summaryrefslogtreecommitdiffstats
path: root/source4/torture/ndr/ndr.c
diff options
context:
space:
mode:
Diffstat (limited to 'source4/torture/ndr/ndr.c')
-rw-r--r--source4/torture/ndr/ndr.c831
1 files changed, 831 insertions, 0 deletions
diff --git a/source4/torture/ndr/ndr.c b/source4/torture/ndr/ndr.c
new file mode 100644
index 0000000..0faef1a
--- /dev/null
+++ b/source4/torture/ndr/ndr.c
@@ -0,0 +1,831 @@
+/*
+ Unix SMB/CIFS implementation.
+ test suite for winreg ndr operations
+
+ Copyright (C) Jelmer Vernooij 2007
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#include "includes.h"
+#include "torture/ndr/ndr.h"
+#include "torture/ndr/proto.h"
+#include "../lib/util/dlinklist.h"
+#include "param/param.h"
+#include "librpc/gen_ndr/ndr_misc.h"
+
+struct ndr_pull_test_data {
+ DATA_BLOB data;
+ DATA_BLOB data_context;
+ size_t struct_size;
+ ndr_pull_flags_fn_t pull_fn;
+ ndr_push_flags_fn_t push_fn;
+ ndr_print_fn_t print_fn;
+ ndr_print_function_t print_function;
+ ndr_flags_type ndr_flags;
+ libndr_flags flags;
+ enum ndr_err_code ndr_err;
+};
+
+static enum ndr_err_code torture_ndr_push_struct_blob_flags(DATA_BLOB *blob, TALLOC_CTX *mem_ctx, ndr_flags_type flags, libndr_flags ndr_flags, const void *p, ndr_push_flags_fn_t fn)
+{
+ struct ndr_push *ndr;
+ ndr = ndr_push_init_ctx(mem_ctx);
+ NDR_ERR_HAVE_NO_MEMORY(ndr);
+
+ ndr->flags |= ndr_flags;
+
+ NDR_CHECK(fn(ndr, flags, p));
+
+ *blob = ndr_push_blob(ndr);
+ talloc_steal(mem_ctx, blob->data);
+ talloc_free(ndr);
+
+ return NDR_ERR_SUCCESS;
+}
+
+static bool torture_ndrdump(struct torture_context *tctx,
+ struct ndr_pull *ndr,
+ const struct ndr_pull_test_data *data,
+ ndr_flags_type flags,
+ void *ds,
+ const char *name)
+{
+ struct ndr_print *ndr_print;
+ const char *name_raw;
+ ndr_flags_type ndr_flags = data->ndr_flags | flags;
+
+ ndr_print = talloc_zero(tctx, struct ndr_print);
+ torture_assert(tctx, ndr_print, "out of memory");
+
+ if (DEBUGLEVEL >= 10) {
+ ndr_print->print = ndr_print_debug_helper;
+ } else {
+ ndr_print->print = ndr_print_string_helper;
+ }
+
+ ndr_print->depth = 1;
+
+ torture_assert(tctx, ndr_flags, "no flags have been set");
+
+ if (ndr_flags & (NDR_BUFFERS|NDR_SCALARS)) {
+ data->print_fn(ndr_print, name, ds);
+ } else {
+ data->print_function(ndr_print, name, ndr_flags, ds);
+ }
+
+ name_raw = talloc_asprintf(tctx, "%s (RAW DATA)", name);
+ torture_assert(tctx, name_raw, "out of memory");
+
+ ndr_print_DATA_BLOB(ndr_print, name_raw, data->data);
+
+ talloc_free(ndr_print);
+
+ return true;
+}
+
+static bool wrap_ndr_pullpush_test(struct torture_context *tctx,
+ struct torture_tcase *tcase,
+ struct torture_test *test)
+{
+ bool (*check_fn) (struct torture_context *ctx, void *data) = test->fn;
+ const struct ndr_pull_test_data *data = (const struct ndr_pull_test_data *)test->data;
+ struct ndr_pull *ndr = ndr_pull_init_blob(&(data->data), tctx);
