srvsvc.c

来自「samba最新软件」· C语言 代码 · 共 999 行 · 第 1/2 页

C
999
字号
			break;		case 1:			r.in.info.info1 = talloc(tctx, struct srvsvc_NetShareInfo1);			r.in.info.info1->name = r.in.share_name;			r.in.info.info1->type = STYPE_DISKTREE;			r.in.info.info1->comment = talloc_strdup(tctx, "test comment 1");			break;		case 2:				r.in.info.info2 = talloc(tctx, struct srvsvc_NetShareInfo2);			r.in.info.info2->name = r.in.share_name;			r.in.info.info2->type = STYPE_DISKTREE;			r.in.info.info2->comment = talloc_strdup(tctx, "test comment 2");			r.in.info.info2->permissions = 0;			r.in.info.info2->max_users = 2;			r.in.info.info2->current_users = 1;			r.in.info.info2->path = talloc_strdup(tctx, "::BLaH::"); /* "C:\\"); */			r.in.info.info2->password = NULL;			break;		case 501:			r.in.info.info501 = talloc(tctx, struct srvsvc_NetShareInfo501);			r.in.info.info501->name = r.in.share_name;			r.in.info.info501->type = STYPE_DISKTREE;			r.in.info.info501->comment = talloc_strdup(tctx, "test comment 501");			r.in.info.info501->csc_policy = 0;			break;		case 502:			r.in.info.info502 = talloc(tctx, struct srvsvc_NetShareInfo502);			r.in.info.info502->name = r.in.share_name;			r.in.info.info502->type = STYPE_DISKTREE;			r.in.info.info502->comment = talloc_strdup(tctx, "test comment 502");			r.in.info.info502->permissions = 0;			r.in.info.info502->max_users = 502;			r.in.info.info502->current_users = 1;			r.in.info.info502->path = talloc_strdup(tctx, "C:\\");			r.in.info.info502->password = NULL;			r.in.info.info502->unknown = 0;			r.in.info.info502->sd = NULL;			break;		case 1004:			r.in.info.info1004 = talloc(tctx, struct srvsvc_NetShareInfo1004);			r.in.info.info1004->comment = talloc_strdup(tctx, "test comment 1004");			break;		case 1005:			r.in.info.info1005 = talloc(tctx, struct srvsvc_NetShareInfo1005);			r.in.info.info1005->dfs_flags = 0;			break;		case 1006:			r.in.info.info1006 = talloc(tctx, struct srvsvc_NetShareInfo1006);			r.in.info.info1006->max_users = 1006;			break;/*		case 1007:			r.in.info.info1007 = talloc(tctx, struct srvsvc_NetShareInfo1007);			r.in.info.info1007->flags = 0;			r.in.info.info1007->alternate_directory_name = talloc_strdup(tctx, "test");			break;*/		case 1501:			r.in.info.info1501 = talloc_zero(tctx, struct sec_desc_buf);			break;		}				status = dcerpc_srvsvc_NetShareSetInfo(p, tctx, &r);		torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed");		torture_assert_werr_equal(tctx, r.out.result, levels[i].expected, "NetShareSetInfo failed");				q.in.share_name = r.in.share_name;		status = dcerpc_srvsvc_NetShareGetInfo(p, tctx, &q);		torture_assert_ntstatus_ok(tctx, status, "NetShareGetInfo failed");		torture_assert_werr_ok(tctx, q.out.result, "NetShareGetInfo failed");		torture_assert_str_equal(tctx, q.out.info.info502->name, r.in.share_name, 					 "share name invalid");		switch (levels[i].level) {		case 0:			break;		case 1:			torture_assert_str_equal(tctx, q.out.info.info502->comment, "test comment 1", "comment");			break;		case 2:			torture_assert_str_equal(tctx, q.out.info.info502->comment, "test comment 2", "comment");			torture_assert_int_equal(tctx, q.out.info.info2->max_users, 2, "max users");			torture_assert_str_equal(tctx, q.out.info.info2->path, "C:\\", "path");			break;		case 501:			torture_assert_str_equal(tctx, q.out.info.info501->comment, "test comment 501", "comment");			break;		case 502:			torture_assert_str_equal(tctx, q.out.info.info502->comment, "test comment 502", "comment");			torture_assert_int_equal(tctx, q.out.info.info2->max_users, 502, "max users");			torture_assert_str_equal(tctx, q.out.info.info2->path, "C:\\", "path");			