python:tests: Store keys as bytes rather than as lists of ints
[samba.git] / source4 / torture / rpc / srvsvc.c
1 /* 
2    Unix SMB/CIFS implementation.
3    test suite for srvsvc rpc operations
4
5    Copyright (C) Stefan (metze) Metzmacher 2003
6    
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11    
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16    
17    You should have received a copy of the GNU General Public License
18    along with this program.  If not, see <http://www.gnu.org/licenses/>.
19 */
20
21 #include "includes.h"
22 #include "librpc/gen_ndr/ndr_srvsvc_c.h"
23 #include "torture/rpc/torture_rpc.h"
24
25 /**************************/
26 /* srvsvc_NetCharDev      */
27 /**************************/
28 static bool test_NetCharDevGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
29                                 const char *devname)
30 {
31         NTSTATUS status;
32         struct srvsvc_NetCharDevGetInfo r;
33         union srvsvc_NetCharDevInfo info;
34         uint32_t levels[] = {0, 1};
35         int i;
36         struct dcerpc_binding_handle *b = p->binding_handle;
37
38         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
39         r.in.device_name = devname;
40         r.out.info = &info;
41
42         for (i=0;i<ARRAY_SIZE(levels);i++) {
43                 r.in.level = levels[i];
44                 torture_comment(tctx, "Testing NetCharDevGetInfo level %u on device '%s'\n",
45                         r.in.level, r.in.device_name);
46                 status = dcerpc_srvsvc_NetCharDevGetInfo_r(b, tctx, &r);
47                 torture_assert_ntstatus_ok(tctx, status, "NetCharDevGetInfo failed");
48                 torture_assert_werr_ok(tctx, r.out.result, "NetCharDevGetInfo failed");
49         }
50
51         return true;
52 }
53
54 static bool test_NetCharDevControl(struct dcerpc_pipe *p, struct torture_context *tctx,
55                                 const char *devname)
56 {
57         NTSTATUS status;
58         struct srvsvc_NetCharDevControl r;
59         uint32_t opcodes[] = {0, 1};
60         int i;
61         struct dcerpc_binding_handle *b = p->binding_handle;
62
63         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
64         r.in.device_name = devname;
65
66         for (i=0;i<ARRAY_SIZE(opcodes);i++) {
67                 ZERO_STRUCT(r.out);
68                 r.in.opcode = opcodes[i];
69                 torture_comment(tctx, "Testing NetCharDevControl opcode %u on device '%s'\n", 
70                         r.in.opcode, r.in.device_name);
71                 status = dcerpc_srvsvc_NetCharDevControl_r(b, tctx, &r);
72                 torture_assert_ntstatus_ok(tctx, status, "NetCharDevControl failed");
73                 torture_assert_werr_ok(tctx, r.out.result, "NetCharDevControl failed");
74         }
75
76         return true;
77 }
78
79 static bool test_NetCharDevEnum(struct torture_context *tctx, 
80                                                                 struct dcerpc_pipe *p)
81 {
82         NTSTATUS status;
83         struct srvsvc_NetCharDevEnum r;
84         struct srvsvc_NetCharDevInfoCtr info_ctr;
85         struct srvsvc_NetCharDevCtr0 c0;
86         struct srvsvc_NetCharDevCtr0 c1;
87         uint32_t totalentries = 0;
88         uint32_t levels[] = {0, 1};
89         int i;
90         struct dcerpc_binding_handle *b = p->binding_handle;
91
92         ZERO_STRUCT(info_ctr);
93
94         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
95         r.in.info_ctr = &info_ctr;
96         r.in.max_buffer = (uint32_t)-1;
97         r.in.resume_handle = NULL;
98         r.out.info_ctr = &info_ctr;
99         r.out.totalentries = &totalentries;
100
101         for (i=0;i<ARRAY_SIZE(levels);i++) {
102                 int j;
103
104                 info_ctr.level = levels[i];
105
106                 switch(info_ctr.level) {
107                 case 0:
108                         ZERO_STRUCT(c0);
109                         info_ctr.ctr.ctr0 = &c0;
110                         break;
111                 case 1:
112                         ZERO_STRUCT(c1);
113                         info_ctr.ctr.ctr0 = &c1;
114                         break;
115                 }
116
117                 torture_comment(tctx, "Testing NetCharDevEnum level %u\n", info_ctr.level);
118                 status = dcerpc_srvsvc_NetCharDevEnum_r(b, tctx, &r);
119                 torture_assert_ntstatus_ok(tctx, status, "NetCharDevEnum failed");
120                 if (!W_ERROR_IS_OK(r.out.result)) {
121                         torture_comment(tctx, "NetCharDevEnum failed: %s\n", win_errstr(r.out.result));
122                         continue;
123                 }
124
125                 /* call test_NetCharDevGetInfo and test_NetCharDevControl for each returned share */
126                 if (info_ctr.level == 1) {
127                         for (j=0;j<r.out.info_ctr->ctr.ctr1->count;j++) {
128                                 const char *device;
129                                 device = r.out.info_ctr->ctr.ctr1->array[j].device;
130                                 if (!test_NetCharDevGetInfo(p, tctx, device)) {
131                                         return false;
132                                 }
133                                 if (!test_NetCharDevControl(p, tctx, device)) {
134                                         return false;
135                                 }
136                         }
137                 }
138         }
139
140         return true;
141 }
142
143 /**************************/
144 /* srvsvc_NetCharDevQ     */
145 /**************************/
146 static bool test_NetCharDevQGetInfo(struct dcerpc_pipe *p, struct torture_context *tctx,
147                                 const char *devicequeue)
148 {
149         NTSTATUS status;
150         struct srvsvc_NetCharDevQGetInfo r;
151         union srvsvc_NetCharDevQInfo info;
152         uint32_t levels[] = {0, 1};
153         int i;
154         struct dcerpc_binding_handle *b = p->binding_handle;
155
156         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
157         r.in.queue_name = devicequeue;
158         r.in.user = talloc_asprintf(tctx,"Administrator");
159         r.out.info = &info;
160
161         for (i=0;i<ARRAY_SIZE(levels);i++) {
162                 r.in.level = levels[i];
163                 torture_comment(tctx, "Testing NetCharDevQGetInfo level %u on devicequeue '%s'\n",
