libcli/smb: pass smbXcli_session to smb2cli_tcon_set_values()
[Samba/gebeck_regimport.git] / source3 / torture / test_smb2.c
blob79ffef19582e12041d7eb3d489e4a1cf9aa4b804
1 /*
2 Unix SMB/CIFS implementation.
3 Initial test for the smb2 client lib
4 Copyright (C) Volker Lendecke 2011
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
20 #include "includes.h"
21 #include "torture/proto.h"
22 #include "client.h"
23 #include "trans2.h"
24 #include "../libcli/smb/smbXcli_base.h"
25 #include "libsmb/smb2cli.h"
26 #include "libcli/security/security.h"
27 #include "libsmb/proto.h"
28 #include "auth/gensec/gensec.h"
29 #include "auth_generic.h"
31 extern fstring host, workgroup, share, password, username, myname;
33 bool run_smb2_basic(int dummy)
35 struct cli_state *cli;
36 NTSTATUS status;
37 uint64_t fid_persistent, fid_volatile;
38 const char *hello = "Hello, world\n";
39 uint8_t *result;
40 uint32_t nread;
41 uint8_t *dir_data;
42 uint32_t dir_data_length;
43 uint32_t saved_tid = 0;
44 struct smbXcli_tcon *saved_tcon = NULL;
45 uint64_t saved_uid = 0;
47 printf("Starting SMB2-BASIC\n");
49 if (!torture_init_connection(&cli)) {
50 return false;
53 status = smbXcli_negprot(cli->conn, cli->timeout,
54 PROTOCOL_SMB2_02, PROTOCOL_SMB2_02);
55 if (!NT_STATUS_IS_OK(status)) {
56 printf("smbXcli_negprot returned %s\n", nt_errstr(status));
57 return false;
60 status = cli_session_setup(cli, username,
61 password, strlen(password),
62 password, strlen(password),
63 workgroup);
64 if (!NT_STATUS_IS_OK(status)) {
65 printf("cli_session_setup returned %s\n", nt_errstr(status));
66 return false;
69 status = cli_tree_connect(cli, share, "?????", "", 0);
70 if (!NT_STATUS_IS_OK(status)) {
71 printf("cli_tree_connect returned %s\n", nt_errstr(status));
72 return false;
75 status = smb2cli_create(cli->conn, cli->timeout, cli->smb2.session,
76 cli->smb2.tcon, "smb2-basic.txt",
77 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
78 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
79 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
80 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
81 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
82 FILE_CREATE, /* create_disposition, */
83 FILE_DELETE_ON_CLOSE, /* create_options, */
84 NULL, /* smb2_create_blobs *blobs */
85 &fid_persistent,
86 &fid_volatile);
87 if (!NT_STATUS_IS_OK(status)) {
88 printf("smb2cli_create returned %s\n", nt_errstr(status));
89 return false;
92 status = smb2cli_write(cli->conn, cli->timeout, cli->smb2.session,
93 cli->smb2.tcon, strlen(hello), 0, fid_persistent,
94 fid_volatile, 0, 0, (const uint8_t *)hello);
95 if (!NT_STATUS_IS_OK(status)) {
96 printf("smb2cli_write returned %s\n", nt_errstr(status));
97 return false;
100 status = smb2cli_flush(cli->conn, cli->timeout, cli->smb2.session,
101 cli->smb2.tcon, fid_persistent, fid_volatile);
102 if (!NT_STATUS_IS_OK(status)) {
103 printf("smb2cli_flush returned %s\n", nt_errstr(status));
104 return false;
107 status = smb2cli_read(cli->conn, cli->timeout, cli->smb2.session,
108 cli->smb2.tcon, 0x10000, 0, fid_persistent,
109 fid_volatile, 2, 0,
110 talloc_tos(), &result, &nread);
111 if (!NT_STATUS_IS_OK(status)) {
112 printf("smb2cli_read returned %s\n", nt_errstr(status));
113 return false;
116 if (nread != strlen(hello)) {
117 printf("smb2cli_read returned %d bytes, expected %d\n",
118 (int)nread, (int)strlen(hello));
119 return false;
122 if (memcmp(hello, result, nread) != 0) {
123 printf("smb2cli_read returned '%s', expected '%s'\n",
124 result, hello);
125 return false;
128 status = smb2cli_close(cli->conn, cli->timeout, cli->smb2.session,
129 cli->smb2.tcon, 0, fid_persistent, fid_volatile);
130 if (!NT_STATUS_IS_OK(status)) {
131 printf("smb2cli_close returned %s\n", nt_errstr(status));
132 return false;
135 status = smb2cli_create(cli->conn, cli->timeout, cli->smb2.session,
136 cli->smb2.tcon, "",
137 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
138 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
139 SEC_STD_SYNCHRONIZE|
140 SEC_DIR_LIST|
141 SEC_DIR_READ_ATTRIBUTE, /* desired_access, */
142 0, /* file_attributes, */
143 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
144 FILE_OPEN, /* create_disposition, */
145 FILE_SYNCHRONOUS_IO_NONALERT|FILE_DIRECTORY_FILE, /* create_options, */
146 NULL, /* smb2_create_blobs *blobs */
147 &fid_persistent,
148 &fid_volatile);
149 if (!NT_STATUS_IS_OK(status)) {
150 printf("smb2cli_create returned %s\n", nt_errstr(status));
151 return false;
154 status = smb2cli_query_directory(
155 cli->conn, cli->timeout, cli->smb2.session, cli->smb2.tcon,
156 1, 0, 0, fid_persistent, fid_volatile, "*", 0xffff,
157 talloc_tos(), &dir_data, &dir_data_length);
159 if (!NT_STATUS_IS_OK(status)) {
160 printf("smb2cli_query_directory returned %s\n", nt_errstr(status));
161 return false;
164 status = smb2cli_close(cli->conn, cli->timeout, cli->smb2.session,
165 cli->smb2.tcon, 0, fid_persistent, fid_volatile);
166 if (!NT_STATUS_IS_OK(status)) {
167 printf("smb2cli_close returned %s\n", nt_errstr(status));
168 return false;
171 saved_tid = smb2cli_tcon_current_id(cli->smb2.tcon);
172 saved_tcon = cli->smb2.tcon;
173 cli->smb2.tcon = smbXcli_tcon_create(cli);
174 smb2cli_tcon_set_values(cli->smb2.tcon,
175 NULL, /* session */
176 saved_tid,
177 0, /* type */
178 0, /* flags */
179 0, /* capabilities */
180 0 /* maximal_access */);
181 status = smb2cli_tdis(cli);
182 if (!NT_STATUS_IS_OK(status)) {
183 printf("smb2cli_tdis returned %s\n", nt_errstr(status));
184 return false;
186 talloc_free(cli->smb2.tcon);
187 cli->smb2.tcon = saved_tcon;
189 status = smb2cli_tdis(cli);
190 if (!NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_NAME_DELETED)) {
191 printf("2nd smb2cli_tdis returned %s\n", nt_errstr(status));
192 return false;
195 saved_uid = smb2cli_session_current_id(cli->smb2.session);
196 status = smb2cli_logoff(cli->conn, cli->timeout, cli->smb2.session);
197 if (!NT_STATUS_IS_OK(status)) {
198 printf("smb2cli_logoff returned %s\n", nt_errstr(status));
199 return false;
202 cli->smb2.session = smbXcli_session_create(cli, cli->conn);
203 if (cli->smb2.session == NULL) {
204 printf("smbXcli_session_create() returned NULL\n");
205 return false;
208 smb2cli_session_set_id_and_flags(cli->smb2.session, saved_uid, 0);
210 status = smb2cli_logoff(cli->conn, cli->timeout, cli->smb2.session);
211 if (!NT_STATUS_EQUAL(status, NT_STATUS_USER_SESSION_DELETED)) {
212 printf("2nd smb2cli_logoff returned %s\n", nt_errstr(status));
213 return false;
216 return true;
219 bool run_smb2_negprot(int dummy)
221 struct cli_state *cli;
222 NTSTATUS status;
223 enum protocol_types protocol;
224 const char *name = NULL;
226 printf("Starting SMB2-NEGPROT\n");
228 if (!torture_init_connection(&cli)) {
229 return false;
232 status = smbXcli_negprot(cli->conn, cli->timeout,
233 PROTOCOL_CORE, PROTOCOL_LATEST);
234 if (!NT_STATUS_IS_OK(status)) {
235 printf("smbXcli_negprot returned %s\n", nt_errstr(status));
236 return false;
239 protocol = smbXcli_conn_protocol(cli->conn);
241 switch (protocol) {
242 case PROTOCOL_SMB2_02:
243 name = "SMB2_02";
244 break;
245 case PROTOCOL_SMB2_10:
246 name = "SMB2_10";
247 break;
248 case PROTOCOL_SMB2_22:
249 name = "SMB2_22";
250 break;
251 case PROTOCOL_SMB2_24:
252 name = "SMB2_24";
253 break;
254 case PROTOCOL_SMB3_00:
255 name = "SMB3_00";
256 break;
257 default:
258 break;
261 if (name) {
262 printf("Server supports %s\n", name);
263 } else {
264 printf("Server DOES NOT support SMB2\n");
265 return false;
268 status = smbXcli_negprot(cli->conn, cli->timeout,
269 protocol, protocol);
270 if (!NT_STATUS_EQUAL(status, NT_STATUS_CONNECTION_RESET) &&
271 !NT_STATUS_EQUAL(status, NT_STATUS_CONNECTION_DISCONNECTED) &&
272 !NT_STATUS_EQUAL(status, NT_STATUS_CONNECTION_ABORTED)) {