+ void *ds = talloc_zero_size(ndr, data->struct_size);
+ bool ret = true;
+ uint32_t highest_ofs;
+
+ torture_assert(tctx, data, "out of memory");
+ torture_assert(tctx, ndr, "out of memory");
+ torture_assert(tctx, ds, "out of memory");
+
+ ndr->flags |= data->flags;
+
+ ndr->flags |= LIBNDR_FLAG_REF_ALLOC;
+
+ torture_assert_ndr_success(tctx, data->pull_fn(ndr, data->ndr_flags, ds),
+ "pulling");
+
+ if (ndr->offset > ndr->relative_highest_offset) {
+ highest_ofs = ndr->offset;
+ } else {
+ highest_ofs = ndr->relative_highest_offset;
+ }
+
+ torture_assert(tctx, highest_ofs == ndr->data_size,
+ talloc_asprintf(tctx,
+ "%d unread bytes", ndr->data_size - highest_ofs));
+
+ if (check_fn != NULL) {
+ ret = check_fn(tctx, ds);
+ } else {
+ ret = true;
+ }
+
+ torture_ndrdump(tctx, ndr, data, data->ndr_flags, ds, "ds");
+
+ if (data->push_fn != NULL) {
+ DATA_BLOB outblob;
+ torture_assert_ndr_success(tctx, torture_ndr_push_struct_blob_flags(&outblob, ndr, data->ndr_flags, ndr->flags, ds, data->push_fn), "pushing");
+ torture_assert_data_blob_equal(tctx, outblob, data->data, "ndr push compare");
+ }
+
+ talloc_free(ndr);
+ return ret;
+}
+
+_PUBLIC_ struct torture_test *_torture_suite_add_ndr_pullpush_test(
+ struct torture_suite *suite,
+ const char *name,
+ ndr_pull_flags_fn_t pull_fn,
+ ndr_push_flags_fn_t push_fn,
+ ndr_print_fn_t print_fn,
+ ndr_print_function_t print_function,
+ const char *db_name,
+ DATA_BLOB db,
+ size_t struct_size,
+ ndr_flags_type ndr_flags,
+ libndr_flags flags,
+ const char *check_fn_name,
+ bool (*check_fn) (struct torture_context *ctx, void *data))
+{
+ struct torture_test *test;
+ struct torture_tcase *tcase;
+ struct ndr_pull_test_data *data;
+
+ tcase = torture_suite_add_tcase(suite, name);
+
+ test = talloc(tcase, struct torture_test);
+
+ test->name = talloc_strdup(test, check_fn_name);
+ test->description = talloc_asprintf(test, "db:%s",
+ db_name);
+ test->run = wrap_ndr_pullpush_test;
+
+ data = talloc_zero(test, struct ndr_pull_test_data);
+ data->data = db;
+ data->ndr_flags = ndr_flags;
+ data->flags = flags;
+ data->struct_size = struct_size;
+ data->pull_fn = pull_fn;
+ data->push_fn = push_fn;
+ data->print_fn = print_fn;
+ data->print_function = print_function;
+
+ test->data = data;
+ test->fn = check_fn;
+ test->dangerous = false;
+
+ DLIST_ADD_END(tcase->tests, test);
+
+ return test;
+}
+
+
+static bool wrap_ndr_inout_pull_test(struct torture_context *tctx,
+ struct torture_tcase *tcase,
+ struct torture_test *test)
+{
+ bool (*check_fn) (struct torture_context *ctx, void *data) = test->fn;
+ const struct ndr_pull_test_data *data = (const struct ndr_pull_test_data *)test->data;
+ void *ds = talloc_zero_size(tctx, data->struct_size);
+ struct ndr_pull *ndr;
+ uint32_t highest_ofs;
+ bool ret = false;
+
+ torture_assert(tctx, data, "out of memory");
+ torture_assert(tctx, ds, "out of memory");
+
+ /* handle NDR_IN context */
