Convert mtime from a time_t to a struct timespec.
[Samba.git] / source4 / torture / rpc / backupkey.c
blob0f389462e10b89dc647475e10ef439934772d805
1 /*
2 Unix SMB/CIFS implementation.
3 test suite for backupkey remote protocol rpc operations
5 Copyright (C) Matthieu Patou 2010-2011
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "includes.h"
22 #include "../libcli/security/security.h"
23 #include "librpc/gen_ndr/ndr_backupkey_c.h"
24 #include "librpc/gen_ndr/ndr_backupkey.h"
25 #include "librpc/gen_ndr/ndr_lsa_c.h"
26 #include "torture/rpc/torture_rpc.h"
27 #include "lib/cmdline/popt_common.h"
28 #include "heimdal/lib/hx509/hx_locl.h"
30 /* Our very special and valued secret */
31 /* No need to put const as we cast the array in uint8_t
32 * we will get a warning about the discared const
34 static const char secret[] = "tata yoyo mais qu'est ce qu'il y a sous ton grand chapeau ?";
36 /* Get the SID from a user */
37 static const struct dom_sid *get_user_sid(struct torture_context *tctx,
38 struct dcerpc_pipe *p,
39 TALLOC_CTX *mem_ctx,
40 const char *user)
42 struct lsa_ObjectAttribute attr;
43 struct lsa_QosInfo qos;
44 struct lsa_OpenPolicy2 r;
45 struct lsa_Close c;
46 NTSTATUS status;
47 struct policy_handle handle;
48 struct lsa_LookupNames l;
49 struct lsa_TransSidArray sids;
50 struct lsa_RefDomainList *domains = NULL;
51 struct lsa_String lsa_name;
52 uint32_t count = 0;
53 struct dom_sid *result;
54 TALLOC_CTX *tmp_ctx;
55 struct dcerpc_pipe *p2;
56 struct dcerpc_binding_handle *b;
58 const char *domain = cli_credentials_get_domain(cmdline_credentials);
60 torture_assert_ntstatus_ok(tctx,
61 torture_rpc_connection(tctx, &p2, &ndr_table_lsarpc),
62 "could not open lsarpc pipe");
63 b = p2->binding_handle;
65 if (!(tmp_ctx = talloc_new(mem_ctx))) {
66 return NULL;
68 qos.len = 0;
69 qos.impersonation_level = 2;
70 qos.context_mode = 1;
71 qos.effective_only = 0;
73 attr.len = 0;
74 attr.root_dir = NULL;
75 attr.object_name = NULL;
76 attr.attributes = 0;
77 attr.sec_desc = NULL;
78 attr.sec_qos = &qos;
80 r.in.system_name = "\\";
81 r.in.attr = &attr;
82 r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
83 r.out.handle = &handle;
85 status = dcerpc_lsa_OpenPolicy2_r(b, tmp_ctx, &r);
86 if (!NT_STATUS_IS_OK(status)) {
87 torture_comment(tctx,
88 "OpenPolicy2 failed - %s\n",
89 nt_errstr(status));
90 talloc_free(tmp_ctx);
91 return NULL;
93 if (!NT_STATUS_IS_OK(r.out.result)) {
94 torture_comment(tctx,
95 "OpenPolicy2_ failed - %s\n",
96 nt_errstr(r.out.result));
97 talloc_free(tmp_ctx);
98 return NULL;
101 sids.count = 0;
102 sids.sids = NULL;
104 lsa_name.string = talloc_asprintf(tmp_ctx, "%s\\%s", domain, user);
106 l.in.handle = &handle;
107 l.in.num_names = 1;
108 l.in.names = &lsa_name;
109 l.in.sids = &sids;
110 l.in.level = 1;
111 l.in.count = &count;
112 l.out.count = &count;
113 l.out.sids = &sids;
114 l.out.domains = &domains;
116 status = dcerpc_lsa_LookupNames_r(b, tmp_ctx, &l);
117 if (!NT_STATUS_IS_OK(status)) {
118 torture_comment(tctx,
119 "LookupNames of %s failed - %s\n",
120 lsa_name.string,
121 nt_errstr(status));
122 talloc_free(tmp_ctx);
123 return NULL;
126 if (domains->count == 0) {
127 return NULL;
130 result = dom_sid_add_rid(mem_ctx,
131 domains->domains[0].sid,
132 l.out.sids->sids[0].rid);
133 c.in.handle = &handle;
134 c.out.handle = &handle;
136 status = dcerpc_lsa_Close_r(b, tmp_ctx, &c);
138 if (!NT_STATUS_IS_OK(status)) {
139 torture_comment(tctx,
140 "dcerpc_lsa_Close failed - %s\n",
141 nt_errstr(status));
142 talloc_free(tmp_ctx);
143 return NULL;
146 if (!NT_STATUS_IS_OK(c.out.result)) {
147 torture_comment(tctx,
148 "dcerpc_lsa_Close failed - %s\n",
149 nt_errstr(c.out.result));
150 talloc_free(tmp_ctx);
151 return NULL;
154 talloc_free(tmp_ctx);
155 talloc_free(p2);
157 torture_comment(tctx, "Get_user_sid finished\n");
158 return result;
162 * Create a bkrp_encrypted_secret_vX structure
163 * the version depends on the version parameter
164 * the structure is returned as a blob.
