Author: abartlet
Date: 2005-09-01 02:23:38 +0000 (Thu, 01 Sep 2005)
New Revision: 9861

WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=9861

Log:
I need to convert this to table-driven, but anyway...

More CrackNames testing

Andrew Bartlett

Modified:
   branches/SAMBA_4_0/source/torture/rpc/drsuapi.c


Changeset:
Modified: branches/SAMBA_4_0/source/torture/rpc/drsuapi.c
===================================================================
--- branches/SAMBA_4_0/source/torture/rpc/drsuapi.c     2005-09-01 01:43:30 UTC 
(rev 9860)
+++ branches/SAMBA_4_0/source/torture/rpc/drsuapi.c     2005-09-01 02:23:38 UTC 
(rev 9861)
@@ -774,7 +774,7 @@
        r.in.req.req1.format_desired    = DRSUAPI_DS_NAME_FORMAT_FQDN_1779;
        names[0].str = "NOT A GUID";
 
-       printf("testing DsCrackNames with BIND GUID '%s' desired format:%d\n",
+       printf("testing DsCrackNames with GUID '%s' desired format:%d\n",
                        names[0].str, r.in.req.req1.format_desired);
 
        status = dcerpc_drsuapi_DsCrackNames(p, mem_ctx, &r);
@@ -798,6 +798,34 @@
        }
 
        /* NEGATIVE tests.  This should parse, but not succeed */
+       r.in.req.req1.format_offered    = 
DRSUAPI_DS_NAME_FORMAT_SID_OR_SID_HISTORY;
+       r.in.req.req1.format_desired    = DRSUAPI_DS_NAME_FORMAT_FQDN_1779;
+       names[0].str = "NOT A SID";
+
+       printf("testing DsCrackNames with SID '%s' desired format:%d\n",
+                       names[0].str, r.in.req.req1.format_desired);
+
+       status = dcerpc_drsuapi_DsCrackNames(p, mem_ctx, &r);
+       if (!NT_STATUS_IS_OK(status)) {
+               const char *errstr = nt_errstr(status);
+               if (NT_STATUS_EQUAL(status, NT_STATUS_NET_WRITE_FAULT)) {
+                       errstr = dcerpc_errstr(mem_ctx, p->last_fault_code);
+               }
+               printf("dcerpc_drsuapi_DsCrackNames failed - %s\n", errstr);
+               ret = False;
+       } else if (!W_ERROR_IS_OK(r.out.result)) {
+               printf("DsCrackNames failed - %s\n", win_errstr(r.out.result));
+               ret = False;
+       } else if (r.out.ctr.ctr1->array[0].status != 
DRSUAPI_DS_NAME_STATUS_NOT_FOUND) {
+               printf("DsCrackNames incorrect error on name - %d\n", 
r.out.ctr.ctr1->array[0].status);
+               ret = False;
+       }
+
+       if (!ret) {
+               return ret;
+       }
+
+       /* NEGATIVE tests.  This should parse, but not succeed */
        r.in.req.req1.format_offered    = DRSUAPI_DS_NAME_FORMAT_GUID;
        r.in.req.req1.format_desired    = DRSUAPI_DS_NAME_FORMAT_FQDN_1779;
        names[0].str = GUID_string2(mem_ctx, &priv->bind_guid);
@@ -844,6 +872,52 @@
                ret = False;
        }
 
+       r.in.req.req1.format_offered    = 
DRSUAPI_DS_NAME_FORMAT_SERVICE_PRINCIPAL;
+       r.in.req.req1.format_desired    = DRSUAPI_DS_NAME_FORMAT_FQDN_1779;
+       names[0].str = talloc_asprintf(mem_ctx, "%s$", 
priv->dcinfo.netbios_name);
+
+       printf("testing DsCrackNames with service principal name '%s' desired 
format:%d\n",
+                       names[0].str, r.in.req.req1.format_desired);
+
+       status = dcerpc_drsuapi_DsCrackNames(p, mem_ctx, &r);
+       if (!NT_STATUS_IS_OK(status)) {
+               const char *errstr = nt_errstr(status);
+               if (NT_STATUS_EQUAL(status, NT_STATUS_NET_WRITE_FAULT)) {
+                       errstr = dcerpc_errstr(mem_ctx, p->last_fault_code);
+               }
+               printf("dcerpc_drsuapi_DsCrackNames failed - %s\n", errstr);
+               ret = False;
+       } else if (!W_ERROR_IS_OK(r.out.result)) {
+               printf("DsCrackNames failed - %s\n", win_errstr(r.out.result));
+               ret = False;
+       } else if (r.out.ctr.ctr1->array[0].status != 
DRSUAPI_DS_NAME_STATUS_NOT_FOUND) {
+               printf("DsCrackNames incorrect error on name - %d\n", 
r.out.ctr.ctr1->array[0].status);
+               ret = False;
+       }
+
+       r.in.req.req1.format_offered    = DRSUAPI_DS_NAME_FORMAT_USER_PRINCIPAL;
+       r.in.req.req1.format_desired    = DRSUAPI_DS_NAME_FORMAT_FQDN_1779;
+       names[0].str = "[EMAIL PROTECTED]";
+
+       printf("testing DsCrackNames with user principal name '%s' desired 
format:%d\n",
+                       names[0].str, r.in.req.req1.format_desired);
+
+       status = dcerpc_drsuapi_DsCrackNames(p, mem_ctx, &r);
+       if (!NT_STATUS_IS_OK(status)) {
+               const char *errstr = nt_errstr(status);
+               if (NT_STATUS_EQUAL(status, NT_STATUS_NET_WRITE_FAULT)) {
+                       errstr = dcerpc_errstr(mem_ctx, p->last_fault_code);
+               }
+               printf("dcerpc_drsuapi_DsCrackNames failed - %s\n", errstr);
+               ret = False;
+       } else if (!W_ERROR_IS_OK(r.out.result)) {
+               printf("DsCrackNames failed - %s\n", win_errstr(r.out.result));
+               ret = False;
+       } else if (r.out.ctr.ctr1->array[0].status != 
DRSUAPI_DS_NAME_STATUS_DOMAIN_ONLY) {
+               printf("DsCrackNames incorrect error on name - %d\n", 
r.out.ctr.ctr1->array[0].status);
+               ret = False;
+       }
+
        if (ret) {
                return test_DsCrackNamesMatrix(p, mem_ctx, priv, 
FQDN_1779_name, user_principal_name, service_principal_name);
        }

Reply via email to