+
+ ndr = ndr_pull_init_blob(&(data->data_context), tctx);
+ torture_assert(tctx, ndr, "ndr init failed");
+
+ ndr->flags |= data->flags;
+ ndr->flags |= LIBNDR_FLAG_REF_ALLOC;
+
+ torture_assert_ndr_success(tctx,
+ data->pull_fn(ndr, NDR_IN, ds),
+ "ndr pull of context failed");
+
+ if (ndr->offset > ndr->relative_highest_offset) {
+ highest_ofs = ndr->offset;
+ } else {
+ highest_ofs = ndr->relative_highest_offset;
+ }
+
+ torture_assert(tctx, highest_ofs == ndr->data_size,
+ talloc_asprintf(tctx, "%d unread bytes", ndr->data_size - highest_ofs));
+
+ torture_ndrdump(tctx, ndr, data, NDR_IN, ds, "ds");
+
+ talloc_free(ndr);
+
+ /* handle NDR_OUT */
+
+ ndr = ndr_pull_init_blob(&(data->data), tctx);
+ torture_assert(tctx, ndr, "ndr init failed");
+
+ ndr->flags |= data->flags;
+ ndr->flags |= LIBNDR_FLAG_REF_ALLOC;
+
+ torture_assert_ndr_success(tctx,
+ data->pull_fn(ndr, NDR_OUT, ds),
+ "ndr pull failed");
+
+ if (ndr->offset > ndr->relative_highest_offset) {
+ highest_ofs = ndr->offset;
+ } else {
+ highest_ofs = ndr->relative_highest_offset;
+ }
+
+ torture_assert(tctx, highest_ofs == ndr->data_size,
+ talloc_asprintf(tctx, "%d unread bytes", ndr->data_size - highest_ofs));
+
+ if (check_fn) {
+ ret = check_fn(tctx, ds);
+ } else {
+ ret = true;
+ }
+
+ torture_ndrdump(tctx, ndr, data, NDR_OUT, ds, "ds");
+
+ talloc_free(ndr);
+
+ return ret;
+}
+
+_PUBLIC_ struct torture_test *_torture_suite_add_ndr_pull_inout_test(
+ struct torture_suite *suite,
+ const char *name,
+ ndr_pull_flags_fn_t pull_fn,
+ ndr_print_function_t print_function,
+ const char *db_in_name,
+ DATA_BLOB db_in,
+ const char *db_out_name,
+ DATA_BLOB db_out,
+ size_t struct_size,
+ libndr_flags flags,
+ const char *check_fn_name,
+ bool (*check_fn) (struct torture_context *ctx, void *data))
+{
+ struct torture_test *test;
+ struct torture_tcase *tcase;
+ struct ndr_pull_test_data *data;
+
+ tcase = torture_suite_add_tcase(suite, name);
+
+ test = talloc(tcase, struct torture_test);
+
+ test->name = talloc_strdup(test, check_fn_name);
+ test->description = talloc_asprintf(test, "db_in:%s db_out:%s",
+ db_in_name,
+ db_out_name);
+ test->run = wrap_ndr_inout_pull_test;
+ data = talloc_zero(test, struct ndr_pull_test_data);
+ data->data = db_out;
+ data->data_context = db_in;
+ data->ndr_flags = 0;
+ data->flags = flags;
+ data->struct_size = struct_size;
+ data->pull_fn = pull_fn;
+ data->print_function = print_function;
+ test->data = data;
+ test->fn = check_fn;
+ test->dangerous = false;
+
+ DLIST_ADD_END(tcase->tests, test);
+
+ return test;
+}
+
+static bool wrap_ndr_pull_invalid_data_test(struct torture_context *tctx,
+ struct torture_tcase *tcase,
+ struct torture_test *test)
+{
+ const struct ndr_pull_test_data *data = (const struct ndr_pull_test_data *)test->data;
+ struct ndr_pull *ndr = ndr_pull_init_blob(&(data->data), tctx);
+ void *ds = talloc_zero_size(ndr, data->struct_size);