164                         r.in.level, r.in.queue_name);
165                 status = dcerpc_srvsvc_NetCharDevQGetInfo_r(b, tctx, &r);
166                 torture_assert_ntstatus_ok(tctx, status, "NetCharDevQGetInfo failed");
167                 torture_assert_werr_ok(tctx, r.out.result, "NetCharDevQGetInfo failed");
168         }
169
170         return true;
171 }
172
173 #if 0
174 static bool test_NetCharDevQSetInfo(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
175                                 const char *devicequeue)
176 {
177         NTSTATUS status;
178         struct srvsvc_NetCharDevQSetInfo r;
179         uint32_t parm_error;
180         uint32_t levels[] = {0, 1};
181         int i;
182         bool ret = true;
183         struct dcerpc_binding_handle *b = p->binding_handle;
184
185         r.in.server_unc = talloc_asprintf(mem_ctx,"\\\\%s",dcerpc_server_name(p));
186         r.in.queue_name = devicequeue;
187
188         for (i=0;i<ARRAY_SIZE(levels);i++) {
189                 ZERO_STRUCT(r.out);
190                 parm_error = 0;
191                 r.in.level = levels[i];
192                 d_printf("testing NetCharDevQSetInfo level %u on devicequeue '%s'\n", 
193                         r.in.level, devicequeue);
194                 switch (r.in.level) {
195                 case 0:
196                         r.in.info.info0 = talloc(mem_ctx, struct srvsvc_NetCharDevQInfo0);
197                         r.in.info.info0->device = r.in.queue_name;
198                         break;
199                 case 1:
200                         r.in.info.info1 = talloc(mem_ctx, struct srvsvc_NetCharDevQInfo1);
201                         r.in.info.info1->device = r.in.queue_name;
202                         r.in.info.info1->priority = 0x000;
203                         r.in.info.info1->devices = r.in.queue_name;
204                         r.in.info.info1->users = 0x000;
205                         r.in.info.info1->num_ahead = 0x000;
206                         break;
207                 default:
208                         break;
209                 }
210                 r.in.parm_error = &parm_error;
211                 status = dcerpc_srvsvc_NetCharDevQSetInfo_r(b, mem_ctx, &r);
212                 if (!NT_STATUS_IS_OK(status)) {
213                         d_printf("NetCharDevQSetInfo level %u on devicequeue '%s' failed - %s\n",
214                                 r.in.level, r.in.queue_name, nt_errstr(status));
215                         ret = false;
216                         continue;
217                 }
218                 if (!W_ERROR_IS_OK(r.out.result)) {
219                         d_printf("NetCharDevQSetInfo level %u on devicequeue '%s' failed - %s\n",
220                                 r.in.level, r.in.queue_name, win_errstr(r.out.result));
221                         continue;
222                 }
223         }
224
225         return ret;
226 }
227 #endif
228
229 static bool test_NetCharDevQEnum(struct torture_context *tctx, 
230                                  struct dcerpc_pipe *p)
231 {
232         NTSTATUS status;
233         struct srvsvc_NetCharDevQEnum r;
234         struct srvsvc_NetCharDevQInfoCtr info_ctr;
235         struct srvsvc_NetCharDevQCtr0 c0;
236         struct srvsvc_NetCharDevQCtr1 c1;
237         uint32_t totalentries = 0;
238         uint32_t levels[] = {0, 1};
239         int i;
240         struct dcerpc_binding_handle *b = p->binding_handle;
241
242         ZERO_STRUCT(info_ctr);
243
244         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
245         r.in.user = talloc_asprintf(tctx,"%s","Administrator");
246         r.in.info_ctr = &info_ctr;
247         r.in.max_buffer = (uint32_t)-1;
248         r.in.resume_handle = NULL;
249         r.out.totalentries = &totalentries;
250         r.out.info_ctr = &info_ctr;
251
252         for (i=0;i<ARRAY_SIZE(levels);i++) {
253                 int j;
254
255                 info_ctr.level = levels[i];
256
257                 switch (info_ctr.level) {
258                 case 0:
259                         ZERO_STRUCT(c0);
260                         info_ctr.ctr.ctr0 = &c0;
261                         break;
262                 case 1:
263                         ZERO_STRUCT(c1);
264                         info_ctr.ctr.ctr1 = &c1;
265                         break;
266                 }
267                 torture_comment(tctx, "Testing NetCharDevQEnum level %u\n", info_ctr.level);
268                 status = dcerpc_srvsvc_NetCharDevQEnum_r(b, tctx, &r);
269                 torture_assert_ntstatus_ok(tctx, status, "NetCharDevQEnum failed");
270                 if (!W_ERROR_IS_OK(r.out.result)) {
271                         torture_comment(tctx, "NetCharDevQEnum failed: %s\n", win_errstr(r.out.result));
272                         continue;
273                 }
274
275                 /* call test_NetCharDevGetInfo and test_NetCharDevControl for each returned share */
276                 if (info_ctr.level == 1) {
277                         for (j=0;j<r.out.info_ctr->ctr.ctr1->count;j++) {
278                                 const char *device;
279                                 device = r.out.info_ctr->ctr.ctr1->array[j].device;
280                                 if (!test_NetCharDevQGetInfo(p, tctx, device)) {
281                                         return false;
282                                 }
283                         }
284                 }
285         }
286
287         return true;
288 }
289
290 /**************************/
291 /* srvsvc_NetConn         */
292 /**************************/
293 static bool test_NetConnEnum(struct torture_context *tctx,
294                              struct dcerpc_pipe *p)
295 {
296         NTSTATUS status;
297         struct srvsvc_NetConnEnum r;
298         struct srvsvc_NetConnInfoCtr info_ctr;
299         struct srvsvc_NetConnCtr0 c0;
300         struct srvsvc_NetConnCtr1 c1;
301         uint32_t totalentries = 0;
302         uint32_t levels[] = {0, 1};
303         int i;
304         struct dcerpc_binding_handle *b = p->binding_handle;
305
306         ZERO_STRUCT(info_ctr);
307
308         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
309         r.in.path = talloc_asprintf(tctx,"%s","IPC$");
310         r.in.info_ctr = &info_ctr;
311         r.in.max_buffer = (uint32_t)-1;
312         r.in.resume_handle = NULL;
