2 Unix SMB/CIFS implementation.
3 test suite for session setup operations
4 Copyright (C) Andrew Tridgell 2003
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
22 #include "libcli/raw/libcliraw.h"
23 #include "librpc/gen_ndr/ndr_security.h"
25 #define BASEDIR "\\rawcontext"
27 #define CHECK_STATUS(status, correct) do { \
28 if (!NT_STATUS_EQUAL(status, correct)) { \
29 printf("(%s) Incorrect status %s - should be %s\n", \
30 __location__, nt_errstr(status), nt_errstr(correct)); \
35 #define CHECK_VALUE(v, correct) do { \
36 if ((v) != (correct)) { \
37 printf("(%s) Incorrect value %s=%d - should be %d\n", \
38 __location__, #v, v, correct); \
43 #define CHECK_NOT_VALUE(v, correct) do { \
44 if ((v) == (correct)) { \
45 printf("(%s) Incorrect value %s=%d - should not be %d\n", \
46 __location__, #v, v, correct); \
55 static BOOL test_session(struct smbcli_state *cli, TALLOC_CTX *mem_ctx)
59 const char *username, *domain, *password;
60 struct smbcli_session *session;
61 struct smbcli_session *session2;
62 struct smbcli_session *session3;
63 struct smbcli_tree *tree;
64 union smb_sesssetup setup;
69 const char *fname = BASEDIR "\\test.txt";
72 printf("TESTING SESSION HANDLING\n");
74 if (!torture_setup_dir(cli, BASEDIR)) {
78 username = lp_parm_string(-1, "torture", "username");
79 password = lp_parm_string(-1, "torture", "password");
80 domain = lp_parm_string(-1, "torture", "userdomain");
82 printf("create a second security context on the same transport\n");
83 session = smbcli_session_init(cli->transport);
85 setup.generic.level = RAW_SESSSETUP_GENERIC;
86 setup.generic.in.sesskey = cli->transport->negotiate.sesskey;
87 setup.generic.in.capabilities = cli->transport->negotiate.capabilities; /* ignored in secondary session setup, except by our libs, which care about the extended security bit */
88 setup.generic.in.password = password;
89 setup.generic.in.user = username;
90 setup.generic.in.domain = domain;
92 status = smb_raw_session_setup(session, mem_ctx, &setup);
93 CHECK_STATUS(status, NT_STATUS_OK);
95 session->vuid = setup.generic.out.vuid;
97 printf("create a third security context on the same transport, with vuid set\n");
98 session2 = smbcli_session_init(cli->transport);
100 session2->vuid = session->vuid;
101 setup.generic.level = RAW_SESSSETUP_GENERIC;
102 setup.generic.in.sesskey = cli->transport->negotiate.sesskey;
103 setup.generic.in.capabilities = cli->transport->negotiate.capabilities; /* ignored in secondary session setup, except by our libs, which care about the extended security bit */
104 setup.generic.in.password = password;
105 setup.generic.in.user = username;
106 setup.generic.in.domain = domain;
108 status = smb_raw_session_setup(session2, mem_ctx, &setup);
109 CHECK_STATUS(status, NT_STATUS_OK);
111 session2->vuid = setup.generic.out.vuid;
112 printf("vuid1=%d vuid2=%d vuid3=%d\n", cli->session->vuid, session->vuid, session2->vuid);
114 CHECK_NOT_VALUE(session->vuid, session2->vuid);
115 talloc_free(session2);
117 if (cli->transport->negotiate.capabilities & CAP_EXTENDED_SECURITY) {
118 printf("create a fourth security context on the same transport, without extended security\n");
119 session3 = smbcli_session_init(cli->transport);
121 session3->vuid = session->vuid;
122 setup.generic.level = RAW_SESSSETUP_GENERIC;
123 setup.generic.in.sesskey = cli->transport->negotiate.sesskey;
124 setup.generic.in.capabilities = 0; /* force a non extended security login (should fail) */
125 setup.generic.in.password = password;
126 setup.generic.in.user = username;
127 setup.generic.in.domain = domain;
129 status = smb_raw_session_setup(session3, mem_ctx, &setup);
130 CHECK_STATUS(status, NT_STATUS_ACCESS_DENIED);
132 talloc_free(session3);
135 printf("use the same tree as the existing connection\n");
136 tree = smbcli_tree_init(session);
137 tree->tid = cli->tree->tid;
139 printf("create a file using the new vuid\n");
