tst-pam_permit-retval.c 1.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758
  1. /*
  2. * Check pam_permit return values.
  3. *
  4. * Copyright (c) 2020 Dmitry V. Levin <ldv@altlinux.org>
  5. */
  6. #include "test_assert.h"
  7. #include <limits.h>
  8. #include <stdio.h>
  9. #include <string.h>
  10. #include <unistd.h>
  11. #include <security/pam_appl.h>
  12. #define MODULE_NAME "pam_permit"
  13. #define TEST_NAME "tst-" MODULE_NAME "-retval"
  14. static const char service_file[] = TEST_NAME ".service";
  15. static const char user_name[] = "";
  16. static struct pam_conv conv;
  17. int
  18. main(void)
  19. {
  20. pam_handle_t *pamh = NULL;
  21. FILE *fp;
  22. char cwd[PATH_MAX];
  23. ASSERT_NE(NULL, getcwd(cwd, sizeof(cwd)));
  24. ASSERT_NE(NULL, fp = fopen(service_file, "w"));
  25. ASSERT_LT(0, fprintf(fp, "#%%PAM-1.0\n"
  26. "auth required %s/.libs/%s.so\n"
  27. "account required %s/.libs/%s.so\n"
  28. "password required %s/.libs/%s.so\n"
  29. "session required %s/.libs/%s.so\n",
  30. cwd, MODULE_NAME,
  31. cwd, MODULE_NAME,
  32. cwd, MODULE_NAME,
  33. cwd, MODULE_NAME));
  34. ASSERT_EQ(0, fclose(fp));
  35. ASSERT_EQ(PAM_SUCCESS,
  36. pam_start_confdir(service_file, user_name, &conv, ".", &pamh));
  37. ASSERT_NE(NULL, pamh);
  38. ASSERT_EQ(PAM_SUCCESS, pam_authenticate(pamh, 0));
  39. ASSERT_EQ(PAM_SUCCESS, pam_setcred(pamh, 0));
  40. ASSERT_EQ(PAM_SUCCESS, pam_acct_mgmt(pamh, 0));
  41. ASSERT_EQ(PAM_SUCCESS, pam_chauthtok(pamh, 0));
  42. ASSERT_EQ(PAM_SUCCESS, pam_open_session(pamh, 0));
  43. ASSERT_EQ(PAM_SUCCESS, pam_close_session(pamh, 0));
  44. ASSERT_EQ(PAM_SUCCESS, pam_end(pamh, 0));
  45. pamh = NULL;
  46. ASSERT_EQ(0, unlink(service_file));
  47. return 0;
  48. }