break;		case 1004:			torture_assert_str_equal(tctx, q.out.info.info502->comment, "test comment 1004", 						 "comment");			break;		case 1005:			break;		case 1006:			torture_assert_int_equal(tctx, q.out.info.info2->max_users, 1006, "Max users");			break;/*		case 1007:			break;*/		case 1501:			break;		}	}	d.in.share_name = r.in.share_name;	d.in.reserved = 0;	status = dcerpc_srvsvc_NetShareDel(p, tctx, &d);	torture_assert_ntstatus_ok(tctx, status, "NetShareDel on share 'testshare502' failed");	torture_assert_werr_ok(tctx, a.out.result, "NetShareDel on share 'testshare502' failed");	return true;}/**************************//* srvsvc_NetShare        *//**************************/static bool test_NetShareEnumAll(struct torture_context *tctx, 				 struct dcerpc_pipe *p, 				 bool admin){	NTSTATUS status;	struct srvsvc_NetShareEnumAll r;	struct srvsvc_NetShareCtr0 c0;	struct {		uint32_t level;		WERROR anon_status;		WERROR admin_status;	} levels[] = {		 { 0,	WERR_OK,		WERR_OK },		 { 1,	WERR_OK,		WERR_OK },		 { 2,	WERR_ACCESS_DENIED,	WERR_OK },		 { 501,	WERR_ACCESS_DENIED,	WERR_OK },		 { 502,	WERR_ACCESS_DENIED,	WERR_OK },	};	int i;	uint32_t resume_handle;	ZERO_STRUCT(c0);	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));	r.in.ctr.ctr0 = &c0;	r.in.max_buffer = (uint32_t)-1;	r.in.resume_handle = &resume_handle;	r.out.resume_handle = &resume_handle;	for (i=0;i<ARRAY_SIZE(levels);i++) {		int j;		WERROR expected;		r.in.level = levels[i].level;		expected = levels[i].anon_status;		if (admin) expected = levels[i].admin_status;		ZERO_STRUCT(r.out);		resume_handle = 0;		torture_comment(tctx, "testing NetShareEnumAll level %u\n", r.in.level);		status = dcerpc_srvsvc_NetShareEnumAll(p, tctx, &r);		torture_assert_ntstatus_ok(tctx, status, "NetShareEnumAll failed");		torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareEnumAll failed");		/* call srvsvc_NetShareGetInfo for each returned share */		if (r.in.level == 2 && r.out.ctr.ctr2) {			for (j=0;j<r.out.ctr.ctr2->count;j++) {				const char *name;				name = r.out.ctr.ctr2->array[j].name;				if (!test_NetShareGetInfo(tctx, p, name, admin)) {					return false;				}			}		}	}	return true;}static bool test_NetShareEnumAllFull(struct torture_context *tctx,			      struct dcerpc_pipe *p){	return test_NetShareEnumAll(tctx, p, true);}static bool test_NetShareEnumAllAnon(struct torture_context *tctx,			      struct dcerpc_pipe *p){	return test_NetShareEnumAll(tctx, p, false);}static bool test_NetShareEnum(struct torture_context *tctx,			      struct dcerpc_pipe *p, bool admin){	NTSTATUS status;	struct srvsvc_NetShareEnum r;	struct srvsvc_NetShareCtr0 c0;	struct {		uint32_t level;		WERROR anon_status;		WERROR admin_status;	} levels[] = {		 { 0,	WERR_OK,		WERR_OK },		 { 1,	WERR_OK,		WERR_OK },		 { 2,	WERR_ACCESS_DENIED,	WERR_OK },		 { 501,	WERR_UNKNOWN_LEVEL,	WERR_UNKNOWN_LEVEL },		 { 502,	WERR_ACCESS_DENIED,	WERR_OK },	};	int i;	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));	r.in.ctr.ctr0 = &c0;	r.in.ctr.ctr0->count = 0;	r.in.ctr.ctr0->array = NULL;	r.in.max_buffer = (uint32_t)-1;	r.in.resume_handle = NULL;	for (i=0;i<ARRAY_SIZE(levels);i++) {		WERROR expected;		r.in.level = levels[i].level;		expected = levels[i].anon_status;		if (admin) expected = levels[i].admin_status;		ZERO_STRUCT(r.out);		torture_comment(tctx, "testing NetShareEnum level %u\n", r.in.level);		status = dcerpc_srvsvc_NetShareEnum(p, tctx, &r);		torture_assert_ntstatus_ok(tctx, status, "NetShareEnum failed");		torture_assert_werr_equal(tctx, r.out.result, expected, "NetShareEnum failed");	}	return true;}static bool