273 printf("2nd smbXcli_negprot should disconnect - returned %s\n",
274 nt_errstr(status));
275 return false;
278 if (smbXcli_conn_is_connected(cli->conn)) {
279 printf("2nd smbXcli_negprot should disconnect "
280 "- still connected\n");
281 return false;
284 return true;
287 bool run_smb2_session_reconnect(int dummy)
289 struct cli_state *cli1;
290 struct cli_state *cli2;
291 NTSTATUS status;
292 bool ok;
293 uint64_t fid_persistent, fid_volatile;
294 struct tevent_context *ev;
295 struct tevent_req *subreq;
296 DATA_BLOB in_blob = data_blob_null;
297 DATA_BLOB out_blob;
298 DATA_BLOB session_key;
299 struct auth_generic_state *auth_generic_state;
300 struct iovec *recv_iov;
301 const char *hello = "Hello, world\n";
302 uint8_t *result;
303 uint32_t nread;
305 printf("Starting SMB2-SESSION-RECONNECT\n");
307 if (!torture_init_connection(&cli1)) {
308 return false;
311 status = smbXcli_negprot(cli1->conn, cli1->timeout,
312 PROTOCOL_SMB2_02, PROTOCOL_LATEST);
313 if (!NT_STATUS_IS_OK(status)) {
314 printf("smbXcli_negprot returned %s\n", nt_errstr(status));
315 return false;
318 status = cli_session_setup(cli1, username,
319 password, strlen(password),
320 password, strlen(password),
321 workgroup);
322 if (!NT_STATUS_IS_OK(status)) {
323 printf("cli_session_setup returned %s\n", nt_errstr(status));
324 return false;
327 status = cli_tree_connect(cli1, share, "?????", "", 0);
328 if (!NT_STATUS_IS_OK(status)) {
329 printf("cli_tree_connect returned %s\n", nt_errstr(status));
330 return false;
333 status = smb2cli_create(cli1->conn, cli1->timeout, cli1->smb2.session,
334 cli1->smb2.tcon, "session-reconnect.txt",
335 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
336 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
337 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
338 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
339 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
340 FILE_CREATE, /* create_disposition, */
341 FILE_DELETE_ON_CLOSE, /* create_options, */
342 NULL, /* smb2_create_blobs *blobs */
343 &fid_persistent,
344 &fid_volatile);
345 if (!NT_STATUS_IS_OK(status)) {
346 printf("smb2cli_create on cli1 %s\n", nt_errstr(status));
347 return false;
350 status = smb2cli_write(cli1->conn, cli1->timeout, cli1->smb2.session,
351 cli1->smb2.tcon, strlen(hello), 0, fid_persistent,
352 fid_volatile, 0, 0, (const uint8_t *)hello);
353 if (!NT_STATUS_IS_OK(status)) {
354 printf("smb2cli_write returned %s\n", nt_errstr(status));
355 return false;
358 status = smb2cli_flush(cli1->conn, cli1->timeout, cli1->smb2.session,
359 cli1->smb2.tcon, fid_persistent, fid_volatile);
360 if (!NT_STATUS_IS_OK(status)) {
361 printf("smb2cli_flush returned %s\n", nt_errstr(status));
362 return false;
365 status = smb2cli_read(cli1->conn, cli1->timeout, cli1->smb2.session,
366 cli1->smb2.tcon, 0x10000, 0, fid_persistent,
367 fid_volatile, 2, 0,
368 talloc_tos(), &result, &nread);
369 if (!NT_STATUS_IS_OK(status)) {
370 printf("smb2cli_read returned %s\n", nt_errstr(status));
371 return false;
374 if (nread != strlen(hello)) {
375 printf("smb2cli_read returned %d bytes, expected %d\n",
376 (int)nread, (int)strlen(hello));
377 return false;
380 if (memcmp(hello, result, nread) != 0) {
381 printf("smb2cli_read returned '%s', expected '%s'\n",
382 result, hello);
383 return false;
386 /* prepare second session */
388 if (!torture_init_connection(&cli2)) {
389 return false;
392 status = smbXcli_negprot(cli2->conn, cli2->timeout,
393 PROTOCOL_SMB2_02, PROTOCOL_LATEST);
394 if (!NT_STATUS_IS_OK(status)) {
395 printf("smbXcli_negprot returned %s\n", nt_errstr(status));
396 return false;
399 status = auth_generic_client_prepare(talloc_tos(), &auth_generic_state);
400 if (!NT_STATUS_IS_OK(status)) {
401 printf("auth_generic_client_prepare returned %s\n", nt_errstr(status));
402 return false;
405 gensec_want_feature(auth_generic_state->gensec_security,
406 GENSEC_FEATURE_SESSION_KEY);
407 status = auth_generic_set_username(auth_generic_state, username);
408 if (!NT_STATUS_IS_OK(status)) {
409 printf("auth_generic_set_username returned %s\n", nt_errstr(status));
410 return false;
413 status = auth_generic_set_domain(auth_generic_state, workgroup);
414 if (!NT_STATUS_IS_OK(status)) {
415 printf("auth_generic_set_domain returned %s\n", nt_errstr(status));
416 return false;
419 status = auth_generic_set_password(auth_generic_state, password);
420 if (!NT_STATUS_IS_OK(status)) {
421 printf("auth_generic_set_password returned %s\n", nt_errstr(status));
422 return false;
425 status = auth_generic_client_start(auth_generic_state, GENSEC_OID_NTLMSSP);
426 if (!NT_STATUS_IS_OK(status)) {
427 printf("auth_generic_client_start returned %s\n", nt_errstr(status));
428 return false;
431 ev = event_context_init(talloc_tos());
432 if (ev == NULL) {
433 printf("event_context_init() returned NULL\n");
434 return false;
437 status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, data_blob_null, &in_blob);
438 if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
439 printf("gensec_update returned %s\n", nt_errstr(status));
440 return false;
443 cli2->smb2.session = smbXcli_session_create(cli2, cli2->conn);
445 subreq = smb2cli_session_setup_send(talloc_tos(), ev,
446 cli2->conn,
447 cli2->timeout,
448 cli2->smb2.session,
449 0x0, /* in_flags */
450 SMB2_CAP_DFS, /* in_capabilities */
451 0, /* in_channel */
452 /* in_previous_session_id: */
453 smb2cli_session_current_id(cli1->smb2.session),
454 &in_blob); /* in_security_buffer */
455 if (subreq == NULL) {
456 printf("smb2cli_session_setup_send() returned NULL\n");
457 return false;
460 ok = tevent_req_poll(subreq, ev);
461 if (!ok) {
462 printf("tevent_req_poll() returned false\n");
463 return false;
466 status = smb2cli_session_setup_recv(subreq, talloc_tos(),
467 NULL, &out_blob);
468 if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
469 printf("smb2cli_session_setup_recv returned %s\n",
470 nt_errstr(status));
471 return false;
474 status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, out_blob, &in_blob);
475 if (!NT_STATUS_IS_OK(status)) {
476 printf("auth_generic_update returned %s\n", nt_errstr(status));
477 return false;
480 subreq = smb2cli_session_setup_send(talloc_tos(), ev,
481 cli2->conn,
482 cli2->timeout,
483 cli2->smb2.session,
484 0x0, /* in_flags */
485 SMB2_CAP_DFS, /* in_capabilities */
486 0, /* in_channel */
487 /* in_previous_session_id: */
488 smb2cli_session_current_id(cli1->smb2.session),
489 &in_blob); /* in_security_buffer */
490 if (subreq == NULL) {
491 printf("smb2cli_session_setup_send() returned NULL\n");
492 return false;
495 ok = tevent_req_poll(subreq, ev);
496 if (!ok) {
497 printf("tevent_req_poll() returned false\n");
498 return false;
501 status = smb2cli_session_setup_recv(subreq, talloc_tos(),
502 &recv_iov, &out_blob);
503 if (!NT_STATUS_IS_OK(status)) {
504 printf("smb2cli_session_setup_recv returned %s\n",
505 nt_errstr(status));
506 return false;
509 status = gensec_session_key(auth_generic_state->gensec_security, talloc_tos(),
510 &session_key);
511 if (!NT_STATUS_IS_OK(status)) {
512 printf("gensec_session_key returned %s\n",
513 nt_errstr(status));
514 return false;
517 /* check file operation on the old client */
519 status = smb2cli_flush(cli1->conn, cli1->timeout, cli1->smb2.session,
520 cli1->smb2.tcon, fid_persistent, fid_volatile);
521 if (!NT_STATUS_EQUAL(status, NT_STATUS_USER_SESSION_DELETED)) {
522 printf("smb2cli_flush returned %s\n", nt_errstr(status));
523 return false;
526 status = cli_tree_connect(cli1, share, "?????", "", 0);
527 if (!NT_STATUS_EQUAL(status, NT_STATUS_USER_SESSION_DELETED)) {
528 printf("cli_tree_connect returned %s\n", nt_errstr(status));
529 return false;
533 * checking file operations without signing.
