s4:torture/netlogon: add/use test_SetupCredentialsPipe() helper function
[samba.git] / source4 / torture / rpc / mgmt.c
index 08804ec557b528c37c4abaedfe7b4a7a6ef903c5..f3344c9510e83e99fe5aea6b4b5591d5af9c9f08 100644 (file)
-/* 
+/*
    Unix SMB/CIFS implementation.
    test suite for mgmt rpc operations
 
    Copyright (C) Andrew Tridgell 2003
-   
+
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
-   the Free Software Foundation; either version 2 of the License, or
+   the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
-   
+
    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.
-   
+
    You should have received a copy of the GNU General Public License
-   along with this program; if not, write to the Free Software
-   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */
 
 #include "includes.h"
-#include "torture/torture.h"
 #include "librpc/gen_ndr/ndr_mgmt_c.h"
 #include "auth/gensec/gensec.h"
-#include "librpc/rpc/dcerpc_table.h"
-#include "torture/rpc/rpc.h"
+#include "librpc/ndr/ndr_table.h"
+#include "torture/rpc/torture_rpc.h"
+#include "param/param.h"
 
 
 /*
   ask the server what interface IDs are available on this endpoint
 */
-static BOOL test_inq_if_ids(struct dcerpc_pipe *p, 
-                           TALLOC_CTX *mem_ctx)
+bool test_inq_if_ids(struct torture_context *tctx,
+                    struct dcerpc_binding_handle *b,
+                    TALLOC_CTX *mem_ctx,
+                    bool (*per_id_test)(struct torture_context *,
+                                        const struct ndr_interface_table *iface,
+                                        TALLOC_CTX *mem_ctx,
+                                        struct ndr_syntax_id *id),
+                    const void *priv)
 {
-       NTSTATUS status;
        struct mgmt_inq_if_ids r;
+       struct rpc_if_id_vector_t *vector;
        int i;
-       
-       status = dcerpc_mgmt_inq_if_ids(p, mem_ctx, &r);
-       if (!NT_STATUS_IS_OK(status)) {
-               printf("inq_if_ids failed - %s\n", nt_errstr(status));
-               return False;
-       }
 
-       if (!W_ERROR_IS_OK(r.out.result)) {
-               printf("inq_if_ids gave error code %s\n", win_errstr(r.out.result));
-               return False;
-       }
+       vector = talloc(mem_ctx, struct rpc_if_id_vector_t);
+       r.out.if_id_vector = &vector;
 
-       if (!r.out.if_id_vector) {
-               printf("inq_if_ids gave NULL if_id_vector\n");
-               return False;
+       torture_assert_ntstatus_ok(tctx,
+               dcerpc_mgmt_inq_if_ids_r(b, mem_ctx, &r),
+               "inq_if_ids failed");
+
+       torture_assert_werr_ok(tctx,
+               r.out.result,
+               "inq_if_ids gave unexpected error code");
+
+       if (!vector) {
+               torture_comment(tctx, "inq_if_ids gave NULL if_id_vector\n");
+               return false;
        }
 
-       for (i=0;i<r.out.if_id_vector->count;i++) {
-               struct dcerpc_syntax_id *id = r.out.if_id_vector->if_id[i].id;
+       for (i=0;i<vector->count;i++) {
+               struct ndr_syntax_id *id = vector->if_id[i].id;
                if (!id) continue;
 
-               printf("\tuuid %s  version 0x%08x  '%s'\n",
+               torture_comment(tctx, "\tuuid %s  version 0x%08x  '%s'\n",
                       GUID_string(mem_ctx, &id->uuid),
-                      id->if_version, idl_pipe_name(&id->uuid, id->if_version));
+                      id->if_version,
+                      ndr_interface_name(&id->uuid, id->if_version));
+
+               if (per_id_test) {
+                       per_id_test(tctx, priv, mem_ctx, id);
+               }
        }
 
-       return True;
+       return true;
 }
 
-static BOOL test_inq_stats(struct dcerpc_pipe *p, 
+static bool test_inq_stats(struct torture_context *tctx,
+                          struct dcerpc_binding_handle *b,
                           TALLOC_CTX *mem_ctx)
 {
-       NTSTATUS status;
        struct mgmt_inq_stats r;
+       struct mgmt_statistics statistics;
 
        r.in.max_count = MGMT_STATS_ARRAY_MAX_SIZE;
        r.in.unknown = 0;
+       r.out.statistics = &statistics;
 
