r26588: Janitorial: Rename torture_*_add_*test to torture_*_add_*test_const.
[metze/samba/wip.git] / source / librpc / tests / binding_string.c
1 /* 
2    Unix SMB/CIFS implementation.
3
4    local testing of RPC binding string parsing 
5
6    Copyright (C) Jelmer Vernooij 2004
7    
8    This program is free software; you can redistribute it and/or modify
9    it under the terms of the GNU General Public License as published by
10    the Free Software Foundation; either version 3 of the License, or
11    (at your option) any later version.
12    
13    This program is distributed in the hope that it will be useful,
14    but WITHOUT ANY WARRANTY; without even the implied warranty of
15    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16    GNU General Public License for more details.
17    
18    You should have received a copy of the GNU General Public License
19    along with this program.  If not, see <http://www.gnu.org/licenses/>.
20 */
21
22 #include "includes.h"
23 #include "librpc/gen_ndr/epmapper.h"
24 #include "librpc/rpc/dcerpc.h"
25 #include "torture/torture.h"
26
27 static bool test_BindingString(struct torture_context *tctx,
28                                                            const void *test_data)
29 {
30         const char *binding = test_data;
31         struct dcerpc_binding *b, *b2;
32         const char *s, *s2;
33         struct epm_tower tower;
34         TALLOC_CTX *mem_ctx = tctx;
35
36         /* Parse */
37         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(mem_ctx, binding, &b),
38                 "Error parsing binding string");
39
40         s = dcerpc_binding_string(mem_ctx, b);
41         torture_assert(tctx, s != NULL, "Error converting binding back to string");
42
43         torture_assert_casestr_equal(tctx, binding, s, 
44                 "Mismatch while comparing original and regenerated binding strings");
45
46         /* Generate protocol towers */
47         torture_assert_ntstatus_ok(tctx, dcerpc_binding_build_tower(mem_ctx, b, &tower),
48                 "Error generating protocol tower");
49
50         /* Convert back to binding and then back to string and compare */
51
52         torture_assert_ntstatus_ok(tctx, dcerpc_binding_from_tower(mem_ctx, &tower, &b2),
53                             "Error generating binding from tower for original binding");
54
55         /* Compare to a stripped down version of the binding string because 
56          * the protocol tower doesn't contain the extra option data */
57         b->options = NULL;
58
59         b->flags = 0;
60         
61         s = dcerpc_binding_string(mem_ctx, b);
62         torture_assert(tctx, s != NULL, "Error converting binding back to string for (stripped down)"); 
63
64         s2 = dcerpc_binding_string(mem_ctx, b2);
65         torture_assert(tctx, s != NULL, "Error converting binding back to string"); 
66
67         if (is_ipaddress(b->host))
68                 torture_assert_casestr_equal(tctx, s, s2, "Mismatch while comparing original and from protocol tower generated binding strings");
69
70         return true;
71 }
72
73 static const char *test_strings[] = {
74         "ncacn_np:", 
75         "ncalrpc:", 
76         "ncalrpc:[,Security=Sane]", 
77         "ncacn_np:[rpcecho]",
78         "ncacn_np:127.0.0.1[rpcecho]",
79         "ncacn_ip_tcp:127.0.0.1",
80         "ncacn_ip_tcp:127.0.0.1[20]",
81         "ncacn_ip_tcp:127.0.0.1[20,sign]",
82         "ncacn_ip_tcp:127.0.0.1[20,Security=Foobar,sign]",
83         "ncacn_http:127.0.0.1",
84         "ncacn_http:127.0.0.1[78]",
85         "ncacn_http:127.0.0.1[78,ProxyServer=myproxy:3128]",
86         "ncacn_np:localhost[rpcecho]",
87         "ncacn_np:[/pipe/rpcecho]",
88         "ncacn_np:localhost[/pipe/rpcecho,sign,seal]",
89         "ncacn_np:[,sign]",
90         "ncadg_ip_udp:",
91         "308FB580-1EB2-11CA-923B-08002B1075A7@ncacn_np:localhost",
92         "308FB580-1EB2-11CA-923B-08002B1075A7@ncacn_ip_tcp:127.0.0.1",