165 * The broken flag is to indicate if we want
166 * to create a non conform to specification structre
168 static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
169 bool broken,
170 int version)
172 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
173 DATA_BLOB *blob = talloc_zero(mem_ctx, DATA_BLOB);
174 enum ndr_err_code ndr_err;
176 if (version == 2) {
177 struct bkrp_encrypted_secret_v2 unenc_sec;
179 ZERO_STRUCT(unenc_sec);
180 unenc_sec.secret_len = sizeof(secret);
181 unenc_sec.secret = discard_const_p(uint8_t, secret);
182 generate_random_buffer(unenc_sec.payload_key,
183 sizeof(unenc_sec.payload_key));
185 ndr_err = ndr_push_struct_blob(blob, blob, &unenc_sec,
186 (ndr_push_flags_fn_t)ndr_push_bkrp_encrypted_secret_v2);
187 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
188 return NULL;
191 if (broken) {
192 /* The magic value is correctly set by the NDR push
193 * but we want to test the behavior of the server
194 * if a differrent value is provided
196 ((uint8_t*)blob->data)[4] = 79; /* A great year !!! */
200 if (version == 3) {
201 struct bkrp_encrypted_secret_v3 unenc_sec;
203 ZERO_STRUCT(unenc_sec);
204 unenc_sec.secret_len = sizeof(secret);
205 unenc_sec.secret = discard_const_p(uint8_t, secret);
206 generate_random_buffer(unenc_sec.payload_key,
207 sizeof(unenc_sec.payload_key));
209 ndr_err = ndr_push_struct_blob(blob, blob, &unenc_sec,
210 (ndr_push_flags_fn_t)ndr_push_bkrp_encrypted_secret_v3);
211 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
212 return NULL;
215 if (broken) {
217 * The magic value is correctly set by the NDR push
218 * but we want to test the behavior of the server
219 * if a differrent value is provided
221 ((uint8_t*)blob->data)[4] = 79; /* A great year !!! */
224 talloc_free(tmp_ctx);
225 return blob;
229 * Create an access check structure, the format depends on the version parameter.
230 * If broken is specified then we create a stucture that isn't conform to the
231 * specification.
233 * If the structure can't be created then NULL is returned.
235 static DATA_BLOB *create_access_check(struct torture_context *tctx,
236 struct dcerpc_pipe *p,
237 TALLOC_CTX *mem_ctx,
238 const char *user,
239 bool broken,
240 uint32_t version)
242 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
243 DATA_BLOB *blob = talloc_zero(mem_ctx, DATA_BLOB);
244 enum ndr_err_code ndr_err;
245 const struct dom_sid *sid = get_user_sid(tctx, p, tmp_ctx, user);
247 if (sid == NULL) {
248 return NULL;
251 if (version == 2) {
252 struct bkrp_access_check_v2 access_struct;
253 struct sha sctx;
254 uint8_t nonce[32];
256 ZERO_STRUCT(access_struct);
257 generate_random_buffer(nonce, sizeof(nonce));
258 access_struct.nonce_len = sizeof(nonce);
259 access_struct.nonce = nonce;
260 access_struct.sid = *sid;
262 ndr_err = ndr_push_struct_blob(blob, blob, &access_struct,
263 (ndr_push_flags_fn_t)ndr_push_bkrp_access_check_v2);
264 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
265 return NULL;
269 * We pushed the whole structure including a null hash
270 * but the hash need to be calculated only up to the hash field
271 * so we reduce the size of what has to be calculated
274 SHA1_Init(&sctx);
275 SHA1_Update(&sctx, blob->data,
276 blob->length - sizeof(access_struct.hash));
277 SHA1_Final(blob->data + blob->length - sizeof(access_struct.hash),
278 &sctx);
280 /* Altering the SHA */
281 if (broken) {
282 blob->data[blob->length - 1]++;
286 if (version == 3) {
287 struct bkrp_access_check_v3 access_struct;
288 struct hc_sha512state sctx;
289 uint8_t nonce[32];
291 ZERO_STRUCT(access_struct);
292 generate_random_buffer(nonce, sizeof(nonce));
293 access_struct.nonce_len = sizeof(nonce);
