r5610: Starting libnet test of userinfo call. Unfinished yet, though
authorRafal Szczesniak <mimir@samba.org>
Tue, 1 Mar 2005 23:53:18 +0000 (23:53 +0000)
committerGerald (Jerry) Carter <jerry@samba.org>
Wed, 10 Oct 2007 18:10:56 +0000 (13:10 -0500)
doesn't break anything at the moment.

rafal

source/torture/libnet/userinfo.c [new file with mode: 0644]

diff --git a/source/torture/libnet/userinfo.c b/source/torture/libnet/userinfo.c
new file mode 100644 (file)
index 0000000..4a28079
--- /dev/null
@@ -0,0 +1,100 @@
+/* 
+   Unix SMB/CIFS implementation.
+   Test suite for libnet calls.
+
+   Copyright (C) Rafal Szczesniak 2005
+   
+   This program is free software; you can redistribute it and/or modify
+   it under the terms of the GNU General Public License as published by
+   the Free Software Foundation; either version 2 of the License, or
+   (at your option) any later version.
+   
+   This program is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+   GNU General Public License for more details.
+   
+   You should have received a copy of the GNU General Public License
+   along with this program; if not, write to the Free Software
+   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+*/
+
+#include "includes.h"
+#include "librpc/gen_ndr/ndr_samr.h"
+
+
+static BOOL test_opendomain(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx,
+                           struct policy_handle *handle, struct samr_String *domname)
+{
+       NTSTATUS status;
+       struct policy_handle h, domain_handle;
+       struct samr_Connect r1;
+       struct samr_LookupDomain r2;
+       struct samr_OpenDomain r3;
+       
+       printf("connecting\n");
+       
+       r1.in.system_name = 0;
+       r1.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+       r1.out.connect_handle = &h;
+       
+       status = dcerpc_samr_Connect(p, mem_ctx, &r1);
+       if (!NT_STATUS_IS_OK(status)) {
+               printf("Connect failed - %s\n", nt_errstr(status));
+               return False;
+       }
+       
+       r2.in.connect_handle = &h;
+       r2.in.domain_name = domname;
+
+       status = dcerpc_samr_LookupDomain(p, mem_ctx, &r2);
+       if (!NT_STATUS_IS_OK(status)) {
+               printf("LookupDomain failed - %s\n", nt_errstr(status));
+               return False;
+       }
+
+       r3.in.connect_handle = &h;
+       r3.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
+       r3.in.sid = r2.out.sid;
+       r3.out.domain_handle = &domain_handle;
+
+       status = dcerpc_samr_OpenDomain(p, mem_ctx, &r3);
+       if (!NT_STATUS_IS_OK(status)) {
+               printf("OpenDomain failed - %s\n", nt_errstr(status));
+               return False;
+       } else {
+               *handle = domain_handle;
+       }
+}
+
+
+BOOL torture_userinfo(void)
+{
+       NTSTATUS status;
+       struct dcerpc_pipe *p;
+       TALLOC_CTX *mem_ctx;
+       BOOL ret = True;
+       struct policy_handle h;
+       struct samr_String name = { 4, 4, "TEST" };
+
+       mem_ctx = talloc_init("test_userinfo");
+       
+       status = torture_rpc_connection(&p,
+                                       DCERPC_SAMR_NAME,
+                                       DCERPC_SAMR_UUID,
+                                       DCERPC_SAMR_VERSION);
+       
+       if (!NT_STATUS_IS_OK(status)) {
+               return False;
+       }
+
+       if (!test_opendomain(p, mem_ctx, &h, &name)) {
+               ret = False;
+       }
+
+       talloc_free(mem_ctx);
+       
+       torture_rpc_close(p);
+
+       return ret;
+}