tst-pam_localuser-retval.c 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144
  1. /*
  2. * Check pam_localuser return values.
  3. *
  4. * Copyright (c) 2020 Dmitry V. Levin <ldv@altlinux.org>
  5. */
  6. #include "test_assert.h"
  7. #include <limits.h>
  8. #include <stdio.h>
  9. #include <stdlib.h>
  10. #include <string.h>
  11. #include <unistd.h>
  12. #include <security/pam_appl.h>
  13. #define MODULE_NAME "pam_localuser"
  14. #define TEST_NAME "tst-" MODULE_NAME "-retval"
  15. static const char service_file[] = TEST_NAME ".service";
  16. static const char passwd_file[] = TEST_NAME ".passwd";
  17. static const char missing_file[] = TEST_NAME ".missing";
  18. static const char alice_line[] = "alice:x:1001:1001:Alice:/home/alice:";
  19. static const char bob_line[] = "bob:x:1002:1002:Bob:/home/bob:";
  20. static const char craig_prefix[] = ":x:1003:1003:";
  21. static const char craig_suffix[] = "craig:/home/craig:";
  22. int
  23. main(void)
  24. {
  25. static struct pam_conv conv;
  26. pam_handle_t *pamh = NULL;
  27. FILE *fp;
  28. char cwd[PATH_MAX];
  29. char name[BUFSIZ];
  30. ASSERT_NE(NULL, getcwd(cwd, sizeof(cwd)));
  31. /* default passwd */
  32. ASSERT_NE(NULL, fp = fopen(service_file, "w"));
  33. ASSERT_LT(0, fprintf(fp, "#%%PAM-1.0\n"
  34. "auth required %s/.libs/%s.so\n",
  35. cwd, MODULE_NAME));
  36. ASSERT_EQ(0, fclose(fp));
  37. ASSERT_EQ(PAM_SUCCESS,
  38. pam_start_confdir(service_file, "", &conv, ".", &pamh));
  39. ASSERT_NE(NULL, pamh);
  40. ASSERT_EQ(PAM_SERVICE_ERR, pam_authenticate(pamh, 0));
  41. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  42. pamh = NULL;
  43. memset(name, 'x', sizeof(name) - 1);
  44. name[sizeof(name) - 1] = '\0';
  45. ASSERT_EQ(PAM_SUCCESS,
  46. pam_start_confdir(service_file, name, &conv, ".", &pamh));
  47. ASSERT_NE(NULL, pamh);
  48. ASSERT_EQ(PAM_SERVICE_ERR, pam_authenticate(pamh, 0));
  49. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  50. pamh = NULL;
  51. ASSERT_EQ(PAM_SUCCESS,
  52. pam_start_confdir(service_file, "root:x", &conv, ".", &pamh));
  53. ASSERT_NE(NULL, pamh);
  54. ASSERT_EQ(PAM_PERM_DENIED, pam_authenticate(pamh, 0));
  55. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  56. pamh = NULL;
  57. /* missing passwd file */
  58. ASSERT_NE(NULL, fp = fopen(service_file, "w"));
  59. ASSERT_LT(0, fprintf(fp, "#%%PAM-1.0\n"
  60. "auth required %s/.libs/%s.so file=%s\n",
  61. cwd, MODULE_NAME, missing_file));
  62. ASSERT_EQ(0, fclose(fp));
  63. ASSERT_EQ(PAM_SUCCESS,
  64. pam_start_confdir(service_file, "root", &conv, ".", &pamh));
  65. ASSERT_NE(NULL, pamh);
  66. ASSERT_EQ(PAM_SERVICE_ERR, pam_authenticate(pamh, 0));
  67. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  68. pamh = NULL;
  69. /* custom passwd file */
  70. ASSERT_NE(NULL, fp = fopen(service_file, "w"));
  71. ASSERT_LT(0, fprintf(fp, "#%%PAM-1.0\n"
  72. "auth required %s/.libs/%s.so file=%s\n",
  73. cwd, MODULE_NAME, passwd_file));
  74. ASSERT_EQ(0, fclose(fp));
  75. memcpy(name + (sizeof(name) - sizeof(craig_prefix)),
  76. craig_prefix, sizeof(craig_prefix));
  77. ASSERT_NE(NULL, fp = fopen(passwd_file, "w"));
  78. ASSERT_LT(0, fprintf(fp, "%s\n%s\n%s%s\n",
  79. alice_line, bob_line, name, craig_suffix));
  80. ASSERT_EQ(0, fclose(fp));
  81. ASSERT_EQ(PAM_SUCCESS,
  82. pam_start_confdir(service_file, "", &conv, ".", &pamh));
  83. ASSERT_NE(NULL, pamh);
  84. ASSERT_EQ(PAM_SERVICE_ERR, pam_authenticate(pamh, 0));
  85. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  86. pamh = NULL;
  87. memset(name, 'x', sizeof(name) - 1);
  88. ASSERT_EQ(PAM_SUCCESS,
  89. pam_start_confdir(service_file, name, &conv, ".", &pamh));
  90. ASSERT_NE(NULL, pamh);
  91. ASSERT_EQ(PAM_SERVICE_ERR, pam_authenticate(pamh, 0));
  92. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  93. pamh = NULL;
  94. ASSERT_EQ(PAM_SUCCESS,
  95. pam_start_confdir(service_file, "alice", &conv, ".", &pamh));
  96. ASSERT_NE(NULL, pamh);
  97. ASSERT_EQ(PAM_SUCCESS, pam_authenticate(pamh, 0));
  98. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  99. pamh = NULL;
  100. ASSERT_EQ(PAM_SUCCESS,
  101. pam_start_confdir(service_file, "bob", &conv, ".", &pamh));
  102. ASSERT_NE(NULL, pamh);
  103. ASSERT_EQ(PAM_SUCCESS, pam_authenticate(pamh, 0));
  104. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  105. pamh = NULL;
  106. ASSERT_EQ(PAM_SUCCESS,
  107. pam_start_confdir(service_file, "alice:x", &conv, ".", &pamh));
  108. ASSERT_NE(NULL, pamh);
  109. ASSERT_EQ(PAM_PERM_DENIED, pam_authenticate(pamh, 0));
  110. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  111. pamh = NULL;
  112. ASSERT_EQ(PAM_SUCCESS,
  113. pam_start_confdir(service_file, "craig", &conv, ".", &pamh));
  114. ASSERT_NE(NULL, pamh);
  115. ASSERT_EQ(PAM_PERM_DENIED, pam_authenticate(pamh, 0));
  116. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  117. pamh = NULL;
  118. ASSERT_EQ(0, unlink(service_file));
  119. ASSERT_EQ(0, unlink(passwd_file));
  120. return 0;
  121. }