294 access_struct.nonce = nonce;
295 access_struct.sid = *sid;
297 ndr_err = ndr_push_struct_blob(blob, blob, &access_struct,
298 (ndr_push_flags_fn_t)ndr_push_bkrp_access_check_v3);
299 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
300 return NULL;
303 /*We pushed the whole structure including a null hash
304 * but the hash need to be calculated only up to the hash field
305 * so we reduce the size of what has to be calculated
308 SHA512_Init(&sctx);
309 SHA512_Update(&sctx, blob->data,
310 blob->length - sizeof(access_struct.hash));
311 SHA512_Final(blob->data + blob->length - sizeof(access_struct.hash),
312 &sctx);
314 /* Altering the SHA */
315 if (broken) {
316 blob->data[blob->length -1]++;
319 talloc_free(tmp_ctx);
320 return blob;
324 static DATA_BLOB *encrypt_blob(struct torture_context *tctx,
325 TALLOC_CTX *mem_ctx,
326 DATA_BLOB *key,
327 DATA_BLOB *iv,
328 DATA_BLOB *to_encrypt,
329 const AlgorithmIdentifier *alg)
331 hx509_crypto crypto;
332 hx509_context hctx;
333 heim_octet_string ivos;
334 heim_octet_string *encrypted;
335 DATA_BLOB *blob = talloc_zero(mem_ctx, DATA_BLOB);
336 int res;
338 ivos.data = talloc_array(mem_ctx, uint8_t, iv->length);
339 ivos.length = iv->length;
340 memcpy(ivos.data, iv->data, iv->length);
342 hx509_context_init(&hctx);
343 res = hx509_crypto_init(hctx, NULL, &alg->algorithm, &crypto);
344 if (res) {
345 torture_comment(tctx,
346 "error while doing the init of the crypto object\n");
347 hx509_context_free(&hctx);
348 return NULL;
350 res = hx509_crypto_set_key_data(crypto, key->data, key->length);
351 if (res) {
352 torture_comment(tctx,
353 "error while setting the key of the crypto object\n");
354 hx509_context_free(&hctx);
355 return NULL;
358 hx509_crypto_set_padding(crypto, HX509_CRYPTO_PADDING_NONE);
359 res = hx509_crypto_encrypt(crypto,
360 to_encrypt->data,
361 to_encrypt->length,
362 &ivos,
363 &encrypted);
364 if (res) {
365 torture_comment(tctx, "error while encrypting\n");
366 hx509_crypto_destroy(crypto);
367 hx509_context_free(&hctx);
368 return NULL;
371 *blob = data_blob_talloc(blob, encrypted->data, encrypted->length);
372 der_free_octet_string(encrypted);
373 free(encrypted);
374 hx509_crypto_destroy(crypto);
375 hx509_context_free(&hctx);
376 return blob;
380 * Certs used for this protocol have a GUID in the issuer_uniq_id field.
381 * This function fetch it.
383 static struct GUID *get_cert_guid(struct torture_context *tctx,
384 TALLOC_CTX *mem_ctx,
385 uint8_t *cert_data,
386 uint32_t cert_len)
388 hx509_context hctx;
389 hx509_cert cert;
390 heim_bit_string subjectuniqid;
391 DATA_BLOB data;
392 int hret;
393 uint32_t size;
394 struct GUID *guid = talloc_zero(mem_ctx, struct GUID);
395 NTSTATUS status;
397 hx509_context_init(&hctx);
399 hret = hx509_cert_init_data(hctx, cert_data, cert_len, &cert);
400 if (hret) {
401 torture_comment(tctx, "error while loading the cert\n");
402 hx509_context_free(&hctx);
403 return NULL;
405 hret = hx509_cert_get_issuer_unique_id(hctx, cert, &subjectuniqid);
406 if (hret) {
407 torture_comment(tctx, "error while getting the issuer_uniq_id\n");
408 hx509_cert_free(cert);
409 hx509_context_free(&hctx);
410 return NULL;
413 /* The subjectuniqid is a bit string,
414 * which means that the real size has to be divided by 8
415 * to have the number of bytes
417 hx509_cert_free(cert);
418 hx509_context_free(&hctx);
419 size = subjectuniqid.length / 8;
420 data = data_blob_const(subjectuniqid.data, size);
422 status = GUID_from_data_blob(&data, guid);
423 der_free_bit_string(&subjectuniqid);
424 if (!NT_STATUS_IS_OK(status)) {
425 return NULL;
428 return guid;
432 * Encrypt a blob with the private key of the certificate
433 * passed as a parameter.