+ bool ret = true;
+
+ torture_assert(tctx, data, "out of memory");
+ torture_assert(tctx, ndr, "out of memory");
+ torture_assert(tctx, ds, "out of memory");
+
+ ndr->flags |= data->flags;
+
+ ndr->flags |= LIBNDR_FLAG_REF_ALLOC;
+
+ torture_assert_ndr_err_equal(
+ tctx,
+ data->pull_fn(ndr, data->ndr_flags, ds),
+ NDR_ERR_BUFSIZE,
+ "pulling invalid data");
+
+ talloc_free(ndr);
+ return ret;
+}
+
+_PUBLIC_ struct torture_test *_torture_suite_add_ndr_pull_invalid_data_test(
+ struct torture_suite *suite,
+ const char *name,
+ ndr_pull_flags_fn_t pull_fn,
+ const char *db_name,
+ DATA_BLOB db,
+ size_t struct_size,
+ ndr_flags_type ndr_flags,
+ libndr_flags flags,
+ enum ndr_err_code ndr_err)
+{
+ struct torture_test *test;
+ struct torture_tcase *tcase;
+ struct ndr_pull_test_data *data;
+
+ tcase = torture_suite_add_tcase(suite, name);
+
+ test = talloc(tcase, struct torture_test);
+
+ test->name = talloc_strdup(test, db_name);
+ test->description = NULL;
+ test->run = wrap_ndr_pull_invalid_data_test;
+
+ data = talloc_zero(test, struct ndr_pull_test_data);
+ data->data = db;
+ data->ndr_flags = ndr_flags;
+ data->flags = flags;
+ data->struct_size = struct_size;
+ data->pull_fn = pull_fn;
+ data->ndr_err = ndr_err;
+
+ test->data = data;
+ test->fn = NULL;
+ test->dangerous = false;
+
+ DLIST_ADD_END(tcase->tests, test);
+
+ return test;
+}
+
+static bool test_check_string_terminator(struct torture_context *tctx)
+{
+ struct ndr_pull *ndr;
+ DATA_BLOB blob;
+ TALLOC_CTX *mem_ctx = tctx;
+
+ /* Simple test */
+ blob = strhex_to_data_blob(tctx, "0000");
+
+ ndr = ndr_pull_init_blob(&blob, mem_ctx);
+
+ torture_assert_ndr_success(tctx, ndr_check_string_terminator(ndr, 1, 2),
+ "simple check_string_terminator test failed");
+
+ torture_assert(tctx, ndr->offset == 0,
+ "check_string_terminator did not reset offset");
+
+ if (NDR_ERR_CODE_IS_SUCCESS(ndr_check_string_terminator(ndr, 1, 3))) {
+ torture_fail(tctx, "check_string_terminator checked beyond string boundaries");
+ }
+
+ torture_assert(tctx, ndr->offset == 0,
+ "check_string_terminator did not reset offset");
+
+ talloc_free(ndr);
+
+ blob = strhex_to_data_blob(tctx, "11220000");
+ ndr = ndr_pull_init_blob(&blob, mem_ctx);
+
+ torture_assert_ndr_success(tctx,
+ ndr_check_string_terminator(ndr, 4, 1),
+ "check_string_terminator failed to recognize terminator");
+
+ torture_assert_ndr_success(tctx,
+ ndr_check_string_terminator(ndr, 3, 1),
+ "check_string_terminator failed to recognize terminator");
+
+ if (NDR_ERR_CODE_IS_SUCCESS(ndr_check_string_terminator(ndr, 2, 1))) {
+ torture_fail(tctx, "check_string_terminator erroneously reported terminator");
+ }
+
+ torture_assert(tctx, ndr->offset == 0,
+ "check_string_terminator did not reset offset");
+ return true;
+}
+
+static bool test_guid_from_string_valid(struct torture_context *tctx)
+{
+ /* FIXME */
+ return true;
+}
+
