diff options
Diffstat (limited to 'source4/torture/smb2/ioctl.c')
-rw-r--r-- | source4/torture/smb2/ioctl.c | 87 |
1 files changed, 87 insertions, 0 deletions
diff --git a/source4/torture/smb2/ioctl.c b/source4/torture/smb2/ioctl.c new file mode 100644 index 0000000000..bc8a96a58f --- /dev/null +++ b/source4/torture/smb2/ioctl.c @@ -0,0 +1,87 @@ +/* + Unix SMB/CIFS implementation. + + test suite for SMB2 ioctl operations + + Copyright (C) David Disseldorp 2011 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#include "includes.h" +#include "librpc/gen_ndr/security.h" +#include "libcli/smb2/smb2.h" +#include "libcli/smb2/smb2_calls.h" +#include "torture/torture.h" +#include "torture/smb2/proto.h" + +#define FNAME "testfsctl.dat" + +/* + basic testing of SMB2 shadow copy calls +*/ +static bool test_ioctl_get_shadow_copy(struct torture_context *torture, + struct smb2_tree *tree) +{ + struct smb2_handle h; + uint8_t buf[100]; + NTSTATUS status; + union smb_ioctl ioctl; + TALLOC_CTX *tmp_ctx = talloc_new(tree); + + smb2_util_unlink(tree, FNAME); + + status = torture_smb2_testfile(tree, FNAME, &h); + if (!NT_STATUS_IS_OK(status)) { + printf("create write\n"); + return false; + } + + ZERO_ARRAY(buf); + status = smb2_util_write(tree, h, buf, 0, ARRAY_SIZE(buf)); + if (!NT_STATUS_IS_OK(status)) { + printf("failed write\n"); + return false; + } + + ZERO_STRUCT(ioctl); + ioctl.smb2.level = RAW_IOCTL_SMB2; + ioctl.smb2.in.file.handle = h; + ioctl.smb2.in.function = 0x144064; /* FSCTL_GET_SHADOW_COPY_DATA 0x144064 */ + ioctl.smb2.in.max_response_size = 16; + ioctl.smb2.in.flags = 1; /* Is FSCTL */ + + status = smb2_ioctl(tree, tmp_ctx, &ioctl.smb2); + if (!NT_STATUS_IS_OK(status)) { + printf("FSCTL_GET_SHADOW_COPY_DATA failed\n"); + return false; + } + + return true; +} + +/* + basic testing of SMB2 ioctls +*/ +struct torture_suite *torture_smb2_ioctl_init(void) +{ + struct torture_suite *suite = torture_suite_create(talloc_autofree_context(), "ioctl"); + + torture_suite_add_1smb2_test(suite, "shadow_copy", test_ioctl_get_shadow_copy); + + suite->description = talloc_strdup(suite, "SMB2-IOCTL tests"); + + return suite; +} + |