534 * on w2k8r2 at least, flush, read and write also work the same way,
535 * while create gives ACCESS_DENIED without signing
537 status = smb2cli_flush(cli2->conn, cli2->timeout, cli2->smb2.session,
538 cli2->smb2.tcon, fid_persistent, fid_volatile);
539 if (!NT_STATUS_EQUAL(status, NT_STATUS_FILE_CLOSED) &&
540 !NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_NAME_DELETED))
542 printf("smb2cli_flush returned %s\n", nt_errstr(status));
543 return false;
546 status = smb2cli_write(cli2->conn, cli2->timeout, cli2->smb2.session,
547 cli2->smb2.tcon, strlen(hello), 0, fid_persistent,
548 fid_volatile, 0, 0, (const uint8_t *)hello);
549 if (!NT_STATUS_EQUAL(status, NT_STATUS_FILE_CLOSED) &&
550 !NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_NAME_DELETED))
552 printf("smb2cli_write returned %s\n", nt_errstr(status));
553 return false;
556 status = smb2cli_read(cli2->conn, cli2->timeout, cli2->smb2.session,
557 cli2->smb2.tcon, 0x10000, 0, fid_persistent,
558 fid_volatile, 2, 0,
559 talloc_tos(), &result, &nread);
560 if (!NT_STATUS_EQUAL(status, NT_STATUS_FILE_CLOSED) &&
561 !NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_NAME_DELETED))
563 printf("smb2cli_read returned %s\n", nt_errstr(status));
564 return false;
567 status = smb2cli_create(cli2->conn, cli2->timeout, cli2->smb2.session,
568 cli2->smb2.tcon, "session-reconnect.txt",
569 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
570 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
571 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
572 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
573 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
574 FILE_CREATE, /* create_disposition, */
575 FILE_DELETE_ON_CLOSE, /* create_options, */
576 NULL, /* smb2_create_blobs *blobs */
577 &fid_persistent,
578 &fid_volatile);
579 if (!NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED) &&
580 !NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_NAME_DELETED)) {
581 printf("smb2cli_create on cli2 %s\n", nt_errstr(status));
582 return false;
585 /* now grab the session key and try with signing */
587 status = smb2cli_session_set_session_key(cli2->smb2.session,
588 session_key,
589 recv_iov);
590 if (!NT_STATUS_IS_OK(status)) {
591 printf("smb2cli_session_set_session_key %s\n", nt_errstr(status));
592 return false;
595 /* the tid seems to be irrelevant at this stage */
597 status = smb2cli_flush(cli2->conn, cli2->timeout, cli2->smb2.session,
598 cli1->smb2.tcon, fid_persistent, fid_volatile);
599 if (!NT_STATUS_EQUAL(status, NT_STATUS_FILE_CLOSED) &&
600 !NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_NAME_DELETED))
602 printf("smb2cli_flush returned %s\n", nt_errstr(status));
603 return false;
606 status = smb2cli_write(cli2->conn, cli2->timeout, cli2->smb2.session,
607 cli1->smb2.tcon, strlen(hello), 0, fid_persistent,
608 fid_volatile, 0, 0, (const uint8_t *)hello);
609 if (!NT_STATUS_EQUAL(status, NT_STATUS_FILE_CLOSED) &&
610 !NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_NAME_DELETED))
612 printf("smb2cli_write returned %s\n", nt_errstr(status));
613 return false;
616 status = smb2cli_read(cli2->conn, cli2->timeout, cli2->smb2.session,
617 cli1->smb2.tcon, 0x10000, 0, fid_persistent,
618 fid_volatile, 2, 0,
619 talloc_tos(), &result, &nread);
620 if (!NT_STATUS_EQUAL(status, NT_STATUS_FILE_CLOSED) &&
621 !NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_NAME_DELETED))
623 printf("smb2cli_read returned %s\n", nt_errstr(status));
624 return false;
627 status = smb2cli_create(cli2->conn, cli2->timeout, cli2->smb2.session,
628 cli1->smb2.tcon, "session-reconnect.txt",
629 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
630 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
631 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
632 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
633 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
634 FILE_CREATE, /* create_disposition, */
635 FILE_DELETE_ON_CLOSE, /* create_options, */
636 NULL, /* smb2_create_blobs *blobs */
637 &fid_persistent,
638 &fid_volatile);
639 if (!NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_NAME_DELETED) &&
640 !NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_NAME_DELETED))
642 printf("smb2cli_create on cli2 %s\n", nt_errstr(status));
643 return false;
646 /* now do a new tcon and test file calls again */
648 status = cli_tree_connect(cli2, share, "?????", "", 0);
649 if (!NT_STATUS_IS_OK(status)) {
650 printf("cli_tree_connect returned %s\n", nt_errstr(status));
651 return false;
654 status = smb2cli_create(cli2->conn, cli2->timeout, cli2->smb2.session,
655 cli2->smb2.tcon, "session-reconnect.txt",
656 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
657 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
658 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
659 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
660 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
661 FILE_CREATE, /* create_disposition, */
662 FILE_DELETE_ON_CLOSE, /* create_options, */
663 NULL, /* smb2_create_blobs *blobs */
664 &fid_persistent,
665 &fid_volatile);
666 if (!NT_STATUS_IS_OK(status)) {
667 printf("smb2cli_create on cli2 %s\n", nt_errstr(status));
668 return false;
671 status = smb2cli_write(cli2->conn, cli2->timeout, cli2->smb2.session,
672 cli2->smb2.tcon, strlen(hello), 0, fid_persistent,
673 fid_volatile, 0, 0, (const uint8_t *)hello);
674 if (!NT_STATUS_IS_OK(status)) {
675 printf("smb2cli_write returned %s\n", nt_errstr(status));
676 return false;
679 status = smb2cli_flush(cli2->conn, cli2->timeout, cli2->smb2.session,
680 cli2->smb2.tcon, fid_persistent, fid_volatile);
681 if (!NT_STATUS_IS_OK(status)) {
682 printf("smb2cli_flush returned %s\n", nt_errstr(status));
683 return false;
686 status = smb2cli_read(cli2->conn, cli2->timeout, cli2->smb2.session,
687 cli2->smb2.tcon, 0x10000, 0, fid_persistent,
688 fid_volatile, 2, 0,
689 talloc_tos(), &result, &nread);
690 if (!NT_STATUS_IS_OK(status)) {
691 printf("smb2cli_read returned %s\n", nt_errstr(status));
692 return false;
695 if (nread != strlen(hello)) {
696 printf("smb2cli_read returned %d bytes, expected %d\n",
697 (int)nread, (int)strlen(hello));
698 return false;
701 if (memcmp(hello, result, nread) != 0) {
702 printf("smb2cli_read returned '%s', expected '%s'\n",
703 result, hello);
704 return false;
707 return true;
710 bool run_smb2_tcon_dependence(int dummy)
712 struct cli_state *cli;
713 NTSTATUS status;
714 uint64_t fid_persistent, fid_volatile;
715 const char *hello = "Hello, world\n";
716 uint8_t *result;
717 uint32_t nread;
718 struct smbXcli_tcon *tcon2;
719 uint32_t tcon2_id;
721 printf("Starting SMB2-TCON-DEPENDENCE\n");
723 if (!torture_init_connection(&cli)) {
724 return false;
727 status = smbXcli_negprot(cli->conn, cli->timeout,
728 PROTOCOL_SMB2_02, PROTOCOL_LATEST);
729 if (!NT_STATUS_IS_OK(status)) {
730 printf("smbXcli_negprot returned %s\n", nt_errstr(status));
731 return false;
734 status = cli_session_setup(cli, username,
735 password, strlen(password),
736 password, strlen(password),
737 workgroup);
738 if (!NT_STATUS_IS_OK(status)) {
739 printf("cli_session_setup returned %s\n", nt_errstr(status));
740 return false;
743 status = cli_tree_connect(cli, share, "?????", "", 0);
744 if (!NT_STATUS_IS_OK(status)) {
745 printf("cli_tree_connect returned %s\n", nt_errstr(status));
746 return false;