+static bool test_guid_from_string_null(struct torture_context *tctx)
+{
+ struct GUID guid;
+ torture_assert_ntstatus_equal(tctx, NT_STATUS_INVALID_PARAMETER,
+ GUID_from_string(NULL, &guid),
+ "NULL failed");
+ return true;
+}
+
+static bool test_guid_from_string_invalid(struct torture_context *tctx)
+{
+ struct GUID g1;
+ bool failed = false;
+ int i;
+ const char *bad_guids[] = {
+ "bla",
+ "",
+ /*
+ "00000001-0002-0003-0405-060708090a0b", correct
+ */
+ "00000001-0002-0003-0405-060708090a0b1", /* too long */
+ "00000001-0002-0003-0405-060708090a0", /* too short */
+ "00000001-0002-0003-0405--060708090a0", /* negative */
+ "00000001-0002-0003--0405-060708090a0", /* negative */
+ "-0000001-0002-0003-0405-060708090a0b", /* negative */
+ "-0000001-0002-0003-04-5-060708090a0b", /* negative */
+ "d0000001-0002-0003-0405-060708090a-b", /* negative */
+ "00000001- -2-0003-0405-060708090a0b", /* negative, space */
+ "00000001-0002-0003-0405- 060708090a0", /* whitespace */
+ " 0000001-0002-0003--0405-060708090a0", /* whitespace */
+ "00000001-0002-0003--0405-060708090a ", /* whitespace */
+ "0000001-00002-0003-04050-60708090a0b", /* misshapen */
+ "00000010-0002-0003-04050-60708090a0b", /* misshapen */
+ "00000001-0002-0003-0405-0z0708090a0b", /* bad char */
+ "00000001-00x2-0x03-0405-060708090a0b", /* bad char (00x) */
+ "0x000001-0002-0003-0405-060708090a0b", /* 0x char */
+ "00000001-0x02-0x03-0405-060708090a0b", /* 0x char */
+ };
+
+ for (i = 0; i < ARRAY_SIZE(bad_guids); i++) {
+ NTSTATUS status = GUID_from_string(bad_guids[i], &g1);
+ if (! NT_STATUS_EQUAL(status, NT_STATUS_INVALID_PARAMETER)) {
+ torture_comment(tctx, "bad guid %s parsed as OK\n",
+ bad_guids[i]);
+ failed = true;
+ }
+ }
+ if (failed) {
+ torture_fail(tctx, "wrongly allowing invalid guids");
+ }
+ return true;
+}
+
+static bool test_guid_from_string(struct torture_context *tctx)
+{
+ struct GUID g1, exp;
+ /* we are asserting all these guids are valid and equal */
+ const char *guids[5] = {
+ "00000001-0002-0003-0405-060708090a0b",
+ "{00000001-0002-0003-0405-060708090a0b}",
+ "{00000001-0002-0003-0405-060708090a0B}", /* mixed */
+ "00000001-0002-0003-0405-060708090A0B", /* upper */
+ "01000000020003000405060708090a0b", /* hex string */
+ };
+ int i;
+
+ torture_assert_ntstatus_ok(tctx,
+ GUID_from_string(guids[0], &g1),
+ "invalid return code");
+ exp.time_low = 1;
+ exp.time_mid = 2;
+ exp.time_hi_and_version = 3;
+ exp.clock_seq[0] = 4;
+ exp.clock_seq[1] = 5;
+ exp.node[0] = 6;
+ exp.node[1] = 7;
+ exp.node[2] = 8;
+ exp.node[3] = 9;
+ exp.node[4] = 10;
+ exp.node[5] = 11;
+
+ for (i = 1; i < ARRAY_SIZE(guids); i++) {
+ torture_assert_ntstatus_ok(tctx,
+ GUID_from_string(guids[i], &g1),
+ "invalid return code");
+ torture_assert(tctx, GUID_equal(&g1, &exp),
+ "UUID parsed incorrectly");
+ }
+ return true;
+}
+
+static bool test_guid_from_data_blob(struct torture_context *tctx)
+{
+ struct GUID g1, exp;