435 static DATA_BLOB *encrypt_blob_pk(struct torture_context *tctx,
436 TALLOC_CTX *mem_ctx,
437 uint8_t *cert_data,
438 uint32_t cert_len,
439 DATA_BLOB *to_encrypt)
441 hx509_context hctx;
442 hx509_cert cert;
443 heim_octet_string secretdata;
444 heim_octet_string encrypted;
445 heim_oid encryption_oid;
446 DATA_BLOB *blob;
447 int hret;
449 hx509_context_init(&hctx);
451 hret = hx509_cert_init_data(hctx, cert_data, cert_len, &cert);
452 if (hret) {
453 torture_comment(tctx, "error while loading the cert\n");
454 hx509_context_free(&hctx);
455 return NULL;
458 secretdata.data = to_encrypt->data;
459 secretdata.length = to_encrypt->length;
460 hret = hx509_cert_public_encrypt(hctx, &secretdata,
461 cert, &encryption_oid,
462 &encrypted);
463 hx509_cert_free(cert);
464 hx509_context_free(&hctx);
465 if (hret) {
466 torture_comment(tctx, "error while encrypting\n");
467 return NULL;
470 blob = talloc_zero(mem_ctx, DATA_BLOB);
471 if (blob == NULL) {
472 der_free_oid(&encryption_oid);
473 der_free_octet_string(&encrypted);
474 return NULL;
477 *blob = data_blob_talloc(blob, encrypted.data, encrypted.length);
478 der_free_octet_string(&encrypted);
479 der_free_oid(&encryption_oid);
480 if (blob->data == NULL) {
481 return NULL;
484 return blob;
488 static struct bkrp_BackupKey *createRetreiveBackupKeyGUIDStruct(struct torture_context *tctx,
489 struct dcerpc_pipe *p, int version, DATA_BLOB *out)
491 struct dcerpc_binding *binding = p->binding;
492 struct bkrp_client_side_wrapped data;
493 struct GUID *g = talloc(tctx, struct GUID);
494 struct bkrp_BackupKey *r = talloc_zero(tctx, struct bkrp_BackupKey);
495 enum ndr_err_code ndr_err;
496 DATA_BLOB blob;
497 NTSTATUS status;
499 if (r == NULL) {
500 return NULL;
503 binding->flags = binding->flags & (DCERPC_SEAL|DCERPC_AUTH_SPNEGO);
504 ZERO_STRUCT(data);
505 status = GUID_from_string(BACKUPKEY_RETRIEVE_BACKUP_KEY_GUID, g);
506 if (!NT_STATUS_IS_OK(status)) {
507 return NULL;
510 r->in.guidActionAgent = g;
511 data.version = version;
512 ndr_err = ndr_push_struct_blob(&blob, tctx, &data,
513 (ndr_push_flags_fn_t)ndr_push_bkrp_client_side_wrapped);
514 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
515 return NULL;
517 r->in.data_in = blob.data;
518 r->in.data_in_len = blob.length;
519 r->out.data_out = &out->data;
520 r->out.data_out_len = talloc(r, uint32_t);
521 return r;
524 static struct bkrp_BackupKey *createRestoreGUIDStruct(struct torture_context *tctx,
525 struct dcerpc_pipe *p, int version, DATA_BLOB *out,
526 bool norevert,
527 bool broken_version,
528 bool broken_user,
529 bool broken_magic_secret,
530 bool broken_magic_access,
531 bool broken_hash_access,
532 bool broken_cert_guid)
534 struct dcerpc_binding_handle *b = p->binding_handle;
535 struct bkrp_client_side_wrapped data;
536 DATA_BLOB *xs;
537 DATA_BLOB *sec;
538 DATA_BLOB *enc_sec;
539 DATA_BLOB *enc_xs;
540 DATA_BLOB *blob2;
541 DATA_BLOB enc_sec_reverted;
542 DATA_BLOB des3_key;
543 DATA_BLOB aes_key;
544 DATA_BLOB iv;
545 DATA_BLOB out_blob;
546 struct GUID *guid, *g;
547 int t;
548 uint32_t size;
549 enum ndr_err_code ndr_err;
550 NTSTATUS status;
551 const char *user;
552 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, version, &out_blob);
553 if (r == NULL) {
554 return NULL;
557 if (broken_user) {
558 /* we take a fake user*/
559 user = "guest";
560 } else {
561 user = cli_credentials_get_username(cmdline_credentials);
565 torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
566 "Get GUID");
568 * We have to set it outside of the function createRetreiveBackupKeyGUIDStruct
569 * the len of the blob, this is due to the fact that they don't have the
570 * same size (one is 32bits the other 64bits)
572 out_blob.length = *r->out.data_out_len;
574 sec = create_unencryptedsecret(tctx, broken_magic_secret, version);
575 if (sec == NULL) {
576 return NULL;
579 xs = create_access_check(tctx, p, tctx, user, broken_hash_access, version);
580 if (xs == NULL) {
581 return NULL;
584 if (broken_magic_access){
585 /* The start of the access_check structure contains the
586 * GUID of the certificate