93         "ncacn_unix_stream:[/tmp/epmapper]",
94         "ncalrpc:[IDENTIFIER]",
95         "ncacn_unix_stream:[/tmp/epmapper,sign]",
96 };
97
98 static bool test_parse_check_results(struct torture_context *tctx)
99 {
100         struct dcerpc_binding *b;
101         struct GUID uuid;
102
103         torture_assert_ntstatus_ok(tctx, 
104                                    GUID_from_string("308FB580-1EB2-11CA-923B-08002B1075A7", &uuid),
105                                    "parsing uuid");
106
107         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER", &b), "parse");
108         torture_assert(tctx, b->transport == NCACN_NP, "ncacn_np expected");
109         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_ip_tcp:$SERVER", &b), "parse");
110         torture_assert(tctx, b->transport == NCACN_IP_TCP, "ncacn_ip_tcp expected");
111         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[rpcecho]", &b), "parse");
112         torture_assert_str_equal(tctx, b->endpoint, "rpcecho", "endpoint");
113         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[/pipe/rpcecho]", &b), "parse");
114         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[/pipe/rpcecho,sign,seal]", &b), "parse");
115         torture_assert(tctx, b->flags == DCERPC_SIGN+DCERPC_SEAL, "sign+seal flags");
116         torture_assert_str_equal(tctx, b->endpoint, "/pipe/rpcecho", "endpoint");
117         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_np:$SERVER[,sign]", &b), "parse");
118         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncacn_ip_tcp:$SERVER[,sign]", &b), "parse");
119         torture_assert(tctx, b->endpoint == NULL, "endpoint");
120         torture_assert(tctx, b->flags == DCERPC_SIGN, "sign flag");
121         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, "ncalrpc:", &b), "parse");
122         torture_assert(tctx, b->transport == NCALRPC, "ncalrpc expected");
123         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, 
124                 "308FB580-1EB2-11CA-923B-08002B1075A7@ncacn_np:$SERVER", &b), "parse");
125         torture_assert(tctx, GUID_equal(&b->object.uuid, &uuid), "object uuid");
126         torture_assert_int_equal(tctx, b->object.if_version, 0, "object version");
127         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, 
128                 "308FB580-1EB2-11CA-923B-08002B1075A7@ncacn_ip_tcp:$SERVER", &b), "parse");
129
130         return true;
131 }
132
133 static bool test_no_transport(struct torture_context *tctx)
134 {
135         const char *binding = "somehost";
136         struct dcerpc_binding *b;
137         const char *s;
138
139         /* Parse */
140         torture_assert_ntstatus_ok(tctx, dcerpc_parse_binding(tctx, binding, &b),
141                 "Error parsing binding string");
142
143         torture_assert(tctx, b->transport == NCA_UNKNOWN, "invalid transport");
144
145         s = dcerpc_binding_string(tctx, b);
146         torture_assert(tctx, s != NULL, "Error converting binding back to string");
147
148         torture_assert_casestr_equal(tctx, binding, s, 
149                 "Mismatch while comparing original and regenerated binding strings");
150
151         return true;
152 }
153
154 struct torture_suite *torture_local_binding_string(TALLOC_CTX *mem_ctx)
155 {
156         int i;
157         struct torture_suite *suite = torture_suite_create(mem_ctx, "BINDING");
158
159         for (i = 0; i < ARRAY_SIZE(test_strings); i++) {
160                 torture_suite_add_simple_tcase_const(suite, test_strings[i],
161                                                 test_BindingString,
162                                                 test_strings[i]);
163         }
164
165         torture_suite_add_simple_test(suite, "no transport",test_no_transport);
166
167         torture_suite_add_simple_test(suite, "parsing results",
168                         test_parse_check_results);
169
170         return suite;
171 }