140 io.generic.level = RAW_OPEN_NTCREATEX;
141 io.ntcreatex.in.root_fid = 0;
142 io.ntcreatex.in.flags = 0;
143 io.ntcreatex.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
144 io.ntcreatex.in.create_options = 0;
145 io.ntcreatex.in.file_attr = FILE_ATTRIBUTE_NORMAL;
146 io.ntcreatex.in.share_access = NTCREATEX_SHARE_ACCESS_READ | NTCREATEX_SHARE_ACCESS_WRITE;
147 io.ntcreatex.in.alloc_size = 0;
148 io.ntcreatex.in.open_disposition = NTCREATEX_DISP_CREATE;
149 io.ntcreatex.in.impersonation = NTCREATEX_IMPERSONATION_ANONYMOUS;
150 io.ntcreatex.in.security_flags = 0;
151 io.ntcreatex.in.fname = fname;
152 status = smb_raw_open(tree, mem_ctx, &io);
153 CHECK_STATUS(status, NT_STATUS_OK);
154 fnum = io.ntcreatex.out.fnum;
156 printf("write using the old vuid\n");
157 wr.generic.level = RAW_WRITE_WRITEX;
158 wr.writex.in.fnum = fnum;
159 wr.writex.in.offset = 0;
160 wr.writex.in.wmode = 0;
161 wr.writex.in.remaining = 0;
162 wr.writex.in.count = 1;
163 wr.writex.in.data = &c;
165 status = smb_raw_write(cli->tree, &wr);
166 CHECK_STATUS(status, NT_STATUS_INVALID_HANDLE);
168 printf("write with the new vuid\n");
169 status = smb_raw_write(tree, &wr);
170 CHECK_STATUS(status, NT_STATUS_OK);
171 CHECK_VALUE(wr.writex.out.nwritten, 1);
173 printf("logoff the new vuid\n");
174 status = smb_raw_ulogoff(session);
175 CHECK_STATUS(status, NT_STATUS_OK);
176 talloc_free(session);
178 printf("the new vuid should not now be accessible\n");
179 status = smb_raw_write(tree, &wr);
180 CHECK_STATUS(status, NT_STATUS_INVALID_HANDLE);
182 printf("the fnum should have been auto-closed\n");
183 cl.close.level = RAW_CLOSE_CLOSE;
184 cl.close.in.fnum = fnum;
185 cl.close.in.write_time = 0;
186 status = smb_raw_close(cli->tree, &cl);
187 CHECK_STATUS(status, NT_STATUS_INVALID_HANDLE);
199 static BOOL test_tree(struct smbcli_state *cli, TALLOC_CTX *mem_ctx)
204 struct smbcli_tree *tree;
210 const char *fname = BASEDIR "\\test.txt";
213 printf("TESTING TREE HANDLING\n");
215 if (!torture_setup_dir(cli, BASEDIR)) {
219 share = lp_parm_string(-1, "torture", "share");
221 printf("create a second tree context on the same session\n");
222 tree = smbcli_tree_init(cli->session);
224 tcon.generic.level = RAW_TCON_TCONX;
225 tcon.tconx.in.flags = 0;
226 tcon.tconx.in.password = data_blob(NULL, 0);
227 tcon.tconx.in.path = share;
228 tcon.tconx.in.device = "A:";
229 status = smb_tree_connect(tree, mem_ctx, &tcon);
230 CHECK_STATUS(status, NT_STATUS_OK);
232 tree->tid = tcon.tconx.out.cnum;
233 printf("tid1=%d tid2=%d\n", cli->tree->tid, tree->tid);
235 printf("try a tconx with a bad device type\n");
236 tcon.tconx.in.device = "FOO";
237 status = smb_tree_connect(tree, mem_ctx, &tcon);
238 CHECK_STATUS(status, NT_STATUS_BAD_DEVICE_TYPE);
241 printf("create a file using the new tid\n");
242 io.generic.level = RAW_OPEN_NTCREATEX;
243 io.ntcreatex.in.root_fid = 0;
244 io.ntcreatex.in.flags = 0;
245 io.ntcreatex.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
246 io.ntcreatex.in.create_options = 0;
247 io.ntcreatex.in.file_attr = FILE_ATTRIBUTE_NORMAL;
248 io.ntcreatex.in.share_access = NTCREATEX_SHARE_ACCESS_READ | NTCREATEX_SHARE_ACCESS_WRITE;
249 io.ntcreatex.in.alloc_size = 0;
250 io.ntcreatex.in.open_disposition = NTCREATEX_DISP_CREATE;
251 io.ntcreatex.in.impersonation = NTCREATEX_IMPERSONATION_ANONYMOUS;
252 io.ntcreatex.in.security_flags = 0;
253 io.ntcreatex.in.fname = fname;
254 status = smb_raw_open(tree, mem_ctx, &io);
255 CHECK_STATUS(status, NT_STATUS_OK);
256 fnum = io.ntcreatex.out.fnum;
258 printf("write using the old tid\n");
259 wr.generic.level = RAW_WRITE_WRITEX;
260 wr.writex.in.fnum = fnum;
261 wr.writex.in.offset = 0;
262 wr.writex.in.wmode = 0;
263 wr.writex.in.remaining = 0;
264 wr.writex.in.count = 1;
265 wr.writex.in.data = &c;
267 status = smb_raw_write(cli->tree, &wr);
268 CHECK_STATUS(status, NT_STATUS_INVALID_HANDLE);