313         r.out.totalentries = &totalentries;
314         r.out.info_ctr = &info_ctr;
315
316         for (i=0;i<ARRAY_SIZE(levels);i++) {
317                 info_ctr.level = levels[i];
318
319                 switch (info_ctr.level) {
320                 case 0:
321                         ZERO_STRUCT(c0);
322                         info_ctr.ctr.ctr0 = &c0;
323                         break;
324                 case 1:
325                         ZERO_STRUCT(c1);
326                         info_ctr.ctr.ctr1 = &c1;
327                         break;
328                 }
329
330                 torture_comment(tctx, "Testing NetConnEnum level %u\n", info_ctr.level);
331                 status = dcerpc_srvsvc_NetConnEnum_r(b, tctx, &r);
332                 torture_assert_ntstatus_ok(tctx, status, "NetConnEnum failed");
333                 if (!W_ERROR_IS_OK(r.out.result)) {
334                         torture_comment(tctx, "NetConnEnum failed: %s\n", win_errstr(r.out.result));
335                 }
336         }
337
338         return true;
339 }
340
341 /**************************/
342 /* srvsvc_NetFile         */
343 /**************************/
344 static bool test_NetFileEnum(struct torture_context *tctx,
345                              struct dcerpc_pipe *p)
346 {
347         NTSTATUS status;
348         struct srvsvc_NetFileEnum r;
349         struct srvsvc_NetFileInfoCtr info_ctr;
350         struct srvsvc_NetFileCtr2 c2;
351         struct srvsvc_NetFileCtr3 c3;
352         uint32_t totalentries = 0;
353         uint32_t levels[] = {2, 3};
354         int i;
355         struct dcerpc_binding_handle *b = p->binding_handle;
356
357         ZERO_STRUCT(info_ctr);
358
359         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
360         r.in.path = NULL;
361         r.in.user = NULL;
362         r.in.info_ctr = &info_ctr;
363         r.in.max_buffer = (uint32_t)4096;
364         r.in.resume_handle = NULL;
365         r.out.totalentries = &totalentries;
366         r.out.info_ctr = &info_ctr;
367
368         for (i=0;i<ARRAY_SIZE(levels);i++) {
369                 info_ctr.level = levels[i];
370
371                 switch (info_ctr.level) {
372                 case 2:
373                         ZERO_STRUCT(c2);
374                         info_ctr.ctr.ctr2 = &c2;
375                         break;
376                 case 3:
377                         ZERO_STRUCT(c3);
378                         info_ctr.ctr.ctr3 = &c3;
379                         break;
380                 }
381                 torture_comment(tctx, "Testing NetFileEnum level %u\n", info_ctr.level);
382                 status = dcerpc_srvsvc_NetFileEnum_r(b, tctx, &r);
383                 torture_assert_ntstatus_ok(tctx, status, "NetFileEnum failed");
384                 if (!W_ERROR_IS_OK(r.out.result)) {
385                         torture_comment(tctx, "NetFileEnum failed: %s\n", win_errstr(r.out.result));
386                 }
387         }
388
389         return true;
390 }
391
392 /**************************/
393 /* srvsvc_NetSess         */
394 /**************************/
395 static bool test_NetSessEnum(struct torture_context *tctx,
396                              struct dcerpc_pipe *p)
397 {
398         NTSTATUS status;
399         struct srvsvc_NetSessEnum r;
400         struct srvsvc_NetSessInfoCtr info_ctr;
401         struct srvsvc_NetSessCtr0 c0;
402         struct srvsvc_NetSessCtr1 c1;
403         struct srvsvc_NetSessCtr2 c2;
404         struct srvsvc_NetSessCtr10 c10;
405         struct srvsvc_NetSessCtr502 c502;
406         uint32_t totalentries = 0;
407         uint32_t levels[] = {0, 1, 2, 10, 502};
408         int i;
409         struct dcerpc_binding_handle *b = p->binding_handle;
410
411         ZERO_STRUCT(info_ctr);
412
413         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
414         r.in.client = NULL;
415         r.in.user = NULL;
416         r.in.info_ctr = &info_ctr;
417         r.in.max_buffer = (uint32_t)-1;
418         r.in.resume_handle = NULL;
419         r.out.totalentries = &totalentries;
420         r.out.info_ctr = &info_ctr;
421
422         for (i=0;i<ARRAY_SIZE(levels);i++) {
423                 info_ctr.level = levels[i];
424
425                 switch (info_ctr.level) {
426                 case 0:
427                         ZERO_STRUCT(c0);
428                         info_ctr.ctr.ctr0 = &c0;
429                         break;
430                 case 1:
431                         ZERO_STRUCT(c1);
432                         info_ctr.ctr.ctr1 = &c1;
433                         break;
434                 case 2:
435                         ZERO_STRUCT(c2);
436                         info_ctr.ctr.ctr2 = &c2;
437                         break;
438                 case 10:
439                         ZERO_STRUCT(c10);
440                         info_ctr.ctr.ctr10 = &c10;
441                         break;
442                 case 502:
443                         ZERO_STRUCT(c502);
444                         info_ctr.ctr.ctr502 = &c502;
445                         break;
446                 }
447
448                 torture_comment(tctx, "Testing NetSessEnum level %u\n", info_ctr.level);
449                 status = dcerpc_srvsvc_NetSessEnum_r(b, tctx, &r);
450                 torture_assert_ntstatus_ok(tctx, status, "NetSessEnum failed");
451                 if (!W_ERROR_IS_OK(r.out.result)) {
452                         torture_comment(tctx, "NetSessEnum failed: %s\n", win_errstr(r.out.result));
453                 }
454         }
455
456         return true;
457 }
458
459 /**************************/
460 /* srvsvc_NetShare        */
461 /**************************/
462 static bool test_NetShareCheck(struct dcerpc_pipe *p, struct torture_context *tctx,
463                                const char *device_name)
464 {
465         NTSTATUS status;
466         struct srvsvc_NetShareCheck r;
467         enum srvsvc_ShareType type;
468         struct dcerpc_binding_handle *b = p->binding_handle;
469
470         r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
471         r.in.device_name = device_name;
472         r.out.type = &type;
473
474         torture_comment(tctx, 
475                         "Testing NetShareCheck on device '%s'\n", r.in.device_name);
476
477         status = dcerpc_srvsvc_NetShareCheck_r(b, tctx, &r);
