/* Unix SMB/CIFS implementation. SMB torture tester Copyright (C) Guenther Deschner 2009-2010 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "source3/include/includes.h" #include "lib/replace/replace.h" #include "libcli/util/ntstatus.h" #include "libcli/util/werror.h" #include "lib/util/data_blob.h" #include "lib/util/time.h" #include "libcli/resolve/resolve.h" #include "nsswitch/libwbclient/wbclient.h" #include "nsswitch/winbind_client.h" #include "torture/smbtorture.h" #include "torture/winbind/proto.h" #include "lib/util/util_net.h" #include "lib/util/charset/charset.h" #include "libcli/auth/libcli_auth.h" #include "lib/param/param.h" #include "lib/util/samba_util.h" #include "auth/credentials/credentials.h" #include "lib/cmdline/cmdline.h" #include "winbindd.h" #include #include #define WBC_ERROR_EQUAL(x,y) (x == y) #define torture_assert_wbc_equal(torture_ctx, got, expected, cmt, cmt_arg) \ do { wbcErr __got = got, __expected = expected; \ if (!WBC_ERROR_EQUAL(__got, __expected)) { \ torture_result(torture_ctx, TORTURE_FAIL, __location__": "#got" was %s, expected %s: " cmt, wbcErrorString(__got), wbcErrorString(__expected), cmt_arg); \ return false; \ } \ } while (0) #define torture_assert_wbc_ok(torture_ctx,expr,cmt,cmt_arg) \ torture_assert_wbc_equal(torture_ctx,expr,WBC_ERR_SUCCESS,cmt,cmt_arg) #define torture_assert_wbc_equal_goto_fail(torture_ctx, got, expected, cmt, cmt_arg) \ do { wbcErr __got = got, __expected = expected; \ if (!WBC_ERROR_EQUAL(__got, __expected)) { \ torture_result(torture_ctx, TORTURE_FAIL, __location__": "#got" was %s, expected %s: " cmt, wbcErrorString(__got), wbcErrorString(__expected), cmt_arg); \ goto fail; \ } \ } while (0) #define torture_assert_wbc_ok_goto_fail(torture_ctx,expr,cmt,cmt_arg) \ torture_assert_wbc_equal_goto_fail(torture_ctx,expr,WBC_ERR_SUCCESS,cmt,cmt_arg) #define torture_assert_str_equal_goto_fail(torture_ctx,got,expected,cmt)\ do { const char *__got = (got), *__expected = (expected); \ if (strcmp(__got, __expected) != 0) { \ torture_result(torture_ctx, TORTURE_FAIL, \ __location__": "#got" was %s, expected %s: %s", \ __got, __expected, cmt); \ goto fail;; \ } \ } while(0) static bool test_wbc_ping(struct torture_context *tctx) { torture_assert_wbc_ok(tctx, wbcPing(), "%s", "wbcPing failed"); return true; } static bool test_wbc_pingdc(struct torture_context *tctx) { struct wbcInterfaceDetails *details = NULL; wbcErr ret = false; torture_assert_wbc_equal_goto_fail(tctx, wbcPingDc("random_string", NULL), WBC_ERR_DOMAIN_NOT_FOUND, "%s", "wbcPingDc failed"); torture_assert_wbc_ok_goto_fail(tctx, wbcPingDc(NULL, NULL), "%s", "wbcPingDc failed"); torture_assert_wbc_ok_goto_fail(tctx, wbcInterfaceDetails(&details), "%s", "wbcInterfaceDetails failed"); torture_assert_goto(tctx, details, ret, fail, "wbcInterfaceDetails returned NULL pointer"); torture_assert_goto(tctx, details->netbios_domain, ret, fail, "wbcInterfaceDetails returned NULL netbios_domain"); torture_assert_wbc_ok_goto_fail(tctx, wbcPingDc(details->netbios_domain, NULL), "wbcPingDc(%s) failed", details->netbios_domain); torture_assert_wbc_ok_goto_fail(tctx, wbcPingDc("BUILTIN", NULL), "%s", "wbcPingDc(BUILTIN) failed"); ret = true; fail: wbcFreeMemory(details); return ret; } static bool test_wbc_pingdc2(struct torture_context *tctx) { struct wbcInterfaceDetails *details = NULL; char *name = NULL; wbcErr ret = false; torture_assert_wbc_equal_goto_fail(tctx, wbcPingDc2("random_string", NULL, &name), WBC_ERR_DOMAIN_NOT_FOUND, "%s", "wbcPingDc2 failed"); torture_assert_wbc_ok_goto_fail(tctx, wbcPingDc2(NULL, NULL, &name), "%s", "wbcPingDc2 failed"); wbcFreeMemory(name); name = NULL; torture_assert_wbc_ok_goto_fail(tctx, wbcInterfaceDetails(&details), "%s", "wbcInterfaceDetails failed"); torture_assert_goto(tctx, details, ret, fail, "wbcInterfaceDetails returned NULL pointer"); torture_assert_goto(tctx, details->netbios_domain, ret, fail, "wbcInterfaceDetails returned NULL netbios_domain"); torture_assert_wbc_ok_goto_fail(tctx, wbcPingDc2(details->netbios_domain, NULL, &name), "wbcPingDc2(%s) failed", details->netbios_domain); wbcFreeMemory(name); name = NULL; torture_assert_wbc_ok_goto_fail(tctx, wbcPingDc2("BUILTIN", NULL, &name), "%s", "wbcPingDc2(BUILTIN) failed"); ret = true; fail: wbcFreeMemory(name); wbcFreeMemory(details); return ret; } static bool test_wbc_library_details(struct torture_context *tctx) { struct wbcLibraryDetails *details; torture_assert_wbc_ok(tctx, wbcLibraryDetails(&details), "%s", "wbcLibraryDetails failed"); torture_assert(tctx, details, "wbcLibraryDetails returned NULL pointer"); wbcFreeMemory(details); return true; } static bool test_wbc_interface_details(struct torture_context *tctx) { struct wbcInterfaceDetails *details; torture_assert_wbc_ok(tctx, wbcInterfaceDetails(&details), "%s", "wbcInterfaceDetails failed"); torture_assert(tctx, details, "wbcInterfaceDetails returned NULL pointer"); wbcFreeMemory(details); return true; } static bool test_wbc_sidtypestring(struct torture_context *tctx) { torture_assert_str_equal(tctx, wbcSidTypeString(WBC_SID_NAME_USE_NONE), "SID_NONE", "SID_NONE failed"); torture_assert_str_equal(tctx, wbcSidTypeString(WBC_SID_NAME_USER), "SID_USER", "SID_USER failed"); torture_assert_str_equal(tctx, wbcSidTypeString(WBC_SID_NAME_DOM_GRP), "SID_DOM_GROUP", "SID_DOM_GROUP failed"); torture_assert_str_equal(tctx, wbcSidTypeString(WBC_SID_NAME_DOMAIN), "SID_DOMAIN", "SID_DOMAIN failed"); torture_assert_str_equal(tctx, wbcSidTypeString(WBC_SID_NAME_ALIAS), "SID_ALIAS", "SID_ALIAS failed"); torture_assert_str_equal(tctx, wbcSidTypeString(WBC_SID_NAME_WKN_GRP), "SID_WKN_GROUP", "SID_WKN_GROUP failed"); torture_assert_str_equal(tctx, wbcSidTypeString(WBC_SID_NAME_DELETED), "SID_DELETED", "SID_DELETED failed"); torture_assert_str_equal(tctx, wbcSidTypeString(WBC_SID_NAME_INVALID), "SID_INVALID", "SID_INVALID failed"); torture_assert_str_equal(tctx, wbcSidTypeString(WBC_SID_NAME_UNKNOWN), "SID_UNKNOWN", "SID_UNKNOWN failed"); torture_assert_str_equal(tctx, wbcSidTypeString(WBC_SID_NAME_COMPUTER), "SID_COMPUTER", "SID_COMPUTER failed"); torture_assert_str_equal(tctx, wbcSidTypeString(WBC_SID_NAME_LABEL), "SID_LABEL", "SID_LABEL failed"); return true; } static bool test_wbc_sidtostring(struct torture_context *tctx) { struct wbcDomainSid sid; const char *sid_string = "S-1-5-32"; char *sid_string2; torture_assert_wbc_ok(tctx, wbcStringToSid(sid_string, &sid), "wbcStringToSid of %s failed", sid_string); torture_assert_wbc_ok(tctx, wbcSidToString(&sid, &sid_string2), "wbcSidToString of %s failed", sid_string); torture_assert_str_equal(tctx, sid_string, sid_string2, "sid strings differ"); wbcFreeMemory(sid_string2); return true; } static bool test_wbc_guidtostring(struct torture_context *tctx) { struct wbcGuid guid; const char *guid_string = "f7cf07b4-1487-45c7-824d-8b18cc580811"; char *guid_string2; torture_assert_wbc_ok(tctx, wbcStringToGuid(guid_string, &guid), "wbcStringToGuid of %s failed", guid_string); torture_assert_wbc_ok(tctx, wbcGuidToString(&guid, &guid_string2), "wbcGuidToString of %s failed", guid_string); torture_assert_str_equal(tctx, guid_string, guid_string2, "guid strings differ"); wbcFreeMemory(guid_string2); return true; } static bool test_wbc_domain_info(struct torture_context *tctx) { struct wbcDomainInfo *info = NULL; struct wbcInterfaceDetails *details = NULL; wbcErr ret = false; torture_assert_wbc_ok_goto_fail(tctx, wbcInterfaceDetails(&details), "%s", "wbcInterfaceDetails failed"); torture_assert_wbc_ok_goto_fail(tctx, wbcDomainInfo(details->netbios_domain, &info), "%s", "wbcDomainInfo failed"); torture_assert_goto(tctx, info, ret, fail, "wbcDomainInfo returned NULL pointer"); ret = true; fail: wbcFreeMemory(details); wbcFreeMemory(info); return ret; } static bool test_wbc_users(struct torture_context *tctx) { const char *domain_name = NULL; uint32_t num_users; const char **users = NULL; uint32_t i; struct wbcInterfaceDetails *details = NULL; struct wbcDomainSid *sids = NULL; char *domain = NULL; char *name = NULL; char *sid_string = NULL; wbcErr ret = false; char separator; torture_assert_wbc_ok(tctx, wbcInterfaceDetails(&details), "%s", "wbcInterfaceDetails failed"); domain_name = talloc_strdup(tctx, details->netbios_domain); torture_assert_goto(tctx, domain_name != NULL, ret, fail, "Failed to allocate domain_name"); separator = details->winbind_separator; wbcFreeMemory(details); details = NULL; torture_assert_wbc_ok_goto_fail(tctx, wbcListUsers(domain_name, &num_users, &users), "%s", "wbcListUsers failed"); torture_assert_goto(tctx, !(num_users > 0 && !users), ret, fail, "wbcListUsers returned invalid results"); for (i = 0; i < MIN(num_users, 100); i++) { struct wbcDomainSid sid; enum wbcSidType name_type; uint32_t num_sids; const char *user; char *c; c = strchr(users[i], separator); if (c == NULL) { /* * NT4 DC * user name does not contain DOMAIN SEPARATOR prefix. */ user = users[i]; } else { /* * AD DC * user name starts with DOMAIN SEPARATOR prefix. */ const char *dom; *c = '\0'; dom = users[i]; user = c + 1; torture_assert_str_equal_goto(tctx, dom, domain_name, ret, fail, "Domain part " "of user name does not " "match domain name.\n"); } torture_assert_wbc_ok_goto_fail(tctx, wbcLookupName(domain_name, user, &sid, &name_type), "wbcLookupName of %s failed", users[i]); torture_assert_int_equal_goto(tctx, name_type, WBC_SID_NAME_USER, ret, fail, "wbcLookupName expected WBC_SID_NAME_USER"); wbcSidToString(&sid, &sid_string); torture_assert_wbc_ok_goto_fail(tctx, wbcLookupSid(&sid, &domain, &name, &name_type), "wbcLookupSid of %s failed", sid_string); torture_assert_int_equal_goto(tctx, name_type, WBC_SID_NAME_USER, ret, fail, "wbcLookupSid of expected WBC_SID_NAME_USER"); torture_assert_goto(tctx, name, ret, fail, "wbcLookupSid returned no name"); wbcFreeMemory(domain); domain = NULL; wbcFreeMemory(name); name = NULL; torture_assert_wbc_ok_goto_fail(tctx, wbcLookupUserSids(&sid, true, &num_sids, &sids), "wbcLookupUserSids of %s failed", sid_string); torture_assert_wbc_ok_goto_fail(tctx, wbcGetDisplayName(&sid, &domain, &name, &name_type), "wbcGetDisplayName of %s failed", sid_string); wbcFreeMemory(domain); domain = NULL; wbcFreeMemory(name); name = NULL; wbcFreeMemory(sids); sids = NULL; wbcFreeMemory(sid_string); sid_string = NULL; } ret = true; fail: wbcFreeMemory(details); wbcFreeMemory(users); wbcFreeMemory(domain); wbcFreeMemory(name); wbcFreeMemory(sids); wbcFreeMemory(sid_string); return ret; } static bool test_wbc_groups(struct torture_context *tctx) { wbcErr ret = false; const char *domain_name = NULL; uint32_t num_groups; const char **groups = NULL; uint32_t i; struct wbcInterfaceDetails *details = NULL; char *domain = NULL; char *name = NULL; char *sid_string = NULL; char separator; torture_assert_wbc_ok(tctx, wbcInterfaceDetails(&details), "%s", "wbcInterfaceDetails failed"); domain_name = talloc_strdup(tctx, details->netbios_domain); torture_assert_goto(tctx, domain_name != NULL, ret, fail, "Failed to allocate domain_name"); separator = details->winbind_separator; wbcFreeMemory(details); details = NULL; torture_assert_wbc_ok_goto_fail(tctx, wbcListGroups(domain_name, &num_groups, &groups), "wbcListGroups in %s failed", domain_name); torture_assert_goto(tctx, !