2 Unix SMB/CIFS implementation.
3 test suite for winreg ndr operations
5 Copyright (C) Jelmer Vernooij 2007
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "torture/ndr/ndr.h"
23 #include "torture/ndr/proto.h"
24 #include "../lib/util/dlinklist.h"
25 #include "param/param.h"
27 struct ndr_pull_test_data {
29 DATA_BLOB data_context;
31 ndr_pull_flags_fn_t pull_fn;
35 static bool wrap_ndr_pull_test(struct torture_context *tctx,
36 struct torture_tcase *tcase,
37 struct torture_test *test)
39 bool (*check_fn) (struct torture_context *ctx, void *data) = test->fn;
40 const struct ndr_pull_test_data *data = (const struct ndr_pull_test_data *)test->data;
41 void *ds = talloc_zero_size(tctx, data->struct_size);
42 struct ndr_pull *ndr = ndr_pull_init_blob(&(data->data), tctx);
44 ndr->flags |= LIBNDR_FLAG_REF_ALLOC;
46 torture_assert_ndr_success(tctx, data->pull_fn(ndr, data->ndr_flags, ds),
49 torture_assert(tctx, ndr->offset == ndr->data_size,
51 "%d unread bytes", ndr->data_size - ndr->offset));
54 return check_fn(tctx, ds);
59 _PUBLIC_ struct torture_test *_torture_suite_add_ndr_pull_test(
60 struct torture_suite *suite,
61 const char *name, ndr_pull_flags_fn_t pull_fn,
65 bool (*check_fn) (struct torture_context *ctx, void *data))
67 struct torture_test *test;
68 struct torture_tcase *tcase;
69 struct ndr_pull_test_data *data;
71 tcase = torture_suite_add_tcase(suite, name);
73 test = talloc(tcase, struct torture_test);
75 test->name = talloc_strdup(test, name);
76 test->description = NULL;
77 test->run = wrap_ndr_pull_test;
78 data = talloc(test, struct ndr_pull_test_data);
80 data->ndr_flags = ndr_flags;
81 data->struct_size = struct_size;
82 data->pull_fn = pull_fn;
85 test->dangerous = false;
87 DLIST_ADD_END(tcase->tests, test, struct torture_test *);
92 static bool wrap_ndr_inout_pull_test(struct torture_context *tctx,
93 struct torture_tcase *tcase,
94 struct torture_test *test)
96 bool (*check_fn) (struct torture_context *ctx, void *data) = test->fn;
97 const struct ndr_pull_test_data *data = (const struct ndr_pull_test_data *)test->data;
98 void *ds = talloc_zero_size(tctx, data->struct_size);
101 /* handle NDR_IN context */
103 ndr = ndr_pull_init_blob(&(data->data_context), tctx);
104 torture_assert(tctx, ndr, "ndr init failed");
106 ndr->flags |= LIBNDR_FLAG_REF_ALLOC;
108 torture_assert_ndr_success(tctx,
109 data->pull_fn(ndr, NDR_IN, ds),
110 "ndr pull of context failed");
112 torture_assert(tctx, ndr->offset == ndr->data_size,
113 talloc_asprintf(tctx, "%d unread bytes", ndr->data_size - ndr->offset));
119 ndr = ndr_pull_init_blob(&(data->data), tctx);
120 torture_assert(tctx, ndr, "ndr init failed");
122 ndr->flags |= LIBNDR_FLAG_REF_ALLOC;
124 torture_assert_ndr_success(tctx,
125 data->pull_fn(ndr, NDR_OUT, ds),
128 torture_assert(tctx, ndr->offset == ndr->data_size,
129 talloc_asprintf(tctx, "%d unread bytes", ndr->data_size - ndr->offset));
134 return check_fn(tctx, ds);
140 _PUBLIC_ struct torture_test *_torture_suite_add_ndr_pull_inout_test(
141 struct torture_suite *suite,
142 const char *name, ndr_pull_flags_fn_t pull_fn,
146 bool (*check_fn) (struct torture_context *ctx, void *data))
148 struct torture_test *test;
149 struct torture_tcase *tcase;
150 struct ndr_pull_test_data *data;
152 tcase = torture_suite_add_tcase(suite, name);
154 test = talloc(tcase, struct torture_test);
156 test->name = talloc_strdup(test, name);
157 test->description = NULL;
158 test->run = wrap_ndr_inout_pull_test;
159 data = talloc(test, struct ndr_pull_test_data);
161 data->data_context = db_in;
163 data->struct_size = struct_size;
164 data->pull_fn = pull_fn;
167 test->dangerous = false;
169 DLIST_ADD_END(tcase->tests, test, struct torture_test *);
174 static bool test_check_string_terminator(struct torture_context *tctx)
176 struct ndr_pull *ndr;
178 TALLOC_CTX *mem_ctx = tctx;
181 blob = strhex_to_data_blob(tctx, "0000");
183 ndr = ndr_pull_init_blob(&blob, mem_ctx);
185 torture_assert_ndr_success(tctx, ndr_check_string_terminator(ndr, 1, 2),
186 "simple check_string_terminator test failed");
188 torture_assert(tctx, ndr->offset == 0,
189 "check_string_terminator did not reset offset");
191 if (NDR_ERR_CODE_IS_SUCCESS(ndr_check_string_terminator(ndr, 1, 3))) {
192 torture_fail(tctx, "check_string_terminator checked beyond string boundaries");
195 torture_assert(tctx, ndr->offset == 0,
196 "check_string_terminator did not reset offset");