749 status = smb2cli_create(cli->conn, cli->timeout, cli->smb2.session,
750 cli->smb2.tcon, "tcon_depedence.txt",
751 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
752 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
753 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
754 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
755 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
756 FILE_CREATE, /* create_disposition, */
757 FILE_DELETE_ON_CLOSE, /* create_options, */
758 NULL, /* smb2_create_blobs *blobs */
759 &fid_persistent,
760 &fid_volatile);
761 if (!NT_STATUS_IS_OK(status)) {
762 printf("smb2cli_create on cli %s\n", nt_errstr(status));
763 return false;
766 status = smb2cli_write(cli->conn, cli->timeout, cli->smb2.session,
767 cli->smb2.tcon, strlen(hello), 0, fid_persistent,
768 fid_volatile, 0, 0, (const uint8_t *)hello);
769 if (!NT_STATUS_IS_OK(status)) {
770 printf("smb2cli_write returned %s\n", nt_errstr(status));
771 return false;
774 status = smb2cli_flush(cli->conn, cli->timeout, cli->smb2.session,
775 cli->smb2.tcon, fid_persistent, fid_volatile);
776 if (!NT_STATUS_IS_OK(status)) {
777 printf("smb2cli_flush returned %s\n", nt_errstr(status));
778 return false;
781 status = smb2cli_read(cli->conn, cli->timeout, cli->smb2.session,
782 cli->smb2.tcon, 0x10000, 0, fid_persistent,
783 fid_volatile, 2, 0,
784 talloc_tos(), &result, &nread);
785 if (!NT_STATUS_IS_OK(status)) {
786 printf("smb2cli_read returned %s\n", nt_errstr(status));
787 return false;
790 if (nread != strlen(hello)) {
791 printf("smb2cli_read returned %d bytes, expected %d\n",
792 (int)nread, (int)strlen(hello));
793 return false;
796 if (memcmp(hello, result, nread) != 0) {
797 printf("smb2cli_read returned '%s', expected '%s'\n",
798 result, hello);
799 return false;
802 /* check behaviour with wrong tid... */
804 tcon2 = smbXcli_tcon_create(cli);
805 tcon2_id = smb2cli_tcon_current_id(cli->smb2.tcon);
806 tcon2_id++;
807 smb2cli_tcon_set_values(tcon2,
808 NULL, /* session */
809 tcon2_id,
810 0, /* type */
811 0, /* flags */
812 0, /* capabilities */
813 0 /* maximal_access */);
815 status = smb2cli_read(cli->conn, cli->timeout, cli->smb2.session,
816 tcon2, 0x10000, 0, fid_persistent,
817 fid_volatile, 2, 0,
818 talloc_tos(), &result, &nread);
819 if (!NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_NAME_DELETED)) {
820 printf("smb2cli_read returned %s\n", nt_errstr(status));
821 return false;
824 talloc_free(tcon2);
826 return true;
829 bool run_smb2_multi_channel(int dummy)
831 struct cli_state *cli1;
832 struct cli_state *cli2;
833 struct cli_state *cli3;
834 NTSTATUS status;
835 bool ok;
836 uint64_t fid_persistent, fid_volatile;
837 struct tevent_context *ev;
838 struct tevent_req *subreq;
839 DATA_BLOB in_blob = data_blob_null;
840 DATA_BLOB out_blob;
841 DATA_BLOB channel_session_key;
842 struct auth_generic_state *auth_generic_state;
843 struct iovec *recv_iov;
844 const char *hello = "Hello, world\n";
845 uint8_t *result;
846 uint32_t nread;
848 printf("Starting SMB2-MULTI-CHANNEL\n");
850 if (!torture_init_connection(&cli1)) {
851 return false;
854 if (!torture_init_connection(&cli2)) {
855 return false;
858 if (!torture_init_connection(&cli3)) {
859 return false;
862 status = smbXcli_negprot(cli1->conn, cli1->timeout,
863 PROTOCOL_SMB2_22, PROTOCOL_LATEST);
864 if (!NT_STATUS_IS_OK(status)) {
865 printf("smbXcli_negprot returned %s\n", nt_errstr(status));
866 return false;
869 status = smbXcli_negprot(cli2->conn, cli2->timeout,
870 PROTOCOL_SMB2_22, PROTOCOL_LATEST);
871 if (!NT_STATUS_IS_OK(status)) {
872 printf("smbXcli_negprot returned %s\n", nt_errstr(status));
873 return false;
876 status = smbXcli_negprot(cli3->conn, cli3->timeout,
877 PROTOCOL_SMB2_22, PROTOCOL_LATEST);
878 if (!NT_STATUS_IS_OK(status)) {
879 printf("smbXcli_negprot returned %s\n", nt_errstr(status));
880 return false;
883 status = cli_session_setup(cli1, username,
884 password, strlen(password),
885 password, strlen(password),
886 workgroup);
887 if (!NT_STATUS_IS_OK(status)) {
888 printf("smb2cli_sesssetup returned %s\n", nt_errstr(status));
889 return false;
892 status = cli_tree_connect(cli1, share, "?????", "", 0);
893 if (!NT_STATUS_IS_OK(status)) {
894 printf("cli_tree_connect returned %s\n", nt_errstr(status));
895 return false;
898 status = smb2cli_session_create_channel(cli2,
899 cli1->smb2.session,
900 cli2->conn,
901 &cli2->smb2.session);
902 if (!NT_STATUS_IS_OK(status)) {
903 printf("smb2cli_session_create_channel returned %s\n",
904 nt_errstr(status));
905 return false;
908 status = auth_generic_client_prepare(talloc_tos(), &auth_generic_state);
909 if (!NT_STATUS_IS_OK(status)) {
910 printf("auth_generic_client_prepare returned %s\n", nt_errstr(status));
911 return false;
914 gensec_want_feature(auth_generic_state->gensec_security,
915 GENSEC_FEATURE_SESSION_KEY);
916 status = auth_generic_set_username(auth_generic_state, username);
917 if (!NT_STATUS_IS_OK(status)) {
918 printf("auth_generic_set_username returned %s\n", nt_errstr(status));
919 return false;
922 status = auth_generic_set_domain(auth_generic_state, workgroup);
923 if (!NT_STATUS_IS_OK(status)) {
924 printf("auth_generic_set_domain returned %s\n", nt_errstr(status));
925 return false;
928 status = auth_generic_set_password(auth_generic_state, password);
929 if (!NT_STATUS_IS_OK(status)) {
930 printf("auth_generic_set_password returned %s\n", nt_errstr(status));
931 return false;
934 status = auth_generic_client_start(auth_generic_state, GENSEC_OID_NTLMSSP);
935 if (!NT_STATUS_IS_OK(status)) {
936 printf("auth_generic_client_start returned %s\n", nt_errstr(status));
937 return false;
940 ev = event_context_init(talloc_tos());
941 if (ev == NULL) {
942 printf("event_context_init() returned NULL\n");
943 return false;
946 status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, data_blob_null, &in_blob);
947 if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
948 printf("gensec_update returned %s\n", nt_errstr(status));
949 return false;
952 subreq = smb2cli_session_setup_send(talloc_tos(), ev,
953 cli2->conn,
954 cli2->timeout,
955 cli2->smb2.session,
956 0x01, /* in_flags */
957 SMB2_CAP_DFS, /* in_capabilities */
958 0, /* in_channel */
959 0, /* in_previous_session_id */
960 &in_blob); /* in_security_buffer */
961 if (subreq == NULL) {
962 printf("smb2cli_session_setup_send() returned NULL\n");
963 return false;
966 ok = tevent_req_poll(subreq, ev);
967 if (!ok) {
968 printf("tevent_req_poll() returned false\n");
969 return false;
972 status = smb2cli_session_setup_recv(subreq, talloc_tos(),
973 NULL, &out_blob);
974 if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
975 printf("smb2cli_session_setup_recv returned %s\n",
976 nt_errstr(status));
977 return false;
980 status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, out_blob, &in_blob);
981 if (!NT_STATUS_IS_OK(status)) {
982 printf("auth_generic_update returned %s\n", nt_errstr(status));
983 return false;
986 subreq = smb2cli_session_setup_send(talloc_tos(), ev,
987 cli2->conn,
988 cli2->timeout,
989 cli2->smb2.session,
990 0x01, /* in_flags */
991 SMB2_CAP_DFS, /* in_capabilities */
992 0, /* in_channel */
993 0, /* in_previous_session_id */
994 &in_blob); /* in_security_buffer */
995 if (subreq == NULL) {
996 printf("smb2cli_session_setup_send() returned NULL\n");
997 return false;
1000 ok = tevent_req_poll(subreq, ev);
1001 if (!ok) {
1002 printf("tevent_req_poll() returned false\n");
1003 return false;