478         torture_assert_ntstatus_ok(tctx, status, "dcerpc_srvsvc_NetShareCheck failed");
479         torture_assert_werr_ok(tctx, r.out.result, "NetShareCheck failed");
480
481         return true;
482 }
483
484 static bool test_NetShareGetInfo(struct torture_context *tctx, 
485                                  struct dcerpc_pipe *p,
486                                  const char *sharename, bool admin)
487 {
488         NTSTATUS status;
489         struct srvsvc_NetShareGetInfo r;
490         union srvsvc_NetShareInfo info;
491         struct {
492                 uint32_t level;
493                 WERROR anon_status;
494                 WERROR admin_status;
495         } levels[] = {
496                  { 0,           WERR_OK,                WERR_OK },
497                  { 1,           WERR_OK,                WERR_OK },
498                  { 2,           WERR_ACCESS_DENIED,     WERR_OK },
499                  { 501,         WERR_OK,                WERR_OK },
500                  { 502,         WERR_ACCESS_DENIED,     WERR_OK },
501                  { 1005,        WERR_OK,                WERR_OK },
502         };
503         int i;
504         struct dcerpc_binding_handle *b = p->binding_handle;
505
506         r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
507         r.in.share_name = sharename;
508         r.out.info = &info;
509
510         for (i=0;i<ARRAY_SIZE(levels);i++) {
511                 WERROR expected;
512
513                 r.in.level = levels[i].level;
514                 expected = levels[i].anon_status;
515                 if (admin) expected = levels[i].admin_status;
516
517                 torture_comment(tctx, "Testing NetShareGetInfo level %u on share '%s'\n", 
518                        r.in.level, r.in.share_name);
519
520                 status = dcerpc_srvsvc_NetShareGetInfo_r(b, tctx, &r);
521                 torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed");
522                 torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareGetInfo failed");
523
524                 if (r.in.level != 2) continue;
525                 if (!r.out.info->info2 || !r.out.info->info2->path) continue;
526                 if (!test_NetShareCheck(p, tctx, r.out.info->info2->path)) {
527                         return false;
528                 }
529         }
530
531         return true;
532 }
533
534 static bool test_NetShareGetInfoAdminFull(struct torture_context *tctx, 
535                                           struct dcerpc_pipe *p)
536 {
537         return test_NetShareGetInfo(tctx, p, "IPC$", true);
538 }
539
540 static bool test_NetShareGetInfoAdminAnon(struct torture_context *tctx, 
541                                           struct dcerpc_pipe *p)
542 {
543         return test_NetShareGetInfo(tctx, p, "IPC$", false);
544 }
545
546 static bool test_NetShareAddSetDel(struct torture_context *tctx, 
547                                    struct dcerpc_pipe *p)
548 {
549         NTSTATUS status;
550         struct srvsvc_NetShareAdd a;
551         struct srvsvc_NetShareSetInfo r;
552         struct srvsvc_NetShareGetInfo q;
553         struct srvsvc_NetShareDel d;
554         struct sec_desc_buf sd_buf;
555         union srvsvc_NetShareInfo info;
556         struct {
557                 uint32_t level;
558                 WERROR expected;
559         } levels[] = {
560                  { 0,           WERR_INVALID_LEVEL },
561                  { 1,           WERR_OK },
562                  { 2,           WERR_OK },
563                  { 501,         WERR_INVALID_LEVEL },
564                  { 502,         WERR_OK },
565                  { 1004,        WERR_OK },
566                  { 1005,        WERR_OK },
567                  { 1006,        WERR_OK },
568 /*               { 1007,        WERR_OK }, */
569                  { 1501,        WERR_OK },
570         };
571         int i;
572         struct dcerpc_binding_handle *b = p->binding_handle;
573
574         a.in.server_unc = r.in.server_unc = q.in.server_unc = d.in.server_unc =
575                 talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
576         r.in.share_name = talloc_strdup(tctx, "testshare");
577
578         info.info2 = talloc(tctx, struct srvsvc_NetShareInfo2);
579         info.info2->name = r.in.share_name;
580         info.info2->type = STYPE_DISKTREE;
581         info.info2->comment = talloc_strdup(tctx, "test comment");
582         info.info2->permissions = 123434566;
583         info.info2->max_users = -1;
584         info.info2->current_users = 0;
585         info.info2->path = talloc_strdup(tctx, "C:\\");
586         info.info2->password = NULL;
587
588         a.in.info = &info;
589         a.in.level = 2;
590         a.in.parm_error = NULL;
591
592         status = dcerpc_srvsvc_NetShareAdd_r(b, tctx, &a);
593         torture_assert_ntstatus_ok(tctx, status, "NetShareAdd level 2 on share 'testshare' failed");
594         torture_assert_werr_ok(tctx, a.out.result, "NetShareAdd level 2 on share 'testshare' failed");
595
596         r.in.parm_error = NULL;
597
598         q.in.level = 502;
599
600         for (i = 0; i < ARRAY_SIZE(levels); i++) {
601
602                 r.in.level = levels[i].level;
603                 ZERO_STRUCT(r.out);
604
605                 torture_comment(tctx, "Testing NetShareSetInfo level %u on share '%s'\n", 
606                        r.in.level, r.in.share_name);
607
608                 switch (levels[i].level) {
609                 case 0:
610                         info.info0 = talloc(tctx, struct srvsvc_NetShareInfo0);
611                         info.info0->name = r.in.share_name;
612                         break;
613                 case 1:
614                         info.info1 = talloc(tctx, struct srvsvc_NetShareInfo1);
615                         info.info1->name = r.in.share_name;
616                         info.info1->type = STYPE_DISKTREE;
617                         info.info1->comment = talloc_strdup(tctx, "test comment 1");
618                         break;
619                 case 2: 
620                         info.info2 = talloc(tctx, struct srvsvc_NetShareInfo2);
621                         info.info2->name = r.in.share_name;
622                         info.info2->type = STYPE_DISKTREE;
623                         info.info2->comment = talloc_strdup(tctx, "test comment 2");
624                         info.info2->permissions = 0;