-       status = dcerpc_mgmt_inq_stats(p, mem_ctx, &r);
-       if (!NT_STATUS_IS_OK(status)) {
-               printf("inq_stats failed - %s\n", nt_errstr(status));
-               return False;
+       torture_assert_ntstatus_ok(tctx,
+               dcerpc_mgmt_inq_stats_r(b, mem_ctx, &r),
+               "inq_stats failed");
+
+       if (statistics.count != MGMT_STATS_ARRAY_MAX_SIZE) {
+               torture_comment(tctx, "Unexpected array size %d\n", statistics.count);
+               return false;
        }
 
-       if (r.out.statistics->count != MGMT_STATS_ARRAY_MAX_SIZE) {
-               printf("Unexpected array size %d\n", r.out.statistics->count);
-               return False;
+       torture_comment(tctx, "\tcalls_in %6d  calls_out %6d\n\tpkts_in  %6d  pkts_out  %6d\n",
+              statistics.statistics[MGMT_STATS_CALLS_IN],
+              statistics.statistics[MGMT_STATS_CALLS_OUT],
+              statistics.statistics[MGMT_STATS_PKTS_IN],
+              statistics.statistics[MGMT_STATS_PKTS_OUT]);
+
+       return true;
+}
+
+static bool test_inq_princ_name_size(struct torture_context *tctx,
+                                    struct dcerpc_binding_handle *b,
+                                    uint32_t authn_proto,
+                                    const char *expected_princ_name)
+{
+       struct mgmt_inq_princ_name r;
+       uint32_t len, i;
+
+       len = strlen(expected_princ_name);
+
+       r.in.authn_proto = authn_proto;
+
+       /*
+        * 0 gives NT_STATUS_RPC_BAD_STUB_DATA
+        */
+
+       for (i=1; i <= len; i++) {
+               r.in.princ_name_size = i;
+
+               torture_assert_ntstatus_ok(tctx,
+                       dcerpc_mgmt_inq_princ_name_r(b, tctx, &r),
+                       "mgmt_inq_princ_name failed");
+               torture_assert_werr_equal(tctx,
+                       r.out.result,
+                       WERR_INSUFFICIENT_BUFFER,
+                       "mgmt_inq_princ_name failed");
        }
 
-       printf("\tcalls_in %6d  calls_out %6d\n\tpkts_in  %6d  pkts_out  %6d\n",
-              r.out.statistics->statistics[MGMT_STATS_CALLS_IN],
-              r.out.statistics->statistics[MGMT_STATS_CALLS_OUT],
-              r.out.statistics->statistics[MGMT_STATS_PKTS_IN],
-              r.out.statistics->statistics[MGMT_STATS_PKTS_OUT]);
+       r.in.princ_name_size = len + 1;
+
+       torture_assert_ntstatus_ok(tctx,
+               dcerpc_mgmt_inq_princ_name_r(b, tctx, &r),
+               "mgmt_inq_princ_name failed");
+       torture_assert_werr_ok(tctx,
+               r.out.result,
+               "mgmt_inq_princ_name failed");
 
-       return True;
+       return true;
 }
 
-static BOOL test_inq_princ_name(struct dcerpc_pipe *p, 
+static bool test_inq_princ_name(struct torture_context *tctx,
+                               struct dcerpc_binding_handle *b,
                                TALLOC_CTX *mem_ctx)
 {
        NTSTATUS status;
        struct mgmt_inq_princ_name r;
        int i;
-       BOOL ret = False;
+       bool ret = false;
 
-       for (i=0;i<100;i++) {
+       for (i=0;i<256;i++) {
                r.in.authn_proto = i;  /* DCERPC_AUTH_TYPE_* */
                r.in.princ_name_size = 100;
 
