tst-pam_echo-retval.c 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. /*
  2. * Check pam_echo return values.
  3. *
  4. * Copyright (c) 2020 Dmitry V. Levin <ldv@altlinux.org>
  5. */
  6. #include "test_assert.h"
  7. #include <limits.h>
  8. #include <stdio.h>
  9. #include <string.h>
  10. #include <unistd.h>
  11. #include <security/pam_appl.h>
  12. #define MODULE_NAME "pam_echo"
  13. #define TEST_NAME "tst-" MODULE_NAME "-retval"
  14. static const char service_file[] = TEST_NAME ".service";
  15. static const char user_name[] = "";
  16. static struct pam_conv conv;
  17. int
  18. main(void)
  19. {
  20. pam_handle_t *pamh = NULL;
  21. FILE *fp;
  22. char cwd[PATH_MAX];
  23. ASSERT_NE(NULL, getcwd(cwd, sizeof(cwd)));
  24. /* PAM_SUCCESS -> PAM_SUCCESS, PAM_IGNORE -> PAM_PERM_DENIED */
  25. ASSERT_NE(NULL, fp = fopen(service_file, "w"));
  26. ASSERT_LT(0, fprintf(fp, "#%%PAM-1.0\n"
  27. "auth required %s/.libs/%s.so\n"
  28. "account required %s/.libs/%s.so\n"
  29. "password required %s/.libs/%s.so\n"
  30. "session required %s/.libs/%s.so\n",
  31. cwd, MODULE_NAME,
  32. cwd, MODULE_NAME,
  33. cwd, MODULE_NAME,
  34. cwd, MODULE_NAME));
  35. ASSERT_EQ(0, fclose(fp));
  36. ASSERT_EQ(PAM_SUCCESS,
  37. pam_start_confdir(service_file, user_name, &conv, ".", &pamh));
  38. ASSERT_NE(NULL, pamh);
  39. ASSERT_EQ(PAM_SUCCESS, pam_authenticate(pamh, 0));
  40. ASSERT_EQ(PAM_PERM_DENIED, pam_setcred(pamh, 0));
  41. ASSERT_EQ(PAM_SUCCESS, pam_acct_mgmt(pamh, 0));
  42. ASSERT_EQ(PAM_PERM_DENIED, pam_chauthtok(pamh, 0));
  43. ASSERT_EQ(PAM_SUCCESS, pam_open_session(pamh, 0));
  44. ASSERT_EQ(PAM_PERM_DENIED, pam_close_session(pamh, 0));
  45. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  46. pamh = NULL;
  47. /* PAM_SILENT: PAM_IGNORE -> PAM_PERM_DENIED */
  48. ASSERT_EQ(PAM_SUCCESS,
  49. pam_start_confdir(service_file, user_name, &conv, ".", &pamh));
  50. ASSERT_NE(NULL, pamh);
  51. ASSERT_EQ(PAM_PERM_DENIED, pam_authenticate(pamh, PAM_SILENT));
  52. ASSERT_EQ(PAM_PERM_DENIED, pam_setcred(pamh, PAM_SILENT));
  53. ASSERT_EQ(PAM_PERM_DENIED, pam_acct_mgmt(pamh, PAM_SILENT));
  54. ASSERT_EQ(PAM_PERM_DENIED, pam_chauthtok(pamh, PAM_SILENT));
  55. ASSERT_EQ(PAM_PERM_DENIED, pam_open_session(pamh, PAM_SILENT));
  56. ASSERT_EQ(PAM_PERM_DENIED, pam_close_session(pamh, PAM_SILENT));
  57. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  58. pamh = NULL;
  59. /* PAM_IGNORE -> PAM_SUCCESS */
  60. ASSERT_NE(NULL, fp = fopen(service_file, "w"));
  61. ASSERT_LT(0, fprintf(fp, "#%%PAM-1.0\n"
  62. "auth required %s/.libs/%s.so\n"
  63. "auth required %s/../pam_permit/.libs/pam_permit.so\n"
  64. "account required %s/.libs/%s.so\n"
  65. "account required %s/../pam_permit/.libs/pam_permit.so\n"
  66. "password required %s/.libs/%s.so\n"
  67. "password required %s/../pam_permit/.libs/pam_permit.so\n"
  68. "session required %s/.libs/%s.so\n"
  69. "session required %s/../pam_permit/.libs/pam_permit.so\n",
  70. cwd, MODULE_NAME, cwd,
  71. cwd, MODULE_NAME, cwd,
  72. cwd, MODULE_NAME, cwd,
  73. cwd, MODULE_NAME, cwd));
  74. ASSERT_EQ(0, fclose(fp));
  75. ASSERT_EQ(PAM_SUCCESS,
  76. pam_start_confdir(service_file, user_name, &conv, ".", &pamh));
  77. ASSERT_NE(NULL, pamh);
  78. ASSERT_EQ(PAM_SUCCESS, pam_authenticate(pamh, PAM_SILENT));
  79. ASSERT_EQ(PAM_SUCCESS, pam_setcred(pamh, PAM_SILENT));
  80. ASSERT_EQ(PAM_SUCCESS, pam_acct_mgmt(pamh, PAM_SILENT));
  81. ASSERT_EQ(PAM_SUCCESS, pam_chauthtok(pamh, PAM_SILENT));
  82. ASSERT_EQ(PAM_SUCCESS, pam_open_session(pamh, PAM_SILENT));
  83. ASSERT_EQ(PAM_SUCCESS, pam_close_session(pamh, PAM_SILENT));
  84. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  85. pamh = NULL;
  86. ASSERT_EQ(0, unlink(service_file));
  87. return 0;
  88. }