625                         info.info2->max_users = 2;
626                         info.info2->current_users = 1;
627                         info.info2->path = talloc_strdup(tctx, "::BLaH::"); /* "C:\\"); */
628                         info.info2->password = NULL;
629                         break;
630                 case 501:
631                         info.info501 = talloc(tctx, struct srvsvc_NetShareInfo501);
632                         info.info501->name = r.in.share_name;
633                         info.info501->type = STYPE_DISKTREE;
634                         info.info501->comment = talloc_strdup(tctx, "test comment 501");
635                         info.info501->csc_policy = 0;
636                         break;
637                 case 502:
638                         ZERO_STRUCT(sd_buf);
639                         info.info502 = talloc(tctx, struct srvsvc_NetShareInfo502);
640                         info.info502->name = r.in.share_name;
641                         info.info502->type = STYPE_DISKTREE;
642                         info.info502->comment = talloc_strdup(tctx, "test comment 502");
643                         info.info502->permissions = 0;
644                         info.info502->max_users = 502;
645                         info.info502->current_users = 1;
646                         info.info502->path = talloc_strdup(tctx, "C:\\");
647                         info.info502->password = NULL;
648                         info.info502->sd_buf = sd_buf;
649                         break;
650                 case 1004:
651                         info.info1004 = talloc(tctx, struct srvsvc_NetShareInfo1004);
652                         info.info1004->comment = talloc_strdup(tctx, "test comment 1004");
653                         break;
654                 case 1005:
655                         info.info1005 = talloc(tctx, struct srvsvc_NetShareInfo1005);
656                         info.info1005->dfs_flags = 0;
657                         break;
658                 case 1006:
659                         info.info1006 = talloc(tctx, struct srvsvc_NetShareInfo1006);
660                         info.info1006->max_users = 1006;
661                         break;
662 /*              case 1007:
663                         info.info1007 = talloc(tctx, struct srvsvc_NetShareInfo1007);
664                         info.info1007->flags = 0;
665                         info.info1007->alternate_directory_name = talloc_strdup(tctx, "test");
666                         break;
667 */
668                 case 1501:
669                         info.info1501 = talloc_zero(tctx, struct sec_desc_buf);
670                         break;
671                 }
672
673                 r.in.info = &info;
674
675                 status = dcerpc_srvsvc_NetShareSetInfo_r(b, tctx, &r);
676                 torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed");
677                 torture_assert_werr_equal(tctx, r.out.result, levels[i].expected, "NetShareSetInfo failed");
678                 
679                 q.in.share_name = r.in.share_name;
680                 q.out.info = &info;
681
682                 status = dcerpc_srvsvc_NetShareGetInfo_r(b, tctx, &q);
683                 torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed");
684                 torture_assert_werr_ok(tctx, q.out.result, "NetShareGetInfo failed");
685
686                 torture_assert_str_equal(tctx, q.out.info->info502->name, r.in.share_name,
687                                          "share name invalid");
688
689                 switch (levels[i].level) {
690                 case 0:
691                         break;
692                 case 1:
693                         torture_assert_str_equal(tctx, q.out.info->info502->comment, "test comment 1", "comment");
694                         break;
695                 case 2:
696                         torture_assert_str_equal(tctx, q.out.info->info2->comment, "test comment 2", "comment");
697                         torture_assert_int_equal(tctx, q.out.info->info2->max_users, 2, "max users");
698                         torture_assert_str_equal(tctx, q.out.info->info2->path, "C:\\", "path");
699                         break;
700                 case 501:
701                         torture_assert_str_equal(tctx, q.out.info->info501->comment, "test comment 501", "comment");
702                         break;
703                 case 502:
704                         torture_assert_str_equal(tctx, q.out.info->info502->comment, "test comment 502", "comment");
705                         torture_assert_int_equal(tctx, q.out.info->info502->max_users, 502, "max users");
706                         torture_assert_str_equal(tctx, q.out.info->info502->path, "C:\\", "path");
707                         break;
708                 case 1004:
709                         torture_assert_str_equal(tctx, q.out.info->info1004->comment, "test comment 1004",
710                                                  "comment");
711                         break;
712                 case 1005:
713                         break;
714                 case 1006:
715                         torture_assert_int_equal(tctx, q.out.info->info1006->max_users, 1006, "Max users");
716                         break;
717 /*              case 1007:
718                         break;
719 */
720                 case 1501:
721                         break;
722                 }
723         }
724
725         d.in.share_name = r.in.share_name;
726         d.in.reserved = 0;
727
728         status = dcerpc_srvsvc_NetShareDel_r(b, tctx, &d);
729         torture_assert_ntstatus_ok(tctx, status, "NetShareDel on share 'testshare502' failed");
730         torture_assert_werr_ok(tctx, a.out.result, "NetShareDel on share 'testshare502' failed");
731
732         return true;
733 }
734
735 /**************************/
736 /* srvsvc_NetShare        */
737 /**************************/
738 static bool test_NetShareEnumAll(struct torture_context *tctx, 
739                                  struct dcerpc_pipe *p, 
740                                  bool admin)
741 {
742         NTSTATUS status;
743         struct srvsvc_NetShareEnumAll r;
744         struct srvsvc_NetShareInfoCtr info_ctr;
745         struct srvsvc_NetShareCtr0 c0;
746         struct srvsvc_NetShareCtr1 c1;
747         struct srvsvc_NetShareCtr2 c2;
748         struct srvsvc_NetShareCtr501 c501;