1006 status = smb2cli_session_setup_recv(subreq, talloc_tos(),
1007 &recv_iov, &out_blob);
1008 if (!NT_STATUS_IS_OK(status)) {
1009 printf("smb2cli_session_setup_recv returned %s\n",
1010 nt_errstr(status));
1011 return false;
1014 status = gensec_session_key(auth_generic_state->gensec_security, talloc_tos(),
1015 &channel_session_key);
1016 if (!NT_STATUS_IS_OK(status)) {
1017 printf("gensec_session_key returned %s\n",
1018 nt_errstr(status));
1019 return false;
1022 status = smb2cli_session_set_channel_key(cli2->smb2.session,
1023 channel_session_key,
1024 recv_iov);
1025 if (!NT_STATUS_IS_OK(status)) {
1026 printf("smb2cli_session_set_channel_key %s\n", nt_errstr(status));
1027 return false;
1030 status = smb2cli_session_create_channel(cli3,
1031 cli1->smb2.session,
1032 cli3->conn,
1033 &cli3->smb2.session);
1034 if (!NT_STATUS_IS_OK(status)) {
1035 printf("smb2cli_session_create_channel returned %s\n",
1036 nt_errstr(status));
1037 return false;
1040 status = auth_generic_client_prepare(talloc_tos(), &auth_generic_state);
1041 if (!NT_STATUS_IS_OK(status)) {
1042 printf("auth_generic_client_prepare returned %s\n", nt_errstr(status));
1043 return false;
1046 gensec_want_feature(auth_generic_state->gensec_security,
1047 GENSEC_FEATURE_SESSION_KEY);
1048 status = auth_generic_set_username(auth_generic_state, username);
1049 if (!NT_STATUS_IS_OK(status)) {
1050 printf("auth_generic_set_username returned %s\n", nt_errstr(status));
1051 return false;
1054 status = auth_generic_set_domain(auth_generic_state, workgroup);
1055 if (!NT_STATUS_IS_OK(status)) {
1056 printf("auth_generic_set_domain returned %s\n", nt_errstr(status));
1057 return false;
1060 status = auth_generic_set_password(auth_generic_state, password);
1061 if (!NT_STATUS_IS_OK(status)) {
1062 printf("auth_generic_set_password returned %s\n", nt_errstr(status));
1063 return false;
1066 status = auth_generic_client_start(auth_generic_state, GENSEC_OID_NTLMSSP);
1067 if (!NT_STATUS_IS_OK(status)) {
1068 printf("auth_generic_client_start returned %s\n", nt_errstr(status));
1069 return false;
1072 status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, data_blob_null, &in_blob);
1073 if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
1074 printf("gensec_update returned %s\n", nt_errstr(status));
1075 return false;
1078 subreq = smb2cli_session_setup_send(talloc_tos(), ev,
1079 cli3->conn,
1080 cli3->timeout,
1081 cli3->smb2.session,
1082 0x01, /* in_flags */
1083 SMB2_CAP_DFS, /* in_capabilities */
1084 0, /* in_channel */
1085 0, /* in_previous_session_id */
1086 &in_blob); /* in_security_buffer */
1087 if (subreq == NULL) {
1088 printf("smb2cli_session_setup_send() returned NULL\n");
1089 return false;
1092 ok = tevent_req_poll(subreq, ev);
1093 if (!ok) {
1094 printf("tevent_req_poll() returned false\n");
1095 return false;
1098 status = smb2cli_session_setup_recv(subreq, talloc_tos(),
1099 NULL, &out_blob);
1100 if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
1101 printf("smb2cli_session_setup_recv returned %s\n",
1102 nt_errstr(status));
1103 return false;
1106 status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, out_blob, &in_blob);
1107 if (!NT_STATUS_IS_OK(status)) {
1108 printf("auth_generic_update returned %s\n", nt_errstr(status));
1109 return false;
1112 subreq = smb2cli_session_setup_send(talloc_tos(), ev,
1113 cli3->conn,
1114 cli3->timeout,
1115 cli3->smb2.session,
1116 0x01, /* in_flags */
1117 SMB2_CAP_DFS, /* in_capabilities */
1118 0, /* in_channel */
1119 0, /* in_previous_session_id */
1120 &in_blob); /* in_security_buffer */
1121 if (subreq == NULL) {
1122 printf("smb2cli_session_setup_send() returned NULL\n");
1123 return false;
1126 ok = tevent_req_poll(subreq, ev);
1127 if (!ok) {
1128 printf("tevent_req_poll() returned false\n");
1129 return false;
1132 status = smb2cli_session_setup_recv(subreq, talloc_tos(),
1133 &recv_iov, &out_blob);
1134 if (!NT_STATUS_IS_OK(status)) {
1135 printf("smb2cli_session_setup_recv returned %s\n",
1136 nt_errstr(status));
1137 return false;
1140 status = gensec_session_key(auth_generic_state->gensec_security, talloc_tos(),
1141 &channel_session_key);
1142 if (!NT_STATUS_IS_OK(status)) {
1143 printf("gensec_session_key returned %s\n",
1144 nt_errstr(status));
1145 return false;
1148 status = smb2cli_session_set_channel_key(cli3->smb2.session,
1149 channel_session_key,
1150 recv_iov);
1151 if (!NT_STATUS_IS_OK(status)) {
1152 printf("smb2cli_session_set_channel_key %s\n", nt_errstr(status));
1153 return false;
1156 status = smb2cli_create(cli2->conn, cli2->timeout, cli2->smb2.session,
1157 cli1->smb2.tcon, "multi-channel.txt",
1158 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
1159 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
1160 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
1161 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
1162 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
1163 FILE_CREATE, /* create_disposition, */
1164 FILE_DELETE_ON_CLOSE, /* create_options, */
1165 NULL, /* smb2_create_blobs *blobs */
1166 &fid_persistent,
1167 &fid_volatile);
1168 if (!NT_STATUS_IS_OK(status)) {
1169 printf("smb2cli_create on cli2 %s\n", nt_errstr(status));
1170 return false;
1173 status = smb2cli_write(cli1->conn, cli1->timeout, cli1->smb2.session,
1174 cli1->smb2.tcon, strlen(hello), 0, fid_persistent,
1175 fid_volatile, 0, 0, (const uint8_t *)hello);
1176 if (!NT_STATUS_IS_OK(status)) {
1177 printf("smb2cli_write returned %s\n", nt_errstr(status));
1178 return false;
1181 status = smb2cli_flush(cli2->conn, cli2->timeout, cli2->smb2.session,
1182 cli1->smb2.tcon, fid_persistent, fid_volatile);
1183 if (!NT_STATUS_IS_OK(status)) {
1184 printf("smb2cli_flush returned %s\n", nt_errstr(status));
1185 return false;
1188 status = smb2cli_flush(cli1->conn, cli1->timeout, cli1->smb2.session,
1189 cli1->smb2.tcon, fid_persistent, fid_volatile);
1190 if (!NT_STATUS_IS_OK(status)) {
1191 printf("smb2cli_flush returned %s\n", nt_errstr(status));
1192 return false;
1195 status = smb2cli_flush(cli3->conn, cli3->timeout, cli3->smb2.session,
1196 cli1->smb2.tcon, fid_persistent, fid_volatile);
1197 if (!NT_STATUS_IS_OK(status)) {
1198 printf("smb2cli_flush returned %s\n", nt_errstr(status));
1199 return false;
1202 status = smb2cli_read(cli2->conn, cli2->timeout, cli2->smb2.session,
1203 cli1->smb2.tcon, 0x10000, 0, fid_persistent,
1204 fid_volatile, 2, 0,
1205 talloc_tos(), &result, &nread);
1206 if (!NT_STATUS_IS_OK(status)) {
1207 printf("smb2cli_read returned %s\n", nt_errstr(status));
1208 return false;
1211 if (nread != strlen(hello)) {
1212 printf("smb2cli_read returned %d bytes, expected %d\n",
1213 (int)nread, (int)strlen(hello));
1214 return false;
1217 if (memcmp(hello, result, nread) != 0) {
1218 printf("smb2cli_read returned '%s', expected '%s'\n",
1219 result, hello);
1220 return false;
1223 status = auth_generic_client_prepare(talloc_tos(), &auth_generic_state);
1224 if (!NT_STATUS_IS_OK(status)) {
1225 printf("auth_generic_client_prepare returned %s\n", nt_errstr(status));
1226 return false;
1229 gensec_want_feature(auth_generic_state->gensec_security,
1230 GENSEC_FEATURE_SESSION_KEY);
1231 status = auth_generic_set_username(auth_generic_state, username);
1232 if (!NT_STATUS_IS_OK(status)) {
1233 printf("auth_generic_set_username returned %s\n", nt_errstr(status));
1234 return false;
1237 status = auth_generic_set_domain(auth_generic_state, workgroup);