588 xs->data[0]++;
591 enc_sec = encrypt_blob_pk(tctx, tctx, out_blob.data, out_blob.length, sec);
592 if (!enc_sec) {
593 return NULL;
595 enc_sec_reverted.data = talloc_array(tctx, uint8_t, enc_sec->length);
596 if (enc_sec_reverted.data == NULL) {
597 return NULL;
599 enc_sec_reverted.length = enc_sec->length;
602 * We DO NOT revert the array on purpose it's in order to check that
603 * when the server is not able to decrypt then it answer the correct error
605 if (norevert) {
606 for(t=0; t< enc_sec->length; t++) {
607 enc_sec_reverted.data[t] = ((uint8_t*)enc_sec->data)[t];
609 } else {
610 for(t=0; t< enc_sec->length; t++) {
611 enc_sec_reverted.data[t] = ((uint8_t*)enc_sec->data)[enc_sec->length - t -1];
615 size = sec->length;
616 if (version ==2) {
617 const AlgorithmIdentifier *alg = hx509_crypto_des_rsdi_ede3_cbc();
618 iv.data = sec->data+(size - 8);
619 iv.length = 8;
621 des3_key.data = sec->data+(size - 32);
622 des3_key.length = 24;
624 enc_xs = encrypt_blob(tctx, tctx, &des3_key, &iv, xs, alg);
626 if (version == 3) {
627 const AlgorithmIdentifier *alg = hx509_crypto_aes256_cbc();
628 iv.data = sec->data+(size-16);
629 iv.length = 16;
631 aes_key.data = sec->data+(size-48);
632 aes_key.length = 32;
634 enc_xs = encrypt_blob(tctx, tctx, &aes_key, &iv, xs, alg);
637 if (!enc_xs) {
638 return NULL;
641 /* To cope with the fact that heimdal do padding at the end for the moment */
642 enc_xs->length = xs->length;
644 guid = get_cert_guid(tctx, tctx, out_blob.data, out_blob.length);
645 if (guid == NULL) {
646 return NULL;
649 if (broken_version) {
650 data.version = 1;
651 } else {
652 data.version = version;
655 data.guid = *guid;
656 data.encrypted_secret = enc_sec_reverted.data;
657 data.access_check = enc_xs->data;
658 data.encrypted_secret_len = enc_sec->length;
659 data.access_check_len = enc_xs->length;
661 /* We want the blob to persist after this function so we don't
662 * allocate it in the stack
664 blob2 = talloc(tctx, DATA_BLOB);
665 if (blob2 == NULL) {
666 return NULL;
669 ndr_err = ndr_push_struct_blob(blob2, tctx, &data,
670 (ndr_push_flags_fn_t)ndr_push_bkrp_client_side_wrapped);
671 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
672 return NULL;
675 if (broken_cert_guid) {
676 blob2->data[12]++;
679 ZERO_STRUCT(*r);
681 g = talloc(tctx, struct GUID);
682 if (g == NULL) {
683 return NULL;
686 status = GUID_from_string(BACKUPKEY_RESTORE_GUID, g);
687 if (!NT_STATUS_IS_OK(status)) {
688 return NULL;
691 r->in.guidActionAgent = g;
692 r->in.data_in = blob2->data;
693 r->in.data_in_len = blob2->length;
694 r->in.param = 0;
695 r->out.data_out = &(out->data);
696 r->out.data_out_len = talloc(r, uint32_t);
697 return r;
700 /* Check that we are able to receive the certificate of the DCs
701 * used for client wrap version of the backup key protocol
703 static bool test_RetreiveBackupKeyGUID(struct torture_context *tctx,
704 struct dcerpc_pipe *p)
706 struct dcerpc_binding_handle *b = p->binding_handle;
707 DATA_BLOB out_blob;
708 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
710 if (r == NULL) {
711 return false;
714 if (p->conn->security_state.auth_info != NULL &&
715 p->conn->security_state.auth_info->auth_level == 6) {
716 torture_assert_ntstatus_ok(tctx,
717 dcerpc_bkrp_BackupKey_r(b, tctx, r),
718 "Get GUID");
720 out_blob.length = *r->out.data_out_len;
721 torture_assert_werr_equal(tctx,
722 r->out.result,
723 WERR_OK,
724 "Wrong dce/rpc error code");
725 } else {
726 torture_assert_ntstatus_equal(tctx,
727 dcerpc_bkrp_BackupKey_r(b, tctx, r),
728 NT_STATUS_ACCESS_DENIED,
729 "Get GUID");
731 return true;
734 /* Test to check the failure to recover a secret because the
735 * secret blob is not reversed
737 static bool test_RestoreGUID_ko(struct torture_context *tctx,
738 struct dcerpc_pipe *p)
740 enum ndr_err_code ndr_err;
741 struct dcerpc_binding_handle *b = p->binding_handle;
742 DATA_BLOB out_blob;
743 struct bkrp_client_side_unwrapped resp;
745 if (p->conn->security_state.auth_info != NULL &&
746 p->conn->security_state.auth_info->auth_level == 6) {