749         struct srvsvc_NetShareCtr502 c502;
750         uint32_t totalentries = 0;
751         struct {
752                 uint32_t level;
753                 WERROR anon_status;
754                 WERROR admin_status;
755         } levels[] = {
756                  { 0,   WERR_OK,                WERR_OK },
757                  { 1,   WERR_OK,                WERR_OK },
758                  { 2,   WERR_ACCESS_DENIED,     WERR_OK },
759                  { 501, WERR_ACCESS_DENIED,     WERR_OK },
760                  { 502, WERR_ACCESS_DENIED,     WERR_OK },
761         };
762         int i;
763         uint32_t resume_handle;
764         struct dcerpc_binding_handle *b = p->binding_handle;
765
766         ZERO_STRUCT(info_ctr);
767
768         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
769         r.in.info_ctr = &info_ctr;
770         r.in.max_buffer = (uint32_t)-1;
771         r.in.resume_handle = &resume_handle;
772         r.out.resume_handle = &resume_handle;
773         r.out.totalentries = &totalentries;
774         r.out.info_ctr = &info_ctr;
775
776         for (i=0;i<ARRAY_SIZE(levels);i++) {
777
778                 int j;
779                 WERROR expected;
780
781                 info_ctr.level = levels[i].level;
782
783                 switch (info_ctr.level) {
784                 case 0:
785                         ZERO_STRUCT(c0);
786                         info_ctr.ctr.ctr0 = &c0;
787                         break;
788                 case 1:
789                         ZERO_STRUCT(c1);
790                         info_ctr.ctr.ctr1 = &c1;
791                         break;
792                 case 2:
793                         ZERO_STRUCT(c2);
794                         info_ctr.ctr.ctr2 = &c2;
795                         break;
796                 case 501:
797                         ZERO_STRUCT(c501);
798                         info_ctr.ctr.ctr501 = &c501;
799                         break;
800                 case 502:
801                         ZERO_STRUCT(c502);
802                         info_ctr.ctr.ctr502 = &c502;
803                         break;
804                 }
805
806                 expected = levels[i].anon_status;
807                 if (admin) expected = levels[i].admin_status;
808
809                 resume_handle = 0;
810
811                 torture_comment(tctx, "Testing NetShareEnumAll level %u\n", info_ctr.level);
812                 status = dcerpc_srvsvc_NetShareEnumAll_r(b, tctx, &r);
813                 torture_assert_ntstatus_ok(tctx, status, "NetShareEnumAll failed");
814                 torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareEnumAll failed");
815
816                 /* call srvsvc_NetShareGetInfo for each returned share */
817                 if (info_ctr.level == 2 && r.out.info_ctr->ctr.ctr2) {
818                         for (j=0;j<r.out.info_ctr->ctr.ctr2->count;j++) {
819                                 const char *name;
820                                 name = r.out.info_ctr->ctr.ctr2->array[j].name;
821                                 if (!test_NetShareGetInfo(tctx, p, name, admin)) {
822                                         return false;
823                                 }
824                         }
825                 }
826         }
827
828         return true;
829 }
830
831 static bool test_NetShareEnumAllFull(struct torture_context *tctx,
832                               struct dcerpc_pipe *p)
833 {
834         return test_NetShareEnumAll(tctx, p, true);
835 }
836
837 static bool test_NetShareEnumAllAnon(struct torture_context *tctx,
838                               struct dcerpc_pipe *p)
839 {
840         return test_NetShareEnumAll(tctx, p, false);
841 }
842
843 static bool test_NetShareEnum(struct torture_context *tctx,
844                               struct dcerpc_pipe *p, bool admin)
845 {
846         NTSTATUS status;
847         struct srvsvc_NetShareEnum r;
848         struct srvsvc_NetShareInfoCtr info_ctr;
849         struct srvsvc_NetShareCtr0 c0;
850         struct srvsvc_NetShareCtr1 c1;
851         struct srvsvc_NetShareCtr2 c2;
852         struct srvsvc_NetShareCtr501 c501;
853         struct srvsvc_NetShareCtr502 c502;
854         uint32_t totalentries = 0;
855         struct {
856                 uint32_t level;
857                 WERROR anon_status;
858                 WERROR admin_status;
859         } levels[] = {
860                  { 0,   WERR_OK,                WERR_OK },
861                  { 1,   WERR_OK,                WERR_OK },
862                  { 2,   WERR_ACCESS_DENIED,     WERR_OK },
863                  { 501, WERR_INVALID_LEVEL,     WERR_INVALID_LEVEL },
864                  { 502, WERR_ACCESS_DENIED,     WERR_OK },
865         };
866         int i;
867         struct dcerpc_binding_handle *b = p->binding_handle;
868
869         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
870         r.in.info_ctr = &info_ctr;
871         r.in.max_buffer = (uint32_t)-1;
872         r.in.resume_handle = NULL;
873         r.out.totalentries = &totalentries;
874         r.out.info_ctr = &info_ctr;
875
876         for (i=0;i<ARRAY_SIZE(levels);i++) {
877                 WERROR expected;
878
879                 info_ctr.level = levels[i].level;
880
881                 switch (info_ctr.level) {
882                 case 0:
883                         ZERO_STRUCT(c0);
884                         info_ctr.ctr.ctr0 = &c0;
885                         break;
886                 case 1:
887                         ZERO_STRUCT(c1);
888                         info_ctr.ctr.ctr1 = &c1;
889                         break;
890                 case 2:
891                         ZERO_STRUCT(c2);
892                         info_ctr.ctr.ctr2 = &c2;
893                         break;
894                 case 501:
895                         ZERO_STRUCT(c501);
896                         info_ctr.ctr.ctr501 = &c501;
897                         break;
898                 case 502:
899                         ZERO_STRUCT(c502);
900                         info_ctr.ctr.ctr502 = &c502;
901                         break;
902                 }
903
904                 expected = levels[i].anon_status;
905                 if (admin) expected = levels[i].admin_status;
906
907                 torture_comment(tctx, "Testing NetShareEnum level %u\n", info_ctr.level);