270 printf("write with the new tid\n");
271 status = smb_raw_write(tree, &wr);
272 CHECK_STATUS(status, NT_STATUS_OK);
273 CHECK_VALUE(wr.writex.out.nwritten, 1);
275 printf("disconnect the new tid\n");
276 status = smb_tree_disconnect(tree);
277 CHECK_STATUS(status, NT_STATUS_OK);
279 printf("the new tid should not now be accessible\n");
280 status = smb_raw_write(tree, &wr);
281 CHECK_STATUS(status, NT_STATUS_INVALID_HANDLE);
283 printf("the fnum should have been auto-closed\n");
284 cl.close.level = RAW_CLOSE_CLOSE;
285 cl.close.in.fnum = fnum;
286 cl.close.in.write_time = 0;
287 status = smb_raw_close(cli->tree, &cl);
288 CHECK_STATUS(status, NT_STATUS_INVALID_HANDLE);
290 /* close down the new tree */
301 static BOOL test_pid(struct smbcli_state *cli, TALLOC_CTX *mem_ctx)
309 const char *fname = BASEDIR "\\test.txt";
313 printf("TESTING PID HANDLING\n");
315 if (!torture_setup_dir(cli, BASEDIR)) {
319 printf("create a second pid\n");
320 pid1 = cli->session->pid;
323 printf("pid1=%d pid2=%d\n", pid1, pid2);
325 printf("create a file using the new pid\n");
326 cli->session->pid = pid2;
327 io.generic.level = RAW_OPEN_NTCREATEX;
328 io.ntcreatex.in.root_fid = 0;
329 io.ntcreatex.in.flags = 0;
330 io.ntcreatex.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
331 io.ntcreatex.in.create_options = 0;
332 io.ntcreatex.in.file_attr = FILE_ATTRIBUTE_NORMAL;
333 io.ntcreatex.in.share_access = NTCREATEX_SHARE_ACCESS_READ | NTCREATEX_SHARE_ACCESS_WRITE;
334 io.ntcreatex.in.alloc_size = 0;
335 io.ntcreatex.in.open_disposition = NTCREATEX_DISP_CREATE;
336 io.ntcreatex.in.impersonation = NTCREATEX_IMPERSONATION_ANONYMOUS;
337 io.ntcreatex.in.security_flags = 0;
338 io.ntcreatex.in.fname = fname;
339 status = smb_raw_open(cli->tree, mem_ctx, &io);
340 CHECK_STATUS(status, NT_STATUS_OK);
341 fnum = io.ntcreatex.out.fnum;
343 printf("write using the old pid\n");
344 cli->session->pid = pid1;
345 wr.generic.level = RAW_WRITE_WRITEX;
346 wr.writex.in.fnum = fnum;
347 wr.writex.in.offset = 0;
348 wr.writex.in.wmode = 0;
349 wr.writex.in.remaining = 0;
350 wr.writex.in.count = 1;
351 wr.writex.in.data = &c;
353 status = smb_raw_write(cli->tree, &wr);
354 CHECK_STATUS(status, NT_STATUS_OK);
355 CHECK_VALUE(wr.writex.out.nwritten, 1);
357 printf("write with the new pid\n");
358 cli->session->pid = pid2;
359 status = smb_raw_write(cli->tree, &wr);
360 CHECK_STATUS(status, NT_STATUS_OK);
361 CHECK_VALUE(wr.writex.out.nwritten, 1);
363 printf("exit the old pid\n");
364 cli->session->pid = pid1;
365 status = smb_raw_exit(cli->session);
366 CHECK_STATUS(status, NT_STATUS_OK);
368 printf("the fnum should still be accessible\n");
369 cli->session->pid = pid1;
370 status = smb_raw_write(cli->tree, &wr);
371 CHECK_STATUS(status, NT_STATUS_OK);
372 CHECK_VALUE(wr.writex.out.nwritten, 1);
374 printf("exit the new pid\n");
375 cli->session->pid = pid2;
376 status = smb_raw_exit(cli->session);
377 CHECK_STATUS(status, NT_STATUS_OK);
379 printf("the fnum should not now be accessible\n");
380 cli->session->pid = pid1;
381 status = smb_raw_write(cli->tree, &wr);
382 CHECK_STATUS(status, NT_STATUS_INVALID_HANDLE);
384 printf("the fnum should have been auto-closed\n");
385 cl.close.level = RAW_CLOSE_CLOSE;
386 cl.close.in.fnum = fnum;
387 cl.close.in.write_time = 0;
388 status = smb_raw_close(cli->tree, &cl);
389 CHECK_STATUS(status, NT_STATUS_INVALID_HANDLE);
397 basic testing of session/tree context calls
399 BOOL torture_raw_context(void)
401 struct smbcli_state *cli;
405 lp_set_cmdline("use spnego", "False");
407 if (!torture_open_connection(&cli)) {
411 mem_ctx = talloc_init("torture_raw_context");
413 if (!test_session(cli, mem_ctx)) {
417 if (!test_tree(cli, mem_ctx)) {
421 if (!test_pid(cli, mem_ctx)) {
425 smb_raw_exit(cli->session);
426 smbcli_deltree(cli->tree, BASEDIR);
428 torture_close_connection(cli);
429 talloc_destroy(mem_ctx);