2 Unix SMB/Netbios implementation.
5 Copyright (C) Andrew Tridgell 1994-1998
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
33 extern pstring global_myname;
35 extern pstring user_socket_options;
38 extern pstring debugf;
39 extern int DEBUGLEVEL;
42 extern file_info def_finfo;
44 #define CNV_LANG(s) dos2unix_format(s,False)
45 #define CNV_INPUT(s) unix2dos_format(s,True)
47 static struct cli_state smbcli;
48 struct cli_state *smb_cli = &smbcli;
52 static pstring user_name; /* local copy only, if one is entered */
53 static pstring password; /* local copy only, if one is entered */
54 static pstring domain; /* local copy only, if one is entered */
55 BOOL got_pass = False;
57 static struct nmb_name calling;
58 static struct nmb_name called;
60 static void get_passwd(void)
62 /* set the password cache info */
67 pwd_set_nullpwd(&(smb_cli->pwd));
71 pwd_make_lm_nt_16(&(smb_cli->pwd), password); /* generate 16 byte hashes */
76 char *pwd = getpass("Enter Password:");
77 safe_strcpy(password, pwd, sizeof(password));
78 pwd_make_lm_nt_16(&(smb_cli->pwd), password); /* generate 16 byte hashes */
83 /****************************************************************************
84 initialise smb client structure
85 ****************************************************************************/
86 void rpcclient_init(void)
88 bzero(smb_cli, sizeof(smb_cli));
89 cli_initialise(smb_cli);
90 smb_cli->capabilities |= CAP_NT_SMBS;
91 smb_cli->capabilities |= CAP_STATUS32;
93 pstrcpy(smb_cli->user_name, user_name);
99 pstrcpy(smb_cli->domain,lp_workgroup());
103 pstrcpy(smb_cli->domain, domain);
106 strupper(smb_cli->domain);
109 /****************************************************************************
110 make smb client connection
111 ****************************************************************************/
112 static BOOL rpcclient_connect(struct client_info *info)
116 if (!cli_establish_connection(smb_cli,
117 info->dest_host, &info->dest_ip,
119 info->share, info->svc_type,
122 DEBUG(0,("rpcclient_connect: connection failed\n"));
123 cli_shutdown(smb_cli);
130 /****************************************************************************
131 stop the smb connection(s?)
132 ****************************************************************************/
133 static void rpcclient_stop(void)
135 cli_shutdown(smb_cli);
138 /****************************************************************************
139 log in as an nt user, log out again.
140 ****************************************************************************/
141 void run_enums_test(int num_ops, struct client_info *cli_info)
146 /* establish connections. nothing to stop these being re-established. */
147 rpcclient_connect(cli_info);
149 DEBUG(5,("rpcclient_connect: smb_cli->fd:%d\n", smb_cli->fd));
150 if (smb_cli->fd <= 0)
152 fprintf(out_hnd, "warning: connection could not be established to %s<%02x>\n",
153 cli_info->dest_host, cli_info->name_type);
157 for (i = 0; i < num_ops; i++)
160 cmd_srv_enum_sess(cli_info);
162 cmd_srv_enum_shares(cli_info);
164 cmd_srv_enum_files(cli_info);
166 if (password[0] != 0)
168 slprintf(cmd, sizeof(cmd)-1, "1");
169 set_first_token(cmd);
175 cmd_srv_enum_conn(cli_info);
182 /****************************************************************************
183 log in as an nt user, log out again.
