sync machine password to keytab: handle FreeIPA use case
[Samba.git] / source4 / torture / rpc / mgmt.c
blobe873d4bb9acf3dce75a33aa0cc1a26b0007d1d42
1 /*
2 Unix SMB/CIFS implementation.
3 test suite for mgmt rpc operations
5 Copyright (C) Andrew Tridgell 2003
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "includes.h"
22 #include "librpc/gen_ndr/ndr_mgmt_c.h"
23 #include "auth/gensec/gensec.h"
24 #include "librpc/ndr/ndr_table.h"
25 #include "torture/rpc/torture_rpc.h"
26 #include "param/param.h"
30 ask the server what interface IDs are available on this endpoint
32 bool test_inq_if_ids(struct torture_context *tctx,
33 struct dcerpc_binding_handle *b,
34 TALLOC_CTX *mem_ctx,
35 bool (*per_id_test)(struct torture_context *,
36 const struct ndr_interface_table *iface,
37 TALLOC_CTX *mem_ctx,
38 struct ndr_syntax_id *id),
39 const void *priv)
41 struct mgmt_inq_if_ids r;
42 struct rpc_if_id_vector_t *vector;
43 int i;
45 vector = talloc(mem_ctx, struct rpc_if_id_vector_t);
46 r.out.if_id_vector = &vector;
48 torture_assert_ntstatus_ok(tctx,
49 dcerpc_mgmt_inq_if_ids_r(b, mem_ctx, &r),
50 "inq_if_ids failed");
52 torture_assert_werr_ok(tctx,
53 r.out.result,
54 "inq_if_ids gave unexpected error code");
56 if (!vector) {
57 torture_comment(tctx, "inq_if_ids gave NULL if_id_vector\n");
58 return false;
61 for (i=0;i<vector->count;i++) {
62 struct ndr_syntax_id *id = vector->if_id[i].id;
63 if (!id) continue;
65 torture_comment(tctx, "\tuuid %s version 0x%08x '%s'\n",
66 GUID_string(mem_ctx, &id->uuid),
67 id->if_version,
68 ndr_interface_name(&id->uuid, id->if_version));
70 if (per_id_test) {
71 per_id_test(tctx, priv, mem_ctx, id);
75 return true;
78 static bool test_inq_stats(struct torture_context *tctx,
79 struct dcerpc_binding_handle *b,
80 TALLOC_CTX *mem_ctx)
82 struct mgmt_inq_stats r;
83 struct mgmt_statistics statistics;
85 r.in.max_count = MGMT_STATS_ARRAY_MAX_SIZE;
86 r.in.unknown = 0;
87 r.out.statistics = &statistics;
89 torture_assert_ntstatus_ok(tctx,
90 dcerpc_mgmt_inq_stats_r(b, mem_ctx, &r),
91 "inq_stats failed");
93 if (statistics.count != MGMT_STATS_ARRAY_MAX_SIZE) {
94 torture_comment(tctx, "Unexpected array size %d\n", statistics.count);
95 return false;
98 torture_comment(tctx, "\tcalls_in %6d calls_out %6d\n\tpkts_in %6d pkts_out %6d\n",
99 statistics.statistics[MGMT_STATS_CALLS_IN],
100 statistics.statistics[MGMT_STATS_CALLS_OUT],
101 statistics.statistics[MGMT_STATS_PKTS_IN],
102 statistics.statistics[MGMT_STATS_PKTS_OUT]);
104 return true;
107 static bool test_inq_princ_name_size(struct torture_context *tctx,
108 struct dcerpc_binding_handle *b,
109 uint32_t authn_proto,
110 const char *expected_princ_name)
112 struct mgmt_inq_princ_name r;
113 uint32_t len, i;
115 len = strlen(expected_princ_name);
117 r.in.authn_proto = authn_proto;
120 * 0 gives NT_STATUS_RPC_BAD_STUB_DATA
122 r.in.princ_name_size = 0;
124 torture_assert_ntstatus_equal(tctx,
125 dcerpc_mgmt_inq_princ_name_r(b, tctx, &r),
126 NT_STATUS_RPC_BAD_STUB_DATA,
127 "mgmt_inq_princ_name failed");
129 for (i=1; i <= len; i++) {
130 r.in.princ_name_size = i;
132 torture_assert_ntstatus_ok(tctx,
133 dcerpc_mgmt_inq_princ_name_r(b, tctx, &r),
134 "mgmt_inq_princ_name failed");
135 torture_assert_werr_equal(tctx,
136 r.out.result,
137 WERR_INSUFFICIENT_BUFFER,
138 "mgmt_inq_princ_name failed");
141 r.in.princ_name_size = len + 1;
143 torture_assert_ntstatus_ok(tctx,
144 dcerpc_mgmt_inq_princ_name_r(b, tctx, &r),
145 "mgmt_inq_princ_name failed");
146 torture_assert_werr_ok(tctx,
147 r.out.result,
148 "mgmt_inq_princ_name failed");
150 return true;
153 static bool test_inq_princ_name(struct torture_context *tctx,
154 struct dcerpc_binding_handle *b,
155 TALLOC_CTX *mem_ctx)
157 NTSTATUS status;
158 struct mgmt_inq_princ_name r;
159 int i;
160 bool ret = false;
162 for (i=0;i<256;i++) {
163 r.in.authn_proto = i; /* DCERPC_AUTH_TYPE_* */
164 r.in.princ_name_size = 100;