+ const uint8_t bin[16] = {
+ 0x01, 0x00, 0x00, 0x00,
+ 0x02, 0x00,
+ 0x03, 0x00,
+ 0x04, 0x05,
+ 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b };
+ const char *hexstr = "01000000020003000405060708090a0b";
+ const DATA_BLOB blobs[2] = {
+ data_blob_const(bin, sizeof(bin)),
+ data_blob_string_const(hexstr),
+ };
+ int i;
+
+ exp.time_low = 1;
+ exp.time_mid = 2;
+ exp.time_hi_and_version = 3;
+ exp.clock_seq[0] = 4;
+ exp.clock_seq[1] = 5;
+ exp.node[0] = 6;
+ exp.node[1] = 7;
+ exp.node[2] = 8;
+ exp.node[3] = 9;
+ exp.node[4] = 10;
+ exp.node[5] = 11;
+
+ for (i = 1; i < ARRAY_SIZE(blobs); i++) {
+ torture_assert_ntstatus_ok(tctx,
+ GUID_from_data_blob(&blobs[i], &g1),
+ "invalid return code");
+ torture_assert(tctx, GUID_equal(&g1, &exp),
+ "UUID parsed incorrectly");
+ }
+
+ return true;
+}
+
+static bool test_guid_string_valid(struct torture_context *tctx)
+{
+ struct GUID g;
+ g.time_low = 1;
+ g.time_mid = 2;
+ g.time_hi_and_version = 3;
+ g.clock_seq[0] = 4;
+ g.clock_seq[1] = 5;
+ g.node[0] = 6;
+ g.node[1] = 7;
+ g.node[2] = 8;
+ g.node[3] = 9;
+ g.node[4] = 10;
+ g.node[5] = 11;
+ torture_assert_str_equal(tctx, "00000001-0002-0003-0405-060708090a0b",
+ GUID_string(tctx, &g),
+ "parsing guid failed");
+ return true;
+}
+
+static bool test_guid_string2_valid(struct torture_context *tctx)
+{
+ struct GUID g;
+ g.time_low = 1;
+ g.time_mid = 2;
+ g.time_hi_and_version = 3;
+ g.clock_seq[0] = 4;
+ g.clock_seq[1] = 5;
+ g.node[0] = 6;
+ g.node[1] = 7;
+ g.node[2] = 8;
+ g.node[3] = 9;
+ g.node[4] = 10;
+ g.node[5] = 11;
+ torture_assert_str_equal(tctx, "{00000001-0002-0003-0405-060708090a0b}",
+ GUID_string2(tctx, &g),
+ "parsing guid failed");
+ return true;
+}
+
+static bool test_guid_into_blob(struct torture_context *tctx)
+{
+ enum ndr_err_code ndr_err;
+ static const char exp_guid[16] =
+ { 0x1, 0x0, 0x0, 0x0,
+ 0x2, 0x0, 0x3, 0x0,
+ 0x4, 0x5, 0x6, 0x7,
+ 0x8, 0x9, 0xa, 0xb };
+ DATA_BLOB exp = data_blob_const(exp_guid, 16);
+ char ndr_guid[16] =
+ { 0x0, 0x0, 0x0, 0x0,
+ 0x0, 0x0, 0x0, 0x0,
+ 0x0, 0x0, 0x0, 0x0,
+ 0x0, 0x0, 0x0, 0x0 };
+ DATA_BLOB b = data_blob_const(ndr_guid, 16);
+ struct GUID guid;
+ guid.time_low = 1;
+ guid.time_mid = 2;
+ guid.time_hi_and_version = 3;
+ guid.clock_seq[0] = 4;
+ guid.clock_seq[1] = 5;
+ guid.node[0] = 6;
+ guid.node[1] = 7;
+ guid.node[2] = 8;
+ guid.node[3] = 9;
+ guid.node[4] = 10;
+ guid.node[5] = 11;
+
+ ndr_err = ndr_push_struct_into_fixed_blob(&b, &guid,
+ (ndr_push_flags_fn_t)ndr_push_GUID);
+ torture_assert_ndr_err_equal(tctx, ndr_err, NDR_ERR_SUCCESS,
+ "wrong NDR error");
+ torture_assert_data_blob_equal(tctx, b, exp,
+ "GUID packed wrongly");
+
+ return true;
+}
+
+/* Really a test of ndr_push_struct_into_fixed_blob error handling */
+static bool test_guid_into_long_blob(struct torture_context *tctx)
+{
+ enum ndr_err_code ndr_err;
+ char ndr_guid[17] =
+ { 0x0, 0x0, 0x0, 0x0,
+ 0x0, 0x0, 0x0, 0x0,