908                 status = dcerpc_srvsvc_NetShareEnum_r(b, tctx, &r);
909                 torture_assert_ntstatus_ok(tctx, status, "NetShareEnum failed");
910                 torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareEnum failed");
911         }
912
913         return true;
914 }
915
916 static bool test_NetShareEnumFull(struct torture_context *tctx,
917                                   struct dcerpc_pipe *p)
918 {
919         return test_NetShareEnum(tctx, p, true);
920 }
921
922 static bool test_NetShareEnumAnon(struct torture_context *tctx,
923                                   struct dcerpc_pipe *p)
924 {
925         return test_NetShareEnum(tctx, p, false);
926 }
927
928 /**************************/
929 /* srvsvc_NetSrv          */
930 /**************************/
931 static bool test_NetSrvGetInfo(struct torture_context *tctx, 
932                                struct dcerpc_pipe *p)
933 {
934         NTSTATUS status;
935         struct srvsvc_NetSrvGetInfo r;
936         union srvsvc_NetSrvInfo info;
937         uint32_t levels[] = {100, 101, 102, 502, 503};
938         int i;
939         struct dcerpc_binding_handle *b = p->binding_handle;
940
941         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
942
943         for (i=0;i<ARRAY_SIZE(levels);i++) {
944                 r.in.level = levels[i];
945                 r.out.info = &info;
946                 torture_comment(tctx, "Testing NetSrvGetInfo level %u\n", r.in.level);
947                 status = dcerpc_srvsvc_NetSrvGetInfo_r(b, tctx, &r);
948                 torture_assert_ntstatus_ok(tctx, status, "NetSrvGetInfo failed");
949                 if (!W_ERROR_IS_OK(r.out.result)) {
950                         torture_comment(tctx, "NetSrvGetInfo failed: %s\n", win_errstr(r.out.result));
951                 }
952         }
953
954         return true;
955 }
956
957 /**************************/
958 /* srvsvc_NetDisk         */
959 /**************************/
960 static bool test_NetDiskEnum(struct torture_context *tctx, 
961                              struct dcerpc_pipe *p)
962 {
963         NTSTATUS status;
964         struct srvsvc_NetDiskEnum r;
965         struct srvsvc_NetDiskInfo info;
966         uint32_t totalentries = 0;
967         uint32_t levels[] = {0};
968         int i;
969         uint32_t resume_handle=0;
970         struct dcerpc_binding_handle *b = p->binding_handle;
971
972         ZERO_STRUCT(info);
973         ZERO_STRUCT(r);
974
975         r.in.server_unc = NULL;
976         r.in.resume_handle = &resume_handle;
977         r.in.info = &info;
978         r.out.info = &info;
979         r.out.totalentries = &totalentries;
980         r.out.resume_handle = &resume_handle;
981
982         for (i=0;i<ARRAY_SIZE(levels);i++) {
983                 ZERO_STRUCTP(r.out.info);
984                 r.in.level = levels[i];
985                 torture_comment(tctx, "Testing NetDiskEnum level %u\n", r.in.level);
986                 status = dcerpc_srvsvc_NetDiskEnum_r(b, tctx, &r);
987                 torture_assert_ntstatus_ok(tctx, status, "NetDiskEnum failed");
988                 torture_assert_werr_ok(tctx, r.out.result, "NetDiskEnum failed");
989         }
990
991         return true;
992 }
993
994 /**************************/
995 /* srvsvc_NetTransport    */
996 /**************************/
997 static bool test_NetTransportEnum(struct torture_context *tctx, 
998                                   struct dcerpc_pipe *p)
999 {
1000         NTSTATUS status;
1001         struct srvsvc_NetTransportEnum r;
1002         struct srvsvc_NetTransportInfoCtr transports;
1003         struct srvsvc_NetTransportCtr0 ctr0;
1004         struct srvsvc_NetTransportCtr1 ctr1;
1005
1006         uint32_t totalentries = 0;
1007         uint32_t levels[] = {0, 1};
1008         int i;
1009         struct dcerpc_binding_handle *b = p->binding_handle;
1010
1011         ZERO_STRUCT(transports);
1012
1013         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s", dcerpc_server_name(p));
1014         r.in.transports = &transports;
1015         r.in.max_buffer = (uint32_t)-1;
1016         r.in.resume_handle = NULL;
1017         r.out.totalentries = &totalentries;
1018         r.out.transports = &transports;
1019
1020         for (i=0;i<ARRAY_SIZE(levels);i++) {
1021                 transports.level = levels[i];
1022                 switch (transports.level) {
1023                 case 0:
1024                         ZERO_STRUCT(ctr0);
1025                         transports.ctr.ctr0 = &ctr0;
1026                         break;
1027                 case 1:
1028                         ZERO_STRUCT(ctr1);
1029                         transports.ctr.ctr1 = &ctr1;
1030                         break;
1031                 }
1032                 torture_comment(tctx, "Testing NetTransportEnum level %u\n", transports.level);
1033                 status = dcerpc_srvsvc_NetTransportEnum_r(b, tctx, &r);
1034                 torture_assert_ntstatus_ok(tctx, status, "NetTransportEnum failed");
1035                 if (!W_ERROR_IS_OK(r.out.result)) {
1036                         torture_comment(tctx, "unexpected result: %s\n", win_errstr(r.out.result));
1037                 }
1038         }
1039
1040         return true;
1041 }
1042
1043 /**************************/
1044 /* srvsvc_NetRemoteTOD    */
1045 /**************************/
1046 static bool test_NetRemoteTOD(struct torture_context *tctx, 
1047                               struct dcerpc_pipe *p)
1048 {
1049         NTSTATUS status;
1050         struct srvsvc_NetRemoteTOD r;
1051         struct srvsvc_NetRemoteTODInfo *info = NULL;
1052         struct dcerpc_binding_handle *b = p->binding_handle;
1053
1054         r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));
1055         r.out.info = &info;
1056
1057         torture_comment(tctx, "Testing NetRemoteTOD\n");
1058         status = dcerpc_srvsvc_NetRemoteTOD_r(b, tctx, &r);
1059         torture_assert_ntstatus_ok(tctx, status, "NetRemoteTOD failed");
1060         torture_assert_werr_ok(tctx, r.out.result, "NetRemoteTOD failed");
1061
1062         return true;
1063 }
1064
1065 /**************************/
1066 /* srvsvc_NetName         */
1067 /**************************/
1068
1069 static bool test_NetNameValidate(struct torture_context *tctx, 
1070                                                                  struct dcerpc_pipe *p)
1071 {