184 ****************************************************************************/
185 void run_ntlogin_test(int num_ops, struct client_info *cli_info)
190 /* establish connections. nothing to stop these being re-established. */
191 rpcclient_connect(cli_info);
193 DEBUG(5,("rpcclient_connect: smb_cli->fd:%d\n", smb_cli->fd));
194 if (smb_cli->fd <= 0)
196 fprintf(out_hnd, "warning: connection could not be established to %s<%02x>\n",
197 cli_info->dest_host, cli_info->name_type);
201 for (i = 0; i < num_ops; i++)
203 slprintf(cmd, sizeof(cmd)-1, "%s %s", smb_cli->user_name, password);
204 set_first_token(cmd);
206 cmd_netlogon_login_test(cli_info);
213 /* generate a random buffer */
214 static void rand_buf(char *buf, int len)
222 /****************************************************************************
223 do a random rpc command
224 ****************************************************************************/
225 BOOL do_random_rpc(struct cli_state *cli, uint16 nt_pipe_fnum, int max_len)
231 BOOL response = False;
233 if ((sys_random() % 20) == 0)
235 param_len = (sys_random() % 256) + 4;
239 param_len = (sys_random() % max_len) + 4;
242 prs_init(&buf , param_len, 4, SAFETY_MARGIN, False);
243 prs_init(&rbuf, 0 , 4, SAFETY_MARGIN, True );
245 opcode = sys_random() % 256;
247 /* turn parameters into data stream */
248 rand_buf(mem_data(&buf.data, 0), param_len);
249 buf.offset = param_len;
251 /* send the data on \PIPE\ */
252 if (rpc_api_pipe_req(cli, nt_pipe_fnum, opcode, &buf, &rbuf))
254 response = rbuf.offset != 0;
258 DEBUG(0,("response! opcode: 0x%x\n", opcode));
259 DEBUG(0,("request: length %d\n", param_len));
260 dump_data(0, mem_data(&buf.data , 0), MIN(param_len, 128));
261 DEBUG(0,("response: length %d\n", rbuf.data->offset.end));
262 dump_data(0, mem_data(&rbuf.data, 0), rbuf.data->offset.end);
273 /* send random IPC commands */
274 static void random_rpc_pipe_enc(char *pipe_name, struct client_info *cli_info,
280 DEBUG(0,("starting random rpc test on %s (encryped)\n", pipe_name));
282 /* establish connections. nothing to stop these being re-established. */
283 if (!rpcclient_connect(cli_info))
285 DEBUG(0,("random rpc test: connection failed\n"));
289 cli_nt_set_ntlmssp_flgs(smb_cli,
290 NTLMSSP_NEGOTIATE_UNICODE |
291 NTLMSSP_NEGOTIATE_OEM |
292 NTLMSSP_NEGOTIATE_SIGN |
293 NTLMSSP_NEGOTIATE_SEAL |
294 NTLMSSP_NEGOTIATE_LM_KEY |
295 NTLMSSP_NEGOTIATE_NTLM |
296 NTLMSSP_NEGOTIATE_ALWAYS_SIGN |
297 NTLMSSP_NEGOTIATE_00001000 |
298 NTLMSSP_NEGOTIATE_00002000);
300 for (i = 1; i <= numops * 100; i++)
303 cli_nt_session_open(smb_cli, pipe_name, &nt_pipe_fnum);
305 do_random_rpc(smb_cli, nt_pipe_fnum, 1024);
308 DEBUG(0,("calls: %i\n", i));
311 /* close the session */
312 cli_nt_session_close(smb_cli, nt_pipe_fnum);
315 /* close the rpc pipe */
318 DEBUG(0,("finished random rpc test on %s\n", pipe_name));
321 /* send random IPC commands */
322 static void random_rpc_pipe(char *pipe_name, struct client_info *cli_info,
328 DEBUG(0,("starting random rpc test on %s\n", pipe_name));
330 /* establish connections. nothing to stop these being re-established. */
331 if (!rpcclient_connect(cli_info))
333 DEBUG(0,("random rpc test: connection failed\n"));
338 if (!cli_nt_session_open(smb_cli, pipe_name, &nt_pipe_fnum))
340 DEBUG(0,("random rpc test: session open failed\n"));
344 for (i = 1; i <= numops * 100; i++)
346 do_random_rpc(smb_cli, nt_pipe_fnum, 8192);
349 DEBUG(0,("calls: %i\n", i));
353 /* close the session */
354 cli_nt_session_close(smb_cli, nt_pipe_fnum);
356 /* close the rpc pipe */
359 DEBUG(0,("finished random rpc test on %s\n", pipe_name));