1238 if (!NT_STATUS_IS_OK(status)) {
1239 printf("auth_generic_set_domain returned %s\n", nt_errstr(status));
1240 return false;
1243 status = auth_generic_set_password(auth_generic_state, password);
1244 if (!NT_STATUS_IS_OK(status)) {
1245 printf("auth_generic_set_password returned %s\n", nt_errstr(status));
1246 return false;
1249 status = auth_generic_client_start(auth_generic_state, GENSEC_OID_NTLMSSP);
1250 if (!NT_STATUS_IS_OK(status)) {
1251 printf("auth_generic_client_start returned %s\n", nt_errstr(status));
1252 return false;
1255 status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, data_blob_null, &in_blob);
1256 if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
1257 printf("gensec_update returned %s\n", nt_errstr(status));
1258 return false;
1261 subreq = smb2cli_session_setup_send(talloc_tos(), ev,
1262 cli3->conn,
1263 cli3->timeout,
1264 cli3->smb2.session,
1265 0x0, /* in_flags */
1266 SMB2_CAP_DFS, /* in_capabilities */
1267 0, /* in_channel */
1268 0, /* in_previous_session_id */
1269 &in_blob); /* in_security_buffer */
1270 if (subreq == NULL) {
1271 printf("smb2cli_session_setup_send() returned NULL\n");
1272 return false;
1275 ok = tevent_req_poll(subreq, ev);
1276 if (!ok) {
1277 printf("tevent_req_poll() returned false\n");
1278 return false;
1281 status = smb2cli_session_setup_recv(subreq, talloc_tos(),
1282 NULL, &out_blob);
1283 if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
1284 printf("smb2cli_session_setup_recv returned %s\n",
1285 nt_errstr(status));
1286 return false;
1289 status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, out_blob, &in_blob);
1290 if (!NT_STATUS_IS_OK(status)) {
1291 printf("auth_generic_update returned %s\n", nt_errstr(status));
1292 return false;
1295 status = smb2cli_flush(cli1->conn, cli1->timeout, cli1->smb2.session,
1296 cli1->smb2.tcon, fid_persistent, fid_volatile);
1297 if (!NT_STATUS_IS_OK(status)) {
1298 printf("smb2cli_flush returned %s\n", nt_errstr(status));
1299 return false;
1302 status = smb2cli_flush(cli2->conn, cli2->timeout, cli2->smb2.session,
1303 cli1->smb2.tcon, fid_persistent, fid_volatile);
1304 if (!NT_STATUS_IS_OK(status)) {
1305 printf("smb2cli_flush returned %s\n", nt_errstr(status));
1306 return false;
1309 status = smb2cli_flush(cli3->conn, cli3->timeout, cli3->smb2.session,
1310 cli1->smb2.tcon, fid_persistent, fid_volatile);
1311 if (!NT_STATUS_IS_OK(status)) {
1312 printf("smb2cli_flush returned %s\n", nt_errstr(status));
1313 return false;
1316 status = smb2cli_create(cli1->conn, cli1->timeout, cli1->smb2.session,
1317 cli1->smb2.tcon, "multi-channel-invalid.txt",
1318 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
1319 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
1320 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
1321 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
1322 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
1323 FILE_CREATE, /* create_disposition, */
1324 FILE_DELETE_ON_CLOSE, /* create_options, */
1325 NULL, /* smb2_create_blobs *blobs */
1326 &fid_persistent,
1327 &fid_volatile);
1328 if (!NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
1329 printf("smb2cli_create %s\n", nt_errstr(status));
1330 return false;
1333 status = smb2cli_create(cli2->conn, cli2->timeout, cli2->smb2.session,
1334 cli1->smb2.tcon, "multi-channel-invalid.txt",
1335 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
1336 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
1337 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
1338 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
1339 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
1340 FILE_CREATE, /* create_disposition, */
1341 FILE_DELETE_ON_CLOSE, /* create_options, */
1342 NULL, /* smb2_create_blobs *blobs */
1343 &fid_persistent,
1344 &fid_volatile);
1345 if (!NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
1346 printf("smb2cli_create %s\n", nt_errstr(status));
1347 return false;
1350 status = smb2cli_create(cli3->conn, cli3->timeout, cli3->smb2.session,
1351 cli1->smb2.tcon, "multi-channel-invalid.txt",
1352 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
1353 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
1354 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
1355 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
1356 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
1357 FILE_CREATE, /* create_disposition, */
1358 FILE_DELETE_ON_CLOSE, /* create_options, */
1359 NULL, /* smb2_create_blobs *blobs */
1360 &fid_persistent,
1361 &fid_volatile);
1362 if (!NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
1363 printf("smb2cli_create %s\n", nt_errstr(status));
1364 return false;
1367 subreq = smb2cli_session_setup_send(talloc_tos(), ev,
1368 cli2->conn,
1369 cli2->timeout,
1370 cli2->smb2.session,
1371 0x0, /* in_flags */
1372 SMB2_CAP_DFS, /* in_capabilities */
1373 0, /* in_channel */
1374 0, /* in_previous_session_id */
1375 &in_blob); /* in_security_buffer */
1376 if (subreq == NULL) {
1377 printf("smb2cli_session_setup_send() returned NULL\n");
1378 return false;
1381 ok = tevent_req_poll(subreq, ev);
1382 if (!ok) {
1383 printf("tevent_req_poll() returned false\n");
1384 return false;
1387 status = smb2cli_session_setup_recv(subreq, talloc_tos(),
1388 &recv_iov, &out_blob);
1389 if (!NT_STATUS_IS_OK(status)) {
1390 printf("smb2cli_session_setup_recv returned %s\n",
1391 nt_errstr(status));
1392 return false;
1395 status = smb2cli_close(cli3->conn, cli3->timeout, cli3->smb2.session,
1396 cli1->smb2.tcon, 0, fid_persistent, fid_volatile);
1397 if (!NT_STATUS_IS_OK(status)) {
1398 printf("smb2cli_close returned %s\n", nt_errstr(status));
1399 return false;
1402 status = smb2cli_flush(cli3->conn, cli3->timeout, cli3->smb2.session,
1403 cli1->smb2.tcon, fid_persistent, fid_volatile);
1404 if (!NT_STATUS_EQUAL(status, NT_STATUS_FILE_CLOSED)) {
1405 printf("smb2cli_flush returned %s\n", nt_errstr(status));
1406 return false;
1409 status = smb2cli_flush(cli2->conn, cli2->timeout, cli2->smb2.session,
1410 cli1->smb2.tcon, fid_persistent, fid_volatile);
1411 if (!NT_STATUS_EQUAL(status, NT_STATUS_FILE_CLOSED)) {
1412 printf("smb2cli_flush returned %s\n", nt_errstr(status));
1413 return false;
1416 status = smb2cli_flush(cli1->conn, cli1->timeout, cli1->smb2.session,
1417 cli1->smb2.tcon, fid_persistent, fid_volatile);
1418 if (!NT_STATUS_EQUAL(status, NT_STATUS_FILE_CLOSED)) {
1419 printf("smb2cli_flush returned %s\n", nt_errstr(status));
1420 return false;
1423 return true;
1426 bool run_smb2_session_reauth(int dummy)
1428 struct cli_state *cli;
1429 NTSTATUS status;
1430 bool ok;
1431 uint64_t fid_persistent, fid_volatile;
1432 uint64_t dir_persistent, dir_volatile;
1433 uint8_t *dir_data;
1434 uint32_t dir_data_length;
1435 struct tevent_context *ev;
1436 struct tevent_req *subreq;
1437 DATA_BLOB in_blob = data_blob_null;
1438 DATA_BLOB out_blob;
1439 DATA_BLOB in_input_buffer;
1440 DATA_BLOB out_output_buffer;
1441 uint8_t in_file_info_class;
1442 struct auth_generic_state *auth_generic_state;
1443 struct iovec *recv_iov;
1444 uint32_t saved_tid;
1445 struct smbXcli_tcon *saved_tcon;
1447 printf("Starting SMB2-SESSION_REAUTH\n");
1449 if (!torture_init_connection(&cli)) {
1450 return false;
1454 * PROTOCOL_SMB2_22 has a bug in win8pre0
1455 * it behaves like PROTOCOL_SMB2_02
1456 * and returns NT_STATUS_REQUEST_NOT_ACCEPTED,
1457 * while it allows it on PROTOCOL_SMB2_02.