+ 0x0, 0x0, 0x0, 0x0,
+ 0x0, 0x0, 0x0, 0x0, 0x0 };
+ DATA_BLOB b = data_blob_const(ndr_guid, 17);
+ struct GUID guid;
+ guid.time_low = 1;
+ guid.time_mid = 2;
+ guid.time_hi_and_version = 3;
+ guid.clock_seq[0] = 4;
+ guid.clock_seq[1] = 5;
+ guid.node[0] = 6;
+ guid.node[1] = 7;
+ guid.node[2] = 8;
+ guid.node[3] = 9;
+ guid.node[4] = 10;
+ guid.node[5] = 11;
+
+ torture_assert(tctx, b.data != NULL, "data_blob_talloc failed");
+ ndr_err = ndr_push_struct_into_fixed_blob(
+ &b, &guid, (ndr_push_flags_fn_t)ndr_push_GUID);
+ torture_assert_ndr_err_equal(tctx, ndr_err, NDR_ERR_BUFSIZE,
+ "wrong NDR error");
+
+ return true;
+}
+
+static bool test_guid_into_short_blob(struct torture_context *tctx)
+{
+ enum ndr_err_code ndr_err;
+ char ndr_guid[15] =
+ { 0x0, 0x0, 0x0, 0x0,
+ 0x0, 0x0, 0x0, 0x0,
+ 0x0, 0x0, 0x0, 0x0,
+ 0x0, 0x0, 0x0 };
+ DATA_BLOB b = data_blob_const(ndr_guid, 15);
+ struct GUID guid;
+ guid.time_low = 1;
+ guid.time_mid = 2;
+ guid.time_hi_and_version = 3;
+ guid.clock_seq[0] = 4;
+ guid.clock_seq[1] = 5;
+ guid.node[0] = 6;
+ guid.node[1] = 7;
+ guid.node[2] = 8;
+ guid.node[3] = 9;
+ guid.node[4] = 10;
+ guid.node[5] = 11;
+
+ ndr_err = ndr_push_struct_into_fixed_blob(
+ &b, &guid, (ndr_push_flags_fn_t)ndr_push_GUID);
+ torture_assert_ndr_err_equal(tctx, ndr_err, NDR_ERR_BUFSIZE,
+ "wrong NDR error");
+
+ return true;
+}
+
+static bool test_compare_uuid(struct torture_context *tctx)
+{
+ struct GUID g1, g2;
+ ZERO_STRUCT(g1); ZERO_STRUCT(g2);
+ torture_assert_int_equal(tctx, 0, GUID_compare(&g1, &g2),
+ "GUIDs not equal");
+ g1.time_low = 1;
+ torture_assert_int_equal(tctx, 1, GUID_compare(&g1, &g2),
+ "GUID diff invalid");
+
+ g1.time_low = 10;
+ torture_assert_int_equal(tctx, 1, GUID_compare(&g1, &g2),
+ "GUID diff invalid");
+
+ g1.time_low = 0;
+ g1.clock_seq[1] = 20;
+ torture_assert_int_equal(tctx, 1, GUID_compare(&g1, &g2),
+ "GUID diff invalid");
+
+ g1.time_low = ~0;
+ torture_assert_int_equal(tctx, 1, GUID_compare(&g1, &g2),
+ "GUID diff invalid");
+
+ g1.time_low = 0;
+ g2.time_low = ~0;
+ torture_assert_int_equal(tctx, -1, GUID_compare(&g1, &g2),
+ "GUID diff invalid");
+ return true;
+}
+
+static bool test_syntax_id_from_string(struct torture_context *tctx)
+{
+ struct ndr_syntax_id s, exp;
+ const char *id = "00000001-0002-0003-0405-060708090a0b/0x12345678";
+
+ exp.uuid.time_low = 1;
+ exp.uuid.time_mid = 2;
+ exp.uuid.time_hi_and_version = 3;
+ exp.uuid.clock_seq[0] = 4;
+ exp.uuid.clock_seq[1] = 5;
+ exp.uuid.node[0] = 6;
+ exp.uuid.node[1] = 7;
+ exp.uuid.node[2] = 8;
+ exp.uuid.node[3] = 9;
+ exp.uuid.node[4] = 10;
+ exp.uuid.node[5] = 11;
+ exp.if_version = 0x12345678;
+
+ torture_assert(tctx,
+ ndr_syntax_id_from_string(id, &s),
+ "invalid return code");
+ torture_assert(tctx, ndr_syntax_id_equal(&s, &exp),
+ "NDR syntax id parsed incorrectly");
+ return true;
+}
+
+struct torture_suite *torture_local_ndr(TALLOC_CTX *mem_ctx)