-               status = dcerpc_mgmt_inq_princ_name(p, mem_ctx, &r);
+               status = dcerpc_mgmt_inq_princ_name_r(b, mem_ctx, &r);
                if (!NT_STATUS_IS_OK(status)) {
                        continue;
                }
                if (W_ERROR_IS_OK(r.out.result)) {
-                       const char *name = gensec_get_name_by_authtype(i);
-                       ret = True;
+                       const char *name = gensec_get_name_by_authtype(NULL, i);
+                       ret = true;
                        if (name) {
-                               printf("\tprinciple name for proto %u (%s) is '%s'\n", 
+                               torture_comment(tctx, "\tprinciple name for proto %u (%s) is '%s'\n",
                                       i, name, r.out.princ_name);
                        } else {
-                               printf("\tprinciple name for proto %u is '%s'\n", 
+                               torture_comment(tctx, "\tprinciple name for proto %u is '%s'\n",
                                       i, r.out.princ_name);
                        }
+
+                       switch (i) {
+                       case DCERPC_AUTH_TYPE_KRB5:
+                       case DCERPC_AUTH_TYPE_NTLMSSP:
+                       case DCERPC_AUTH_TYPE_SPNEGO:
+                               torture_assert(tctx,
+                                       test_inq_princ_name_size(tctx, b, i, r.out.princ_name),
+                                       "failed");
+                               break;
+                       case DCERPC_AUTH_TYPE_SCHANNEL:
+                               /*
+                                * for some reason schannel behaves differently
+                                *
+                                */
+                       default:
+                               break;
+                       }
                }
        }
 
        if (!ret) {
-               printf("\tno principle names?\n");
+               torture_comment(tctx, "\tno principle names?\n");
        }
 
-       return True;
+       return true;
 }
 
-static BOOL test_is_server_listening(struct dcerpc_pipe *p, 
+static bool test_is_server_listening(struct torture_context *tctx,
+                                    struct dcerpc_binding_handle *b,
                                     TALLOC_CTX *mem_ctx)
 {
-       NTSTATUS status;
        struct mgmt_is_server_listening r;
+       r.out.status = talloc(mem_ctx, uint32_t);
 
-       status = dcerpc_mgmt_is_server_listening(p, mem_ctx, &r);
-       if (!NT_STATUS_IS_OK(status)) {
-               printf("is_server_listening failed - %s\n", nt_errstr(status));
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx,
+               dcerpc_mgmt_is_server_listening_r(b, mem_ctx, &r),
+               "is_server_listening failed");
 
        if (*r.out.status != 0 || r.out.result == 0) {
-               printf("\tserver is NOT listening\n");
+               torture_comment(tctx, "\tserver is NOT listening\n");
        } else {
-               printf("\tserver is listening\n");
+               torture_comment(tctx, "\tserver is listening\n");
        }
 
-       return True;
+       return true;
 }
 
-static BOOL test_stop_server_listening(struct dcerpc_pipe *p, 
+static bool test_stop_server_listening(struct torture_context *tctx,
+                                      struct dcerpc_binding_handle *b,
                                       TALLOC_CTX *mem_ctx)
 {
-       NTSTATUS status;
        struct mgmt_stop_server_listening r;
 
-       status = dcerpc_mgmt_stop_server_listening(p, mem_ctx, &r);
-       if (!NT_STATUS_IS_OK(status)) {
-               printf("stop_server_listening failed - %s\n", nt_errstr(status));
-               return False;
-       }
+       torture_assert_ntstatus_ok(tctx,
+               dcerpc_mgmt_stop_server_listening_r(b, mem_ctx, &r),
+               "stop_server_listening failed");
 
        if (!W_ERROR_IS_OK(r.out.result)) {
-               printf("\tserver refused to stop listening - %s\n", win_errstr(r.out.result));
+               torture_comment(tctx, "\tserver refused to stop listening - %s\n", win_errstr(r.out.result));
        } else {
-               printf("\tserver allowed a stop_server_listening request\n");
-               return False;
+               torture_comment(tctx, "\tserver allowed a stop_server_listening request\n");
+               return false;
        }
 
-       return True;
+       return true;
 }
 
 
-BOOL torture_rpc_mgmt(struct torture_context *torture)
+bool torture_rpc_mgmt(struct torture_context *tctx)
 {
         NTSTATUS status;
         struct dcerpc_pipe *p;
        TALLOC_CTX *mem_ctx, *loop_ctx;
-       BOOL ret = True;
-       const char *binding = torture_setting_string(torture, "binding", NULL);
-       const struct dcerpc_interface_list *l;
+       bool ret = true;
+       const struct ndr_interface_list *l;
        struct dcerpc_binding *b;
 
        mem_ctx = talloc_init("torture_rpc_mgmt");
 