1459 status = smbXcli_negprot(cli->conn, cli->timeout,
1460 PROTOCOL_SMB2_10, PROTOCOL_SMB2_10);
1461 if (!NT_STATUS_IS_OK(status)) {
1462 printf("smbXcli_negprot returned %s\n", nt_errstr(status));
1463 return false;
1466 status = cli_session_setup(cli, username,
1467 password, strlen(password),
1468 password, strlen(password),
1469 workgroup);
1470 if (!NT_STATUS_IS_OK(status)) {
1471 printf("smb2cli_sesssetup returned %s\n", nt_errstr(status));
1472 return false;
1475 status = cli_tree_connect(cli, share, "?????", "", 0);
1476 if (!NT_STATUS_IS_OK(status)) {
1477 printf("cli_tree_connect returned %s\n", nt_errstr(status));
1478 return false;
1481 status = smb2cli_create(cli->conn, cli->timeout, cli->smb2.session,
1482 cli->smb2.tcon, "session-reauth.txt",
1483 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
1484 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
1485 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
1486 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
1487 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
1488 FILE_CREATE, /* create_disposition, */
1489 FILE_DELETE_ON_CLOSE, /* create_options, */
1490 NULL, /* smb2_create_blobs *blobs */
1491 &fid_persistent,
1492 &fid_volatile);
1493 if (!NT_STATUS_IS_OK(status)) {
1494 printf("smb2cli_create %s\n", nt_errstr(status));
1495 return false;
1498 status = smb2cli_create(cli->conn, cli->timeout, cli->smb2.session,
1499 cli->smb2.tcon, "",
1500 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
1501 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
1502 SEC_STD_SYNCHRONIZE|
1503 SEC_DIR_LIST|
1504 SEC_DIR_READ_ATTRIBUTE, /* desired_access, */
1505 0, /* file_attributes, */
1506 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
1507 FILE_OPEN, /* create_disposition, */
1508 FILE_SYNCHRONOUS_IO_NONALERT|FILE_DIRECTORY_FILE, /* create_options, */
1509 NULL, /* smb2_create_blobs *blobs */
1510 &dir_persistent,
1511 &dir_volatile);
1512 if (!NT_STATUS_IS_OK(status)) {
1513 printf("smb2cli_create returned %s\n", nt_errstr(status));
1514 return false;
1517 status = smb2cli_query_directory(
1518 cli->conn, cli->timeout, cli->smb2.session, cli->smb2.tcon,
1519 1, 0x3, 0, dir_persistent, dir_volatile,
1520 "session-reauth.txt", 0xffff,
1521 talloc_tos(), &dir_data, &dir_data_length);
1522 if (!NT_STATUS_IS_OK(status)) {
1523 printf("smb2cli_query_directory returned %s\n", nt_errstr(status));
1524 return false;
1527 status = auth_generic_client_prepare(talloc_tos(), &auth_generic_state);
1528 if (!NT_STATUS_IS_OK(status)) {
1529 printf("auth_generic_client_prepare returned %s\n", nt_errstr(status));
1530 return false;
1533 gensec_want_feature(auth_generic_state->gensec_security,
1534 GENSEC_FEATURE_SESSION_KEY);
1535 status = auth_generic_set_username(auth_generic_state, username);
1536 if (!NT_STATUS_IS_OK(status)) {
1537 printf("auth_generic_set_username returned %s\n", nt_errstr(status));
1538 return false;
1541 status = auth_generic_set_domain(auth_generic_state, workgroup);
1542 if (!NT_STATUS_IS_OK(status)) {
1543 printf("auth_generic_set_domain returned %s\n", nt_errstr(status));
1544 return false;
1547 status = auth_generic_set_password(auth_generic_state, password);
1548 if (!NT_STATUS_IS_OK(status)) {
1549 printf("auth_generic_set_password returned %s\n", nt_errstr(status));
1550 return false;
1553 status = auth_generic_client_start(auth_generic_state, GENSEC_OID_NTLMSSP);
1554 if (!NT_STATUS_IS_OK(status)) {
1555 printf("auth_generic_client_start returned %s\n", nt_errstr(status));
1556 return false;
1559 ev = event_context_init(talloc_tos());
1560 if (ev == NULL) {
1561 printf("event_context_init() returned NULL\n");
1562 return false;
1565 status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, data_blob_null, &in_blob);
1566 if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
1567 printf("gensec_update returned %s\n", nt_errstr(status));
1568 return false;
1571 subreq = smb2cli_session_setup_send(talloc_tos(), ev,
1572 cli->conn,
1573 cli->timeout,
1574 cli->smb2.session,
1575 0x0, /* in_flags */
1576 SMB2_CAP_DFS, /* in_capabilities */
1577 0, /* in_channel */
1578 0, /* in_previous_session_id */
1579 &in_blob); /* in_security_buffer */
1580 if (subreq == NULL) {
1581 printf("smb2cli_session_setup_send() returned NULL\n");
1582 return false;
1585 ok = tevent_req_poll(subreq, ev);
1586 if (!ok) {
1587 printf("tevent_req_poll() returned false\n");
1588 return false;
1591 status = smb2cli_session_setup_recv(subreq, talloc_tos(),
1592 NULL, &out_blob);
1593 if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
1594 printf("smb2cli_session_setup_recv returned %s\n",
1595 nt_errstr(status));
1596 return false;
1599 status = gensec_update(auth_generic_state->gensec_security, talloc_tos(), ev, out_blob, &in_blob);
1600 if (!NT_STATUS_IS_OK(status)) {
1601 printf("auth_generic_update returned %s\n", nt_errstr(status));
1602 return false;
1605 status = smb2cli_flush(cli->conn, cli->timeout, cli->smb2.session,
1606 cli->smb2.tcon, fid_persistent, fid_volatile);
1607 if (!NT_STATUS_IS_OK(status)) {
1608 printf("smb2cli_flush returned %s\n", nt_errstr(status));
1609 return false;
1612 status = smb2cli_query_directory(
1613 cli->conn, cli->timeout, cli->smb2.session, cli->smb2.tcon,
1614 1, 0x3, 0, dir_persistent, dir_volatile,
1615 "session-reauth.txt", 0xffff,
1616 talloc_tos(), &dir_data, &dir_data_length);
1617 if (!NT_STATUS_IS_OK(status)) {
1618 printf("smb2cli_query_directory returned %s\n", nt_errstr(status));
1619 return false;
1623 * query_info seems to be a path based operation on Windows...
1625 status = smb2cli_query_info(cli->conn,
1626 cli->timeout,
1627 cli->smb2.session,
1628 cli->smb2.tcon,
1629 SMB2_GETINFO_SECURITY,
1630 0, /* in_file_info_class */
1631 1024, /* in_max_output_length */
1632 NULL, /* in_input_buffer */
1633 SECINFO_OWNER, /* in_additional_info */
1634 0, /* in_flags */
1635 fid_persistent,
1636 fid_volatile,
1637 talloc_tos(),
1638 &out_output_buffer);
1639 if (!NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
1640 printf("smb2cli_query_info (security) returned %s\n", nt_errstr(status));
1641 return false;
1644 in_file_info_class = SMB_FILE_POSITION_INFORMATION - 1000;
1645 status = smb2cli_query_info(cli->conn,
1646 cli->timeout,
1647 cli->smb2.session,
1648 cli->smb2.tcon,
1649 SMB2_GETINFO_FILE,
1650 in_file_info_class,
1651 1024, /* in_max_output_length */
1652 NULL, /* in_input_buffer */
1653 0, /* in_additional_info */
1654 0, /* in_flags */
1655 fid_persistent,
1656 fid_volatile,
1657 talloc_tos(),
1658 &out_output_buffer);
1659 if (!NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
1660 printf("smb2cli_query_info (position) returned %s\n", nt_errstr(status));
1661 return false;
1664 in_input_buffer = data_blob_talloc(talloc_tos(), NULL, 8);
1665 SBVAL(in_input_buffer.data, 0, 512);
1667 in_file_info_class = SMB_FILE_POSITION_INFORMATION - 1000;
1668 status = smb2cli_set_info(cli->conn,
1669 cli->timeout,
1670 cli->smb2.session,
1671 cli->smb2.tcon,
1672 SMB2_GETINFO_FILE,
1673 in_file_info_class,
1674 &in_input_buffer,
1675 0, /* in_additional_info */
1676 fid_persistent,
1677 fid_volatile);
1678 if (!NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
1679 printf("smb2cli_set_info (position) returned %s\n", nt_errstr(status));
1680 return false;
1683 status = smb2cli_create(cli->conn, cli->timeout, cli->smb2.session,
1684 cli->smb2.tcon, "session-reauth-invalid.txt",
1685 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