362 static void run_randomrpc(int numops, struct client_info *cli_info)
378 while (pipes[i] != NULL)
380 random_rpc_pipe(pipes[i], cli_info, numops);
382 random_rpc_pipe_enc(pipes[i], cli_info, numops);
390 static void run_samhandles(int numops, struct client_info *cli_info)
398 fstrcpy(srv_name, "\\\\");
399 fstrcat(srv_name, cli_info->dest_host);
402 DEBUG(0,("starting sam handle test\n"));
404 /* establish connections. nothing to stop these being re-established. */
405 while (retry > 0 && !rpcclient_connect(cli_info))
412 DEBUG(0,("samhandle test: connection failed\n"));
417 if (!cli_nt_session_open(smb_cli, PIPE_SAMR, &nt_pipe_fnum))
419 DEBUG(0,("samhandle test: session open failed\n"));
423 for (i = 1; i <= numops * 100; i++)
427 if (!samr_connect(smb_cli, nt_pipe_fnum, srv_name, 0x20, &pol))
432 if (!samr_open_domain(smb_cli, nt_pipe_fnum, srv_name, 0x00000020, &pol))
434 DEBUG(0,("samhandle domain open test (%i): failed\n", i));
439 DEBUG(0,("calls: %i\n", i));
444 /* close the session */
445 cli_nt_session_close(smb_cli, nt_pipe_fnum);
447 /* close the rpc pipe */
450 DEBUG(0,("finished samhandle test. count: %d failed: %d\n", count, failed));
454 static void run_lsahandles(int numops, struct client_info *cli_info)
462 fstrcpy(srv_name, "\\\\");
463 fstrcat(srv_name, cli_info->myhostname);
466 DEBUG(0,("starting lsa handle test\n"));
468 /* establish connections. nothing to stop these being re-established. */
469 while (retry > 0 && !rpcclient_connect(cli_info))
476 DEBUG(0,("lsahandle test: connection failed\n"));
480 if (!cli_nt_session_open(smb_cli, PIPE_LSARPC, &nt_pipe_fnum))
482 DEBUG(0,("lsahandle test: session open failed\n"));
486 for (i = 1; i <= numops * 100; i++)
489 if (!lsa_open_policy(smb_cli, nt_pipe_fnum, srv_name, &pol, False))
495 DEBUG(0,("calls: %i\n", i));
500 /* close the session */
501 cli_nt_session_close(smb_cli, nt_pipe_fnum);
503 /* close the rpc pipe */
506 DEBUG(0,("finished lsahandle test. count: %d failed: %d\n", count, failed));
510 static void run_pipegobble(int numops, struct client_info *cli_info, char *pipe_name)
518 fstrcpy(srv_name, "\\\\");
519 fstrcat(srv_name, cli_info->myhostname);
522 DEBUG(0,("starting pipe gobble test (%s)\n", pipe_name));
524 /* establish connections. nothing to stop these being re-established. */
525 while (retry > 0 && !rpcclient_connect(cli_info))
532 DEBUG(0,("pipe gobble test: connection failed\n"));
535 for (i = 1; i <= numops * 100; i++)
538 if (!cli_nt_session_open(smb_cli, pipe_name, &nt_pipe_fnum))
540 DEBUG(0,("pipe gobble test: session open failed\n"));
545 DEBUG(0,("calls: %i\n", i));
552 DEBUG(0,("finished pipe gobble test (%s). count: %d failed: %d\n",
553 pipe_name, count, failed));
557 static void run_handles(int numops, struct client_info *cli_info)
559 run_lsahandles(numops, cli_info);
560 run_samhandles(numops, cli_info);
563 static void run_pipegobbler(int numops, struct client_info *cli_info)
565 run_pipegobble(numops, cli_info, PIPE_SAMR);
566 run_pipegobble(numops, cli_info, PIPE_LSARPC);
569 /****************************************************************************
571 ****************************************************************************/
572 static void run_tcpconnect(int numops, struct client_info *info)
577 for (i = 0; i < numops; i++)
581 if (!cli_connect(smb_cli, info->dest_host, &info->dest_ip))
585 cli_shutdown(smb_cli);
588 DEBUG(0,("tcp connections: count: %d failed: %d\n", numops, failed));
591 /****************************************************************************
592 runs n simultaneous functions.
