*/
#include "includes.h"
+#include "torture/torture.h"
+#include "librpc/gen_ndr/ndr_mgmt_c.h"
+#include "auth/gensec/gensec.h"
+#include "librpc/rpc/dcerpc_table.h"
+#include "torture/rpc/rpc.h"
/*
for (i=0;i<r.out.if_id_vector->count;i++) {
struct dcerpc_syntax_id *id = r.out.if_id_vector->if_id[i].id;
if (!id) continue;
- printf("\tuuid %s version 0x%04x:0x%04x\n",
+
+ printf("\tuuid %s version 0x%08x '%s'\n",
GUID_string(mem_ctx, &id->uuid),
- id->major_version, id->minor_version);
+ id->if_version, idl_pipe_name(&id->uuid, id->if_version));
}
return True;
int i;
BOOL ret = False;
- for (i=0;i<30;i++) {
+ for (i=0;i<100;i++) {
r.in.authn_proto = i; /* DCERPC_AUTH_TYPE_* */
r.in.princ_name_size = 100;
continue;
}
if (W_ERROR_IS_OK(r.out.result)) {
+ const char *name = gensec_get_name_by_authtype(i);
ret = True;
- printf("\tprinciple name for proto %u is '%s'\n",
- i, r.out.princ_name);
+ if (name) {
+ printf("\tprinciple name for proto %u (%s) is '%s'\n",
+ i, name, r.out.princ_name);
+ } else {
+ printf("\tprinciple name for proto %u is '%s'\n",
+ i, r.out.princ_name);
+ }
}
}
}
-BOOL torture_rpc_mgmt(int dummy)
+BOOL torture_rpc_mgmt(struct torture_context *torture)
{
NTSTATUS status;
struct dcerpc_pipe *p;
- TALLOC_CTX *mem_ctx;
+ TALLOC_CTX *mem_ctx, *loop_ctx;
BOOL ret = True;
- int i;
- char *host = lp_parm_string(-1, "torture", "host");
- uint32 port;
+ const char *binding = torture_setting_string(torture, "binding", NULL);
+ const struct dcerpc_interface_list *l;
+ struct dcerpc_binding *b;
mem_ctx = talloc_init("torture_rpc_mgmt");
- for (i=0;dcerpc_pipes[i];i++) {
- char *transport = lp_parm_string(-1, "torture", "transport");
+ if (!binding) {
+ printf("You must supply a ncacn binding string\n");
+ return False;
+ }
+
+ status = dcerpc_parse_binding(mem_ctx, binding, &b);
+ if (!NT_STATUS_IS_OK(status)) {
+ talloc_free(mem_ctx);
+ printf("Failed to parse binding '%s'\n", binding);
+ return False;
+ }
+ for (l=librpc_dcerpc_pipes();l;l=l->next) {
+ loop_ctx = talloc_named(mem_ctx, 0, "torture_rpc_mgmt loop context");
+
/* some interfaces are not mappable */
- if (dcerpc_pipes[i]->num_calls == 0 ||
- strcmp(dcerpc_pipes[i]->name, "mgmt") == 0) {
+ if (l->table->num_calls == 0 ||
+ strcmp(l->table->name, "mgmt") == 0) {
+ talloc_free(loop_ctx);
continue;
}
- printf("\nTesting pipe '%s'\n", dcerpc_pipes[i]->name);
+ printf("\nTesting pipe '%s'\n", l->table->name);
- /* on TCP we need to find the right endpoint */
- if (strcasecmp(transport, "ncacn_ip_tcp") == 0) {
- status = dcerpc_epm_map_tcp_port(host,
- dcerpc_pipes[i]->uuid,
- dcerpc_pipes[i]->if_version,
- &port);
+ if (b->transport == NCACN_IP_TCP) {
+ status = dcerpc_epm_map_binding(loop_ctx, b, l->table, NULL);
if (!NT_STATUS_IS_OK(status)) {
- ret = False;
+ printf("Failed to map port for uuid %s\n",
+ GUID_string(loop_ctx, &l->table->syntax_id.uuid));
+ talloc_free(loop_ctx);
continue;
}
-
- lp_set_cmdline("torture:share",
- talloc_asprintf(mem_ctx, "%u", port));
+ } else {
+ b->endpoint = talloc_strdup(b, l->table->name);
}
- status = torture_rpc_connection(&p,
- dcerpc_pipes[i]->name,
- DCERPC_MGMT_UUID,
- DCERPC_MGMT_VERSION);
+ lp_set_cmdline("torture:binding", dcerpc_binding_string(loop_ctx, b));
+
+ status = torture_rpc_connection(loop_ctx, &p, &dcerpc_table_mgmt);
if (!NT_STATUS_IS_OK(status)) {
+ talloc_free(loop_ctx);
ret = False;
continue;
}
- p->flags |= DCERPC_DEBUG_PRINT_BOTH;
-
- if (!test_is_server_listening(p, mem_ctx)) {
+ if (!test_is_server_listening(p, loop_ctx)) {
ret = False;
}
- if (!test_stop_server_listening(p, mem_ctx)) {
+ if (!test_stop_server_listening(p, loop_ctx)) {
ret = False;
}
- if (!test_inq_stats(p, mem_ctx)) {
+ if (!test_inq_stats(p, loop_ctx)) {
ret = False;
}
- if (!test_inq_princ_name(p, mem_ctx)) {
+ if (!test_inq_princ_name(p, loop_ctx)) {
ret = False;
}
- if (!test_inq_if_ids(p, mem_ctx)) {
+ if (!test_inq_if_ids(p, loop_ctx)) {
ret = False;
}
- torture_rpc_close(p);
}
return ret;