistics
.statistics
[MGMT_STATS_CALLS_OUT
],
101 statistics
.statistics
[MGMT_STATS_PKTS_IN
],
102 statistics
.statistics
[MGMT_STATS_PKTS_OUT
]);
107 static bool test_inq_princ_name_size(struct torture_context
*tctx
,
108 struct dcerpc_binding_handle
*b
,
109 uint32_t authn_proto
,
110 const char *expected_princ_name
)
112 struct mgmt_inq_princ_name r
;
115 len
= strlen(expected_princ_name
);
117 r
.in
.authn_proto
= authn_proto
;
120 * 0 gives NT_STATUS_RPC_BAD_STUB_DATA
123 for (i
=1; i
<= len
; i
++) {
124 r
.in
.princ_name_size
= i
;
126 torture_assert_ntstatus_ok(tctx
,
127 dcerpc_mgmt_inq_princ_name_r(b
, tctx
, &r
),
128 "mgmt_inq_princ_name failed");
129 torture_assert_werr_equal(tctx
,
131 WERR_INSUFFICIENT_BUFFER
,
132 "mgmt_inq_princ_name failed");
135 r
.in
.princ_name_size
= len
+ 1;
137 torture_assert_ntstatus_ok(tctx
,
138 dcerpc_mgmt_inq_princ_name_r(b
, tctx
, &r
),
139 "mgmt_inq_princ_name failed");
140 torture_assert_werr_ok(tctx
,
142 "mgmt_inq_princ_name failed");
147 static bool test_inq_princ_name(struct torture_context
*tctx
,
148 struct dcerpc_binding_handle
*b
,
152 struct mgmt_inq_princ_name r
;
156 for (i
=0;i
<256;i
++) {
157 r
.in
.authn_proto
= i
; /* DCERPC_AUTH_TYPE_* */
158 r
.in
.princ_name_size
= 100;
160 status
= dcerpc_mgmt_inq_princ_name_r(b
, mem_ctx
, &r
);
161 if (!NT_STATUS_IS_OK(status
)) {
164 if (W_ERROR_IS_OK(r
.out
.result
)) {
165 const char *name
= gensec_get_name_by_authtype(NULL
, i
);
168 torture_comment(tctx
, "\tprinciple name for proto %u (%s) is '%s'\n",
169 i
, name
, r
.out
.princ_name
);
171 torture_comment(tctx
, "\tprinciple name for proto %u is '%s'\n",
172 i
, r
.out
.princ_name
);
176 case DCERPC_AUTH_TYPE_KRB5
:
177 case DCERPC_AUTH_TYPE_NTLMSSP
:
178 case DCERPC_AUTH_TYPE_SPNEGO
:
180 test_inq_princ_name_size(tctx
, b
, i
, r
.out
.princ_name
),
183 case DCERPC_AUTH_TYPE_SCHANNEL
:
185 * for some reason schannel behaves differently
195 torture_comment(tctx
, "\tno principle names?\n");
201 static bool test_is_server_listening(struct torture_context
*tctx
,
202 struct dcerpc_binding_handle
*b
,
205 struct mgmt_is_server_listening r
;
206 r
.out
.status
= talloc(mem_ctx
, uint32_t);
208 torture_assert_ntstatus_ok(tctx
,
209 dcerpc_mgmt_is_server_listening_r(b
, mem_ctx
, &r
),
210 "is_server_listening failed");
212 if (*r
.out
.status
!= 0 || r
.out
.result
== 0) {
213 torture_comment(tctx
, "\tserver is NOT listening\n");
215 torture_comment(tctx
, "\tserver is listening\n");
221 static bool test_stop_server_listening(struct torture_context
*tctx
,
222 struct dcerpc_binding_handle
*b
,
225 struct mgmt_stop_server_listening r
;
227 torture_assert_ntstatus_ok(tctx
,
228 dcerpc_mgmt_stop_server_listening_r(b
, mem_ctx
, &r
),
229 "stop_server_listening failed");
231 if (!W_ERROR_IS_OK(r
.out
.result
)) {
232 torture_comment(tctx
, "\tserver refused to stop listening - %s\n", win_errstr(r
.out
.result
));
234 torture_comment(tctx
, "\tserver allowed a stop_server_listening request\n");
242 bool torture_rpc_mgmt(struct torture_context
*tctx
)
245 struct dcerpc_pipe
*p
;
246 TALLOC_CTX
*mem_ctx
, *loop_ctx
;
248 const struct ndr_interface_list
*l
;
249 struct dcerpc_binding
*b
;
251 mem_ctx
= talloc_init("torture_rpc_mgmt");
253 status
= torture_rpc_binding(tctx
, &b
);
254 if (!NT_STATUS_IS_OK(status
)) {
255 talloc_free(mem_ctx
);
259 for (l
=ndr_table_list();l
;l
=l
->next
) {
260 struct dcerpc_binding_handle
*bh
;
262 loop_ctx
= talloc_named(mem_ctx
, 0, "torture_rpc_mgmt loop context");
264 /* some interfaces are not mappable */
265 if (l
->table
->num_calls
== 0 ||
266 strcmp(l
->table
->name
, "mgmt") == 0) {
267 talloc_free(loop_ctx
);
271 torture_comment(tctx
, "\nTesting pipe '%s'\n", l
->table
->name
);
273 status
= dcerpc_epm_map_binding(loop_ctx
, b
, l
->table
,
274 tctx
->ev
, tctx
->lp_ctx
);
275 if (!NT_STATUS_IS_OK(status
)) {
276 torture_comment(tctx
, "Failed to map port for uuid %s\n",
277 GUID_string(loop_ctx
, &l
->table
->syntax_id
.uuid
));
278 talloc_free(loop_ctx
);
282 lpcfg_set_cmdline(tctx
->lp_ctx
, "torture:binding", dcerpc_binding_string(loop_ctx
, b
));
284 status
= torture_rpc_connection(tctx
, &p
, &ndr_table_mgmt
);
285 if (NT_STATUS_EQUAL(status
, NT_STATUS_OBJECT_NAME_NOT_FOUND
)) {
286 torture_comment(tctx
, "Interface not available - skipping\n");
287 talloc_free(loop_ctx
);
291 if (!NT_STATUS_IS_OK(status
)) {
292 talloc_free(loop_ctx
);
293 torture_comment(tctx
, "Interface not available (%s) - skipping\n", nt_errstr(status
));
297 bh
= p
->binding_handle
;
299 if (!test_is_server_listening(tctx
, bh
, loop_ctx
)) {
303 if (!test_stop_server_listening(tctx
, bh
, loop_ctx
)) {
307 if (!test_inq_stats(tctx
, bh
, loop_ctx
)) {
311 if (!test_inq_princ_name(tctx
, bh
, loop_ctx
)) {
315 if (!test_inq_if_ids(tctx
, bh
, loop_ctx
, NULL
, NULL
)) {