+{
+ struct torture_suite *suite = torture_suite_create(mem_ctx, "ndr");
+
+ torture_suite_add_suite(suite, ndr_dcerpc_suite(suite));
+ torture_suite_add_suite(suite, ndr_winreg_suite(suite));
+ torture_suite_add_suite(suite, ndr_atsvc_suite(suite));
+ torture_suite_add_suite(suite, ndr_lsa_suite(suite));
+ torture_suite_add_suite(suite, ndr_epmap_suite(suite));
+ torture_suite_add_suite(suite, ndr_dfs_suite(suite));
+ torture_suite_add_suite(suite, ndr_dfsblob_suite(suite));
+ torture_suite_add_suite(suite, ndr_netlogon_suite(suite));
+ torture_suite_add_suite(suite, ndr_drsuapi_suite(suite));
+ torture_suite_add_suite(suite, ndr_spoolss_suite(suite));
+ torture_suite_add_suite(suite, ndr_winspool_suite(suite));
+ torture_suite_add_suite(suite, ndr_ntprinting_suite(suite));
+ torture_suite_add_suite(suite, ndr_samr_suite(suite));
+ torture_suite_add_suite(suite, ndr_drsblobs_suite(suite));
+ torture_suite_add_suite(suite, ndr_dnsp_suite(suite));
+ torture_suite_add_suite(suite, ndr_nbt_suite(suite));
+ torture_suite_add_suite(suite, ndr_ntlmssp_suite(suite));
+ torture_suite_add_suite(suite, ndr_backupkey_suite(suite));
+ torture_suite_add_suite(suite, ndr_witness_suite(suite));
+ torture_suite_add_suite(suite, ndr_clusapi_suite(suite));
+ torture_suite_add_suite(suite, ndr_negoex_suite(suite));
+ torture_suite_add_suite(suite, ndr_string_suite(suite));
+ torture_suite_add_suite(suite, ndr_krb5pac_suite(suite));
+ torture_suite_add_suite(suite, ndr_cabinet_suite(suite));
+ torture_suite_add_suite(suite, ndr_charset_suite(suite));
+ torture_suite_add_suite(suite, ndr_svcctl_suite(suite));
+ torture_suite_add_suite(suite, ndr_ODJ_suite(suite));
+
+ torture_suite_add_simple_test(suite, "string terminator",
+ test_check_string_terminator);
+
+ torture_suite_add_simple_test(suite, "guid_from_string_null",
+ test_guid_from_string_null);
+
+ torture_suite_add_simple_test(suite, "guid_from_string",
+ test_guid_from_string);
+
+ torture_suite_add_simple_test(suite, "guid_from_data_blob",
+ test_guid_from_data_blob);
+
+ torture_suite_add_simple_test(suite, "guid_from_string_invalid",
+ test_guid_from_string_invalid);
+
+ torture_suite_add_simple_test(suite, "guid_string_valid",
+ test_guid_string_valid);
+
+ torture_suite_add_simple_test(suite, "guid_string2_valid",
+ test_guid_string2_valid);
+
+ torture_suite_add_simple_test(suite, "guid_from_string_valid",
+ test_guid_from_string_valid);
+
+ torture_suite_add_simple_test(suite, "compare_uuid",
+ test_compare_uuid);
+
+ torture_suite_add_simple_test(suite, "guid_into_blob",
+ test_guid_into_blob);
+
+ torture_suite_add_simple_test(suite, "guid_into_short_blob",
+ test_guid_into_short_blob);
+
+ torture_suite_add_simple_test(suite, "guid_into_long_blob",
+ test_guid_into_long_blob);
+
+ torture_suite_add_simple_test(suite, "syntax_id_from_string",
+ test_syntax_id_from_string);
+
+ return suite;
+}
+