(num_groups > 0 && !groups), ret, fail, "wbcListGroups returned invalid results"); for (i=0; i < MIN(num_groups,100); i++) { struct wbcDomainSid sid; enum wbcSidType name_type; const char *group; char *c; c = strchr(groups[i], separator); if (c == NULL) { /* * NT4 DC * group name does not contain DOMAIN SEPARATOR prefix. */ group = groups[i]; } else { /* * AD DC * group name starts with DOMAIN SEPARATOR prefix. */ const char *dom; *c = '\0'; dom = groups[i]; group = c + 1; torture_assert_str_equal_goto(tctx, dom, domain_name, ret, fail, "Domain part " "of group name does not " "match domain name.\n"); } torture_assert_wbc_ok_goto_fail(tctx, wbcLookupName(domain_name, group, &sid, &name_type), "wbcLookupName for %s failed", domain_name); wbcSidToString(&sid, &sid_string); torture_assert_wbc_ok_goto_fail(tctx, wbcLookupSid(&sid, &domain, &name, &name_type), "wbcLookupSid of %s failed", sid_string); torture_assert_goto(tctx, name, ret, fail, "wbcLookupSid returned no name"); wbcFreeMemory(domain); domain = NULL; wbcFreeMemory(name); name = NULL; wbcFreeMemory(sid_string); sid_string = NULL; } ret = true; fail: wbcFreeMemory(details); wbcFreeMemory(groups); wbcFreeMemory(domain); wbcFreeMemory(name); wbcFreeMemory(sid_string); return ret; } static bool test_wbc_trusts(struct torture_context *tctx) { struct wbcDomainInfo *domains = NULL; struct wbcAuthErrorInfo *error = NULL; size_t num_domains; uint32_t i; wbcErr ret = false; torture_assert_wbc_ok_goto_fail(tctx, wbcListTrusts(&domains, &num_domains), "%s", "wbcListTrusts failed"); torture_assert_goto(tctx, !(num_domains > 0 && !domains), ret, fail, "wbcListTrusts returned invalid results"); for (i=0; i < MIN(num_domains,100); i++) { /* struct wbcDomainSid sid; enum wbcSidType name_type; char *domain; char *name; */ torture_assert_wbc_ok_goto_fail(tctx, wbcCheckTrustCredentials(domains[i].short_name, &error), "%s", "wbcCheckTrustCredentials failed"); /* torture_assert_wbc_ok(tctx, wbcLookupName(domains[i].short_name, NULL, &sid, &name_type), "wbcLookupName failed"); torture_assert_int_equal(tctx, name_type, WBC_SID_NAME_DOMAIN, "wbcLookupName expected WBC_SID_NAME_DOMAIN"); torture_assert_wbc_ok(tctx, wbcLookupSid(&sid, &domain, &name, &name_type), "wbcLookupSid failed"); torture_assert_int_equal(tctx, name_type, WBC_SID_NAME_DOMAIN, "wbcLookupSid expected WBC_SID_NAME_DOMAIN"); torture_assert(tctx, name, "wbcLookupSid returned no name"); */ wbcFreeMemory(error); error = NULL; } ret = true; fail: wbcFreeMemory(domains); wbcFreeMemory(error); return ret; } static bool test_wbc_lookupdc(struct torture_context *tctx) { const char *domain_name = NULL; struct wbcInterfaceDetails *details; struct wbcDomainControllerInfo *dc_info; torture_assert_wbc_ok(tctx, wbcInterfaceDetails(&details), "%s", "wbcInterfaceDetails failed"); domain_name = talloc_strdup(tctx, details->netbios_domain); wbcFreeMemory(details); torture_assert_wbc_ok(tctx, wbcLookupDomainController(domain_name, 0, &dc_info), "wbcLookupDomainController for %s failed", domain_name); wbcFreeMemory(dc_info); return true; } static bool test_wbc_lookupdcex(struct torture_context *tctx) { const char *domain_name = NULL; struct wbcInterfaceDetails *details; struct wbcDomainControllerInfoEx *dc_info; torture_assert_wbc_ok(tctx, wbcInterfaceDetails(&details), "%s", "wbcInterfaceDetails failed"); domain_name = talloc_strdup(tctx, details->netbios_domain); wbcFreeMemory(details); torture_assert_wbc_ok(tctx, wbcLookupDomainControllerEx(domain_name, NULL, NULL, 