747 struct bkrp_BackupKey *r = createRestoreGUIDStruct(tctx, p, 2, &out_blob,
748 true, false, false, false, false, false, false);
749 torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
750 out_blob.length = *r->out.data_out_len;
751 ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
752 torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 0, "Unable to unmarshall bkrp_client_side_unwrapped");
753 torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_DATA, "Wrong error code");
754 } else {
755 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
756 torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
757 NT_STATUS_ACCESS_DENIED, "Get GUID");
759 return true;
762 static bool test_RestoreGUID_wrongversion(struct torture_context *tctx,
763 struct dcerpc_pipe *p)
765 enum ndr_err_code ndr_err;
766 struct dcerpc_binding_handle *b = p->binding_handle;
767 DATA_BLOB out_blob;
768 struct bkrp_client_side_unwrapped resp;
770 if (p->conn->security_state.auth_info != NULL &&
771 p->conn->security_state.auth_info->auth_level == 6) {
772 struct bkrp_BackupKey *r = createRestoreGUIDStruct(tctx, p, 2, &out_blob,
773 false, true, false, false, false, false, false);
774 torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
775 out_blob.length = *r->out.data_out_len;
776 ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
777 torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 0, "Unable to unmarshall bkrp_client_side_unwrapped");
778 torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, "Wrong error code on wrong version");
779 } else {
780 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
781 torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
782 NT_STATUS_ACCESS_DENIED, "Get GUID");
784 return true;
787 static bool test_RestoreGUID_wronguser(struct torture_context *tctx,
788 struct dcerpc_pipe *p)
790 enum ndr_err_code ndr_err;
791 struct dcerpc_binding_handle *b = p->binding_handle;
792 DATA_BLOB out_blob;
793 struct bkrp_client_side_unwrapped resp;
795 if (p->conn->security_state.auth_info != NULL &&
796 p->conn->security_state.auth_info->auth_level == 6) {
797 struct bkrp_BackupKey *r = createRestoreGUIDStruct(tctx, p, 2, &out_blob,
798 false, false, true, false, false, false, false);
799 torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
800 out_blob.length = *r->out.data_out_len;
801 ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
802 torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 0, "Unable to unmarshall bkrp_client_side_unwrapped");
803 torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_ACCESS, "Restore GUID");
804 } else {
805 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
806 torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
807 NT_STATUS_ACCESS_DENIED, "Get GUID");
809 return true;
812 static bool test_RestoreGUID_v3(struct torture_context *tctx,
813 struct dcerpc_pipe *p)
815 enum ndr_err_code ndr_err;
816 struct dcerpc_binding_handle *b = p->binding_handle;
817 DATA_BLOB out_blob;
818 struct bkrp_client_side_unwrapped resp;
820 if (p->conn->security_state.auth_info != NULL &&
821 p->conn->security_state.auth_info->auth_level == 6) {
822 struct bkrp_BackupKey *r = createRestoreGUIDStruct(tctx, p, 3, &out_blob,
823 false, false, false, false, false, false, false);
824 torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
825 out_blob.length = *r->out.data_out_len;
826 ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
827 torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 1, "Unable to unmarshall bkrp_client_side_unwrapped");
828 torture_assert_werr_equal(tctx, r->out.result, WERR_OK, "Restore GUID");
829 torture_assert_str_equal(tctx, (char*)resp.secret.data, secret, "Wrong secret");
830 } else {
831 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
832 torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
833 NT_STATUS_ACCESS_DENIED, "Get GUID");
835 return true;
838 static bool test_RestoreGUID(struct torture_context *tctx,
839 struct dcerpc_pipe *p)
841 enum ndr_err_code ndr_err;
842 struct dcerpc_binding_handle *b = p->binding_handle;
843 DATA_BLOB out_blob;
