/* test the SourceData interface */ static bool test_sourcedata(struct torture_context *tctx, struct dcerpc_pipe *p) { int i; NTSTATUS status; int len; struct echo_SourceData r; if (torture_setting_bool(tctx, "quick", false) && (p->conn->flags & DCERPC_DEBUG_VALIDATE_BOTH)) { len = 100 + (random() % 500); } else { len = 200000 + (random() % 5000); } r.in.len = len; status = dcerpc_echo_SourceData(p, tctx, &r); torture_assert_ntstatus_ok(tctx, status, talloc_asprintf(tctx, "SourceData(%d) failed", len)); for (i=0;i<len;i++) { uint8_t *v = (uint8_t *)r.out.data; torture_assert(tctx, v[i] == (i & 0xFF), talloc_asprintf(tctx, "bad data 0x%x at %d\n", (uint8_t)r.out.data[i], i)); } return true; }
static NTSTATUS cmd_echo_source_data(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, int argc, const char **argv) { struct dcerpc_binding_handle *b = cli->binding_handle; uint32 size, i; NTSTATUS status; uint8_t *out_data = NULL; if (argc != 2) { printf("Usage: %s num\n", argv[0]); return NT_STATUS_OK; } size = atoi(argv[1]); if ( (out_data = (uint8_t*)SMB_MALLOC(size)) == NULL ) { printf("Failure to allocate buff of %d bytes\n", size); status = NT_STATUS_NO_MEMORY; goto done; } status = dcerpc_echo_SourceData(b, mem_ctx, size, out_data); if (!NT_STATUS_IS_OK(status)) { goto done; } for (i = 0; i < size; i++) { if (out_data && out_data[i] != (i & 0xff)) { printf("mismatch at offset %d, %d != %d\n", i, out_data[i], i & 0xff); status = NT_STATUS_UNSUCCESSFUL; } } done: SAFE_FREE(out_data); return status; }