-       if (!binding) {
-               printf("You must supply a ncacn binding string\n");
-               return False;
-       }
-       
-       status = dcerpc_parse_binding(mem_ctx, binding, &b);
+       status = torture_rpc_binding(tctx, &b);
        if (!NT_STATUS_IS_OK(status)) {
                talloc_free(mem_ctx);
-               printf("Failed to parse binding '%s'\n", binding);
-               return False;
+               return false;
        }
 
-       for (l=librpc_dcerpc_pipes();l;l=l->next) {             
+       for (l=ndr_table_list();l;l=l->next) {
+               struct dcerpc_binding_handle *bh;
+
                loop_ctx = talloc_named(mem_ctx, 0, "torture_rpc_mgmt loop context");
-               
+
                /* some interfaces are not mappable */
                if (l->table->num_calls == 0 ||
                    strcmp(l->table->name, "mgmt") == 0) {
@@ -208,47 +268,52 @@ BOOL torture_rpc_mgmt(struct torture_context *torture)
                        continue;
                }
 
-               printf("\nTesting pipe '%s'\n", l->table->name);
+               torture_comment(tctx, "\nTesting pipe '%s'\n", l->table->name);
 
-               if (b->transport == NCACN_IP_TCP) {
-                       status = dcerpc_epm_map_binding(loop_ctx, b, l->table, NULL);
-                       if (!NT_STATUS_IS_OK(status)) {
-                               printf("Failed to map port for uuid %s\n", 
-                                          GUID_string(loop_ctx, &l->table->syntax_id.uuid));
-                               talloc_free(loop_ctx);
-                               continue;
-                       }
-               } else {
-                       b->endpoint = talloc_strdup(b, l->table->name);
+               status = dcerpc_epm_map_binding(loop_ctx, b, l->table,
+                                               tctx->ev, tctx->lp_ctx);
+               if (!NT_STATUS_IS_OK(status)) {
+                       torture_comment(tctx, "Failed to map port for uuid %s\n",
+                                  GUID_string(loop_ctx, &l->table->syntax_id.uuid));
+                       talloc_free(loop_ctx);
+                       continue;
                }
 
-               lp_set_cmdline("torture:binding", dcerpc_binding_string(loop_ctx, b));
+               lpcfg_set_cmdline(tctx->lp_ctx, "torture:binding", dcerpc_binding_string(loop_ctx, b));
+
+               status = torture_rpc_connection(tctx, &p, &ndr_table_mgmt);
+               if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
+                       torture_comment(tctx, "Interface not available - skipping\n");
+                       talloc_free(loop_ctx);
+                       continue;
+               }
 
-               status = torture_rpc_connection(loop_ctx, &p, &dcerpc_table_mgmt);
                if (!NT_STATUS_IS_OK(status)) {
                        talloc_free(loop_ctx);
-                       ret = False;
+                       torture_comment(tctx, "Interface not available (%s) - skipping\n", nt_errstr(status));
+                       ret = false;
                        continue;
                }
-       
-               if (!test_is_server_listening(p, loop_ctx)) {
-                       ret = False;
+               bh = p->binding_handle;
+
+               if (!test_is_server_listening(tctx, bh, loop_ctx)) {
+                       ret = false;
                }
 
-               if (!test_stop_server_listening(p, loop_ctx)) {
-                       ret = False;
+               if (!test_stop_server_listening(tctx, bh, loop_ctx)) {
+                       ret = false;
                }
 
-               if (!test_inq_stats(p, loop_ctx)) {
-                       ret = False;
+               if (!test_inq_stats(tctx, bh, loop_ctx)) {
+                       ret = false;
                }
 
-               if (!test_inq_princ_name(p, loop_ctx)) {
-                       ret = False;
+               if (!test_inq_princ_name(tctx, bh, loop_ctx)) {
+                       ret = false;
                }
 
-               if (!test_inq_if_ids(p, loop_ctx)) {
-                       ret = False;
+               if (!test_inq_if_ids(tctx, bh, loop_ctx, NULL, NULL)) {
+                       ret = false;
                }
 
        }