844 struct bkrp_client_side_unwrapped resp;
846 if (p->conn->security_state.auth_info != NULL &&
847 p->conn->security_state.auth_info->auth_level == 6) {
848 struct bkrp_BackupKey *r = createRestoreGUIDStruct(tctx, p, 2, &out_blob,
849 false, false, false, false, false, false, false);
850 torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
851 out_blob.length = *r->out.data_out_len;
852 ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
853 torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 1, "Unable to unmarshall bkrp_client_side_unwrapped");
854 torture_assert_werr_equal(tctx, r->out.result, WERR_OK, "Restore GUID");
855 torture_assert_str_equal(tctx, (char*)resp.secret.data, secret, "Wrong secret");
856 } else {
857 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
858 torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
859 NT_STATUS_ACCESS_DENIED, "Get GUID");
861 return true;
864 static bool test_RestoreGUID_badmagiconsecret(struct torture_context *tctx,
865 struct dcerpc_pipe *p)
867 enum ndr_err_code ndr_err;
868 struct dcerpc_binding_handle *b = p->binding_handle;
869 DATA_BLOB out_blob;
870 struct bkrp_client_side_unwrapped resp;
872 if (p->conn->security_state.auth_info != NULL &&
873 p->conn->security_state.auth_info->auth_level == 6) {
874 struct bkrp_BackupKey *r = createRestoreGUIDStruct(tctx, p, 3, &out_blob,
875 false, false, false, true, false, false, false);
876 torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
877 out_blob.length = *r->out.data_out_len;
878 ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
879 torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 0, "Unable to unmarshall bkrp_client_side_unwrapped");
880 torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_DATA, "Wrong error code while providing bad magic in secret");
881 } else {
882 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
883 torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
884 NT_STATUS_ACCESS_DENIED, "Get GUID");
886 return true;
889 static bool test_RestoreGUID_emptyrequest(struct torture_context *tctx,
890 struct dcerpc_pipe *p)
892 struct dcerpc_binding_handle *b = p->binding_handle;
893 DATA_BLOB out_blob;
895 if (p->conn->security_state.auth_info != NULL &&
896 p->conn->security_state.auth_info->auth_level == 6) {
897 struct bkrp_BackupKey *r = createRestoreGUIDStruct(tctx, p, 3, &out_blob,
898 false, false, false, true, false, false, true);
900 torture_assert_int_equal(tctx, r != NULL, 1, "Error while creating the restoreGUID struct");
901 r->in.data_in = talloc(tctx, uint8_t);
902 r->in.data_in_len = 0;
903 r->in.param = 0;
904 torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
905 out_blob.length = *r->out.data_out_len;
906 torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_PARAM, "Bad error code on wrong has in access check");
907 } else {
908 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
909 torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
910 NT_STATUS_ACCESS_DENIED, "Get GUID");
912 return true;
915 static bool test_RestoreGUID_badcertguid(struct torture_context *tctx,
916 struct dcerpc_pipe *p)
918 enum ndr_err_code ndr_err;
919 struct dcerpc_binding_handle *b = p->binding_handle;
920 DATA_BLOB out_blob;
921 struct bkrp_client_side_unwrapped resp;
923 if (p->conn->security_state.auth_info != NULL &&
924 p->conn->security_state.auth_info->auth_level == 6) {
925 struct bkrp_BackupKey *r = createRestoreGUIDStruct(tctx, p, 3, &out_blob,
926 false, false, false, false, false, false, true);
927 torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
928 out_blob.length = *r->out.data_out_len;
929 ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
930 torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 0, "Unable to unmarshall bkrp_client_side_unwrapped");
931 torture_assert_werr_equal(tctx, r->out.result, WERR_FILE_NOT_FOUND, "Bad error code on wrong has in access check");
932 } else {
933 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
934 torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
935 NT_STATUS_ACCESS_DENIED, "Get GUID");