test_NetShareEnumFull(struct torture_context *tctx,				  struct dcerpc_pipe *p){	return test_NetShareEnum(tctx, p, true);}static bool test_NetShareEnumAnon(struct torture_context *tctx,				  struct dcerpc_pipe *p){	return test_NetShareEnum(tctx, p, false);}/**************************//* srvsvc_NetSrv          *//**************************/static bool test_NetSrvGetInfo(struct torture_context *tctx, 			       struct dcerpc_pipe *p){	NTSTATUS status;	struct srvsvc_NetSrvGetInfo r;	struct srvsvc_NetSrvInfo503 i503;	uint32_t levels[] = {100, 101, 102, 502, 503};	int i;	uint32_t resume_handle;	ZERO_STRUCT(i503);	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));	for (i=0;i<ARRAY_SIZE(levels);i++) {		ZERO_STRUCT(r.out);		resume_handle = 0;		r.in.level = levels[i];		torture_comment(tctx, "testing NetSrvGetInfo level %u\n", r.in.level);		status = dcerpc_srvsvc_NetSrvGetInfo(p, tctx, &r);		torture_assert_ntstatus_ok(tctx, status, "NetSrvGetInfo failed");		if (!W_ERROR_IS_OK(r.out.result)) {			torture_comment(tctx, "NetSrvGetInfo failed: %s\n", win_errstr(r.out.result));		}	}	return true;}/**************************//* srvsvc_NetDisk         *//**************************/static bool test_NetDiskEnum(struct torture_context *tctx, 			     struct dcerpc_pipe *p){	NTSTATUS status;	struct srvsvc_NetDiskEnum r;	uint32_t levels[] = {0};	int i;	uint32_t resume_handle=0;	ZERO_STRUCT(r.in);	r.in.server_unc = NULL;	r.in.resume_handle = &resume_handle;	for (i=0;i<ARRAY_SIZE(levels);i++) {		ZERO_STRUCT(r.out);		r.in.level = levels[i];		torture_comment(tctx, "testing NetDiskEnum level %u\n", r.in.level);		status = dcerpc_srvsvc_NetDiskEnum(p, tctx, &r);		torture_assert_ntstatus_ok(tctx, status, "NetDiskEnum failed");		torture_assert_werr_ok(tctx, r.out.result, "NetDiskEnum failed");	}	return true;}/**************************//* srvsvc_NetTransport    *//**************************/static bool test_NetTransportEnum(struct torture_context *tctx, 				  struct dcerpc_pipe *p){	NTSTATUS status;	struct srvsvc_NetTransportEnum r;	struct srvsvc_NetTransportCtr0 c0;	uint32_t levels[] = {0, 1};	int i;	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s", dcerpc_server_name(p));	r.in.transports.ctr0 = &c0;	r.in.transports.ctr0->count = 0;	r.in.transports.ctr0->array = NULL;	r.in.max_buffer = (uint32_t)-1;	r.in.resume_handle = NULL;	for (i=0;i<ARRAY_SIZE(levels);i++) {		ZERO_STRUCT(r.out);		r.in.level = levels[i];		torture_comment(tctx, "testing NetTransportEnum level %u\n", r.in.level);		status = dcerpc_srvsvc_NetTransportEnum(p, tctx, &r);		torture_assert_ntstatus_ok(tctx, status, "NetTransportEnum failed");		if (!W_ERROR_IS_OK(r.out.result)) {			torture_comment(tctx, "unexpected result: %s\n", win_errstr(r.out.result));		}	}	return true;}/**************************//* srvsvc_NetRemoteTOD    *//**************************/static bool test_NetRemoteTOD(struct torture_context *tctx, 			      struct dcerpc_pipe *p){	NTSTATUS status;	struct srvsvc_NetRemoteTOD r;	r.in.server_unc = talloc_asprintf(tctx,"\\\\%s",dcerpc_server_name(p));	ZERO_STRUCT(r.out);	torture_comment(tctx, "testing NetRemoteTOD\n");	status = dcerpc_srvsvc_NetRemoteTOD(p, tctx, &r);	torture_assert_ntstatus_ok(tctx, status, "NetRemoteTOD failed");	torture_assert_werr_ok(tctx, r.out.result, "NetRemoteTOD failed");	return true;}/**************************//* srvsvc_NetName         *//**************************/static bool test_NetNameValidate(struct torture_context *tctx, 								 struct dcerpc_pipe *p){	NTSTATUS status;	struct srvsvc_NetNameValidate r;	char *invalidc;	char *name;	int i, n, min, max;	r.in.server_unc = talloc_asprintf(tctx, "\\\\%s", dcerpc_server_name(p));	r.in.flags = 0x0;	d_printf("testing NetNameValidate\n");	/* valid path types only between 1 and 13 */	for (i = 1; i < 14; i++) {again:		/* let's limit ourselves to a maximum of 4096 bytes */		r.in.name = name = talloc_array(tctx, char, 4097);		max = 4096;		min = 0;		n = max;		while (1) {			/* Find maximum length accepted by this type */			ZERO_STRUCT(r.out);			r.in.name_type = i;			memset(name, 'A', n);			name[n] = '\0';			status = dcerpc_srvsvc_NetNameValidate(p, tctx, &r);			if (!NT_STATUS_IS_OK(status)) {				d_printf("NetNameValidate failed while checking maximum size (%s)\n",						nt_errstr(status));				break;			}			if (W_ERROR_IS_OK(r.out.result)) {				min = n;				n += (max - min + 1)/2;				continue;							} else {				if ((min + 1) >= max) break; /* found it */								max = n;				n -= (max - min)/2;				continue;			}		}		talloc_free(name);		d_printf("Maximum length for type %2d, flags %08x: %d\n", i, r.in.flags, max);		/* find invalid chars for this type check only ASCII between 0x20 and 0x7e */		invalidc = talloc_strdup(tctx, "");		for (n = 0x20; n < 0x7e; n++) {			r.in.name = name = talloc_asprintf(tctx, "%c", (char)n);			status = dcerpc_srvsvc_NetNameValidate(p, tctx, &r);			if (!NT_STATUS_IS_OK(status)) {				d_printf("NetNameValidate failed while checking valid chars (%s)\n",						nt_errstr(status));				break;			}			if (!W_ERROR_IS_OK(r.out.result)) {				invalidc = talloc_asprintf_append_buffer(invalidc, "%c", (char)n);			}			talloc_free(name);		}		d_printf(" Invalid chars for type %2d, flags %08x: \"%s\"\n", i, r.in.flags, invalidc);		/* only two values are accepted for flags: 0x0 and 0x80000000 */		if (r.in.flags == 0x0) {			r.in.flags = 0x80000000;			goto again;		}		r.in.flags = 0x0;	}	return true;}struct torture_suite *torture_rpc_srvsvc(TALLOC_CTX *mem_ctx){	struct torture_suite *suite = torture_suite_create(mem_ctx, "SRVSVC");	struct torture_rpc_tcase *tcase;	struct torture_test *test;	tcase = torture_suite_add_rpc_iface_tcase(suite, "srvsvc (admin access)", &ndr_table_srvsvc);	torture_rpc_tcase_add_test(tcase, "NetCharDevEnum", test_NetCharDevEnum);	torture_rpc_tcase_add_test(tcase, "NetCharDevQEnum", test_NetCharDevQEnum);	torture_rpc_tcase_add_test(tcase, "NetConnEnum", test_NetConnEnum);	torture_rpc_tcase_add_test(tcase, "NetFileEnum", test_NetFileEnum);	torture_rpc_tcase_add_test(tcase, "NetSessEnum", test_NetSessEnum);	torture_rpc_tcase_add_test(tcase, "NetShareEnumAll", test_NetShareEnumAllFull);	torture_rpc_tcase_add_test(tcase, "NetSrvGetInfo", test_NetSrvGetInfo);	torture_rpc_tcase_add_test(tcase, "NetDiskEnum", test_NetDiskEnum);	torture_rpc_tcase_add_test(tcase, "NetTransportEnum", test_NetTransportEnum);	torture_rpc_tcase_add_test(tcase, "NetRemoteTOD", test_NetRemoteTOD);	torture_rpc_tcase_add_test(tcase, "NetShareEnum", test_NetShareEnumFull);	torture_rpc_tcase_add_test(tcase, "NetShareGetInfo", test_NetShareGetInfoAdminFull);	test = torture_rpc_tcase_add_test(tcase, "NetShareAddSetDel", 					   test_NetShareAddSetDel);	test->dangerous = true;	torture_rpc_tcase_add_test(tcase, "NetNameValidate", test_NetNameValidate);		tcase = torture_suite_add_anon_rpc_iface_tcase(suite, 						    "srvsvc anonymous access", 						    &ndr_table_srvsvc);	torture_rpc_tcase_add_test(tcase, "NetShareEnumAll", 				   test_NetShareEnumAllAnon);	torture_rpc_tcase_add_test(tcase, "NetShareEnum", 				   test_NetShareEnumAnon);	torture_rpc_tcase_add_test(tcase, "NetShareGetInfo", 				   test_NetShareGetInfoAdminAnon);	return suite;}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?