200 blob = strhex_to_data_blob(tctx, "11220000");
201 ndr = ndr_pull_init_blob(&blob, mem_ctx);
203 torture_assert_ndr_success(tctx,
204 ndr_check_string_terminator(ndr, 4, 1),
205 "check_string_terminator failed to recognize terminator");
207 torture_assert_ndr_success(tctx,
208 ndr_check_string_terminator(ndr, 3, 1),
209 "check_string_terminator failed to recognize terminator");
211 if (NDR_ERR_CODE_IS_SUCCESS(ndr_check_string_terminator(ndr, 2, 1))) {
212 torture_fail(tctx, "check_string_terminator erroneously reported terminator");
215 torture_assert(tctx, ndr->offset == 0,
216 "check_string_terminator did not reset offset");
220 static bool test_guid_from_string_valid(struct torture_context *tctx)
226 static bool test_guid_from_string_null(struct torture_context *tctx)
229 torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER,
230 GUID_from_string(NULL, &guid),
235 static bool test_guid_from_string_invalid(struct torture_context *tctx)
238 torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER,
239 GUID_from_string("bla", &g1),
240 "parameter not invalid");
244 static bool test_guid_from_string(struct torture_context *tctx)
247 torture_assert_ntstatus_ok(tctx,
248 GUID_from_string("00000001-0002-0003-0405-060708090a0b", &g1),
249 "invalid return code");
252 exp.time_hi_and_version = 3;
253 exp.clock_seq[0] = 4;
254 exp.clock_seq[1] = 5;
261 torture_assert(tctx, GUID_equal(&g1, &exp), "UUID parsed incorrectly");
262 torture_assert_ntstatus_ok(tctx,
263 GUID_from_string("{00000001-0002-0003-0405-060708090a0b}", &g1),
264 "invalid return code");
265 torture_assert(tctx, GUID_equal(&g1, &exp), "UUID parsed incorrectly");
270 static bool test_guid_string_valid(struct torture_context *tctx)
275 g.time_hi_and_version = 3;
284 torture_assert_str_equal(tctx, "00000001-0002-0003-0405-060708090a0b",
285 GUID_string(tctx, &g),
286 "parsing guid failed");
290 static bool test_guid_string2_valid(struct torture_context *tctx)
295 g.time_hi_and_version = 3;
304 torture_assert_str_equal(tctx, "{00000001-0002-0003-0405-060708090a0b}",
305 GUID_string2(tctx, &g),
306 "parsing guid failed");
310 static bool test_compare_uuid(struct torture_context *tctx)
313 ZERO_STRUCT(g1); ZERO_STRUCT(g2);
314 torture_assert_int_equal(tctx, 0, GUID_compare(&g1, &g2),
317 torture_assert_int_equal(tctx, 1, GUID_compare(&g1, &g2),
318 "GUID diff invalid");
321 torture_assert_int_equal(tctx, 1, GUID_compare(&g1, &g2),
322 "GUID diff invalid");
325 g1.clock_seq[1] = 20;
326 torture_assert_int_equal(tctx, 1, GUID_compare(&g1, &g2),
327 "GUID diff invalid");
330 torture_assert_int_equal(tctx, 1, GUID_compare(&g1, &g2),
331 "GUID diff invalid");
335 torture_assert_int_equal(tctx, -1, GUID_compare(&g1, &g2),
336 "GUID diff invalid");
340 struct torture_suite *torture_local_ndr(TALLOC_CTX *mem_ctx)
342 struct torture_suite *suite = torture_suite_create(mem_ctx, "ndr");
344 torture_suite_add_suite(suite, ndr_winreg_suite(suite));
345 torture_suite_add_suite(suite, ndr_atsvc_suite(suite));
346 torture_suite_add_suite(suite, ndr_lsa_suite(suite));
347 torture_suite_add_suite(suite, ndr_epmap_suite(suite));
348 torture_suite_add_suite(suite, ndr_dfs_suite(suite));
349 torture_suite_add_suite(suite, ndr_dfsblob_suite(suite));
350 torture_suite_add_suite(suite, ndr_netlogon_suite(suite));
351 torture_suite_add_suite(suite, ndr_drsuapi_suite(suite));
352 torture_suite_add_suite(suite, ndr_spoolss_suite(suite));
353 torture_suite_add_suite(suite, ndr_samr_suite(suite));
354 torture_suite_add_suite(suite, ndr_drsblobs_suite(suite));
355 torture_suite_add_suite(suite, ndr_nbt_suite(suite));
356 torture_suite_add_suite(suite, ndr_ntlmssp_suite(suite));
357 torture_suite_add_suite(suite, ndr_backupkey_suite(suite));
359 torture_suite_add_simple_test(suite, "string terminator",
360 test_check_string_terminator);
362 torture_suite_add_simple_test(suite, "guid_from_string_null",
363 test_guid_from_string_null);
365 torture_suite_add_simple_test(suite, "guid_from_string",
366 test_guid_from_string);
368 torture_suite_add_simple_test(suite, "guid_from_string_invalid",
369 test_guid_from_string_invalid);
371 torture_suite_add_simple_test(suite, "guid_string_valid",
372 test_guid_string_valid);
374 torture_suite_add_simple_test(suite, "guid_string2_valid",
375 test_guid_string2_valid);
377 torture_suite_add_simple_test(suite, "guid_from_string_valid",
378 test_guid_from_string_valid);
380 torture_suite_add_simple_test(suite, "compare_uuid",