1686 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
1687 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
1688 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
1689 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
1690 FILE_CREATE, /* create_disposition, */
1691 FILE_DELETE_ON_CLOSE, /* create_options, */
1692 NULL, /* smb2_create_blobs *blobs */
1693 &fid_persistent,
1694 &fid_volatile);
1695 if (!NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
1696 printf("smb2cli_create %s\n", nt_errstr(status));
1697 return false;
1700 status = smb2cli_create(cli->conn, cli->timeout, cli->smb2.session,
1701 cli->smb2.tcon, "",
1702 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
1703 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
1704 SEC_STD_SYNCHRONIZE|
1705 SEC_DIR_LIST|
1706 SEC_DIR_READ_ATTRIBUTE, /* desired_access, */
1707 0, /* file_attributes, */
1708 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
1709 FILE_OPEN, /* create_disposition, */
1710 FILE_SYNCHRONOUS_IO_NONALERT|FILE_DIRECTORY_FILE, /* create_options, */
1711 NULL, /* smb2_create_blobs *blobs */
1712 &dir_persistent,
1713 &dir_volatile);
1714 if (!NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
1715 printf("smb2cli_create returned %s\n", nt_errstr(status));
1716 return false;
1719 saved_tid = smb2cli_tcon_current_id(cli->smb2.tcon);
1720 saved_tcon = cli->smb2.tcon;
1721 cli->smb2.tcon = smbXcli_tcon_create(cli);
1722 smb2cli_tcon_set_values(cli->smb2.tcon,
1723 NULL, /* session */
1724 saved_tid,
1725 0, /* type */
1726 0, /* flags */
1727 0, /* capabilities */
1728 0 /* maximal_access */);
1729 status = cli_tree_connect(cli, share, "?????", "", 0);
1730 if (!NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
1731 printf("cli_tree_connect returned %s\n", nt_errstr(status));
1732 return false;
1734 talloc_free(cli->smb2.tcon);
1735 cli->smb2.tcon = saved_tcon;
1737 subreq = smb2cli_session_setup_send(talloc_tos(), ev,
1738 cli->conn,
1739 cli->timeout,
1740 cli->smb2.session,
1741 0x0, /* in_flags */
1742 SMB2_CAP_DFS, /* in_capabilities */
1743 0, /* in_channel */
1744 0, /* in_previous_session_id */
1745 &in_blob); /* in_security_buffer */
1746 if (subreq == NULL) {
1747 printf("smb2cli_session_setup_send() returned NULL\n");
1748 return false;
1751 ok = tevent_req_poll(subreq, ev);
1752 if (!ok) {
1753 printf("tevent_req_poll() returned false\n");
1754 return false;
1757 status = smb2cli_session_setup_recv(subreq, talloc_tos(),
1758 &recv_iov, &out_blob);
1759 if (!NT_STATUS_IS_OK(status)) {
1760 printf("smb2cli_session_setup_recv returned %s\n",
1761 nt_errstr(status));
1762 return false;
1765 status = smb2cli_flush(cli->conn, cli->timeout, cli->smb2.session,
1766 cli->smb2.tcon, fid_persistent, fid_volatile);
1767 if (!NT_STATUS_IS_OK(status)) {
1768 printf("smb2cli_flush returned %s\n", nt_errstr(status));
1769 return false;
1772 status = smb2cli_query_info(cli->conn,
1773 cli->timeout,
1774 cli->smb2.session,
1775 cli->smb2.tcon,
1776 SMB2_GETINFO_SECURITY,
1777 0, /* in_file_info_class */
1778 1024, /* in_max_output_length */
1779 NULL, /* in_input_buffer */
1780 SECINFO_OWNER, /* in_additional_info */
1781 0, /* in_flags */
1782 fid_persistent,
1783 fid_volatile,
1784 talloc_tos(),
1785 &out_output_buffer);
1786 if (!NT_STATUS_IS_OK(status)) {
1787 printf("smb2cli_query_info (security) returned %s\n", nt_errstr(status));
1788 return false;
1791 in_file_info_class = SMB_FILE_POSITION_INFORMATION - 1000;
1792 status = smb2cli_query_info(cli->conn,
1793 cli->timeout,
1794 cli->smb2.session,
1795 cli->smb2.tcon,
1796 SMB2_GETINFO_FILE,
1797 in_file_info_class,
1798 1024, /* in_max_output_length */
1799 NULL, /* in_input_buffer */
1800 0, /* in_additional_info */
1801 0, /* in_flags */
1802 fid_persistent,
1803 fid_volatile,
1804 talloc_tos(),
1805 &out_output_buffer);
1806 if (!NT_STATUS_IS_OK(status)) {
1807 printf("smb2cli_query_info (position) returned %s\n", nt_errstr(status));
1808 return false;
1811 in_input_buffer = data_blob_talloc(talloc_tos(), NULL, 8);
1812 SBVAL(in_input_buffer.data, 0, 512);
1814 in_file_info_class = SMB_FILE_POSITION_INFORMATION - 1000;
1815 status = smb2cli_set_info(cli->conn,
1816 cli->timeout,
1817 cli->smb2.session,
1818 cli->smb2.tcon,
1819 SMB2_GETINFO_FILE,
1820 in_file_info_class,
1821 &in_input_buffer,
1822 0, /* in_additional_info */
1823 fid_persistent,
1824 fid_volatile);
1825 if (!NT_STATUS_IS_OK(status)) {
1826 printf("smb2cli_set_info (position) returned %s\n", nt_errstr(status));
1827 return false;
1830 in_file_info_class = SMB_FILE_POSITION_INFORMATION - 1000;
1831 status = smb2cli_query_info(cli->conn,
1832 cli->timeout,
1833 cli->smb2.session,
1834 cli->smb2.tcon,
1835 SMB2_GETINFO_FILE,
1836 in_file_info_class,
1837 1024, /* in_max_output_length */
1838 NULL, /* in_input_buffer */
1839 0, /* in_additional_info */
1840 0, /* in_flags */
1841 fid_persistent,
1842 fid_volatile,
1843 talloc_tos(),
1844 &out_output_buffer);
1845 if (!NT_STATUS_IS_OK(status)) {
1846 printf("smb2cli_query_info (position) returned %s\n", nt_errstr(status));
1847 return false;
1850 status = smb2cli_close(cli->conn, cli->timeout, cli->smb2.session,
1851 cli->smb2.tcon, 0, fid_persistent, fid_volatile);
1852 if (!NT_STATUS_IS_OK(status)) {
1853 printf("smb2cli_close returned %s\n", nt_errstr(status));
1854 return false;
1857 status = smb2cli_create(cli->conn, cli->timeout, cli->smb2.session,
1858 cli->smb2.tcon, "session-reauth.txt",
1859 SMB2_OPLOCK_LEVEL_NONE, /* oplock_level, */
1860 SMB2_IMPERSONATION_IMPERSONATION, /* impersonation_level, */
1861 SEC_STD_ALL | SEC_FILE_ALL, /* desired_access, */
1862 FILE_ATTRIBUTE_NORMAL, /* file_attributes, */
1863 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, /* share_access, */
1864 FILE_CREATE, /* create_disposition, */
1865 FILE_DELETE_ON_CLOSE, /* create_options, */
1866 NULL, /* smb2_create_blobs *blobs */
1867 &fid_persistent,
1868 &fid_volatile);
1869 if (!NT_STATUS_IS_OK(status)) {
1870 printf("smb2cli_create %s\n", nt_errstr(status));
1871 return false;
1874 status = smb2cli_query_directory(
1875 cli->conn, cli->timeout, cli->smb2.session, cli->smb2.tcon,
1876 1, 0x3, 0, dir_persistent, dir_volatile,
1877 "session-reauth.txt", 0xffff,
1878 talloc_tos(), &dir_data, &dir_data_length);
1879 if (!NT_STATUS_IS_OK(status)) {
1880 printf("smb2cli_query_directory returned %s\n", nt_errstr(status));
1881 return false;
1884 status = smb2cli_close(cli->conn, cli->timeout, cli->smb2.session,
1885 cli->smb2.tcon, 0, dir_persistent, dir_volatile);
1886 if (!NT_STATUS_IS_OK(status)) {
1887 printf("smb2cli_close returned %s\n", nt_errstr(status));
1888 return false;
1891 status = smb2cli_close(cli->conn, cli->timeout, cli->smb2.session,
1892 cli->smb2.tcon, 0, fid_persistent, fid_volatile);
1893 if (!NT_STATUS_IS_OK(status)) {
1894 printf("smb2cli_close returned %s\n", nt_errstr(status));
1895 return false;
1898 saved_tid = smb2cli_tcon_current_id(cli->smb2.tcon);
1899 saved_tcon = cli->smb2.tcon;
1900 cli->smb2.tcon = smbXcli_tcon_create(cli);
1901 smb2cli_tcon_set_values(cli->smb2.tcon,
1902 NULL, /* session */
1903 saved_tid,
1904 0, /* type */
1905 0, /* flags */
1906 0, /* capabilities */
1907 0 /* maximal_access */);
1908 status = cli_tree_connect(cli, share, "?????", "", 0);
1909 if (!NT_STATUS_IS_OK(status)) {
1910 printf("cli_tree_connect returned %s\n", nt_errstr(status));
1911 return false;
1913 talloc_free(cli->smb2.tcon);
1914 cli->smb2.tcon = saved_tcon;
1916 return true;