0, &dc_info), "wbcLookupDomainControllerEx for %s failed", domain_name); wbcFreeMemory(dc_info); return true; } static bool test_wbc_resolve_winsbyname(struct torture_context *tctx) { const char *name; char *ip; wbcErr ret; name = torture_setting_string(tctx, "host", NULL); torture_comment(tctx, "test-WinsByName: host='%s'\n", name); ret = wbcResolveWinsByName(name, &ip); if (is_ipaddress(name)) { torture_assert_wbc_equal(tctx, ret, WBC_ERR_DOMAIN_NOT_FOUND, "wbcResolveWinsByName of %s failed", name); } else { torture_assert_wbc_ok(tctx, ret, "wbcResolveWinsByName for %s failed", name); } return true; } static bool test_wbc_resolve_winsbyip(struct torture_context *tctx) { const char *ip; const char *host; struct nbt_name nbt_name; char *name; wbcErr ret; NTSTATUS status; host = torture_setting_string(tctx, "host", NULL); torture_comment(tctx, "test-WinsByIp: host='%s'\n", host); make_nbt_name_server(&nbt_name, host); status = resolve_name_ex(lpcfg_resolve_context(tctx->lp_ctx), 0, 0, &nbt_name, tctx, &ip, tctx->ev); torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx,"Failed to resolve %s: %s", nbt_name.name, nt_errstr(status))); torture_comment(tctx, "test-WinsByIp: ip='%s'\n", ip); ret = wbcResolveWinsByIP(ip, &name); torture_assert_wbc_ok(tctx, ret, "wbcResolveWinsByIP for %s failed", ip); wbcFreeMemory(name); return true; } static bool test_wbc_lookup_rids(struct torture_context *tctx) { struct wbcDomainSid builtin; uint32_t rids[2] = { 544, 545 }; const char *domain_name = NULL; const char **names = NULL; enum wbcSidType *types; wbcErr ret = false; wbcStringToSid("S-1-5-32", &builtin); ret = wbcLookupRids(&builtin, 2, rids, &domain_name, &names, &types); torture_assert_wbc_ok_goto_fail( tctx, ret, "%s", "wbcLookupRids for 544 and 545 failed"); torture_assert_str_equal( tctx, names[0], "Administrators", "S-1-5-32-544 not mapped to 'Administrators'"); torture_assert_str_equal_goto_fail( tctx, names[1], "Users", "S-1-5-32-545 not mapped to 'Users'"); ret = true; fail: wbcFreeMemory(discard_const_p(char ,domain_name)); wbcFreeMemory(names); wbcFreeMemory(types); return ret; } static bool test_wbc_get_sidaliases(struct torture_context *tctx) { struct wbcDomainSid builtin; struct wbcDomainInfo *info = NULL; struct wbcInterfaceDetails *details = NULL; struct wbcDomainSid sids[2]; uint32_t *rids = NULL; uint32_t num_rids; wbcErr ret = false; torture_assert_wbc_ok_goto_fail(tctx, wbcInterfaceDetails(&details), "%s", "wbcInterfaceDetails failed"); torture_assert_wbc_ok_goto_fail(tctx, wbcDomainInfo(details->netbios_domain, &info), "wbcDomainInfo of %s failed", details->netbios_domain); sids[0] = info->sid; sids[0].sub_auths[sids[0].num_auths++] = 500; sids[1] = info->sid; sids[1].sub_auths[sids[1].num_auths++] = 512; torture_assert_wbc_ok_goto_fail(tctx, wbcStringToSid("S-1-5-32", &builtin), "wbcStringToSid of %s failed", "S-1-5-32"); ret = wbcGetSidAliases(&builtin, sids, 2, &rids, &num_rids); torture_assert_wbc_ok_goto_fail(tctx, ret, "%s", "wbcGetSidAliases failed"); ret = true; fail: wbcFreeMemory(details); wbcFreeMemory(info); wbcFreeMemory(rids); return ret; } static bool test_wbc_authenticate_user_int(struct torture_context *tctx, const char *correct_password) { struct wbcAuthUserParams params; struct wbcAuthUserInfo *info = NULL; struct wbcAuthErrorInfo *error = NULL; wbcErr ret; struct cli_credentials *creds = samba_cmdline_get_creds(); ret = wbcAuthenticateUser(cli_credentials_get_username( creds), correct_password); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "wbcAuthenticateUser of %s failed", cli_credentials_get_username(creds)); ZERO_STRUCT(params); params.account_name = cli_credentials_get_username(creds); params.level = WBC_AUTH_USER_LEVEL_PLAIN; params.password.plaintext = correct_password; ret = wbcAuthenticateUserEx(¶ms, &info, &error); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "wbcAuthenticateUserEx of %s failed", params.account_name); wbcFreeMemory(info); info = NULL; wbcFreeMemory(error); error = NULL; params.password.plaintext = "wrong"; ret = wbcAuthenticateUserEx(¶ms, &info, &error); torture_assert_wbc_equal(tctx, ret, WBC_ERR_AUTH_ERROR, "wbcAuthenticateUserEx for %s succeeded where it " "should have failed", params.account_name); wbcFreeMemory(info); info = NULL; wbcFreeMemory(error); error = NULL; return true; } static bool test_wbc_authenticate_user(struct torture_context *tctx) { struct cli_credentials *creds = samba_cmdline_get_creds(); return test_wbc_authenticate_user_int(tctx, cli_credentials_get_password(creds)); } static bool test_wbc_change_password(struct torture_context *tctx) { wbcErr ret; struct cli_credentials *creds = samba_cmdline_get_creds(); const char *oldpass = cli_credentials_get_password(creds); const char *newpass = "Koo8irei%$"; struct samr_CryptPassword new_nt_password; struct samr_CryptPassword new_lm_password; struct samr_Password old_nt_hash_enc; struct samr_Password old_lanman_hash_enc; gnutls_cipher_hd_t cipher_hnd = NULL; uint8_t old_nt_hash[16]; uint8_t old_lanman_hash[16]; uint8_t new_nt_hash[16]; uint8_t new_lanman_hash[16]; gnutls_datum_t old_nt_key = { .data = old_nt_hash, .size = sizeof(old_nt_hash), }; struct wbcChangePasswordParams params; if (oldpass == NULL) { torture_skip(tctx, "skipping wbcChangeUserPassword test as old password cannot be retrieved\n"); } ZERO_STRUCT(params); E_md4hash(oldpass, old_nt_hash); E_md4hash(newpass, new_nt_hash); if (lpcfg_client_lanman_auth(tctx->lp_ctx) && E_deshash(newpass, new_lanman_hash) && E_deshash(oldpass, old_lanman_hash)) { /* E_deshash returns false for 'long' passwords (> 14 DOS chars). This allows us to match Win2k, which does not store a LM hash for these passwords (which would reduce the effective password length to 14) */ encode_pw_buffer(new_lm_password.data, newpass, STR_UNICODE); gnutls_cipher_init(&cipher_hnd, GNUTLS_CIPHER_ARCFOUR_128, &old_nt_key, NULL); gnutls_cipher_encrypt(cipher_hnd, new_lm_password.data, 516); gnutls_cipher_deinit(cipher_hnd); E_old_pw_hash(new_nt_hash, old_lanman_hash, old_lanman_hash_enc.hash); params.old_password.response.old_lm_hash_enc_length = sizeof(old_lanman_hash_enc.hash); params.old_password.response.old_lm_hash_enc_data = old_lanman_hash_enc.hash; params.new_password.response.lm_length = sizeof(new_lm_password.data); params.new_password.response.lm_data = new_lm_password.data; } else { ZERO_STRUCT(new_lm_password); ZERO_STRUCT(old_lanman_hash_enc); } encode_pw_buffer(new_nt_password.data, newpass, STR_UNICODE); gnutls_cipher_init(&cipher_hnd, GNUTLS_CIPHER_ARCFOUR_128, &old_nt_key, NULL); gnutls_cipher_encrypt(cipher_hnd, new_nt_password.data, 516); gnutls_cipher_deinit(cipher_hnd); E_old_pw_hash(new_nt_hash, old_nt_hash, old_nt_hash_enc.hash); params.old_password.response.old_nt_hash_enc_length = sizeof(old_nt_hash_enc.hash); params.old_password.response.old_nt_hash_enc_data = old_nt_hash_enc.hash; params.new_password.response.nt_length = sizeof(new_nt_password.data); params.new_password.response.nt_data = new_nt_password.data; params.level = WBC_CHANGE_PASSWORD_LEVEL_RESPONSE; params.account_name = cli_credentials_get_username(creds); params.domain_name = cli_credentials_get_domain(creds); ret = wbcChangeUserPasswordEx(¶ms, NULL, NULL, NULL); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "wbcChangeUserPassword for %s