1072         NTSTATUS status;
1073         struct srvsvc_NetNameValidate r;
1074         char *invalidc;
1075         char *name;
1076         int i, n, min, max;
1077         struct dcerpc_binding_handle *b = p->binding_handle;
1078
1079         r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));
1080         r.in.flags = 0x0;
1081
1082         d_printf("Testing NetNameValidate\n");
1083
1084         /* valid path types only between 1 and 13 */
1085         for (i = 1; i < 14; i++) {
1086
1087 again:
1088                 /* let's limit ourselves to a maximum of 4096 bytes */
1089                 r.in.name = name = talloc_array(tctx, char, 4097);
1090                 max = 4096;
1091                 min = 0;
1092                 n = max;
1093
1094                 while (1) {
1095
1096                         /* Find maximum length accepted by this type */
1097                         ZERO_STRUCT(r.out);
1098                         r.in.name_type = i;
1099                         memset(name, 'A', n);
1100                         name[n] = '\0';
1101
1102                         status = dcerpc_srvsvc_NetNameValidate_r(b, tctx, &r);
1103                         if (!NT_STATUS_IS_OK(status)) {
1104                                 d_printf("NetNameValidate failed while checking maximum size (%s)\n",
1105                                                 nt_errstr(status));
1106                                 break;
1107                         }
1108
1109                         if (W_ERROR_IS_OK(r.out.result)) {
1110                                 min = n;
1111                                 n += (max - min + 1)/2;
1112                                 if (n == min) {
1113                                         /*
1114                                          * We did not move, so
1115                                          * do not loop forever
1116                                          */
1117                                         break;
1118                                 }
1119                                 continue;
1120                                 
1121                         } else {
1122                                 if ((min + 1) >= max) break; /* found it */
1123                                 
1124                                 max = n;
1125                                 n -= (max - min)/2;
1126                                 continue;
1127                         }
1128                 }
1129
1130                 talloc_free(name);
1131
1132                 d_printf("Maximum length for type %2d, flags %08x: %d\n", i, r.in.flags, max);
1133
1134                 /* find invalid chars for this type check only ASCII between 0x20 and 0x7e */
1135
1136                 invalidc = talloc_strdup(tctx, "");
1137
1138                 for (n = 0x20; n < 0x7e; n++) {
1139                         r.in.name = name = talloc_asprintf(tctx, "%c", (char)n);
1140
1141                         status = dcerpc_srvsvc_NetNameValidate_r(b, tctx, &r);
1142                         if (!NT_STATUS_IS_OK(status)) {
1143                                 d_printf("NetNameValidate failed while checking valid chars (%s)\n",
1144                                                 nt_errstr(status));
1145                                 break;
1146                         }
1147
1148                         if (!W_ERROR_IS_OK(r.out.result)) {
1149                                 invalidc = talloc_asprintf_append_buffer(invalidc, "%c", (char)n);
1150                         }
1151
1152                         talloc_free(name);
1153                 }
1154
1155                 d_printf(" Invalid chars for type %2d, flags %08x: \"%s\"\n", i, r.in.flags, invalidc);
1156
1157                 /* only two values are accepted for flags: 0x0 and 0x80000000 */
1158                 if (r.in.flags == 0x0) {
1159                         r.in.flags = 0x80000000;
1160                         goto again;
1161                 }
1162
1163                 r.in.flags = 0x0;
1164         }
1165
1166         return true;
1167 }
1168
1169 struct torture_suite *torture_rpc_srvsvc(TALLOC_CTX *mem_ctx)
1170 {
1171         struct torture_suite *suite = torture_suite_create(mem_ctx, "srvsvc");
1172         struct torture_rpc_tcase *tcase;
1173         struct torture_test *test;
1174
1175         tcase = torture_suite_add_rpc_iface_tcase(suite, "srvsvc (admin access)", &ndr_table_srvsvc);
1176
1177         torture_rpc_tcase_add_test(tcase, "NetCharDevEnum", test_NetCharDevEnum);
1178         torture_rpc_tcase_add_test(tcase, "NetCharDevQEnum", test_NetCharDevQEnum);
1179         torture_rpc_tcase_add_test(tcase, "NetConnEnum", test_NetConnEnum);
1180         torture_rpc_tcase_add_test(tcase, "NetFileEnum", test_NetFileEnum);
1181         torture_rpc_tcase_add_test(tcase, "NetSessEnum", test_NetSessEnum);
1182         torture_rpc_tcase_add_test(tcase, "NetShareEnumAll", test_NetShareEnumAllFull);
1183         torture_rpc_tcase_add_test(tcase, "NetSrvGetInfo", test_NetSrvGetInfo);
1184         torture_rpc_tcase_add_test(tcase, "NetDiskEnum", test_NetDiskEnum);
1185         torture_rpc_tcase_add_test(tcase, "NetTransportEnum", test_NetTransportEnum);
1186         torture_rpc_tcase_add_test(tcase, "NetRemoteTOD", test_NetRemoteTOD);
1187         torture_rpc_tcase_add_test(tcase, "NetShareEnum", test_NetShareEnumFull);
1188         torture_rpc_tcase_add_test(tcase, "NetShareGetInfo", test_NetShareGetInfoAdminFull);
1189         test = torture_rpc_tcase_add_test(tcase, "NetShareAddSetDel", 
1190                                            test_NetShareAddSetDel);
1191         test->dangerous = true;
1192         torture_rpc_tcase_add_test(tcase, "NetNameValidate", test_NetNameValidate);
1193         
1194         tcase = torture_suite_add_anon_rpc_iface_tcase(suite, 
1195                                                     "srvsvc anonymous access", 
1196                                                     &ndr_table_srvsvc);
1197
1198         torture_rpc_tcase_add_test(tcase, "NetShareEnumAll", 
1199                                    test_NetShareEnumAllAnon);
1200         torture_rpc_tcase_add_test(tcase, "NetShareEnum", 
1201                                    test_NetShareEnumAnon);
1202         torture_rpc_tcase_add_test(tcase, "NetShareGetInfo", 
1203                                    test_NetShareGetInfoAdminAnon);
1204
1205         return suite;
1206 }