937 return true;
940 static bool test_RestoreGUID_badmagicaccesscheck(struct torture_context *tctx,
941 struct dcerpc_pipe *p)
943 enum ndr_err_code ndr_err;
944 struct dcerpc_binding_handle *b = p->binding_handle;
945 DATA_BLOB out_blob;
946 struct bkrp_client_side_unwrapped resp;
948 if (p->conn->security_state.auth_info != NULL &&
949 p->conn->security_state.auth_info->auth_level == 6) {
950 struct bkrp_BackupKey *r = createRestoreGUIDStruct(tctx, p, 2, &out_blob,
951 false, false, false, false, true, false, false);
952 torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
953 out_blob.length = *r->out.data_out_len;
954 ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
955 torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 0, "Unable to unmarshall bkrp_client_side_unwrapped");
956 torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_DATA, "Bad error code on wrong has in access check");
957 } else {
958 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
959 torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
960 NT_STATUS_ACCESS_DENIED, "Get GUID");
962 return true;
965 static bool test_RestoreGUID_badhashaccesscheck(struct torture_context *tctx,
966 struct dcerpc_pipe *p)
968 enum ndr_err_code ndr_err;
969 struct dcerpc_binding_handle *b = p->binding_handle;
970 DATA_BLOB out_blob;
971 struct bkrp_client_side_unwrapped resp;
973 if (p->conn->security_state.auth_info != NULL &&
974 p->conn->security_state.auth_info->auth_level == 6) {
975 struct bkrp_BackupKey *r = createRestoreGUIDStruct(tctx, p, 2, &out_blob,
976 false, false, false, false, false, true, false);
977 torture_assert_ntstatus_ok(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r), "Restore GUID");
978 out_blob.length = *r->out.data_out_len;
979 ndr_err = ndr_pull_struct_blob(&out_blob, tctx, &resp, (ndr_pull_flags_fn_t)ndr_pull_bkrp_client_side_unwrapped);
980 torture_assert_int_equal(tctx, NDR_ERR_CODE_IS_SUCCESS(ndr_err), 0, "Unable to unmarshall bkrp_client_side_unwrapped");
981 torture_assert_werr_equal(tctx, r->out.result, WERR_INVALID_DATA, "Bad error code on wrong has in access check");
982 } else {
983 struct bkrp_BackupKey *r = createRetreiveBackupKeyGUIDStruct(tctx, p, 2, &out_blob);
984 torture_assert_ntstatus_equal(tctx, dcerpc_bkrp_BackupKey_r(b, tctx, r),
985 NT_STATUS_ACCESS_DENIED, "Get GUID");
987 return true;
990 struct torture_suite *torture_rpc_backupkey(TALLOC_CTX *mem_ctx)
992 struct torture_rpc_tcase *tcase;
993 struct torture_suite *suite = torture_suite_create(mem_ctx, "backupkey");
994 struct torture_test *test;
996 tcase = torture_suite_add_rpc_iface_tcase(suite, "backupkey",
997 &ndr_table_backupkey);
999 test = torture_rpc_tcase_add_test(tcase, "retreive_backup_key_guid",
1000 test_RetreiveBackupKeyGUID);
1002 test = torture_rpc_tcase_add_test(tcase, "restore_guid",
1003 test_RestoreGUID);
1005 test = torture_rpc_tcase_add_test(tcase, "restore_guid version 3",
1006 test_RestoreGUID_v3);
1008 /* We double the test in order to be sure that we don't mess stuff (ie. freeing static stuff */
1010 test = torture_rpc_tcase_add_test(tcase, "restore_guid_2nd",
1011 test_RestoreGUID);
1013 test = torture_rpc_tcase_add_test(tcase, "unable_to_decrypt_secret",
1014 test_RestoreGUID_ko);
1016 test = torture_rpc_tcase_add_test(tcase, "wrong_user_restore_guid",
1017 test_RestoreGUID_wronguser);
1019 test = torture_rpc_tcase_add_test(tcase, "wrong_version_restore_guid",
1020 test_RestoreGUID_wrongversion);
1022 test = torture_rpc_tcase_add_test(tcase, "bad_magic_on_secret_restore_guid",
1023 test_RestoreGUID_badmagiconsecret);
1025 test = torture_rpc_tcase_add_test(tcase, "bad_hash_on_secret_restore_guid",
1026 test_RestoreGUID_badhashaccesscheck);
1028 test = torture_rpc_tcase_add_test(tcase, "bad_magic_on_accesscheck_restore_guid",
1029 test_RestoreGUID_badmagicaccesscheck);
1031 test = torture_rpc_tcase_add_test(tcase, "bad_cert_guid_restore_guid",
1032 test_RestoreGUID_badcertguid);
1034 test = torture_rpc_tcase_add_test(tcase, "empty_request_restore_guid",
1035 test_RestoreGUID_emptyrequest);
1037 return suite;