failed", params.account_name); if (!test_wbc_authenticate_user_int(tctx, newpass)) { return false; } ret = wbcChangeUserPassword( cli_credentials_get_username(creds), newpass, cli_credentials_get_password(creds)); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "wbcChangeUserPassword for %s failed", params.account_name); return test_wbc_authenticate_user_int(tctx, cli_credentials_get_password(creds)); } static bool test_wbc_logon_user(struct torture_context *tctx) { struct wbcLogonUserParams params; struct wbcLogonUserInfo *info = NULL; struct wbcAuthErrorInfo *error = NULL; struct wbcUserPasswordPolicyInfo *policy = NULL; struct wbcInterfaceDetails *iface; struct wbcDomainSid sid; enum wbcSidType sidtype; char *sidstr; wbcErr ret; struct cli_credentials *creds = samba_cmdline_get_creds(); uint32_t i, flags = 0; const char *expected_unix_username = NULL; const char *unix_username = NULL; ZERO_STRUCT(params); ret = wbcLogonUser(¶ms, &info, &error, &policy); torture_assert_wbc_equal(tctx, ret, WBC_ERR_INVALID_PARAM, "%s", "wbcLogonUser succeeded for NULL where it should " "have failed"); params.username = cli_credentials_get_username(creds); params.password = cli_credentials_get_password(creds); ret = wbcAddNamedBlob(¶ms.num_blobs, ¶ms.blobs, "foo", 0, discard_const_p(uint8_t, "bar"), 4); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "%s", "wbcAddNamedBlob failed"); ret = wbcLogonUser(¶ms, &info, &error, &policy); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "wbcLogonUser for %s failed", params.username); wbcFreeMemory(info); info = NULL; wbcFreeMemory(error); error = NULL; wbcFreeMemory(policy); policy = NULL; params.password = "wrong"; ret = wbcLogonUser(¶ms, &info, &error, &policy); torture_assert_wbc_equal(tctx, ret, WBC_ERR_AUTH_ERROR, "wbcLogonUser for %s should have failed with " "WBC_ERR_AUTH_ERROR", params.username); wbcFreeMemory(info); info = NULL; wbcFreeMemory(error); error = NULL; wbcFreeMemory(policy); policy = NULL; ret = wbcAddNamedBlob(¶ms.num_blobs, ¶ms.blobs, "membership_of", 0, discard_const_p(uint8_t, "S-1-2-3-4"), strlen("S-1-2-3-4")+1); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "%s", "wbcAddNamedBlob failed"); params.password = cli_credentials_get_password(creds); ret = wbcLogonUser(¶ms, &info, &error, &policy); torture_assert_wbc_equal(tctx, ret, WBC_ERR_AUTH_ERROR, "wbcLogonUser for %s should have failed with " "WBC_ERR_AUTH_ERROR", params.username); wbcFreeMemory(info); info = NULL; wbcFreeMemory(error); error = NULL; wbcFreeMemory(policy); policy = NULL; wbcFreeMemory(params.blobs); params.blobs = NULL; params.num_blobs = 0; ret = wbcInterfaceDetails(&iface); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "%s", "wbcInterfaceDetails failed"); ret = wbcLookupName(iface->netbios_domain, cli_credentials_get_username(creds), &sid, &sidtype); wbcFreeMemory(iface); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "wbcLookupName for %s failed", cli_credentials_get_username(creds)); ret = wbcSidToString(&sid, &sidstr); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "%s", "wbcSidToString failed"); ret = wbcAddNamedBlob(¶ms.num_blobs, ¶ms.blobs, "membership_of", 0, (uint8_t *)sidstr, strlen(sidstr)+1); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "%s", "wbcAddNamedBlob failed"); wbcFreeMemory(sidstr); params.password = cli_credentials_get_password(creds); ret = wbcLogonUser(¶ms, &info, &error, &policy); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "wbcLogonUser for %s failed", params.username); wbcFreeMemory(info); info = NULL; wbcFreeMemory(error); error = NULL; wbcFreeMemory(policy); policy = NULL; wbcFreeMemory(params.blobs); params.blobs = NULL; params.num_blobs = 0; /* Test WBFLAG_PAM_UNIX_NAME */ params.username = cli_credentials_get_username(creds); params.password = cli_credentials_get_password(creds); flags = WBFLAG_PAM_UNIX_NAME; torture_assert(tctx, lp_load_global(lpcfg_configfile(tctx->lp_ctx)), "lp_load_global() failed\n"); expected_unix_username = fill_domain_username_talloc(tctx, cli_credentials_get_domain(creds), cli_credentials_get_username(creds), true); ret = wbcAddNamedBlob(¶ms.num_blobs, ¶ms.blobs, "flags", 0, (uint8_t *)&flags, sizeof(flags)); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "%s", "wbcAddNamedBlob failed"); ret = wbcLogonUser(¶ms, &info, &error, &policy); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "wbcLogonUser for %s failed", params.username); for (unix_username=NULL, i=0; inum_blobs; i++) { torture_comment(tctx, "Found named blob '%s'\n", info->blobs[i].name); if (strequal(info->blobs[i].name, "unix_username")) { unix_username = (const char *)info->blobs[i].blob.data; } } torture_assert_not_null(tctx, unix_username, "wbcLogonUserInfo does not have unix_username blob\n"); torture_assert_str_equal(tctx, unix_username, expected_unix_username, "Unexpected unix_username"); wbcFreeMemory(info); info = NULL; wbcFreeMemory(error); error = NULL; wbcFreeMemory(policy); policy = NULL; wbcFreeMemory(params.blobs); params.blobs = NULL; params.num_blobs = 0; return true; } static bool test_wbc_getgroups(struct torture_context *tctx) { wbcErr ret; uint32_t num_groups; gid_t *groups; struct cli_credentials *creds = samba_cmdline_get_creds(); ret = wbcGetGroups( cli_credentials_get_username(creds), &num_groups, &groups); torture_assert_wbc_equal(tctx, ret, WBC_ERR_SUCCESS, "wbcGetGroups for %s failed", cli_credentials_get_username(creds)); wbcFreeMemory(groups); return true; } struct torture_suite *torture_wbclient(TALLOC_CTX *ctx) { struct torture_suite *suite = torture_suite_create(ctx, "wbclient"); torture_suite_add_simple_test(suite, "wbcPing", test_wbc_ping); torture_suite_add_simple_test(suite, "wbcPingDc", test_wbc_pingdc); torture_suite_add_simple_test(suite, "wbcPingDc2", test_wbc_pingdc2); torture_suite_add_simple_test(suite, "wbcLibraryDetails", test_wbc_library_details); torture_suite_add_simple_test(suite, "wbcInterfaceDetails", test_wbc_interface_details); torture_suite_add_simple_test(suite, "wbcSidTypeString", test_wbc_sidtypestring); torture_suite_add_simple_test(suite, "wbcSidToString", test_wbc_sidtostring); torture_suite_add_simple_test(suite, "wbcGuidToString", test_wbc_guidtostring); torture_suite_add_simple_test(suite, "wbcDomainInfo", test_wbc_domain_info); torture_suite_add_simple_test(suite, "wbcListUsers", test_wbc_users); torture_suite_add_simple_test(suite, "wbcListGroups", test_wbc_groups); torture_suite_add_simple_test(suite, "wbcListTrusts", test_wbc_trusts); torture_suite_add_simple_test(suite, "wbcLookupDomainController", test_wbc_lookupdc); torture_suite_add_simple_test(suite, "wbcLookupDomainControllerEx", test_wbc_lookupdcex); torture_suite_add_simple_test(suite, "wbcResolveWinsByName", test_wbc_resolve_winsbyname); torture_suite_add_simple_test(suite, "wbcResolveWinsByIP", test_wbc_resolve_winsbyip); torture_suite_add_simple_test(suite, "wbcLookupRids", test_wbc_lookup_rids); torture_suite_add_simple_test(suite, "wbcGetSidAliases", test_wbc_get_sidaliases); torture_suite_add_simple_test(suite, "wbcAuthenticateUser", test_wbc_authenticate_user); torture_suite_add_simple_test(suite, "wbcLogonUser", test_wbc_logon_user); torture_suite_add_simple_test(suite, "wbcChangeUserPassword", test_wbc_change_password); torture_suite_add_simple_test(suite, "wbcGetGroups", test_wbc_getgroups); return suite; }