593 ****************************************************************************/
594 static void create_procs(int nprocs, int numops,
595 struct client_info *cli_info,
596 void (*fn)(int, struct client_info *))
600 for (i=0;i<nprocs;i++)
604 int mypid = getpid();
605 sys_srandom(mypid ^ time(NULL));
606 fn(numops, cli_info);
612 for (i=0;i<nprocs;i++)
614 waitpid(0, &status, 0);
619 /****************************************************************************
620 usage on the program - OUT OF DATE!
621 ****************************************************************************/
622 static void usage(char *pname)
624 fprintf(out_hnd, "Usage: %s service <password> [-d debuglevel] [-l log] ",
627 fprintf(out_hnd, "\nVersion %s\n",VERSION);
628 fprintf(out_hnd, "\t-d debuglevel set the debuglevel\n");
629 fprintf(out_hnd, "\t-l log basename. Basename for log/debug files\n");
630 fprintf(out_hnd, "\t-n netbios name. Use this name as my netbios name\n");
631 fprintf(out_hnd, "\t-m max protocol set the max protocol level\n");
632 fprintf(out_hnd, "\t-I dest IP use this IP to connect to\n");
633 fprintf(out_hnd, "\t-E write messages to stderr instead of stdout\n");
634 fprintf(out_hnd, "\t-U username set the network username\n");
635 fprintf(out_hnd, "\t-W workgroup set the workgroup name\n");
636 fprintf(out_hnd, "\t-t terminal code terminal i/o code {sjis|euc|jis7|jis8|junet|hex}\n");
637 fprintf(out_hnd, "\t-N processes number of processes\n");
638 fprintf(out_hnd, "\t-o operations number of operations\n");
639 fprintf(out_hnd, "\n");
649 /****************************************************************************
651 ****************************************************************************/
652 int main(int argc,char *argv[])
654 char *pname = argv[0];
659 static pstring servicesf = CONFIGFILE;
662 mode_t myumask = 0755;
663 enum client_action cli_action = CLIENT_NONE;
667 struct client_info cli_info;
672 pstrcpy(term_code, KANJI);
677 if (!lp_load(servicesf,True, False, False))
679 fprintf(stderr, "Can't load %s - run testparm to debug it\n", servicesf);
682 codepage_initialise(lp_client_code_page());
686 cli_info.put_total_size = 0;
687 cli_info.put_total_time_ms = 0;
688 cli_info.get_total_size = 0;
689 cli_info.get_total_time_ms = 0;
691 cli_info.dir_total = 0;
692 cli_info.newer_than = 0;
693 cli_info.archive_level = 0;
694 cli_info.print_mode = 1;
696 cli_info.translation = False;
697 cli_info.recurse_dir = False;
698 cli_info.lowercase = False;
699 cli_info.prompt = True;
700 cli_info.abort_mget = True;
702 cli_info.dest_ip.s_addr = 0;
703 cli_info.name_type = 0x20;
705 pstrcpy(cli_info.cur_dir , "\\");
706 pstrcpy(cli_info.file_sel, "");
707 pstrcpy(cli_info.base_dir, "");
708 pstrcpy(cli_info.myhostname, "");
709 pstrcpy(cli_info.dest_host, "");
711 pstrcpy(cli_info.svc_type, "A:");
712 pstrcpy(cli_info.share, "");
713 pstrcpy(cli_info.service, "");