166 status = dcerpc_mgmt_inq_princ_name_r(b, mem_ctx, &r);
167 if (!NT_STATUS_IS_OK(status)) {
168 continue;
170 if (W_ERROR_IS_OK(r.out.result)) {
171 const char *name = gensec_get_name_by_authtype(NULL, i);
172 ret = true;
173 if (name) {
174 torture_comment(tctx, "\tprinciple name for proto %u (%s) is '%s'\n",
175 i, name, r.out.princ_name);
176 } else {
177 torture_comment(tctx, "\tprinciple name for proto %u is '%s'\n",
178 i, r.out.princ_name);
181 switch (i) {
182 case DCERPC_AUTH_TYPE_KRB5:
183 case DCERPC_AUTH_TYPE_NTLMSSP:
184 case DCERPC_AUTH_TYPE_SPNEGO:
185 torture_assert(tctx,
186 test_inq_princ_name_size(tctx, b, i, r.out.princ_name),
187 "failed");
188 break;
189 case DCERPC_AUTH_TYPE_SCHANNEL:
191 * for some reason schannel behaves differently
194 default:
195 break;
200 if (!ret) {
201 torture_comment(tctx, "\tno principle names?\n");
204 return true;
207 static bool test_is_server_listening(struct torture_context *tctx,
208 struct dcerpc_binding_handle *b,
209 TALLOC_CTX *mem_ctx)
211 struct mgmt_is_server_listening r;
212 r.out.status = talloc(mem_ctx, uint32_t);
214 torture_assert_ntstatus_ok(tctx,
215 dcerpc_mgmt_is_server_listening_r(b, mem_ctx, &r),
216 "is_server_listening failed");
218 if (*r.out.status != 0 || r.out.result == 0) {
219 torture_comment(tctx, "\tserver is NOT listening\n");
220 } else {
221 torture_comment(tctx, "\tserver is listening\n");
224 return true;
227 static bool test_stop_server_listening(struct torture_context *tctx,
228 struct dcerpc_binding_handle *b,
229 TALLOC_CTX *mem_ctx)
231 struct mgmt_stop_server_listening r;
233 torture_assert_ntstatus_ok(tctx,
234 dcerpc_mgmt_stop_server_listening_r(b, mem_ctx, &r),
235 "stop_server_listening failed");
237 if (!W_ERROR_IS_OK(r.out.result)) {
238 torture_comment(tctx, "\tserver refused to stop listening - %s\n", win_errstr(r.out.result));
239 } else {
240 torture_comment(tctx, "\tserver allowed a stop_server_listening request\n");
241 return false;
244 return true;
248 bool torture_rpc_mgmt(struct torture_context *tctx)
250 NTSTATUS status;
251 struct dcerpc_pipe *p;
252 TALLOC_CTX *mem_ctx, *loop_ctx;
253 bool ret = true;
254 const struct ndr_interface_list *l;
255 struct dcerpc_binding *b;
257 mem_ctx = talloc_init("torture_rpc_mgmt");
259 status = torture_rpc_binding(tctx, &b);
260 if (!NT_STATUS_IS_OK(status)) {
261 talloc_free(mem_ctx);
262 return false;
265 for (l=ndr_table_list();l;l=l->next) {
266 struct dcerpc_binding_handle *bh;
268 loop_ctx = talloc_named(mem_ctx, 0, "torture_rpc_mgmt loop context");
270 /* some interfaces are not mappable */
271 if (l->table->num_calls == 0 ||
272 strcmp(l->table->name, "mgmt") == 0) {
273 talloc_free(loop_ctx);
274 continue;
277 torture_comment(tctx, "\nTesting pipe '%s'\n", l->table->name);
279 status = dcerpc_epm_map_binding(loop_ctx, b, l->table,
280 tctx->ev, tctx->lp_ctx);
281 if (!NT_STATUS_IS_OK(status)) {
282 torture_comment(tctx, "Failed to map port for uuid %s\n",
283 GUID_string(loop_ctx, &l->table->syntax_id.uuid));
284 talloc_free(loop_ctx);
285 continue;
288 lpcfg_set_cmdline(tctx->lp_ctx, "torture:binding", dcerpc_binding_string(loop_ctx, b));
290 status = torture_rpc_connection(tctx, &p, &ndr_table_mgmt);
291 if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
292 torture_comment(tctx, "Interface not available - skipping\n");
293 talloc_free(loop_ctx);
294 continue;
297 if (!NT_STATUS_IS_OK(status)) {
298 talloc_free(loop_ctx);
299 torture_comment(tctx, "Interface not available (%s) - skipping\n", nt_errstr(status));
300 ret = false;
301 continue;
303 bh = p->binding_handle;
305 if (!test_is_server_listening(tctx, bh, loop_ctx)) {
306 ret = false;
309 if (!test_stop_server_listening(tctx, bh, loop_ctx)) {
310 ret = false;
313 if (!test_inq_stats(tctx, bh, loop_ctx)) {
314 ret = false;
317 if (!test_inq_princ_name(tctx, bh, loop_ctx)) {
318 ret = false;
321 if (!test_inq_if_ids(tctx, bh, loop_ctx, NULL, NULL)) {
322 ret = false;
327 return ret;