715 ZERO_STRUCT(cli_info.dom.level3_sid);
716 pstrcpy(cli_info.dom.level3_dom, "");
717 ZERO_STRUCT(cli_info.dom.level5_sid);
718 pstrcpy(cli_info.dom.level5_dom, "");
721 setup_logging(pname, True);
724 charset_initialise();
729 if (!get_myname(global_myname, NULL))
731 fprintf(stderr, "Failed to get my hostname.\n");
744 pstrcpy(cli_info.service, argv[1]);
745 /* Convert any '/' characters in the service name to '\' characters */
746 string_replace( cli_info.service, '/','\\');
750 DEBUG(1,("service: %s\n", cli_info.service));
752 if (count_chars(cli_info.service,'\\') < 3)
755 printf("\n%s: Not enough '\\' characters in service\n", cli_info.service);
760 if (count_chars(cli_info.service,'\\') > 3)
763 printf("\n%s: Too many '\\' characters in service\n", cli_info.service);
768 if (argc > 1 && (*argv[1] != '-'))
771 pstrcpy(password,argv[1]);
772 memset(argv[1],'X',strlen(argv[1]));
777 cli_action = CLIENT_SVC;
780 while ((opt = getopt(argc, argv,"s:B:O:M:S:i:N:o:n:d:l:hI:EB:U:L:t:m:W:T:D:c:")) != EOF)
786 /* FIXME ... max_protocol seems to be funny here */
788 int max_protocol = 0;
789 max_protocol = interpret_protocol(optarg,max_protocol);
790 fprintf(stderr, "max protocol not currently supported\n");
796 pstrcpy(user_socket_options,optarg);
802 pstrcpy(cli_info.dest_host,optarg);
803 strupper(cli_info.dest_host);
804 cli_action = CLIENT_IPC;
810 iface_set_default(NULL,optarg,NULL);
816 pstrcpy(scope, optarg);
823 pstrcpy(user_name,optarg);
824 if ((lp=strchr(user_name,'%')))
827 pstrcpy(password,lp+1);
829 memset(strchr(optarg,'%')+1,'X',strlen(password));
836 pstrcpy(domain,optarg);
848 cli_info.dest_ip = *interpret_addr2(optarg);
849 if (zero_ip(cli_info.dest_ip))
858 nprocs = atoi(optarg);
864 numops = atoi(optarg);
870 fstrcpy(global_myname, optarg);
879 DEBUGLEVEL = atoi(optarg);
885 slprintf(debugf, sizeof(debugf)-1,
906 pstrcpy(servicesf, optarg);
912 pstrcpy(term_code, optarg);
925 if (cli_action == CLIENT_NONE)
931 strupper(global_myname);
932 fstrcpy(cli_info.myhostname, global_myname);
934 DEBUG(3,("%s client started (version %s)\n",timestring(),VERSION));
938 if (cli_action == CLIENT_IPC)
940 pstrcpy(cli_info.share, "IPC$");
941 pstrcpy(cli_info.svc_type, "IPC");
944 fstrcpy(cli_info.mach_acct, cli_info.myhostname);
945 strupper(cli_info.mach_acct);
946 fstrcat(cli_info.mach_acct, "$");
948 make_nmb_name(&called , dns_to_netbios_name(cli_info.dest_host ), cli_info.name_type, scope);
949 make_nmb_name(&calling, dns_to_netbios_name(cli_info.myhostname), 0x0 , scope);
953 create_procs(nprocs, numops, &cli_info, run_enums_test);
955 if (password[0] != 0)
957 create_procs(nprocs, numops, &cli_info, run_ntlogin_test);
962 create_procs(nprocs, numops, &cli_info, run_randomrpc);
963 create_procs(nprocs, numops, &cli_info, run_pipegobbler);
964 create_procs(nprocs, numops, &cli_info, run_tcpconnect);
966 create_procs(nprocs, numops, &cli_info, run_handles);